M242 COMPUTER NETWORS AND SECURITY

Similar documents
Internet Architecture and Protocol

1: Review Of Semester Provide an overview of encapsulation.

IEEE 802 LANs SECTION C

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Local Area Network(LAN)

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

CCNA Exploration1 Chapter 7: OSI Data Link Layer

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

2. LAN Topologies Gilbert Ndjatou Page 1

Switched Multimegabit Data Service (SMDS)

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Data Communication and Network. Introducing Networks

Switched Multimegabit Data Service

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

ITEC 3800 Data Communication and Network. Introducing Networks

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Introduction to LAN Protocols

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Cisco Cisco Certified Network Associate (CCNA)

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

Raj Jain. The Ohio State University Columbus, OH

Computer Networks (Introduction to TCP/IP Protocols)

Ch. 4 - WAN, Wide Area Networks

More on LANS. LAN Wiring, Interface

Local Area Network Overview

ELC 537 Communication Networks

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

CHAPTER -1. Introduction to Computer Networks

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Special expressions, phrases, abbreviations and terms of Computer Networks

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Lecture 3 Protocol Stacks and Layering

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Data Link Layer, Part 5. Medium Access Control

Local Area Networks. Ethernet LAN

Netwoking Essentials

ET4254 Communications and Networking 1

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

COMPONENTS OF DATA COMMUNICATION

Contention Protocols and Networks

Communicating over the Network

Communication Networks - 3 general areas: data communications, networking, protocols

Chapter 2 Communicating Over the Network

Chapter 15 Local Area Network Overview

ก ก Information Technology II

Chapter 6: Network Communications and Protocols

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Module 11. OSI Model, Network Devices, and Network Standards

Bridging and Switching Basics

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Copyleft 2005, Binnur Kurt. Objectives

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks

CS-461 Internetworking. Dr. Mohamed Aboutabl

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Data Communication. Chapter # 1: Introduction. By: William Stalling

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Chapter 16 Networking

Contents. Introduction to Networking. Preface...i. Introduction... xix

Introduction to Open System Interconnection Reference Model

Outline: Connecting Many Computers

Need For Protocol Architecture

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Summary of MAC protocols

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

UNIT IV - COMPUTER NETWORK DEVICES AND OSI LAYERS

Lecture-4. TCP/IP-Overview:

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Cross Layer Protocol Design. Radio Communication III

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

Lecture (03) (I) OSI Reference Model

Need For Protocol Architecture

Introduction to LAN Protocols

INTRODUCTION TO ICT.

Revision of Previous Lectures

Data Link Layer, Part 3 Medium Access Control. Preface

Computer Networks and Internet

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Chapter -4 OSI Reference Model

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

CH : 15 LOCAL AREA NETWORK OVERVIEW

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

What is a Network? A connection of two or more computers so that they can share resources.

Chapter 1: Introduction

Transcription:

M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location to another. The hardware consists of the physical equipment that carries signals from one point of the network to another. The software consists of instruction sets that make possible the services that expect from a network. ---------------------------------------------------------------------------------------------------------------------------------------------- 2. Write short notes on Protocol and Standards Protocol A protocol is a set of rules that govern data communications. The key elements of a protocol are syntax, semantics, and timing. Syntax It is the structure or format of the data, meaning the order in which they are presented. Semantics The word semantics refers to the meaning of each section of bits. How are a particular pattern to be interpreted, and what action is to be taken based on that interpretation? Timing The term timing refers to two characteristics: when data should be sent and how fast they can be sent. Standards Standards provide guidelines to manufacturers, vendors, government agencies, and other service providers to ensure the kind of interconnectivity necessary in today's marketplace and in international communications. Data communication standards fall into two categories: De facto (meaning "by fact" or "by convention") and De jure (meaning "by law" or "by regulation"). De facto Standards that have not been approved by an organized body but have been adopted as standards through widespread use are de facto standards. De jure those standards that have been legislated by an officially recognized body are de jure standards. ------------------------------------------------------------------------------------------------------------------------------------------------ SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 1

3. Briefly explain the OSI model layer with neat diagram The International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) Reference Model to define functional communications standards. The OSI model describes the functions that are performed in data communications. OSI Model provides the following services 1. Provide peer to peer logical services with layer physical implementation 2. Provides standard for communication between system 3. Define point of interconnection for exchange information between systems 4. Each layer should perform well defined functions. The following figure shows to explain the model architecture of OSI layers with defining specific functions. Layer 1 Physical This layer transmits raw bits over a communication channel. The Physical layer defines the how a physical medium or cable is connected to the network. It defines the characteristics of the connectors, data transmission rates and distances, and the interface voltages. Devices: Hubs, Hardware, Ethernet, bus or Token ring Layer 2 Data Link This layer groups zeros and ones in to frames. A frame is a series of bits that forms a unit of data. The Data Link layer also defines the topology of the network (bus, star, dual ring, and so on). SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 2

Flow control at the Data Link layer is defined for transmitting and receiving frames sequentially and error control mechanism is used for detect and correct errors in the data communication. Layer 3 Network The Network layer defines routing services that allow multiple data links to be combined into an internetwork. The Network layer defines network-addressing schemes that logically identify network devices. The most common network addressing protocols are IP, IPX, and AppleTalk. Typical routing protocols that run at this level are RIP, OSPF, IGRP, and NLSP. Layer 4 Transport The Transport layer is responsible for reliable end to end data transfer. Hence optimum utilization of network resources. The transport layer performs the service of sending and receiving of data to session layer. It also provides flow control, sequence numbering and message acknowledgement.. The most common transport protocols are IP, IPX, Routing protocols, ARP. Layer 5 Session The session layer is responsible for creating, managing and termination sessions that are used by entities at the presentation layer. The session layer is responsible for coordinating the service requests and responses generated and received by a station when it is communication with other entities on the internetwork. Layer 6 Presentation The Presentation layer is responsible for encoding and decoding data that is passed from the application layer to another station on the internetwork. This layer is responsible for encoding data in a format that the receiving station can interpret and for decoding data received from other stations. Data compression and encryption are accomplished at this layer. Typical coding schemes include ASCII, EBCDIC, MPEG, GIF, and JPEG. Layer 7 Application The Application layer provides the interface to the user. Any user application that requires network communication accesses the communication resources through this layer. This layer also is responsible for finding and determining the availability of communication partners. Typical protocol used in the TCP/IP protocols is Simple Mail Transfer Protocol (SMTP), Telnet, and File Transfer Protocol (FTP). SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 3

2.2. 802.X Protocols: 4. Explain 802.x Protocols 802 is the standard for LAN network formulated by IEEE. It deals with local area networks and metropolitan area networks. In IEEE 802 divides the Data link layer into two sub layers logical link control and media access control. The following standards are used for 802 protocols 802.3-CSMA/CD-bus (Ethernet) 802.4-Token bus 802.5-Token Ring 802.11- Wireless LAN These MAC Protocols are concerned with the transportation of packets from one node to another on a single network segment. --------------------------------------------------------------------------------------------------------------------------------------- 5. Explain the Concepts and PDU format of CSMA/CD (802.3) CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION (CSMA/CD) Ethernet uses carrier sense multiple access with collision detection (CSMA/CD) as the method of medium access, and has been standardized by the IEEE. The frame format can be seen below. The basic idea behind CSMA/CD is that a station needs to be able to receive while transmitting to detect a collision. When there is no collision, the station receives one signal: its own signal. When there is a collision, the station receives two signals: its own signal and the signal transmitted by a second station. FRAME FORMAT The Ethernet frame contains seven fields: preamble, SFD, DA, SA, length or type of protocol data unit (PDU), upper-layer data, and the CRC. Ethernet does not provide any mechanism for acknowledging received frames, The format of the MAC frame is shown in Figure Preamble. The first field of the 802.3 frame contains 7 bytes (56 bits) of alternating Os and is that alerts the receiving system to the coming frame and SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 4

enables it to synchronize its input timing. The preamble is actually added at the physical layer and is not (formally) part of the frame. Start frame delimiter (SFD). The second field signals the beginning of the frame. Destinations address (DA). The DA field is 6 bytes and contains the physical address of the destination station or stations to receive the packet. Sources address (SA). The SA field is also 6 bytes and contains the physical address of the sender of the packet. Length or type. This field is defined as a type field or length field. The IEEE standard used it as the length field to define the number of bytes in the data field. Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of 46 and a maximum of 1500 bytes. Frame check sequence (FCS) - Is filed by the source station with a calculated cyclic redundancy check for error detection such as find whether the frames are lost or damaged. -------------------------------------------------------------------------------------------------------------------------------------- 6. Explain the concept of Token bus (802.4) A token bus network is much like a token-ring network except that the ends of the network do not meet to form the ring. Instead, the network is still terminated at both ends. A token is still required before a node can use the network. Like in a token-ring, it needs to include the address of the destination along with the data it needs to send. Although in the token bus, it implements a virtual ring on the coaxial cable. Token bus was standardized by IEEE standard 802.4. It is mainly used for industrial applications. Token bus was used by Motors for their Manufacturing Automation Protocol (MAP) standardization effort. ---------------------------------------------------------------------------------------------------------------------------------------- SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 5

7. Explain the concept of Token Ring (802.5) A token ring network is a local area network (LAN) topology where nodes/stations are arranged in a ring topology. Data passes sequentially between nodes on the network until it returns to the source station. To prevent congestion and collision, a token ring topology uses a token to ensure that only one node/station on the line is used at a time. The token ring LAN process is processed by the following sequence of events: A token continually circulates inside the token ring LAN To transmit a message, a node inserts a message and destination address inside an empty token. The token is examined by each successive node. The destination node copies the message data and returns the token to the source with the source address and a data receipt message. The source receives the returned token, verifies copied and received data and empties the token. The empty token now changes to circulation mode, and the process continues. ----------------------------------------------------------------------------------------------------------------------------------- 8. Explain Ethernet and its types Ethernet Ethernet is the most popular physical layer LAN technology in use today. It defines the number of conductors that are required for a connection, and provides the framework for data transmission. A standard Ethernet network can transmit data at a rate up to 10 Megabits per second (10 Mbps). SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 6

Types of Ethernet 10BASE5: THICK ETHERNET The first implementation is called 10Base5, thick Ethernet, or Thicknet. 10BaseS was the first Ethernet specification to use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable. The maximum length of the coaxial cable must not exceed 500 m. The second implementation is called 10Base2, thin Ethernet, or Cheapernet. 10Base2 also uses a bus topology, but the cable is much thinner and more flexible. 10BASE-T: TWISTED-PAIR ETHERNET The third implementation is called 10Base-T or twisted-pair Ethernet. 1OBase-T uses a physical star topology. The stations are connected to a hub via two pairs of twisted cable. Note that two pairs of twisted cable create two paths (one for sending and one for receiving) between the station and the hub. 10BASE-F: FIBER ETHERNET The most common fiber Ethernet is called 10Base-F. 10Base-F uses a star topology to connect stations to a hub. The stations are connected to the hub using two fiber-optic cables. FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel (or Fibre Channel, as it is sometimes spelled). IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backwardcompatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. The goals of Fast Ethernet can be summarized as follows: 1. Upgrade the data rate to 100 Mbps. 2. Make it compatible with Standard Ethernet. 3. Keep the same 48-bit address. 4. Keep the same frame format. 5. Keep the same minimum and maximum frame lengths. GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the Standard 802.3. The goals of the Gigabit Ethernet design can be summarized as follows: 1. Upgrade the data rate to 1 Gbps. 2. Make it compatible with Standard or Fast Ethernet. 3. Use the same 48-bit address. 4. Use the same frame format. SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 7

5. Keep the same minimum and maximum frame lengths. 6. To support auto negotiation as defined in Fast Ethernet. TEN-GIGABIT ETHERNET The IEEE committee created Ten-Gigabit Ethernet and called it Standard 802.3. 63 The goals of the Ten-Gigabit Ethernet design can be summarized as follows: 1. Upgrade the data rate to 10 Gbps. 2. Make it compatible with Standard, Fast, and Gigabit Ethernet. 3. Use the same 48-bit address. 4. Use the same frame format. 5. Keep the same minimum and maximum frame lengths. 6. Allow the interconnection of existing LANs into a metropolitan area network (MAN) or a wide area network (WAN). 7. Make Ethernet compatible with technologies such as Frame Relay and ATM. ----------------------------------------------------------------------------------------------------------------------------------- 9. Explain the comparison between 802.3, 802.4 AND 802.5 Standard specification 802.3 802.4 802.5 Structure Size of the frame Size of the frame Variable size format is 1572 bytes format is 8202 bytes Data field Size of the field is 0 to Size of the data field is No limit 1500 bytes 0 to 8182 bytes Priority No priorities Supports priorities Priorities possible Frame Requirement Minimum frame short It can handle short it support frames required is 64 bytes minimum frames Efficiency and Efficiency decrease It can handle short It supports frames. throughput and collision affects the throughput minimum frames Modem Modems are not required Modems are required Modems are required Protocol Protocol is simple complex Protocol is extremely complex ------------------------------------------------------------------------------------------------------ 2.3. FDDI 10. Explain Fiber Distributed Data Interface (FDDI) in detail Protocol is moderately complex Fiber Distributed Data Interface The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is frequently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper. SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 8

FDDI Specifications FDDI specifies the physical and media-access portions of the OSI reference model. FDDI is not actually a single specification, but it is a collection of four separate specifications, each with a specific function. FDDI's four specifications are the Media Access Control (MAC), Physical Layer Protocol (PHY), Physical-Medium Dependent (PMD), and Station Management (SMT) specifications The MAC specification defines how the medium is accessed, including frame format, token handling, addressing, algorithms for calculating cyclic redundancy check (CRC) value, and error-recovery mechanisms. The PHY specification defines data encoding/decoding procedures, clocking requirements, and framing, among other functions. The PMD specification defines the characteristics of the transmission medium, including fiber-optic links, power levels, bit-error rates, optical components, and connectors. The SMT specification defines FDDI station configuration, ring configuration, and ring control features, including station insertion and removal, initialization, fault isolation and recovery, scheduling, and statistics collection. FDDI Frame Format SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 9

FDDI Frame Fields The following descriptions summarize the FDDI data frame and token fields illustrated in the above figure. Preamble - Gives a unique sequence that prepares each station for an upcoming frame. Starts delimiter - Indicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame. Frame control - Indicates the size of the address fields and whether the frame contains asynchronous or synchronous data, among other control information. Destination address - Contains a unicast (singular), multicast (group), or broadcast (every station) address. As with Ethernet and Token Ring addresses, FDDI destination addresses are 6 bytes long. Source address - Identifies the single station that sent the frame. As with Ethernet and Token Ring addresses, FDDI source addresses are 6 bytes long. Data - Contains either information destined for an upper-layer protocol or control information. Frame check sequence (FCS) - Is filed by the source station with a calculated cyclic redundancy check value dependent on frame contents (as with Token Ring and Ethernet). The destination address recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded. End delimiter - Contains unique symbols; cannot be data symbols that indicate the end of the frame. FRAME STATUS Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station. ADVANTAGES OF FDDI Token passing topology High speed fiber optic transmission Fiber optic cabling is more secure than copper wire It can send data for larger distances than Token Ring or Ethernet FDDI has a dual ring that is fault-tolerant. The benefit here is that if a station on the ring fails or if the cable becomes damaged, the dual ring is automatically doubled back onto itself into a single ring. DISADVANTAGES OF FDDI High Cost Distance limitations improve over other LANs, too limiting for WANs Difficult for multiple ring failures. As the network grows, this possibility grows larger and larger. The uses of fiber optic cables are expensive. ------------------------------------------------------------------------------------------------------------------------------------ SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 10

2.4 Switching 11. Explain the concept of switching and its types Switching A switched network consists of a series of interlinked nodes, called switches. Switches are devices capable of creating temporary connections between two or more devices linked to the switch. In a switched network, some of these nodes are connected to the end systems (computers or telephones, for example). Others are used only for routing. Traditionally, three methods of switching have been important: Circuit switching Packet switching Message switching Circuit switching A circuit-switched network consists of a set of switches connected by physical links. A connection between two stations is a dedicated path made of one or more links. However, each connection uses only one dedicated channel on each link. The end systems, such as computers or telephones, are directly connected to a switch. We have shown only two end systems for simplicity. When end system A needs to communicate with end system M, system A needs to request a connection to M that must be accepted by all switches as well as by M itself. This is called the setup phase; A circuit (channel) is reserved on each link, and the combination of circuits or channels defines the dedicated path. After the dedicated path made of connected circuits (channels) is established, data transfer can take place. After all data have been transferred, the circuits are tom down. Packet switching In data communications, we need to send messages from one end system to another. SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 11

If the message is going to pass through a packet-switched network, it needs to be divided into packets of fixed or variable size. The size of the packet is determined by the network and the governing protocol. In packet switching, there is no resource allocation for a packet. This means that there is no reserved bandwidth on the links In this example, all four packets (or datagram) belong to the same message, but may travel different paths to reach their destination. This is so because the links may be involved in carrying packets from other sources and do not have the necessary bandwidth available to carry all the packets Message switching Each message is treated as a separate entity. Each message contains addressing information, and at each switch this information is read and the transfer path to the next switch is decided. Depending on network conditions, a conversation of several messages may not be transferred over the same path. Each message is stored (usually on hard drive due to RAM limitations) before being transmitted to the next switch. Because of this it is also known as a 'store-and-forward' network. Email is a common application for message switching. ----------------------------------------------------------------------------------------------------------------------------------------------------- SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 12

2.5 INTEGRATED SERVICES DIGITAL NETWORK (ISDN) 12. Explain the concept of ISDN in detail ISDN Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. The key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. The ISDN standards define several kinds of access interfaces, such as Basic Rate Interface (BRI), Primary Rate Interface (PRI), Narrowband ISDN (N-ISDN), and Broadband ISDN (B-ISDN). ISDN INTERFACES BASIC RATE INTERFACE The entry level interface to ISDN is the Basic Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard telephone copper wires. The 144 kbit/s payload rate is broken down into two 64 kbit/s bearer channels ('B' channels) and one 16 kbit/s signaling channel ('D' channel or data channel). PRIMARY RATE INTERFACE The other ISDN access available is the Primary Rate Interface (PRI), which is carried over an E1 (2048 kbit/s) in most parts of the world. An E1 is 30 'B' channels of 64 kbit/s, one 'D' channel of 64 kbit/s and a timing and alarm channel of 64 kbit/s. Narrowband ISDN N-ISDN (Narrowband Integrated Switch digital Network) was an attempt to replace the analog telephone system with a digital one. It generally uses 64 kbit/s channel as the basic unit of switching. It has a circuit switching orientation. It describes telecommunication that carries voice information in a narrow band of frequencies. Broad band ISDN BISDN is both a concept and a set of services and developing standards for integrating digital transmission services in a broadband network of fiber optic and radio media. It is the next-generation of ISDN technology, with promised bandwidths from 150 megabits per second upward, sufficient to carry video-phone calls and movies. BISON will be carried over FIBRE-OPTIC cabling rather than wire. PROTOCOL STRUCTURE OF B-ISDN SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 13

Broadband ISDN protocol reference model is based on the ATM reference model. ATM adaption layer is responsible for mapping the service offered by ATM to the service expected by higher layers. ATM layer is independent of the physical medium over which transmission is to take place. Physical layer consists of two sub layers Transport convergence and physical medium. The control plane is responsible for the supervision of connections including call set up, call release and maintenance. The User plane provides for the Transfer of user information. It also includes mechanisms to perform error recovery and flow control. --------------------------------------------------------------------------------------------------------------------------------------------------- SPC/COMP/IV SEM: M242 Computer Networks & Security Unit II Page 14