Vo IP
Vo IP
Vo IP
net/publication/234800763
CITATIONS READS
15 608
1 author:
Marcus Goncalves
Boston University
208 PUBLICATIONS 252 CITATIONS
SEE PROFILE
All content following this page was uploaded by Marcus Goncalves on 06 December 2018.
Table of Contents
Table of Contents 1
PREFACE 8
Overview 9
Who Should Read This Book 12
About the Author 12
CHAPTER 1 14
IPv6 Extensions 24
Security Enhancements 25
Transitioning to IPv6 26
The 6bone initiative 29
Addressing and Routing 31
IPv6 for Businesses 35
Relevance of IPv6 40
IPv6 Multicasting 42
The Conversion Challenge 43
Business Opportunities for IPv6 44
IPv6’s Unicast, Multicast and Anycast Addressing 46
Address Resolution and Neighbor Discovery 49
IPv6’s Multimedia Features 54
IPv6’s Multicasting 54
Bandwidth Reservations 55
Packet Prioritizing 55
Jumbograms 55
IPv6’s Plug-and-Play Features 56
Address Discovery 56
Network Information Discovery 56
Automated Address Changes 57
Support for Mobile Hosts 57
Dead Neighbor Detection 57
Control Over Routing 58
Configurability of features 58
IPv6 Performance Considerations 58
Using Virtual LANs with IPv6 60
Router-based LANs 61
Switched-based LANs 62
Understanding Virtual LANs 63
What’s Next 69
CHAPTER 2 71
ATM’s Connection-Oriented 99
Basic Understanding of ATM Networks 102
What’s Next 109
CHAPTER 3 112
IP Superhighway 112
Voice over IP 112
Carrying Voice Over Data Channels 113
Multiprotocol Support is Key 115
Providing for Scalability and Management Tools 116
The H.323 Standard 120
DataBeam H.323 Toolkit Series 124
IP over ATM 125
Encapsulating IP 127
TCP over ATM 128
Voice Over ATM 130
IP over SONET 131
SONET Benefits 133
Synchronous Multiplexing 135
Voice over SONET 136
SONET and Other Data Streams and Protocols 137
IP over Frame Relay 140
Voice over Frame Relay 142
Voice Over Frame Relay and Cost Benefits 143
Comparing Dial Voice Costs with Frame Relay 146
Voice over Private Frame Relay 146
Is Voice Over Frame Relay a Viable Option? 148
Frame Relay vs. Leased Lines 148
Frame Relay vs. ATM 149
Frame Relay vs. the Internet 150
Equipment for Voice Over Frame Relay 151
Technical Challenges for Transporting Voice Over Frame Relay 153
Controlling Delay 154
Equipment for Voice Over Frame Relay 162
Network Design Considerations 164
Committed Information Rate (CIR) 164
CIR with Mixed Voice/Data Submultiplexing 166
High Speed Flooding and Traffic Shaping 168
Delay and Priority 169
Congestion Indication 171
Efficiency 172
Echo Cancellation 173
Dialing Plan 174
Understanding Layer 3 Switching 175
Why Layer 3 Switching? 177
4 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
CHAPTER 4 192
CHAPTER 5 222
CHAPTER 6 260
CHAPTER 7 300
CHAPTER 8 311
Videoconferencing 315
Document-sharing 319
Web-Based Call Center Applications 320
VOIP Challenges 321
Getting Telcos up to speed 321
Setting standards 322
H.323 322
H.100/H.110 324
MVIP 326
CompactPCI 327
What’s Next 328
CHAPTER 9 329
CHAPTER 10 397
APPENDIX A 404
APPENDIX B 413
Preface
“Voice Over IP: The Internet-based Telephony,” thoroughly explores the potential, and
profitable frontier for every company running a TCP/IP stack network. Up to now, the Internet
run over the phone lines, but voice over IP technologies reverses this trend, by providing
This book was developed with IPv6 in mind, exploring and explaining how these two cutting
edge technologies will merge together to deliver powerful telephony-based services and
applications. But of course it does take IPv4 in consideration and argues about the complexity
of deploying this technology, due to the connectionless nature of IP networks and the
This book also thoroughly explores the potential investment in terms of both money and
technology. It provides in-depth discussion of the main practical implementation and solutions
Part I. The Technology – May 25, 1998 - 9
being advocated by leading vendors and their products, such as 3Com’s VoIP implementation
Total Control™ HiPer™ Access System, Motorola’s VIPR, Nuera Communication’s Access
By the end of this book the reader should be able to have a full understanding of how VoIP
(Voice Over Internet Protocol) works, what are the main challenges in implementing it and
what are the main vendors and their products. The reader will also have a reasonable
Overview
Part I – “The Technology,” provides basic technical grounds for understanding IP and the
Chapter 1, “An Overview of IPv4 and IPv6,” provides information about the IPv4’s strenght
and weaknesses of a successful protocol, as well as coverage of IPv6 and its enhanced
internetworking capabilities.
10 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Chapter 2, “Understanding RSVP, IP Multicast and ATMs,” provides you with the
Chapter 3, “IP Superhighway,” introduces the basic concepts of voice over IP, and its most
used H.323 standard. It also discusses other standards and technologies such as audio codecs,
IP over ATM, voice over ATM, the emulation of traditional T1/E1 Trunks, IP over SONET
and voice over SONET, and IP and voice over frame relay. Further, this chapter discusses
capabilities on hosts and routers, as well as usage and implementation, especially with VoIP.
Chapter 5, “More on ATM Technologies, “ discusses the ATM data model, its network
services, data protocols and LAN emulation, as well as ATM MPOA services.
Part II, “Hands-on VoIP: Standards and Implementations,” is a practical section, where
Chapter 7, “Codecs Methods,” covers the technology and standard employed in voice
Chapter 8, “Voice Over IP: Can We Talk?,” focus on the applicability of VoIP, such as in
center applications, etc. It also discusses the challenges VoIP faces, both with getting telcos up
to speed, as well as setting standards. It goes on listing the major VoIP players, including
Chapter 9, “What to Expect: The Innovators,” assesses what is being offered by VoIP
Part III, “Advanced VoIP,” outlines the major players of the industry, their products, technical
Chapter 10, “The RTSP Protocol,” assesses the Real Time Streaming Protocol (RTSP).
At the end of the book, you will find two appendixes. Appendix A, provides a list of VoIP
This book is designed for systems managers, network administrators, systems integrators,
implement VoIP in their businesses. It provides a brief general review of basic concepts of
IPv4, IPv6 and VoIP, for those not too familiar with IP. It also provides advanced
configuration and troubleshooting information for those professionals heavily involved with
VoIP projects and a outline of the main products available on the market..
IS&T arena. He’s a Sr. IT Analyst for Automation Research Corporation, advising
several workshops and seminars on IS and Internet security in U.S. and internationally. Has
published several books related to the subject such as Firewalls Complete, with McGraw-Hill;
Protecting Your Web Site With Firewalls, with PTR/Prentice Hall, Internet Privacy Kit, with
Que, Windows NT Server Security, with PTR, IPv6 Networks with McGraw-Hill, and few
others. He’s also a regular contributor for several magazines such as BackOffice, Developer’s
Part I. The Technology – May 25, 1998 - 13
and WEBster. He’s a member of the Internet Society, International Computer Security
Association (ICSA), the Association for Information Systems (AIS) and the New York
Academy of Sciences. Goncalves is the Chief editor of the Journal for Internet Security (JSec).
14 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Chapter 1
IPv4 was developed awhile ago, in 1975, and provides for approximately 4.2 billion possible
combinations. Although this sounds like more than enough addresses, the truth is that every
machine as well as every interface on every machine requires a unique address. We therefore
find ourselves in our current position, lacking enough capacity in addresses to cover the
By the beginning of the new century, the Internet community will need enough IP addresses
for the billions upon billions of new customers that it attracts as well as the possible new host
being setup and connected to the Internet. IPv4, does have the capability for more than 4
Part I. The Technology – May 25, 1998 - 15
billion addresses, but still, it is not adequate to handle the demand, not much for the number of
addresses it can handle, but the way it groups bits for its network/host numbering system. The
problem here is that IPv4’s numbering system wastes address assignments and suffers from
IPv4 supports a fixed 32-bit field for addressing, which is no longer sufficient for the number
of users on the Internet. Routing tables are growing exponentially and this has been causing a
great deal of difficulty for many organizations as well. In addition to these items, auto-
configuration and scaleable multicast are in need. Furthermore, there is a need to develop
real-time flow for video conferencing, as we will be discussing throughout this book. These
remain the key issues associated with the move toward a new protocol format.
IPv4 addresses are categorized according to the size of a network (number of IP addresses
used). These categories are known as address classes. The first three categories are those that
we are concerned with and they maintain a different amount of bits for the networkID portion
of their addresses. Class B for example, has 14 bits for the networkID and 16 for the hostID
combining to form 16,384 outcomes and each of these outcomes can accommodate 65,534
hosts.
16 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The major problem with this scheme is that the networks that are most numerous in number
are those in the middle of this class structure. The number of addresses has remained static
and the distribution of networks has been evolving to lump around the intermediate networks.
Subnettting and supernetting has been developed in part to help fix this problem.
IP addressing is based on network number assignment and host number assignment. In IPv4,
these numbers are organized as 32-bit addresses, with host numbers and network numbers
embedded in the addresses. These numbers identify the network or host connection and not
the actual network or computer. IPv4 divides its address assignment into three main classes:
A, B, and C.
• Class A addresses assign the first 7 bits (or 1 byte) to a network and the last 24
bits (or 3 bytes) to a host. These addresses are reserved for organizations that have
up to 16 777 216 hosts, and there can be at most 128 of these networks.
• Class B addresses assigns the first 14 bits (or 2 bytes) to a network and the last 16
bits (or 2 bytes) to a host. These addresses are reserved for organizations that have
• Class C addresses assign the first 21 bits (or 3 bytes) to a network and the last 7
bits (or 1 byte) to a host. These addresses are reserved for organizations that have
less than 256 hosts, and there can be at most 2 097 152 networks.
The address class determines the network mask of the address. A network mask is a 32-bit
Internet address that has all the bits in the network number set to one and all the bits in the host
number set to zero. Hosts and routers use the network mask to route Internet packets.
Although the amount of possible addresses seem enough to suit the world needs for IP
address, the way IPv4 handles the addresses within each of these classes prevents from it.
Take for example an organization seeking 300 host addresses. The amount of IP addresses the
organization seeks puts them into the Class B category. However, if the company is assigned a
Class B address, then they would have 65 536 hosts, which is significantly more than what is
To avoid this type of situation, the Classless Inter-Domain Routing (CIDR) scheme was
introduced a few years ago. CIDR essentially eliminates the class structure of addressing and,
instead, allows the assignment of network numbers at any bit boundary. In this way network
numbers can be created, for example, by aggregating several contiguous class C addresses.
18 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
CIDR requires that network masks be explicitly specified when needed, rather than allowing
them to be implicitly derived from the address (as in the class system).
Another problem attributed to IPv4’s address classes is the Internet backbone router table size
explosion. CIDR also addresses this by allowing for address aggregation. Furthermore, a
negative aspect to CIDR is that with an arbitrary address, you cannot determine the network
and host numbers unless you know the network mask. But the limitations of IPv4 have
quickly been realized and measures, such as CIDR, have extended its life slightly. Worldwide
It is anticipated that in the early XXI century, just around the corner, the Internet will be
routinely used in ways just as unfathomable to us, today. Its usage is expected to extend to
multimedia notebook computers, cellular modems, and even appliances at home, such as your
TV, your toaster and coffee maker (remember that IBM’s latest desktop PC model already
comes with some of these remote functionality to control your appliances at home!).
Virtually all the devices with which we interact, at home, at work, and at play, will be
connected to the Internet – the possibilities are endless, and the implications staggering,
The advent of the IPv6 initiative doesn’t mean that the technologies will exhaust the
capabilities of IPv4, our Internet technology. However, as you might expect, there are still
compelling reasons to begin adopting IPv6 as soon as possible. However, this process has its
challenges, and as essential to any evolution of Internet technology, there are requirements for
seamless compatibility with IPv4, especially with regards to a manageable migration, which
would allow us to take advantage of the power of IPv6, without forcing the entire Internet to
upgrade simultaneously.
Thus, IPv6 becomes a central point, the cornerstone for the Internet and its viability to serve
corporate networks, IP multicasting, the global e-commerce and telephony applications such
It is important to note the intent behind the IPv6 design. It was not designed to be a huge leap
away from what has worked in IPv4. This would be catastrophic, as backward compatibility
would not be assured. This version of the protocol is designed to be growths move out of
something that works but no longer fits the requirements of the user community.
20 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
IPv6 kept all the working functionality of IPv4 and integrated into the new version of the
protocol. Along the same lines, things that did not work so well in IPv4 were intentionally left
out of the new version. Below is a summary list of the main changes that have been
implemented on IPv6:
• IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels
multicast addresses,
nodes where a packet sent to an anycast address is delivered to one of the nodes.
The use of anycast addresses in the IPv6 source route allows nodes to control the
• Some IPv4 header fields have been dropped or made optional, to reduce the
common-case processing cost of packet handling and to keep the bandwidth cost of
the IPv6 header as low as possible despite the increased size of the addresses.
Even though the IPv6 addresses are four time longer than the IPv4 addresses, the
• Changes in the way IP header options are encoded allows for more efficient
forwarding, less stringent limits on the length of options, and greater flexibility for
• Quality-of-Service Capabilities,
traffic "flows" for which the sender requests special handling, such as non-default
Auto-configuration
concept, a host who has been established as a resource on the Internet will be not be required
to re-establish itself as a host again. This host will be able to connect as a node on the network
with a minimal amount of configuration. This will reduce a great deal the time LAN
individuals who travel will not be required to reconfigure in order to gain connectivity to the
Internet.
This aspect of IPv6 has an added benefit in that it does not require DHCP. It is interesting to
note the way in which this has been proposed. A ‘local link IP address’ will be developed
upon the initialization of a physical layer device such as a NIC. As part of the Ethernet
standard for example, such addresses are unique from one another. Building on these
addresses and creating a unique IP address as a derivation of the Ethernet address will ensure
successful addressing of the NIC. This is the IP address that can be established in auto-
configuration. This approach is similar to that of IPX, which has been quite successful.
Part I. The Technology – May 25, 1998 - 23
IPv6 Header
The IPv6 header, as shown on figure 1.1, consists of eight discreet items, many of them being
quite innovative and obviously directly targeted at some of the shortcomings of IPv4. These
items are:
• Version,
• Payload Length,
• Next Header,
• Hop Limit,
• Destination Address.
Figure 1.1
IPv6 Extensions
IPv6 includes an improved option mechanism over IPv4. IPv6 options are placed in separate
extension headers that are located between the IPv6 header and the transport-layer header in a
packet. All IPv6 extension headers are not examined or processed by any router along a
packet's delivery path until it arrives at its final destination. This facilitates a major
improvement in router performance for packets containing options. In IPv4 the presence of
The other improvement is that unlike IPv4 options, IPv6 extension headers can be of arbitrary
length and the total amount of options carried in a packet is not limited to 40 bytes. This
feature plus the manner in which they are processed, permits IPv6 options to be used for
functions which were not practical in IPv4. A good example of this is the IPv6 Authentication
In order to improve the performance when handling subsequent option headers and the
transport protocol which follows, IPv6 options are always an integer multiple of 8 octets long,
in order to retain this alignment for subsequent headers. The IPv6 extension headers, which
• Hop-by-Hop Option - Special options which require hop by hop processing, and
node.
Security Enhancements
IPv4 has a number of security problems and lacks effective privacy and authentication
mechanisms below the application layer. IPv6 remedies these shortcomings by having two
integrated options that provide security services. These two options may be used singly or
together to provide differing levels of security to different users. This is very important
The first mechanism, called the "IPv6 Authentication Header", is an extension header which
provides authentication and integrity (without confidentiality) to IPv6 datagrams. While the
techniques, the use of keyed MD5 is specified as the default algorithm to help ensure
interoperability within the worldwide Internet. This can be used to eliminate a significant
The use of the IPv6 Authentication Header is particularly important when source routing is
used with IPv6 because of the known risks in IP source routing. Its placement at the Internet
layer can help provide host origin authentication to those upper layer protocols and services
that currently lack meaningful protections. This mechanism should be exportable by vendors
in the United States and other countries with similar export restrictions because it only
provides authentication and integrity, and specifically does not provide confidentiality. The
exportability of the IPv6 Authentication Header encourages its widespread deployment and
use.
The second security extension header provided with IPv6 is the "IPv6 Encapsulating Security
simpler than some similar security protocols (e.g., SP3D, ISO NLSP) but remains flexible and
algorithm-independent. To achieve interoperability within the global Internet, the use of DES
CBC is being used as the standard default algorithm for use with the IPv6 Encapsulating
Security Header.
Transitioning to IPv6
The key transition objective is to allow IPv6 and IPv4 hosts to interoperate. A second
objective is to allow IPv6 hosts and routers to be deployed in the Internet in a highly diffuse
and incremental fashion, with few interdependencies. A third objective is that the transition
Part I. The Technology – May 25, 1998 - 27
should be as easy as possible for end-users, system administrators and network operators to
The IPv6 transition mechanisms are a set of protocol mechanisms implemented in hosts and
routers, along with some operational guidelines for addressing and deployment, designed to
make transition the Internet to IPv6 work with as little disruption as possible. The IPv6
• Incremental upgrade and deployment. Individual IPv4 hosts and routers may be
upgraded to IPv6 one at a time without requiring any other hosts or routers to be
upgraded at the same time. New IPv6 hosts and routers can be installed one by
one,
IPv6 is that the DNS server must first be upgraded to handle IPv6 address records.
• Easy Addressing. When existing installed IPv4 hosts or routers are upgraded to
IPv6, they may continue to use their existing address. They do not need to be
plans, and
28 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
existing IPv4 systems to IPv6, or to deploy new IPv6 systems. The mechanisms
• An IPv6 addressing structure that embeds IPv4 addresses within IPv6 addresses,
• A model of deployment where all hosts and routers upgraded to IPv6 in the early
transition phase are "dual" capable (i.e. implement complete IPv4 and IPv6
protocol stacks),
• The technique of encapsulating IPv6 packets within IPv4 headers to carry them
over segments of the end-to-end path where the routers have not yet been upgraded
to IPv6,
topologies that route only IPv6 traffic, and the deployment of hosts that support
only IPv6. Use of this technique is optional, and would be used in the later phase
The IPv6 transition mechanisms ensures that IPv6 hosts can interoperate with IPv4 hosts
anywhere in the Internet up until the time when IPv4 addresses run out, and allows IPv6 and
Part I. The Technology – May 25, 1998 - 29
IPv4 hosts within a limited scope to interoperate indefinitely after that. This feature protects
the huge investment users have made in IPv4 and ensures that IPv6 does not render IPv4
obsolete. Hosts that need only a limited connectivity range (e.g., printers) need never be
upgraded to IPv6.
This project is actually much more important than one would think from its name, however. It
is essentially a practice ground to learn more about the use of IPv6 as well as the foster the
The project is a close relative of the IETF and currently spans three continents. One of the
main purposes of the project is to develop and implement a backbone (thus the name, we
suppose) that is able to support IPv6. A new protocol is not worth much if support is
unavailable. The eventual thinking is that the backbone will mimic the structure that exists
today in that it will consist of ISPs as well as other networks combined to provide a great deal
The problem that 6bone is answering is an important one: how can we test new functionality
without placing the existing functionality at risk? The answer is that this project involves
placing a virtual network layer that exists on top of physical IPv4 network layers. The
30 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
particulars of this setup can be found at the 6bone Web site below as they are beyond the
scope of this book. It is important to note however, that as IPv6 is readily adopted and
6bone is interested in developing policy and procedures for the next stage of IP integration. It
is not designed to develop new network architectures or infringe upon the way in which
include as many large players as possible in order to develop policies and procedures that can
It is logical to move from the RAS section to a more detailed discussion of TCP/IP. As we
have learned, there are a number of changes in store for the protocol suite that are important to
understand and be prepared for as well. These changes are not designed to make a huge lead
away from what has worked to-date. Rather these enhancements are designed to build upon
the aspects of IP that have worked and move away from those that have not.
IPv4 is a solid, routable protocol. In order for larger network environments to use this
product, they require some sort of connectivity that is usually filled by a DHCP and DNS
server. IPv6 has the potential to circumvent many of these requirements and provides the
IPv6 has been designed to enable high-performance, scalable internetworks to remain viable
well into the next century, and for that, many inadequacies of IPv4 were corrected (see figure
1.2 for an IPv6 sample of its packet). But in order to fully take advantage of IPv6
improvements you must be ready to dive into its full spectrum of benefits. Some of the
qualities of IPv6 are found in obviously enhanced features, others are less tangible and relate
to the fresh start that IPv6 provides to LAN and Internet administrators.
Figure 1.2
IPv6 provides a framework for solving some critical problems that currently exist inside and
between enterprises, as shown on figure 1.3. IPv6 will allow Internet backbone designers to
create a highly flexible and open-ended global routing hierarchy. At the level of the Internet
backbone where major enterprises and Internet Service Provider (ISP) networks come
together, it is necessary to maintain a hierarchical addressing system, much like that of the
national and international telephone systems. Large central-office phone switches, for
32 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
instance, only need a three-digit national area code prefix to route a long-distance telephone
call to the correct local exchange. Likewise, the current IPv4 system uses a (somewhat
haphazard) form of address hierarchy to move traffic between networks attached to the
Internet backbone.
Figure 1.3
Without an address hierarchy, backbone routers would be forced to store routing table
information on the reachability of every network in the world. Given the current number of IP
subnets in the world and the growth of the Internet, this is not feasible. With a hierarchy,
backbone routers can use IP address prefixes to determine how traffic should be routed
through the backbone. IPv4 uses a technique called Classless InterDomain Routing (CIDR),
which allows flexible use of variable-length network prefixes. With this flexible use of
prefixes, CIDR permits considerable "route aggregation" at various levels of the Internet
hierarchy, which means backbone routers can store a single routing table entry that provides
But the availability of CIDR routing does not guarantee an efficient and scalable hierarchy. In
many cases, legacy IPv4 address assignments that originated before CIDR do not facilitate
summarization. These issues affect high-level service providers and individual end users in all
types of businesses. Figure 1.4 and 1.5 outlines some of the main features of IPv6 routing.
Figure 1.4
Figure 1.5
Gateways and network address translators typically limit users in private address spaces with
non-unique addresses in their connectivity to the outside world. NAT services are meant to
allow an enterprise to have whatever internal address structure it desires, without concern for
integrating internal addresses with the global Internet. The NAT device sits on the border
between the enterprise and the Internet, converting private internal addresses to a smaller pool
of globally unique addresses that are passed to the backbone and vice.
34 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
NAT may be appropriate in some organizations, particularly if full connectivity with the
outside world is not desired. Figure 1.6 gives an example of the NAT layout. But for
enterprises that require robust interaction with the Internet, NAT devices are not always
desirable. The NAT technique of substituting address fields in each and every packet that
leaves and enters the enterprise is very demanding, and can lead to a bottleneck between the
Figure 1.6
A NAT may keep up with address conversion in a small network, but as Internet accesses
increases, the NAT's performance must increase in a parallel fashion. The bottleneck effect is
exacerbated by the difficulty of integrating and synchronizing multiple NAT devices within a
single enterprise. It is highly unlikely that an enterprise will achieve the reliable high-
performance Internet connectivity with NAT that is common today with multiple routers
Another limitation of IPv4 relates to the ongoing need in many organizations to renumber
stations. When an enterprise change ISPs, it may have to either renumber all addresses to
Part I. The Technology – May 25, 1998 - 35
match the new ISP-assigned prefix, or implement address translation devices. Renumbering is
also a reality for many corporations that undergo a merger or an acquisition that entails
network consolidation. Also, address shortages and routing hierarchy problems increasingly
are a threat to the network operations of larger (and to some extend small) enterprises. Smaller
networks can be completely dropped from Internet backbone routing tables if they do not
adhere to the address hierarchy. In the current system, ISPs with individual dial-in clients
cannot allocate IP numbers as freely as they wish. Consequently, many dial-in users must use
an address allocated from a pool on a temporary basis. In other cases, small dial-in sites are
There are plenty of business issues today pushing IPv6, from protocol basics to industry
realities and demands. For once, if we look at the increasing business requirements for
interactive multimedia (IP multicasting and voice over IP included!), and high-bandwidth
network applications, IPv6 is critical to the continued viability of enterprise internetworks and
the public Internet at large. Thus, to say that IPv6 is driven by a need to expand Internet
addresses are not only simplistic, but miss all the potential behind the whole IPv6 initiative.
Figure1.7 lists some of the main reasons driving the development of IPv6, but it is not all.
36 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 1.7
For many, IPv6 is a proposed solution for preventing IPv4’s obsolete 32-bits address space to
run out of Network Layer addresses, as we discussed earlier in this chapter. But the Internet
Network Information Center (InterNIC), the authority that assigns blocks of IP addresses to
large network service providers and network operators, predicts that IPv4’s address format
The fact is that IPv6 has great advantages, and impact over Ipv4. Consider this: IPv6’s space
address is jumping from Ipv4’s 32-bit format to a huge 128-bit address space. Figure 1.8 and
1.9 outlines some of the main changes in IPv6 from IPv4. This new capability alone should be
more than enough to grant unique addresses for every conceivable variety of network device
in the world for many decades to come. More precisely, its 16 bytes addressing capability can
a major achievement, IPv6 is also bringing many other features, as well as addressing several
issue, for good, and for bad. Thus, it’s important to be aware and understand both, advantages
Part I. The Technology – May 25, 1998 - 37
and disadvantages and better understand how it impacts our business and the internetworking
environment.
Figure 1.8
Figure 1.9
The expanded IP addressing of IPv6 gets a lot of attention but it is only one of many important
features it provides. Figure 1.10 list some other new features of IPv6, but as mentioned earlier,
• Improved security,
• Autoconfiguration,
38 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 1.10
Again, don’t be deceived by the long list of features outlined above. Just like everything has a
price in this world, this many benefits of IPv6 also have a price, which can be view as a
disadvantage, even though a temporary one, as it will not come without a transition effort.
Such is the challenge it presents that many in the industry defend the idea of extending the life
of IPv4 indefinitely with changes to the protocol standards and various proprietary techniques.
For instance, figure 1.11 outlines couple main challenges facing those migrating onto IPv6:
lack of a finished product and not being PnP (Plug-and-Play). Another issue is in the case of
the network address translators (NAT), which does preserves IPv4 address space by
intercepting traffic and converting private intra-enterprise addresses into globally unique
Part I. The Technology – May 25, 1998 - 39
Internet addresses. The many quality-of-service and security enhancements to IPv4 also are
being extended.
Figure 1.11
Some professionals believe that the diversification of large applicability for IPv6 support is not
something to involve and concern business and end-users in general. But you can count on the
fact that IPv6 will connect more than computers and networks. IPv6 will make it possible to
connect many other devices, such as palmtop personal data assistants (PDA), hybrid mobile
phone embedded network components, as well as other devices and equipment that will range
These factors as shown on figure 1.12, justifies and contributes to some of the main challenges
faced by IPv6 during its earlier implementation phase. Furthermore, as new devices make their
way onto the Internet, they will strain the existing network fabric in ways the early IP protocol
designers could hardly have imagined. IPv6's 128-bit address space will allow new markets to
deploy an enormous array of new applications and devices for desktop, mobile, and embedded
network with very high return of investment (ROI). Moreover, be confident that these new
40 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
trends will be lead and pushed by end-user applications. Heavily competitively networked
business environment of the new century will have to exploit all the capabilities of IPv6, not
only to create a highly scalable address space, but also to take advantage of its strong
Figure 1.12
Relevance of IPv6
Very soon we'll be able to use our car's on-board computer to take dictation while we're stuck
in traffic, update our schedule so that family and colleagues know where we are, and to
instruct our house to turn up the heat, and switch on the lights. That same car will
automatically run diagnostics and download the results, so when we get to the shop the needed
parts are ready and waiting. Virtually all the devices with which we interact, at home, at work,
and at play, will be connected to the Internet – the possibilities are endless, and the
IPv6 is already promoting major advantages to backbone routers, enabling efficient multitiered
routing hierarchies that limit the uncontrolled growth of backbone router tables. It is also
benefiting end-users, as it enables them to run more secure Intranet environments as IPv6
offers encryption and authentication services as integral part of its IP stack. The advantages are
even greater for mobile users, always moving from one location to another with their notebook
computers (and Palmtops). It also brings major advantages for other dynamic departmental
staffs, such as team of auditors and inspectors conducting due diligence outside of their offices
as IPv6 enables the use of automatic configuration in the assignment of IP addresses. The
Although the explosive growth of the World Wide Web and other, more futuristic,
technologies won't totally exhaust the capabilities of our current generation of Internet
technology until early in the next decade, there are still compelling reasons to begin adopting
IPv6 now. Essential to any evolution of Internet technology are the requirements for seamless
compatibility with current technology (IPv4), and manageable migration. Thus, it will be
possible to take advantage of the power of IPv6 now, where needed, without forcing the entire
Mode (ATM) cell switching, and other switching methods, as possible replacements for
42 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
packet routing, that needs to be clarified. I believe ATM has its place in the internetworking
industry, but cannot replace packet routing by itself. Thus, it’s not a matter of choice to have
ATM or IPv6 because the two protocols not only complement each other, but also serve
entirely different roles in corporate networking. As a matter of fact, why not use ATM as a
transmission medium for high-speed IPv6 backbone networks? This is a question that has
triggered, many standard and development work aimed on the integration of ATM and IPv6.
Superhighway,” IPv6, just like IPv4, provides Network Layer services over all major link
types, including ATM, Ethernet, Token Ring, ISDN, Frame Relay, and T1.
IPv6 Multicasting
The designs of current network technologies were based on the premise of one-to-one, or one-
to-all communications. This means that applications that are distributing information to a large
number of users must build a separate network connection from the server to each client. IPv6
provides the opportunity to build applications that make much better use of server and
network resources through its "multicasting" option. This allows an application to "broadcast"
data over the network, where only those clients receive it properly authorized to do so.
Multicast technology opens up a whole new range of potential applications, from efficient
Part I. The Technology – May 25, 1998 - 43
news and financial data distribution, to video and audio distribution, etc. The possibilities are
endless!
While a primary design goal of IPv6 is to ease the transition from and co-existence with IPv4,
converting today's tens of millions of IPv4 based systems to IPv6 will be a major challenge.
However, IPv6's built in compatibility features will ease the pain, and options like tunneling
IPv4 packets over IPv6, and tunneling IPv6 packets over IPv4, and translation gateways will
Many organizations are working on IPv6 drivers for the popular UNIX BSD operating
environment. Network software vendors have announced a wide range of support for IPv6 in
Changes to protocol systems can have profound effects on existing applications and must be
carefully implemented to minimize risk. Thus, migrating from IPv4 to IPv6 in existing
Vendors operating in the IP industry should be attentive for new opportunities in the IPv6
market, as we already anticipate market dynamics, which will lead to universal IPv6 adoption,
as discussed earlier in this chapter. In order to be successful, vendors should be looking for
One market to tap on is the fact that IPv6 stack is incompatible with IPv4 stack. The IETF is
formalizing two approaches to the migration process: tunneling and dual stacks, which are
infrastructure – by enabling two IPv6 nodes to communicate over an IPv4 backbone (or vice
versa), but it does not enable an IPv4 node to communicate with an IPv6 node. But what if a
node with a dual IPv6/v4 stack, which could communicate with either IPv6 or IPv4 nodes
Figure 1.13
tunneling
Part I. The Technology – May 25, 1998 - 45
If so, would you install a dual stack instead of IPv4 only? Clearly this would require a
considerable investment, especially at a large site, and coordination of stacks from different
vendors would be necessary. Also, upper level protocols would need to be replaced, and a
“separate but equal” addressing and configuration scheme would need to be implemented and
supported. The question is why would you incur in these costs and risks? The possible
1. You may want to have some target nodes only accessible via IPv6. But why would
you do that when such a choice so severely constrains communicating nodes in your
organization?
2. Surely, many are the compelling features of IPv6. You may decide to endure the
challenges brought by IPv6 just like any Microsoft users endures the beta versions of
Windows 98 and NT 5.0: you may do it for the attributes of IPv6, such as quality-of-
service, automatic configuration, security and large address space. All to be also
available via IPv4 or have adequate IPv4 workarounds for the next decade.
46 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
This is an IPv6 constraint. I’m not sure that the advantages of dual stack installation warrant
the costs and risks,. It does, however, poses a “chicken or egg” conundrum for early IPv6
adopters.
But there is an alternative approach that may mitigate this problem. What about a device (or
scheme) that translates between IPv4 and IPv6 protocols, as shown on figure 1.14? IPv4
nodes, which need to communicate with IPv6 nodes, would not require any stack upgrades.
New sites might consider IPv6 installations without fear of incompatibility with the installed
base. IPv6 migration could proceed based on its larger address space.
Figure 1.14
IPv6’s unicast addresses identify a single interface. Packets sent to a unicast address are
delivered to the interface identified by that address. There are four types of unicast addresses:
• Local use, which includes link-local for addressing on a single link (physical
network) or subnetwork, and site-local designed for local use that can later be
• IPv4 compatible, which provides compatibility between IPv4 and IPv6 until a
• Loopback, which sends an IPv6 packet to itself. These packets are not sent outside
a single node.
Multicast addresses identify a set of interfaces that usually belong to different nodes. Packets
sent to a multicast address are delivered to all interfaces identified by that address. This is
useful in several ways, such as sending discovery messages to only the machines that are
registered to receive them. A particular multicast address can be confined to a single system,
restricted to a specific site, associated with a particular network link, or distributed worldwide.
Note that IPv6 has no broadcast addresses and uses multicasting instead, as shown on Table
1.1.
Table 1.1
48 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Bits 8 4 4 112
Anycast addresses is a new introduction to IP technology with the IPv6 protocol. This kind of
address identifies a set of interfaces, usually belonging to different nodes. A packet sent to an
anycast address is delivered to one of the interfaces identified by the address. This is usually
the nearest interface, and is determined by how the router measures distance.
This makes routing more efficient, as shown on Table 1.2) because the address itself can
specify intermediate hops en route to a destination, rather than having the router determine the
route.
Table 1.2
Part I. The Technology – May 25, 1998 - 49
Bits N 128-n
In order for Internet packets to be transferred in a particular subnet on a particular media, the
notes need to know the subnet address or the media address of the target station. IPv4 relies on
the Address Resolution Protocol (ARP), but IPv6 uses what is called neighbor discovery,
which provides the same resources of ARP but also adds router discovery.
With IPv6, neighbor discovery is described in generic terms as part of IPv6 ICMP. Christian
Huitema, in his book “IPv6, The New Internet Protocol,” describes very well how IPv6 uses
multicast transmission to identify the media address of their destination. The message will
always be sent to multicast address every time the media address of the destination is
unknown. Thus, for IEEE-802, Ethernet of FDDI, the 48-bit multicast address is obtained by
50 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
concatenating a fixed 16-bit prefix, 3333, and the last 32 bits of the IPv6 multicast address.
Xerox reserved this prefix for use with IPv6, as shown on figure 1.15.
Figure 1.15
RFC 1970, “Neighbor Discovery for IP Version 6 (IPv6),” specifies the standards track
protocol for the Internet community. As mentioned earlier, nodes and hosts do need a
mechanism to determine the address of a target note or host. Neighbor Discovery enables it by
a link-layer address process, for neighbors known to reside on attached links. Neighbor
Discovery is also used by hosts to find neighboring routers that are willing to forward packets
on their behalf. It also actively keep track of which neighbors are reachable and which are not,
and to detect changed link-layer addresses. When a router or the path to a router fails, a host
*****Start TIP*****
Part I. The Technology – May 25, 1998 - 51
For more details about the parameters of this specification check the RFC 1970 at
http://playground.sun.com/pub/ipng/html/ipng-main.html .
*****End TIP*****
Besides solving many problems related to the interaction of nodes attached to a same link it
• Router Discovery, resolving how hosts locate routers residing on attached links.
• Prefix Discovery, resolving how hosts discover the set of address prefixes that
• Parameter Discovery, solving how a node learns the necessary link parameters,
such as the link MTU or Internet parameters, such as the hop limit value to place in
outgoing packets.
for an interface.
• Address resolution, resolves how nodes determine the link-layer address of an on-
address into the IP address of the neighbor to which traffic for the destination
default routers can be tried, but in the case of both routers and hosts, address
• Redirect, defines how a router informs a host of a better first-hop node to reach a
particular destination.
• A Redirect message.
Part I. The Technology – May 25, 1998 - 53
• Router Solicitation: When an interface becomes enabled, hosts may send out
• Router Advertisement: Routers advertise their presence together with various link
message. Router Advertisements contain prefixes that are used for on-link
address. Neighbor Solicitations are also used for Duplicate Address Detection.
address change.
• Redirect: Used by routers to inform hosts of a better first hop for a destination.
54 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Advertisement packet to announce its availability. In order to keep track of available routers, a
host receives Router Advertisements from all routers, building a list of default routers. These
Router Advertisements are frequently generated, so those hosts can always be updated about
their presence every few minute. However, hosts don’t receive enough announcements from
the routers to the point of relying on an absence of advertisements to detect router failure. For
IPv6 incorporates a variety of functions that make it possible to use the Internet to deliver
video and other real-time data that require guaranteed bandwidth and latency to insure that
IPv6’s Multicasting
IPv6 mandates support for multicast, a function that delivers messages to all hosts that register
to receive it. This function makes it possible to deliver data simultaneously to large numbers
of users for public or private consumption without wasting bandwidth broadcasting to the
entire network. IPv6 also includes facilities to limit the scope of multicast message distribution
Part I. The Technology – May 25, 1998 - 55
to a specific location, region, company or other criteria, thereby reducing bandwidth usage and
providing security.
Bandwidth Reservations
Using the mandated RSVP functionality, users can reserve bandwidth along the route from
source to destination. This makes it possible to provide video or other real-time data with a
Packet Prioritizing
Packets will be assigned a priority level, insuring that lower priority packets do not interrupt
Jumbograms
IPv6 will support packet sizes of up to 4 billion bytes. This will make the transmission of large
packets easier and insure that IPv6 will be able to make the best use of all available bandwidth
Currently, users or network managers must manually configure each machine with its address
and other network information. This is a confusing, error-prone task for many individual users
and a time consuming chore for network managers. It also requires that to change network
addresses, every machine must be manually reconfigured. IPv6 solves these problems by
including mechanisms to allow hosts to discover their own addresses and to automate address
changes.
Address Discovery
IPv6 allows hosts to learn their own address from a local router during boot-up, eliminating
the need to manually configure addresses on each host. IPv6 also specifies procedures for a
host to allocate an address for local site communications and for small sites without routers.
IPv6 mandates support for Dynamic Host Configuration Protocol (DHCP) which allows the
host to obtain all relevant network information from a local router during boot-up.
Part I. The Technology – May 25, 1998 - 57
Because the router in IPv6 distributes network addresses, changing the address of the network
requires only updating the router. In addition, all addresses include lifetimes, enabling the
router to specify a time to switch addresses, insuring a smooth, error-free transition to a new
address.
IPv6 will incorporate algorithms to automatically forward packets from a base address to any
other address. This will allow users connected to the Internet from any location, even mobile
IPv6 specifies dead neighbor and dead gateway detection algorithms insuring that all
implementations of IPv6 are able to efficiently detect problems and reroute packets when
necessary.
IPv6 also enables applications to specify how to treat unknown options. This provides IPv6
with the flexibility to add new options in the future without necessitating those existing
As opposed to the capability to choose only loose (automatically determined) or strict (user
specified) routing for the entire path in IPv4, in IPv6 users can specify loose or strict routing
for each hop along the path. IPv6 also includes the flexibility to include additional routing
Configurability of features
The IPv6 protocol for hosts and routers to discover neighboring machines is called neighbor
discovery. IPv6 allows all the features of neighbor discovery such as retries and time-out
capability to optimize neighbor discovery for the needs and constraints of each individual
network.
Network performance is directly related to routing. The amount of traffic that leaves the local
network (external traffic) compared to the amount of traffic that occurs on the network is
constantly increasing. This is due in part to the demand for more services, especially graphics
based services. Speeds for LANs and WANs have also increased to hundreds of megabits per
Part I. The Technology – May 25, 1998 - 59
second, with gigabit networks not far in the future. Routers need to perform their functions of
There are fewer fields in an IPv6 packet header than in IPv4. To increase the speed, at which a
packet travels past a router, separate optional headers are placed between the IPv6 header and
the transport layer header. Most of these are not examined or processed by routers along the
packet’s path, which simplifies and speeds up router processing. Additional optional headers
are also easier to add, making IPv6 more flexible than IPv4. Because the IPv6 packet header
IPv6 does not fragment packets as they are routed as IPv4 does. Instead, packet fragmentation
and reassembly will be done exclusively in the communicating hosts, thus reducing the
workload for intermediate routers. When the transition to IPv6 is complete, the Internet will
consist of only networks with Maximum Transmission Units (MTUs) equal to or larger than
576 bytes.
Performance with IPv6 will be optimized by the use of flow labels. The flow source specifies
in the label any special service requirements from routers along a path, such as priority, delay,
or bandwidth. All packets in the sequence carry the same details of this information in the
flow label to reserve the type of service they need from intermediate routers. Such a need
would be for transmitting video, or limiting traffic a specific computer or application sends to
avoid congestion.
60 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
With IPv6, a flow can be one or multiple TCP connections, and a single application could
generate a single flow or multiple flows. An example of a single flow would be a text page,
Packets that share a flow label also share path, resource allocation, discard requirements,
accounting, and security attributes. The flow label is defined before transmission.
Virtual LAN (VLAN) is an integral feature of switched LANs. To understand and define
with each other as if they were on a single LAN. An example of it is Microsoft’s technical
support. Part of Microsoft’s technical support is outsourced to other companies all over the
country. For security and confidentially issues, these company’s technicians are part of
individual domains, trusted by Microsoft’s primary domain so they can access the technical
support database at Microsoft. Although being based on different cities all over the world,
these ‘foreign’ domains and users all become part on a single network.
But let’s take a look at what kind of LANs we have available and how VLANs and IPv6 can
Router-based LANs
As router-based LANs are being replaced by switched LANs, Virtual LANs (VLANs) are
becoming an important network management tool. VLANs are being deployed for traffic and
The problem with router based LANs, as shown on figure 1.16, is that they suffer from
bandwidth and latency problems, thus being replaced by switched LANs. But simple switches
leave a vacuum regarding network control and traffic management functionality, which is
necessary to operate our networks. Virtual LANs (VLANs) provide efficient tools for
controlling traffic and network management, which are making them an important component
Figure 1.16
Typical problems with router based LANs are few. On a 802-type LAN, for example, a shared
medium network always requires all nodes to share the bandwidth of the physical link,
limiting effective utilization of the physical link. Thus, it is common for a Ethernet-based
LAN to achieve only 30%-40% efficiency, since all nodes were in a single collision domain.
62 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Switched-based LANs
every node on the LAN. Each node has it’s own wire and all bandwidth is dedicated to the
node, which eliminate the need for sharing it with all other nodes on the same LAN, is with
the router-based model. Since each node is in it’s own collision domain, as shown on figure
1.17, Ethernet efficiencies can achieve more than 95%, promoting almost a collision-free
LAN.
Figure 1.17
This Ethernet efficiency is possible because a usable bandwidth within a switched LAN is
Therefore, the volume of unnecessary broadcasts and multicasts the node receives limits this
Virtual LANs (VLANS), as exemplified on the Microsoft’s example above, are flexible,
Figure 1.18
The network fabric makes sure that all nodes within the VLAN are communicating within a
common broadcast domain transparently without node’a awareness. Figure 1.19 shows the list
of components of a VLAN.
Figure 1.19
64 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
VLAN’s components.
• Walks away of the typical Ethernets LANs, characterized by a single collision and
broadcast domain
• Resolves the problem of eliminating one broadcast domain, which bridges were
not able to resolve when breaking up Ethernet LANs into multiple collision
domains
• Allowed for a cheap, inexpensive and fast solution for the job routers do in
• Enabled switches to break Ethernet into multiple collision domains and use it
(VLANs) to contain broadcasts within each domain in a fast, cheap and simple
way.
The VLAN Bridge, which implements Virtual LAN, provides the following benefits.
• Broadcast containment
Part I. The Technology – May 25, 1998 - 65
• Security
• Easy administration
When using VLANs for broadcast containment, as depicted by figure 1.20, you can limit
Figure 1.20
IP Multicast traffic, as shown on figure 1.21, can easily flood switched networks and VLANs
can be a the best, if not the only effective solution for resolving the ever increasing demand on
• Video training
• Video conferencing
Figure 1.21
multicasting.
VLANs can also resolve uncontrolled proliferating IP multicasting traffic, as shown on figure
• Having switches using IGMP to snoop and determine which systems want to see a
multicast
Figure 1.22
multicasting.
Figure 1.23
68 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Jumonville presentation.
Figure 1.24
Figure 1.25
Figure 1.26
What’s Next
This chapter discussed some of the main limitations of IPv4 as well as a brief comparison
between IPv4 and IPv6 addressing. Next chapter, “Understanding RSVP, IP Multicast and
ATMs,” provides you with the fundamentals of RSVP, IP Multicast and an overview of ATM,
Chapter 2
and ATMs
The Resource Reservation Protocol (RSVP) is the reservation protocol of choice on the
Internet. Multicast applications, such as high-speed video transmission, which will definitely
depend on a protocol like RSVP in order to guarantee high levels of what is called "Quality of
Service" (QoS), voice over IP (VoIP) and many other multimedia applications all rely on
RSVP. Many of these new applications require a different approach to routing and resource
allocation than do generic data applications. RSVP is different from many IP protocols
they want to receive as well as the amount of bandwidth they are prepared to reserve or pay
Following the trend, Quality of Service (QoS) requirements has increased considerable with
the advent of multimedia applications. The reason for it is that multimedia applications require
reliable and fast transmissions, otherwise, what the recipient will get can be a bunch of
“chopped” and delayed set of packets, caused by the way lower level protocols, such as
Ethernet, ATM and Token Ring, handle packets to IP, forwarding them to their destinations,
which are prone for delays or “bursts” in the packet delivered. This can happen to all routed
IP network, because every router in the data path examines each packet of information.
Usually you will find several intermediate routers between the source and the destination,
joining the different networks. As the packet "hops" from one router to another, the IP
protocol in each router decides which is the fast path for that packet to go next, which can
easily delay the arrival of a packet at its destination, and many times the packet will never
make it.
For most data applications, this "bursty" delivery is acceptable and lends itself to high
performance and high availability, but for multimedia applications, involving both voice
and/or video, the traffic must have to be "streamed" or transmitted continuously, and not in
bursts. The challenge for the networking community is to accommodate these different
It was to meet this challenge that IETF developed the Resource ReserVation Protocol (RSVP).
RSVP is an end-to-end protocol compatible with current TCP/IP based networks, capable to
provide the means to support a special Quality of Service for multimedia applications and
others that needs it, while maintaining current internetworking methods, preserving, therefore,
Understanding RSVP
The RSVP protocol operates on top of IP, in the transport layer. It is a control protocol
Message Protocol) designed to operate with the current and future unicast and multicast
routing protocols. Some applications are suited for one Receiver while it is desirable with
other applications to have the potential to send to more than one Receiver without having to
• Sender – responsible for letting the Receiver know there is data to be sent and
• Receiver – responsible for sending out a notice to Hosts or Routers so they can
• Hosts or Routers – responsible for setting aside all the proper resources.
Once all the above steps are completed, the Sender can successfully send the data.
RSVP, if completely implemented, is intended to provide QoS over any media, even if the
media itself provides none. But RSVP allows only a much less granular, more generic QoS
guarantee. The present definition of RSVP includes a number of stations, all connected to a
switch that handles local traffic, which in turn is connected to a router, which provides WAN
access. The RSVP definition is concerned primarily with the router, which means that when
one router wants to talk to another, RSVP can request a certain quantity of bandwidth. But the
Internet allows connections over various types of routers, most of which don’t support RSVP.
Further, RSVP does not yet apply to the station or the switch, meaning that an Ethernet card
doesn’t know anything about QoS, or limiting packet release to assure that it doesn’t go over
its allocation. These things have to be done in software via packet schedulers. There is no plan
or infrastructure for putting RSVP on the switch. With ATM, every component in the line is
mechanism for tracking and billing for quality of service either, which is a major concern for
With RSVP, the application is able to provide advanced notification about the network
resources it will need. By granting the reservation, the affected hosts and routers commit to
providing these resources. If the router is not capable of providing them, or the resources are
not available, the host or router can refuse the reservation. The application is notified right
away that the network cannot support it, thereby avoiding the time and cost of a trial and error
approach.
Receivers, are identified in the IPv6 header by a "flow label." Prior to sending out a
flow, the Sender transmits a "path message" destined for the Receiver. The
message contains the source IP address, destination IP address and a flowspec. The
flowspec, made up of the rate and delay bounds for the flow, is the Quality of
Service that the flow requires. The path message is routed to the Receiver by the
• Reservations - The Receiver is provided with the path message and is then
responsible for making the actual reservation. With the Receiver making the
in order to assure reservations are still in place and that any "moves or changes" on the
network are aware of the reservation, RSVP incorporates an approach called "soft state." This
term is used because RSVP paths and reservations are considered tentative. Resources are put
aside when a router accepts a reservation, but if a flow is not received, it will time out and free
up its resources. With the soft state approach, the Sender periodically sends its path message
and the Receiver continues to send its reservation request in order to refresh any time-outs or
• RSVP makes resource reservations for unicast and multicast Receivers using a soft
• RSVP is uni-directional.
• Receivers in RSVP initiate and maintain the resource reservation for a flow.
Part I. The Technology – May 25, 1998 - 77
• RSVP is not a routing protocol, but relies upon routing protocols for delivering
flows.
The RSVP area is developing very quickly, counting with efforts making on the standards.
Cisco is at the moment the major player promoting RSVP, working very closely with the IETF
to resolve its known limitations. You can count on RSVP becoming a requirement for
IP Multicasting
Traditional Internet applications usually operate between a sender and a receiver. But
transmission of multimedia training, transmission over networks of live TV or radio news and
so forth.
tremendously increases the traffic and the overhead on the network, as illustrated on figure
78 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
2.1. The proposed solution for this problem has been IP Multicast, which is an extension of IP
standard-based solution with broad industry support. IP Multicast, which has been under
Figure 2.1
Broadcast messages sent over a network generates bottlenecks and poor performance
In the IP multicast scheme, each individual multicast group can be identified by a particular
class D IP address, as shown on Table 2.1. Each host can register itself as a member of
selected multicast groups through use of the Internet Group Management Protocol (IGMP).
Thus, a whole group of recipients, members of this multicast group session, are able to receive
the message, which is only broadcasted to the members of the group. Thus, only this group
will benefit from this message and be affected by the traffic it generates on the network.
The remain users on the network won’t even take a notice of it as IP multicast technologies
address the needed mechanisms at different levels in the network and internetworking
figure 2.2, where only one copy of the same data (D) is “multicasted” to Receivers 1, 2, and 3
in a shared conferencing application. If you compare figure 2.1 with 2.2 you will note the
The set of hosts listening to a particular IP multicast address is called a host group. A host
group can span multiple networks. Membership in a group is dynamic - hosts may join and
Well-Known Purpose
Class D Address
(NTP)
Figure 2.2
IP Multicast Benefits
One of the immediate benefits of IP multicast is the cost saving in network and server
resources. But the technology also enables a large amount of new applications that were not
Also, with IP multicasting, network administrators can manage network growth and control
costs much more efficiently, as IP multicast is much more cost-effective than the other
alternatives usually deployed for increasing LAN and WAN capabilities and bandwidth. Thus,
IP multicast can readily help you increment network response time, as it can immediately help
alleviate network congestion caused by existing applications that are inefficiently transmitting
to groups of recipients, and take advantage of the many applications already in place.
Another great attribute of IP multicast is its scaleabiltiy, which enables it to be scaled as the
number of participants and collaborations expand. Adding one or few more users will not
reduced load on the sending server, which no longer has to support many sequential or
Part I. The Technology – May 25, 1998 - 81
concurrent unicast sessions, and it’s fully compatible with new IP protocols and services, such
Using IP Multicast
initiative, Intel Corp. deployed IP Multicast on a 4,000-node Oregon site in early 1996. Intel
conferences or executive presentations and product launches from their desktops. Toys R Us
Inc. is another example giving by Stardust, indicating their use of IP Multicast file transfer
software to send software updates to 900 store locations. Before using IP Multicast, the files
had to be sent over its VSAT (very small aperture terminal) nationwide network one file at a
time. Because this used up so much bandwidth, it had to be performed at night. The IP
IP multicast technology is very important for the growth of voice over IP (VoIP) applications,
as the demand for audio, video and data streams over a network is growing very fast.
Applications such as desktop video and audio conferencing, collaborative engineering, shared
simulations are becoming a necessity in some industries and environments. In a very near
82 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
seating at their desks within a company will become reality, through the use of IP multicast.
Stored data streams, such as for the updates of kiosks and web caches, video server to video
server updates, corporate announcements to employees, etc., also will depend upon IP
Multicast routers to keep track of group membership on each of the router’s physically
attached networks use IGMP (Internet Group Management Protocol) messages. The following
rules apply:
0 A host sends an IGMP report when the first process joins a group. If multiple
processes on a given host join the same group, only one report is sent, the first time a
process joins the group. This report is sent out on the same interface on which the
1 A host does not send a report when processes leave a group, even when the last
process leaves a group. The host knows that there are no members in a given group,
2 A multicast router sends an IGMP query at regular intervals to see if any hosts still
have processes belonging to any groups. The router must send one query out on each
Part I. The Technology – May 25, 1998 - 83
interface. The group address in the query is 0 since the router expects one response
from a host for every group that contains one or more members on the host.
3 A host responds to an IGMP query by sending one IGMP report for each group that
Using these queries and reports, multicast router keeps a table of which of its interfaces have
one or more hosts in a multicast group. When the router receives a multicast datagram to
forward, it forwards the datagram (using the corresponding multicast link layer address) out
only the interfaces that still have hosts with processes belonging to that group.
*****Start TIP*****
For additional, and more in-depth information about IP multicasting, please refer to my book
co-authored with Kitty Niles, entitled “IP Multicasting: Concepts and Applications,” also
published by McGraw-Hill.
*****End TIP*****
84 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Technology
Asynchronous Transfer Mode (ATM) technology is playing a major role in the development
scalable bandwidths, higher performance and Quality of Service (QoS) to LAN and WAN
networks, enabling multimedia applications, such as voice and video over IP. But, as figure
Figure 2.3
ATM Fundamentals
ATM is the transport protocol selected for the broadband integrated services digital network
(B-ISDN). ATM combines characteristics of circuit switched networks (e.g., the telephone
network) and packet switched networks (e.g., the Internet) to yield a network capable of
supporting digital data, voice, and video for synchronous and asynchronous delivery.
International standards bodies, technology groups, and Fora are defining B-ISDN and ATM.
Part I. The Technology – May 25, 1998 - 85
Contributors to the definition of B-ISDN and ATM include equipment manufacturers, service
The ATM Forum is generally perceived as the core technical body with respect to ATM
standards and technical definition, as outlined on figure 2.4. It is more appropriate to define
the ATM Forum as the body, which coordinates the interoperability and adoption of ATM
between existing standards bodies and Fora. In fact the ATM Forum does NOT produce
ATM standards - the ITU-T is the organization, which produces international standards
(recommendations), as depicted on figure 2.5. The ATM Forum works closely with groups
such as the Frame Relay Forum and the Digital Audio Video Council, to promote
Figure 2.4
Figure 2.5
Since the ATM Forum is in place to accelerate the implementation and acceptance of ATM, it
does not generate international standards. Standards related to broadband ISDN and ATM (B-
ISDN’s transport method) are defined in the international telecommunications union - namely,
the ITU-T group (formerly the CCITT). Digital transmission standards are included in the G-
series recommendations - SDH specifications are included here (SONET is the ANSI standard
defined in the US). ISDN and B-ISDN standards are included in the I-series
recommendations - these include the ATM and AAL specifications. The Q-series
*****Start TIP*****
The recently overhauled ATM Forum web site, as shown on figure 2.6, gives all interested in
ATM the opportunity to track progress of ATM standards and activities. In addition, all
COMPLETED technical specifications may be downloaded from this site - FREE of charge.
*****End TIP*****
Figure 2.6
The current technical working groups in the ATM Forum are listed in figure 2.7. The status of
specification development in these groups is included at the ATM Forum web site under
technical specifications.
Figure 2.7
The ATM forum technical working groups create technical specifications in the general areas
specified in figure 2.8. Physical layer specifications include 25.6 Mbps over UTP, 155 Mbps
over multimode fiber, 51 Mbps over plastic optical fiber, and others. Testing specifications
are generally in the form of Pics Proforma - giving equipment providers a guideline for testing
Figure 2.8
Private and public network interface specifications include the user to network interface
(UNI), the private network-to-network interface, and the broadband inter-carrier interface.
ATM service specifications include LAN emulation, multi-protocol over ATM, voice
ATM is compatible with existing physical networks such as twisted pair, coax and fiber
optics, because it isn’t design-limited to a specific type of physical transport. To its advantage,
unlike conventional LANs, ATM has no inherent speed limit. In contrast, when Ethernet
speed was increased from ten to 100 megabits per second, its architecture required a reduction
in the length of Ethernet segments from 2,500 meters to 250 meters. Similarly, Token Ring
has gating factors on its speed. But with ATM, there’s nothing in the architecture that limits
speed. An ATM network can operate as fast as a physical layer can be made to run.
Furthermore, while 100-megabit Ethernet and other high speed networks can provide
comparable bandwidth, only ATM can provide the QoS guarantees required for confidently
deploying real-time telephony, video streaming, smooth videoconferencing, and other no-
delay voice and video applications. QoS is so vital to the deployment of multimedia
applications over IP that a number of initiatives are underway to provide QoS support for
Part I. The Technology – May 25, 1998 - 89
TCP/IP based networks, including the RSVP protocol specification discussed earlier in this
chapter.
Private and public interface specifications include public and private UNI, P-NNI, and B-ICI,
as shown on figure 2.9. The user to network (UNI) document specifies how a user maintains
document specifies how a private ATM network node signals connections through the
network and maintains a routing hierarchy between ATM network nodes. The broadband
inter-carrier interface (B-ICI) document specifies how public network edge node signal and
Figure 2.9
ATM is simply the transport mechanism chosen for the broadband ISDN network. The goal is
to offer data, voice, and video services. Services imply end-to-end application connections,
90 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
which transfer digital information, namely IP data, voice, and video, as depicted on figure
2.10.
Figure 2.10
For example, the LAN emulation and multiprotocol over ATM services enable transfer of data
traffic over an ATM infrastructure. Voice and telephony over ATM enable use of an ATM
infrastructure for transmitting real-time voice. The MPEG over ATM function allows for
*****Start NOTE*****
Have you heard about the Anchorage Accord? This is an attempt to ease fears that ATM
specifications and addenda were preventing vendors from reasonably building interoperable,
and backward compatible ATM solutions, as shown on figure 2.11. To that end, The ATM
Forum penned an agreement, which includes a large set of specifications, which together
*****End NOTE*****
ATM network design and solution requires you to address few important components, as
Figure 2.11
Figure 2.12 provides a list of ATM network client devices. But note that this is not an
exhaustive list of client devices. There are other ATM attached devices that perform
adaptation such as the cells in frames attachment device (CIF-AD), which works in concert
with Ethernet clients to provide an ATM over Ethernet function, which will be discussed in
device that performs no adaptation (ATM WG switches are used in place of these devices
today).
Figure 2.12
Figure 2.13 indicates the types of devices that support client and server software function
associated with ATM data protocols. Figure 2.14 is a rundown of the many protocols
supported by ATM technologies, which includes but are not limited to:
3 CIP classical IP
Note that CIP, LANE, and MPOA follow a client server model where the ATM network
provides ARP, multicast, and routing services. RFC 1483 is not a protocol - but an
encapsulation method. ATM network provides only signaling (via GSMP) for IP switching
clients.
94 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 2.13
Figure 2.14
In the VLAN model, as depicted on figure 2.15 and outlined on figure 2.16, clients are
members of VLANs.
Figure 2.15
Figure 2.16
The VLAN model, as depicted on figure 2.16, topologically is simpler than a routed model
because there are no intermediate devices between the LAN access and the backbone.
ATM LANE is an ATM-based VLAN solution. This is a good solution for networks, which
are currently, bridged networks. LANE may prove to be inefficient if there is too much inter-
VLAN (emulated LAN) communications - since all inter-VLAN traffic must travel through a
communications.
ATM MPOA is another ATM-based VLAN solution. Actually, LANE is a subset of MPOA -
MPOA with no routing services is LANE. MPOA adds cut-through routing between LANE
VLANs. Cut-through in this case means that the MPOA clients can establish connections
with other clients on different emulated LANs (by learning the route from the MPOA route
service).
In a VLAN model, members of the same VLAN (emulated LAN) can establish connections
amongst themselves directly by the very nature of the LANE protocol (members of the same
ELAN are associated with the same LANE servers), as shown on figure 2.17.
Communication between VLANs requires routing services. Routing services are either
route services provides cut-through relief for LANE inter-VLAN traffic by forwarding routing
96 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
information to clients. With this routing information clients are able to establish direct
Figure 2.17
An interesting note is that even though LAN Emulation requires an one-armed router for inter-
ELAN communications, if such traffic is limited a single one-armed router is sufficient. The
implication is that one could guarantee a single (1) router hop for inter-ELAN communication
- so why bother with cut-through if you are only avoiding a single router hop for minimal
traffic.
In the routed model, as shown on figure 2.18 and outlined on figure 2.19, clients are members
of subnets. Routed models use layer 3 networking concepts to build multicast domains - that
is, subnets. RFC1483 encapsulation allows for adding capacity to an existing routed network
by adding ATM links between routers and establishing (a mesh of) PVC’s over these links.
Part I. The Technology – May 25, 1998 - 97
Figure 2.18
Figure 2.19
IP switching adds ATM switching to a routed backbone and also brings dynamic cut-through.
Dynamic cut-through in a routed backbone means that the IP switching protocol automatically
establishes a path through the ATM switching cloud and between the ingress and egress
In figure 2.20, a hop-by-hop routing path has been established through routing configuration
(say an OSPF path). This path is associated with communications between subnet x and
subnet y. IP switching (or MPLS) establishes another more direct path which bypasses
Figure 2.20
IP switching protocols differ mainly in how and when the decision is made to establish a cut-
through path. Ipsilon and many partners currently ship a solution like this. Other proposed
solutions include Cisco’s Tag switching and IBM’s Aggregate route-based IP switching
(ARIS).
In summary, LANE, MPOA, and IP switching all include methods for establishing edge-to-
edge connections through the ATM network. Since this is the case, the performance through
the ATM network is identical regardless of the protocol (once a cut-through path is
established). Thus, one can implement the edge strategy that most well suits the desired
network behavior whether that is router-based or VLAN-based (and get the same benefits of
cut-through). Figure 2.21 provides a summary of ATM’s network services characteristics and
Figure 2.21
Figure 2.22
ATM’s Connection-Oriented
LAN architecture, whether Ethernet, token ring, or FDDI, share certain characteristics. Each
station is connected to the network via an adapter card, which has a driver, above which is a
protocol driver, such as TCP/IP. In traditional LANs, such as Ethernet, the driver protocol is
connectionless, meaning that the protocol driver simply provides a packet with a source
address and a destination address and sends it on its way. Being joined by a common medium,
each station will see the packets of data put on the wire by each of the others, regardless of
whether the packet is passed sequentially, as in a ring topology, or broadcast, as with Ethernet.
The primitive from the station to the wire, or from the protocol to the adapter, is simply “send
packet.”
Once the packet has been sent, according to the specifications of whatever LAN is being used,
the adapter knows that the packet is visible to all stations on the network. Each station has an
adapter card, which processes the packet and examines the destination address. If the address
applies to that machine, the adapter does a hardware interrupt and accepts the packet. If not,
the adapter parses it. Again, this is called connectionless because no logical connection to the
recipient address was made, the packets were simply addressed and put onto the network.
100 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
A LAN network such as Ethernet offers very few services, because all an Ethernet card can do
is take a packet and send it. Being connectionless, it can provide no guarantees or similar
features. For example, it can’t determine the status of the target machine. This is why
developers rarely write applications directly to Ethernet. Rather, protocol drivers are used to
enter sequence numbers, verify packet arrival (retransmitting, if necessary), partitioning big
messages into smaller ones, and such—with all of these services adding time to the
transmission, and with none of them able to provide end-to-end quality of service guarantees.
However, ATM is complex. Even though ATM cells and cell switching make easier for the
development of hardware intensive, high performance ATM switches, its deployment requires
a very complex and intensive integration of software and protocol infrastructure. This still
specially when linking individual ATM switches into a network, as well as internetworking it
with the vast installed base of existing local and wide area networks.
*****Start TIP*****
ATM cells have a fixed length of 53 bytes. By using fixed-length cells, the information can be
The ATM cell is broken into two main sections, the header and the payload, as shown on
figure 2.23. The header (5 bytes) is the addressing mechanism and is significant for
networking purposes as it defines how the cell is to be delivered. The payload (48 bytes) is the
portion that carries the actual information—either voice, data, or video. (The payload is also
*****End TIP*****
Figure 2.23
ATM cell is broken into two main sections, the header and the payload.
This section does not cover all the aspects of ATM technology, as there are already great
books available on the market covering the subject. For more information, check the
bibliographic reference at the end of this book. I am assuming you have at least a basic
knowledge about ATM layer protocols and cell formats, as well as the operation of ATM
switching systems. ATM is discussed here in the context of carrying IP transmissions, more
specifically voice over ATM, as it’s discussed in more details on chapter 3, “IP
Superhighway.”
102 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
links or interfaces. These ATM switches support two kinds of interfaces: user-network
interfaces (UNI), which connects ATMs end-systems such as hosts, routers, etc., to an ATM
switch, and network-node interfaces (NNI), which is any physical or logical link across which
two ATM switches exchange the NNI protocol, as shown on figure 2.24.
Figure 2.24
Fundamentally, ATM networks are connection oriented, requiring virtual circuits to be set up
across the ATM network before any data can be transferred. There are two types of ATM
circuits:
0 Virtual paths, which are identified by virtual path identifiers (VPI), is a bundle of
virtual channels, switched transparently across the ATM network on the basis of the
common VPI.
1 Virtual channel, which are identified by the combination of a VPI and a virtual
channel identifier (VCI), have only local significance across a particular link, and are
Although ATM switch implementations are complex, its basic operation is very simple, as
1 It looks up the connection value in a local translation table to determine the outgoing
ports of the connection and the new VPI/VCI value of the connection on that link
2 It then retransmits the cell on that outgoing link with the appropriate connection
identifiers.
Figure 2.25
The switch operation is again very simple, as you can see on figure 2.26. External mechanisms
are responsible for the set up of the local translation tables prior to the transmittal of any data.
The manner in which these tables are set up determine the two fundamental types of ATM
connections:
104 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
between an ATM source and destination ATM system are programmed with the
interaction needed to set up PVCs and, as such, are likely to be much more widely
used. All higher layer protocols operating over ATM primarily use SVCs, and it is
Figure 2.26
A diagram of ATMs two types of connections: Virtual Circuit and Virtual patch switch
ATM signaling is initiated by an ATM end-system that desires to set up a connection through
an ATM network, as shown on figure 2.27. Signaling packets are sent on a virtual channel,
VPI=0, VCI=5. The signaling is then routed through the network, from switch to switch,
setting up the connection identifiers as it moves along, until it reaches the destination end
system. The latter can either accept or confirm the connection request, or reject it, causing the
Figure 2.27
There are two fundamental types of ATM connections, as illustrated on figure 2.28:
multiple destination end-systems. The ATM does cell replication within the network
Figure 2.28
These types of ATM connections do not have any analog to multicasting or broadcasting
capabilities so common in many shared medium LAN technologies such as Ethernet or Token
Ring. In such technologies, multicasting allows multiple end systems to both receive data from
other multiple systems, and to transmit data to these multiple systems. Such capabilities are
easy to implement in shared media technologies such as LANs, where all nodes on a single
106 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
LAN segment must necessarily process all packets sent on that segment. In an ATM to
connection. However, this alternative cannot be implemented if you are using the ATM
Adaptation Layer (AAL) 5, one of the most common, used to transmit data across ATM
networks.
Unlike AAL 3/4, with its Message Identifier (MID) field, AAL 5 does not provide for the
interleaving of cells from different AAL5 packets on a single connection within its cell format.
Thus, all AAL5 packets sent to a particular destination across a particular connection must be
received in sequence, with no interleaving between the cells of different packets on the same
connection. Otherwise, the destination reassemble process would not be able to reconstruct the
packets.
This is why ATM AAL 5 point-to-multipoint connections can only be unidirectional. If a leaf
node were to transmit an AAL 5 packet onto the connection, both the root node and all other
leaf nodes would receive it. However, at these nodes, the packet sent by the leaf could well be
interleaved with packets sent by the root, and possibly other leaf nodes; this would preclude
the reassemble of any of the interleaved packets. Clearly, this is not acceptable.
Nevertheless, ATM does require some form of multicast capability, since most existing
protocols, being developed initially for LAN technologies, rely upon the existence of a low-
Part I. The Technology – May 25, 1998 - 107
level multicast/broadcast facility. Therefore, three methods have been proposed for solving
this problem:
multicast group, and each node is given a unique VCI value within the VP, allowing
interleaved packets to be identified by the unique VCI value of the source. However,
this mechanism requires a protocol to uniquely allocate VCI values to nodes, but this
1 Multicast Server, where all nodes wishing to transmit onto a multicast group set up a
illustrated on figure 2.29. This multicast server is then connected to all nodes wishing
the packets, confirming they are serialized, and retransmiting them across the point-
to-multipoint connection
Figure 2.29
shown on figure 2.30, becoming a leaf in the equivalent connections of all other
nodes, enabling all of them to both transmit to and receive from all other nodes.
Figure 2.30
each group, where N is the total number of transmitting nodes within the group, while the
multicast server mechanism requires only two connections. It also requires a registration
process for telling nodes that join a group what the other nodes in the group are, so that it can
In light of all, as I write this chapter, we don’t have a recommended solution for the use of
ATM for multicast, which affects its ability to carry voice over IP successfully. But higher
layer protocols within ATM networks use both the latter two solutions for multicast, as it’s
discussed in more details on chapter three, “IP Superhighway.” This is one example of why
particularly those developed for LANs, implicitly assume a network infrastructure of a shared
Part I. The Technology – May 25, 1998 - 109
*****Start TIP*****
Since this book proposes to discuss Voice Over IP, I decided not to cover ATMs any more
than the necessary to understand how IP Multicasting and VoIP rely on it. To further discuss it
would be out of the scope of this book. Thus, for additional information on ATMs, such as
ATM signaling and addressing, I recommend Cisco’s Website, where you will find a variety
http://cio.cisco.com/
*****End TIP*****
What’s Next
This chapter introduced the fundamentals of the RSVP protocol, IP Multicasting and ATM
technologies, as these technologies are key on the development and deployment of voice over
IP technologies and services. Next chapter, “IP Superhighway,” introduces the basic concepts
of voice over IP, and its most used H.323 standard. It also discusses other standards and
110 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
technologies such as audio codecs, IP over ATM, voice over ATM, the emulation of
traditional T1/E1 Trunks, IP over SONET and voice over SONET, and IP and voice over
frame relay. Further, this chapter discusses Layer 3 switching and gigabit Ethernet as well as
Chapter 3
IP Superhighway
Voice over IP
Not so long ago the Internet used to run on phone systems, but now, phone systems are
running on the Internet. Voice and data consolidation can bring tremendous savings in
technology is down right, the savings can be very significant, amounting up to 90 percent, and
many times enabling a full return of investment (ROI) in less than a year. Furthermore, the
Part I. The Technology – May 25, 1998 - 113
savings do not stop here, as the on-going costs to maintain voice over IP is much less than the
Since 1980s companies are carrying data traffic on the excess bandwidth associated with the
time division multiplexed (TDM) voice networks that were implemented as a lower cost
alternative to the public switched telephone network (PSTN). Thus, this concept is not new,
but with the emergence of client/server networking and the Internet, this voice-based
communications paradigm began to change as data traffic started to consume a far greater
percentage of network bandwidth. At first, Frame Relay circuits for data communications
were proliferating, as they were much cheaper than leased lines. However, Frame Relay at
that time was not well suitable for voice communication, so dedicated T1 remained the
During the mid-90’s data and voice began to merge, propelled by the advances in compression
technology, but this time on Frame Relay networks. The ubiquitousness of routed IP
networks, and the desires to trim telephony costs are the major driving forces for the
deployment of voice over IP (VoIP). One of the major advantages of VoIP technologies is
that they provide a way to leverage existing network resources and to dramatically reduce, or
For instance, if you were to have an IP network in your company and branches throughout the
country and overseas, you could place a voice gateway between the network routers and the
PBXs at each of these sites, and than piggyback voice traffic on the Frame Relay WAN link
between these cities. The immediate advantages here are huge, as you would start paying local
call rates for long distance and international calls! Even if you didn’t have a WAN link
available, as long as each of your company’s site had a local point of presence (POP) for
router-based Internet connectivity, the voice call could still go out over the Internet. Your
phone charges here, just like with Internet connections, would be only for the monthly service
Of course, the advantages of deploying VoIP are evident. The issues on rather deploy VoIP or
not relays mostly on the technical implementation issues and quality of the service than on
return of investment and cost benefit analysis. Thus, the goal when implementing VoIP is to
find a technology that supports telephony -- including both voice and fax -- over a variety of
Again, when conducting your needs assessments, make sure to include both voice and fax
services, as fax is still a major business medium, regardless of e-mail. This can be a little trick,
as gateways need to be able to identify a call as voice or fax on the fly to eliminate the need for
When deciding on the protocol supported, think ahead. Data communication technologies are
changing very rapidly. Also, some companies may adopt one technology versus another, based
upon their own needs, vendor’s influence or even carrier’s support. Therefore, your gateway
solution should support all the main communication links, such as Frame Relay, ATM, IP, and
the Internet, as they may exist between any two sites. With the flexibility to carry voice over
all of these links, investments can be protected, even while all resources are leveraged. This
approach also empowers you to selectively allocate differing communications networks for
various needs, selecting the one for each application that makes the most sense on a cost and
quality basis.
For example, for voice calls between sites A and B that have both Frame Relay and IP
network links, the Frame Relay channel could be selected for voice because with compression
12 voice channels can be carried in a 64 Kbps circuit. IP would be able to carry only 10 voice
channels on this same circuit. However, between sites B and C that have IP and Internet
channels available, the IP would be favored for voice because quality tends to be higher. But
you might chose to send faxes over the Internet, since they have better integrity in this media
than voice does, and you can also optimize bandwidth of the IP link. To ensure optimal
communications between all sites, the gateway should also feature any-to-any linking so that a
116 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
voice call can come into one site via IP, be switched out over Frame Relay, and reach a final
management system that features a graphical user interface (GUI). This GUI should not only
be easy to use, but should also have the intelligence to prevent invalid configurations from
being established. Check chapter 7, “What to Expect: The Innovators,” where some of the
major vendors and their products and services are outlined and discussed.
Make sure your VoIP implementation has large bandwidth capacity. Also, support for a direct
capable to support multiple digital interfaces, and able to yield as many as 180 ports, on a
single gateway platform, so future growth can be ensured with the ability to link multiple
platforms. Also, make sure that all features and functionality, including support for Frame
Relay, IP, and Internet, voice/fax transparency, billing, and management should be available to
Vienna Systems Corp. has been playing on the VoIP market since September of 1997, when
they announced they first multipoint gateway to be used as a translation mechanism for
Part I. The Technology – May 25, 1998 - 117
sending voice traffic over corporate IP networks. The gateway could also be used to send
voice over the Internet or corporate Intranet. Today, Vienna Systems offers a state-of-art
solution, as shown on figure 3.1, called Vienna.way, which architecture has been designed to
be fully distributed and flexible, making it simple to build new VoIP applications and services.
Figure 3.1
Micom Communications Corp, a division of Nortel, leads the worldwide Frame Relay Access
Device (FRAD), with 83 percent of voice ports in that category deployed, as of the fourth
quarter of 1997. Micom’s Marathon I-FRAD product integrates data, voice, fax and local area
network (LAN) traffic over a single public frame relay permanent virtual circuit (PVC) and/or
private leased line from 9.6 to 1.544 Mbps or 2.048 Mbps. Intracompany phone/fax calls
bypass the Public Switched Telephone Network (PSTN), eliminating long-distance toll
charges and the need for multiple wide-area connections. Figure 3.2 is a screenshot of
Micom’s site.
Figure 3.2
118 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The example of these two vendors gives you an idea of how demanding the VoIP industry is
right now. The driven forces here is the savings companies can save money by consolidating
different types of traffic over a single IP WAN connection. At the same time, they can prepare
for new Internet-based voice applications that are expected to become very popular over the
Because companies' IP-based WANs often have extra bandwidth, the tendency is for Intranets
to start carrying the multimedia traffic at first. By employing products like Vienna.way, users
can make voice calls to and from multimedia-capable PCs, as well as route IP-based voice
traffic to and from standard telephones over the PSTN. By the same token, products such as
Micom’s VoIP gateway can take care of fax transmissions over the Internet, as the fax
transmissions can accommodate seconds-long delays, but voice traffic, which is more delay-
sensitive, should stay with the company's standard 56Kbps and 1.5Mbps leased lines.
Another concept gaining momentum is cable-based VoIP, which are expected to follow the
lead of copper-based Internet telephony by focusing on niche services. But there are still a
number of issues to be resolved. These issues include perfecting gateways between the
Internet and the public switched telephone network, developing techniques to allow Internet
Part I. The Technology – May 25, 1998 - 119
phone devices to ring like conventional phones, and integrating billing and management
On the higher end, cable operators have also been consolidating ownership of systems in
metropolitan areas under ever fewer companies and deploying Synchronous Optical Network
(Sonet) and other technologies to tie headends together. This could form the basis of large-
scale telephone networks in which cable operators provide local access through Internet
telephony and cities are connected via a combination of IP and interexchange carrier networks.
The H.323 standard is an extension of H.320, which addresses videoconferencing over ISDN
and other circuit switched networks and services. H.323 is a logical and necessary extension of
the H.320 standard to include corporate Intranets and packet-switched networks. Because it is
based on the Real-Time Protocol (RTP/RTCP) from the IETF, H.323 can also be applied to
Teleconferencing, specifically the ITU T.120, H.320, H.323, and H.324 suites. The H.323
standard for voice and video communications over packet switched networks such as the
Internet and corporate local area networks (LANs). It applies to multipoint and point-to-point
on
H.225 Specifies messages for call control including signaling, registration and Ratified
H.245 Specifies messages for opening and closing channels for media streams, and Ratified
H.263 Specifies a new video codec for video over POTS. Ratified
G.711 Audio codec,3.1 KHz at 48, 56, and 64 Kbps (normal telephony). Ratified
G.723 Audio Codec, for 5.3 and 6.3 Kbps modes Ratified
*****Start NOTE*****
*****End NOTE*****
The range of networks H.323 can be applied, as well as the ratification of its core components
is very significant, which has been promoting a lot of growth in products and services based
on H.323. Interoperability is also becoming critically important, as more and more H.323
Lucent Technologies, for instance, through Bell Laboratories, contributed significantly to the
development of the H.323 standard, and have been licensing the H.323 protocol to software
developers since January of 1997. Lucent’s objective is to help developers to accelerate the
Intranets. The company is strongly committed to the widespread adoption of H.323, providing
the source code and object code licenses on a variety of platforms for client and server
applications.
Part I. The Technology – May 25, 1998 - 123
*****Start TIP*****
For additional technical information and sound samples, check elemedia’s Website, at URL
http://www.lucent.com/elemedia/.
*****End TIP*****
Vocaltec Ltd. Is another vendor supporting H.323 standard. Around the fall of 1997 Vocaltec
was already demonstrating its Internet Phone interoperability with Microsoft and Intel’s
telephony products. Vocaltec’s acclaimed Internet Phone software now comes with H.323
embeded and it can be fully integrated with Microsoft’s NetMeeting and Intel's Internet Phone
software.
*****Start TIP*****
For more information on the VocalTec product line, visit the company’s Website at URL
*****End TIP*****
124 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
DataBeam's H.323 toolkits provide third-party developers with the components and
capabilities required to rapidly building robust standards-compliant products. The toolkits are
structured to provide developers with the functionality they need for their own product plans.
The DataBeam H.323 Toolkit Series includes the following toolkit offerings:
0 H.323 Core Toolkit - a standards-compliant code base that manages Call Control and
RTP/RTCP functionality
1 H.323 Value Pack - a robust set of added value components for H.323 development
Gatekeeper functionality
*****Start TIP*****
For more information about the H.323 toolkit, check Databeam’s Website at the URL
http://www.databeam.com/h323/info.html
*****End TIP*****
Part I. The Technology – May 25, 1998 - 125
IP over ATM
This section was based in part on RFC 1577, authored by Mark Laubach, from Hewlett-
Packard Laboratories. RFC 1577 is a Standard Track, which defines Classical IP and ARP
over ATM.
*****Start NOTE*****
For further information about this RFC or IP over ATM, Mark Laubach can be reached at
Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA 94304. Or via e-mail at
EMail: laubach@hpl.hp.com
*****End NOTE*****
*****Start NOTE*****
You should refer to the current edition of the "Internet Official Protocol Standards" (STD 1)
for the standardization state and status of this standard. Also, as this section introduces general
ATM technology and nomenclature, I suggest you to review the ATM Forum and ITU-TS
references for more detailed information about ATM implementation agreements and
126 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The deployment of IP over ATM into the Internet is still new and will take some time before it
catches up and gets completed. However, already you can see traditional IP subnet boundaries
being deployed over ATM. The reason for such strategy is outlined below:
technologies, following the same familiar models they’ve earlier deployed. Until
ATM builds credibility, these professionals will always hold back, for obvious
1 Corporate security policies often rely on the security, access, routing, and filtering
capability of IP Internet gateways via routers or firewalls. However, ATMs are not
of the corporation. Thus, ATMs need to provide a better management capability than
2 Although RFC 1577 is almost four years old, standards for global IP over ATM will
Encapsulating IP
The ATM Adaptation Layer (AAL) segments datagrams into cells, passes them to the ATM
network for transmission, and reassembles the cells into datagrams at the destination. It is
roughly equivalent to the data link layer in the OSI 7-layer model. Five different AALs have
been defined; the industry standard for data transmission over ATM is ATM Adaptation Layer
5 (AAL5).
figure 3.3. AAL5 datagrams are variable length, from 1 to 65,535 octets, plus an 8-octet
trailer. ATM packages one IP datagram into one AAL5 datagram, segments the datagram into
cells, and sets the AUU (ATM-layer-user-to-user) parameter in the last cell of the datagram to
mark the end of the AAL5 datagram. Although AAL5 accepts up to 64k-sized datagrams,
TCP/IP restricts this MTU to 9180 octet datagrams--IP will fragment any larger datagrams
Figure 3.3
128 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The trailer is always placed in the last 8 octets of the final cell
The trailer is always placed in the last 8 octets of the final cell. It has 4 fields, only two of
which are currently used--the length and frame checksum fields. The User-to-User Indication
field (UU) and the Common Part Indicator field (CPI) were added after the initial AAL5
TCP over plain ATM doesn’t have a good performance. Actually it can be significantly worse
than standard "packet TCP". This is caused by segmentation of TCP/IP packets at the ATM
layer, since TCP packets are segmented into many 53 byte cells by the AAL5 layer. Any loss
of a single cell causes the effective loss of the whole TCP packet! Also, unlike the traditional
packet-switched networks, when the TCP packet is corrupted by the loss of a single cell, the
rest of the cells are still forwarded to the destination, clogging the congested link with useless
data. This situation can get even worse if any of the factors listed below contributes to the
0 small buffers
Buffer sizes usually range from 256 to 8000 cells (per port) and a buffer size of 1000 to 2000
cells for a small switch (16-32 ports) is common. The use of larger packet or window sizes
increase the number of wasted cells that the congested link transmits when the switch drops a
Thanks to partial packet discard (PPD), which is also known as selective cell discarding
(SCD), if there is a congestion caused by a drop of a cell, the PPD will attempt a traffic control
mechanism by dropping all subsequent cells the packet in question. Once the switch drops a
cell from a VC (Virtual Connection), the switch continues dropping cells from the same VC
until the switch sees the AUU parameter set in the ATM cell header, indicating the end of the
AAL packet.
This type of congestion control can be established on a per-VC basis (for AAL5). PPD
requires the switch to keep additional per-VC information in order to recognize which VCs
are using AAL5 and want to use PPD. It must also maintain a record of which VCs a re
PPD offer limited improvement, however, because the switch begins to drop cells only when
the buffer overflows. The first cell dropped might belong to a packet in which the majority of
cells have already been forwarded. Also, when the switch first drops a cell, the switch does not
look in the buffer for earlier cells that belong to the same packet. Thus cells from the corrupt
packet may be forwarded from the switch even though PPD is in effect.
TCP's default clock granularities represents another limitation of TCP over ATM, as they are
inappropriate for a high-speed ATM network. When a TCP packet is dropped due to
congestion, the retransmit timer gets set to a relatively large value, compared to the actual
RTT. According to simulations done by Romanow and Floyd, a TCP clock granularity of .1
milliseconds works well for TCP over ATM. However, newer versions of TCP like TCP
Reno and Vegas have improved congestion control algorithms that reduce reliance on the
retransmit timer. .
IT professionals, more specifically systems managers directly involved with ATM carrying
voice and data over the same network are very disappointed. After all, the general expectation
portrayed in the ATM industry is that the technology exists, is proven and works. But in
reality, voice over ATM has turned out in a more expensive and inefficient way to carry voice
According to the ATM Forum, voice should be transmitted as CBR (constant bit rate) traffic.
CBR is a method that force customers to reserve bandwidth for voice even when they're not
actually sending it. If you were to send voice as VBR (variable bit rate), even though it may
basis, reducing your costs with voice calls, you are setting yourself up for trouble.
VBR for voice isn't standard yet, even though the ATM Forum is currently evaluating ways to
write it into a revised ATM specification. Thus, be careful with this so called pre-standard
VBR equipment you may find around. The problem the industry is facing with voice over
ATM is more of a specification issue than anything else. Further, any pre-standard
specification is proprietary, and that leaves you in a voice-over-ATM double bind, as it forces
you to invest in standards-based but inefficient CBR products, or sacrifice interoperability for
IP over SONET
If you look at the carrier and the ISP industry, you find that many carriers are looking for ways
to leverage their existing investments in Synchronous Optical Network (SONET) set ups by
offering IP services directly over them and avoiding the bandwidth overhead normally
The market of IP over SONET is growing, so it is the market of IP over ATM, especially
overseas. To me, this fact means that IP traffic is poised to become the ubiquitous dialtone for
a host of services that extend beyond the transport of HyperText Transport Markup Language
(HTML) traffic and flat image files. I believe that the volume of IP traffic will easily take over
voice on carrier networks within the next couple years, and the nature of that traffic is
currently shifting to multimedia applications such as electronic commerce and those delivered
SONET has turned out to be one of the greatest surprises in communications technology of the
80’s. Conceived in 1984 as an optical network standard that would allow disparate network
elements to interface, SONET was addressing a specific concern local carriers had: a
fundamental, mid-span cable meets. If we look at SONET four years ago, we wouldn’t ever
imagined that it would become the big hit it’s becoming today with its huge bandwidth
capacity. Actually, SONET broaden the bandwidth concept so much that the distinctions
between transmission, switching, and CPE become blurred. Further, SONET has the capacity
to combine separate voice, data, and video networks into one broadband, multimedia network,
Don’t be surprise if the gigabit transmission rates of SONET begin to rival the internal bus
speed of many mainframe computers, which will turn SONET networks into a wide-area bus
Part I. The Technology – May 25, 1998 - 133
for the computer, assuming the role of a full-function server in the ideal distributed-computing
environment.
Many industry analysts believe Asynchronous Transfer Mode (ATM) based switching,
combined with SONET-based transport, to be the network solution that will eventually
dominate. Local and interexchange carriers for network expansion in favor of SONET are
abandoning T-3. In times of such a data communication technology blur, make sure you stick
SONET Benefits
SONET offers tremendous benefits to both telephone carriers and end users. It was conceived
and created as a network, not simply a transmission path or piece of network gear.
communication needs:
0 Bandwidth Administration
0 Real-Time Rerouting
0 Synchronous Multiplexing
0 World-Wide Connectivity
SONET synchronous transmission offers the ability to directly access individual DS-0 and
DS-1 channels. This provides a simple and effective means to achieve automated control over
individual voice channels. What's more, this control can take place in "real time", providing
SONET enables carriers to tailor the width of information highway. This tailoring can be done
from a remote location, allowing carriers to expediently respond to the specific needs of their
customers. This characteristic of remote provisioning can result in the ability of carriers to
SONET has also the ability to support real-time rerouting, allowing customers to bypass
congested nodes or points of failure by reconfiguring the routes of affected circuits. The
provide immediate network recovery. Its automated maintenance and testing capability
through embedded control channels enables carriers to track end-to-end performance of every
Part I. The Technology – May 25, 1998 - 135
transmission. This capability allows carriers to guarantee transmission performance, and users
Synchronous Multiplexing
SONET supports transmission rates from 51.84 Mb/s through 2.488 Gb/s. Synchronous
multiplexing allows the high- speed transmission element within the multiplexer to observe
and extract the lower-speed digital signals. This mode of operation enables add/drop time slot
interchange multiplexing without bringing all the signals down to the DS-1 level, which
multiplexers.
Today's T-3 transmission equipment lacks a universal protocol standard and therefore DS-3
signals are proprietary, and vary among vendors. Accordingly, none of these DS-3 schemes
both ends of a link. SONET, however, alleviates all this and allows mid-span meet, which is
SONET promises true interconnectivity between fiber transmission equipment vendors. With
true interconnectivity, users as well as carriers will have more choice in product selection,
making it far easier to implement solutions. Carriers and users will be able to purchase
136 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
equipment based on price and performance, and mix and match hardware from multiple
SONET heralds a fundamental change in the network from basic physical connectivity to
modernization of the network, both private and public. SONET, along with ATM, will
transform the network from a circuit switched, to a high- speed cell-switched, dynamically
robust infrastructure.
How soon SONET deployment evolves will depend more on politics than technology. The
FCC's aggressive tactics to promote competition and deregulation may be the key impetus.
Increasing "local loop" competition from Competitive Access Providers (CAPs) and cable
territories. Already faced with competition, the IXCs are rapidly deploying SONET equipment
as well.
The Cirrus product family is the industry's first series of products to use a Thin Layer of ATM
over SONET/SDH fiber to merge transmission, access and termination into one integrated
access system. The Thin Layer of ATM multiplexing ensures that the network efficiently
Part I. The Technology – May 25, 1998 - 137
delivers traditional voice services and can support advanced services such as Voice over IP
(VoIP), symmetric and asymmetric Digital Subscriber Line (DSL), and packet over SONET
But if you recall, ten years ago, ISDN was going to spark a revolution in which users could
speak and transmit data simultaneously over the telephone. SONET and ATM, were already
in-the pipeline back there, promising highly integrated voice, video and data transmission
rates. But today, even though ATM and SONET are pitted against each other in the race to
deliver ever-higher network bandwidth, ATM and SONET technology are more frequently
teamed. Aside from data rates starting at OC-1, or 51 megabits/sec, and scaling to OC-192, or
9.9 gigabits/sec, SONET brings its self-healing ring architecture, which provides unparalleled
survivability in the event of a fiber cut or node failure. If such a break occurs, SONET is able
The design of the frame and signaling for SONET makes it compatible with the traditional,
existing networks. Most prominent of such networks is the telephone network. The frame
format described above for STS-1 was chosen such that the 125 microseconds to transmit
matches the standard telephony 64 kilobytes per second circuit. A single STS-1 payload is
138 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
capable of carrying 672 voice channels. Table 3.2 shows a comparison of SONET with the
Table 3.2 - SONET verus existing digital signals and voice channels
Ideally, you should have ATM over a SONET infrastructure, as shown on figure 3.4. You can
have DS3-based (45 megabits/sec) ATM networks, but there's a lot of overhead with ATM,
and the efficiency of those networks is not as good as the higher-speed SONET. ATM and
SONET's proven combination of speed, reliability and flexibility also has enabled early
adopters within the government to tackle a host of applications that were stymied by the
Figure 3.4
But there are problems when you try to marry voice over ATM/SONET. On the ATM’s front,
installation can be a bit complicated, and you won’t find much for managing your network
there. ATM’s technology is still pretty new, so you won’t find much experience here, as the
140 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
pioneers are still building their learning curve and the “dos” and “don’ts" list. SONET has its
Yet, there are many vendors climbing the SONET technology, making tremendous progress
there, and making sure that soon it will be ready for prime time. Fore, for example, is building
SONET-like restoral into its ATM switches via the Private Network to Network Interface
(PNNI), a standard to dynamically reroute traffic, and via SONET Automatic Port Switching.
Recent technologies have enabled packetized voice, or the transmission of voice and fax over
IP and Frame Relay networks, into the mainstream. An understanding of the key technologies
Early packet networks were based on X.25 and other proprietary statistical multiplexing
protocols running over modem or low-speed digital circuits, which had to cope with
It was only in the early 1990 that frame relay became more common and started to threaten the
position of X.25. Frame relay takes advantage of the higher reliability of modern digital
networks to carry packet data with reduced error checking and retransmission, over higher
Part I. The Technology – May 25, 1998 - 141
bandwidths.
The growth in frame relay since that time has exceeded all expectations, with thousands of
requirements. Frame relay now plays a significant part in many networks infrastructure, and
companies are beginning to migrate its voice and facsimile applications over their frame relay
networks. By migrating to frame relay, companies have further consolidated their networks,
gaining the cost advantage of fewer WAN links without compromising their ability to
The Internet Protocol, or IP, is not mutually exclusive to frame relay. In fact IP runs over
frame relay, PSTN and many other types of networks. Like frame relay, however, IP networks
are packet-based. Therefore the advantages and limitations inherent in IP voice are part of the
IP introduces even more performance challenges than does frame relay for voice applications.
These will be discussed later in the paper. However, IP has become ubiquitous as a result of
the Internet/Intranet explosion. And, beyond its ubiquity IP offers a new dimension of value in
Every so often, the advantages of implementing voice over a frame relay network, especially
for those corporations already having voice available on virtual private networks (VPNs), are
*****Start NOTE*****
This section was based on Nuera Communication’s whitepaper, authored by Steven A. Taylor.
Nuera is one of the major players in VoIP. For additional or more detailed information, or for
*****End NOTE*****
True, voice over frame relay can save you money, being as inexpensive as half a cent per
minute. Actually, even if we were to assume that voice over the public networks costs as little
as five cents, voice over frame relay can often pay for itself in less than a year. Nonetheless
there are many other alternatives to transport voice, including leased lines, ATM and the
Internet. Thus, even though these are all viable technologies for packetized voice transport,
there are a number of factors that make frame relay an excellent choice today.
Part I. The Technology – May 25, 1998 - 143
Specialized "Voice FRADs" are readily available both for voice transport and for transporting
other data along with the voice. This other data could include both LAN internetworking via
routers and more traditional FRAD functions for serial protocols like SNA and X.25. The
main challenge in adopting voice over frame relay is technical, a often you will go through
few technical hurdles in order to tune your implementation and ensure good voice quality.
Voice over frame relay can be the right solution for controlled environments where all of the
voice can be considered to be on the protected network (LAN/WAN). Thus, it is most easily
network, using the same facilities that are already in place for the corporate data infrastructure.
Similarly, a carrier who wishes to provide voice services for users connecting over its internal
As security technologies, including encryption schemes becomes available, packet voice, over
the Internet, frame relay, or ATM, may also be a reasonable alternative for applications outside
the boundaries of an Intranet, whether both parties are using the packet service or not. Until
then, the primary application for voice over frame relay will still be the same as the one for
which we've been using internal voice communication for over ten years, with multiplexers
providing virtual tie lines between PBXs attached to the network. The voice capabilities are
144 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
then used both for communications between LAN/WAN connected sites and for remote
Figure 3.5
As you can see on figure 3.5, the network is used to connect to a site in a remote location.
Then, at the remote location, a secondary dial tone is provided by the remote PBX to enable
dialing a local call, as opposed to using the public network across the country or even around
the world. This strategy alone can save a corporation a lot of money. You could be at your
company’s head quarter in California, calling London as a local call, and the frame relay voice
could even take care of doing the local dialing at the remote location so that you wouldn’t
Now, using voice over frame relay involves the use of some fundamental assumptions. First,
frame relay voice uses an advanced compression algorithm, such as Code Excited Linear
Prediction (CELP). Advanced algorithms are making possible by the extremely high
processing power toll quality, with voice available at 8 to 16 kbps, as opposed to the 64 kbps
Further, it is assumed that Voice Activity Detection (VAD) is used. VAD takes advantage of
the fact that normal conversations are half-duplex. That is, the transmission is taking place in
only one direction at a time, with silence in the other direction. As a rule of thumb, it's not a
bad assumption that 50% of the time there is silence on the line. In reality, even more is
usually silence, especially if we consider pauses between words and sentences. However, the
packetization process adds a little overhead, so the silence greater than 50% is roughly
Consequently, the combination of these factors represents a compression ratio of at least eight-
to-one compared with traditional voice. This is calculated by assuming the use of 16 kbps for
the voice itself, providing for four-to-one compression. This is doubled, though, by using
VAD for an additional two-to-one compression - hence the ballpark ratio of at least eight-to-
one.
*****Start NOTE*****
The eight-to-one ratio, a conservative one, is used here simply to be conservative when
*****End NOTE*****
146 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Voice over frame relay is fairly well accepted as being economical when used in international
and non-US applications. With international call prices sometimes approaching $1 per minute,
the payback period for voice over frame, even with the higher international rates for frame
One way of looking at the economic justification for voice over frame relay involves the
dollars per month based on the cost of dial voice. For instance, if you assume that you're using
only one hour each business day for each of eight lines at $1 per minute, the monthly cost is
almost $10,000 a month. When you're dealing with this type of cost to start with, voice over
But the economic justification is much more of a challenge in domestic networks. For
instance, if you assume that you're using 3 hours on each of eight lines at 5 cents per minute
for 20 days a month, the cost is $1440 per month for all eight lines - significantly less than
Even though voice over public frame relay services makes a lot of sense for international
applications, frame relay services are not universally available. Thus for international locations
Part I. The Technology – May 25, 1998 - 147
where frame relay is not available, your best solution is to use private frame relay services
running over leased lines. Further, installations using public and private frame relay should be
Now, in order for you to use voice over private frame relay networks within the US, you must
have bandwidth available., so all of the bandwidth considerations mentioned above still apply
here. However, it's more likely that the private frame relay network rather than the public
network will have "free" bandwidth available, as public frame relay service tends to be quite
granular already. Since you can buy services in DS0 (64 kbps) increments, and even finer
granularity below 64 kbps, you can then fine-tune the bandwidth utilization to a more precise
degree than you would to determine bandwidth needs. Consequently, the "excess bandwidth"
that tended to be hanging around in T1/E1 multiplexer networks should not exist, although
One could argue that private frame relay networks can be fine-tuned to the same extent as
public services since fractional T1 is likewise available on a "by-the-DS0" basis. But the
interesting part comes with the tariffs. Fractional T1 prices tend to increase fairly linearly
through about half a T1. However, once the 768 kbps threshold is reached, the price increase
drops drastically. In fact, the price for a full T1, without discounts, is generally only about 20%
greater than the price for half the bandwidth. Furthermore, since carriers tend to discount full
148 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
T1 circuits much more heavily than fractional T1 circuits, we often find that a full T1 is
When this is the case, and if the private frame relay network has internodal connectivity needs
in the range of 512 kbps to 768 kbps, it could very well turn out that full T1s are as
inexpensive as any other option for connecting the nodes. The result is that there is indeed
"free" bandwidth available for the frame relay voice traffic. Regardless of the price per minute
The bottom line is that the use of frame relay voice can be justified easily on an economic
basis. Further, rather than hindering communications in any way, the availability of low costs
due to the advanced compression techniques can actually enhance business communications.
This is true for both U.S. domestic and international applications for both public and private
Packetized voice can be transported by a wide variety of options from traditional leased lines
to ATM. The main strengths of frame relay lie in its availability, its pricing, the target speed
range, and the reliability of the technology. But is voice over frame relay a viable option?
There are circumstances where the use of leased lines is a much superior solution than frame
relay. For instance, leased lines are a better solution when requisite data transport speeds fall in
the range between 512 kbps and a full T1. In these cases, the equipment used to support voice
over frame relay still works. It just becomes a special case of frame relay being run in a point-
to-point environment (without the frame relay network in the middle). However, since frame
relay is pretty much available in the whole U.S., its pricing is much more attractive than leased
lines. This becomes especially important when the network topology involves either meshed
ATM is another option for transporting packetized, compressed voice. As a sister technology
to frame relay - with the only meaningful difference being that fixed-length rather than
variable length packets are used - most of the reasons that frame relay is good for packet voice
The main disadvantage of using ATM, is that it’s not as readily available as frame relay.
While ATM services are rolling out and availability will continue to increase over the next
several years, there are not yet enough ATM services available at T1/E1 speeds. ATM also has
some bandwidth inefficiencies, as inherently ATMs have and overhead of at least 10 percent,
based on the 5 octet header for every 48 octets of payload. Thus, for highly compressed voice,
this disadvantage can be highly noticeable, especially since packet voice packets tend to be
150 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
quite short, on the order of 10 to 15 bytes per packet (due to the need to provide samples on a
regular basis in order to control delay). Therefore, if we assume one voice packet per cell, well
over half of the cell has to be stuffed with electronic plastic peanuts to fill out the 48 octets of
ATMs were developed for speeds of T3/E3 and above, they never worked well for T1/E1. The
cell overhead is almost insignificant when considering speeds of T3 to OC3, 45 Mbps to 155
Mbps. But the minimum of eight-to-one compression provided by advanced voice algorithms
makes the number of channels supported at these speeds much higher than any but the largest
users need. For instance, since a T3 normally carries 672 DS0s, a T3 would easily carry over
calls, which for the most cased, is still a reasonable number for most companies.
The net result is that for cell-based ATM, the technology is readily available for carrying
packet voice, but it is overkill by the time ATM's target speed range is reached.
Needless to say, TCP/IP via the Internet is widely adopted. In fact, the idea of voice over the
Internet is drawing considerable attention, and this book is an indication of it! But there are
major drawbacks for Internet voice, which is essentially the same as those of X.25: the
robustness of the protocol with its requisite delay and delay variability. While these are
Part I. The Technology – May 25, 1998 - 151
problems that can be addressed with frame relay, they are more difficult to address with
TCP/IP. For most applications, using the same transport layer that's already carrying TCP/IP
traffic, to carry voice will result in a more robust implementation since issues like queuing
The utilization of voice over a frame relay infrastructure requires some equipment at your site.
The most common one is usually called Voice Frame Relay Access Device (FRAD), as shown
in Figure 3.6.
Figure 3.6
A voice FRAD is very similar to a normal FRAD in functionality, but it is specialized in that it
handles the voice packetization and compression process. Of course, FRADs also have other
features, such as support for SNA and possibly some other serial protocols, as well as router
The voice FRAD will typically be a point-to-point type of device with a single frame relay
interface, but it can usually support multiple logical connections to a number of sites on the
frame relay network by routing voice calls over several different virtual circuits. But the voice
FRAD may also support at least one additional frame relay interface, which is very important
when utilizing existing routers in conjunction with the voice FRAD, allowing the voice FRAD
to perform frame switching. Further, data connections for existing routers and other frame
relay accepting direct attachments can also support devices. Whether these capabilities are
external or integral, the voice FRAD must use priority and "fairness" algorithms to ensure that
The voice FRAD typically supports a variety of voice interfaces. The most common is an
analog interface, in which case there is a direct conversion within the voice FRAD from
analog voice to compressed digital voice, with the compressed voice transported via frame
relay. Voice trunks from the local PBX (or telephone) are attached directly to the voice FRAD.
The voice FRAD supports the most common analog voice functions, including support for a
wide variety of 2-wire and 4-wire interfaces. A voice FRAD also supports digital T1/E1
interfaces for headquarters and regional sites requiring a higher density of voice connections.
Part I. The Technology – May 25, 1998 - 153
Transporting voice over frame relay has its challenges. Historically, frame relay has been
developed and sold primarily as a data transport technology and service solution, not voice.
But it doesn’t mean that frame relay has a fundamental technical limitation, and all of the
You may run into carriers who will discourage you from using voice over frame relay.
Conversely, there are carriers that actually welcome voice traffic. The reason for some
discouragement is that some carriers have a larger installed base of voice to protect from
possible erosion by frame relay. In some cases these carriers may also be adhering to corporate
policy rather than legitimate technical concerns regarding the transmission capabilities.
From the technical side, not every carrier is technically prepared to support voice over frame
relay, as their chosen switching system may not provide the capabilities and types of technical
support needed by frame relay voice. The frame relay specifications are a User-to-Network
Interface (UNI) specification only. The actual network transport is not specified. Thus, various
switching architectures and network implementations will provide different levels of support
An alternative to be considered is to transport voice over your private frame relay network,
which is intrinsically easier, since the network infrastructure is under your direct control. In
154 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
this case, it is up to you to make sure that the various characteristics of the networking
architecture are sufficient to provide the desired level of voice support. But the challenges will
still be there, and regardless of using main carriers or private frame relays, they must be
Controlling Delay
The major challenge in transporting voice over frame relay is the use of frames itself, which
generates delays. These delays, also know as absolute delays, must be controlled in order to
avoid interfering with the normal human communications process. If there is more that about
500 msec total (round trip) delay, carrying on a "normal" conversation is difficult. The first
level of delay is based on the "freeze-out" phenomenon. During the time that a given frame or
cell is occupying the transmission facility, other traffic may not be transported.
This concern has some basis so long as the data frames are quite long and the speeds are low.
Therefore, the maximum frame size can also have a major impact. If one limits the frame size
to roughly 500 octets, the maximum freeze-out time is only 12.5% of the time with a 4,000
octet maximum. At the same time, frame relay still represents almost a ten-fold increase in
Part I. The Technology – May 25, 1998 - 155
efficiency vs. ATM. Further, the "frame vs. cell" arguments really apply only at the UNI. The
intranetwork architecture is not subject to the standards, so the transport may indeed be over
an ATM infrastructure. This challenge is further met by the capabilities of some voice FRADs
to perform sub-segmentation of data frames. If data comes into the voice FRAD via a frame
relay interface from a router, the maximum frame size may be too long for guaranteed
excellent performance.
Consequently, the voice FRAD will segment the frame into multiple frames with a shorter
maximum frame length. The receiving voice FRAD will then reassemble the frames. This
process is analogous to the need for frame segmentation when transporting very long frames
from protocols like IP over Ethernet, which has a maximum frame length of about 1500 bytes.
But worse than an absolute delay is what is known as delay variability. When a frame relay
replays your voice at the receiving end, you expect your receiver to hear a continuous and
smooth talk spurt. However, packet systems are inherently prone to variable delay. However,
not always the voice packets get through quickly enough, as many times they may be delayed
a bit more.
To resolve this problem, one alternative is by buffering the end device, smoothing out minor
variations. A nominal delay is intentionally introduced so that there is a high probability that
all of the packets from your talk spurt will be there in time to be played out smoothly.
156 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Another alternative is to limit the maximum size of the frames and using cells within the
transport network helps. In addition to minimizing the freeze-out, yet another delay factor, the
fill time, the time that it actually takes to fill a frame or cell with voice, is limited significantly
by use of short frames. Advanced algorithms like CELP pack a lot of information into a few
bytes. Consequently, in order not to induce unacceptable delay, the frame sizes for the voice
frames in addition to the data frames must be kept relatively short. Typical compressed voice
frames are usually in the order of 10 to 15 octets per frame. Also, or data applications, a FIFO
(First In, First Out) scheme is often considered optimal and most fair. Voice, however, is
much less tolerant of delay than data. Consequently, some form of priority queuing, both in
the access devices and within the switching network, will greatly enhance the probability of
A further delay and queuing issue one must consider is the impact of "lost" frames. For data,
"late" is indeed better than "never" so far as delivery is concerned. The same is not necessarily
true for voice. First, there is some voice algorithms that first send the "basic" voice
These "enhancement packets" can be sent as "discard eligible," and their loss degrades the
voice quality but does not make the call unintelligible. Further, whether the voice packets are
being transported over frame relay, ATM, or dedicated transmission services, there is a
possibility that packets will be "lost" due to link errors and other factors. Consequently,
Part I. The Technology – May 25, 1998 - 157
processes have been built into the advanced algorithms to compensate for a certain degree of
packet loss. Parenthetically, the short frame sizes that are an advantage for controlling delay
also help minimize the impact of lost frames since there is less information per frame.
The bottom line for queuing algorithms is that unlike data frames that should be delivered
whenever possible, there comes a point when it is better to lose a voice frame than to deliver it
too late. Consequently, it is both possible and necessary to consider the use of voice when
Fax and Modem traffic present a much larger technical challenge. They are treated together
here since faxes tend to use off-the-shelf modem technology for the actual fax transmission.
The good news about fax machines and modems is that they're incredibly inexpensive and
virtually everybody has them. Similarly, the bad news about fax machines and modems is that
they're incredibly inexpensive and virtually everybody has them. Further, within the corporate
environment, the purchase and utilization of these devices is often not under the control of the
corporate information-processing department, so even knowing when and where these devices
Usually, fax and modem traffic is normally transmitted over "telephone" lines. The
modulation schemes used for these devices assume the nominal bandwidth and other
characteristics of "real" uncompressed phone lines using traditional 64 kbps PCM voice
modulation schemes. Highly compressed voice, while sounding very good for speech, uses
158 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
different algorithms that do not necessarily support the data modulation algorithms. For
instance, most advanced modem modulation schemes include "phase shifts" as a part of the
scheme. This is supported by traditional high bandwidth (and analog) voice techniques.
However, the human ear cannot detect phase shifts, so preserving phase shift information does
not add to the quality of highly compressed voice. Consequently, most highly compressed
voice algorithms do not support modem traffic at speeds over 4.8 kbps. In order to support
higher speed modem and fax traffic, which is quickly becoming the norm, one of several
The first and simplest approach is to declare that modems and fax machines should not be
used over the private, intracorporate voice network. However, this requirement is likely to be
politically unappealing. After all, shouldn't an "advanced" voice network be able to support all
of the "legacy" applications, whether they're literally "voice" or not? Further, this approach
would require that the "voice" network still have some lines for on-net traffic for
intracorporate fax and modem traffic. This bifurcated corporate voice network then tends to
start losing many of the advantages that we hope to gain by using voice over frame relay.
Beyond this segregated approach, there are two additional approaches that offer technical
solutions to this historically difficult problem. The technically simpler of these two approaches
is to turn off the compression whenever fax or modem traffic is detected. Basically, the
equipment listens for fax and modem tones, and whenever they are detected a full 64 kbps is
Part I. The Technology – May 25, 1998 - 159
dedicated to the voice call rather than the compressed bandwidth. The advantage of this
approach is that it works. And it's simple. This disadvantage is that it is a "brute force"
Another approach, as shown in Figure 3.7, is to terminate the analog portion of the fax or
modem traffic at the voice FRAD, transport the information as data at the appropriate rate,
then remodulate as an analog call at the remote voice FRAD. This way, the call takes only the
amount of data that is really needed to transport the digital information. Note that there is very
Figure 3.7
Another challenge for highly compressed voice is avoiding multiple tandems. As depicted in
Figure 3.8, it is fairly common for calls to be passed through multiple switches. However,
highly compressed voice doesn't fare particularly well through multiple compression/
compression.
160 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 3.8
Multiple Tandems
Figure 3.9 shows one solution to this problem, performing frame switching within the voice
FRAD. In this situation, the voice FRAD has sufficient frame switching capacity to recognize
that some calls may not physically terminate at a given site, so the frames are "bypassed" to
their ultimate destination. The obvious advantage of this solution is that the voice stays in the
Further, the requisite number of PVCs for the entire network is smaller since direct
connectivity among all sites is not needed. Nevertheless, it has the drawback that the traffic
must traverse the frame relay interface twice (into the voice FRAD and back out) at the
Figure 3.9
Switching in FRADs
Part I. The Technology – May 25, 1998 - 161
An alternative solution, shown in Figure 3.10, avoids multiple passes over frame relay
interfaces by using full network connectivity for PVCs between each of the sites. Each call is
"routed" to the appropriate destination by interpreting the DTMF "dialing" tones as the call is
established, and, based on the "phone number," the call is placed on a particular PVC. Once
again, the advantage is that multiple compression decompression cycles are avoided. Staying
within the network minimizes delay. Nevertheless, this configuration usually requires more
PVCs than the method in Figure 3.14. Also, this requires that the voice FRAD must be more
Figure 3.10
Call Processing
Multiple tandems should be avoided whenever possible regardless of the transport technology
used. Both switching within the voice FRAD and call processing can help alleviate some of
the problems, and having both of these options available will let the network designer fine
The utilization of voice over a frame relay infrastructure obviously involves some equipment
Figure 3.11
A voice FRAD is similar in function to a normal FRAD (Frame Relay Access Device), but it
process. Of course, some usual FRAD features are also included, like support for SNA and
possibly some other serial protocols. Router support is provided either integrally or via
external routers.
The voice FRAD will typically be a point-to-point type of device with a single frame relay
interface. Nevertheless, when used in a networking environment, this single interface can
support multiple logical connections to a number of sites on the frame relay network by
routing voice calls over several different virtual circuits. But the voice FRAD may also
support at least one additional frame relay interface. This is especially important for utilizing
Part I. The Technology – May 25, 1998 - 163
existing routers in conjunction with the voice FRAD, allowing the voice FRAD to perform
frame switching. This additional interface could also allow for the connection of the voice
FRAD to a frame relay network via two separate circuits and access points for additional
reliability.
Data connections for existing routers and other frame relay accepting direct attachments can
also support devices. Whether these capabilities are external or integral, the voice FRAD must
use priority and "fairness" algorithms to ensure that appropriate access to the network is
available for all traffic types. This critical function is discussed in more detail in the next
section.
The voice FRAD typically supports a variety of voice interfaces. The most common is an
analog interface, in which case there is a direct conversion within the voice FRAD from
analog voice to compressed digital voice, with the compressed voice transported via frame
relay. In this case, the voice trunks from the local PBX (or telephone) are attached directly to
the voice FRAD. The voice FRAD, then, should support the most common analog voice
functions, including support for a wide variety of 2-wire and 4-wire interfaces. If a telephone
is directly attached the voice FRAD must supply battery and ringing functions.
A voice FRAD also should support digital T1/E1 interfaces for headquarters and regional sites
requiring a higher density of voice connections. These interfaces, typically from a PBX or
PSTN, multiplex multiple conversations onto a single physical interface. This has the effect
164 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
both of simplifying multiple connections and of reducing the requisite number of physical
cables. It’s also important to know how many conversations can be supported by the voice
Frame relay provides statistically multiplexed access to many destinations over a single
physical connection to the frame relay network, as shown on figure 3.12. To obtain the
expected end-to-end performance, one must take into consideration several important factors
Figure 3.12
Committed Information Rate (CIR) is the frame relay parameter that defines the minimum
throughput that should be expected on a given virtual circuit. When designing time division
multiplexer (TDM) networks, you should consider what portion of the bandwidth to allocate
to each end-to-end connection. In a frame relay network, you should consider how much CIR
to allocate to each permanent virtual circuit (PVC). When the network is heavily loaded, each
Part I. The Technology – May 25, 1998 - 165
PVC will be able to carry at least the CIR allocated. When the network is lightly loaded,
*****Start TIP*****
Time Division Multiplexer is a device that allows multiple conversations to share a single
transmission facility, with each channel having access to a dedicated portion of the bandwidth.
endpoints defined by the network operator at service subscription. A single physical path may
support multiple PVCs and SVCs. Compare with Switched Virtual Circuit
*****End TIP*****
Some public networks offer PVCs with Zero CIR and provide very good performance because
they design the network with enough capacity to prevent congestion except in case of a failure
in the network. Others offer low CIRs and are so heavily loaded that very little traffic above
the CIR can get through during peak periods. When traffic in excess of the subscribed CIR is
sent into the network, the network tags the traffic as discard eligible. The network during
166 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
severe congestion will discard discard eligible traffic, while CIR traffic is only discarded due
Figure 3.13
Data traffic is likely to perform well when traffic is occasionally discarded, even if the traffic
discarded is a long burst of traffic. To recover, the user equipment re-sends the data traffic.
Voice traffic can tolerate random discards of traffic (typically up to 10% can be discarded and
still maintain good voice quality). However, if voice traffic were to be discarded in long
bursts, entire spoken words can be missing from a conversation and this is not acceptable. To
ensure long burst discards do not occur, one should buy enough CIR to ensure that voice
allows many channels of voice and data traffic to be carried between two endpoints over
Part I. The Technology – May 25, 1998 - 167
single PVC as shown on figure 3.14. So if two 8Kbps voice channels are sharing one PVC,
simply buy 16K of CIR for that PVC from the frame relay service provider.
Figure 3.14
But what happens when data is mixed with voice on one PVC? How much more CIR is
If the source of the data is a high-speed router on a high-speed interface into the VFRAD, then
it can quickly consume all of the CIR on the PVC, which is being shared with the voice traffic,
and this is quite undesirable. To prevent this, the VFRAD must permit the network manager
to configure CIR individually for each user of the PVC. When the data user (router) tries to
consume more than the allotted CIR, the additional traffic is marked discard eligible by the
VFRAD and the network retains the remaining CIR for the voice users.
168 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
While the VFRAD can enforce the rate at which CIR is consumed, it can also prevent an
attached router from flooding it with excess frames over a high-speed interface, as shown on
figure 3.15. By configuring a restraining excess burst, the VFRAD can discard frames, which
exceed this limit. But discarding traffic does not lead to optimum network performance.
Figure 3.15
VFRAD not only enforce the rate of CIR consumed but prevents routers from flooding it.
Bit what about traffic, which is flooding in from a distant router attached directly to the frame
relay network? This excess flooding is an issue because the local frame relay switch can get
backed up with large amounts of traffic which prevents voice frames from getting through in a
timely fashion. The only good solution to the flooding issue is to configure the routers to pace
their traffic per PVC at a rate which is compatible with the speed of the interfaces and relative
*****Start TIP*****
Part I. The Technology – May 25, 1998 - 169
A good example of routers configured to pace their traffic per PVC at compatible rates of
speed and peak load of a destination frame relay UNI is the traffic shaping feature described in
the Cisco IOS Software Release 11.2 Product Bulletin #487, section 3.2.2.
*****End TIP*****
Another cause of flooding is very long data frames. VFRADs can control the effect of long
data frames sent from attached routers by segmenting the frames into smaller pieces, sending
them through the network, and then re-assembling them at the destination VFRAD before
delivering them to the destination router. But when the destination is a router directly
connected to the frame relay network the only solution is to configure the router to a
maximum packet size which is compatible with the speed of the interfaces (slower interfaces
require a smaller packet). In the near future there will be a Frame Relay Forum Data
fragmentation procedures. This will allow large packets to span multiple frames and will be
Delay is critically important in voice applications and delay objectives can be easily obtained
with a good network design. The end-to-end delay must be less than 250 milliseconds in each
170 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
direction or else users will notice it. To obtain this objective, the end-to-end delay through the
VFRADs should be less than 100 milliseconds and the frame relay network should deliver the
Figure 3.16
Delay through the network can vary from one moment to the next depending on network
traffic load. VFRADs can compensate for normal delay variations. But under very heavy load
conditions, with data users sending very long frames, delay variation can increase. Most
frame relay network switches offer PVC priority, which will allow traffic on one PVC to be
sent while holding the lower priority traffic for a short time. By configuring voice PVCs with
a higher priority than data PVCs, delay variation can be substantially reduced. When PVC
priority is not available, the other solutions are to place delay sensitive traffic on a separate
route through the network, or increase the network bandwidth so that it is not so heavily
loaded.
Part I. The Technology – May 25, 1998 - 171
Congestion Indication
The frame relay congestion indicators, FECN and BECN, are sent from the network to the
VFRAD when the traffic on a particular PVC encounters congestion. The VFRAD will
respond in a variety of ways depending on where the traffic originated. Figure 3.17 depicted a
Figure 3.17
If the data traffic was sent to the VFRAD from an attached router, the FECN and BECN will
be passed to the router so that it can respond appropriately. If the data traffic originated from a
VFRAD data port, the VFRAD will assert the appropriate flow control. When the CIR
settings are configured as described above, voice traffic should never be a cause of congestion
*****Start TIP*****
172 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
What is Forward Explicit Congestion Notification (FECN)? – FECN is a bit in the frame relay
header that indicates that congestion may be present in the network for traffic traveling in the
direction opposite to the direction of travel for the frame in which the bit is set.
What is Backwards Explicit Congestion Notification (BECN)? – BECN is a bit in the frame
relay header that indicates that congestion may be present in the network for traffic traveling in
the direction opposite to the direction of travel for the frame in which the bit is set
*****End TIP*****
Efficiency
Frames vary in length but the length of the header and trailer plus flag (the frame delimiter) is
always five octets. Therefore, very long frames are very efficient and very short frames can be
very inefficient. To reduce delay, voice frames are sent frequently and they have a low
average bit rate. As a result, voice frames can be quite short (typically 15 octets plus the five
overhead octets at 8 Kbps) and inefficient. Figure 3.18 illustrates this concept.
Figure 3.18
Very long frames are very efficient and very short frames can be very inefficient
Part I. The Technology – May 25, 1998 - 173
Also, short frames place a burden on frame relay switches, which have a limit, on how many
frames they can switch per second, regardless of the frame length. To improve efficiency
while slightly increasing delay, some VFRADs allow the network manager to configure (per
user) multiple voice samples to be collected before placing them in a frame. This can
dramatically add to the efficient use of the network bandwidth. Typically, each additional
voice sample collected before sending a frame adds 15 milliseconds of delay. With three
voice samples per frame, the end-to-end delay through the VFRAD should be around 100
milliseconds.
Echo Cancellation
Due to termination impedance mismatches between analog 2-wire circuits and 2- to 4-wire
interface circuits at the called end of a network, voiceband echoes can be reflected back
towards the calling end of the network, as shown on figure 3.19. The voice port echo
Figure 3.19
Dialing Plan
Frame relay PVCs interconnect PBXs in the same way they are used to interconnect LANs, as
shown on figure 3.20. By replacing leased lines with frame relay PVCs, monthly costs are
reduced and one PBX can connect to many other PBXs over one frame relay network access
line. But how does the VFRAD know which PVC to use to get the voice call to the correct
destination? It does it the same way that the PBX would do it over multiple leased lines - it
looks at the dialed digits and routes the call. The network manager configures the VFRAD
with a dialing plan exactly as would be done for a PBX. This can be as simple as indicating
the country code or area code for each destination, or can be more detailed if desired.
Figure 3.20
Frame relay PVCs interconnect PBXs in the same way they are used to interconnect LANs
The VFRAD can also perform custom dial digit manipulation. For example, it can route a call
based on a 10 digit number, and then outpulse only the last three digits of the number at the
destination so that the destination PBX can ring the correct extension in an office. The dial
digit matching and substitution configuration is configured by the network manager and can
Layer 3 refers to the Network Layer of the seven-level Open Systems Interconnect (OSI)
model of networking. The Network Layer determines how data is transferred between
computers, and address routing within and between individual networks. Conventional
Ethernet switches work at the Layer 2 (Link Level) of the OSI model. This requires external
routers to transfer data among subnets. Integrating the routing function into the switch means
users can implement switched networks without buying more routers. This helps reduce the
cost of implementing a switched network, and reduces the overall cost of network ownership.
Routers cause bottlenecks in switched networks, because they typically cannot transport more
than 10,000 packets per second. Ethernet switches operate at up to 600,000 packets per
second. Even though Layer 3 switching inherently alleviates router-caused bottlenecks, the
CPU, the same bottlenecks are likely to reappear because the switching speed will be limited
by the CPU's processing time. That's because this approach requires the entire frame to go
Therefore, the pressure on networks is steadily increasing. Users are demanding more
information faster and from increasingly distributed locations. At the same time, demanding
176 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
new applications and skyrocketing Internet use are not only changing bandwidth requirements,
A successful solution requires technologies that address performance issues at every level of
the network, from the desktop to the telecommunications infrastructure. Fast Ethernet and
emerging Gigabit Ethernet products, for example, offer high-bandwidth pipelines within the
corporate Intranet to move data far more rapidly. Switching technology has also evolved to
segment the traditional shared topology LAN, providing dedicated bandwidth where it’s most
needed.
Such developments have dramatically improved user access to information, but the resulting
increase in data flow is creating new pressures at other levels of the network infrastructure. In
particular, traditional backbone routers are being swamped as they try to direct traffic among
functionality into the silicon within a switch, Layer 3 switching such as Intel’s illustrated on
figure 3.21, provides LAN-based routing at near-switching speeds. It’s a significant innovation
that can increase performance, while helping to reduce costs and complexity.
Figure 3.21
Part I. The Technology – May 25, 1998 - 177
An Intel Layer 3 switch provides high-performance switching, plus LAN routing at near-switching speeds. (Source: Intel Corp.).
The hardware-based routing of a Layer 3 switch is much faster than traditional, software-based
routing. Also, packets that need routing can travel across the backplane of the switch,
providing yet another boost in performance. With the LAN router bottleneck removed,
switched networks can take better advantage of available bandwidth. Desktop users get the
high-speed network response they need, and the network is more stable and reliable.
A great feature of Intel’s Layer 3 switching strategy outlined on figure 3.21 is that it works to
current network components by using routing protocols that are well established as industry
standards, unlike proprietary Layer 3 implementations. Even your current routers remain
useful, as they just move to the periphery of the network, where they can continue to handle
WAN communications.
Not so long ago, networks were small and flat, with simple peer-to-peer connections on a
shared-media cable. Then these networks expanded and bridges were introduced to connect all
the smaller networks into larger ones. However, as networks became busier and more
complex, routers became the favored interconnection devices, because of their ability to
178 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
provide segmentation and logical structure to the network. The result was the fully routed,
hierarchical network, as shown on figure 3.22, which is still a very common structure of
intranetworks.
Figure 3.22
Traditional LAN routers segment the network and provide logical structure, but they are slow, complicated and expensive. (Source:
Intel Corp.
As these interconnected networks expanded and got busier, performance demands led to the
creating more routing layers within the Intranet, as shown on figure 3.23. Corporate intranets
became flatter again, and much faster — but they also became harder to control and less
Figure 3.23
Standard switches are much faster than routers and provide dedicated bandwidth where needed. (Source: Intel Corp.)
Part I. The Technology – May 25, 1998 - 179
As the volume of Internet and Intranet communications increased geometrically, more than 20
percent of network traffic crossing the boundaries of a local network became very common.
Actually, in many intranets, the amount of traffic directed across the limits of the local
network is much greater than the local one, as more users are connected to virtual private
networks, Extranets and so on. Non-local traffic is increasing beyond the capacity of LAN
routers, and is putting huge pressure on wide-area networks, resulting in decreased network
The countermeasure is usually a segmentation of the existing network into more and more
switched segments. But the pressure on backbone routers has continued to rise, and a better
solution was on demand. Layer 3 switching was the answer. These “super-fast-packet-
busy networks, such as the ones found in campus/building LANs, by off-loading or replacing
backbone routers that can no longer keep up. So Layer 3 switches must work faster, scale
protocols, and is far easier than a router to install, configure and manage.
0 Lower Cost - Both acquisition and support costs are greatly reduced when a Layer 3
Layer 3 refers to the network layer in OSI’s seven-layer model of networking, as shown on
figure 3.24. Layer 3 controls the routing of messages across different networks, as well as
network flow and traffic management, and is the conventional dominion of routers.
Figure 3.24
Unlike a standard switch, which operates in the Data Link Layer of the OSI reference model, a Layer 3 switch also operates in the
A typical switch operates at Level 2, called the Data Link Layer, which controls the flow of
data between nodes. At this level, data transmits in topology-specific frames such as Ethernet.
Layer 3 switches, in essence, operate at both levels, integrating the functionality usually
Part I. The Technology – May 25, 1998 - 181
associated with routers into the mechanism of a switch. Layer 3 switches is also known by
other jazzy names such as ASCI-assisted routing, zero hop routing, IP Switching, NetFlow,
tag switching, Fast IP, multiprotocol over ATM (MPOA) routing, route servers, and so on.
But in all, Layer 3 switching products fall into one of two basic types of implementation
categories:
just like a router does and forward them to their destinations. They run routing
protocols such as OSPF, cache routing tables and understand the local network
switches claim throughputs of over one million packets per second (Mpps).
connection is made and the flow is switched at layer 2 -- delivering the low delay and
Both techniques deliver the high throughput benefits of a flat network without broadcast and
security exposures. But each has pros and cons that should be considered:
suffers from more latency or delay in forwarding packets. But connection set-up times
switches as well.
means multiple layer 3 switches in a large network. But the centralized, minimized
interoperability among vendors. Packet-by-packet layer 3 switches can talk with any
existing router in the network -- and with other vendors' packet-by-packet switches.
*****Start TIP*****
Part I. The Technology – May 25, 1998 - 183
For more information on Layer 3 switching, in particular Intel’s products, check the
*****End TIP*****
In summary, as networking devices have gotten more complicated, the marketing language
used to describe their capabilities has gotten more fuzzy and general. No two switches are
identical, and there are many technologies to chose from that can deliver fast network
check it out. If not for the understanding of the technology, at least so that you can
As PCs become more powerful, applications demand more bandwidth, and users access new
media formats such as multimedia, video, intranets and the Internet, the ability of current
network bandwidth to handle growing user needs becomes a central issue, as figure 3.25
shows.
184 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 3.25
Existing and emerging applications are driving the need for more bandwidth. (Source: Infonetics March 1996)
At the same time, new higher bandwidth solutions must be backward compatible with existing
technologies, to protect the large investments in network infrastructure. For this reason, and
others, Gigabit Ethernet is emerging as an industry standard solution for high-speed local area
focuses. Intel wants to provide users with better, faster, more affordable access to computing
Intel, which plays a leadership role in network technology, brings unique strengths to the
networking arena, as it has an in-depth knowledge and expertise in the PC system, including
CPU development, PCI bus design, system architecture, and LAN connectivity hardware and
management software. Also, as a founding member of the Fast Ethernet Alliance, which
expanded the capacity of Ethernet tenfold, Intel also has the design and manufacturing
(100BASE-T) Fast Ethernet standards for network connectivity, as depicted on figure 3.26.
Part I. The Technology – May 25, 1998 - 185
IEEE has given approval to the Gigabit Ethernet project as the IEEE 802.3z Task Force, and
the specification is expected to be complete in early 1998. There have been more than 200
date.
Figure3.26
Fully compatible with the huge installed base of Ethernet and Fast Ethernet nodes, Gigabit
Ethernet will employ all of these same specifications as to the original Ethernet specification
(defined by the frame format and support for Carrier Sense Multiple Access with Collision
Detection protocol, full duplex, flow control, and management objects as defined by the IEEE
802.3 standard). Thus, Gigabit Ethernet uses the same Ethernet technology readily in use, but
10 times faster than Fast Ethernet and 100 times faster than Ethernet.
Gigabit Ethernet offers enhanced benefits that enables fast optical fiber connection at the
physical layer of the network. It provides a tenfold increase in MAC (Media Access Control)
layer data rates to support video conferencing (and VoIP), complex imaging and other data-
186 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
intensive applications. Also, as just mentioned, Gigabit Ethernet has the advantage of being
compatible with the most popular networking architecture, Ethernet. Since its introduction in
the early 1980s, Ethernet deployment has been rapid, quickly overshadowing networking
There is no need to purchase additional protocol stacks or invest in new middleware when
deploying Gigabit Ethernet. According to IDC research projections, more than 80 percent of
installed connections were Ethernet back in 1996. IDC predicts that Ethernet will continue to
prevail, and it’s expected to continue its growth beyond 1998, particularly as this compatible
and scalable standard move to gigabit speeds. Figure 3.27 show the increased number of faster
Figure 3.27
Ethernet and Fast Ethernet NICs have shown steady cost reductions over time. Similar trends are anticipated for Gigabit Ethernet
As Information Technology (IT) departments adopt Fast Ethernet, and eventually Gigabit
Ethernet to enhance network performance to support robust desktop needs, they will see:
Part I. The Technology – May 25, 1998 - 187
0 Increased network scaleability — it will be easier to add and manage more users and
"hungrier" applications
The proliferation of Intel Pentium, Pentium Pro and Pentium II processor-based desktops in
applications, has already influenced many LAN decision makers to migrate to Fast Ethernet.
This anticipated growth is based on the fact that, unlike FDDI (Fiber Distributed Data
Interface) and ATM (Asynchronous Transfer Mode), Gigabit Ethernet addresses the
ATM is among some of the alternatives to enhance Ethernet performance. Although adoption
of Gigabit Ethernet does not exclude ATM as a solution within an overall LAN/WAN
architecture, according to IDC #12382, Gigabit Ethernet is rapidly emerging as the preferred
Figure 3.28
Predicted growth of Gigabit Ethernet products. (Source: IDC #12382, Nov. 96)
The Gigabit Ethernet Alliance conducted a recent study and found out that the majority of
respondents plan to evaluate or deploy Gigabit Ethernet technology within the next six months
to a year, and that Gigabit Ethernet is the preferred solution for switch-to-switch connections,
catching up to ATM as the technology of choice for LAN backbones. Figure 3.29 illustrates
Figure 3.29
Gigabit Ethernet has large preference, catching up with ATM while offering a more comprehensive solution.
Gigabit Ethernet's wider bandwidths help improve QoS, regulating the timing of latency
periods to minimize jittery video and audio delays. In the past, ATM was the only reliable way
to achieve any kind of QoS. But today, Gigabit Ethernet is rapidly closing the gap, and with
technologies. Thus, very likely, ATM will remain at the WAN level of interconnectivity. It is
unlikely that ATM will ever move down to the workgroup or desktop, because it would
protocols. Further, if you look at figure 3.30, Gigabit Ethernet delivers many of the benefits
originally expected from ATM, but it is much easier to be implemented, as well as cost
effective.
Figure 3.30
Gigabit Ethernet can deliver many of the ATM features, but at a fraction of the cost, and easier integration.
When comes to Gigabit Ethernet, watch Intel! Intel has established itself as a leader in the
transition to Fast Ethernet, with its family of Fast Ethernet desktop, server and mobile
adapters, print servers, hubs and switches. The PCI bus for Intel architecture PCs and servers
is tailor-made for today's power users. A 32-bit PCI implementation already pumps out data in
the multi-hundred megabits range. In the future, a 64-bit PCI bus will easily handle Gigabit
Also, Intel’s ongoing relationships with key industry leaders, such as Cisco and Microsoft,
cooperation will assure compatibility with Gigabit Ethernet products that emerge from other
vendors.
190 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
What’s Next
This chapter introduced you to the basic concepts of voice over IP (VoIP) and the technologies
surrounding it. It discussed the H.323 standard as well as other standards and technologies
such as audio codecs, IP over ATM, voice over ATM, the emulation of traditional T1/E1
Trunks, IP over SONET and voice over SONET, and IP and voice over frame relay. This
chapter also introduced you to the concepts of Layer 3 switching and Gigabit Ethernet and
discussing multicasting in workgroups, some of its capabilities on hosts and routers, as well as
Chapter 4
More on IP Multicasting
Multicast techniques span many areas of networking, including video and teleconferencing,
multimedia presentations, news distribution, and remote live broadcasts such as those from
space. IP multicast can run over just about any network infrastructure including Ethernet,
ATM, Frame Relay, SMDS, and satellite. For multicasting to work, multicast aware TCP/IP
is connectionless, which means that a multicast datagram is neither guaranteed to reach all
Part I. The Technology – May 25, 1998 - 193
members of the group nor guaranteed to arrive in the same order as it was sent. The protocol
delivers a multicast datagram to the destination group members on a best effort basis.
A best-effort basis can introduce latency and variability of delay in end-to-end paths.
However, multicast, applications require control over the quality of service (QoS) they
receive. The level of security, bandwidth, delay, jitter, error rates, cost, and compression are
some of the parameters that differentiate the network services that QoS provides. The
Resource Reservation Protocol (RSVP) is a key protocol that makes QoS possible.
The protocols and algorithms used by multicasting applications are diverse and complex.
Multicasting can be implemented at several layers of the OSI model, on different media, and
*****Start TIP*****
Fore more information on IP Multicasting, please check my book, co-authored with Kitty
Niles, entitled “IP Multicasting: Concepts and Applications,” also published by McGraw-Hill.
*****End TIP*****
194 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
IP Multicast is an extension of IP. The Internet Engineering Task Force (IETF) recommended
standard, RFC 1112, defines extensions to the Internet Protocol (IP). A relatively new feature
of the Internet Protocol, IP Multicast is a protocol for transmitting IP datagrams from one
multicast sessions. With IP Multicast, applications send one copy of the information to a
group address. The information reaches all the recipients who want to receive it. Multicast
technology addresses packets to a group of receivers rather than to a single receiver; it depends
on the network to forward the packets to only the networks that need to receive them.
Multicast enabled nodes that run the TCP/IP suite of protocols can receive multicast messages.
An Overview
Multicasting, as shown on figure 4.1, is a push technology where a server sends data to a client
without the client requesting it. In pull technology a client requests data from a server or from
another computer. E-mail and PointCast are both examples of push technology while the Web
Figure 4.1
provides efficient delivery of datagrams from one source to any number of destinations
throughout a large, heterogeneous network such as the Internet. If the network hardware
supports multicast, then packet destined for multiple recipients can be sent as a single packet.
There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A
used to send a datagram to an entire subnetwork. A multicast address is designed to enable the
delivery of datagrams to a set of hosts that have been configured as members of a multicast
Types of Transmission
Traditional transmission methods, unicasting and broadcasting differ quite a lot from IP
operations: multicast address resolution to LAN multicast addresses, copying and forwarding
Figure 4.2
If a node wants to send the same information to many destinations, it must send copies of the
same data to each recipient in turn. The same information must be either carried over the
network multiple times. Unicast avoids sending the data to networks where there are no
stations that need it but it does use up network bandwidth and resources. In addition, the node
needs to generate separate identical data streams for each recipient. This is very inefficient and
A broadcast allows one station on the network to simultaneously talk to all devices contained
in the same broadcast domain, or subnet. Routers and switches forward broadcast but in doing
so they use bandwidth and have no way of knowing if any of the nodes on the other network
want the broadcast data. Broadcasting does not consume the sender’s resources any more than
Some protocols use broadcasting to discover resources from the network. To prevent
broadcast messages from flooding the network, system administrator may configure routers to
just pass or block broadcast on any particular route. Many data communication networks
A multicast address enables the delivery of a singe data stream to a set of hosts that have been
4.3. Other nodes filter out multicast packets at the hardware level. Multicasting is the process
of sending to a self-selected group of recipients that is often substantially less than the full
population of recipients. Each recipient must be defined separately and it must be possible to
control which recipients receive data. Multicast dynamic groups of recipients can be created
Figure 4.3
A multicast address enables the delivery of datagrams to a set of hosts that have been
address is a multicast address and identifies the group of machines or interfaces that represent
a multicast group. For example, a class D address could identify all the interfaces attached to
198 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
IP network routers. All logical holders of a particular class D addresses receive packets sent to
that address
The destination address field of the IP header in a multicast IP packet contains a Class D group
address instead of a class A, B, or C IP address. A class D address is an IP address and has the
In Class D addressing the lower 256 entries of the address range is reserved for administrative
functions and system-level routing chores. The middle range is for use by multicast end-user
applications within groups, Intranets, and the Internet. The upper range of the Class D address
figure 4.4.
Figure 4.4
When a local router on a subnet receives a Layer 3 multicast packet, it can map the IP
multicast address to a Layer 2 multicast address, such as an Ethernet MAC address. The
receiving host’s LAN interface hardware can efficiently read this Layer 2 address. Layer 2
Part I. The Technology – May 25, 1998 - 199
LAN protocols typically reserve portions of their address space for broadcast and multicast
Address translation from the IP (layer 3) address to the layer 2 address occurs by directly
mapping the IP address into an Ethernet MAC address. This is accomplished by dropping the
low-order 23 bits of the IP multicast address into the low-order 23 bits of the Ethernet
multicast address.
Sending the information just once to multiple users can have large savings in bandwidth.
Copies of the message are made only when paths diverge at a router such as when the message
router.
Multicast enabled routers forward a multicast to a network only if there are multicast receivers
on that network. Host machines use the Internet Group Management Protocol (IGMP) to
dynamically inform a multicast aware router of any multicast sessions in which they want to
participate. If all members of a multicast group on a particular network segment leave the
delivered to multiple sites in real time. At the same time business and research needs to
retrieve large amounts of passive or static data on a daily basis. New data communication
networks have created a whole lot more capacity. The increased capacity has created new
possibilities to develop innovative services. These new services have created a need for new
traditionally has been limited to local area network applications. But business is now very
applications to multiple hosts at the same time. It is important to note that the applications for
IP Multicast are not solely limited to the Internet. Multicast IP can also play an important role
IP multicast can reduce the load on the network. If, for instance, an application needs to
periodically transmit packets to several hundred hosts within the company, IP multicasting can
be the solution. Periodic unicast transmission of these packets would require many of the
packets to traverse the same links. Multicast transmission of those same packets would require
only a single packet transmission by the source. This transmission is then replicated at forks in
Broadcast transmission is not an effective solution for this type of application since it affects
the CPU performance of each and every end station that sees the packet and it wastes
bandwidth.
Internet multicasting is the only standards-based solution that can support thousands of users
some, but not all if today’s ISPs support IP multicasting. The following list describes some but
Also, IP multicasting enables the distribution of internal corporate data to large numbers of
users. A company with a chain of stores could use multicast to pricing information to cash
registers Company wide. This preserves bandwidth locally and across the network.
Multicasting multimedia data across the Internet and Intranets to multiple users is an excellent
202 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
way to preserve bandwidth. For example, providers of live real-time information feeds can use
from Internet multicasting to deliver their content. Some such providers in the United States
Interactive video conferencing and other VoIP applications using multicasting though the
Internet, Intranet or extranet are becoming a very economic alternative to expensive ISDN-
2 A large percentage of the employees rather than just a few could “stay current” by
Rather than using expensive ISDN-based equipment or services, companies could use
multicast capable computers connected through the Internet, Intranet, or extranet to address
information through databases rather than just traditional e-mail. This can be accomplished
through Groupware applications such Lotus Notes, Microsoft Exchange, and Corel
GroupWise. The information can be in databases scattered throughout the company or the
world. Keeping the databases synchronized in all locations and updated with the most recent
information is very important. All groupware users must have the same information at the
same time.
The use of IP multicasting in this instance makes it possible to use one transmission to send
changes instantly to all the databases. All databases would instantly contain the same
information. As Niles and I examplify on our book “IP Multicasting: Concepts and
Applications,” mentioned earlier, a corporate user in Brazil, another in Finland, and yet
another in the United States could all read the same information at the same time as shown in
figure 4.5
Figure 4.5
The use of IP multicasting, even though its specification was published in 1989, has been
somewhat limited. A limited number of routers that support multicasting has been available on
the Internet, however, this is changing slowly. Routers in the Internet tend to be replaced by
multicast capable ones only when a new router is required to replace an old one.
In the meantime, researchers wanted a resource and test bed for testing multicasting protocols
and applications. They also wanted a way to enable the deployment of multicast applications
without having to wait for multicast enabled devices to be installed through the Internet. And
so they developed the Internet Multicast Backbone (MBONE). The MBONE supports routing
multicast packets without disturbing or altering other Internet traffic and has been in existence
is an interconnected set of subnetworks and routers that support the delivery of IP multicast
traffic. A virtual network layered on top of the Internet the purpose of the MBONE is to
bypass multicast unaware routers in the Internet using tunnels. To this end, the Distance
Vector Multicast Routing Protocol (DVMRP), described in RFC 1075, has been used to build
the MBONE by building tunnels between DVMRP-capable machines. The endpoints of the
Part I. The Technology – May 25, 1998 - 205
tunnels are entered manually in routing tables and administrated in the MBone. Figure 4.6
describes tunneling.
Figure 4.6
MBONE Tunneling
Simply put, MBone is constructed with tunnels across networks that do not support multicast
routing. The tunnels allow multicast traffic to pass through the non-multicast-capable parts of
the Internet. The MBONE mostly uses encapsulated tunnels between multicast-capable islands
tunnel is characterized by its IP source and destination addresses being the IP addresses of the
tunnel endpoint multicast routers. Figure 4.7 is a simplified representation of the MBONE
Figure 4.7
Internet MBone
206 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Since the MBONE and the Internet have different topologies, multicast routers execute a
separate routing protocol to decide how to forward multicast packets. Most of the MBONE
routers currently use DVMRP. There are some portion of the MBONE however, that execute
protocols.
DVMRP is a protocol for routing multicast datagrams through an Internet and implements its
own unicast routing protocol in order to determine which interface leads back to the source of
the data stream. This unicast routing protocol is based purely on hop counts. Because of this,
the path that the multicast traffic follows may not be the same as the path that the unicast
traffic follows.
Nowadays the IEETF, NASA, and research groups world wide use the Mbone for research
and testing of multicast protocols and services, for multicast multimedia recordings of
meetings and live space events across the Internet, and for desktop conferencing. Even live
concert performances have been multicast over the MBONE. The number of sites
participating in the MBONE has grown rapidly. As an experimental and volunteer effort, the
IP multicast capable network forwards multicast packets according to group address of the
packet. Network routers that support multicast keep track of which parts of the network have
multicast hosts joined to particular groups. Routers forward multicast packets only to
subnetworks that have IP multicast capable hosts joined to the particular group. Multicast
RFC 1112 describes the IP multicast extensions to the standard IP protocol. Three levels of
conformance to this standard exist. A level 0 host has no support for IP multicasting and
multicast IP datagrams. At level 1, hosts can only send multicast datagrams. Level 1 allows a
host to partake of some multicast-based services, such as resource location or status reporting.
To provide level 2 multicasting, a host must also support the reception of multicast IP
datagrams. At level 2 host have full support for IP multicasting. Hosts can join and leave
multicast groups and receive multicast datagrams sent to group addresses. Level 2 requires
implementation of IGMP and extension of the IP and local network service interfaces within
the host.
208 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The most important part of host IP multicast support implementation is Internet Group
Management Protocol (IGMP). Both IGMP and ICMP reside in the IP layer. IGMP's function
is to keep neighboring multicast routers informed of the host group memberships present on a
particular local network and to provide the mechanisms by which hosts and routers can join
and leave IP multicast groups. The mapping of IP addresses to local network addresses is
IGMP1 uses the reserved multicast group address 224.0.0.1 to communicate with local routers.
Called the “all hosts group”, this multicast group addresses all hosts in the local LAN. It is
through this channel that IP multicast routers learn if any hosts are joined to a multicast group
in this particular LAN. Routers send IGMP queries to this address at the local LAN and hosts
The mapping between a Class D IP address and Ethernet MAC-layer multicast address is
obtained by placing the low- order 23 bits of the Class D address into the low-order 23 bits of
IANA's reserved MAC-layer multicast address block. Mapping from class D group address to
MAC address is not one to one, because high 5 bits of class D group address are discarded.
single datagram can be addressed to multiple hosts without sending it to all. An IP datagram
1
The IGMP protocol has been updated and is available in RFC 2236 by W. Fenner, “Internet Group
Management Protocol, Version 2”, November 1997
Part I. The Technology – May 25, 1998 - 209
sent to the group is delivered to each group member with the same best-effort delivery as that
datagrams are called multicast routers. They may or may not also forward IP unicasts. Routers
forward multicast datagrams on the basis of both their source and destination addresses. An IP
its IP source and destination addresses being the IP addresses of the tunnel endpoint multicast
routers.
In response to the growing need for multimedia applications and real-time data distribution,
network layer multicast services are being built into today's high-end routers, routing hubs,
and network switches. Some new routers have native multicast packet routing. Multicast
capable routers communicate with neighboring multicast routers and exchange information
about group membership and network topology. However, there are lots of routers that cannot
A host sends a multicast message out onto a host network where multicast enabled routers
picked it up and forwards the message to the appropriate group. Routers keep track of
multicast groups dynamically and build distribution "trees" that chart paths from each sender
to all receivers. Multicast routers need to be able to execute a multicast routing protocol that
210 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
defines delivery paths that enable the forwarding of multicast datagrams across an
internetwork.
Routers refer to the specific tree that it built for a sender when it receives traffic from that
sender for a multicast group. The IP standards bodies have designed several routing protocols
that can build the distribution trees for multicast traffic and multicast routers must support one
protocol,
1 Multicast Open Shortest Path First (MOSPF) protocol which is an extension to the
2 Protocol Independent Multicast (PIM) protocol that enables networks running any
unicast routing protocol to support IP multicast. PIM has two modes dense and
sparse.
Usually multicast protocols can be layered on top of existing multiprotocol backbones with a
software upgrade to existing routing devices. Ideally, network routing devices should provide
all of these standards: IGMP, DVMRP, MOSPF, and PIM thereby allowing the widest range
The most common multicast routing protocol is DVMRP, which works by first broadcasting
to all reachable multicast routers. When no members are connected to a branch, the branch is
pruned from the tree as shown in.figure 4.8 The broadcast from the source can reach a router
from several directions. The multicast router selects the shortest of the routes to the group
members.
Figure 4.8
The multicast capable network shown in figure 4.9 consists of LANs with native multicast
Figure 4.9
In figure 4.9 example, Host A can address the host group by addressing the host group's Class
D address. When Host A sends the message out onto its network, the multicast routers pick up
the message and forward the multicast transmission to the appropriate subnets.
Each physical network can have several multicast capable routers. Network protocols select
one of them as the designated router for the network. The designated router then
tree for each multicast source. This procedure is called Reverse Path Multicasting (RPM).)
Datagrams from the source host to other group members travel over this spanning tree. A
spanning tree is loopless and guarantees the shortest possible route to the receiver.
The copying of the message is done by the multicast method of the LANs involved. In this
case all LANs support native multicasting and the multicast transmission takes the same
bandwidth on host A's network as a single copy, regardless of how many clients are members
of the host group on the other side of the internet. Even if not all LANs have native multicast
support, the added cost of transmitting copies will be limited to a single LAN.
When IP multicasting support is added to the IP layer several potential problems need to be
resolved. The major issues include resolving IP multicast address to LAN (multicast)
addresses, copying and forwarding of messages, and registering host group membership.
Part I. The Technology – May 25, 1998 - 213
Older TCP/IP implementations are apt to have no support for sending or receiving multicast
For a host to be able to send to a multicast address the IP protocol implementation must
support a mapping from the host group address to the corresponding multicast LAN address.
This mapping is analogous to Address Resolution Protocol (ARP) mappings ARP where host
IGMP needs to be implemented so hosts who want to can join host groups and listen to
multicast messages. IGMP informs local multicast routers that a host is a member of a
1 Processes running on hosts capable of receiving multicast packets can join host
groups, after which the process receives all transmissions sent to that host group
address.
2 The routing of IP multicast packets requires special functions that are absent in
unicast IP-routers.
214 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Multicast router functions can be located on an IP-host. Multicast routers forward multicast
transmissions for hosts outside the LAN to the next IP multicast capable router using a unicast
tunneling method. Tunneling is the encapsulation of multicast packets using a unicast IP-
Multimedia applications are capable of streaming full-motion video, audio, and animated
graphical content to the desktop. Other multimedia applications are real-time interactive
applications, such as desktop video, collaborative engineering, and shared white boards.
Multimedia applications and real-time interactive applications such a video conferencing use
lots of bandwidth. The importance of clear picture and hi-fi quality voice should not be
Sometimes there is a need to transmit stored data streams to very large numbers of recipients.
employees. In this case, using IP multicast enabled applications would be beneficial and cost
effective.
IP multicast can unite collaborative workgroups and help in the realization of the full potential
Information distribution applications benefit from the use of IP multicasting. This category of
application can provide real time news and financial services to the desktop users who
subscribe to them.
Non-multimedia applications that involve the transfer of large databases of information can
benefit from IP multicast. Sometimes there is a need to transmit stored data streams to very
large numbers of recipients. Examples here could include updates of Web caches or corporate
The IP Multicast Initiative also can provide information about IP multicast technologies,
product, and services. Don’t hesitate to visit their Web page at http://www.ipmulticast.com or
to contact them at: Stardust Technologies, Inc., 1901 S. Bascom Ave, #333, Campbell, CA
1 A network analysis and user profile to determine the benefits and cost of
applications over a WAN and the use of transitional approaches such as tunneling.
3 The use of a test-bed evaluation of both LAN and WAN implementations in house or
at a vendors site
The IP Multicast Initiative web site has a technical resource center that provides more
0 The sending and receiving node’s operating system and TCP/IP stack support
multicast and the Internet Group Management Protocol (IGMP). The latest versions
1 Each node’s network adapter driver implements multicasting. Newer adapters and
2 Routers, bridges, and switches in the network support multicasting at the IP layer.
Many new routers already support IP multicast; others may require an upgrade. Wide
and incorporated into applications for enhanced services, like reliable and real-time
IP multicasting APIs include Berkeley sockets multicast API and the Winsock API for
Windows applications.
218 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Issues
The IPv6 protocol fully supports IP multicast. As IPv6 becomes implemented in more and
more nodes connected to the Internet, multicasting will be integrated. Its use will no longer be
*****Start TIP*****
For more information on IPv6, please check my book, co-authored with Kitty Niles “IPv6
*****End TIP*****
IPv6 Multicast addresses have the format shown in figure 4.10. A multicast address can be
assigned to a single system, restricted to a specific site, associated with a particular network
link, or distributed worldwide. Multicast addresses must not be used as source addresses in
address as a multicast address. The IPv6 multicast address has three other fields, the Flgs field,
Figure 4.10
Other flag bits are zero. The Scope field limits the scope of the multicast group. Possible scope
values include node-local, link-local, site-local, organization-local, and global scope. Non-
Mapping of IPv6 multicast addresses to Ethernet MAC addresses is similar to IPv4 mapping,
but the low order 32 bits of group addresses are mapped to MAC address instead of low order
2
For more information about IPv6 addressing, see RFC 1884, S. Deering, and R. Hinden, “IP
Version 6 Addressing Architecture”, December 1995
220 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
What’s Next
This chapter discussed multicasting in workgroups, some of its capabilities on hosts and
routers, as well as usage and implementation, especially with VoIP. The next chapter, “IP
Superhighway,” introduces the basic concepts of voice over IP, and its most used H.323
standard. It also discusses other standards and technologies such as audio codecs, IP over
ATM, voice over ATM, the emulation of traditional T1/E1 Trunks, IP over SONET and voice
over SONET, and IP and voice over frame relay. Further, this chapter discusses Layer 3
Chapter 5
This chapter provides you with a more in-depth discussion of ATM technologies and the IP
protocols supporting ATM. This topic is very important so that you can understand the
features (and limitations!) of using IP over ATM, and more specifically, voice over IP (VoIP).
This chapter is based on a contribution made by Phillip Emer, the Associate Director
Advanced Technology Development from North Carolina State University. I thank him for his
contribution and deep knowledge on the subject of ATMs and its applications.
Part I. The Technology – May 25, 1998 - 223
*****Start NOTE*****
For more information on this subject, or if you would like to contact Phil, please do so by e-
mail at phil@ncstate.net.
*****End NOTE*****
The layered approach to describing ATM, as shown on figure 5.1, stresses the interactions
between the many layers and sublayers and the passing of service data units up and down the
layered stack. This kind of approach explains how ATM software and hardware components
Figure 5.1
Describing an ATM
224 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The peer approach to describing ATM addresses the peer-to-peer operations between ATM
devices. This approach stresses the functions provided by ATM hardware and software and
how these functions interact to support an ATM network. As shown on figure 5.2, the main
characteristics of ATMs relevant to ATM network designers and to the peer approach to ATM
in general are:
0 Connection-oriented, point-to-point
Figure 5.2
Connection-Oriented Support
Connection-oriented systems (e.g., POTS, ISDN, X.25, TCP, and ATM), as shown on figure
5.3, establish connections between a pair of communicating systems. In the phone system a
connection is associated with a physical dedicated link. In ATM, a connection is a virtual link
(circuit) which is characterized by a Class of Service that it must deliver to the users of the
circuit (e.g., a constant bit rate service for uncompressed voice over ATM).
Figure 5.3
Connection oriented systems support a set of protocols for transmission of data and another set
of protocols for establishing connections (e.g., SS7, Q2931). End systems request that the
control channel (circuit). Once the network has established a data channel (circuit) per the
request, data is forwarded over that channel. Connections may be established by a network
integrated services support was a design consideration from the start. It is worth noting
though that many technical compromises were necessary to support three very different
network traffic categories. The result of these compromises, as listed on figure 5.4, is that
ATM supports the combination of voice, video and data optimally - not necessarily the
individual services.
Figure 5.4
Voice Support
Voice is supported in an ATM network via circuit emulation, via circuit switching, or as data.
shown on figure 5.5. In general many voice circuits are mapped to single ATM PVC. Voice
compression, network echo cancellation, and silence suppression mechanisms may be added
Part I. The Technology – May 25, 1998 - 227
as enhancements for bandwidth efficiency. Optimal support of voice would map traditional 64
Figure 5.5
Also, voice is supported on IP platforms as data. Some of the same coding, compression, and
echo cancellation techniques are applied here as in the circuit emulation case.
Video Support
Video is supported, as shown on figure 5.6, as real-time, non-real-time, and as data. Real-time
video applications include video conferencing and live video broadcasts. Support of real-time
video levies strict delay requirements on the ATM network (actually strict delay variation - or
jitters - requirements).
Figure 5.6
namely buffering - to account for inconsistent delays encountered during transit through the
ATM network. Thus, the ATM network need not be responsible for ensuring low delay
Nonetheless, video over ATM is a bit more complicated discussion than voice, since video
terminals are actually audio/visual terminals, that is, voice and video are related and must be
kept synchronized. Figure 5.7 illustrates a simple representation of a broadband (ATM) video
Figure 5.7
Data Support
0 LAN
0 IP
Part I. The Technology – May 25, 1998 - 229
0 Multi-protocol
0 Native
Figure 5.8
The idea of supporting data over ATM is that you need a migration path since data
applications are tied very much to platforms, operating systems (OS’s), application
programming interfaces (API’s), and protocol stacks (e.g., IP, IPX, Appletalk), as shown on
figure 5.9:
1. First, software shims are added around low layer API’s (close to device drivers - the
2. Then, low layer and higher layer API’s are enhanced to incorporate software shim
3. Finally, a new stack and new data applications emerge - all of which are ATM-aware.
Figure 5.9
230 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
ATM’s data support requires a migration path since data applications are very tied to platforms..
As figure 5.10 outlines, ATM supports Quality of Services (QoS), enabling end-to-end
(queues), including:
Figure 5.10
ATM technology is also scalable to gigabit speeds (as figures 5.11 and 5.12 outlines). ATMs
0 Selector (Sel) allows a device with a single ATM interface to have multiple ATM
addresses
Figure 5.11
Figure 5.12
Figure 5.13
ATM network addressing is similar to Novell Netware network addressing in that the end
system has an address with two distinct pieces - a network piece and a local piece, as shown
on figure 5.14. It turns out this is a nice feature especially when analyzing and troubleshooting
232 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
a network. Since ATM addresses are made up of a network part and a local part, a
misbehaving client can be tracked down easily based on its ATM address.
Figure 5.14
Try to contrast this to a misbehaving IP network host. The IP addressing scheme is totally
distinct from the local (LAN) addressing scheme - so knowing an IP address is not enough to
isolate a misbehaving client in this case (you need to know the local address of the client).
Figure 5.15 shows that an ATM address can be represented in a naming format much like an
IP address. Note that ATM device names will use the same domain name services (DNS) that
IP hosts use - with an extension that maps 20-byte local addresses to a name.
Figure 5.15
As is the case for IP addresses, there is a process in place for network managers to acquire
unique network name and address space. In the case of ATM there are several registration
Part I. The Technology – May 25, 1998 - 233
authorities from which one can acquire ATM code points (in the US) - namely, the National
Institute of Standards and Technology (NIST) and the American National Standards Institute
(ANSI). Basically, ANSI or NIST assigns a 3-octet organization identifier (ORG) code point.
This ORG field follows 4 octets of identification bits, which identify the country and
registration authority (e.g., ANSI). Thus, once an organization obtains and ORG value, the 7
most significant octets of the ATM address uniquely identifies the ATM network of that
organization. The owning organization is then responsible for the encoding of the remaining 6
octets in the ATM network part of the ATM address. Recall that the least significant 7 octets
of the ATM address are locally (client) significant and associated with the ATM client device.
Summary
0 ATM is available!
Figure 5.16
234 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
ATM Networking
When comes to deploying ATM networks, there are several models you can adopt. Figure
Figure 5.17
If you remember, from earlier in this chapter, one of the relevant characteristics of ATM is that
it supports integrated services. ATM can support voice, video, and data in the campus, in the
WAN, in the carrier network, and in residential access networks, as figure 5.18 and 5.19
portraits.
Figure 5.18
Figure 5.19
At the moment ATM is implemented in Campus, WAN, and Internet backbones, as depicted
on figure 5.20. Figure 5.21 provides the status End-to-end ATM at glance. There have been
some ATM-based trials in residential access environments (cable modems and ADSL) -
commercial services are likely to roll out over the next year mainly for Internet access.
236 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 5.20
At the moment, ATM is being implemented in Campus, WAN, and Internet backbones.
Figure 5.21
In the ATM desktop model, as depicted on figure 5.22, workgroup switches are replacing
Ethernet hubs. Category 3/5 cabling are being used for the LAN emulation in providing
migration path. Also, old applications are being re-written to take advantage of QoS, thus
enabling high quality video and voice to join data. Figure 5.23 provides a status of ATM
Figure 5.22
Figure 5.23
Campus backbone models are using ATM switching to replace FDDI in the backbone. Video
and voice networks are migrating to ATM as data network is flattened. We also see that
VLANs obviate the need for routing, as switched virtual circuits dominate. Figure 5.24
provides an outline of these applications and figure 5.25 provides a status of their
implementation.
Figure 5.24
Figure 5.25
In the WAN model, as shown on figure 5.26, the idea is to replace TDM type multiplexors
with ATM edge switches. These Edge switches support adaptation of LAN data traffic and
Figure 5.26
Also, the idea here is to use the same WAN links to carry voice and data - ATM will allow for
running these links at much higher utilization due to the QoS and backbone WAN (BW)
management capabilities inherent in ATM. The ATM adaptation for voice in this case comes
in two flavors: uncompressed constant bit rate, and compressed (e.g., ADPCM, CELP)
management. Moving to ATM in this arena requires a departure from this inefficient method
of BW management, as depicted on figure 5.27, like any paradigm shift it will take time.
Part I. The Technology – May 25, 1998 - 239
Figure 5.27
Voice in the carrier model means switching voice circuits as ATM circuits, unlike the WAN
ATM voice scenario, as depicted on figure 5.27, which may switch many voice circuits over a
Figure 5.28
Figure 5.29 shows the status of implementations over ATM carrier models. Time Warner
Florida. In that trial ATM circuits terminated in a set-top box - ATM transported MPEG2
video to the set-top. Time Warner found that it is better to use ATM switching in the carrier
network and use MPEG2 as the transport for video. Another perhaps more important finding
was that users are not willing to pay enough money for interactive television to justify large-
scale implementation of such systems. Instead, carriers, telcos, and cable companies are
240 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
focusing on offering Internet-based interactive services to the home. Much of the work in this
area employs ATM switching and in some cases ATM connections to the home. The Remote
Broadband working group in the ATM Forum writes specifications for ATM-based residential
Figure 5.29
0 ATM switches IP
0 Adaptation devices at the edge of ATM networks “adapt” voice, video, and data
Figure 5.30
As IP is the dominant network layer data protocol - ATM network designers are clearly
interested in the requirements associated with using ATM as a transport for IP data. More
specifically, we are interested in how IP uses the services of ATM (or perhaps more correctly -
In general, as shown on figure 5.31, emerging “IP Over ATM” (IPoATM) protocols must
address:
Figure 5.31
Encapsulation issues include how packets are mapped to cells and how the IPoATM protocol
recognizes a stream of ATM encapsulated packets. Emulating a pt-to-pt link means treating a
Integration with legacy networking involves bridging and gateway strategies. Finally,
The Internet Engineering Task Force (IETF) and the ATM Forum, as discussed on chapter 3,
and interoperability in the IP and ATM marketplaces, respectively. On figure 5.32 and 5.33 it
is easy to note that both the IETF and the ATM Forum create interoperability specifications,
Figure 5.32
Figure 5.33
Figure 5.34 provides a layered model to illustrate the similarities and differences between the
Figure 5.34
An ATM backbone network must at minimum support a signaling service, as shown on figure
5.53. Such a signaling service allows for clients (users) to establish connections across the
connection-oriented ATM “cloud”. At present there are two signaling services available for
campus ATM backbones - the ATM Forum defined UNI signaling and the IETF (Ipsilon)
defined general switch management protocol. All switches support UNI signaling and many
The ATM network may also support address resolution services, multicast services, routing
services, etc. - in general, services necessary to support legacy LAN applications (e.g., IP
Figure 5.35
In an ATM environment virtual circuits emulate links, as shown o figure 5.36. Virtual circuits
then act as virtual links, which implies virtual ports and logical networks. At the IP layer the
logical view of the network may be quite different from the physical topology.
Figure 5.36
As we deploy fast LAN switching at the access point of the network and fast ATM switching
at the core of the network, the software intensive IP functions performed by routers is clearly
the bottleneck. Recognizing that IP routing function is required, we look to avoid forwarding
Figure 5.37 describes ATM’s client/server accessibility. Note that this is not an exhaustive list
of client devices. There are other ATM attached devices that perform adaptation such as the
cells in frames attachment device (CIF-AD), which works in concert with Ethernet clients to
attached device that performs no adaptation (ATM WG switches are used in place of these
devices today).
Figure 5.37
Other interesting access devices include cable modems, xDSL modems, and inverse
multiplexing access devices. But if we take a look at the list of interoperability data protocols
of figure 5.38, and pin down the RFC 1483, Multiprotocol Encapsulation, notice that routers
are the only ATM-attached devices in this model, as illustrated on figure 5.39
Figure 5.38
Figure 5.39
Also notice on figure 5.40 that, RFC 1483 defines an encapsulation method for supporting
multi-protocol encapsulation over ATM AAL5. RFC 1483 provides two methods for
supporting this encapsulation. First, LLC/SNAP encapsulation, which uses IEEE 802.2 SAP
headers for multiplexing, protocols over a single ATM circuit. The second method proposes
Figure 5.40
If we look at RFC 1577 (see figure 5.41), Classical IP (CIP), notice that the ATM backbone
supports several services in addition to signaling, as described on figure 5.42. CIP relies on an
one-armed router for routing services. CIP also requires a router for communication with
legacy LAN devices, which makes sense since CIP supports only IP. Thus, LAN clients, such
as servers and workstations, communicate with CIP clients through a router. Also keep in
Part I. The Technology – May 25, 1998 - 247
mind that CIP is a mechanism supporting unicast IP over ATM which requires one-armed
Figure 5.41
Figure 5.42
ATM service for resolving IP addresses into ATM addresses - thus allowing CIP clients to
establish a connection to a destination IP host by using the ATM network’s signaling service.
For IP multicast support over ATM, RFC 2022 provides a mechanism for mapping IP
Figure 5.43
An one-armed router provides routing services for the ATM backbone, as described on figure
5.44. An one-armed router can also provide routing services between CIP logical IP subnets
by becoming a member of each logical IP subnet (LIS). Note that a logical IP subnet is defined
Now, an one-armed router is so-named because it attaches to the ATM backbone via a single
ATM physical link. The router then associates logical ports with the lone ATM interface by
joining logical IP subnets. There is then a virtual link associated with each logical port.
Figure 5.44
Legacy IP subnets and hosts, as shown on figure 5.45, communicate with CIP subnets through
Figure 5.45
Part I. The Technology – May 25, 1998 - 249
Classical IP clients
Remember that the classification of RFC 1577 given here applies to RFC 1577 alone. By
adding functions specified in new RFC’s and Internet drafts into RFC 1577 networks, one can
build a more complete system - though other protocols, specially MPOA, integrate all of these
The ATM backbone supports several services in addition to signaling the Next Hop
Resolution Protocol (figure 5.46) is one of them. NHRP adds cut-through routing as an ATM
service. LAN clients communicate with NHRP clients through a router, as diagrammed on
figure 5.47.
Figure 5.46
Figure 5.47
NHRP enhances CIP function by adding “shortcuts” as outlined on figure 5.48. That is, the NHRP
routing function is provided as a function of the ATM backbone. This routing function allows NHRP
clients which are members of different LIS’s to establish a “shortcut” path through the ATM cloud -
recall that with CIP a one-armed router must forward packets between LIS’s.
Figure 5.48
In this situation, NHRP provides a short-cut path from one edge of the IP cloud to the other -
avoiding interior routing hops. NHRP requires the same address registration function as CIP,
as shown on figure 5.50, and adds distribution of address resolution across LIS boundaries
Figure 5.49
Figure 5.50
NHRP clients
Part I. The Technology – May 25, 1998 - 251
The ATM backbone supports several services in addition to signaling. The ATM Forum LAN
emulation (figure 5.51), also know as LANE, is another one. LANE relies on a one-armed
router for routing services. It employs a router for communication with the Internet, as
described on figure 5.52. LANE clients can be LAN switches and ATM-attached stations.
Figure 5.51
Figure 5.52
ATM LANE services, as shown on figure 5.53, provide the means of mapping a
Thus, LANE provides an ATM service for resolving LAN MAC addresses into ATM
addresses - thus allowing LANE clients to establish a connection to a destination LAN station
by using the ATM network’s signaling service. Additionally, LANE provides a mechanism
for mapping LAN multicast (address-based) into ATM multicast (tree-based) - the broadcast
Figure 5.53
As for LANE routing services, as described on figure 5.54, is an one-armed router that
provides routing services for the ATM backbone. An one-armed router can provide routing
services between LANE emulated LANs (ELANs) by becoming a member of each ELAN.
Note that an ELAN is defined as the set of hosts, which register their MAC and ATM address-
Figure 5.54
As for LANE clients, LANE was designed as migration protocol, allowing ATM-attached
stations to communicate with each other using applications written for connectionless
environments, as shown on figure 5.55. Additionally, LANE was designed to support bridged
communications between legacy stations over an ATM backbone. The intent truly was that
this be a migration technology - employed only to allow for graceful switch over to an ATM
desktop solution with LAN applications re-written to the native ATM API. The fact is, there
Part I. The Technology – May 25, 1998 - 253
are still no native ATM applications (well other than LANE itself). LANE is now being re-
Figure 5.55
LANE clients
The ATM Forum Multiprotocol over ATM (see figure 5.56) is identical to LANE, with the
figure 5.57.
Figure 5.56
Figure 5.57
MPOA’s diagram
254 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
ATM MPOA services, as shown on figure 5.58, provide a means of mapping connectionless,
environments. Thus, MPOA provides ATM services for resolving LAN MAC addresses and
network addresses into ATM addresses, allowing MPOA clients to establish a connection to a
destination station or host by using the ATM network’s signaling service. Additionally,
MPOA provides mechanisms for mapping LAN multicast into ATM multicast (tree-based).
Figure 5.58
MPOA adds NHRP to the LANE one-armed router. In addition, there is a mechanism for
MPOA clients then can perform layer 3 packet forwarding functions and cut-through the
In LANE, as shown on figure 5.59, the one-armed router acts just as a traditional router
performing packet forwarding and route processing, but only with logical ports, instead of
physical ports. MPOA adds NHRP function to these one-armed routers. By adding NHRP,
the one-armed router sheds the responsibility of steady-state packet forwarding, which is now
handled by clients directly since NHRP allows for the establishment of shortcuts between
Part I. The Technology – May 25, 1998 - 255
MPOA clients. Thus, MPOA defines a distributed routing solution, separating routing
Figure 5.59
As for MPOA clients, just as NHRP enhances, actually replaces, CIP with shortcut routing,
MPOA is LANE enhanced with short cut routing, as shown on figure 5.60.
Figure 5.60
MPOA clients
IP Switching and Multiprotocol Label Switching (see figure 5.61) requires a single signaling
service in the ATM backbone, as shown on figure 5.62. Routers, LAN switches, servers, and
Figure 5.61
Figure 5.62
In Classic IP, LAN Emulation, and Multiprotocol over ATM, MAC and IP addresses are
mapped to ATM addresses, so that ATM signaling can be used. Due to that mapping, ARP
services are required to resolve legacy addresses into ATM addresses (see figure 5.63). In IP
switching protocols, IP flows or topology are mapped to ATM virtual circuits directly. This
Figure 5.63
The purpose of IP switching is to avoiding replication (see figure 5.64). ATM provides new
complex mechanisms in support of multicast, routing, and addressing. There are already
protocols (and more importantly applications) supporting these functions for IP. IP switching
marries IP functionality with the hardware benefits of ATM switching. The result is that IP
Part I. The Technology – May 25, 1998 - 257
routing function is applied at the edge of the ATM network and ATM switching becomes the
Figure 5.64
As for IP switching client, much like NHRP and MPOA, the concept of IP switching is to
avoid processing packets in routers in the middle of the ATM network - where possible router
Figure 5.65
IP switching client
258 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Summary
In summary, LANE, MPOA and IP switching provide solutions, which allow for building a
robust backbone network based on an ATM switching core. Figure 5.66 provides an outline
Figure 5.66
What’s Next
This chapter discussed the ATM data model, its network services, data protocols and LAN
emulation, as well as ATM MPOA services. The next chapter, “Packet Voice Communication
Chapter 6
Voice Communication
Communications systems evolve to meet the needs of the computing environment. As you’ve
seen throughout this book, we are in the midst of a major IT evolution, actually the second
revolution in the computing environment, in that we are moving from the "time-shared" host-
*****Start TIP*****
Part I. The Technology – May 25, 1998 - 261
If you’re wondering what the first revolution of computing was, it was the evolution from
equipment. Thus, the mode of scheduling the work of the user around the computer (batch)
evolved to scheduling the work of the computer around the user (interactive).
*****End TIP*****
This move to internetworked workstations, however, has not removed the need for
relatively small units. In this mode, no more information is normally transferred than the
amount of information that will fit on a single screen - about 1920 characters (24 lines of 80
characters each).
This interactive processing has become our dominant mode of computing over the past ten to
fifteen years. Consequently, our current data communications networks have been designed to
Figure 6.1
This chapter discusses the traditional host-based network model and its evolution to
broadband packet networks. One of the major players in the broadband packet networks is
Nuera Communications, which has a significant presence in the VoIP industry. Nuera
to provide technology and products that are unmatched in the areas of telephony, call
******Start NOTE******
This section was based on a whitepaper written by Steven Taylor, from Nuera
Communications. For a full version of this paper or for additional information about Nuera’s
VoIP technology and products, please check chapter 8, “Voice Over IP: Can We Talk?” or
*****End NOTE*****
Part I. The Technology – May 25, 1998 - 263
supercomputers, were linked directly to other computers or terminals, even though the actual
line may first go into a front-end processor, typical for a minicomputer. The typical speed for
The most typical type of connection is the local connection, a terminal directly connected to
the host represented on figure 6.1 as the terminal/computer directly connected to the host.
they were locally attached. The data transmission speed needs for each terminal is limited in
reality by the "screen-based" mode of communications. That is, the user digests the contents
of one screen of information before requesting another screen. Increasing the speed of the
transmission line increases the speed with which the screen is repainted, but provides few
other operational advantages. Thus, there is little to be gained once the screen is repainted
very quickly.
The terminal/computer connected through the squared box, on figure 6.1 have a link to the
host computer. This link represents a link to a single remote device. This usually is a link over
an analog telephone line, with typical speeds up to 19.2 kbps. If a faster link is needed, this
may also be accomplished at a typical speed of 64 kbps via ISDN. In the case of analog
264 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
telephone lines, the squared boxes represent modems, but if in the case of ISDN, they would
represent terminal adapters. This type of connection is usually a switched connection. That is,
the connection is established for each session, and connectivity is possible to a number of
Now, if you need to connect a number of terminals using a single communications link, than
you would need a multiplexer. The trapezes representations in figure 6.1 represent
multiplexers perform the same basic function, allowing multiple conversations to share a
single transmission facility, whether the transmission line is as simple as 9.6 kbps modems
with an analog phone line or as complex as a 45 Mbps T3 service. The multiplexers come in
0 Statistical Multiplexers.
Notice the terminals in the remote clusters, attached to the multiplexer. The speed for each
interface is usually the same speed as the computer interface. The type of multiplexer used and
the traffic characteristics will determine the maximum data throughput per terminal. The data
transmission speed requirement for each terminal is limited in reality by the "screen-based"
mode of communications. That is, the user digests the contents of one screen of information
Part I. The Technology – May 25, 1998 - 265
before requesting another screen. Increasing the speed of the transmission line increases the
speed with which the screen is repainted, but provides few other operational advantages.
Thus, there is little to be gained once the screen is repainted very quickly.
The move to workstation-based computing has evolved as the power of the personal computer
has risen exponentially. Many users now have more computing power on their desktops than
the mainframe computers had just a few years ago. This vast increase in power has moved
many of the computing tasks from the mainframe to the personal workstation. This has not,
Nevertheless, it has resulted in vast changes in the mode of communications. Now, rather
while this information is in vast quantities, the rate of the transmissions is much more
sporadic. In some cases, as many transmissions per minute would be needed as in terminal-
host communications. This might be the case if the application used high-resolution graphics
with a supercomputer acting as the host and the high-performance workstation acting as the
terminal. In other cases, a database may be downloaded, massaged for minutes to hours, then
Figure 6.2
*****Start NOTE*****
The term file used as base for workstation-based communication is used here in a context of a
large amount of information consisting of many more than 1,920 characters. Depending on the
actual application, this file may constitute an actual data file, such as a part of a database; a
*****End NOTE*****
These applications have been under development for several years using intensive data sharing
on the LAN. In this case literally several million bits per second of information throughput are
available between workstations at a relatively low cost. In the wide area network, though, this
is not the case. While multimegabit per second throughput is available, it is still quite
expensive. Thus, the challenge is to provide connectivity across the wide area network for
highly bursty high bandwidth applications to support this change in the norm for the
computing environment. Meeting this challenge is the goal of broadband packet networking.
Part I. The Technology – May 25, 1998 - 267
When any of the broadband packet technologies are discussed, the first and foremost
application that is discussed is the local area network (LAN) internetworking - the
interconnection of remote LANs. Although this discussion is partially a true, the genuine need
is not directly related to the fact that there are LANs that need to be interconnected. Rather,
the needs are generated by the type of traffic that is typical for LANs, and the fact that this type
tend to be quite bursty. Due to the nature of these applications, varying from file servers
through shared graphic images, they are already becoming commonplace in LANs. Now,
demand is growing to be able to perform these same tasks across the wide area. Thus, we are
faced with supporting bursty, high bandwidth applications across the wide area while being
We must be careful to remember, though, that even though LAN interconnection is discussed
in that and in other contexts as the killer application, this is true only because the type of traffic
that severely needs broadband packet technology is usually associated with LANs. Host-to-
host traffic may generate this type of traffic as well, depending on the application, and the
shown in figure 6.3 doesn't really need broadband packet if the traffic is terminal-to-host
traffic that just happens to be using a LAN as the local transport mechanism.
Figure 6.3
A typical LAN-to-LAN traffic doesn’t need broadband packet if traffic is based on terminal-to-host.
Internetworking LANs
Internetworking or the interconnection of LANs via bridges and routers has become standard
practice and is one of the fastest growing areas of the networking marketplace. The challenge
transmission facilities in the wide area portion of the network. LANs typically run at several
megabits per second. Thus, information is transferred among devices connected to the LAN at
devices to perform as if they were all connected to a single LAN. While this is possible insofar
as providing physical connectivity and the potential for information transfer, the actual rate of
information transfer is usually vastly inferior to that on the LAN itself. Hence, the
Part I. The Technology – May 25, 1998 - 269
connectivity is there, but the performance may not be there, especially for file-based
interactions.
The reason for this lack of performance is that LANs with megabits per second of
transmission speed are interconnected via WAN transmission facilities with tens of kilobits
per second. This model works fine for transaction-based communications based on a
When file-based transactions are needed, there are two choices. Either use traditional speeds
in the 56 kbps range with relatively poor performance but good utilization of the facilities, or
move to T1 which provide excellent performance but only actually use the available
bandwidth a small percentage of the time. It is exactly this dilemma that broadband packet
networks address.
Figure 6.4 illustrates a typical internetworking of LANs. The larger shaded squares on the
figure are bridges or routers used to provide connectivity among LANs via wide area
transmission facilities. In this case, the transmission facilities are dedicated. Every LAN (A, B
and C) can have their own physical topology, varying from Token Ring LAN to Ethernet,
either coax or twisted pair, or even an FDDI ring. The only key is support by the bridge or
router.
270 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 6.4
The smaller rectangles connecting the terminal/computer to the LAN represents the media
access device. It may be an external device, such as a terminal server, or it may be internal to
the computer, workstation, or other computing device. If this is a Token Ring network, the
media access device may be called a MAU (Media Access Unit), for example.
When LANs are interconnected via some form of packetized network, network bandwidth is
allocated only when it is actually needed. These networks become especially appropriate for
The term "Broadband Packet" is used to indicate that the speeds supported by the packet
networks are in the range of megabits per second and higher. Thus, several megabits per
second may be allocated to a particular file transfer for the seconds that the bandwidth is
needed. For instance, rather than allocating tens of kilobits per second (e.g. 56 kbps) on a
Part I. The Technology – May 25, 1998 - 271
constant basis, a much larger amount of bandwidth (e.g. 1.544 Mbps) may be allocated, but
only for the amount of time that it is actually needed. At any other time, other users may vie
for this pool of dynamically assigned bandwidth. Indeed, this may be considered a form of
Figure 6.5
Looking at figure 6.5, the larger squares, representing bridges or routers are used to provide
connectivity among LANs via wide area transmission facilities. But in this case, the
bridge/router supports an interface that is designed for use with a Broadband Packet network
These little circles, connecting the larger squares to the Internet cloud are interfaces for the
type of Broadband Packet network being used. This may be an interface for Frame Relay,
SMDS, or ATM. The specifics for each of these interfaces will be discussed in detail in later
in this chapter. This interface guarantees that the data is packetized in an appropriate format to
The physical interface will typically be a standard serial interface of some form. At speeds up
to a few megabits per second, this will typically be a V.35 interface. At higher speeds, the
HSSI interface will typically be found. The type of service (Frame Relay, SMDS, or ATM)
and the nature of the service (public or private network) will determine the details of the
connections here.
The broadband packet network is the heart of the system. It is a network that is designed to
public network service is used, the actual packet switching equipment may be within the
The key to the packet network is LOTS OF TRAFFIC from LOTS OF SOURCES. This
allows the bandwidth that might otherwise be dedicated to individual point-to-point dedicated
dynamic basis.
Understanding Fractional T1
Fractional services, by definition, are services in which one purchases a portion of a whole.
Currently, when we hear of services like fractional T1, we usually think of the service as a
Part I. The Technology – May 25, 1998 - 273
depicted in figure 6.6, one may buy 256 kbps or 512 kbps instead of the entire T1 (1.544
Mbps). In most cases, the bandwidth purchased will be an integral multiple of either 56 kbps
or 64 kbps.
Figure 6.6
When the bandwidth is purchased in this fashion, we call it "bandwidth fractional" because we
are buying a fraction of the full bandwidth over a relatively long period of time, weeks to
months to years.
It is also possible to purchase transmission capabilities by a method by which one buys all of
the bandwidth, but only for a packet-time. Of course, no carriers really charge for the packet-
time in those exact terms, but that is exactly what you are paying for whenever you use a
packetized service.
274 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
In fact, the same principle applies when using any packetized service, whether it is on a public
or a private network. Since one has access to all of the bandwidth for a fraction of the time, we
use here the term "time fractional" to make a distinction between the two possible types of
Figure 6.7
Time Fractional T1
Time fractional services, such as those provided by the broadband packet technologies, are an
excellent fit for the evolving needs for file-based communications. If a file of several
megabytes of information needs to be transmitted, all of the available bandwidth is needed for
the duration of the transmission. Once the file transmission is finished, no bandwidth is
needed. Thus, the time fractional model provides an excellent complement to the current and
emerging needs for wide area communications, especially multimedia application, such as
VoIP.
Part I. The Technology – May 25, 1998 - 275
The concept of bandwidth fractional and time fractional services is really just another way of
looking at multiplexing. If a single organization has access to the entire transmission facility,
such as a T1 circuit, and it subdivides the transmission facility among several tasks, this is the
classical use of multiplexers in the private network. Carriers have used similar techniques for
Any type of digital multiplexer requires some form of framing. The signal coming from the
transmission facilities is nothing more than a series of ones and zeros. There is nothing about
these ones and zeros that inherently separate the one conversation from another. Thus, there is
a need for some form of structure to identify, which ones (sheep) and zeros (cows) belong to
Figure 6.8
*****Start TIP*****
*****End TIP*****
Circuit Multiplexing
Circuit multiplexing, or time division multiplexing, is the most basic form of digital
multiplexing. The basic time division multiplexer simply divides the available bandwidth
among the different applications on a dedicated basis. Each applications has its share, and
other application may not "borrow" from any other applications based on whether the
Figure 6.9
0 Circuit multiplexers tend to be relatively fast and relatively inexpensive. Since they
are conceptually quite simple, circuit multiplexers are the first multiplexers to be
multiplexer ships bits from one end to the other without regard for protocol. Thus, by
0 There is virtually no variation in the delay from one set of bits to the next3. This is
likewise a function of the transparent nature of the device. Variations in delay usually
result from delays due to traffic congestion and retransmission. These delays are
found in packet multiplexers. The consistency in delay obviates the problems caused
by variable delays when transporting synchronous protocols like SNA and X.25.
of circuit multiplexers require less than one percent of the total bandwidth for this
3
There is indeed some variation in the speeds, commonly referred to as "jitter" and "wander." However,
the variations from these factors, as well as from other factors like doppler shifts in satellite systems, are
microscopic and insignificant for the discussions in this section.
4
The framing overhead is the amount of overhead that is required to perform the framing functions. That
is, the overhead used to keep track of which bits belong to which conversation.
278 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
type of overhead. For instance, the standard channel bank5 uses only 1 out of 193 bits
in the frame for framing in the standard super frame6 (SF) format. In the extended
super frame7 (ESF) format for channel banks, the framing actually used to identify
If you look at the figure 6.9, the numbers lined-up vertically on the left and right sides of the
figure represent the various inputs to the multiplexer. The channels may carry any type of
traffic. Also, the speeds for the channels are arbitrary. They may be any mix, but, since the
bandwidth is dedicated, the sum of the speeds must not exceed 9600. In fact, they sum of the
speeds must be slightly less than 9600, so the figure actually does not provide an accurate
account of this process. However, the framing overhead for time division multiplexers is so
The triangles represent the multiplexer hardware. The multiple channel side is the
input/output for the various channels, and the single connection side represents the connection
5
A type of digital multiplexer that has become a commodity product within the telephone companies. The
channel bank transforms 24 analog voice conversations to 64 kbps digital voice (per conversation) and
formats the digital conversations for transport across a single 1.544 Mbps transmission facility (T1 line).
6
SuperFrame is a framing format used in "D3" and "D4" multiplexers. It consists of a "superframe" of 12
frames. Each of the 12 frames contains a single 8-bit sample from each of the 24 channels, plus one
framing bit.
7
Generally viewed as an enhancement for SF framing, the ESF (Extended SuperFrame) format reassigns
the use of the single framing bit in each 193-bit frame. One fourth of the "framing bits" are used for
identifying the channels, one-fourth are used to provide error detection (for diagnostic purposes only; not
for retransmission), and one-half are used for supervisory communications and control.
Part I. The Technology – May 25, 1998 - 279
to the transmission facilities. For simplicity, all of the multiplexers shown on figure 6.9 are
point-to-point single transmission link applications. In reality, many multiplexers, both circuit
and packet, support switching capabilities and multiple links for more complexes network
applications.
In the figure 6.9, the amount “9600” represents the transmission facilities between the two
multiplexers. The use of the speed "9600" is for demonstrative purposes only. In this case, it
may be thought of as a 9600 bps modem link. It may equally as well have been a 1.544 Mbps
(T1) link connecting two channel banks. In that case, the link would have supported twenty-
The numbered portions of the frame diagram represent the "payload" of the frame. This is the
information that is transported for each individual channel. Note that these are fixed
information payloads for each channel, resulting in the dedicated bandwidth for each channel.
Packet Multiplexing
Packet multiplexers, often called statistical multiplexers, are an alternative means for
transporting data from one point to the next. The packet multiplexer derives its power from
transporting the data in packets, or message units, rather than as a continuous flow of
information.
280 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Most data is not continuous. Rather, is usually occurs in bursts of some form. When there is a
burst of data, bandwidth is assigned to transport that data across the wide area network. When
there is no data to be transmitted, no wide area bandwidth is assigned. Thus, the packet
multiplexer differs from the circuit multiplexer in that there is no pre-assigned dedicated
bandwidth for any of the channels. Rather, bandwidth is assigned on-demand as it is needed,
Figure 6.10
This capability lends distinct characteristics to the packet multiplexer, as shown on figure
6.10:
0 Protocol sensitivity is a requirement for any type of packet multiplexer. Since the
multiplexer only transmits data when there is "real" data to be transmitted, the
multiplexer must be able to determine the difference between "real" data and traffic
that may appear on the line as fill. It is the removal of the "fill" traffic prior to
transmission and reinsertion on the opposite end that provides the vast majority of the
Part I. The Technology – May 25, 1998 - 281
efficiency found in packet multiplexers. Still, the multiplexer must have some
knowledge of what the protocol is in order to recognize and remove the fill characters.
0 Packet multiplexers can provide extremely efficient use of the bandwidth available on
the transmission facilities. Since no channels have any bandwidth dedicated for their
exclusive use, the bandwidth is available for channels that need bandwidth on an as-
needed basis. Thus, if the total traffic pattern has lots of channels with each channel
needing the bandwidth on a "bursty" basis, the aggregate transmission bandwidth may
be shared.
0 Since the aggregate transmission bandwidth is shared among the channels, the delays
in the packet system will be much more variable than in the circuit multiplexer. If
there are only a few channels contending for the bandwidth, the amount of bandwidth
available to each channel is fairly high. On the other hand, as more and more
channels contend for a fixed amount of bandwidth, the percentage of the total
available to each channel is lower, thus increasing the overall delay. (The
transmission bandwidth between the two packet multiplexers is still limited to the
multiplexers have. This is because the data in each "packet" of information must be
explicitly addressed or labeled. In the circuit multiplexer, the channels are identified
282 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
by their position in the frame relative to the framing bits. In the packet multiplexer,
there are not predefined framing bits. This requires a label on each packet of
packet switches and statistical multiplexers, devices that were developed primarily to
transport asynchronous ASCII data that has no inherent protocol. While the
delay variability because packets that are not retransmitted are delivered more quickly
than packets that require retransmission. The addition of this layer of protocol also
If you look at figure 6.10, the column of numbers 4800 on the left represent the input/output
channels for the packet multiplexer. Note that the sum of the channel speeds can exceed the
speed of the transmission links. It is not possible, however, for the channels to operate
continuously and simultaneously at these speeds. Rather, there are the speeds at which the
data is communicated to and from the multiplexer. The actual throughput rate will depend on
The rate at which the various channels submit data to the multiplexer may actually exceed the
transmission rate for a short period of time. The excess data will be stored temporarily in
buffers in the multiplexers until the traffic has dropped off sufficiently to empty the buffers.
The actual throughput for an individual channel will never exceed the rate of the transmission
facilities. In fact, it will always be somewhat less due to overhead, even if the channel has sole
The list of channels across the figure 6.10 represents the data that will be specific to the data
from a given channel. For simplicity, the area shown here includes both the "packet" and the
"frame" portion of protocols like X.25, so the use of the term "packet" here indicates the
generalized use of the term to indicate that the data is transmitted in discrete bundles or
message units. It does not refer explicitly to the packet level of the X.25 protocol.
The hashed area in the beginning is the header. This will contain information that identifies
the contents as belonging to one particular channel. The solid area in the center will contain
the actual data from a specific channel. If the packet multiplexer is "frame oriented," the
actual length (number of bytes) in the payload will be variable. If the packet multiplexer is
"cell oriented", there will be a fixed number of bytes in the payload. The differences between
frames and cells will be explored later in more detail. The hashed area at the end represents
any "trailer" information that might be present - depending on the actual format used. In many
284 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
cases, the trailer information will contain a 16-bit error detection code (CRC - or Cyclic
Redundancy Check) that is used to determine whether an error occurred during transmission.
Packet Switching
Packet switching is a logical extension of packet multiplexing. Each message unit (frame or
cell) in the packet multiplexed data stream has a unique address identifying which channel
"owns" that particular information. The packet switch can accept this information and route it
As depicted in the figure 6.11, each message unit entering the switch will have a message unit
identifier - in this case either an "A" or a "B" - identifying the owner of the information.
Assuming that "A" and "B" are located at separate locations, the switch then sends that
information along an appropriate path to either the "A" destination or the "B" destination.
Figure 6.11
Packet switching
Be careful not to take the "A" and "B" designations too literally in this example. Depending
on the design of the system, the "A" or "B" identifier may actually stay with the message
Part I. The Technology – May 25, 1998 - 285
throughout the transmission path (as depicted here), in which case the "A" or "B" is a form of
global address, much like the address on a letter. This is a major characteristic of a
connectionless architecture.
Conversely, the switch may keep track of the connections and use the "A" or "B" as a circuit
number for only a singular transmission facility. In this case, a single message may actually
have several different "message identifiers" as it traverses the network. This method allows
the addresses to be reused on every link, consequently supporting a larger network for the
Neither connection-oriented nor connectionless architectures are inherently better than the
other. Each has its own strengths and weaknesses, so don't be misled by claims that one is
"good" and the other is "bad." In fact, many of the advantages and disadvantages of each are
In the broadband packet technologies two of the technologies - frame relay and ATM - are
Broadband packet switching is a specialized form of packet switching and multiplexing. The
use of the word "broadband" implies that the technologies are appropriate to be used at
Broadband packets are fundamentally the same as any other type of packets. They consist of a
header, a payload, and, optionally, a "trailer." All three8 types of broadband packet networks
The inherent protocol in the traffic will guarantee delivery, so the network need not
perform that task. This assumption allows the network to bypass processing tasks that
guarantee delivery, thus accelerating the throughput possible with a given amount of
processing power.
8
Frame Relay, SMDS, and ATM are the three technologies usually included under the "broadband packet"
umbrella.
9
Traffic being transported that already has a protocol in the traffic, like SNA/SDLC, X.25, and most LAN
protocols. In contrast, traditional asynchronous ASCII communications have no protocol, so the network,
typically X.25 or statistical multiplexers, must protect against transmission errors.
10
Transmission facilities with low error rates, particularly typical of fiber optic transmission facilities.
Part I. The Technology – May 25, 1998 - 287
error. This makes the error detection on an end-to-end basis performed inherently in
Figure 6.12
0 The flag or delimiter identifies the beginning of a message unit. This separates one
message unit from another. In frame oriented technologies, the flag will usually be an
eight-bit character with the hexadecimal value of 7E. Flags are also used to provide
fill between frames. In cell oriented systems, the function of the flag may be
accomplished with a fixed format, much like the framing bit in the circuit (time
division) multiplexer.
0 The header portion of the message unit provides the identification of the owner of the
information. In frame relay and ATM, the header is used to identify the circuit
number on the individual link. The switches then provide connections among "circuit
numbers" to route message units to their appropriate destinations. In SMDS, there are
actually two forms of "message units." In one of the formats, circuit numbers are
288 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
used just like in frame relay and SMDS. In another type of message unit, the header
The header may also contain information to be used for congestion management and
for error detection for control messages. Having the error detection in the header is
usually found in cell headers. Frames usually use the "trailer" for error detection.
0 The payload is the "information" portion of the message unit. The payload consists
of the traffic being transported in its native format. A single payload may contain an
the payload has no error detection functions within the broadband packet network, the
payload will often contain error detection information as a part of the upper layer
0 Notice that trailers is optional. Some broadband packet formats use trailer
information; others do not. When a trailer is used, its primary function is to provide
error detection for the header and the payload. When a trailer is used to provide error
detection for the entire payload, this is usually done due to the convenience of using
The critical task of error control in a broadband packet system is to insure the
integrity of control messages and to make sure that the header was not corrupted.
Part I. The Technology – May 25, 1998 - 289
This may be accomplished by placing error control either in the header itself or in the
trailer.
The result of these assumptions is that all three implementations are much more similar than
they are different, especially when compared with traditional technologies like T1
0 Support for speeds of T1 and above, with ATM technology approaching the Gbps11
range;
These characteristics that result in the performance of broadband packet systems at high
speeds lead to the term that is sometimes applied to the technologies: "Fast Packet." At the
11
Gigabits per second, or a BILLION bits per second.
290 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
same time, none of the technology offer guaranteed delivery of data, including retransmission
on error. This is left to the higher level protocols that are implemented in the DTE (This may
Since broadband packets come in various forms, such as frames and cells - the next topic, it is
convenient to have a term to use when referring to a generic packet. One of the most useful
Among the broadband packet technologies, frame relay and one level of the SMDS interface
protocols are based on frames. ATM and the other level of the SMDS interface protocol are
based on cells.
The fixed versus variable lengths for frames and cells result in some distinguishing features, as
0 The delimiter between frames is a character (7E), and this character is recognized as a
distinct portion of the data stream. By contrast, since cells are of a fixed length, the
delimiter may be quite similar to the framing bit in the circuit multiplexer format.
0 Frames generally have a "trailing" error control field. Cells generally include error
control in the header. This is a function of convenience for equipment builders more
0 The delay for cells is generally less in duration and is more predictable than for
frames, making cells generally more appropriate for voice and video. (This only
matters if you are going to be carrying voice and/or video in the network.)
Figure 6.13
Optional delimiter used to separate cells. It will normally be provided from a fixed
framing structure, similar to - or even identical to - the framing bits in the circuit
multiplexer.
0 5 octets, is the header portion of the message unit provides the identification of the
owner of the information. In frame relay and ATM, the header is used to identify the
circuit number on the individual link. The switches then provide connections among
there are actually two forms of "message units." In one of the formats, circuit
numbers are used just like in frame relay and SMDS. In another type of message unit,
the header actually contains the global address for the message unit. The header may
also contain information to be used for congestion management and for error
Unlike frame structures, multiple framing bits or characters are NOT used to provide
fill between cells when there is no data to transmit. Instead, entire empty (or null)
characteristic of a cell is the fixed size of the payload. In the case of ATM, the size of
the payload is 48 octets (8-bit bytes). The payload consists of the traffic being
Part I. The Technology – May 25, 1998 - 293
transported in its native format. However, since the native format will seldom be the
exact same size as the cell, it usually must be segmented into several cells.
0 Frame flag, used to separate one message unit from another. In frame oriented
technologies, the flag will usually be an eight-bit character with the hexadecimal
value of 7E. There is generally a minimum of one flag between frames. Multiple flag
characters are used to provide fill between frames when there is no data to transmit.
0 The header portion of the message unit provides the identification of the owner of the
information. In frame relay and ATM, the header is used to identify the circuit
number on the individual link. The switches then provide connections among "circuit
numbers" to route message units to their appropriate destinations. In SMDS, there are
actually two forms of "message units." In one of the formats, circuit numbers are
used just like in frame relay and SMDS. In another type of message unit, the header
actually contains the global address for the message unit. The header may also
contain information to be used for congestion management and for error detection for
control messages.
294 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
0 The payload is the "information" portion of the frame. The most fundamental
minimum payload size is typically a single character. There is a maximum size, and
this is often negotiated at call set-up. The typical maximum sizes range from about
The payload consists of the traffic being transported in its native format. A single
payload may contain an entire native-mode message unit if the message unit will fit
within the maximum size constraints. If the native-mode payload is larger than the
maximum size for the payload, it must be segmented into several frames.
0 The CRC, or critical task of error control in a broadband packet system is to insure the
integrity of CONTROL messages and to make sure that the HEADER was not
corrupted. This may be accomplished by placing error control either in the header
Once again, though, remember that these characteristics hold in general, but not always.
Neither frames nor cells are inherently better for all applications. In fact, even for an
application that is generally served better by one of the technologies, the exact performance
Interface standards
An often-recurring concern with all of the broadband packet technologies is whether there are
any standards. There are full suites of standards in place and/or in definition for each of the
Most of the standards in place are User-to-Network Interface (UNI) standards. As such, they
define the rules for passing information from a piece of "Data Terminal Equipment" (DTE),
such as a bridge, router, broadband packet "PAD", broadband packet concentrator, or front-
end processor, to a packet transporting network. This network may be a carrier network or a
private network owned and operated by the user. Its function is to transport broadband packet
of some type from the entry point to the destination by whatever means it deems appropriate.
The internal structure of the network, often called the "network architecture," is generally not
subject to the standards. Each individual network may transport the information among the
network nodes in any manner the network designers choose. In fact, most networks will use a
While this may appear on the surface to be a severe limitation, it really is no different from
most other standards. In fact, it's exactly like the granddaddy of all standards, X.25, in that
X.25 is also a UNI specification. Each individual packet network uses it own internodal
Figure 6.14
If the entire network architecture were standardized, there would be little or no incentive for
the equipment manufacturers to build products that are better, just cheaper. Thus, the
proprietary nature of the network architectures allows the competitive factors in the market to
Data transfers between disparate X.25 networks are accomplished via X.75, the Network-to-
Network Interface (NNI) specification. Similarly, NNIs developed and/or are being
The standards work is not over, though, and there are several areas in which the work is
continuing. The most important point to remember is that many broadband packet standards
are here, they're real, and they're functional. Standards are living documents, though, so the
One must also realize that the broadband packet standards are not designed to accomplish all
of the tasks in the network. In reality, the standards only address a very narrow subset of the
Figure 6.15
Rather than a complete protocol, the broadband packet technologies may perhaps be best
thought of as the WAN equivalent of a "MAC layer" (media access control layer) protocol in
the LAN world. The standards define how multiple applications may share the transmission
higher layer protocols and protocol translation is not part of broadband packet's task set.
Thus, as indicated on figure 6.15, broadband packet accomplishes some of the traditional level
2 and level 3 tasks. These are all that is needed to fulfill the mission. Also, while some of the
implementation, the fundamental transport tasks for broadband packet can generally be
What’s Next
This chapter discussed broadband packet networks and voice communication. The next
chapter, “Low Bit Rate Vocoding Methods,” discusses the digitization of voice, both the
Chapter 7
Codecs Methods
This chapter provides you with a more in-depth discussion of codecs technology as well as
vocoding methods.
The basic functionality of a video codec is to enable the transmission of various audio, video
and data signals over digital telephone networks. In general terms, an audio/video codec
Figure 7.1
Let's look at the compressor side. A standard video signal coming from cameras or tape
players is first digitized into a 135 Mbps feed. Since this rather high bandwidth is difficult to
transport economically, one must first compress it down to a more manageable bit rate. While
many compression techniques exist, most codecs on the market rely on either Delta Pulse
compressors achieve very high compression ratios, up to 200:1. Others compress as little as
The same process is applied to audio signals, which are first digitized, and compressed as
well. The compressed digital video data is then multiplexed with the compressed audio data
302 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
and, in some cases, external digital data. The resulting data stream is then formatted according
The decompressor side reverses the process. It demultiplexes the original, compressed digital
video, audio and data streams, and feeds the resulting signals to the respective decompressors.
The decompressed signals are then converted back to their original, analog form.
Audio Codecs
An audio codec (COder/DECoder) is a software scheme that takes analog audio data and
encodes it into some sort of binary format for digital storage and/or processing. It then decodes
the data and attempts to reproduce the original sound. Due to the massive size of digital audio
data, codecs usually involve some sort of compression. Audio codecs can be broadly divided
0 Waveform codecs
0 Source codecs,
0 Hybrid codecs.
Part I. The Technology – May 25, 1998 - 303
Waveform Codecs
Waveform codecs tries to save enough data about the original sound wave to enable it to be
reconstructed upon playback, by reproducing the sound wave itself, which has several
advantages over the other two types of audio codecs, as they try to synthesize sound.
Another advantage of waveform codecs is that they are device independent, which in theory
enable them to reproduce all sorts of sounds, regardless of its source. You don’t need high-end
computers to run this type of codecs, as its software to encode and decode is not as complex as
the others. Thus, a 486 Intel box can be plentiful. Of course, with the price of computers
getting cheaper, you might consider using a Pentium-based (RISC? Why not!) computers, as
the audio codecs can be run quickly and easily, resulting in almost instantaneous playback.
The only disadvantage I see on waveform codecs is that they files tend to be large. Windows
95 and NT offer several types of waveform codec, including PCM, companding and ADPCM
codecs.
Pulse Code Modulation (PCM) is the simplest form of audio codec. PCM is also the method
used by Microsoft Windows when automatically saving a WAV file. PCM files don’t use any
form of compression. Thus, a music clip digitalized at 22,050 Hz 8-bit mono (radio quality)
will require more than 22 KB of file size per second of audio when saved in this format. CD-
304 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
quality sound files in this format are eight times larger. However, PCM-format WAV files are
*****Start NOTE*****
If you’re interested to learn more about the method in which the PCM codec digitalizes audio,
*****End NOTE*****
Companding codecs, based upon the A-Law and µ-Law standards, were developed to address
accurate reproduction of sounds for humans. Companding codecs have been around since the
1960's and are still in widespread use today. They are not really compression codecs per se.
Although similar to PCM, which are not compressed either, the main difference here is that
the companded file will have an apparent amplitude range not far below that of a 16-bit file.
Thus, companding codecs are most useful for reducing 16-bit audio files to 8-bit, cutting their
size in half without sacrificing as much quality. Windows 95 and NT offer both an A-Law and
You can very much predict, in the short term, a waveform produced by human speech. Thus,
one of the most common techniques used in coding speech samples uses this fact and attempts
to predict the value of the next sample from the values of the previous samples. If the
predictions are accurate, charting the difference between the predictions and the actual
samples will produce a much flatter graph than charting the wave itself.
This technique of charting the differences is known as Differential Pulse Code Modulation
(DPCM (. These differences can be made even smaller if the predictor can be made adaptive,
so that it will adapt and change its predictions to match individual characteristics of the speech
being coded. This is the concept behind Adaptive Differential PCM codecs. But since these
codecs are built to predict the patterns of human speech, they do not produce very high quality
music reproduction. Also, this is a very complex process, especially if compared to a sound
wave. Thus, decoding and (especially) encoding requires more work by your computer's CPU
Source Codecs
Source codecs attempt to create a model of how a sound was generated and then tries to
reconstruct it based upon that model, discarding the waveform data completely. Vocoders, are
the most typical source codecs you can find, probably the only one you will even see around,
306 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
as they are constructed upon a basic model of how the human voice is produced. They save a
few parameters -- guidelines -- based upon the individual characteristics of the particular
voice, which they will attempt to reproduce. Since Vocoders save a very small set of
characteristic traits and completely discarding the waveform data, they produce very small file
sizes.
The limitation with source codecs is that they can only save human speech data, at only one
voice speaking at a time, and the synthesized output tends to be very artificial, especially if
compared to other methods. They are not recommended for reproducing any other sounds.
*****Start TIP*****
AT&T’s Bell Laboratories has a site where you can type a word into an online form, click a
button, and hear the word spoken by an artificial voice as a man, a woman, a child, or a gnat.
*****End TIP*****
Part I. The Technology – May 25, 1998 - 307
Hybrid Codecs
Hybrid codecs usually produce smaller files than waveform codecs. However, they are more
complex and sound reproduction quality is not as good. Still, hybrid codecs are less complex
and produce better quality sound than vocoders. They are called hybrids because they utilize
The most successful hybrid codecs are the Analysis-by-Synthesis (AbS) codecs. Like
vocoders, they begin with a synthetic model of the human vocal tract -- vocal chords, throat,
mouth, teeth, tongue, lips... -- and attempt to reproduce the human voice. AbS codecs differ
from vocoders in that they use data from the actual sound waves to select an excitation signal
If you are running Windows 95, make sure you have the Microsoft Audio Compression
Manager installed. Go to Control Panel and double-click on the Multimedia icon. Then select
Figure 7.2
Once in the advanced tab, chose Audio Compression Codecs, click on the plus mark (+) to its
left, and it should open up to reveal a number of options, as shown on figure 7.2. If you don’t
have all of those shown on figure 7.2 you can always add it by clicking over the icon
Add/Remove programs, as shown on figure 7.4, and then clicking on Windows setup, which
should bring you to a tab just like the one on figure 7.5. Once there, select the Audio
Figure 7.4
Figure 7.5
Figure 7.6
What’s Next
In the next chapter, “Voice Over IP: Can We Talk?” we’ll focus on the applicability of VoIP,
based call center applications, etc. It also discusses the challenges VoIP faces, both with
getting telcos up to speed, as well as setting standards. It goes on listing the major VoIP
Chapter 8
VoIP is transforming the trillion-dollar global communications industry. Give it few more
years and you will see at least 70 percent of all voice traffic becoming packet based, traveling
over the Internet. Thus, if you watched the movie “Deep Impact” this last spring of 1998, you
have an idea of what is going to happen to many of the existing telcos sharing the voice traffic.
My assessment is that the tides of VoIP are becoming so high, so attractive, that its impact
against the telcos will dramatically sweep many of them. Until they can reengineer they way of
business, and most importantly, the way they carry voice, to become what the VoIP Investor’s
Therefore, let’s take a look on VoIP applications and what some of the main players are up to.
VOIP Applicability
Most implementations of VoIP are focusing on the first two benefit areas: cost-
savings/simplification, and extending the corporate telephone infrastructure to small sites. The
computer-telephony applications will certainly emerge, but adoption will be slower because
infrastructure.
There are, for example, several applications using Motorola's Vanguard Voice, as well as
many other vendors, as outlined later in this chapter. The following are some of Motorola’s
examples:
employees are taking advantage of inexpensive ISP connections and VoIP technology
1 Intranet Telephony: A large nationwide bank in Latin America is using VoIP to carry
savings bank) use DTMF tones ("touch-tones") as a way for security monitoring
personnel to enter status codes as they patrol from site to site. Traditionally, these
systems require expensive leased lines, or they generate numerous PSTN calls. With
VoIP, the bank now routes the code-entry over the IP network that already reaches all
Some other areas of applicability for VoIP include computer telephony integration,
One of the best examples of computer telephony integration (CTI) is SoundWare’s Telephony
Operating System (TOS), which is the original telephony on audio software platform and one
of the leaders in the industry. It enables high level PC telephony to be implemented without
costly, complex hardware and software. TOS is a TAPI compliant Windows extension for
running on x86 and Pentium Pro processors (MMX). TOS also supports all major audio chip
sets and is expected to play an important role in the migration to digital audio/processing
solutions.
Developers can continue using standard Windows APIs. TOS supports MMX based SPMs for
computation intensive algorithms such as, modem data pump, digital mixing, and on the fly
sample rate conversions. TOS manages all aspects of call processing, providing a simple,
flexible, and open telephony platform for developers of signal processing and communication
algorithms.
But SoundWare is not alone, and many other suppliers offer similar products and services.
Some of them are featured in this chapter and chapter 9, “What to Expect: The Innovators.”
For now, lets continue to assess some of the other applicability of VoIP.
Part I. The Technology – May 25, 1998 - 315
Videoconferencing
Video conferencing is becoming more available and affordable every day. It’s relatively easy
to use and of high quality, however, there are some factors that you should be aware. Video
conferencing is about bandwidth, or how much information can you get through the pipeline.
How much information can you compress, push through the pipeline, decompress it and how
fast you can do it. Below are few ways that Vivid Communications
0 POTS (Plain Old Telephone System) - Great for face to face - Can't fit data and
1 ISDN -BRI (Basic Rate) up to 128 Kbps -(Two 64Kbs lines that can be banded
together) Best for the small business owner and telecommuters - decent frame rates
2 ISDN -PRI (Primary Rate) up to 356 Kbps - More expensive, if you need the best
3 Internet - Always depends on how many people are on the web and how good your
4 LAN / Wan - New multiplexers help push data through so as not to slow LAN
systems down. Excellent frame rates can be accomplished over LAN systems.
The smaller the bandwidth of the pipeline more compression/decompression and speed will be
needed. Some systems accomplish this with software and some with software and hardware.
Computers with a Pentium chip and at least a 28,800 modem are your best bets. The faster the
Pentium chip the faster compression/decompression can be accomplished. Systems that take
Video capture cards usually work as a buffer. They will watch the picture and only work with
parts of the picture that have changed. In this way the computer does not have to reread an
entire picture over and over, but only the parts that have changed. Thereby speeding up the
capability of the system to read the parts of the picture that has changed. There is less
information for it to decompress and is not working with redundant parts of the picture.
The size of the picture will effect frame rate as well. The smaller the picture, the less pixels the
system will have to read, the better the picture. Another factor is the camera. CCD cameras are
digital cameras developed to deliver voice with picture (lip sinc). CCD cameras require a
video capture card. Some less expensive digital cameras plug into your parallel port and are
Part I. The Technology – May 25, 1998 - 317
fine for Internet - family fun, but are less precise about getting the voice and the picture
together.
Currently, the best business video conferencing if you don't have a LAN system is through
ISDN lines. Data sharing and white boarding (plain white board that can be written on by both
ends) are possible over the ISDN bandwidth, while video conferencing. More bandwidth is
available by binding two or more ISDN lines. Some products do not have this ability.
Standards have been set by the ITU for video conferencing industry. Standards allow different
product brands to work together. Although the standards have been set some systems are still
proprietary (you need the same software on both ends to communicate). The standards based
systems are POTS H.324, ISDN H.320, LAN and Internet H.323 standards have been set for
Turning a laptop computer or a desktop computer into a complete board room setup can be
easy and economical. Try displaying the conference over one of the Proxima or In Focus
overhead projectors. These projectors can be used for presentations of all kinds.
*****Start TIP*****
318 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Rosen's, entitled "Personal Videoconferencing." This book is very user friendly and gives an
in depth look at the current trends and the future of video conferencing.
*****End TIP*****
providing:
*****Start TIP*****
For more information on PicturePhone products and solutions, check their Website at URL
http://www.picturephone.com.
*****End TIP*****
Part I. The Technology – May 25, 1998 - 319
Document-sharing
support for synchronous collaboration between multiple users of a document. Several users
can edit a document in real time--each seeing the other's changes as they occur.
Netopia’s Virtual Office is a great example of it. The product allows you to collaborate to a
document in real time, while remotely connected to the Internet via Integrated Services Digital
According to Netopia, to make NVO work, you will need a decent Internet connection. They
recommend at least a 56K-bit/ sec. connection and a recent browser, able to run Java applets
*****Start TIP*****
For more information on Netopia’s Virtual Office you can go to Geocities (www.
geocities.com) and set up a free Netopia account for the first year. (The second year costs less
than $20.)
*****End TIP*****
320 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Web-based call centers are one of the fast growing VoIP-derived applications. Micron
Electronics, have already implemented their Web-based call center since spring of 1998, and
they are not alone. The convergence of call centers and the Internet is taking place in the space
defined by the use of VoIP technologies, interactive Web browsing, and the integration of
existing call-center technologies such as automated call distribution modules and PBX
Some early products only use the Web to initiate a callback by an agent, but the majority of the
latest Internet call centers solutions are integrating the Web with the back office of a call
Lucent Technologies, NetSpeak and eFusion are some of the companies offering Web-based
call-center products and solution, with starting prices at $100,000. Most of the applications
work along this paradigm: A customer navigating through sales or technical support
information wants more detail. A button on the page connects this customer to an agent via
voice over IP or text-based chat. In the most fully integrated Web-based call center, user
information is retrieved at the time of the call; this can come from v-cards, cookies, log-on
information, or forms.
Part I. The Technology – May 25, 1998 - 321
But don’t think IP technologies are going to overrun existing call centers. I believe the existing
PBXs are going to stick around and VoIP will just complement it, providing a powerful
VOIP Challenges
Not surprisingly, VoIP has some challenges ahead. From getting telcos investing on it through
setting and agreeing on a standard, it will take some time until we see major developments in
During the fall of last year, Qwest Communications, a Denver-CO telco company, began
offering long distance phone services to consumers at 7.5 cents-per-minute! But the most
surprising news to the telecommunication industry was not the fact that Qwest had undercut
the competition by 50 percent, but the keen company was using voice over IP (VoIP)
technology.
Qwest’s move got telcos talking. AT&T, Sprint and even WorldCom were arguing that VoIP
was not ready for prime time. To this date, Spring of 1998, no one is using VoIP yet, so the
322 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
company is gaining a lot of momentum with this new technology. Qwest is planning to offer
not only long distance phone services, but also virtual private networks (VPN) and concurrent
engineering, where engineers collaborate over the network using high-bandwidth CAD
Telcos will have to get up to speed, not only with the technology, but also convincing their
board of directors and stockholders that VoIP is here to stay. Meanwhile, as I write this
chapter, some of them are trying to stall Qwest (and the technology!) through lawsuits!
Setting standards
The following are the main protocol standards used with VoIP technologies, instrumental in
H.323
The International Telecommunications Union (ITU) recommendation H.323, issued May 28,
1996, describes how terminals and equipment can carry any combination of real-time voice,
data, and video, including video telephony, over a local area network.
2 H.245 control
3 H.261
Together, these specifications define a number of new network components (H.323 terminal,
H.323 Multipoint Control Unit (MCU), H.323 gatekeeper and H.323 gateway), all of which
interoperate with other standards-compliant end points and networks by virtue of an H.323
gateway.
The H.323 specification includes a list of vocoders allowed in H.323 compliant clients and
gateways. The G.723.1 vocoder has been specified as the default vocoder for H.323; all clients
and gateways must support G.723.1. This guarantees interoperability at the vocoder level.
Once two entities have established that they both support G.723.1 during the call setup, they
can negotiate to find a mutually preferred vocoder and can use that instead.
324 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Virtually every company in the IP telephony market has announced plans to be H.323-
compliant. This list of companies includes Microsoft, Netscape, and Intel, providers of the
most widely deployed client software in the market. Natural MicroSystems supports H.323 in
the Fusion IP telephony development platform (see chapter 9, “What to Expect: The
H.100/H.110
H.100, approved on May 23, 1997 by the Enterprise Computer Telephony Forum (ECTF), is a
standard designed to further spur the growth of the CT. H.100 provides for a single telecom
bus superseding all existing bus architectures including MVIP and SCbus.
The H.100 bus is interoperable with the current industry telecom buses, allowing developers to
integrate newer H.100-based products with existing products. It is the telecom bus standard to
use in conjunction with the PCI bus standard for personal computers but easily interconnects
H.100 supports an 8-Mbps data rate and 128 channels per stream for greater bandwidth than
that provided by previous telecom buses. H.100 provides a total of 4,096 bi-directional 64-
kbps timeslots, permitting up to 2,048 full-duplex calls. This compares to 512 timeslots for
MVIP-90, 1,024 for the SCbus in PCs, 2,048 for SCbus on VME, and 3,072 for H-MVIP.
Part I. The Technology – May 25, 1998 - 325
The increased number of timeslots provides greater communications capacity, due to the
introduction of a 68-pin fine-pitch ribbon cable which is physically smaller than the existing
40-pin regular-pitch MVIP cable. H.100-based boards can be interconnected with MVIP or
SCbus boards via a passive transition device, commonly called a "swizzle stick," that allows
In systems comprised of a combination of boards, the master clock must be an H.100 board.
H.100 master clock circuits also include compatibility clocks for driving existing MVIP and
SCbus boards that operate in clock slave mode. To facilitate operation with MVIP and SCbus
boards, H.100 allows individual data lines to be programmed in groups of four to operate at 2,
4 or 8 Mbps, allowing direct connection to existing boards at their native operating speeds.
The H.100 specification incorporates technology from GO-MVIP such as the programmable
operating speeds technique of H-MVIP and redundant clocks from MC1 Multi-Chassis
MVIP. As mentioned, programmable operating speeds provide support for the interoperation
with MVIP and SCbus boards. The redundant clock eliminates a single point of failure. If any
telecom board fails, including the H.100 master clock, the system will continue to operate.
H.100 offers developers and integrators extensive new capabilities. It brings more capacity
than any existing bus, enabling developers to deliver larger and lower-cost applications.
326 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
H.110 is the CompactPCI version of the H.100 standard. This standard allows hot-swapping
of boards in CompactPCI chassis from the PCI Industrial Computer Manufacturer's Group
(PICMG), offering customers the option of a CT system with virtually no down-time. This
enables automated call centers, IP gateways, and voice messaging systems to remain up and
MVIP
Multi-Vendor Integration Protocol (MVIP) is the de facto industry standard hardware and
software architecture for platform interoperability and telephone switching among ISA and
PCI-based computer systems. Natural MicroSystems and six other companies developed the
original MVIP standard in 1990. The most widely deployed standard for interoperability
among computer telephony vendors, MVIP is now maintained by the Global Organization for
The MVIP family of standards addresses both configurations of networked PCs and single
computer chassis configurations. Several hundered companies support MVIP’s open scalable,
switching architecture. Over 200 MVIP-compatible products are available on the market.
Part I. The Technology – May 25, 1998 - 327
CompactPCI
CompactPCI, initiated in 1994 by Ziatech Corporation under the auspices of the PCI Industrial
Computer Manufacturers Group (PICMG), is the newest specification for PCI-based industrial
CompactPCI offers a host of telecom features required for network applications including:
0 A standard telecom bus (32 streams and 4096 time slots) for communications
1 A telecom form factor (6U card heights with rear panel I/O)
2 Hot swap capability with staged pins and system notifications with card tab release,
servers off-line
requirements
What’s Next
Next chapter, “What to Expect: The Innovators,” assesses what is being offered by VoIP
Chapter 9
This chapter provides you with a brief profile of the major players in VoIP technology, and
technical overview of their main VoIP products available on the market as of spring of 1998. I
made sure to include a vast and extensive selection of all the major players and their products
so you can have a chance to evaluate each one of them before deciding which product best
This selection includes many different VoIP technologies and products, from 3Com’s Total
Control Hyper Access system and Motorola’s VIPR, to Nuera Communication Access Plus
Of course, I’m not in the position of recommending any of these products as the requirements
and features of VoIP products change depending of your environment. Although I may have
my preferences, it probably would be a biased one, which would be directly related to the
environment I work with and my own preferences. Thus, all the information you find in this
section was totally provided by the respective vendors outlined here. Some provided more
information than others. By no means you should opt for any of these products based on the
amount of pages or details here provided. Most of the vendors listed here also provided demo
and/or evaluation copies of their products in the CD that accompanies this book. Make sure to
In order to make an informative decision when selecting a VoIP product or service that best
suites your needs, I strongly encourage you to carefully read this chapter, and summarize on a
table all the features you are looking for, or need, for your organization. Then, I suggest you to
check the CD and products you selected and run a complete “dry-run” on them before you can
really make a decision. Also, don’t forget to contact the vendor directly, as these products are
always being upgraded and new features incorporated to them, which could make a difference
Part I. The Technology – May 25, 1998 - 331
in your decision. Contact information and a brief background about the vendor is provided at
3Com provides a single platform that combines multiple services for real-time interactive
communications to VoIP using standard telephones all the way to VPN, multimedia and more.
The Total Control multi-service access system leverages the inherent strengths of the 3Com’s
Total Control platform’s HiPer DSP technology and EdgeServer Pro module to offer a
3Com’s Total Control System provides simultaneous voice and Internet access over the same
One of the main strengths of the Total Control chassis is the ability to add custom features to
the powerful DSPs on the HiPer DSP card. Each HiPer DSP card can handle 24 phone lines
(30 in Europe), and the EdgeServer VoIP system can handle 13 HiPer DSP cards. On each
DSP card, the 12 Texas Instrument TMS320C548 DSPs process data at 100 MHz each.
332 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
These large compute engines allow for preprocessing of most of the bit-intensive work on the
DSP. The preprocessing allows the Total Control chassis to forward packets quickly and to
handle large numbers of ports since the work for each channel is handled in parallel. When all
CPUs involved in a fully configured EdgeServer Total Control chassis are lumped together,
This massively parallel approach has been used in the past by 3Com to allow the Total Control
remote access servers to pre-process PPP packets to achieve high packet rates. These DSPs
can be programmed on a per call basis to handle an incoming call as a modem or ISDN call
for remote access, a FAX call, a VoIP call or a Video conferencing call. This flexibility to add
new functionality to an open programmable DSP provides investment protection for the user.
It also enables system operators to provide multiple revenue generating services on a common
access platform. Because VoIP and Video use the existing HiPer DSP cards that are used in
the Total Control Remote Access Concentrator, the incremental cost to add these features can
be kept low.
3Com shines with it's carrier class VoIP/Video solution, the EdgeServer
systems and fits in the Total Control chassis. Currently only Windows NT 4.0 supports full
Windows NT 4.0 provides a full-featured and stable platform with the standard telephony
interface TAPI. TAPI is a connection layer that allows telephony applications like call control
to interact with telephony-enabled devices like our HiPer DSP drivers. TAPI version 3.0
enables very large telephone systems to be built via master/slave TAPI. The slave TAPI
process would run on the EdgeServer driving the HiPer DSP cards in each Total Control
chassis. The master TAPI process could reside on a local stand-alone PC and act as the overall
call control agent for the entire slave TAPI chassis. The master TAPI agent could also be in a
remote location providing a single point of control for geographically dispersed chassis.
In addition to providing the industry standard TAPI interface for customer customization,
EdgeServer has a wide variety of useful development tools such as Visual C++, Visual Basic
*****Start TIP*****
For more information about 3Com’s VoIP Products, check the URL http://www.3com.com.
*****End TIP*****
334 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Enhanced VoIP features, such as call forwarding, call waiting and other business-oriented
capabilities are becoming reality already. As I write this section 3Com engages in a
partnership with eFusion Inc. to develop a series of VoIP applications based on Total Control
Although this book will be released before the scheduled release of the product, which is
scheduled for the fourth quarter of 1998, make sure to seek more information about it, as
3Com plans to support a variety of eFusion applications, including those tailored to enhanced
Internet telephony services, as well as E-commerce applications such as its Push-to-Talk voice
and Internet browsing product. All of the applications are still H.323-compatible, ensuring
The Telephony Operating System (TOS), is a patented TAPI compliant Windows extension
replacements) running on x86 and Pentium Pro processors (MMX). TOS supports all major
audio chip sets and is expected to play an important role in the migration to digital
audio/processing solutions.
Part I. The Technology – May 25, 1998 - 335
Developers can continue using standard Windows APIs. TOS supports MMX based SPMs for
computation intensive algorithms such as, modem data pump, digital mixing, and on the fly
sample rate conversions. TOS manages all aspects of call processing, providing a simple,
flexible, and open telephony platform for developers of signal processing and communication
algorithms.
SoundWare runs on any standard PC sound subsystem without requiring a modem, enabling a
SoundWare "phone ready" multimedia PC or sound card to add telephony and communication
host-based algorithms, full hardware and software integration with the standard PC audio
channel, and complete software integration with the Windows multimedia, telephony, and
communication APIs. In order to make SoundWare Ready offerings, PC OEMs and audio
vendors are adding a simple, low-cost Universal Audio Link header to their existing mother
boards, sound cards, and combo cards without making any architectural changes
*****Start TIP*****
For more information on Sound Designs’s Soundware product, check their URL at
http://www.soundesigns.com.
336 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
*****End TIP*****
computing platforms.
open, mass-market computing platforms. Natural MicroSystems builds hardware and software
applications and systems using these open platforms. Their solutions are based on open
standards that make it possible for their partners to quickly develop high-performance, high-
capacity multimedia communications systems and applications. We help our partners create
new markets, new value for their customers, and new opportunities to grow.
The value of Open Telecommunications is the ability it gives developers to take advantage of
standards-based building blocks, reducing time to market when creating complex applications.
The Natural MicroSystems family of products provides fundamental functions that adhere to
widely accepted standards for easy integration into communications networks around the
world. Their solutions are based on standard computing platforms, such as PCs, so that
Part I. The Technology – May 25, 1998 - 337
developers can take full advantage of the wealth of products, tools, and support that open
*****Start NOTE*****
For more information about the Natural MicroSystems, please check their Website at URL
Blvd., Framingham, MA 01702-5406 - Tel: +1 800 533 6120, Tel: +1 508 620 9300, Fax: +1
*****End NOTE*****
Fusion
Agreement. Fusion enables developers to create gateways with configurations from 8 ports to
multiple T1s/E1s with no increase in latency or decrease in performance. Building on its basic
configuration of a full T1 of IP Telephony in only two ISA slots, Fusion's scalable architecture
Fusion uses an intelligent hardware and software architecture that integrates Public Switched
Telephone Network (PSTN) interfaces, telephony protocols, speech encoding, LAN interfaces
and data protocols into a cohesive, flexible package. Incorporating a series of highly accessible
communicate with each other via the industry-standard Multi-Vendor Integration Protocol
(MVIP), Fusion offloads key processes from the host CPU and memory.
Features
development platform.
1 Offloads processing from host CPU and memory to minimize latency, maximize
3 Supports Gatekeeper functions for address translation, control access and bandwidth
management.
Part I. The Technology – May 25, 1998 - 339
4 High performance/low latency does not degrade as system scales from 8 ports to
multiple T1s/E1s.
fabric among the DSP resources, PSTN interfaces, and LAN ports, easing integration
10 Ideal for toll bypass, voice and fax messaging, LAN telephony, web-enabled call
Fusion integrates hardware and software within a standard PC, greatly simplifying
components and industry leading APIs minimize programming requirements and maximize
flexibility.
Fusion Hardware
Fusion consists of three hardware components that occupy two ISA slots in a standard PC: an
Series board.
The AG-T1/E1 provides 24/30 ports of processing for voice and fax plus a full T1/E1 digital
PSTN network interface (including PRI ISDN). An 8 port AG-8 can be used in lower-capacity
configurations.
vocoding for ports on the baseboard. Using the MVIP bus, the combination of the AG-T1/E1
and AG-Realtime/2 pass traffic to Fusion's third hardware component, a TX2000 or TX3000
board.
The TX Series boards support integration of encoded speech with an Ethernet LAN, which
can be an Internet or Intranet connection. The TX Series board converts encoded speech to IP
packets and supports IP routing and data protocols. The TX boards are available with a wide
Part I. The Technology – May 25, 1998 - 341
Ethernet.
These three boards, applied within two ISA bus slots, support a full T1/E1 of IP Telephony
capability without taxing the host CPU. Because the processing takes place on the boards,
multiple Fusion board-sets can be installed in a single chassis, supporting up to four T-spans
This allows OEMs, systems integrators, and VARs to create the highest capacity in the
Fusion Software
0 Telephony API (CT Access) for gateway call control and voice processing
1 Switch Service API (CT Access) for interconnection of telephony and IP network
resources
3 Packet Network API (TX Series Libraries) for control of IP network protocols
When Fusion applications receive incoming calls, they spawn caller threads and use CT
Access to perform the following tasks: application initialization, port initialization, calls
control, event processing and error handling, and parameter management. Additionally, CT
Access's Switch Service provides a way of making, breaking, and controlling the MVIP
connections between Fusion boards. Developers can use the Switch Service to permanently, or
dynamically create data pathways between the telephone line interface and the AG Real-time
The TX control interface is composed of six APIs and a Communication Processor Interface
(CPI) library. The CPI library provides a conduit for communicating with the TX series board.
The APIs provide functions that simplify control of TX features, such as Virtual Port
Fusion supports the broadest range of vocoders for maximum flexibility of gateway
deployment. In addition to the ITU G.723.1 and G.729A algorithms, Fusion also supports
Microsoft-GSM and the widely deployed VoxWare MetaVoice RT24 algorithm, which is
Part I. The Technology – May 25, 1998 - 343
utilized by Microsoft in the popular NetMeeting client software and by NetScape in the
Conference client software. Fusion also provides an open vocoder platform for easy porting of
other algorithms as they gain market share or are approved as standards. A CT Access
Realtime TRAU () library provides a way to start and stop vocoders and a way to manage AG
Realtime processes at the board level. The vocoders are combined with integrated tail-end
H.323 Protocol
H.323 is a broad standard from the ITU that sets specifications for audio, video and data
communications over IP-based networks that do not provide guaranteed quality of service
gateways and clients from different vendors. The IMTC has chosen H.323 as the basis for the
Fusion's H.323 support includes H.225 and H.245. H.225 specifies the syntax and semantics
for negotiation at the start and/or during communication. H.245 specifies media packetization
and call setup. For applications that have unique protocol requirements, other stacks may be
RTP/RTCP on the TX Series board and keeps the remaining H.323 functionality on the host.
344 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
This partition enables low end-to-end latency and relieves the host from processing real-time
audio packets.
RTP/RTCP Library
RTP and RTCP are the accepted H.323 standards for passing real-time data streams over an IP
network. Fusion's RTP API provides applications with low-level control over connections that
pass real-time data between a circuit-switched network and an IP-based packet network. All
RTP connections are initiated, monitored, and eventually terminated via the RTP API.
The RTCP API allows an application to receive RTCP-related information. An RTCP monitor
task may be developed for collecting RTCP statistical information on the host. This will allow
for QoS monitoring during a session and provide a mechanism for collecting session-specific
billing information.
Within the IP stack, the User Datagram Protocol (UDP) provides “unreliable services”. Fusion
supports UDP on the TX Series board. In addition, a host can view the TX Series board as a
simplistic NDIS Ethernet board, enabling simultaneous use of the TX board as an intelligent
UDP/RTP device and as a host-controlled network interface board. This means that host-
Part I. The Technology – May 25, 1998 - 345
based TCP-UDP protocol stacks can be used for command and control events for gateway call
session establishment.
A unique feature of Fusion is its programmable jitters buffer. As voice packets are transferred
across a network without guaranteed QoS, voice packets may be lost or arrive out of sequence.
A jitters buffer collects incoming packets and enables Fusion to rearrange the packets into the
correct order or to smooth over lost packets. The size of the jitters buffer is configurable on a
per channel/session basis, offering a unique feature to control latency for real-time, interactive
voice conversations.
Vocoders Supported
0 G.723.1
1 G.729A
Protocols Supported
0 TX 2000/3000
2 RTP/RTCP
Motorola’s VIPR
Motorola VIPR is a powerful line of IP telephony products that enable real-time voice and fax
communications over the Internet or private Intranets. VIPR is a new part of the standards
devices.
VIPR enables voice and fax traffic to move off the telephony infrastructure and onto the IP
data network. By combining data, voice and fax, expensive long distance toll charges or the
need for dedicated voice circuits are eliminated, reducing or even eliminating unnecessary
The possibilities for implementing value added service for your network users are great.
Motorola’s VIPR technology enables an easy move to VoIP, being totally transparent to
0 Cost savings on long distance calls, as they can be placed over the Internet or Intranet,
1 Network access for traveling and telecommuting employees who can dial into the
network to check voice mail, dial another location, or call an extension for the cost of
a local connection.
Together the MPRouter and Vanguard families provide the industry's most advanced voice
and fax support. These versatile network access devices also offer comprehensive support of
Frame Relay, ISDN, LAN routing, legacy data protocols, WAN bandwidth optimization and
worldwide support for either digital or analog PBX/PABX features. Since all VIPR products
are remotely upgradeable and based on a high performance DSP platform, they're ready for
future technologies such as RSVP and RTSP, when they become available. In addition,
Motorola's VIPR line is also H.323 compliant and interoperates with Microsoft NetMeeting as
348 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
well. These advanced features and our commitment to standards-based implementation makes
Motorola VIPR the smartest way of bringing voice and fax to IP data networks.
1 Motorola Optimized 8K and 16K CVSELP voice compression provides high quality
voice
4 Built-in echo cancellation eliminates the need for expensive external hardware
frame relay and IP networks. Nuera is also a member of the Frame Relay Forum and a co-
founder of the VoIP Forum, with great expertise on voice coder development and standards
installation and support. Nuera also delivers industry-leading DSP-based solutions that
optimize bandwidth utilization while maintaining the highest standards of quality for voice
traffic and maximum transparency for other applications including fax, signaling, voice-band
data and video. Figure 9.1 is a screenshot of Nuera’s Website at URL http://www.nuera.com.
Figure 9.1
Nuera serves carrier, corporate and OEM customers requiring superior voice quality and
advanced call-processing capabilities. Nuera is known for its high-quality voice compression
350 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
at any given rate, as well as its systems for voice/data/fax integration between remote sites.
Over 25,000 Nuera systems with over 200,000 voice fax channels are in operation worldwide.
In addition, Nuera offers voice compression algorithms including the latest industry standards
as well as enhanced, proprietary technology delivering even better quality at very low bit rates.
Nuera's voice technology provides high-quality communication at rates from 4.8 to 32 kbps.
*****Start NOTE*****
For more information, contact Nuera Communications, Inc.’ 10445 Pacific Center Court, San
Diengo, CA 92121. You can also reach Nuera via telephone at 619-625-2400 or fax at 619-
*****End NOTE*****
According to Nuera’s specifications, the Access Plus F200 is the highest performance voice
over Frame Relay access device (FRAD) featuring the industry's best voice quality with
Enhanced-CELP (E-CELP) and ITU-standard voice compression. The F200 offers integral
switching capabilities and advanced traffic management features, and delivers full T1/E1
Part I. The Technology – May 25, 1998 - 351
throughput on multiple high-speed trunks or data ports. The unit includes analog and digital
(T1/E1) interfaces to PBXs or PSTNs and offers capacity for up to 30 voice/fax channels per
unit.
The Access Plus F120 provides voice over Frame Relay system, outperforming all eight other
systems in audio quality, delay and bandwidth utilization in independent National Software
Test Labs testing completed September 1996. The F120 provides analog and digital (T1/E1)
interfaces to PBXs or PSTNs and offers capacity for up to 30 voice/fax channels per unit. The
product uses award-winning Nuera Enhanced-CELP (E-CELP) voice compression and packet
The Access Plus F120 Frame Relay Access Device provides the highest quality voice
compression technology in the industry, with complete selection of ITU standard algorithms
including G.726, G.728 and G.729 E-CELP algorithms operating at 4.8, 9.47 and 9.6 kbps
provide industry-leading quality at each rate. Its adaptive silence suppression substantially
conversation, while its integral echo canceller adapts from 0-49 millisecond to ensure
Access Plus has a unique voice frame packing feature that optimizes bandwidth over cell-
based backbones or low-speed access lines and low-delay voice encoding and adaptive jitter
buffer minimize end-to-end speech delay while asymmetric fax channels minimize return path
bandwidth usage. The product is compliant FRF.11 Voice over Frame Relay Implementation
Agreement.
Call Routing
The F120 provides complete call processing and switches each call independently. Some of
3 Calls can be routed through F120s so the voice network can be fully meshed at
minimum cost
Part I. The Technology – May 25, 1998 - 353
4 Call routing can control the bandwidth used by voice calls to guarantee data
performance
Call Processing
The F120 builds on the voice switching capability by providing complete call processing and
1 E&M analog interface ports can connect to digital FXO interface ports directly
2 Digit translation provides a unified dialing scheme capable of 20 digit translation and
40 digit outpulsing
Figure 9.2
The F120 is both a data/voice FRAD and a frame relay switch, very easy to integrate into
existing data networks, and supporting both the DTE and DCE sides of the UNI interface. It
354 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
functions as a frame relay network to attached devices including routers and front-end
processors.
Digital Interfaces
The F120 makes installation and expansion easy by providing direct T1/E1 interfaces for
distortion, and simplifies tuning of the voice ports so that the volume levels are more
The Access Plus F200ip is an integrated voice over Internet/voice over Frame phone-to-phone
gateway, bringing voice quality to Internet applications by delivering IP voice via Ethernet and
tradeoffs:
0 Runs both voice over IP and voice over frame relay concurrently
Part I. The Technology – May 25, 1998 - 355
1 Can switch voice calls from any port to any port over any protocol
The Access Plus F200ip provides the highest quality and widest range of voice compression
0 ITU G.728 LD-CELP, G.729 CSA-CELP, and G.726 ADPCM standard algorithms
1 E-CELP advanced proprietary algorithms operating at 4.8, 9.47 and 9.6 kbps provide
2 Low-delay voice encoding and adaptive jitter buffer minimizes end-to-end speech
delay
3 Integral echo canceller adapts from 0-49 millisecond to ensure consistent voice
4 Sophisticated lost packet recovery methods help maintain consistent quality in harsh
environments
Another unique feature of the F200ip is its incorporated technology, designed to minimize
1 Adaptive silence suppression minimizes bandwidth usage during speech breaks and
Call Routing
The F200ip provides complete call processing by switching each call independently with full
2 Call switching allows the voice network to be fully meshed at minimum cost
3 Digit translation provides a unified dialing scheme capable of 20 digit translation and
40 digit outpulsing
The F200ip provides direct T1/E1 interfaces for voice ports, up to 24/30 channels. The T1/E1s
eliminate digital-to-analog conversions and subsequent distortion. Also, F200ip has analog
Through NueraView, you have a robust configuration, statistics, diagnostics, and alarm
management. Its database assures that configuration information is safely backed up. The
NueraView SNMP network management system (NMS) is a powerful system, which allows
the network operations, staff to manage networks with minimum effort. The graphic user
Figure 9.3
3 Remote dial access – full control of network from remote NMS possible
Easier Operations
NueraView enables configuration time for systems to be minimized (see figures 9.4, 9.5 and
0 Point and click to change configuration and to view status and trap logs – faster and
1 Hierarchical graphic network map – arrange your network items logically while
4 Online help and documentation – point and click through user guide
5 Remote dial access into NMS console – you can monitor your network from
anywhere
central site
Figure 9.4
Figure 9.5
NueraView leverages the extensive software control provided by the Access Plus F-Series
360 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Figure 9.6
Portable Voice Module is a OEM package, delivering top-rated voice support to customers'
FRADs, routers or other data devices connecting to TDM, Frame Relay, IP or ATM networks.
It also features Nuera's Enhanced-CELP and ITU-standard voice compression algorithms plus
Nuera's packet-network quality enhancements and call processing features package. It includes
DSP modules, telco interface modules and a host interface for the target platform, plus
Access Plus 100 and Access Plus 200 are both TDM-based voice compression and
Enhanced-CELP compression plus ITU standard algorithms, analog and digital voice
interfaces and capacity for up to 30 voice/fax channels per system as well as point-to-point and
point-to-multipoint capabilities.
Part I. The Technology – May 25, 1998 - 361
Clarity Series CS8000 is a TDM-based voice compression and voice/fax/data integration for
up to eight analog voice/fax channels, and engineered to enhance network performance by (see
figure 9.10):
Integrating multiple channels of voice, fax and data onto a low-cost digital circuit
Easy configuration and proven system reliability produces “install-and-forget” wide area
networking
Low-delay data transmission rates (9.6 kbps to T1) support a wide range of devices including
Voice Compression
0 CELP algorithms operating at 5.3, 8, and 9.6 kbps provide outstanding voice quality
at each rate
362 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
3 Fax relay support provides transparent fax operation at 2.4, 4.8, 7.2, and 9.6 kbps
A wide range of connectivity solutions allows each location to be tailored for the lowest cost
configuration. Flexible allocation of bandwidth provides for numerous voice, data, and video
services on a T1 local loop interface. Also, advanced functionality over satellite, sub-rate or
a high capacity, fiber optic network. With its cutting-edge technology, the Qwest Network is
able to provide high-quality data, video and voice connectivity with uncompromised security
Qwest constructs and installs fiber optic communications systems for interchange carriers and
Part I. The Technology – May 25, 1998 - 363
other communications entities, as well as for its own use. Qwest is expanding its existing long
advanced, fiber optic telecommunications network. The network will connect approximately
125 metropolitan areas that represent about 80% of all long distance traffic in the United
States.
Through a combination of the Qwest Network and leased facilities, the company will continue
to offer interstate services in all 48 contiguous states. The Network will connect to
international cable heads for transatlantic and transpacific transmission to Canada and Mexico.
Qwest recently extended its network to the United Kingdom through an exchange of capacity
for two 155-megabit circuits that will carry international data and voice traffic between
London and New York. The company also is extending its network approximately 1,400 route
miles into Mexico through dark fiber to be owned by Qwest on the fiber optic system of a
third party.
As the demand from interchange carriers and other communications entities for advanced,
high bandwidth voice, data and video transmission capacity increases, due to regulatory and
technical changes and other industry developments, Qwest strategically positions itself to
provide the products and service this high bandwidth demands. The company is also
364 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
committed to address the changes it generates. These anticipated changes and developments
include:
2 Internet and multi-media services and other new technologies and applications
The Qwest Macro Capacity Fiber Network is designed to be the highest-capacity digital
By making available the following advantages, Qwest’s state-of-the-art infrastructure can very
second, the Qwest Macro Capacity Fiber Network can carry more information than
1 Hyper speed - Video, images and data (including VoIP applications!) can be sent
from coast to coast in the blink of an eye. At full capacity, the Qwest Macro Capacity
Fiber Network will transmit two trillion bits of multimedia content per second-or the
2 Absolute data integrity - The Qwest Macro Capacity Fiber Network is designed to
provide and offer unprecedented protection against data loss. Its Absolute Data
Integrity is the new world standard for error-free transmission. The network's non-
SONET ring architecture ensure less than one bit of error in every quadrillion bits.
Actually, that's the equivalent of one grain of sand out of place on a 20-mile stretch of
beach. Consequently, this advantage of the Qwest Network sets a new world-standard
3 Superior service reliability - The sophisticated fiber optics of the Qwest Macro
Capacity Fiber Network are encased in a thick plastic protective conduit buried in a
highly secure environment, principally along railroad lines. Moreover, the fiber is laid
366 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
out in an advanced SONET ring architecture that provides automatic, instant re-
4 Low cost position - The Qwest Macro Capacity Fiber Network's advanced fiber and
transmission electronics provide the company with lower installation, operating and
maintenance costs than older fiber systems that are typical in commercial use today.
In addition, Qwest has entered into construction contracts for the sale of dark fiber
along the route of the Qwest Network which will reduce Qwest's net cost per fiber
mile with respect to the fiber it retains for its own use. As a result of the cost
advantages, Qwest's low cost position will enable the capture of market share and take
advantage of the rapidly growing demand for data transmission, multimedia and long
The Qwest Macro Capacity Fiber Network is paving the way for 21st century
communications. Through secure, reliable and affordable data, image and multimedia content
transmission, Qwest will accelerate the expansion of the digital age in America.
Already, Internet service providers and other telecommunications companies are using the
capacity, speed, affordability and flexibility of the Qwest Network to upgrade and expand their
offerings. Businesses of all sizes are turning to Qwest to help them unlock their future
potential through Qwest's provision of long distance, IP and data transmission services. As
Part I. The Technology – May 25, 1998 - 367
Qwest expands across the nation, people and businesses everywhere will discover digital
telephone call. Our services are easy to use, easy to change and easy to upgrade. Qwest even
instant-as well as a broad portfolio of voice and data services that give all customers the
By early 1999, the Qwest Network will be operating in more than 125 United States cities,
with extensions into Mexico, connections to the United Kingdom and other international
*****Start TIP*****
For more information on Qwest and their products, contact their corporate headquarters:
Qwest Communications International Inc., Qwest Tower, 555 Seventeenth Street Denver, CO
http://www.qwest.net.
*****End TIP*****
368 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
technology providing business solutions for concurrent, real-time interactive voice, video and
data communications over packetized data networks such as the Internet, Local Area
Networks (LANs) and Wide Area Networks (WANs). NetSpeak Solutions allow
organizations to build new voice and video-enabled communications networks or to add these
With VoIP picking up, IP telephony is receiving increasing attention from the
US companies spent $83 billion on long distance calls last year. According to researchers, IP
telephony has the potential to enable companies to drastically reduce their telecommunications
costs. But more importantly, IP telephony offers the ability for multimedia communications--
voice, fax, data and video over a single channel. Although cost savings is currently generating
the demand for IP telephony, ultimately the ability to provide multimedia communications and
enhanced user services will likely be the key growth drivers of the IP telephony industry.
Part I. The Technology – May 25, 1998 - 369
communications systems over packetized data networks for service providers, businesses, call
centers and consumers. All NetSpeak solutions utilize its patent-pending virtual circuit-
switching technology to dramatically enhance the multimedia capabilities of both private and
public IP-based networks, and drastically reduce the cost of providing advanced services over
these networks.
WebPhone
NetSpeak’s WebPhone 4.0 is the latest version of its Internet telephony software. The product
gives users the ability to have voice, video and data communications over the Internet and
communication into the realm of multimedia by combining audio, video and text capabilities--
NetSpeak has licensed elemedia, Lucent Technologies' G.723.1 speech coder implementation
for use in all NetSpeak client applications including WebPhone 4.0. NetSpeak has also
licensed DSP Group, Inc.'s patent rights for G.723.1, elemedia and DSP Group both represent
*****Start NOTE*****
The G.723.1 speech technology standard is part of the H.323 specification adopted by the
International Telecommunications Union (ITU) as the international standard for voice over
packet-switched networks such as the Internet and local area networks (LANs). G.723.1 is
also selected by the VoIP Activity Group, part of the International Multimedia
Teleconferencing Consortium (IMTC), as the preferred speech coder for Internet telephony
*****End NOTE*****
By complying with H.323, multimedia products and applications from multiple vendors can
incorporation of the G.723.1 technology will give WebPhone users the highest quality
interoperability.
communications into the realm of multimedia by combining voice, video and text capabilities.
In addition to interoperability support, WebPhone 4.0 offers Audio Setup Wizard for
configuring speakers and microphone, being also very easy and fast to install. It also provides
Part I. The Technology – May 25, 1998 - 371
inbound and outbound Activity logging of calls, an enhanced User Guide and recall for the last
0 Point-to-point voice and video over the Internet or any TCP/IP-based network
5 Voice Auto Detection which automatically detects and adjusts to your voice,
7 Four lines with call holding, muting, do not disturb and blocking options
12 Fast video frame delivery for low and high bandwidth connections
18 Audio quality enhanced with TrueSpeechTM, G.723.1 and GSM voice compression
19 Account information and dialing parameters for use with NetSpeak Gateway Products
0 Hardware
2 16 MB RAM
11 Operating System
13 Network Connection
*****Start TIP*****
374 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Download WebPhone for free before you buy it at the URL below.
For more information on NetSpeak, contact them at 902 Clint Moore Road, Suite 104
Boca Raton, Florida 33487-2846, or call (561) 998-8700, or fax (561) 997-2401. You can also
*****End TIP*****
designs manufactures and markets intelligent telephone systems and telephony applications
for medium and small size offices. NetPhone PBX Servers are a new generation of telephone
systems that integrate the power, ease-of-use, and economics of PC servers with the familiarity
and reliability of the telephone. These open, reliable telephone systems allow organizations to
easily and affordably deploy a wide variety of computer telephony applications to increase
sales, enhance customer service, reduce telephone costs, and boost staff productivity.
technology, CT unfortunately have not been an option for smaller companies, simply because
they were either unavailable from their telephone system provider or prohibitively expensive.
Part I. The Technology – May 25, 1998 - 375
NetPhone PBX Servers, enables CT solution into smaller business by making computer
telephony enabled PBX systems cost effective by incorporating all components of a complete
PBX, and server software that implements all standard computer telephony APIs. The PBX
boards simply plug into standard PC servers running Windows NT or NetWare. Telephony
applications supplied by NetPhone and third parties execute on the PBX Servers and PC
clients. NetPhone PBX Servers and applications deliver the productivity enhancements of PC-
based visual phone control with caller-ID, database screen-pops, phone management, visual
NetPhone PBX boards are compatible with industry standard application interfaces including
Microsoft's TAPI and Novell's TSAPI, and provide a series of benefits, as itemized below:
0 Advanced PBX Call Processing — that provides call waiting, call hold, call transfer,
call conferencing, call forwarding, call pick-up, call group covering, call group
hunting, and call queuing telephony services for office and call center environments.
access, manipulate, and forward messages from their telephone by use of standard
3 Flexible Auto Attendant — that supports customized greeting messages for incoming
callers.
telephony applications such as ACD, advanced call filtering, account/order status and
5 High Availability Design — a patent pending PBX switch architecture that eliminates
system continues to operate even when the host PC server is taken off-line.
7 Support for Standard Phone Sets and Speaker Phones — eliminating the need for
NetPhone PBX servers are based entirely on industry standards and are a member of the
*****Start NOTE*****
For additional information about NetPhone or their products, contact them at 313 Boston Post
*****End NOTE*****
firm, VocalTec develops and markets award-winning software that enables voice, fax and
multi-media communications over packetized (IP) networks, the Internet and corporate
378 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
intranets. The Company also develops open systems to bridge the Internet/intranets to the
VocalTec pioneered the Internet telephony market with the introduction of Internet Phone in
1995. For the first time, anyone who owned a multimedia PC could make or receive a call
VocalTec continues to drive Internet telephony’s evolution into the mainstream by being first-
to-market with customized client/server solutions for the corporate and carrier markets. These
products offer corporations increased productivity and cost savings and enable traditional and
new generation telcos, such as Internet telephony service providers (ITSPs), to provide more
Vocaltec plays a central role in the development of interoperability standards. During 1996,
the company demonstrated its commitment to the standards process by working closely with
Phone software and Microsoft NetMeeting and Intel's Internet Phone software by announcing
their support of the International Telecommunications Union H.323 open standard. The
Company has also announced its founding membership in the VoIP Forum. VocalTec was
also the first company to ship a product using the UDP/IP protocol (one of the building blocks
VocalTec and Cisco co-founded the VoIP Forum of the International Multimedia
interoperability of Internet voice communications products. Within the VoIP forum, VocalTec
Communications has been developing its Call Management Agent (CMA) technology, a
technology expected to be extremely important to the development of truly rich and useful IP-
VocalTec Communications has also been very active in the development of the emerging
International Telecommunication Union (ITU) H.323 system. Recognizing that the real
promise of IP-based telephony lies in the added functionality of new extra features, including
supplementary services (call waiting, call transfer, etc.), the company places a high level of
importance on enabling all of these new features in a standard way so that the customer can be
platform, which forms the foundation for IP Communications solutions from VocalTec. The
The Internet Phone is Vocaltec’s client software, that enables users to simultaneously talk and
see each other in real-time for the cost of an Internet connection. Internet Phone Release 5 has
many new and improved features including enhanced audio and video, support for
The VocalTec Telephony Gateway Server bridges the gap between the traditional telephone
network and the Internet/intranets to enable unlimited long-distance calling and faxing. It
allows users to connect over the Internet or Intranet from telephone-to-telephone, PC-to-
Gateway uses the power of the Internet protocol standard to improve the flexibility and
charges.
Part I. The Technology – May 25, 1998 - 381
*****Start NOTE*****
For a full list of Vocaltec’s products and specifications, check their Website at URL
201-768-8893.
*****End NOTE*****
Vienna Systems Corporation designs and manufactures server-based hardware and software
products to distribute voice, data and video calls across IP networks, both corporate (Intranet)
Vienna.way
TheVienna.way products enable customers to build networks for voice, data and video calls
over an IP network. It is a client/server application that enables you to make a call over the IP
network to another client, as shown on figure 9.7, or use the Gateway to call someone on the
Public Telephone Network or call into the Vienna.way network using the Gateway.
Figure 9.7
0 Reduces infrastructure and administration costs as it. No more need for complex adds
/ moves and changes for both data connections as well as voice connections.
1 Optimizes network utilization. Now all calls, whether they are voice, data or video,
provide a more productive environment for people to work together. Enable remote
workers and road warriors to have their communications as if they were at the office.
Part I. The Technology – May 25, 1998 - 383
3 Enhances customer contact. Build new and exciting applications such as telephony-
A key component of Vienna.way is the Call Processing Server that extends the traditional
PBX voice communication features to voice, data and video traffic. To provide access to this
environment, Vienna has a Gateway product, which provides the interface between the Public
Telephone Network and the IP network. The client interface, my.way, provides multi-line
0 Vienna.way Call Processing Server: The Server provides traditional PBX features
across the network and delivers multimedia calls across private (Intranet) and public
2 Vienna.wayDesktop Applications
384 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
applications to the end user. It resides on the user's desktop, as shown on figure
appearances are available at the desktop, and users can rely on the corporate-
wide telephone directory or create their own for speed dialing. IP address
resolution allows users to dial by name or extension number. Users can perform
launched within the application and editing rights can be shared. my.way is
Figure 9.8
9.9, allowing callers to connect directly through their computer for voice
like flash, re-dial and mute. As an alternative to sound cards and microphones, it
provides for increased privacy and improved IP voice quality for users on the
Part I. The Technology – May 25, 1998 - 385
network. At the office, a single connection for voice and data at the desktop
makes moves, adds and changes easier for the network administrator. Its
portability means remote workers can connect SerialSet to their laptops to place
and receive IP voice calls through dial-up access to the network when away from
the office.
Figure 9.9
standard phone to the PC. Vienna's serial telephone adapter connects existing
standard phones to the PC through the PC's serial port, eliminating the need for a
sound card and microphone. Operating with the my.way desktop application,
calls to bypass the PC. The desktop telephone will then connect through a second
Figure 9.10
The Vienna.way, architecture has been designed to be fully distributed and flexible, making it
Lucent Technologies, headquartered in Murray Hill, N.J., designs, builds and delivers a wide
range of public and private networks, communications systems and software, data networking
the research and development arm of the company. For more information about Lucent
including a mixed-media application server and an Internet telephony gateway, that enable
enterprises and service providers to create new IP-based applications, effectively scale and
*****Start NOTE*****
Lucent is also bringing new capabilities to the ADSL market, with its new ADSL access
solutions that reside on the customer premises and in the service providers' networks as well as
*****End NOTE*****
Lucent Technologies offers a Microsoft Windows NT server-based solution that places voice
and fax calls over IP networks using voice compression software developed by Bell Labs' new
division, elemedia. The solution, know as the Internet Telephony Server-E (ITS-E) works with
the DEFINITY ECS and most existing telephone systems and is connected to the PBX via a
T1/E1 Tie Line or analog line interface. On the IP network side, the ITS-E is connected via a
standard 10/100BaseT Ethernet interface. ITS-E supports calling between two standard
telephone sets or two fax machines. ITS-E also supports calls between a telephone and an
The quality of voice over IP using ITS-E is near toll quality. The SX7300 algorithm has been
evaluated as having a Mean Opinion Score (MOS) of 3.5 (based on tests performed by
Lucent's MultiMedia Communications eXchange Server is leading the industry as the first
conferencing to a broad array of network connections, including ATM, wireless LANs, remote
MMCX 2.1 also adds improved audio and video quality and increased interoperability by
The MMCX 2.1 support's RADVision's new OnLAN L2W - 323 Multimedia H.323 Gateway,
making it possible for MMCX, H.323 and other H.320 clients, such as PictureTel Corp. room
systems, to communicate over the same LAN. The gateway also enables MMCX users to tie
their existing ISDN-based PC and room videoconferencing systems into the LAN in a cost-
effective way.
To help network administrators reduce the amount of multimedia traffic on the WAN, the
MMCX 2.1 now supports IP multicasting. In addition, for the first time, enterprises deploying
large networks of MMCX servers can use sophisticated network management tools such as
The H.323-compliant MMCX client and server software now supports Microsoft®
establish spontaneous point-to-point or multi-party calls using a variety of voice, video and
data.
Company’s such as Lockheed Martin Tactical Aircraft Systems of Fort Worth, Texas, has
begun rolling out the latest version of the MMCX to more than 100 engineers, designers and
Another example of Lucent’s solutions using VoIP is achieved through mixed media
conferencing, which will allow virtual meetings to be held, as well as group reviews of
avionics software code as they begin developing the Joint Strike Fighter.
The Joint Strike Fighter, due in 2008, is a multirole aircraft for the U.S. Air Force, U.S. Navy,
U.S. Marines and British Royal Navy. Lockheed Martin is teaming up with British Aerospace,
Northrop Grumman and others to produce the first demonstration planes. Lucent’s MMCX
VoIP solution will enable Lockheed Martin to resolve many of their business issues without
having to travel as sharing of data and plan activities can be delivered via MMCX.
390 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
The Internet Telephony Server for Service Providers (ITS-SP) allows service providers to
route voice and fax communications over the Internet with near toll-grade reliability and
quality. Release 2.0 includes a new network architecture that is designed to offer key features
today, while providing a path for service providers to increase the scalability of their networks,
reduce their per port prices, increase their overall manageability and provide plug-and-play
applications.
One of these new architectural enhancements is the ITS-Service Access Manager (ITS-SAM)
which allows service providers to create zones for managing multiple gateways. The ITS-
SAM allows service providers to set up separate zones-a collection of endpoints, PC clients
and gateways-for delivering services such as authentication control, security and call routing.
For example, zones for up to 25 gateways and 500 PC clients can be set up per ITS-SAM.
Another component of the ITS-SP 2.0 is the ITS-Administration Manager (ITS-AM). The
ITS-AM is a secure Web-based network management tool that allows service providers to
The ITS-SP 2.0 also includes features that enable service providers to tailor their level of
service with customers through service level agreements. For example, service providers can
choose to route calls to an alternative data network or Public Switched Telephone Network
Part I. The Technology – May 25, 1998 - 391
when the network is congested and Dynamic Jitter Buffering can be used to offer customers
better voice quality. The ITS-SP 2.0 also includes a custom application development tool that
enables service providers to offer new voice over data applications in their existing networks.
*****Start NOTE*****
By the time this book is published the MMCX 2.1 should be already released, as I write this
section its release was scheduled for the end of May of 1998. For more information about
MMCX 2.1, please visit the Lucent website at http://www.lucent.com/dns. You can also
*****End NOTE*****
Today the telecom industry is making a historic evolution toward Webtone -- a shift that will
enable data networks to deliver the same kind of reliability, integrity, security and capacity
reality. The Internet Voice Button is its flagship product: Imagine turning on one of a variety
392 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
of intelligent information devices at work, home or on the road and being within easy reach of
an interactive, multidimensional world of sound, video, text and images. This is Nortel’s
Webtone opportunity.
teleconferencing, voice conversations, text files, faxes, videos, home shopping and banking,
The evolution toward Webtone will change everything. By transforming how people
communicate, it will transform the way businesses operate, governments define the public
interest, and knowledge is created and shared. The Webtone opportunity will afford
individuals the power to access a variety of media through a variety of devices. A Webtone
network will have the intelligence to deliver information that will help make our lives more
Nortel is committed to building Webtone networks that carry the Internet and data traffic with
the same kind of reliability, integrity, security and capacity that we take for granted in the
familiar world of dialtone. Follow the links below to further explore the Webtone opportunity
*****Start TIP*****
Part I. The Technology – May 25, 1998 - 393
You should know that MICOM, also mentioned in this book for its developments and
solutions that integrate data, voice, fax and local area network (LAN) communications over a
*****End TIP*****
With the press of a button on a Web page, customers visiting a business Web site can call the
business to place an order, request service or ask for more information - they never have to
dial a number or leave their Internet session! The call won't cost them a penny!
2 An Internet phone, if they are using a single line to connect to the Internet.
3 Use popular VoIP phone clients such as Microsoft NetMeeting, supporting the the
4 Use text chat to exchange additional information with the business representative.
394 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
How It Works
When a customer clicks on Voice Button on a business Web page, information is sent to the
Voice Button server. This information includes the business telephone number to be called
and the customer's calling preferences. These preferences are set when a customer uses Voice
Button for the first time. A user-friendly configuration screen collects information including
Voice Button initiates a call to the customer using the method selected during the
configuration. When the customer answers this call, Voice Button initiates a second call to the
business representative. While this call is being established, a customized announcement may
be played for the customer. The business representative answers the call and is connected with
the customer. A text chat facility is also supported to facilitate the exchange of information.
*****Start NOTE*****
For more information about Voice Button, please contact Nortel by e-mail at
vbutton@nortel.com, or call them using Voice Button technology by accessing their Website
4NORTEL.
*****End NOTE*****
Part I. The Technology – May 25, 1998 - 395
What’s Next
This chapter outlined some of the main vendors actively pursuing VoIP solutions and
development of products. As discussed, many of them already offers products and services,
while many others are catching up with the waive. I believe most of the big telcos will join the
effort, but for know, they have a lot on their plate trying to convince their stock holder and
board of directors about the need to completely change the way they do business in order to
Of course, I could have ad an endless list of vendors and suppliers of VoIp technology and
products, but that would had been almost impossible. Thus, I do recognize the selection above
is incomplete, and to update it is virtually impossible as well, as more and more companies
join the VoIP market. I hope you were able to have an overall picture of where VoIP’s market
is and what some of its major players are doing. This was the objective of this chapter. Make
sure to check the company’s websites and the latest updates of their developments.
The next chapter, “The RTSP Protocol,” discusses the Real Time Streaming Protocol (RTSP)
and the potential affect it will have in VoIP, wants fully available.
396 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Part I. The Technology – May 25, 1998 - 397
Chapter 10
This chapter provides you with a brief review of the Real Time Streaming Protocol (RTSP), as
described on RFC 2326 as Standards Track, of April 1998, proposed by H. Schulzrinne, from
12
Copyright (C) The Internet Society (1998). All Rights Reserved. - This document and translations of it may be copied and
furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be
prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above
copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may
not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet
organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
398 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
It’s important to review RFC 2326, as it specifies the RTSP, an application-level protocol for
control over the delivery of data with real-time properties. RTSP provides an extensible
framework to enable controlled, on-demand delivery of real-time data, such as audio and
video. Sources of data can include both live data feeds and stored clips. This protocol is
intended to control multiple data delivery sessions, provide a means for choosing delivery
channels such as UDP, multicast UDP and TCP, and provide a means for choosing delivery
The Real Time Streaming Protocol (RTSP) establishes and controls either a single or several
time-synchronized streams of continuous media such as audio and video. It does not typically
deliver the continuous streams itself, although interleaving of the continuous media stream
with the control stream is possible. Thus, RTSP acts as a "network remote control" for
multimedia servers.
connection. During an RTSP session, an RTSP client may open and close many reliable
Part I. The Technology – May 25, 1998 - 399
transport connections to the server to issue RTSP requests. Alternatively, it may use a
The streams controlled by RTSP may use RTP, but the operation of RTSP does not depend on
the transport mechanism used to carry continuous media. The protocol is intentionally similar
in syntax and operation to HTTP/1.1. This enables the extension mechanisms to HTTP to be
added, in most cases, to RTSP. But RTSP is not like HTTP, it differs in many ways, as
outlined below:
0 An RTSP server needs to maintain state by default in almost all cases, as opposed to
0 RTSP introduces a number of new methods and has a different protocol identifier.
0 RTSP is defined to use ISO 10646 (UTF-8) rather than ISO 8859-1, which is
0 The Request-URI always contains the absolute URI. Also, HTTP/1.1 carries only the
absolute path in the request and puts the host name in a separate header field, so that it
400 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
virtual hosting easier, where a single host with one IP address hosts several document
trees.
0 Retrieval of media from media server - The client can request a presentation
description via HTTP or some other method. If the presentation is being multicast, the
presentation description contains the multicast addresses and ports to be used for the
continuous media. If the presentation is to be sent only to the client via unicast, the
existing conference, either to play back media into the presentation or to record all or
a subset of the media in a presentation. This mode is useful for distributed teaching
applications. Several parties in the conference may take turns pushing the remote
control buttons.
useful if the server can tell the client about additional media becoming available.
Properties of RTSP
RTSP is an extendable protocol, as new methods and parameters can be easily added to it.
RTSP is also very easy to parse both by standard HTTP or MIME parsers. Since RTSP re-uses
web security mechanisms, it is fairly secure. All HTTP authentication mechanisms such as
datagram protocol, such as UDP, a reliable datagram protocol, such as RDP, or a reliable
RTSP is multi-server capable. Thus, each media stream within a presentation can reside on a
different server. The client automatically establishes several concurrent control sessions with
the different media servers. Media synchronization is performed at the transport level.
Control of recording devices can be executed with RTSP, which is able to control both
recording and playback devices, as well as devices that can alternate between the two modes,
such as VCRs.
through SMPTE time stamps to allow remote digital editing. Also, it is presentation
description neutral, hence not imposing a particular presentation description or metafile format
402 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
and can convey the type of format to be used. However, the presentation description must
One of the main characteristics of this protocol is its proxy and firewall friendliness. For that,
both application and transport-layer firewalls such as SOCKS should readily handle the
protocol. A firewall may need to understand the setup method to open a hole for the UDP
media stream.
Another major characteristic of RTSP is its HTTP-friendliness. Where sensible, RTSP reuses
HTTP concepts, so that the existing infrastructure can be reused. This infrastructure includes
Platform for Internet Content Selection (PICS), for associating labels with content. However,
RTSP does not just add methods to HTTP since the controlling continuous media requires
Server State in most cases. For additional information of RTSP characteristics, check the RFC
Next Step
Appendix A
List of Suppliers
Availabi Descri
Provider Service lity ption Coverage Bandwidth Guarantees
Bellsouth Smart 1991 Rings Bellsouth region 155, 6221 month credit for 2.5-
Corp. Ring Mbit/s second failure or greater
Atlanta
404-982-
Part I. The Technology – May 25, 1998 - 405
7000
British Megastrea 1994 Point- Trial service in2 Mbit/s Not yet determined
Telecomm m Genus to-pointManchester and
unications London
PLC (BT)
London
44-171-
932-7894
Nynex Sonet 1995 Rings Nynex region 155, 622Monthly charge refunded for
Corp. and Mbit/s; 2.41-minute outage
White point- Gbit/s per month
Plains, to-point
N.Y.
914-644-
7600
Pacific Fastrak 1995 Rings San Francisco Bay1.544 Entire monthly service
Bell Sonet Ring and and Los AngelesMbit/s- charge credited for outages
San and Access point- areas 2.488 Gbit/sof 2 hours or more hours
Francisco Service to-point
510-867-
7258
Ava Fra
ilab me
Provider Service ility Coverage Description Bandwidth relay
/SM
408 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
DS
AT&T AT&T 199 Nationwide CBR/VBR with45 and 155 Mbit/s Late
Contact Interspan 4 SNMP 1995
local sales management /No
office
France Transrel ATM 199 11 French cities ATM-based LAN2-25 Mbit/s No/P
Telecom 4 interconnect for lanne
Paris IP traffic only d
33-1-44-44-
53-14
Part I. The Technology – May 25, 1998 - 409
SBC Southwestern 199 Metropolitan areas inCBR/VBR 45 and 155 Mbit/s Yes/
Communic Bell ATM6 Arkansas, Kansas, Yes
ations Cell Relay Missouri, Oklahoma, and
Corp. Service Texas
St. Louis
314-235-
9800
Stentor Depends upon199 All major metropolitanLAN interconnect10 Mbit/s (access) N/A
Alliance operator 3 areas in 10 provinces andfor Ethernet for
Ottawa territories and token ring; both
613-781- videoconferencing
8798
Telecom Datanet ATM 199 15 Finnish cities LAN interconnect 64 kbit/ s to 155Yes/
Finland 4 Mbit/ s No
Ltd.
Helsinki
358-2040-
2964
Part I. The Technology – May 25, 1998 - 411
ABR =
N/A = Not
Available SVC = Switched virtual circuit VBR = Variable bit rate
applicable
bit rate
CBR =
UBR = Unspecified bit
Constant bitSMDS = Switched Multimegabit Data Service
rate
rate
412 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
Part I. The Technology – May 25, 1998 - 413
Appendix B
Glossary of terms
Adjacency - A relationship formed between neighboring routers formed for the purpose of
Aggregate control - The control of the multiple streams using a single timeline by the server.
For audio/video feeds, this means that the client may issue a single play or pause message to
American National Standards Institute (ANSI) - The principal standards development body in
the United States. It consists of voluntary members that represent the U.S. in the International
other national standards organizations, such as the Institute of Electrical and Electronic
Engineers (IEEE).
414 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
American Wire Gauge (AWG) - A wire diameter specification. The lower the AWG number,
Anycast, anycast address - An identifier for a set of interfaces that typically belongs to
different nodes. A method developed for IPv6, of sending a datagram or packet to a single
address with more than one interface. The packet is usually sent to the “nearest” node in a
application layer gateway (ALG) - In modern usage, the term application gateway refers to
systems that do translation from some native format to another; for example, a gateway that
gateway converts protocol data units (PDU) from one stack's application protocol to the other
stacks application protocol. Application layer gateways act as origination and termination
application programming interface (API) - A set of tools, routines, and protocols used as
building blocks by programmers to develop programs. Using APIs helps to keep applications
asymmetric digital subscriber line (ADSL) - An xDSL technology in which modems attached
to twisted-pair copper wires transmit from 1.5 to 8 Mbps downstream (to the subscriber) and
provides high-speed backbone support defined at 155 Mb/s and 622 Mb/s and having a 53-
byte fixed-length cell consisting of a 5 byte header for routing information and 48 bytes of
data.
Attachment unit interface (AUI) - A 15-pin shielded, twisted pair Ethernet cable used
Authentication - The process of knowing that the data received is the same as the data that was
sent and that the sender is the actual sender. Usually verified by a password; however, since
passwords can be guessed or discovered, a system that requires an encrypted password and a
You can also think of an autonomous system as set of routers under a single technical
administration. An AS uses one or more interior gateway protocol and common metrics to
route packets within the AS. An autonomous system uses an exterior gateway protocol to
autonomous systems to have a single coherent interior routing plan and presents a consistent
Bandwidth - The signaling rate of a LAN or WAN circuit or the number of bits or bytes that
can be transmitted over the channel each second and measured by electrical engineers in Hertz
BNC Connector - Bayonet Neill-Concelman connector that is a type of connector used for
attaching coax cable to electronic equipment and that can be attach or detach quicker than
connectors that screw. ThinWire Ethernet (IEEE 802.3 10BASE2) uses BNC connectors.
Broadband - A data transmission technique allowing multiple high-speed signals to share the
Broadcast - A type of data communication where a source sends one copy of a message to all
the nodes on the network even if the node does not want to receive such messages. See also
broadcast domain - The part of a network that receives the same broadcasts
broadcast network - A network that supports more than two attached routers, and has the
building backbone subsystem - Provides the link between the building and campus backbone
campus backbone subsystem - Provides the link between buildings and contains the cabling
carrier sense multiple access with collision detection (CSMD/CD) - The channel access
method used by the Ethernet and ISO 8802-3 LANs. Each station waits for an idle channel
modulation (QAM) that stores parts of a modulated message signal in memory and then
reassembles the parts in the modulated wave. The carrier signal is suppressed before
central office (CO) - A facility that contains the lowest node in the hierarchy of switches that
Class A IP address - A type of unicast IP address that segments the address space into many
Class B IP address - A type of unicast IP address that segments the address space into a
Class C IP address - A type of unicast IP address that segments the address space into many
Class D IP addresses - Specifies multicast host groups in IPv4 based networks. The Internet
standard in "dotted decimal" notation, assigns this host group addresses range from 224.0.0.0
to 239.255.255.255.
Client - The client requests continuous media data from the media server.
client/server architecture - A network architecture in which the protocols in use govern the
behavior of workstations so each one works either as a client or a server. Users run
equal to one.
Connection - A transport layer virtual circuit established between two programs for the
purpose of communication.
Part I. The Technology – May 25, 1998 - 419
connectionless protocol - A type of network protocol where a host can send a message without
establishing a connection with the recipient. The host puts the message onto the network,
provides the destination address and hopes that the message arrives at its destination.
the sender and receiver before transmitting any data. The telephone, TCP, and HyperText
Consumer - Defined in the Multicast Transport Protocol to be a transport that is capable only
of receiving user data. It can transmit control packets, such as negative acknowledgements, but
can never transmit any requests for the transmit token or any form of data or empty messages.
Container file - A file that may contain multiple media streams, which often comprise a
presentation when, played together. RTSP servers may offer aggregate control on these files,
Continuous media - Data where there is a timing relationship between source and sink; that is,
the sink must reproduce the timing relationship that existed at the source. The most common
examples of continuous media are audio and motion video. Continuous media can be real-
time (interactive), where there is a "tight" timing relationship between source and sink, or
Convergence - The amount of time it takes for a change to a routing topology to propagate
Core Based Trees (CBT) Routing Protocol - - The CBT routing protocol is characterized a
single tree that is shared by all members of the group. All members of the group receive
multicast traffic over this shared tree regardless of the source of the message. A small number
of core routers construct the tree and routers can join the tree by sending a join message to the
core.
core network - A combination of switching offices and transmission plant that connects
switching offices together. In the U.S. local exchange, core networks are linked by several
competing interexchange networks. In the rest of the world, core networks extend to national
boundaries.
counter-rotating Ring - A method of using two ring networks going in opposite directions
(such as in FDDI) to provide redundancy. The network interfaces can change the path of the
ring that the data flows around. This preserves the ring and the operation of the LAN even if
some of the cable is unplugged or cut, or if a device on the ring fails in such a way that it
Data circuit terminating equipment (DCE) - An interface typically found in modems or similar
Data Link Connection Identifier (DLCI) - A 10-bit value included in the address field of a
frame relay packet that uniquely identifies each virtual circuit at each Frame Relay
Datagram - Term used in IPv4. The format for a packet of data sent on the Internet to a
specific destination address. Specifies standards for the header information. In IPv6,
Dense-mode multicast routing protocols - A category of routing protocol that assumes that
multicast group members are densely distributed throughout the network. The basic
assumption is that almost all the hosts on the network belong to the group. Dense-mode
routing protocols included the Distance Vector Multicast Routing Protocol (DVMRP),
Multicast Open Shortest Path First (MOSPF), and Protocol-Independent Multicast - Dense
digital loop carrier (DLC) - The carrier's local loop infrastructure that connects end users
located more than 18,000 feet or 3.5 miles away from the central office. DLC systems consist
of physical pedestals containing line cards that concentrate residential links onto digital
circuits.
digital subscriber line (DSL) - A local loop access technology that calls for modems on either
end of copper twisted-pair wire to deliver data, voice, and video information over a dedicated
digital network.
digital subscriber line access multiplexer (DSLAM) - Multiplexing equipment that contains a
high concentration of central office splitters, xDSL modems, and other electronics to connect
discrete multi-tone (DMT) modulation - A wave modulation scheme that discretely divides
the available frequencies into 256 sub-channels or tones to avoid high-frequency signal loss
discrete wavelet multi-tone (DWMT) - A variant of DMT modulation. DWMT goes a step
further in complexity and performance by creating even more isolation between sub-channels.
Distance Vector Multicast Routing Protocol (DVMRP) - The first protocol developed to
support multicast routing and used widely on the MBONE. RFC 1075 describes this Distance
Vector Multicast Routing Protocol. DVMRP assume that every host on the network belongs
Part I. The Technology – May 25, 1998 - 423
to the multicast group. Multicast messages pass over all router interfaces as they pass over the
network and form a spanning tree to all members of the multicast group. DVMRP uses a
distance-vector protocol such as the Routing Information Protocol (RIP) to maintain a current
image of the network topology. Both DVMRP and RIP use the number of hops in the path as
Domain Name Service (DNS) - The name service of the TCP/IP protocol family, which
provides information about computers on local and remote networks. DNS is an Internet-wide
hierarchical database.
DTE/DCE - The interface between data terminal equipment (DTE) and data circuit-
E1 - The European basic multiplex rate that carries 30 voice channels in a 256-bit frame
echo cancellation - A technique used by ADSL, V.32, and V.34 modems that isolates and
filters unwanted signal energy from echoes caused by the main transmitted signal.
Entity - The information transferred as the payload of a request or response. An entity consists
of metainformation in the form of entity-header fields and content in the form of an entity.
424 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
carriers, and others responsible for setting technical standards in the European
telecommunications industry.
Fanout - The degree of replication in a multicast tree or the number of copies of a call in a
fast packet - A data transmission technique where the packet is transmitted without any error
checking at points along the route. The end-points have the responsibility of performing any
error checking.
Fiber Distributed Data Interface (FDDI) - A set of ANSI/ISO standards that define a high-
bandwidth (100 Mbps) general purpose LAN. FDDI primarily runs over optical fiber but can
all run over copper. FDDI provides synchronous and asynchronous services between
fragment - A portion of a packet/frame and often means a part of an Ethernet frame left over
from a collision. In IP terminology, fragment means a packet that is the result of splitting a
Frame relay network - - A network consisting of frame relay switches, offering a bare-bones
frequency division multiplexing (FDM) - A technique that divides the available bandwidth of
destination. A host address of another router that is directly reachable through an attached
geostationary satellite (GSAT) - A satellite that orbits the orbits the earth directly over the
equator, approximately 22,000 miles up. A complete rotation around the earth takes 24 hours.
Gigabit Ethernet - High-speed version of Ethernet (a billion bits per second) under
half duplex - A possible property of a data-communications line: that data can be transferred
in either direction, but only in one direction at a time. If the line is sufficiently high-speed, then
to a human, it may appear that data transfer is simultaneous in both directions if the two ends
quickly take turns transferring. The alternatives are full duplex and simplex.
Heartbeat - An interval of time nominally measured in milliseconds and a key parameter in the
transport's state. It can be adapted to the requirements of the transport's client to provide the
desired quality of service. Also Ethernet defined SQE signal quality test function.
high bit-rate digital subscriber line (HDSL) - An xDSL technology in which modems on either
which increases the horizontal lines of resolution from 480 to 560 lines per display.
Host Group - - All hosts belonging to a multicast session. The membership of a host group is
dynamic where: hosts can join and leave the group at any time. There can be any number of
members in a host group and the members can be located anywhere on the local network or on
the Internet. A host can be a member of more than one group at a time.
ICMP destination unreachable indication - An error indication returned to the original sender
of a packet that cannot be delivered for the reasons outlined in ICMP protocol. If the error
occurs on a node other than the node originating the packet, an ICMP error message is
generated. If the error occurs on the originating node, an implementation is not required to
actually create and send an ICMP error packet to the source, as long as the upper-layer sender
is notified through an appropriate mechanism; for example, the return value from a procedure
call. Note, however, that an implementation may find it convenient in some cases to return
errors to the sender by taking the offending packet, generating an ICMP error message, and
Integrated Services Digital Network (ISDN) - All digital service provided by telephone
companies. Provides 144 Kbps over a single phone line (divided in two 64 Kbps "B" channels
Interface - A system's attachment point to a link. It is possible for a system to have more than
one interface to the same link. Interfaces are uniquely identified by IP unicast addresses; a
single interface may have more than one such address. An interface can be connection
between a router and one of its attached networks. A single IP address, domain name, or
interface name can specify a physical interface (unless the network is an unnumbered point-to-
point network).
Internet Assigned Numbers Authority (IANA) - The central coordinator for the assignment of
unique parameter values for Internet protocols. The Internet Society (ISOC) and the Federal
Network Council (FNC) charter the IANA to act as the clearinghouse to assign and coordinate
internet datagram - The unit of data exchanged between an Internet module and the higher
operators, vendors, and researchers, closely aligned to the Internet Architecture Board and
Part I. The Technology – May 25, 1998 - 429
chartered to work on the design and engineering of TCP/IP and the global Internet. The IETF
is divided into groups or areas, each with a manager. Open to any interested individual.
Internet Group Management Protocol (IGMP) - Multicast routers use this protocol to learn the
existence of host group members on their directly attached subnets. IP hosts use IGMP to
report their host group memberships to any immediately neighboring multicast routers. IGMP
describes IGMP, which is considered as an extension to ICMP and occupies the same place in
Internet Protocol (IP) - The protocol or standard at the network level of the Internet that
defines the packets of information and routing them to remote nodes, and the method of
Internet Service Provider (ISP) - Businesses that provide subscription services, such as online
information retrieval software, bulletin boards, electronic mail, and so on to users for a fee.
ISPs are domains under the control of a single administration that share their resources with
other domains.
Internetwork Packet Exchange protocol (IPX) - A datagram protocol found in Novel NetWare
networks. This datagram protocol is similar to UDP and together with SPX, provides
InterNIC - A collaborative project between AT&T and Network Solutions, Inc. (NSI)
supported by the National Science Foundation. The project currently offers the following four
Multicasting”, by Steve Deering in 1989. The RFC describes IP Multicasting as: "the
destination host group with the same ‘best-efforts’ reliability as regular unicast IP datagrams.
The membership of a host group is dynamic; that is, hosts may join and leave groups at any
time. There is no restriction on the location or number of members in a host group. A host
IP Multicast Datagram - A datagram delivered to all members of the multicast host group.
Such datagrams are delivered with the same best-efforts reliability as regular unicast IP
datagrams.
IP Multicast Router - A router supporting IGMP and one or more of the multicast routing
ISO - International Organization for Standardization, a special agency of the United Nations
that is charged with the development of communication standards for computers. Membership
the world.
LAN - A LAN is a local area network and is a communication network that spans a limited
geographical area. LANs can differ from one another by topology or arrangement of devices
on the network, the protocols they use, and the media, such as twisted-pair wire, coaxial
cables, or fiber optic cables used to connect the devices on the network.
Latency - The transmission delay of the network or the minimum amount of time it takes for
any one of those bits or bytes to travel across the network. See also bandwidth.
orbiting in a circular orbit at over, or nearly over, the geographic poles and flying at an altitude
of a few hundred miles. Wireless access to the Internet is dependent upon this type of satellite.
local loop - The line from a subscriber to the telephone company central office.
logical link - A temporary connection between source and destination nodes, or between two
Logical Link Control (LLC) - Part of the Data Link layer of the OSI model and the link layer
control specification for the IEEE 802.x series of standards. It defines the services for the
transmission of data between two stations with no intermediate switching stations. There are
logical topologies - Describe the view of the network as seen by the networks components
MAC address - The unique media access control 6-byte address that is associated with the
network adapter card and uniquely identifies the machine on a particular network. A MAC
address is also known as an Ethernet address, hardware address, station address, or physical
address.
Mask - A means of subdividing networks using address modification. A mask is a dotted quad
specifying which bits of the destination are significant. Except when used in a route filter,
Maximum Transmission Units (MTU) - The largest amount of data that can be transferred
MBONE - A virtual multicast backbone network layered on top of the physical Internet. In
existence for about five years, the MBONE supports routing of IP Multicast packets.
Media initialization - Datatype/codec specific initialization. This includes such things as clock
rates, color tables, etc. Any transport-independent information, which is required by a client
for playback of a media stream, occurs in the media initialization phase of stream setup.
Media parameter - Parameter specific to a media type that may be changed before or during
stream playback.
Media server - The server providing playback or recording services for one or more media
streams. Different media streams within a presentation may originate from different media
servers. A media server may reside on the same or a different host as the web server the
Media stream - A single media instance, e.g., an audio stream or a video stream as well as a
single whiteboard or shared application group. When using RTP, a stream consists of all RTP
and RTCP packets created by a source within an RTP session. This is equivalent to the
medium attachment unit (MAU) - A device used to convert signals from one Ethernet
medium to another.
Modem - Contraction for modulator/demodulator. A modem converts the serial digital data
from a transmitting device into a form suitable for transmission over the analog telephone
channel.
Modulation - The process in which the characteristics of one wave or signal are varied in
accordance with another wave or signal. Modulation can alter frequency, phase, or amplitude
characteristics.
multiaccess network - A physical network that supports the attachment of more than two
selected subset of all the hosts that can receive the messages; also a message that is sent out to
multiple devices on the network by a host. See also anycast, unicast, broadcast, and IP
multicasting. A
multicast group - A group set up to receive messages from a source. These groups can be set
up based on frame relay or IP in the TCP/IP protocol suite, as well as in other networks.
is supported.
multicast link - A link over which IP multicast or IP broadcast service is supported. This
includes broadcast media such as LANs and satellite channels, single point-to-point links, and
Multicast Open Shortest Path First (MOSPF) - RFC 1584 defines MOSPF that is an extension
to the OSPF link-state unicast routing protocol that provides the ability to route IP multicast
traffic. Some portions of the MBONE support MOSPF. MOSPF uses the OSPF link-state
metric to determine the least-cost path and calculates a spanning tree for routing multicast
traffic with the multicast source at the root and the group members as leaves.
Multicast Transport Protocol (MTP) - This protocol gives application programs guarantees of
reliability. The MTP protocol could be useful when developing some types of applications.
436 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
For example MTP could be useful with distributed databases that need to be certain that all
Multimode Fiber - A type of fiber mostly used for short distances such as those found in a
campus LAN. It can carry 100 megabits/second for typical campus distances, the actual
maximum speed (given the right electronics) depending upon the actual distance. It is easier to
connect to than Single Mode Fiber, but its limit on speed x distance is lower.
Multiplex - Combining signals of multiple channels into one channel. This process provides
multiple users with access to a single conductor or medium by transmitting in multiple distinct
frequency bands (frequency division multiplexing, or FDM) or by assigning the same channel
Multiplexer - A device that allows several users to share a single circuit and funnels different
data streams into a single stream. At the other end of the communications link, another
multiplexer reverses the process by splitting the data stream back into the original streams.
NetBEUI - A enhanced version of the NetBIOS protocol and used by Windows based
NetBIOS - The Network Basic Input Output System, an API that has special functions for
network access point (NAP) - An Internet hub where national and international ISPs connect
with one another. A NAP router has to know about every network on the Internet
network address - See IP address - network service access point (NSAP) - The network
Network Information Center (NIC) - Central organization of a network of a network with the
authority to create network names and addresses. NIC.DDN.MIL is the specific Internet NIC
Network Information Service - Referred to as NIS and formerly known as Sun Yellow Pages,
NIS is used for the administration of network-wide databases. NIS has two services, one for
finding a NIS server, the other for access the NIS databases. NIS permits dynamic updates of
the database files. NIS is a non-hierarchical, replicated database which is the property of Sun
Node - Any intelligent device connected to the network. This includes terminal servers, host
computers, and any other devices (such as printers and terminals) that are directly connected to
the network. A node can be thought of as any device that has a hardware address.
Open System Interconnection (OSI) - The title for a set layered standards developed by the
Packet - A package of data with a header that may or may not be logically complete. A series
of bits containing data and control information, including source and destination node
addresses, formatted for transmission from one node to another. A packet is more often a
routing protocols to examine all packets and forward them to their destination entirely in Layer
playback server.
Part I. The Technology – May 25, 1998 - 439
so that data transmission between logical groups or layers in a network architecture occurs
between entities in the same layer of the model. With a peer-to-peer architecture all
workstation in this type of network have the equivalent capabilities. See also client/server
architecture.
Permanent Virtual Circuit (PVCP) - A permanent logical connection set up with packet data
phase modulation - A technique that changes the characteristics of a generated sine wave or
Physical layer - The physical channel implements layer 1, the bottom layer of the OSI model.
The Physical layer insulates Layer 2 (the Data Link layer) from medium-dependent physical
physical topologies - Define the arrangement of devices and the layout of the wiring.
PIM- Dense Mode (PIM-DM) Routing Protocol - Protocol Independent Multicast – Dense
Mode is a protocol operates in an environment where group members are relatively densely
packed. PIM Dense Mode (PIM-DM) is similar to DVMRP in that it employs the Reverse
Path Multicasting (RPM) algorithm. PIM-DM control message processing and data packet
440 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
forwarding is integrated with PIM-SM operation so that a single router can run different
PIM- Sparse Mode (PIM-SM) Routing Protocol - PIM-SM is a protocol that is optimized for
environments where group members are distributed across many regions of the Internet. The
multicast group members could be distributed across many regions of the Internet. To receive
multicast traffic addressed to the group, routers with directly attached or downstream members
are required to join a sparse mode distribution tree by transmitting explicit join messages. To
eliminate potential scaling issues, PIM-SM limits multicast traffic so that only those routers
Point-to-point network - A network joining a single pair of routers; for example, a 56Kb
serial-line network.
Point-to-point protocol (PPP) - The successor to SLIP, PPP provides router-to-router and host-
POTS splitter - A passive filter that separates voice traffic from data traffic.
Part I. The Technology – May 25, 1998 - 441
Presentation - A set of one or more streams presented to the client as a complete media feed,
using a presentation description. In most cases in the RTSP context, this implies aggregate
media streams within a presentation, such as the set of encodings, network addresses and
Protocol - The set of rules to send and receiving data and to govern activities within a specific
layer of the network architecture model. Protocols regulate the transfer of data between layers
and across links to other devices and define procedures for handling lost or damaged
transmissions or packets. The protocols also determine whether the network uses peer-to-peer
or client/server architecture.
group, PIM provides a standard multicast routing protocol that supports scalable inter-domain
multicast routing across the Internet. This inter-domain multicast routing is not dependent on
the mechanisms provided by any particular unicast routing protocol. . PIM has two modes,
public switched telephone network (PSTN) - A telephone system through which users can be
in modems, QAM enables two digital carrier signals to occupy the same transmission
bandwidth.
random delay - The random amount of time a transmission is delayed to prevent multiple
nodes from transmitting at exactly the same time, or to prevent long-range periodic
rate-adaptive digital subscriber line (R-ADSL) - An emerging variation of CAP; it divides the
transmission spectrum into discrete subchannels and adjusts each signal transmission
Reachability - Whether or not the one-way forward path to a neighbor is functioning properly.
For neighboring routers, reachability means that packets sent by a node's IP layer are delivered
to the router's IP layer, and the router is indeed forwarding packets. This means the node is
configured as a router, not a host. For hosts, reachability means that packets sent by a node's IP
Real-Time Streaming Protocol (RTSP) - This application-level protocol provides control for
the delivery of data with real-time properties. RTSP enables controlled on-demand delivery of
Real-Time Transport Protocol (RTP) - RTP provides end-to-end network transport functions
for applications that transmit real-time data over multicast or unicast network services. Such
Relay - A device that interconnects LANs, different kinds of relays include repeaters, bridges,
Reliable multicast protocols - Reliable multicast protocols provide for reliable transmission of
reliable multicast protocol is the called Multicast Transport Protocol (MTP). This protocol
gives application programs guarantees of reliability. See also Multicast Transport Protocol
(MTP).
Request for Comment (RFC) - An official document used by the IETF to create standards for
the fact that it allows the end-stations to reserve bandwidth on the network. This protocol
supports requests for a specific quality of service (QoS) from the network for particular data
streams or flows.
Retention - Defined in the Multicast Transport Protocol to be one of the three fundamental
parameters that make up the transport's state (along with heartbeat and window). Retention is a
number of heartbeats, and though applied in several different circumstances, is primarily used
as the number of heartbeats a producing client must maintain buffered data should it need to
be retransmitted.
Reverse Address Resolution Protocol (RARP) - An Internet protocol that can be used by
RIP (Routing Information Protocol) - An early BSD UNIX routing protocol that has become
an industry standard
Part I. The Technology – May 25, 1998 - 445
Router - A device that connects two networks at the Network layer (Layer 3) of the OSI
model; operated like a bridge but also can choose routes through a network
Routing - In networking, routing is the process of moving a packet of data from source to
destination. A dedicated device called a router usually performs routing. Routing, a key feature
of the Internet, enables messages to pass from one computer to another and eventually reach
the target machine. Each intermediary computer performs routing by passing along the
message to the next computer. Part of this process involves analyzing a routing table to
RTSP session - A complete RTSP "transaction", e.g., the viewing of a movie. A session
typically consists of a client setting up a transport mechanism for the continuous media stream,
starting the stream with PLAY or RECORD, and closing the stream with TEARDOWN.
networks. This transport layer protocol is similar to TCP and together with IPX, provides
together in a single collision domain; hubs produce this type of configuration where only one
Simple Network Management Protocol (SNMP) - Allows a TCP/IP host running an SNMP
application to query other nodes for network-related statistics and error conditions. The other
hosts, which provide SNMP agents, respond to these queries and allow a single host to gather
Single Mode fiber - A type of fiber optic cable used for longer distances and higher speeds
single-line digital subscriber line (SDSL) - SDSL is HDSL over a single twisted pair.
planned for use with ATM in North America. Developed by Bellcore. Different types of
SONET run at different speeds, use different types of fiber, and operate over different
distances. There are both single mode and multimode fiber versions.
Part I. The Technology – May 25, 1998 - 447
spanning tree - An algorithm used to create a logical topology that connects all network
segments, and ensures that only one path exists between any two nodes. A spanning tree is
loop-free and is a subset of a network. Multicast routers construct a spanning tree from the
multicast source located at the root of the tree to all the members of the multicast group.
routing protocols assume that the multicast group members are sparsely distributed throughout
the network. The multicast group members could be distributed across many regions of the
Internet. There can be just as many multicast group members in sparse mode routing as there
can be in dense mode routing. Sparse-mode routing protocols include the Core Based Trees
(CBT) and Protocol-Independent Multicast - Sparse Mode (PIM-SM) protocols. See also
stream-oriented protocol - A type of protocol where data is organized as a stream of bytes and
uses a technique for transferring data such that it can be processed as a steady and continuous
stream. With streaming, a client can start displaying the data before the entire file has been
transmitted. If a client receives the data more quickly than required, saves the excess data in a
buffer. If the data doesn't come quickly enough, however, the presentation of the data is not
smooth.
Switch - A device that connects multiple network segments at the Data Link Layer (Layer 2)
of the OSI model. They operate more simply and at higher speeds than routers
448 An Overview of IPv4 and IPv6 – May 25, 1998 - Chapter 2
time division multiplexing (TDM) - A digital transmission method that combines signals from
multiple sources on a common path. This common path is divided into a number of time slots
and each signal or channel is assigned its own intermittent time slot, allowing the path to be
timed-token protocol - The rules defining how the target token rotation time is set, the length
of time a station can hold the token, and how the ring is initialized.
Token - A bit pattern consisting of a unique symbol sequence that circulates around the ring
following frame transmission. The token grants stations the right to transmit.
token passing - A method where each station, in turn, receives and passes on the right to use
Token Ring: - Developed by IBM, this 4 or 16 Mbps network uses a ring topology and a
Transmission Control Protocol (TCP) - The protocol at the Internet’s transport layer that
requiring that the sender and receiver exchange control information, or establish a connection
transport service access point (TSAP) - The address that uniquely defines a particular
instantiation of a service and formed by logically concatenating the node's NSAP with a
Tunneling - The practice of encapsulating a message from one protocol in another protocol
and using the second protocol to transverse a number of network hops. At the destination, the
encapsulation is stripped off and the original message is reintroduced to the network at its
destination.
twisted-pair - Telephone system cabling that consists of copper wires loosely twisted around
each other to help cancel out any induced noise in balanced circuits.
Unicast - The method of sending a packet or datagram to a single address. This type of point-
to-point transmission requires the source to send an individual copy of a message to each
Universal Coordinated Time (UCT) - The number of seconds since 00:00 01/01/1970
UTP - Unshielded twisted pair, one or more cable pairs surrounded by insulation. UTP is
variable MTU - A link that does not have a well-defined MTU, such as an IEEE 802.5 token
ring link. Many links; for example Ethernet links, have a standard MTU defined by the link-
layer protocol or by the specific document describing how to run IP over the link layer.
very high bit-rate digital subscriber line (VDSL) - A technology in which modems enable
access and communications over twisted-pair lines at a data rate from 1.54 Mbps to 52 Mbps.
VDSL has a maximum operating range from 1,000 feet to 4,500 feet on 24-gauge wire.
Window - One of the fundamental elements of the transport's state that can be controlled to
affect the quality of service provided to the client. It represents the number of user data
carrying packets that may be multicast into the web during a heartbeat by a single member
Part I. The Technology – May 25, 1998 - 451
XDSL - The "x" represents the various forms of digital subscriber line (DSL) technologies: