Unit 5
Unit 5
Unit-5
2
Digital Subscriber Line (DSL)
● Uses a newer technology that used the existing telecommunications networks such as the local loop
telephone line.
● Is an asymmetric communication technology designed for residential users; it is not suitable for
business.
● xDSL: where x can be replaced by A, V, H, or S
● The existing local loops can handle bandwidths up to 1.1 MHz
○ but, limitation because of distance between the residence and the switching office, size of cable
● ADSL is an adaptive technology. The system uses a date rate based on the condition of the local loop
line
3
● DMT
○ Modulation technique that has become standard for ADSL is called the discrete multi tone
technique (DMT)
4
● voice : channel 0 is reserved for voice
● Idle : channel 1 to 5 are not used; gap between voice and data communicaiton
● Upstream data and control : channels 6 to 30 (25channels); one channel for control
● Downstream data and control : channels 31 to 255(225 channels); 13.4 Mbps; one channel for
control
Source: Douglas E. Comer, Internetworking with TCP/IP, Principles, protocols, and architecture,Vol 1 5th Edition,2006
5
● Actual Bit Rate
6
Customer Site : ADSL Modem
7
Telephone Company Site : DSLAM
8
Other DSL Technologies
○ SDSL: Symmetric Digital Subscriber Line
■ up to 3.6 Km
■ using coaxial cable, fiber-optic, or twisted pair cable for short distances (300 to 1800
m)
■ using DMT with a bit rate of 50 to 55 Mbps downstream and 1.5 to 2.5 Mbps upstream
9
Communication in the traditional cable TV network is unidirectional.
○ video band
■ 54 to 550 MHz
○ Data rate
○ Modulation
■ upstream data band uses lower frequencies that are more susceptible to noise and
interference
○ Up to 2.7Mbits/s
○ Small deployments in operation (e.g. Manassas, Virginia 10MBits/s for $30.00 a month)
17
Frame Relay
18
Introducing Frame Relay
19
Frame Relay vs. X.25
● Frame Relay does not have the sequencing, windowing, and retransmission
mechanisms that are used by X.25.
● Without the overhead, the streamlined operation of Frame Relay
outperforms X.25.
● Typical speeds range from 1.5 Mbps to 12 Mbps, although higher speeds are
possible. (Up to 45 Mbps)
● The network providing the Frame Relay service can be either a
carrier-provided public network or a privately owned network.
● Because it was designed to operate on high-quality digital lines, Frame
Relay provides no error recovery mechanism.
● If there is an error in a frame it is discarded without notification. 20
Introducing Frame Relay
Access circuits
● The connection through the Frame Relay network between two DTEs is
called a virtual circuit (VC).
● Switched Virtual Circuits (SVCs) are Virtual circuits may be established
dynamically by sending signaling messages to the network.
○ PVC are VCs that have been preconfigured by the carrier are used. 24
Frame Relay operation - SVC
An SVC between the same two A PVC between the same two
DTEs may change. DTEs will always be the same.
● SVCs are temporary connections that are only used when there is
sporadic data transfer between DTE devices across the Frame Relay
network.
● Because they are temporary, SVC connections require call setup and
termination for each connection supported by Cisco IOS Release 11.2 or
later.
● Before implementing these temporary connections, determine whether the
service carrier supports SVCs since many Frame Relay providers only
support PVCs. 25
Access Circuits and Cost Savings
26
DLCI
• Inside the cloud, your Frame Relay provider sets up the DLCI
numbers to be used by the routers for establishing PVCs. 28
Frame Relay bandwidth
and flowThe
control
first thing we need to do is
become familiar with some of
the terminology.
● Local access rate – This is the clock speed or port speed of the connection
or local loop to the Frame Relay cloud.
● Committed burst (Bc) – The maximum number of bits that the switch agrees to transfer during
any Tc.
○ The higher the Bc-to-CIR ratio, the longer the switch can handle a sustained burst.
○ The DE (Discard Eligibility) bit is set on the traffic that was received after the CIR was
met. (coming)
○ (FYI) For example, if the Tc is 2 seconds and the CIR is 32 kbps, the Bc is 64 kbps.
● Excess burst (Be) – This is the maximum number of uncommitted bits that
the Frame Relay switch attempts to transfer beyond the CIR.
○ In the event the provider sets the EIR to be lower than the local 31
access rate, all frames beyond that maximum can be discarded
Frame Relay bandwidth and
flow control
32
• Forward Explicit Congestion Notification (FECN) – When a Frame
Relay switch recognizes congestion in the network, it sends an FECN
packet to the destination device.
• This indicates that congestion has occurred.
• Backward Explicit Congestion Notification (BECN) – When a Frame
Relay switch recognizes congestion in the network, it sends a BECN
packet to the source router.
• This instructs the router to reduce the rate at which it is sending
packets.
• With Cisco IOS Release 11.2 or later, Cisco routers can respond
to BECN notifications.
33
Frame Relay bandwidth
and flow control
● Discard eligibility (DE) bit – When the router or switch detects network
congestion, it can mark the packet "Discard Eligible".
○ The DE bit is set on the traffic that was received after the CIR was
met.
● Several factors determine the rate at which a customer can send data on a Frame Relay network.
○ Foremost in limiting the maximum transmission rate is the capacity of the local loop to the
provider.
■ If the local loop is a T1, no more than 1.544 Mbps can be sent.
■ In Frame Relay terminology, the speed of the local loop is called the local access rate.
○ Providers use the CIR parameter to provision network resources and regulate usage.
■ For example, a company with a T1 connection to the packet-switched network (PSN) may agree
to a CIR of 768 Kbps.
■ This means that the provider guarantees 768 Kbps of bandwidth to the customer’s link at all
times.
35
Frame Relay bandwidth
● Typically, the higher the CIR, the higher the cost of service.
● Customers can choose the CIR that is most appropriate to their bandwidth
needs, as long as the CIR is less than or equal to the local access rate.
● If the CIR of the customer is less than the local access rate, the customer
and provider agree on whether bursting above the CIR is allowed.
● If the local access rate is T1 or 1.544 Mbps, and the CIR is 768 Kbps, half
of the potential bandwidth (as determined by the local access rate) remains
available.
36
Frame Relay bandwidth
● Either a router or a Frame Relay switch tags each frame that is transmitted
beyond the CIR as eligible to be discarded.
● When a frame is tagged DE, a single bit in the Frame Relay frame is set to
1.
● This bit is known as the discard eligible (DE) bit.
● The Frame Relay specification also includes a protocol for congestion
notification.
● This mechanism relies on the FECN/ BECN bits in the Q.922 header of the
frame.
● The provider’s switches or the customer’s routers can selectively set the
DE bit in frames.
● These frames will be the first to be dropped when congestion occurs.
38
LMI – Local Management Interface
○ A multicast mechanism, which provides the network server (router) with its
local DLCI.
○ The multicast addressing, which can give DLCIs global rather than local
significance in Frame Relay networks (not common).
● In Cisco IOS releases prior to 11.2, the Frame Relay interface must be
manually configured to use the correct LMI type, which is furnished by the
service provider.
● If using Cisco IOS Release 11.2 or later, the router attempts to
automatically detect the type of LMI used by the provider switch.
● This automatic detection process is called LMI autosensing.
● No matter which LMI type is used, when LMI autosense is active, it sends
out a full status request to the provider switch.
41
LMI
● The Frame Relay switch uses LMI to report the status of configured PVCs.
● The three possible PVC states are as follows:
○ Active state – Indicates that the connection is active and that routers
can exchange data.
● Manual
4
My IP is 1.1.1.2
● Once the router learns from the switch about available PVCs and their
corresponding DLCIs, the router can send an Inverse ARP request to the
other end of the PVC. (unless statically mapped – later)
● For each supported and configured protocol on the interface, the router
sends an Inverse ARP request for each DLCI. (unless statically mapped)
● In effect, the Inverse ARP request asks the remote station for its Layer 3
address.
● At the same time, it provides the remote system with the Layer 3 address of
the local system.
● The return information from the Inverse ARP is then used to build the
Frame Relay map.
44
Inverse ARP – Knows DLCI, needs remote IP
● Inverse Address Resolution Protocol (Inverse ARP) was developed to provide a mechanism for dynamic
DLCI to Layer 3 address maps.
● Inverse ARP works much the same way Address Resolution Protocol (ARP) works on a LAN.
● However, with ARP, the device knows the Layer 3 IP address and needs to know the remote data link
MAC address.
● With Inverse ARP, the router knows the Layer 2 address which is the DLCI, but needs to know the
remote Layer 3 IP address.
45
Configuring Frame Relay maps
Router(config-if)#frame-relay map protocol
protocol-address dlci [broadcast] [ietf | cisco]
● If the environment does not support LMI autosensing and Inverse ARP, a
Frame Relay map must be manually configured.
● Use the frame-relay map command to configure static address
mapping.
● Once a static map for a given DLCI is configured, Inverse ARP is disabled
on that DLCI.
● The broadcast keyword is commonly used with the frame-relay
map command.
● The broadcast keyword:
FYI ONLY
● The possible values of the status field are as follows:
● 0x0 – Added/inactive means that the switch has this DLCI programmed but for
some reason it is not usable. The reason could possibly be the other end of the
PVC is down.
● 0x2 – Added/active means the Frame Relay switch has the DLCI and everything
is operational.
● 0x4 – Deleted means that the Frame Relay switch does not have this DLCI
programmed for the router, but that it was programmed at some point in the past.
This could also be caused by the DLCIs being reversed on the router, or by the
PVC being deleted by the service provider in the Frame Relay cloud. 47
Frame Relay Topologies
48
NBMA – Non Broadcast
Multiple
Frames betweenAccess
two routers are only seen
by those two devices (non broadcast).
Similar to a LAN, multiple computers have
access to the same network and potentially
to each other (multiple access).
● A star topology, also known as a hub and spoke configuration, is the most
popular Frame Relay network topology because it is the most
cost-effective.
● In this topology, remote sites are connected to a central site that generally
provides a service or application.
● This is the least expensive topology because it requires the fewest PVCs.
● In this example, the central router provides a multipoint connection,
because it is typically using a single interface to interconnect multiple
PVCs.
50
Full Mesh
Full Mesh Topology
Number of Number of
Connections PVCs
----------------- --------------
2 1
4 6
6 15
8 28
10 45
● In a full mesh topology, all routers have PVCs to all other destinations.
● This method, although more costly than hub and spoke, provides direct
connections from each site to all other sites and allows for redundancy.
● For example, when one link goes down, a router at site A can reroute traffic
through site C.
● As the number of nodes in the full mesh topology increases, the topology
becomes increasingly more expensive.
● The formula to calculate the total number of PVCs with a fully meshed WAN is
[n(n - 1)]/2, where n is the number of nodes.
51
VPN (Virtual Private Network)
VPN (Virtual Private Network)
● VPN is a network that is private but virtual.
● It is private because it guarantees privacy inside the organization.
● It is virtual because it does not use real private WANs; the network is physically
public but virtually private.
● Routers R1 and R2 use VPN
technology to guarantee privacy for the organization.
Virtual private network
54
TRANSPORT LAYER SECURITY
Two protocols are dominant today for providing security
at the transport layer: the Secure Sockets Layer (SSL)
protocol and the Transport Layer Security (TLS) protocol.
The latter is actually an IETF version of the former. We
discuss SSL in this section; TLS is very similar. Figure
shows the position of SSL and TLS in the Internet model.
55
Location of SSL and TSL in the Internet mode
56
SSL services
● SSL provides several services on data received from the
application layer.
❑ Fragmentation. First, SSL divides the data into blocks of
214 bytes or less.
❑ Compression. Each fragment of data is compressed using
one of the lossless compression methods negotiated between the
client and server. This service is optional.
❑ Message Integrity. To preserve the integrity of data, SSL
uses a keyed-hash function to create a MAC (see Chapter 29).
Key Exchange Algorithms
● To exchange an authenticated and confidential message, the client and the server each
need a set of cryptographic secrets.
● However, to create these secrets, one pre-master secret must be established between
the two parties.
● SSL defines several key-exchange
methods to establish this pre-master secret.
Key Exchange Algorithms
● Encryption/Decryption Algorithms
The client and server also need to agree to a set of encryption
and decryption algorithms.
Hash Algorithms
SSL uses hash algorithms to provide message integrity (message
authentication). Several hash algorithms have also been defined
for this purpose.
Cipher Suite
The combination of key exchange, hash, and encryption
Cryptographic Parameter Generation
● To achieve message integrity and confidentiality, SSL needs six cryptographic
secrets, four keys and two IVs (initialization vectors).
● The client needs one key for message authentication, one key for encryption, and one
IV as original block in calculation.
● The server needs the same. SSL requires that the keys for one direction be different
from
those for the other direction.
Cryptographic Parameter Generation
● 1. The client and server exchange two random numbers; one is created by the
client and the other by the server
● 2. The client and server exchange one pre-master secret using one of the
predefined key- exchange algorithms.
3. A 48-byte master secret is created from the pre-master secret by applying two
hash functions (SHA-1 and MD5)
Cryptographic Parameter Generation
● 4. The master secret is used to create variable-length key material by applying the
same set of hash functions and prepending with different constants, as shown in
Figure The module is repeated until key material of adequate size is created.
● 5. Six different secrets are extracted from the key material, as shown in Figure
Calculation of maser key from pre-master secret
63
Calculation of the key materials from master secret
64
Extraction of cryptographic secrets from key materials
65
Sessions and Connections
● A session is an association between a
client and a server
● A session can consist of many connections. A connection between two parties can
be terminated and reestablished within the same session.
A session can consist of many connections.
● A connection between two parties can
be terminated and reestablished within the same session.
Handshake Protocol
● Handshake Protocol uses messages to negotiate the cipher suite, to authenticate
the server to the client and the client to the server if needed, and to exchange
information for building the cryptographic secrets.
Four SSL protocols
68
Handshake protocol
69
Phase I: Establishing Security Capability
● In Phase I, the client and the server announce their security capabilities and choose
those that are convenient for both.
● In this phase, a session ID is established and the cipher suite is chosen. The parties
agree upon a
particular compression method.
● Finally, two random numbers are selected, one by the
client and one by the server, to be used for creating a master secret as we saw before.
Note
After Phase I, the client and server know
the version of SSL, the cryptographic
algorithms, the compression method, and
the two random numbers for key
generation.
71
Phase II: Server Key Exchange and Authentication
● In Phase II, the server authenticates itself if needed.
● The sender may send its certificate, its public key, and may also request certificates
from the client.
Note
After Phase II, the server is authenticated to
the client, and
the client knows the public
key of the server if required.
73
Phase III is designed to authenticate the client.
● Phase III is designed to authenticate the client.
Note
After Phase III, The client is authenticated
for the serve, and
both the client and the server
know the pre-master secret.
75
Phase IV: Finalizing and Finishing
● In Phase IV, the client and server send messages to change cipher specification and to
finish the handshaking protocol
Record Protocol
● The Record Protocol carries messages from the
upper layer (Handshake Protocol,ChangeCipherSpec
Protocol, Alert Protocol, or application layer).
● The message is fragmented and optionally
compressed; a MAC is added to the compressed
message using the negotiated hash algorithm.
● The compressed fragment and the MAC are
encrypted using the negotiated encryption algorithm.
Processing done by the record protocol
78
Asynchronous Transfer Mode
ATM
School of Computing - SRMIST Kattankulathur Campus
ATM Features
● Cell relay protocol.
80
ATM
● Destined to replace most existing WAN technologies
● The standard-sized cells allow switching mechanisms to achieve faster switching rates
● Rates of 155 – 622 Mbps are achieved with theoretical rates up to 1.2 Gbps
Video
A/D … Compression AAL
cells
picture compressed
frames frames
Data AAL
Bursty variable-length cells
packets
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
85
Asynchronous Transfer Mode (ATM)
Voice
Data
MUX
packet
s Wasted bandwidth
Image
s
TDM
4 3 2 1 4 3 2 1 4 3 2 1
ATM `
4 3 1 3 2 2 1
86
ATM
● ATM standard (defined by CCITT) is widely accepted by common carriers as mode of operation for
5 Bytes 48 Bytes
Header Payload
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
87
ATM Conceptual Model
Assumptions
1. ATM network will be organized as a hierarchy.
Connections between provided networks are made through NNI (Network-Network Interface).
A connection (an ATM channel) must be established before any cells are sent.
88
Private ATM
Private network
UNI
X X
Private NI
NNI X l icU Public ATM
b
Pu network A
X X
NNI
Public X
UNI B-ICI Public ATM
network B
X
Public
X X UNI
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
89
ATM Connections
● two levels of ATM connections:
90
ATM Virtual Connections
Virtual Paths
Physical Link
Virtual Channels
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
91
ATM Conceptual Model
Assumptions (cont.)
3. Vast majority of ATM networks will run on optical fiber networks with extremely low error rates .
• This decision lead to a significant decision – to prohibit cell reordering in ATM networks.
92
UNI Cell Format
GFC (4 bits) VPI (4 bits)
VPI (4 bits) VCI (4 bits)
ATM cell VCI (8 bits)
header VCI (4 bits) PT (3 bits) CLP
(1 bit)
HEC (8 bits)
Payload
(48 bytes)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
93
● GFC(Generic Flow Label):
○ primary function of this header is the physical access control, it is often used to reduce cell jitters in CBR
services, assign fair capacity for VBR services, and tocontrol traffic for VBR flows.
○ VPI/VCI-identification numbers, so that the cells belonging to the same connection can be distinguished
○ PT-Payload TYpe
○ HEC(Header Error Control) is a CRC byte for the cell header field and is used for sensing and correcting cell
errors and in delineating the cell header.
ATM Cell Switching
1 1
Switch voice 67
…
N video 67 2
5 video 25 voice 32 25 75
32 1 67 data 39 3
32 3 39
6 data 32 video 61
…
61 2 67
…
N video 75 N
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
95
VP3 a
VP
a 5
b
c ATM ATM ATM ATM b
Sw DCC Sw Sw
c
d 1 2
e 3
VP
2 VP
1 ATM d
Sw = switch Sw
e
4
Digital Cross Connect
Only switches virtual paths
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
96
ATM Protocol Architecture
● ATM Adaptation Layer (AAL) – the protocol for packaging data into cells is collectively referred to as
AAL.
● Must efficiently package higher level data such as voice samples, video frames and datagram packets
97
ATM Network Architecture
Plane management
Control plane User plane
Layer management
Higher layers Higher layers
ATM layer
Physical layer
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
99
User User
information information
AAL AAL
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
100
● AAL-How to break application messages to cells.
○ Transmission/Swiching/Reception
○ Sequential delivery
Original ATM Architecture
● CCITT envisioned four classes of applications (A-D) requiring four distinct adaptation layers (1-4)
102
ATM Architecture
An AAL is further divided into:
The Convergence Sublayer (CS) manages the flow of data to and from SAR sublayer.
The Segmentation and Reassembly Sublayer (SAR) breaks data into cells at the sender and
reassembles
cells into larger data units at the receiver.
103
ATM layer
Transmission
convergence
sublayer
Physical layer
Physical medium
dependent
sublayer
Physical
medium
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
104
Original ATM Architecture
● The AAL interface was initially defined as classes A-D with SAP (service access points) for AAL1-4.
● AAL3 and AAL4 were so similar that they were merged into AAL3/4.
● The data communications community concluded that AAL3/4 was not suitable for data communications
applications. They pushed for standardization of AAL5 (also referred to as SEAL – the Simple and
Efficient Adaptation Layer).
105
Revised ATM Service Categories
Class Description Example
106
QoS, PVC, and SVC
● Quality of Service ( QoS) requirements are handled at connection time and viewed as part of signaling.
set up and released on demand by the end user via signaling procedures.
107
AAL 1 Payload
(b) CS PDU with pointer in structured data transfer
47 Bytes
AAL 1
Pointer
1 Byte 46 Bytes
optional
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
108
18CSC302J- School of Computing (Odd sem 2020)
AAL 1
Higher layer User data stream
b1 b2 b3 …
Convergence CS PDUs
sublayer 47 47 47
SAR PDUs
SAR sublayer H H H
1 47 1 47 1 47
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
109
18CSC302J- School of Computing (Odd sem 2020)
AAL 3/4
1 1 2 1 - 65,535 0-3 1 1 2
(bytes) (bytes) (bytes)
(b) SAR PDU format
Header Trailer
(2 bytes) (2 bytes)
ST SN MID SAR - PDU Payload LI CRC
2 4 10 44 6 10
(bits) (bytes) (bits)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
111
18CSC302J- School of Computing (Odd sem 2020)
AAL 3/4
Higher layer Information User message
Service specific
convergence Assume null
sublayer
Common part H Information PAD T Pad message to
convergence 4 4 multiple of 4 bytes.
sublayer Add header and trailer.
ATM
Head 48 bytes of Data
er 1-bit end-of-datagram field
(PTI)
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies
113
18CSC302J- School of Computing (Odd sem 2020)
AAL 5
Information
Higher layer
Service specific
convergence Assume null
sublayer
Common part Information PAD T
convergence
sublayer
SAR sublayer …
48 48 48
(0) (0) (1)
ATM layer …
PTI = 1
PTI = 0 PTI = 0
Source: Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies 114
18CSC302J- School of Computing (Odd sem 2020)
Thank you
115
18CSC302J- School of Computing (Odd sem 2020)
Point to Point Protocol
Unit-5
A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection.
117
18CSC302J- School of Computing (Odd sem 2020)
PPP – design principles
● Link configuration
● Error detection
● Authentication
● Extensibility
118
18CSC302J- School of Computing (Odd sem 2020)
PPP – a protocol
119
18CSC302J- School of Computing (Odd sem 2020)
PPP state machine
PPP STATES
fail
● Dead
Dead Establish
up
● Establish
down opened
● Authenticate
fail Authentica
terminate
te
● Network
closing Success /
Networ ● terminate
None
k
120
18CSC302J- School of Computing (Odd sem 2020)
PPP state machine
1.DEAD:It means that the link is not being used .
2.ESTBLISHING:-When one of the end machine starts the communication, the connection goes into the
establishing state.
3.AUTHENATICATING:-The user sends the authenticate request packet & includes the user name &
password.
5.TERMINATING:-The users sends the terminate the link. With the reception of the terminate.
121
18CSC302J- School of Computing (Odd sem 2020)
PPP – Frame Format
122
18CSC302J- School of Computing (Odd sem 2020)
PPP – Frame Format
1. Flag field. The flag field identifies the boundaries of a PPP frame. Its value is 01111110.
2. Address field. Because PPP is used for a point-to-point connection, it uses the broadcast address used in
most LANs, 11111111, to avoid a data link address in the protocol.
3. Control field. The control field is assigned the value 11000000 to show that, as inmost LANs, the frame
has no sequence number; each frame is independent.
4. Protocol field. The protocol field defines the type of data being carried in the datafield: user data or
other information.
5. Data field. This field carries either user data or other information.
6. FCS. The frame check sequence field is simply a 2-byte or 4-byte CRC used for
error detection.
123
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)
● Purposes
○ Link establishment
○ Link maintenance
○ Link termination
● Optional operations
○ Authentication
124
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)- Packets
● There are 3 classes of LCP packets:
○ Link configuration
configure-request, configure-ack,
configure-nak & configure-reject
○ Link termination
terminate-request & terminate-ack
○ Link monitoring
code-reject, protocol-reject, echo-request,
echo-reply & discard-request
125
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)- Packets Format
○ ID – request-response matching ID
126
18CSC302J- School of Computing (Odd sem 2020)
Link Control Protocol (LCP)- Options
● MRU determination
● Authentication Protocol
127
18CSC302J- School of Computing (Odd sem 2020)
Network Control Protocol(NCP)
● Purpose
128
18CSC302J- School of Computing (Odd sem 2020)
IPCP – IP Control Protocol
● Purpose
129
18CSC302J- School of Computing (Odd sem 2020)
IPCP – IP Control Protocol
PPP frame
(protocol)
130
18CSC302J- School of Computing (Odd sem 2020)
PPP – unsupported options
● Flow control
Any PPP frame sent that overflows the
receiver's buffer are lost
● Error correction
PPP includes only Frame Check
Sequence (CRC)
● Re-sequencing
PPP assumes all frames, sent and received,
retain their original intended order
131
18CSC302J- School of Computing (Odd sem 2020)
Tunneling & PPP
● Tunneling - definition
The process of running one network
protocol
on top of another.
Common use: VPN (Virtual Private
Network)
● Tunneling method
Extending the link between the HDLC
driver
and the rest of PPP over a separate
network
● PPP tunneling protocols
L2TP, L2F(Layer 2 Forwarding),
PPTP(Point-to-Point_Tunneling_Prot
ocol) & ethernet (PPPoE)
132
18CSC302J- School of Computing (Odd sem 2020)
HDLC
133
18CSC302J- School of Computing
Data link protocol
Defintion
HDLC
LAPX
LAPM LAPB LAPD LLC SDLC
(teletex
(v. 42) (x. 25) (ISDN) (LANs) (SNA)
)
LAPF
ESF MTP-2 LAPDm PPP
(frame-relay
(T1) (SS7) (GSM) (many)
)
● Exchange of Digital data between two devices some form of data link control
○ HDLC serves as a baseline from which virtually all other important data link control
protocols are derived
● HDLC
137
18CSC302J- School of Computing
High-level Data link control
● Basic Characteristics
● Unbalanced
○ Unbalanced configuration
○ Secondary may only transmit data in response to command (poll) from primary
○ Terminals as secondary
○ Balanced configuration
○ No polling overhead
○ Unbalanced configuration
○ rarely used
143
18CSC302J- School of Computing
Frame Structure
● Synchronous transmission
● 01111110
○ The transmitter inserts 0 bit after every sequence of five 1s with the exception of
flag fields
■ If 0, it is deleted
■ ofIfComputing
18CSC302J- School 1 and seventh bit is 0 (i.e., 10), accept as flag 146
Bit Stuffing
● Example with
possible errors
○ LSB of each octet indicates that it is the last octet (1) or not
(0)
● All ones (11111111) is broadcast
148
18CSC302J- School of Computing
Control Field
■ supplementary
18CSC302J- School of Computing
link control
149
Control Field Diagram
150
18CSC302J- School of Computing
Poll/Final Bit
● Command frame
1 2 3 4 5 6 7 8
•I,0,0
•I,1,0
•I,2,0,P
152
18CSC302J- School of Computing
S-frame
● Used for flow and error control
1 2 3 4 5 6 7 8
1 0 S P/F N(R)
1 2 3 4 5 6 7 8
1 1 M P/F M
Unnumbered
function bits
● Disconnect (DISC)
● Reset (RSET)
●
18CSC302J- School of Computing Test (TEST) 155
Information Field
● Variable length
● FCS
● Error detection
● 16 bit CRC
● Three phases
○ Initialization
○ Data transfer
○ Disconnect
161
What is MPLS?
Disadvantages of IP Routing
• It is a connectionless protocol, it does not directly
any support for quality of service
• Each router has to make independent forwarding
decisions based on the IP-address
• Large IP headers (at least 20bytes)
• Routing in Network Layer(Slower that Switching)
Motivation
IP
Layer 3
MPLS
ATM, Ethernet, FR, PPP
Layer 2
SDH, ODH,WDN,CSMA
Layer 1
Ingress
Egress
MPLS Characteristics
• It can support the traffic flows of various granularities
Label
• A label is an integer identifying a FEC (a flow)
• Labels are not globally or network - unique label
• Labels are unique only between nodes
• Labels change at each node as a packet traverses a path
• Labels can set manually or we can use label distribution
Label Format
Label EXP Stack bit(s) TTL
(20bits) (3bits) (8bits)
This field is very useful when there are multiple levels of MPLS labels.
TTL: Time to live - This field has the same meaning as that for an IP packe
Encapsulation
PPP Label Layer 2/Layer 3 Packet
PPP Header (Packet Header
over SONET/SDH )
ATM MPLS Cell Header GFC VPI VCI PTI CLP HEC DATA
Label
Label Distribution:
• MPLS does not specify a single method for label distribution
BGP has been enhanced to piggyback the label information
within the contents of the protocol
• RSVP has also been extended to support piggybacked
exchange of labels.
• IETF has also defined a new protocol known as the label
Distribution protocol (LDP) for explicit signalling and
management.
• Extensions to the base LDP protocol have also been defined
to support explicit routing based on QoS requirements
Label Edge Router – LER
• Resides at the edge of an MPLS Network and assigns
and removes the labels from the packets.
• Supports multiple ports connected to dissimilar networks
(such as frame relay, ATM, and Ethernet)
Position of LERs and LSRs
192.4/1 5 5 9 9 2 2 192.4/16
6
Label Label Remove Layer 2
Layer 2 Assign Label Transpor
Transpo init Swapping Swapping
t
rt label
IP1
IP1 #L1 IP1 #L2 IP1 #L3
IP2
192