(These notes are to be used in conjunction with the slides on QOS - Lecture 1)
|
|
- Shanna Pierce
- 5 years ago
- Views:
Transcription
1 (These notes are to be used in conjunction with the slides on QOS - Lecture 1) A telephone system consists of four elements: Each subscriber uses a telephone set that converts sound into electrical signals and then back again to sound. Most telephone sets have a handset with a transmitter and receiver and a base. The base has a dial to initiate a call and a bell or other signaling device to notify the user that a call from another user is being received. One or more central switching facilities or telephone exchanges interconnect groups of local subscribers. Modern telephone exchanges use time-division multiplexing (TDM) to digitize analog signals from subscribers. Exchanges assign these digitized signals to the appropriate time slots. Exchanges interconnect both digital data and voice circuits. Inter-exchange transport facilities connect multiple exchanges across telephone networks. Wiring and cables connect subscribers to the exchange. There are three ways for a subscriber to connect to the telephone exchange: By using dedicated physical wire connections run in overhead or underground cables By radio (cellular, satellite or radiotelephone) By using VoIP Long distance in telecommunications refers to telephone calls made outside a certain area, usually characterized by an area code outside of a local call area. International Calls are made between different countries. The calls are processed by gateway exchanges (switches). The rates for these calls were expensive but are now cheaper due to advances in technology. Originally they were placed via operator. The calls were transmitted by cable, satellite, radio, and more recently, fiber optics and VOIP. IDD or ISD (International Direct Dialing) was introduced in the 1970's, so calls can be dialed without an operator. A central office is the physical building used to house inside plant equipment including telephone switches, which make phone calls "work" in the sense of making connections and relaying the speech information. In telephony, the local loop (also referred to as a subscriber line) is the physical link or circuit, that connects from the demarcation point of the customer premises to the edge of the carrier, or telecommunications service provider, network. Plain old telephone service, or POTS, is the standard telephone service that remains the basic form of residential and small business telephone service nearly everywhere in the world, and was the only basic telephone service known to most people until the introduction of mobile phones. 1
2 Asymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. It does this by utilizing frequencies that are normally not used by a voice telephone call, in particular, frequencies higher than normal human hearing. Home office connectivity can be achieved over POTS and ADSL and can include VPN and VoIP technologies. Mobile phones and the cellular phone system they operate under vary significantly from provider to provider, and nation to nation. However, all of them communicate through electromagnetic microwaves with a cell site base station, the antennas of which are usually mounted on a tower, pole, or building. The Public Switched Telephone Network (PSTN) in North America and the Postal, and the Telephone and Telegraph (PTT) services in much of the rest of the world, carry analog voice over copper wires. This basic telephone service is often called POTS. In some places, POTS means the Post Office Telephone Service or Post Office Telephone System. However, as legislation removed telephone services from the control of national post offices, the term became more widely known as meaning plain old telephone service. POTS remains the basic form of residential and small business telephone service nearly everywhere in the world. Until the introduction of mobile telephones, POTS was the only telephone service that most people knew. POTS has been available almost since the introduction of the telephone system in the late 19th century. Telephone service remained mostly unchanged to the average user since the middle of the 20th century, despite the introduction of electronic telephone exchanges into the PSTN and PTT. While POTS provides a relatively limited feature set, low bandwidth and no mobile capabilities, it does provide (in most geographic areas) much greater reliability than any of the more modern telephone systems (wireless, cellular, VoIP, etc). Listed here are some of the POTS services that are available. Recently, telcos began moving their digital networks closer to the customer premises. Generally, telcos offer digital transport services in one of two forms. Integrated Services Digital Network (ISDN) or T1/E1. ISDN provides a digital loop from the exchange (or central office) to the customer premises. ISDN provides digital transmission over ordinary telephone copper wire as well as over other media. Conceptually, ISDN integrates both analog or voice traffic with digital data over the same network. Home and business users receive data at rates up to twice the rate of a modem connection. There are two levels of ISDN service. Both rates include a number of B- channels and a D-channel. Each B-channel carries data, voice, and other services at a rate of 64 kbps. Each D-channel carries control and signaling information: Basic Rate Interface (BRI) is for home and small business use. BRI contains two B-channels and one D-channel. 2
3 Primary Rate Interface (PRI) is for larger users. PRI includes 23 B- channels in North America and Japan (30 in Europe) and one D- channel. Service providers usually transmit PRI service through a T1 line in North America and an E1 line in Europe. From a consumer point of view, and as a data connection service, DSL replaces ISDN. In North America and Japan, transmission 1 (T1) carrier technology provides trunk lines between exchanges. Europe 1 (E1), is used in Europe. T1 and E1 lines are dedicated telephone connections supporting high data rates. Companies often use T1 for Internet traffic. A Private Branch exchange (also called PBX, Private Business exchange or PABX for Private Automatic Branch exchange) is a telephone exchange that serves a particular business or office. Medium-sized and larger companies use a PBX because it is much less expensive than connecting an external telephone line to every telephone in the organization. In addition, it is easier to make internal calls within a PBX using only three or four digits. Many telephones can be attached to a PBX, but users can only share a certain number of outside lines for external calling. Usually to secure an outside line, the caller dials the digit 9 before the full outside telephone number. For companies that are not willing or able to invest in PBX technology, many telephone companies offer central office exchange service (Centrex). Centrex is a virtual PBX with all the switching occurring at the telephone office instead of at the company's premises. Typically, the telephone company owns and manages all the communications equipment that is needed to implement the PBX and then sells various services to the company. The Centrex customer is not restricted to using the features available to POTS (Plain Old Telephone Service) customers, but can choose from a wide variety of special services and features. In fact, telecommunications companies generally offer numerous types of Centrex service, including "Packaged Centrex", "Centrex Data", and "Customized Centrex".Enterprises increasingly rely on their ability to communicate directly with customers, suppliers, partners, branches, and teleworkers. Long-distance services represent a significant expense. When long-distance costs were relatively high, companies kept control over long-distance access. This graphic shows a historical example of how operator intervention was required for a caller inside the PBX to access long-distance service. Long-distance trunk lines connecting exchanges usually use TDM technologies and T1 or E1 transport. The most common long-distance service that is offered in North America is Wide Area Telephone Service (WATS). Other parts of the world have similar services. 3
4 WATS-type plans provide access to long-distance telephone lines for commercial use at reduced rates. WATS is outward (OUT-WATS), inward (IN-WATS), or both: With outward WATS, the calling party can make an unlimited number of long-distance calls (toll calls) for a fixed price within pre-determined time and distance constraints. Most telephone companies now market OUT- WATS as something called a flat-rate plan. Initially, operator assistance was necessary to control access to OUT-WATS from within a PBX. Following company policy, callers asked the company operator at their PBX to connect them to the tie-line, or the OUT-WATS line that tied into the long distance system. However, as long distance calling rates fell, operator intervention has almost disappeared. Callers making a call from inside a PBX usually only need to add a prefix to gain access to outside long-distance numbers. With IN-WATS, subscribers have a toll-free telephone number. IN-WATS service reduces the time that operators spend processing toll-collect calls for businesses. The IN-WATS area codes in North America are 800, 888, 877, and 866. More 800 numbers are reserved for the future (855, 844, 833 and 822). Telephone users within a designated area can call the IN-WATS telephone number of an organization without having to pay a toll charge. Many businesses have toll-free 800 numbers that can ring at multiple callcenters. Before advanced networking technologies allowed convergence, enterprises provisioned separate networks for voice, video, and data applications. In most cases, enterprises deployed voice, video, and data networks autonomously and operated them in isolation. Enterprises managed and implemented these networks with separate teams. The separate networks encompass the enterprise local and wide-area networks. In simple terms, voice traffic used PBXs and data used routers. PBXs connected to dedicated leased lines. Data used a combination of leased lines, Frame Relay, and ATM. The figure shows a typical deployment of these disparate networks. Video relied on special and very expensive leased line connections. It is widely accepted and acknowledged by the communications industry and industry analysts as a whole that IP will become the universal transport of the future. The rapid adoption and migration of vendors to the use of IP as a transport for data, voice, and video applications further endorses the transition to a converged networking paradigm. This graphic shows an enterprise network converging over common IP transport. Using IP as the form of transport offers the enterprise significant statistical gains in bandwidth efficiency, lower overall bandwidth requirements, ease of management, and the ability to deploy new applications rapidly. There are fewer WAN facilities and fewer devices required to terminate those facilities. Enterprises add bandwidth incrementally as required and statistically share bandwidth between applications, adding efficiency and reducing complexity. 4
5 The traditional model uses a three-layer hierarchical model. Initially, the model provided a modular framework that allowed flexibility and made implementation and troubleshooting easy. The hierarchical model divides networks or their modular blocks into the access, distribution, and core layers. Each layer has specific features: Access layer: The access layer grants user access to network devices. In a campus network, the access layer most often uses switched LAN devices with ports that provide connectivity to workstations and servers. The access layer of the corporate network topology is the site where WAN links associated with remote sites and teleworkers are aggregated. Distribution layer: The distribution layer aggregates the wiring closets by using switches to segment workgroups and isolate network problems in a campus environment. Similarly, the distribution layer aggregates WAN connections at the edge of the campus and provides policy-based connectivity. Core layer: The core layer, or backbone design, switches packets as fast as possible. Because the core layer is critical for connectivity, this layer must provide a high level of availability and adapt to changes very quickly. Cisco provides the enterprise-wide systems architecture that helps companies to protect, optimize, and grow the infrastructure that supports business processes. The architecture provides for integration of the entire network campus, data center, WAN, branches, and teleworkers offering staff secure access to tools, processes, and services. From an Information Technology staff point of view, the Cisco Enterprise Architecture facilitates planning, designing, implementing, operating, and troubleshooting (PDIOT) networks by focusing on network elements and on the relationships between those elements Cisco Enterprise Campus Architecture combines a core infrastructure of intelligent switching and routing with tightly integrated productivity-enhancing technologies, including IP communications, mobility, and advanced security. The campus architecture provides many features: High availability with a resilient multilayer design and redundant hardware and software features. Automatic procedures for reconfiguring network paths when failures occur. Multicast to provide optimized bandwidth consumption. Quality of service (QoS) that prevents oversubscription to ensure the network does not drop or delay real-time traffic, such as voice and video or critical data. Integrated security to protect against and mitigate the impact of worms, viruses, and other attacks on the network, even at the switch port level. Cisco enterprise-wide 5
6 architecture extends authentication support using standards such as 802.1x and Extensible Authentication Protocol (EAP). Cisco Enterprise Campus Architecture provides the flexibility to add IPsec and Multiprotocol Label Switching virtual private networks (MPLS VPNs), identity and access management, and VLANs to compartmentalize access. These features help improve performance and security and decrease cost. Cisco Enterprise Data Center Architecture is a cohesive and adaptive network architecture. The Cisco Enterprise Data Center supports business and IT requirements for consolidation, business continuity, and security. At the same time, this architecture enables emerging service-oriented architectures, virtualization, and on-demand computing. IT staff can easily provide departmental staff, suppliers, or customers with secure access to applications and resources. This structure simplifies and streamlines management, significantly reducing overhead. Redundant data centers provide backup using synchronous and asynchronous data and application replication. The network and devices offer server and application load balancing to maximize performance. This solution allows the enterprise to scale without major changes to the infrastructure. Cisco Enterprise Branch Architecture allows enterprises to extend head-office applications and services, such as security, Cisco IP Communications, and advanced application performance, to thousands of remote locations and users or to a small group of branches. Cisco integrates security, switching, network analysis, caching, and converged voice and video services into a series of integrated services routers in the branch. With this integration, enterprises can deploy new services when they are ready to do so without having to buy new equipment. This solution provides secure access to voice, mission-critical data, and video applications anywhere and anytime. Advanced network routing, VPNs, redundant WAN links, application content caching, and local IP telephony call processing provide a robust architecture with high levels of resilience for all the branch offices. An optimized network leverages the WAN and LAN to reduce traffic and save bandwidth and operational expenses. Enterprises can easily support branch offices with the ability to centrally configure, monitor, and manage devices that are located at remote sites, including tools, such as AutoQoS or the Security Device Manager (SDM) QoS wizard, that proactively resolve congestion and bandwidth issues before they affect network performance. Slide 19; This graphic shows a network structured on the Cisco hierarchical model design and using the Cisco Enterprise Architectures described above. Various architectures and sub-modules form an integrated converged network that supports business processes. In this example, the enterprise campus network comprises five submodules: Building access with access switches and end devices (PCs and IP phones) Building distribution with distribution multilayer switches Backbone 6
7 Edge distribution that concentrates all branches and teleworkers accessing the campus via WAN or the Internet Server farm that represents the data center Additional submodules represent remote access and VPN, Internet, and traditional WAN (Frame Relay, ATM, and leased lines with Point-to-Point Protocol [PPP]). Converged networks with integrated voice, video, and data contain a mix of traffic patterns and requirements. The diversity of the traffic mix imposes stringent performance and security requirements on the network. The requirements differ significantly, depending on the traffic type. For example, voice and video require constant bandwidth with low delay and jitter, while transactional traffic requires high reliability and security with relatively low bandwidth. In addition, voice applications, such as IP telephony, require high reliability and availability, because users expect the dial tone in the IP network to be the same as in a traditional telephone network. To meet the traffic requirements in the network, voice and video traffic must be treated differently from other traffic, such as web-based (HTTP) traffic. Quality of Service mechanisms are mandatory in converged networks. Security is a key issue in fixed networks but is even more important in wireless mobility, where access to the network is possible from virtually anywhere. Several security strategies, such as device hardening with strict access control and authentication, intrusion protection, intrusion detection, and traffic protection with encryption, can mitigate network security threats. Slide 21; This graphic shows a sample converged network with integrated secured services. The network deploys advanced technologies including IP communications (IP telephony and unified messaging), wireless mobility, and security. The clouds in the figure represent the Cisco Enterprise WAN Architecture. The links in this area can easily become blocked and affect the performance of IP telephony. One of the solutions to this issue, Cisco AutoQoS, is shown on the voice-enabled router in a simple branch consisting of one user. To increase IP telephony reliability and availability, Cisco Survivable Remote Site Telephony (SRST) has been deployed at one of the branches. There are many reasons to increase security, including, in this example, wireless mobility. Encryption and identity-based networking (including authentication and access control) and device hardening provide increased security in the sample network with integrated router security. The AutoSecure feature is used to provide simple and straightforward one touch device lockdown. The Cisco Intelligent Information Network (IIN) vision is a strategy that meets the evolving role of the network within businesses and directly meets the need to align IT resources with business priorities. The Cisco IIN vision has three key features: Integration of networked resources and information assets: Modern networks with integrated voice, video, and data allow IT departments to link the IT infrastructure more closely with the information network. 7
8 Intelligence across multiple products and infrastructure layers: The intelligence that is built into each network component extends networkwide and applies end-to-end. Active participation of the network in the delivery of services and applications: With added intelligence within network devices, the IIN makes it possible for the network to actively manage, monitor, and optimize service and application delivery across the entire enterprise environment. With these features, the IIN offers much more than basic connectivity, bandwidth for users, and access to applications. The IIN offers end-to-end functionality and a centralized, unified control that promotes true business transparency and agility. The Cisco Intelligent Information Network helps organizations meet new IT challenges including deploying service-oriented architectures, web services, and virtualization. Cisco SONA is an architectural framework that details the set of common services that are deployed in the network to close gaps between the resources and applications. Cisco SONA describes how to build an IIN. The Cisco SONA framework provides these advantages to enterprises: Outlines the path toward the IIN Illustrates how to build integrated systems across a fully converged IIN Improves flexibility and increases efficiency resulting in optimized applications, processes, and resources Cisco SONA uses the extensive product line, services, proven architectures, and experience of Cisco and its partners to help the enterprises achieve their business goals. The Cisco SONA framework shows how integrated systems allow a dynamic, flexible architecture and provide for operational efficiency through standardization and virtualization. The premise that the network is the common element that connects and enables all components of the IT infrastructure, is the basis of Cisco SONA. Cisco SONA outlines three layers of the IIN: networked infrastructure layer, interactive services layer, and application layer. The infrastructure layer interconnects all IT resources across a converged network foundation. IT resources include servers, storage, and clients. The networked infrastructure layer represents how these resources exist in different places in the network, including campus, branch, data center, WAN, metropolitan-area network (MAN), and teleworker locations. The infrastructure layer provides customers with connectivity anywhere and anytime. The interactive services layer delivers efficient allocation of resources to applications and business processes through the networked infrastructure. This layer includes these services: Voice and collaboration services Mobility services 8
9 Security and identity services Storage services Computer services Application networking services Network infrastructure virtualization Services management Adaptive management servicesthe application layer includes business applications and collaboration applications. The objective for customers in this layer is to meet business requirements and achieve efficiencies by leveraging the interactive services layer. 9
Chapter 1. Cisco SONA and the Cisco Enterprise Architecture
Chapter 1. Cisco SONA and the Cisco Enterprise Architecture After completing this chapter, you will be able to: Explain the Cisco Service-Oriented Network Architecture (SONA) framework Describe how the
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationLecture 1 Overview - Data Communications, Data Networks, and the Internet
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
More informationCommunications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
More informationWAN Technology & Design. Dr. Nawaporn Wisitpongphan
WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow
More informationMission Critical MPLS in Utilities
Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationTELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 Public Switched Telephone Network Structure The Local Loop Trunks and Multiplexing Switching 2 Network Structure Minimize
More informationChanging the Voice of
Changing the Voice of Telecommunications Level 3 Solutions for Voice Service Providers Competitive: It is a word you know well. As a voice services provider, you face a unique set of challenges that originate
More informationCSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.
Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:
More informationY O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:
W H I T E PA P E R C O N N E C T I V I T Y Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE: The importance of connectivity
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationCisco Cisco Sales Expert. Practice Test. Version
Cisco 646-204 646-204 Cisco Sales Expert Practice Test Version 2.2 QUESTION NO: 1 Cisco 646-204: Practice Exam QUESTION NO: 2 Which two characteristics of optical networks data to be transmitted over extremely
More informationChapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public
Chapter 1: Analyzing The Cisco Enterprise Campus Architecture CCNP SWITCH: Implementing IP Switching Course v6 1 Chapter 1 Objectives Describe common campus design options and how design choices affect
More informationLogical Network Design (Part II)
Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationStudy Guide. Module Three
Exam Three will draw questions four content areas: our textbook, our assignments, the Rackspace Web Hosting Tutorial, and our class lectures. The purpose of this guide is to help you focus your exam preparations.
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationSample. Overview of WAN Connections. Objectives. Module 1
Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this module, you should be able
More informationData and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet
Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,
More informationCompetitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7)
Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7) Definition Using conventional Internet access equipment, service providers may access
More informationCHAPTER. Introduction. Last revised on: February 13, 2008
CHAPTER 1 Last revised on: February 13, 2008 The Cisco Unified Communications System delivers fully integrated communications by enabling data, voice, and video to be transmitted over a single network
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationEEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks
EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain Lecture # (3) Introduction to Multimedia Communication networks Elements of Multimedia Systems Two key communication modes Person-to-person
More informationSystem Manual Part 2: TetraNode Architecture
System Manual Part 2: TetraNode Architecture System Manual i Copyright 2009, Rohill Technologies B.V. Issue 1.00, June 2009 Information in this manual is subject to change without notice and does not represent
More informationSD-WAN Transform Your Agency
Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is
More informationCh. 5 - ISDN - Integrated Services Digital Network
Ch. 5 - ISDN - Integrated Services Digital Network 1 Overview 2 Basic elements in ISDN 3 ISDN - access 4 ISDN - the bus 5 ISDN - examples 6 ISDN - between LAN s 7 ISDN - access to Internet 8 ISDN - small
More informationWide Area Networks (WANs) Slide Set 6
Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals
More informationLecture (05) Network interface Layer media & switching II
Lecture (05) Network interface Layer media & switching II By: ElShafee ١ Agenda Circuit switching technology (cont,..) Packet switching technique Telephone network ٢ Circuit switching technology (cont,..)
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationSubstation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities
Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationA typical WAN structure includes the following components.
CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationPassReview. PassReview - IT Certification Exams Pass Review
PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid
More informationSimplify IP Telephony with System i. IBM System i IP Telephony
Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate
More informationCisco Unified Survivable Remote Site Telephony Version 4.2
Survivable Remote Site Telephony Version 4.2 Communications solutions unify voice, video, data, and mobile applications on fixed and mobile networks, delivering a media-rich collaboration experience across
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationAn ADTRAN White Paper. Distributed Access Solutions for the Local Loop
An ADTRAN White Paper Distributed Access Solutions for the Local Loop Executive Summary ADTRAN s Total Access System is a distributed access solution that enables carriers to strategically plan and design
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationIntroducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN
Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity
More informationCisco Webex Cloud Connected Audio
White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected
More informationINTRODUCTION. BridgeWay. Headquarters
MILITARY PRODUCTS INTRODUCTION Voiceboard Corporation s MediaPro products provide enhanced communications capabilities for military applications. State of the art technology, including redundant networking,
More informationCCNP BCMSN Quick Reference Sheets
The Evolving Network Model VLAN Implementation Spanning Tree InterVLAN Routing CCNP BCMSN Quick Reference Sheets Exam 642-812 Layer 3 Redundancy Using Wireless LANs VoIP in a Campus Network Campus Network
More informationNETWORK ARCHITECTURE
GLOBAL MPLS NETWORK ARCHITECTURE The IP backbone is designed to service connectivity for IP and IP VPN services. The backbone network provides IP connectivity between Points of Presence (POPs). The design
More informationOur Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North
Our Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North America TELoIP Simplifies Public And Private Cloud Access
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More information5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C
WHITE PAR 5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C 1 WHITE PAR from Legacy Voice to VoIP and UC&C Voice communications are undergoing a profound shift, with many organizations
More informationData and Computer Communications
Data and Computer Communications CHAPTER 1 Tenth Edition by William Stallings Data Communications, Data Networks, and the Internet Data and Computer Communications, Tenth Edition by William Stallings,
More informationExam: Title : Routing & Switching Exam (RSS) Ver :
Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives
More informationUnderstanding PBX Fundamentals
Understanding Course Description This course provides a practical and in-depth foundation on Private Branch Exchange (PBX) or a Private Automatic Branch Exchange (PABX - which is out of fashion since all
More informationExam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.
Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationRingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices
White Paper UCaaS Connectivity Options in the New Age: Best Practices 1 Today s IT stacks are cloud-first, taking advantage of the many benefits of SaaS applications, while answering the increasing needs
More informationPublic Switched TelephoneNetwork (PSTN) By Iqtidar Ali
Public Switched TelephoneNetwork (PSTN) By Iqtidar Ali Public Switched Telephone Network (PSTN) The term PSTN describes the various equipment and interconnecting facilities that provide phone service to
More informationSCTE Event. Metro Network Alternatives 5/22/2013
SCTE Event Metro Network Alternatives 5/22/2013 A Review of Metro Network Alternatives Enterprise needs more bandwidth Enterprise options: T1 or fiber based offerings up to Metro-Ethernet Price-for- performance
More informationWITH RELIABLE, AFFORDABLE ENTERPRISE PRI
POWER YOUR PHONE SERVICE WITH RELIABLE, AFFORDABLE ENTERPRISE PRI Increase Users Without Compromising Quality, Stability, Security or Continuity If your medium or large-size company needs the most reliable
More informationUNIT II NETWORKING
UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection
More informationHybrid Cloud for Business Communications
Hybrid Cloud for Business Communications THE ESSENTIAL GUIDE So you re considering hybrid cloud for your business communications. You re not alone! In fact, more and more businesses are turning to cloud
More informationHuawei Emergency Command Network Solution Brochure-Detailed
Doc. Code Huawei Emergency Command Solution Brochure-Detailed Issue V1.0 Date 2012-09-21 Huawei Technologies Co., Ltd. Huawei Emergency Command Solution 1 Background Emergency command is used to control
More informationTransform your network and your customer experience. Introducing SD-WAN Concierge
Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith
More informationINTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com
INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed
More informationVoIP Dictionary, Glossary and Terminology
VoIP Dictionary, Glossary and Terminology The following provides a glossary of terms and definitions that are commonly used in VoIP Solutions. We hope this will provide a good reference for you during
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationUnified Communications from West
Unified Communications from West We Connect. We Deliver. Transforming the way your business works & improving its performance Delivering world-class service Uniting and deploying business technologies
More informationPersonal Handyphone Systems in Urban Infrastructure
Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service
More informationCisco Survivable Remote Site Telephony Version 4.2
Cisco Survivable Remote Site Telephony Version 4.2 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, delivering a media-rich collaboration
More information4.1.2 NETWORK-BASED IP VIRTUAL PRIVATE NETWORK SERVICES (NBIP-VPNS) (L , C.2.7.3, M.2.1.2)
Networx Enterprise for Internet Protocol (IP)-Based Services 4.1.2 NETWORK-BASED IP VIRTUAL PRIVATE NETWORK SERVICES (NBIP-VPNS) (L.34.1.4, C.2.7.3, M.2.1.2) Qwest achieved an industry first with our Network-Based
More informationAccessing the WAN Chapter 1 Modified by Tony Chen 07/20/2008
Introduction to WANs Accessing the WAN Chapter 1 Modified by Tony Chen 07/20/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my PowerPoint
More informationIntroduction to WAN Technologies
Introduction to WAN Technologies From DocWiki This article introduces the various protocols and technologies used in wide-area network (WAN) environments. Topics summarized here include point-to-point
More informationWhat is the fundamental purpose of a communication system? Discuss the communication model s elements.
What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building
More informationModule Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks
SG Exam Three will draw questions from multiple content areas including: our networking textbook, our wireless electronic textbook, our assignments and our class lectures. The purpose of this guide is
More informationNew Age of IP Telephony. Ukrit Wongsarawit Network Technology Manager
New Age of IP Telephony Ukrit Wongsarawit Network Technology Manager ukrit.w@g-able.com Agenda Conventional telephone and data networking Voice data convergence IP telephony PBX based IP telephony Implementing
More informationCommunication Networks
Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency
More informationCenturyLink has the ability to raise rates on ISDN-PRI Service on a Term Discount Plan. See Section 3.8.B. for applicable terms and conditions.
CenturyLink has the ability to raise rates on ISDN-PRI Service on a Term Discount Plan. See Section 3.8.B. for applicable terms and conditions. LOCAL TERMS OF SERVICE: CENTURYLINK INTEGRATED SERVICES DIGITAL
More informationInternet Telephony. Definition. Overview. Topics. 1. Introduction
Internet Telephony Definition Internet telephony refers to communications services voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the public switched
More informationINTRODUCTORY COMPUTER
INTRODUCTORY COMPUTER NETWORKS WHAT S A NETWORK? Faramarz Hendessi Introductory Computer Networks Lecture 2 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 What s a network? Merriam-Webster
More informationUnified Communications VoIP Routing/Switching Security 3G Wi-Fi. NetVanta Business Networking Solutions
Unified Communications VoIP Routing/Switching Security 3G Wi-Fi NetVanta Business Networking Solutions Opportunity to lower Total Cost of Ownership and improve Return on Investment The ADTRAN Advantage
More informationvoice-enabling.book Page 72 Friday, August 23, :19 AM
voice-enabling.book Page 72 Friday, August 23, 2002 11:19 AM voice-enabling.book Page 73 Friday, August 23, 2002 11:19 AM C H A P T E R 4 Offering Bundled and Data Services Chapter 2, VoIP Network Architectures:
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationIntroduction. H.323 Basics CHAPTER
CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics
More informationCreating a Dynamic Serial Edge For Integrated Industrial Networks
Creating a Dynamic Serial Edge For Integrated Industrial Networks Technical Brief GarrettCom, Inc. As industrial networks evolve, is becoming the standard technology for new system interfaces and for new
More information5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C
WHITE PAR 5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C 1 WHITE PAR from Legacy Voice to VoIP and UC&C Voice communications are undergoing a profound shift, with many organizations
More informationChoosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business
Choosing the Right Ethernet Solution How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Do Organizations Choose Ethernet? 4 CH. 2 What Type of Ethernet Solutions Will
More informationThe EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises
The / Product Suite Simplified Voice Networking for Distributed Enterprises Citel s mission is simple: To delight our customers and enrich our stakeholders by offering a world-class suite Citel s of products
More informationCisco Unified Survivable Remote Site Telephony Version 7.1
Survivable Remote Site Telephony Version 7.1 Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.
More informationAn XOP Networks White Paper
IP based Hoot and Holler Conference Bridge for the Transport Industry An XOP Networks White Paper i What s inside EXECUTIVE SUMMARY... 2 LEGACY HOOT-N-HOLLER NETWORKS... 3 IP BASED HOOT-N-HOLLER NETWORKS...
More informationCHAPTER -1. Introduction to Computer Networks
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
More informationNote on. Alternative of BRI Connection For MAX-NG subscriber
Note on Alternative of BRI Connection For MAX-NG subscriber Released On : 12 th March 2012 CENTRE FOR DEVELOPMENT OF TELEMATICS MANDI ROAD, MEHRAULI, NEW DELHI 110030, INDIA ELECTRONICS CITY (PHASE I),
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationNZQA unit standard version 2 Page 1 of 6. Demonstrate basic knowledge of telecommunications concepts
Page 1 of 6 Title Demonstrate basic knowledge of telecommunications concepts Level 2 Credits 10 Purpose This unit standard covers basic telecommunications principles and is intended for telecommunications
More informationTetraNode Scalability and Performance. White paper
White paper Issue 1.0, May 2017 Introduction Rohill solutions are known for performance, flexibility, scalability, security and affordability. Also, the strong TetraNode system architecture, open standards-based
More informationAlcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet
Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that
More informationEnterasys K-Series. Benefits. Product Overview. There is nothing more important than our customers. DATASHEET. Operational Efficiency.
DATASHEET Enterasys K-Series Product Overview The Enterasys K-Series is the most cost-effective, flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More information