Unit-5 ComptNet
Unit-5 ComptNet
Unit-5 ComptNet
Its aim is to maintain the high speed of the data being transferred.
If we ask that how we going to achieve such a thing i.e., both telephone and
internet facility, then the answer is by using splitters or DSL filters(shown in the
below diagram). Basically, the splitter is used to splits the frequency and make
sure that they can’t get interrupted.
Types of DSL –
DSL is used for maintaining or controlling the transferring speed of the internet.
With the help of DSL filters or splitters we will be able to get the telephone
service and internet service and splitters split the persistence and regularity
therefore, it will not be able to disturbed.
DSL technology is related to the family that comes in the xDSL in which x
belongs to Asymmetric digital subscriber line (ADSL) etc.
It provides better bandwidth of telephone lines as compared to the standard
bandwidth. This phenomenon is known as broadband services.
Differences: The difference between digital subscriber line (DSL) and digital subscriber line
access multiplexer (DSLAM) −
The DSL is the network that is the digital subscriber line while the DSLAM is
the digital subscriber line access multiplexer that is derived from the DSL
network.
The DSL subscriber line network is used by the single user while the digital
subscriber line access multiplexer allows connecting multiple digital subscriber
lines that helps to use the networks using the multiplexing.
The topology used for the cable modem for the data transfer is the star topology
that is used for the scale model for the data transfer system.
Network Cabling: Cable is the medium through which information usually moves from
one network device to another. There are several types of cable which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks will use a
variety of cable types. The type of cable chosen for a network is related to the network's
topology, protocol, and size. Understanding the characteristics of different types of cable and
how they relate to other aspects of a network is necessary for the development of a successful
network.
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair
(UTP) is the most popular and is generally the best option for school networks
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate and the greater the cost per
foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association)
has established standards of UTP and rated six categories of wire (additional categories are
emerging).
Unshielded Twisted Pair Connector: The standard connector for unshielded twisted pair
cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style
connector. A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack,
implying that the connector follows a standard borrowed from the telephone industry. This
standard designates which wire goes with each pin inside the connector.
Shielded Twisted Pair (STP) Cable: Although UTP cable is the least expensive cable, it may
be susceptible to radio and electrical frequency interference (it should not be too close to
electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of
potential interference, or if you must place cable in extremely sensitive environments that may
be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution.
Shielded cables can also help to extend the maximum distance of the cables.
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to
block any outside interference from fluorescent lights, motors, and other computers.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin
coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment
length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin
coaxial cable has been popular in school networks, especially linear bus networks.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick
coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500
meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away
from the center conductor. This makes thick coaxial a great choice when running longer lengths
in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is
difficult to install.
The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman
(BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors,
including a T-connector, barrel connector, and terminator. Connectors on the cable are the
weakest points in any network. To help avoid problems with your network, always use the
BNC connectors that crimp, rather screw, onto the cable.
Fiber optic cabling consists of a center glass core surrounded by several layers of protective
materials. It transmits light rather than electronic signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of
electrical interference. It has also made it the standard for connecting networks between
buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and
twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing
and interactive services. The cost of fiber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber
optic cable carrying Ethernet signals.
The center core of fiber cables is made from glass or plastic fibers (see fig 5). A plastic coating
then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent
breakage. The outer insulating jacket made of teflon or PVC.
There are two common types of fiber cables -- single mode and multimode. Multimode cable
has a larger diameter; however, both cables provide high bandwidth at high speeds. Single
mode can provide more distance, but it is more expensive.
Always use more cable than you need. Leave plenty of slack.
Test every part of a network as you install it. Even if it is brand new, it may have
problems that will be difficult to isolate later.
Stay at least 3 feet away from fluorescent light boxes and other sources of electrical
interference.
If it is necessary to run cable across the floor, cover the cable with cable protectors.
Label both ends of each cable.
Use cable ties (not tape) to keep cables in the same location together.
Wireless LANs
More and more networks are operating without cables, in the wireless mode. Wireless LANs
use high frequency radio signals, infrared light beams, or lasers to communicate between the
workstations, servers, or hubs. Each workstation and file server on a wireless network has some
sort of transceiver/antenna to send and receive the data. Information is relayed between
transceivers as if they were physically connected. For longer distance, wireless
communications can also take place through cellular telephone technology, microwave
transmission, or by satellite.
Wireless networks are great for allowing laptop computers, portable devices, or remote
computers to connect to the LAN. Wireless networks are also beneficial in older buildings
where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools are line-of-sight and
scattered broadcast. Line-of-sight communication means that there must be an unblocked direct
line between the workstation and the transceiver. If a person walks within the line-of-sight
while there is a transmission, the information would need to be sent again. This kind of
obstruction can slow down the wireless network. Scattered infrared communication is a
broadcast of infrared transmissions sent out in multiple directions that bounces off walls and
ceilings until it eventually hits the receiver. Networking communications with laser are
virtually the same as line-of-sight infrared networks.
The Wi-Fi Alliance is a global, non-profit organization that helps to ensure standards and
interoperability for wireless networks, and wireless networks are often referred to as WiFi
(Wireless Fidelity). The original Wi-Fi standard (IEEE 802.11) was adopted in 1997. Since
then many variations have emerged (and will continue to emerge). Wi-Fi networks use the
Ethernet protocol.
Standard Max Speed Typical Range
Wireless Security
Wireless networks are much more susceptible to unauthorized use than cabled networks.
Wireless network devices use radio waves to communicate with each other. The greatest
vulnerability to the network is that rogue machines can "eves-drop" on the radio wave
communications. Unencrypted information transmitted can be monitored by a third-party,
which, with the right tools (free to download), could quickly gain access to your entire network,
steal valuable passwords to local servers and online services, alter or destroy data, and/or access
personal and confidential information stored in your network servers. To minimize the
possibility of this, all modern access points and devices have configuration options to encrypt
transmissions. These encryption methodologies are still evolving, as are the tools used by
malicious hackers, so always use the strongest encryption available in your access point and
connecting devices.
Three basic techniques are used to protect networks from unauthorized wireless use. Use any
and all of these techniques when setting up your wireless access points:
Encryption.
Enable the strongest encryption supported by the devices you will be connecting to the
network. Use strong passwords (strong passwords are generally defined as passwords
containing symbols, numbers, and mixed case letters, at least 14 characters long).
Isolation.
Use a wireless router that places all wireless connections on a subnet independent of
the primary private network. This protects your private network data from pass-through
internet traffic.
Hidden SSID.
Every access point has a Service Set IDentifier (SSID) that by default is broadcast to
client devices so that the access point can be found. By disabling this feature, standard
client connection software won't be able to "see" the access point. However, the eves-
dropping programs discussed previously can easily find these access points, so this
alone does little more than keep the access point name out of sight for casual wireless
users.
Advantages of wireless networks:
Mobility - With a laptop computer or mobile device, access can be available throughout
a school, at the mall, on an airplane, etc. More and more businesses are also offering
free WiFi access ("Hot spots").
Fast setup - If your computer has a wireless adapter, locating a wireless network can be
as simple as clicking "Connect to a Network" -- in some cases, you will connect
automatically to networks within range.
Cost - Setting up a wireless network can be much more cost effective than buying and
installing cables.
Expandability - Adding new computers to a wireless network is as easy as turning the
computer on (as long as you do not exceed the maximum number of devices).
Security - Be careful. Be vigilant. Protect your sensitive data with backups, isolated
private networks, strong encryption and passwords, and monitor network access traffic
to and from your wireless network.
Interference - Because wireless networks use radio signals and similar techniques for
transmission, they are susceptible to interference from lights and electronic devices.
Inconsistent connections - How many times have you hears "Wait a minute, I just lost
my connection?" Because of the interference caused by electrical devices and/or items
blocking the path of transmission, wireless connections are not nearly as stable as those
through a dedicated cable.
Speed - The transmission speed of wireless networks is improving; however, faster
options (such as gigabit Ethernet) are available via cables. If you are only using wireless
for internet access, the actual internet connection for your home or school is generally
slower than the wireless network devices, so that connection is the bottleneck. If you
are also moving large amounts of data around a private network, a cabled connection
will enable that work to proceed much faster.
Types:
Advantages:
1. High speed
2. Scalable
3. Reduced network congestion
4. Cost-efficient
5. Secured connection
Disadvantages:
VPN : VPN stands for "Virtual Private Network" and describes the opportunity to establish
a protected network connection when using public networks. VPNs encrypt your internet traffic
and disguise your online identity. This makes it more difficult for third parties to track your
activities online and steal data. The encryption takes place in real time.
How does a VPN work?
A VPN hides your IP address by letting the network redirect it through a specially configured
remote server run by a VPN host. This means that if you surf online with a VPN, the VPN
server becomes the source of your data. This means your Internet Service Provider (ISP) and
other third parties cannot see which websites you visit or what data you send and receive online.
A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get
their hands on your data, it would be useless.
Benefits of a VPN connection: A VPN connection disguises your data traffic online and
protects it from external access. Unencrypted data can be viewed by anyone who has network
access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data.
Secure encryption: To read the data, you need an encryption key . Without one, it would
take millions of years for a computer to decipher the code in the event of a brute force attack .
With the help of a VPN, your online activities are hidden even on public networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the
internet. Because the demographic location data comes from a server in another country, your
actual location cannot be determined. In addition, most VPN services do not store logs of your
activities. Some providers, on the other hand, record your behavior, but do not pass this
information on to third parties. This means that any potential record of your user behavior
remains permanently hidden.
Access to regional content: Regional web content is not always accessible from
everywhere. Services and websites often contain content that can only be accessed from certain
parts of the world. Standard connections use local servers in the country to determine your
location. This means that you cannot access content at home while traveling, and you cannot
access international content from home. With VPN location spoofing , you can switch to a
server to another country and effectively “change” your location.
Secure data transfer: If you work remotely, you may need to access important files on
your company’s network. For security reasons, this kind of information requires a secure
connection. To gain access to the network, a VPN connection is often required. VPN services
connect to private servers and use encryption methods to reduce the risk of data leakage.
Your ISP may seem trustworthy, but it may share your browsing history with advertisers, the
police or government, and/or other third parties. ISPs can also fall victim to attacks by cyber
criminals: If they are hacked, your personal and private data can be compromised.
This is especially important if you regularly connect to public Wi-Fi networks. You never know
who might be monitoring your internet traffic and what they might steal from you, including
passwords, personal data, payment information, or even your entire identity.
What should a good VPN do?
You should rely on your VPN to perform one or more tasks. The VPN itself should also be
protected against compromise. These are the features you should expect from a comprehensive
VPN solution:
Encryption of your IP address: The primary job of a VPN is to hide your IP address
from your ISP and other third parties. This allows you to send and receive information
online without the risk of anyone but you and the VPN provider seeing it.
Encryption of protocols: A VPN should also prevent you from leaving traces, for
example, in the form of your internet history, search history and cookies. The
encryption of cookies is especially important because it prevents third parties from
gaining access to confidential information such as personal data, financial information
and other content on websites.
Kill switch: If your VPN connection is suddenly interrupted, your secure connection
will also be interrupted. A good VPN can detect this sudden downtime and terminate
preselected programs, reducing the likelihood that data is compromised.
Two-factor authentication: By using a variety of authentication methods, a strong
VPN checks everyone who tries to log in. For example, you might be prompted to enter
a password, after which a code is sent to your mobile device. This makes it difficult for
uninvited third parties to access your secure connection.
History of VPNs
Since humans have been using the internet, there has been a movement to protect and encrypt
internet browser data. The US Department of Defense already got involved in projects working
on the encryption of internet communication data back in the 1960s.
In the following year, Wei Xu developed the IPSec network, an internet security protocol that
authenticates and encrypts information packets shared online. In 1996, a Microsoft employee
named Gurdeep Singh-Pall created a Peer-to-Peer Tunneling Protocol (PPTP).
Early VPNs
Contiguous to Singh-Pall developing PPTP, the internet was growing in popularity and the
need for consumer-ready, sophisticated security systems emerged. At that time, anti-virus
programs were already effective in preventing malware and spyware from infecting a computer
system. However, people and companies also started demanding encryption software that could
hide their browsing history on the internet.
The first VPNs therefore started in the early 2000s, but were almost exclusively used by
companies. However, after a flood of security breaches, especially in the early 2010s, the
consumer market for VPNs started to pick up.
One of the biggest drivers for VPN adoption in recent years has been the increasing demand
for content with geographical access restrictions. For example, video streaming services such
as Netflix or YouTube make certain videos available only in certain countries. With
contemporary VPNs, you can encrypt your IP address so that you appear to be surfing from
another country, enabling you to access this content from anywhere.
1. Once you are online, start your VPN. The VPN acts as a secure tunnel between you and
the internet. Your ISP and other third parties cannot detect this tunnel.
2. Your device is now on the local network of the VPN, and your IP address can be
changed to an IP address provided by the VPN server.
3. You can now surf the internet at will, as the VPN protects all your personal data.
1. SSL VPN
Often not all employees of a company have access to a company laptop they can use to work
from home. During the corona crisis in Spring 2020, many companies faced the problem of not
having enough equipment for their employees. In such cases, use of a private device (PC,
laptop, tablet, mobile phone) is often resorted to. In this case, companies fall back on an SSL-
VPN solution, which is usually implemented via a corresponding hardware box.
The prerequisite is usually an HTML-5-capable browser, which is used to call up the company's
login page. HTML-5 capable browsers are available for virtually any operating system. Access
is guarded with a username and password.
2. Site-to-site VPN
A site-to-site VPN is essentially a private network designed to hide private intranets and allow
users of these secure networks to access each other's resources.
A site-to-site VPN is useful if you have multiple locations in your company, each with its own
local area network (LAN) connected to the WAN (Wide Area Network). Site-to-site VPNs are
also useful if you have two separate intranets between which you want to send files without
users from one intranet explicitly accessing the other.
Site-to-site VPNs are mainly used in large companies. They are complex to implement and do
not offer the same flexibility as SSL VPNs. However, they are the most effective way to ensure
communication within and between large departments.
3. Client-to-Server VPN
Connecting via a VPN client can be imagined as if you were connecting your home PC to the
company with an extension cable. Employees can dial into the company network from their
home office via the secure connection and act as if they were sitting in the office. However, a
VPN client must first be installed and configured on the computer.
This involves the user not being connected to the internet via his own ISP, but establishing a
direct connection through his/her VPN provider. This essentially shortens the tunnel phase of
the VPN journey. Instead of using the VPN to create an encryption tunnel to disguise the
existing internet connection, the VPN can automatically encrypt the data before it is made
available to the user.
This is an increasingly common form of VPN, which is particularly useful for providers of
insecure public WLAN. It prevents third parties from accessing and compromising the network
connection and encrypts data all the way to the provider. It also prevents ISPs from accessing
data that, for whatever reason, remains unencrypted and bypasses any restrictions on the user's
internet access (for instance, if the government of that country restricts internet access).
The advantage of this type of VPN access is greater efficiency and universal access to company
resources. Provided an appropriate telephone system is available, the employee can, for
example, connect to the system with a headset and act as if he/she were at their company
workplace. For example, customers of the company cannot even tell whether the employee is
at work in the company or in their home office.
ATM: An ATM, which stands for automated teller machine, is a specialized computer that
makes it convenient to manage a bank account holder’s funds. It allows a person to check
account balances, withdraw or deposit money, print a statement of account activities or
transactions, and even purchase stamps.
An automated teller machine (ATM) is an electronic banking outlet that allows customers to
complete basic transactions without the aid of a branch representative or teller. Anyone with
a credit card or debit card can access cash at most ATMs, either in the USA or abroad.
ATMs are convenient, allowing consumers to perform quick self-service transactions such as
deposits, cash withdrawals, bill payments, and transfers between accounts. Fees are commonly
charged for cash withdrawals by the bank where the account is located, by the operator of the
ATM, or by both. Some or all of these fees can be avoided by using an ATM operated directly
by the bank that holds the account. Using an ATM abroad can cost more than using one in the
USA.
ATMs are known in different parts of the world as automated bank machines (ABMs) or cash
machines.
ATM examples: An account holder can use an ATM to carry out a number of transactions.
Withdrawals are the most common transaction among ATM cardholders. This allows them to
withdraw cash from their accounts. For a withdrawal, account holders just have to key in the
amount they wish to take out.
ATM deposits also are becoming popular. Account holders can deposit money and checks if
their bank allows it.
Balance inquiries allow account holders to view their current account balance. This feature
may be helpful if account holders need to know the amount of money they can spend with
their debit card or credit card.
Transfers and payments are also available depending on the bank. This allows account holders
to move money from one account to another, without withdrawing cash.
Account holders using an ATM not affiliated with their bank will most likely have to pay a fee.
ATMs always disclose these fees on their screens, and they give users an option to cancel the
transaction if they do not want to pay the fee.
In the U.S., the average fee for a single ATM withdrawal is about $4.52. This fee usually varies
from state to state. Atlanta usually has the highest average fees at about $5.15, while Seattle
has the lowest average ATM fees at $4.21.
Users should be aware of the threats that target these machines. For safety reasons, users should
transact at ATMs located in well-lit public places.
Types of ATMs
There are two primary types of ATMs. Basic units only allow customers to withdraw cash and
receive updated account balances. The more complex machines accept deposits, facilitate line
of credit payments and transfers, and access account information.
To access the advanced features of the complex units, a user often must be an account holder
at the bank that operates the machine.
Analysts anticipate ATMs will become even more popular and forecast an increase in the
number of ATM withdrawals. ATMs of the future are likely to be full-service terminals
instead of or in addition to traditional bank tellers.
Card reader: This part reads the chip on the front of the card or the magnetic stripe
on the back of the card.
Keypad: The keypad is used by the customer to input information, including personal
identification number (PIN), the type of transaction required, and the amount of the
transaction.
Cash dispenser: Bills are dispensed through a slot in the machine, which is connected
to a safe at the bottom of the machine.
Printer: If required, consumers can request receipts that are printed out of the ATM.
The receipt records the type of transaction, the amount, and the account balance.
Screen: The ATM issues prompts that guide the consumer through the process of
executing the transaction. Information is also transmitted on the screen, such as
account information and balances.
Full-service machines now often have slots for depositing paper checks or cash.
Banks place ATMs inside and outside of their branches. Other ATMs are located in high-
traffic areas such as shopping centers, grocery stores, convenience stores, airports, bus and
railway stations, gas stations, casinos, restaurants, and other locations. Most ATMs that are
found in banks are multifunctional, while others that are off-site tend to be primarily or
entirely designed for cash withdrawals.
ATMs require consumers to use a plastic card—either a bank debit card or a credit card—to
complete a transaction. Consumers are authenticated by a PIN before any transaction can be
made.
Many cards come with a chip, which transmits data from the card to the machine. These work
in the same fashion as a bar code that is scanned by a code reader.
ATM Fees
Account holders can use their bank’s ATMs at no charge, but accessing funds through a unit
owned by a competing bank usually incurs a fee. According to MoneyRates.com, the average
total fees to withdraw cash from an out-of-network ATM was $4.55 as of 2022.7
Some banks will reimburse their customers for the fee, especially if there is no corresponding
ATM available in the area.
So, if you’re one of those people who draws weekly spending money from an ATM, using the
wrong machine could cost you nearly $240 a year.
ATM Ownership
In many cases, banks and credit unions own ATMs. However, individuals and businesses may
also buy or lease ATMs on their own or through an ATM franchise. When individuals or small
businesses such as restaurants or gas stations own ATMs, the profit model is based on charging
fees to the machine’s users.
Banks also own ATMs with this intent. They use the convenience of an ATM to attract clients.
ATMs also take some of the customer service burdens from bank tellers, saving banks money
in payroll costs.
ATMs make it simple for travelers to access their checking or savings accounts from almost
anywhere in the world.
Travel experts advise consumers to use foreign ATMs as a source of cash abroad, as they
generally receive a more favorable exchange rate than they would at most currency exchange
offices.
However, the account holder’s bank may charge a transaction fee or a percentage of the
amount exchanged. Most ATMs do not list the exchange rate on the receipt, making it difficult
to track spending.
How much can you withdraw from an automated teller machine (ATM)?
The amount that you can withdraw from an automated teller machine (ATM) per day, per
week, or per month will vary based on your bank and account status at that bank. For most
account holders, for instance, Capital One imposes a $1,000 daily ATM withdrawal limit and
Well Fargo just $300.8 You may be able to get around these limits by calling your bank to
request permission or upgrading your banking status by depositing more funds.
If you are a bank’s customer, you may be able to deposit cash or checks via one of their ATMs.
To do this, you may simply need to insert the checks or cash directly into the machine. Other
machines may require you to fill out a deposit slip and put the money into an envelope before
inserting it into the machine. For a check, be sure to endorse the back of your check and note
“For Deposit Only” to be safe.
The first ATM in the United States was installed by Chemical Bank in Rockville Center (Long
Island), N.Y., in 1969 (two years after Barclays installed the first ATM in the United
Kingdom). By the end of 1971, more than 1,000 ATMs were installed worldwide.9
The following definitions summarise the ATM cell header fields as shown in the figure above
−
Generic Flow Control (GFC) − It supports local functions, such as recognizing multiple
stations that send a single ATM interface. This field is generally not used and is set to its
default value of 0 (binary 0000).
Virtual Path Identifier (VPI) − In conjunction with the Virtual Channel Identifier (VCI),
it recognises the next destination of a cell as it transfers through a series of ATM switches
on the way to its destination.
Virtual Channel Identifier (VCI) − In conjunction with the VPI, it recognizes the next
destination of a cell as it transfers through a series of ATM switches on the way to its
destination.
Payload Type (PT) − It denotes in the first bit whether the cell includes user data or
control data. If the cell includes user data, the bit is set to 0. If it includes control data, it is
set to 1. The second bit denotes congestion (0 = no congestion, 1 = congestion), and the
third bit denotes whether the cell is the last in a sequence of cells that define a single AAL5
frame (1 = last cell for the frame).
Cell Loss Priority (CLP) − It denotes whether the cell should be removed if it encounters
extreme congestion as it transfers through the network. Suppose the CLP bit similar is to
1, and the cell should be discarded in preference to cells with the CLP bit equal to 0.
Header Error Control (HEC) − It evaluates checksum only on the first 4 bytes of the
header. It can be valid a single bit error in these bytes, thereby preserving the cell instead
of discarding it.
ATM Layers:
ATM Applications:
ATM WANs – It can be used as a WAN to send cells over long distances, a router serving as
an end-point between ATM network and other networks, which has two stacks of the
protocol.
Multimedia virtual private networks and managed services – It helps in managing ATM,
LAN, voice, and video services and is capable of full-service virtual private networking,
which includes integrated access to multimedia.
Frame relay backbone – Frame relay services are used as a networking infrastructure for a
range of data services and enabling frame-relay ATM service to Internetworking services.
AAL LAYER: In Asynchronous Transfer Mode (ATM) networks, the ATM Adaptation
Layer (AAL) provides facilities for non-ATM based networks to connect to ATM network and
use its services.
AAL is basically a software layer that accepts user data, which may be digitized voice, video
or computer data, and makes them suitable for transmission over an ATM network. The
transmissions can be of fixed or variable data rate. AAL accepts higher layer packets and
segments them into fixed sized ATM cells before transmission via ATM. It also reassembles
the received segments to the higher layer packets.
The following diagram illustrates the function of AAL −
This layer has two sub layers −
1. Convergence sub layer
2. Segmentation and Reassembly sub layer.
Some networks that need AAL services are Gigabit Ethernet, IP, Frame Relay, SONET/SDH
and UMTS/Wireless.
AAL Type 0 − This is the simplest service that provides direct interface to ATM services
without any restrictions. These cells are called raw cells that contain 48-byte payload
field without any special fields. It lacks guaranteed delivery and interoperability.
AAL Type 1 − This service provides interface for synchronous, connection oriented
traffic. It supports constant rate bit stream between the two ends of an ATM link. An
AAL 1 cell contains a 4-bit sequence number, a 4-bit sequence number protection and a
47-byte payload field.
AAL Type 2 − This service also provides interface for synchronous, connection oriented
traffic. However, this is for variable rate bit stream between the two ends of an ATM link.
It is used in wireless applications.
AAL Type 3/4 − This includes a range of services for variable rate data or bit stream. It
is suitable for both connection – oriented, asynchronous traffic as well as connectionless
traffic. These ATM cells contain a 4-byte header.
AAL Type 5 − AAL 5 provides the similar services as AAL 3/4, but with simplified
header information. It was originally named Simple and Efficient Adaptation Layer
(SEAL). It is used in a number of areas like Internet Protocol (IP) over ATM, Ethernet
over ATM and Switched Multimegabit Data Service (SMDS).
PPP Protocol: The PPP stands for Point-to-Point protocol. It is the most commonly used
protocol for point-to-point access. Suppose the user wants to access the internet from the home,
the PPP protocol will be used.
It is a data link layer protocol that resides in the layer 2 of the OSI model. It is used to
encapsulate the layer 3 protocols and all the information available in the payload in order to be
transmitted across the serial links. The PPP protocol can be used on synchronous link like ISDN
as well as asynchronous link like dial-up. It is mainly used for the communication between the
two devices.
It can be used over many types of physical networks such as serial cable, phone line, trunk line,
cellular telephone, fiber optic links such as SONET. As the data link layer protocol is used to
identify from where the transmission starts and ends, so ISP (Internet Service Provider) use the
PPP protocol to provide the dial-up access to the internet
o It is widely used in broadband communications having heavy loads and high speed. For
example, an internet operates on heavy load and high speed.
o It is used to transmit the multiprotocol data between the two connected (point-to-point)
computers. It is mainly used in point-to-point devices, for example, routers are point-
to-point devices where PPP protocol is widely used as it is a WAN protocol not a simple
LAN ethernet protocol.
Frame format of PPP protocol
o Flag: The flag field is used to indicate the start and end of the frame. The flag field is
a 1-byte field that appears at the beginning and the ending of the frame. The pattern of
the flag is similar to the bit pattern in HDLC, i.e., 01111110.
o Address: It is a 1-byte field that contains the constant value which is 11111111. These
8 ones represent a broadcast message.
o Control: It is a 1-byte field which is set through the constant value, i.e., 11000000. It
is not a required field as PPP does not support the flow control and a very limited error
control mechanism. The control field is a mandatory field where protocol supports flow
and error control mechanism.
o Protocol: It is a 1 or 2 bytes field that defines what is to be carried in the data field.
The data can be a user data or other information.
o Payload: The payload field carries either user data or other information. The maximum
length of the payload field is 1500 bytes.
o Checksum: It is a 16-bit field which is generally used for error detection.
On reaching the terminate phase, the link moves to the dead phase which indicates that the
carrier is dropped which was earlier created.
There are two more possibilities that can exist in the transition phase:
o The link moves from the authenticate to the terminate phase when the authentication is
failed.
o The link can also move from the establish to the dead state when the carrier is failed.
o Authentication protocols: There are two types of authentication protocols, i.e., PAP
(Password Authenticate protocols), and CHAP (Challenged Handshake Authentication
Protocols).
PAP is less secure as compared to CHAP as in case of PAP protocol, password is sent in the
form of a clear text. It is a two-step process. Suppose there are two routers, i.e., router 1 and
router 2. In the first step, the router 1 wants to authenticate so it sends the username and
password for the authentication. In the second step, if the username and password are matched
then the router 2 will authenticate the router 1 otherwise the authentication failed.
Step 2: The router 2 maintains a database that contains a list of allowed hosts with their login
credentials. If no data is found which means that the router 1 is not a valid host to connect with
it and the connection gets terminated. If the match is found then the random key is passed. This
random key along with the password is passed in the MD5 hashing function, and the hashing
function generates the hashed value from the password and the random key (password +
random key). The hashed value is also known as Challenge. The challenge along with the
random key will be sent to the router 1.
Step 3: The router 1 receives the hashed value and a random key from the router 2. Then, the
router 1 will pass the random key and locally stored password to the MD5 hashing function.
The MD5 hashing function generates the hashed value from the combination of random key
and password. If the generated hashed value does not match with the received hashed value
then the connection gets terminated. If it is matched, then the connection is granted. Based on
the above authentication result, the authentication signal that could be either accepted or
rejected is sent to the router 2.
o Network Control Protocol (NCP): After the establishment of the link and
authentication, the next step is to connect to the network layer. So, PPP uses another
protocol known as network control protocol (NCP). The NCP is a set of protocols that
facilitates the encapsulation of data which is coming from the network layer to the PPP
frames.
Transfer Modes
HDLC supports two types of transfer modes, normal response mode and asynchronous
balanced mode.
1. Normal Response Mode (NRM) − Here, two types of stations are there, a primary
station that send commands and secondary station that can respond to received
commands. It is used for both point - to - point and multipoint communications.
2. Asynchronous Balanced Mode (ABM) − Here, the configuration is balanced, i.e.
each station can both send commands and respond to commands. It is used for only point
- to - point communications.
HDLC Frame
HDLC is a bit - oriented protocol where each frame contains up to six fields. The structure
varies according to the type of frame. The fields of a HDLC frame are −
Flag − It is an 8-bit sequence that marks the beginning and the end of the frame. The bit
pattern of the flag is 01111110.
Address − It contains the address of the receiver. If the frame is sent by the primary station,
it contains the address(es) of the secondary station(s). If it is sent by the secondary station,
it contains the address of the primary station. The address field may be from 1 byte to
several bytes.
Control − It is 1 or 2 bytes containing flow and error control information.
Payload − This carries the data from the network layer. Its length may vary from one
network to another.
FCS − It is a 2 byte or 4 bytes frame check sequence for error detection. The standard code
used is CRC (cyclic redundancy code)
There are three types of HDLC frames. The type of frame is determined by the control field of
the frame −
I-frame − I-frames or Information frames carry user data from the network layer. They
also include flow and error control information that is piggybacked on user data. The first
bit of control field of I-frame is 0.
II-S-frame − S-frames or Supervisory frames do not contain information field. They are
used for flow and error control when piggybacking is not required. The first two bits of
control field of S-frame is 10.
III-U-frame − U-frames or Un-numbered frames are used for myriad miscellaneous
functions, like link management. It may contain an information field, if required. The
first two bits of control field of U-frame is 11.
MPLS Header – The MPLS Header is 32 bit long and is divided into four parts –
Label – This field is 20 bit long and can take value b/w 0 & 220 – 1.
Exp – They are 3 bits long and used for Quality of Service(QoS).
Bottom of stack (S) – It is of size 1 bit. MPLS labels are stacked one over other. If there
is only one label remained in MPLS header, then its value is 1 otherwise 0.
Time to Live (TTL) – It is 8 bit long and its value is decreased by one at each hop to
prevent packet to get stuck in network.
Drawbacks of MPLS
Long setup time: Setting up complicated dedicated paths across one or more large networks
takes time. LSPs have to be manually configured by the MPLS vendor or by the organization
using MPLS. This makes it difficult for organizations to scale up their networks quickly.
Lack of encryption: MPLS is not encrypted; any attacker that intercepts packets on MPLS
paths can read them in plaintext. Encryption has to be set up separately.
Cloud challenges: Organizations that rely on cloud services may not be able to set up direct
network connections to their cloud servers, as they do not have access to the specific servers
where their data and applications live.