Internet
Internet
Internet
Contents
• Overview of Internet
• History and Evolution of Internet
• Uses of Internet
• Internet Addresses
• Services of Internet
• Types of Internet connections
• Connecting Internet
Objectives
After completion of this module you will be able to know:
• What is Internet and how it works?
• History and Evolution of Internet
• Services of the Internet.
• Types of Internet connections
• Choose the best connection suitable for you.
• How to connect to the Internet
1.1 Overview of Internet
The Internet is a global computer network made up of smaller computer networks; it has
been called a "Network of Networks."
These smaller networks include:
Local Area Networks (like networked offices or computer labs, and campus-wide
networks)
Wide Area Networks (like city-wide networks)
State and Regional Networks (including regional service providers and others)
National and International Networks
There is no one inventor of the Internet. The Internet was created in the 1960s as a huge
network linking big university and government computers. The science behind the
Internet was invented during the Cold War, when the United States was in competition
against Russia for weapons and technology. So the Internet is actually pretty old--around
forty years. Much of Internet’s initial development was supported by American
governmental research and network development (beginning with the American military's
ARPANET in 1969).
In fact, email has been around since 1972! In 1989 that Tim Berners-Lee, a scientist at
the European Laboratory for Particle Physics in Geneva, proposed the World Wide Web.
Now Internet Service Providers (ISPs) offer Internet access to their clients, at costs
ranging from Rs 150/- per 6 months to hundreds of rupees per year, depending on the
types of service they offer.
1.2 What are the uses of the Internet?
There are three fundamental uses of the Internet:
Communication
Information Retrieval
Presentation of Information
1.2.1 Communication
The Internet is used both for one-to-one communications (email and real-time "chat"
programs) and one-to-many.
The computer name is a name given locally to identify a particular computer; it is, in
some cases, omitted from the address. The institution name is the name (or an
abbreviation) of the name of the school, company, or other institution housing the
computer. The domain name specifies either the type or the geographic location of the
computer.
1.3.2 Domain Names
There are several possible "domain" names, including some that identify the type of
institution, and some that identify a geographical location. They include:
edu educational institution
com commercial and profitable organizations
org non-profitable organizations
net Internet infrastructure and service providers
gov governmental agency/department
mil American military agency
int International organizations
us United States
in India
my Malaysia
ca Canada
jp Japan
biz Business
aero aeronautics
http://www.win.org/workshops/internet.shtml
The first part of the URL ("http://") identifies the type of information or protocol (in this
case, it is a hypertext document, available from a HyperText Transport Protocol (http)
server on the World Wide Web). The middle part ("www.win.org") is the basic address,
as described above. The final part ("/workshops/internet.shtml") identifies the directories
within which the document resides ("workshops"), as well as the exact name of the
document ("internet.shtml").
1.4 Internet Services
”Internet services” serve more sophisticated and multi-purpose purposes, and
increasingly make the Internet a truly useful information resource.
1.4.1 Email
It is the Internet's version of the postal service. Using the Internet, it provides the
ability to send a message, reply to a message, send a file created in another
program and/or even send the same message to a group of people.
Some benefits of Email are:
• Speed: A message can be sent from Chennai to Australia in a matter of seconds.
• Cost: Emails are cheap. You are usually only charged for the telephone call time
(local call rate) for sending the message into the Internet, and not the cost
associated with transferring the message across the Internet.
• Flexibility: It is easy to send duplicates of your messages to other people or
groups for the cost of a single message.
• Record keeping: Messages sent and received can be easily stored for future
reference.
In order to use Email, you will need Internet access arranged through an Internet
Service Provider (ISP), who will allocate you one or a number of Email accounts. To
be able to retrieve and send mail from these addresses, a user will need what is known
as Email client software and your ISP usually provides this although nowadays most
computers come with it pre-installed.
1.4.2 Mail Lists
These use email to support discussion groups on a wide range of specific subjects.
Once you are becoming a subscriber of a mailing list, you will receive lot of emails
related to the subject covered by the mailing list.
1.4.3 FTP
FTP was the original Internet mechanism for the storage and retrieval of
information. There are still many FTP Sites around the Internet, although many of them
have been melded into the World Wide Web. In computer science, FTP stands for "File
Transfer Protocol," which is a way of transferring files between computers. A file can be
anything -- a spreadsheet, a word document, a song, or a picture. When someone says
"Please FTP me that file," for instance, that means "Please transfer that file from your
computer to mine." To FTP, you usually need to download a special program, or
application. You also usually need a password to be able to access or send information to
someone else's computer.
1.4.4 Gopher
Gopher was developed at the University of Minnesota, primarily to support its
own Campus Wide Information Server (CWIS). It provides access to information
available either locally or elsewhere on the Internet by means of a simple series of
uniformly designed menus.
1.4.5 Instant Messaging (IM)
IM is a way for you to communicate instantly with your friends over the Internet.
That might not sound so different to email. Have you ever noticed how
cumbersome it is to have a brief conversation via email? You have to click Reply
to each message, then find the right spot in the message to type something new,
then send it. Then you have to wait for the next message to arrive! IM lets you to
have a conversation almost as naturally as on the phone or face to face, by typing
messages into a window shared between you and your friend's screens.
Another difference between IM and email is that with IM you can see your
friends' presence, that is, whether they are actually on-line at the same time as you.
This lets you send messages truly instantly, instead of sending off a mail and
having to wait for your friend to check their mailbox. An IM message pops up on
the other person's screen as soon as you send it. Of course, if you'd rather not be
interrupted, you can change your own presence so others will know not to disturb
you.
There are lots of other fun and useful IM features you can explore, like group
chats, file transfers, voice calls, video conferencing and emoticons that reflect
your mood.
1.4.6 IRC
IRC stands for "Internet Relay Chat". It has been used in many countries around
the world. IRC is a multi-user chat system, where people meet on "channels"
(rooms, virtual places, usually with a certain topic of conversation) to talk in
groups, or privately. There is no restriction to the number of people that can
participate in a given discussion, or the number of channels that can be formed on
IRC.
1.4.7 Newsgroups
The Internet has a place where we can gather, question, and discuss our
experiences within a wide variety of topics. It's called Usenet News. Some users
also call it Net News.
Think of Usenet News as a giant, worldwide bulletin board. Anyone can freely
post something on this bulletin board. Everyone else can read the posted items
and add their own items. These voluntary contributions and free exchange of
information are the foundation of the Internet. Usenet News allows people on the
Internet to share their opinions and experiences, openly and freely, on a level
playing field. No one has priority or seniority over anyone else. Usenet News
gives everyone an equal opportunity to participate in the discussions.
When you send an e-mail message, the only people who can read it are the
recipients (for the most part). When you post an article on Usenet News, every
person on the Internet could read it and respond to it. Not that they ever would,
but they could. That's a lot of people and a lot of opinions, and only a few of them
come from true experience.
Imagine that no mail carrier actually comes to your home to pick and deliver mail.
Instead, every time you want to conduct postal business, you go to the post office.
This resembles a shell account: The computer that connects you to the Internet is
remote, and every time you want to do something on the Internet you must open a
terminal, or telnet, session to that computer. PPP, on the other hand, is like home
delivery: The Internet comes right to your doorstep, and your computer is literally
placed on the Internet by the machine at your ISP that you connect to.
Under Microsoft Windows, you use hyperterminal to access a shell account and
Dial-Up Networking to access a PPP account. Under Linux, you can choose from
among several programs that let you access a shell account. The most commonly
used programs are minicom and seyon. To access a PPP account under Linux, you
use the PPP daemon, pppd.
If you are one of the first users to connect to the Internet through a particular
cable channel by using Cable Modem Internet connection, then you may have
nearly the entire bandwidth of the channel available for your use. As new users,
especially heavy-access users, are connected to the channel, you will have to
share that bandwidth, and may see your performance degrade as a result. It is
possible that, in times of heavy usage with many connected users, performance
will be far below the theoretical maximums. The good news is that this particular
performance issue can be resolved by the cable company adding a new channel
and splitting the base of users.
Another benefit of the Cable Modem for Internet access is that, unlike ADSL, its
performance doesn't depend on distance from the central cable office.
As the Internet becomes increasingly popular with every day that passes, it is now
considered as one of the best ways to do business (e-commerce), network (by
email), and build partnerships (on-line collaboration).
It is arguably, some would say, the most efficient way of gathering information
for a wide range of business uses and to interact with customers. One of the main
issues today is what is the best way to connect to and use the Internet to its full
potential with a view to speed and reliability?
Unfortunately, because of the poor quality of the existing telephone network that
connects us to the Internet, the speed at which information (web pages, images etc)
appears on your screen is slow compared to the latest technology available.
Ultimately, DSL (see below) will be the solution that will provide us all with a
connection up to ten times faster than the speed at which information arrives to
you with a regular modem.
As new technology becomes available almost every week, the awareness of the
difference between the performance (speed), costs and availability is still
unknown to many people and consequently we face problems deciding which
connection is best for our business needs.
The PC Modem is the standard way of connecting to the Internet but is now the
slowest. The fastest type of standard modem is 56kbps, these are included as
standard with all new PC's; but if you do not have one they can be bought from
around £15-20 upwards.
If you are currently using a modem below 56k (which is unlikely) then the
difference in speed will be very noticeable. There is nothing negative about using
standard PC modems but the speed may be a crucial factor if time is valuable to
your business or if downloading large or numerous files (images, emails, etc) is
what you require.
This service requires you to remove your existing modem (if you have one) and
replace it with an ISDN card that can be found from most large PC stores.
Cable offers greater speeds but has the initial problem of availability. Just like
Cable TV, you can only receive the service if you live within a cable operator's
franchise area. Should you find that you are one of the 'chosen few' you may
consider this over ADSL (see below) because of the cheaper operating costs;
although you should check carefully because prices are always changing.
In order to use cable you will need two things: A cable modem and a Network
Interface Card (Sometimes referred to as NIC's).
You do have to bear in mind the future and consider the following: Once all
subscribers in your area have all been connected to the Cable Modem connection,
the speed of the service will run at slower rates (kbps). This is because the amount
of information that the Cable can carry at one time is shared with all those
connected to it. However, you could also consider that there may be further
advances in the technology to change this.
Using such a connection will involve extra hardware such as a box that fits to
your wall that you plug a USB modem (also needed) into which will then connect
to your computer.
When you connect to ADSL you also get a new phone line, which can be
beneficial to many small businesses. The use of this line does not affect the ADSL
connection either.
This service was released in early 2004 -- aimed at businesses -- allowing users to
enjoy the same uploading (sending) speeds as it was capable of downloading
(receiving).
This service is beneficial to businesses that frequently send large files via the
internet: the current connection may be causing the network to suffer huge strain
when transporting such files.
Subscribers can sign up for speeds varying from 256kbps to 2Mbps, depending on
preference.
This service is much more expensive than ADSL broadband and should only be
considered if there is an instant need for the service.
If you are accessing the Internet outside of a LAN environment, you will need a
modem that will connect you with other computers and interpret the data being
sent back and forth. Any modem that is compatible with your computer will do,
though the higher the kilobits per second (kbps) rate of your modem, the faster it
will transmit data. Modem speed is an important consideration when accessing
sites on the Web that contain lots of digitized data. If you are looking to purchase
a modem, buy the fastest model you can afford.
You must also have access to a live telephone line. Most modems accept the same
jacks as do ordinary household telephones, allowing you to connect your modem
to a wall jack using standard phone cord. Some cable TV providers have begun
offering Internet connections via cable. Such connections provide much faster
transmission speeds than standard phone lines, though you will need a special
modem that allows you to link your computer with the cable. If you are interested
in a cable Internet connection, contact your local cable operator to see if the
service is available in your area.
You have to purchase ADSL modem/router if you are going for ADSL Internet
connection.
You can also connect to the Internet through a LAN with Internet access. If you
are unsure as to the capacities of your LAN to do this, contact your site's systems
administrator.
To make your connection complete, you will need connection software that
allows your computer to dial into an Internet access provider, establish an account,
and work with the data in a straightforward manner. Many access providers will
give you software that will allow you to access their systems using an all-in-one
custom interface. Some software are bundles with Operating System also. Others
may give you a collection of separate software packages that can be used together.
But whatever software they provide, be sure that it is compatible with your
computer and operating system before attempting to use it.
1.8.4 Plug-ins
The Netscape Navigator, Mozilla Firefox and Microsoft Internet Explorer
browsers allow for the use of plug-ins, or extra software applications that run as if
they were an integral part of the browser.
Browsers also use helper applications that, while not as integral as plug-ins,
enhance the browser's capabilities by launching when needed. Helper applications
allow your browser to play sound and video files, display animation and other
graphic formats, or access special Internet features such as TELNET. Most Web
sites that require the use of helper applications will provide links to sites where
you can download the necessary software.
Chapter 2
Objectives
After completion of this module you will be able to know:
• Types of Internet connections offered by BSNL
• Different tariff for different Internet connections
Leased line Enjoy round the clock internet connectivity at speeds varying from 64
access Kbps to 45 Mbps. various plans are available to suit different needs.
ISDN dial backup packages for Internet Leased Line Customers are
also available.
Direct Internet BSNL also provides DIAS in selected cities of the Country. The DIAS
Access (DIAS) offers a wire-line solution for high speed symmetrical Internet access
on the existing telephone lines. It provides an "always on" internet
access that is permanently available at customer's premises. DIAS
combines voice and internet data packets on a single twisted pair wire
at subscriber premises that means you can use telephone and surf
internet at the same time.
CLI based dial up internet service is also available for ISDN customers
now. The access no. of this service is '172223'
BROADBAND Broadband service is based on DSL technology (on the same copper
connection cable that is used for connecting telephone). This provides high speed
internet connectivity upto 8Mbps. This is always - on internet access
service with speed ranging from 256Kbps to 8 Mbps.
Tariff for the DIAS will be as detailed below (applicable from 01.06.2005):
Plan-0
Plan-I Plan-II Plan-III
(Starter)
Activation Charges (non refundable) Rs.500 Rs. 500 Rs.500 Rs. 500
Security Deposit Nil Nil Nil Nil
Monthly Rental Per user Rs.300 Rs.500 Rs.900 Rs. 3000
Free Usages per month 0.5 GB 1.0 GB 2.0 GB Unlimited
Additional Usages charges per MB Rs.2 Rs.2 Rs.2 N.A
• The DIAS services shall be offered to the PSTN subscribers of BSNL, on the
same copper pair as is being used for their DELs at present.
• In case of disconnection of BSNL PSTN connection this DIAS connection is also
to be surrendered. In case of disconnection of telephone for non-payment etc.,
DIAS facility should also be disconnected.
• This tariff includes internet usage charges. The subscriber need not pay any
additional amount for
(i) PSTN Dialup Access for internet
(ii) Port charges for Internet Leased Line.
• This tariff is for connection of subscribers to Internet nodes of BSNL.
• Wherever it is not technically feasible to measure the usage, the present tariff will
remain applicable. However, whenever it will be technically possible to apply
usages based tariff, subscribers of DIAS should be intimated well in time by
giving time period of one month for switchover from existing tariff to the tariff
based on usage as above.
• This tariff will be reviewed after six months.
2.2.2 Tariff for Account free Internet Dial up access based on CLI
• Usage charges for Internet access through BSNL's sancharnet: 10 paise per
minute
Note: The subscribers will be charged at these usage charge over and
above normal PSTN dial up charges.
• The tariff of CLI service for ISDN (with effect from 1st September 2005):
The uniform tariff shall be applicable for all new customers. All new connection shall be
provided as per the tariff applicable on the date of new connection/renewal. All
instructions issued from time to time by BSNL shall remain applicable.
PSTN Dialup Access - Limited Access
Free access from 1100 PM to 0800 AM on Weekdays and for full day on Sunday and
National Holidays
S.N. Brand Name Denomination Hrs Validity Charges
1. Corporate 1000 2 yr 4500
2. Gold Pass 500 2 yr 2300
3. Silver Pass 200 2 yr 1000
4. Executive 100 2 yr 500
5. Regular 50 1 yr 250
6. Temporary 25 6 months 150
ISDN Dialup Access at 64 kbps - Limited Access
S.N. Brand Name Denomination Hrs Validity Charges
1. Corporate 1000 2 yr 8000
2. Professional 500 2 yr 4500
3. Personal 100 2 yr 1000
ISDN Dialup Access at 128 kbps - Limited Access
S.N. Brand Name Denomination Hrs Validity Charges
1. Corporate 1000 2 yr 16000
2. Professional 500 2 yr 9000
3. Personal 100 2 yr 2000
• Service Tax as applicable shall be extra
• One User ID and e-mail ID per package except for Corporate Package
where it is 2.
• Simultaneous logins per user ID shall be 2.
• E-mail space per e-mail ID shall be 4 Mb
• Free web space for user ID shall be 1 MB
• Free access between 2300 hrs to 0800 hrs on weekdays and for full day on
Sundays and National Holidays.
BSNL has decided to revise packages of ADSL Broadband Services 'DataOne' for Home and Business
users
with different Bandwidth (BW) options and download capacities with effect from 16-08-2005. The revise
offer and new packages are as under:
Only Modem Type I with One ethernet port will be available for sale / rental to customers for the
present.
G. Registration Fees:
A registration fee of Rs. 100 shall be charged which will be adjusted in the first demand note.
Installation charges of Rs. 250 are waived off for all new broadband customers between 16th August
2005 and 30th September 2005.
All other terms and conditions will remain same. The above tariff will be valid until 31/03/2006.
Chapter 3
MODEM
Contents
• MODEM fundamental
• Types of MODEMS
• Interface
• Connections
Objectives
After completion of this module, you will be able to know:
• MODEM fundamental
• The two types of MODEMS
• Different types of interfaces
• Different types of connections
3.1 MODEM fundamental
Acronym for MODulator / DEModulator which describes the method used to convert
digital data used by computers into analog signals used by the phones and then back into
digital data once received by the other computer.
The above pictures help represent a digital signal and an analog signal. All computer data
is stored and transmitted within the computer in digital format 1s and 0s. In order for this
data to be transmitted over analog phone lines the data must be transmitted into an analog
signal which is the noise you hear when connecting to another computer. Once the other
computer receives this signal it will then translate the signal back into its original digital
format.
Typical modems are referred to as an asynchronous device. Meaning that the device
transmits data in a intermittent stream of small packets. Once received the receiving
system then takes the data in the packets and reassembles it into a form the computer can
use.
The above chart represents how an asynchronous transmission would be transmitted over
a phone line. In asynchronous communication 1 byte (8 bits) is transferred within 1
packet which is equivalent to one character. However for the computer to receive this
information each packet must contain a Start and a Stop bit therefore the complete packet
would be 10 bits. An example of what the above chart would transmit is the word HI
which is equivalent to 2 bytes (16 bits).
3.2 Types of MODEMs
There are two types of modems used in all computers.
Internal: Modem which would be plugged into a slot located within or on the computer.
External: Modem which is located within a box and is hooked up externally to the
computer generally VIA the Serial Ports.
If a broadband connection is not available in your area, then modem can be purchased.
The details about modems are given below:
3.3.1 Standards
Originally when the 56k connection was introduced there was not a set standard between
two major modem manufactures causing there to be two different technologies, X2 and
KFlex. Each of these technologies allowed for a modem to connect to higher speeds
however only if the Internet Provider supported the technology. Because of the
difficulties and issues with these two different technologies one technology emerged out
of the two called V.90. This technology will allow users of any brand of modem to
connect at higher speeds.
Today all modems (purchased new) are V.90 and this is no longer a concern.
3.3.2 Interface
Interface can be an important when considering purchasing a modem. It is important that
your computer has the available connections and resources when purchasing a modem.
PCI / ISA modems are modems which are found in most computers today. These
modems are installed internally into the computer with an available connection on the
back of the modem for the phone line.
When purchasing this type of modem it is important that you verify your computer has
the available connection for this modem within the computer (PCI or ISA). In addition
verify that your computer has the available resources. You can sometimes see difficulties
installing a modem if a serial device such as a Serial mouse or Serial PDA is connected to
the computer.
A serial modem connects to the serial port located on the back of the computer. These
modems are generally easy to install however cost more then an internal modem as you
can pay additional money for the plastic cover.
When purchasing this type of modem it is important that you verify your computer has an
available serial connection on the back of the computer, devices such as a serial mouse
may already be utilizing your serial port. Some computers may have two serial ports, if
this is the case and only one serial port is currently being utilize, verify that the second
port can be enabled or is already enabled in CMOS.
Solution used with portable computers PC Card modems are fairly cheap and relatively
easy to install in the computer.
If a modem is already present in your portable computer however you wish to upgrade or
the internal modem has gone bad it is important that you verify the pre-existing modem
can be disabled before installing the new modem.
3.3.2.1 USB
A new solution USB allows a user to install up to 127 devices on the computer and is
available for PC and Mac. Before purchasing this solution verify that your computer has
a USB connection. If no USB connection is available an additional card will need to be
installed in the computer.
3.3.3 Connection
The connection can differ depending upon the type of modem purchased with the
computer.
Today all modems have a RJ-11 connection which is a standard phone connection on the
modem. If important to you, verify that the modem has two available RJ-11 connections.
One of these connections will connect the modem to the phone and the other can be used
for an office phone. This can be very useful for home or office computer that may need a
phone next to it.
When purchasing a PC Card modem the connection can be a very important factor
consideration. Below we have listed the pros and cons of each of these connection types.
3.3.3.3 Dongle
A commonly found solution for PC Card modems, however a very burdensome solution.
The Dongle is an additional card that connects from the PC Card to a small opening for a
RJ-11 connection. While a good thought we find that these connections get lost often.
The pro of this solution is a very sturdy connection and a solution that will allow only a
Type II slot to be used allowing and additional slot free for another card.
3.3.3.4 Standard
Standard connection like a desktop modem allows for a phone line to be connected
directly to the modem. This solution allows for no additional cables. The con to this
solution is that these cards will generally occupy your complete PCMCIA slot.
Chapter 4
Objectives
• After completion of this module, you will be able to know how to configure
Dialup Networking in Windows XP
4.1 Configuring Dialup Networking in Windows XP
These instructions assume your modem is properly installed and configured. See
information provided by the modem manufacturer for instructions for installing the
modem.
Windows XP has multiple methods for reaching dialup settings, and your screen shots
may vary slightly from those shown below because XP allows users to customize screen
settings.
Chose the radio button next to Set up my connection manually and click Next to see the
Internet Connection window.
Select "Connect using a dial-up modem and Click Next to get the Connection Name
window
For the ISP name click in the box and enter the name you want to see for the icon for the
connection, in this example we use the Sancharnet name. Click Next to continue.
Enter the phone number as you want it to be dialed for your connection. Choose Next to
continue when done.
If multiple unrelated users are sharing a connection you may want to make this setting
'My use only', but if every user of the system is allowed to use this dialup select Anyone's
use. Then click Next.
The Internet Account Information window options are left blank - doing this means you
will need to provide your id and password every time you connect. If you want to make
your connection less secure you can fill in and save the user name and password
information. Turning on Internet Connection Firewall is most likely appropriate for most
users, but users using a VPN (like an Oracle connection) may find that it will not work
with Internet Connection Firewall selected. Click Next
In the 'Finish' screen you can add a shortcut to this connection to your desktop. You may
want to do that, if not, you can reach the connection through the start menu. Click Finish
(but you may not really done.) If you are going to use the Home Directory service
continue with the Advanced configuration below.
If all you use the dialup connection for is email and web access then the connections
defined this way will probably work just fine without additional setup. To start a dialup
session go to the Start Ö Connect To Ö Sancharnet (the name you haven for the
Internet connection).
Choosing the connection from the menu will bring a login screen that will take your
Dialup Networking ID and password and will make your modem dial in to get your
connection.
If you have problems connecting, or if you plan to use the Home Directory service via
your dialup connection, the following steps may be required to force appropriate settings.
Go to Start Ö Connect to Ö Sancharnet (or what ever you named the connection) and
right-click to get the menu to choose properties - left click on Properties.
The Properties window will looks similar to the following:
The "Connect Using" box should have the name of your modem.
If you understand the use of dialing rules feel free to use them, otherwise uncheck the
'Use dialing rules' box and put the full number, as you want it dialed, in the "Phone
number" box. You can use the "Alternates" button to provide numbers which should be
tried if the first one fails to connect.
Click on the Internet Protocol (TCP/IP) line and then click on the 'Properties' button on
the Network properties window.
If you have previously set up any network connections on this system some of the
settings on the TCP/IP properties window may be different (and this window may change
with later changes we will make.) The Obtain and IP address automatically is mandatory.
Click on the Advanced button, then click on the "DNS" tab for the Advanced TCP/IP
Settings.
Click on the Add button below the DNS Server address window - a window will pop up -
add 128.143.2.7 and 128.143.22.119. Only 2 can be specified so if you make an error
select the wrong entry and click on remove.
Select the Append these DNS suffix and click add and add virginia.edu (this lets you
leave off the virginia.edu part of host names when you specify them in other programs)
If you use the Home directory service, click on the WINS tab to bring up the WINS
setting window. Initially it is unlikely to look like the one below.
Home Directory users MUST click in the Enable NetBIOS over TCP/IP button. The
WINS server settings should not be necessary for Home Directory, but if you are having
difficulties, the correct servers for UVa and Home Directory are 128.143.3.199 and
128.143.22.189.
If you use a WINS server (ESERVICES users and some HSC users) on the WINS tab and
add the appropriate WINS server information. Contact your server administrator for the
correct WINS settings for your domain. (Those given above are for the ESERVICES
domain.)
When finished click OK, you will be taken back to the "Internet Protocol (TCP/IP)
Properties" window, some information may be filled in for you.
From this window click OK to get back to the main network connection properties
window, and OK again on that window to exit the configuration. Then you should be able
to retry your connection.
If you have difficulties following these directions or need any other help getting your
connection to a UVa modem, please call us at 924-3731. That's the ITC Help Desk. Have
your University Computing ID (that's your Email ID) ready and give us as clear a
description as possible of what you have done and what is not working.
Chapter 5
Objectives
After completion of this module, you will be able to know:
• What is Terminal Adapter
• What are the types of Terminal Adapters
• What are the features of Terminal Adapter
5.1 Terminal Adapter
In telecommunications, a terminal adapter is an interfacing device employed at the "R"
reference point in an ISDN environment that allows a non-ISDN terminal at the physical
layer to communicate with an ISDN network.
It performs a similar role for ISDN to that which a modem performs for the PSTN.
Some manufacturers and telephone companies use the term ISDN modem, instead.
Note: Typically, a terminal adapter will support standard RJ-11 (or other country-specific)
telephone connection plugs for voice and RS-232C, V.35 and RS-449 interfaces for data.
• Easy to install and use : Installation of TAs is easy and there should be an
installation wizard that walks you through the configuration and setup, making the
TA up and running in minutes with plug and play support for Windows
95/98/2000/Me/XP and NT.
• Support for WAN Protocol : TAs should support a full-range of WAN
protocols, including X.75, CLEAR (synchronous), CHAP, MD5, PPP, ML-PPP,
MP+TM, V.120, X.75 and PAP so that you can connect to a variety of servers on
the corporate LAN or Internet.
• Call Bumping : TAs should support call bumping features that automatically
adjust a data call from 128 K to 64 K. It should be able to reduce the data link to
one channel to make or receive a phone call while communicating data with two
B channels (at 128K).
• Battery back up : They should provide a built-in battery which supplies power
for 2-3 hours in case of power failure.
• Simultaneous Voice and Data : TAs should be capable of transmitting and
receiving data on your computer over one ISDN B-channel and use the other B-
channel for your phone or fax machine using the analog port.
• Call line identification : For incoming calls from digital lines, the caller's
number appears in the telephone display when the phone rings. This feature of
TAs will enable to trace anonymous calls over ISDN.
Chapter 6
Proxy Servers
Contents
Objectives
After completion of this module, you will be able to know:
• What is a Proxy Server?
• What are the functions of Proxy Servers?
• Protocols of Proxy Servers
• Host Identifiers and Ports
• How to configuration of browser to use Proxy Server
6.1 Introduction of Proxy Servers
A proxy is a device which allows connection to the Internet. It sits between workstations
on a network and the Internet, allowing for a secure connection, allowing only certain
ports or protocols to remain open. When a client requests a page, the request is sent to the
proxy server, which relays it to the site. When the request is received from the site, it is
forwarded back to the user. Proxy servers can be used to log internet use and block access
to prohibited sites.
Some home networks, corporate intranets, and Internet Service Providers (ISPs) use
proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker
between the two ends of a client/server network connection. Proxy servers work with
Web browsers and servers, or other applications, by supporting underlying network
protocols like HTTP.
The features of proxy servers are especially important on larger networks like corporate
intranets and ISP networks. The more users on a LAN and the more critical the need for
data privacy, the greater the need for proxy server functionality.
Proxy servers work at the Application layer, layer 7 of the OSI model. They aren't as
popular as ordinary firewalls that work at lower layers and support application-
independent filtering. Proxy servers are also more difficult to install and maintain than
firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or
SOCKS must be configured individually. However, a properly configured proxy server
improves network security and performance. Proxies have capability that ordinary
firewalls simply cannot provide.
Some network administrators deploy both firewalls and proxy servers to work in tandem.
To do this, they install both firewall and proxy server software on a server gateway.
Because they function at the OSI Application layer, the filtering capability of proxy
servers is relatively intelligent compared to that of ordinary routers. For example, proxy
Web servers can check the URL of outgoing requests for Web pages by inspecting HTTP
GET and POST messages. Using this feature, network administrators can bar access to
illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see
Web domain names inside those messages. Likewise for incoming data traffic, ordinary
routers can filter by port number or network address, but proxy servers can also filter
based on application content inside the messages.
6.2.2 Connection Sharing with Proxy Servers
Various software products for connection sharing on small home networks have appeared
in recent years. In medium- and large-sized networks, however, actual proxy servers offer
a more scalable and cost-effective alternative for shared Internet access. Rather than give
each client computer a direct Internet connection, all internal connections can be funneled
through one or more proxies that in turn connect to the outside.
Figure 6.1
Imagine two people at a office -- let's call them Ram and Latha -- surfing the Net for
business research. Suppose Ram has an interest in computer networking books, visits
www.oreillynet.com in an attempt to learn more about them.
Now it's Latha's turn. Latha is very interested in computer programming. She navigates to
www.oreillynet.com and, because this page was cached during Ram's very recent visit,
she is surprised at how quickly this content-rich page pops into her browser window.
With a great first impression, Latha is now ready to immerse herself in the wonderful
world of computer programming.
The potential benefits of proxy server caching loom even larger if Ram and Latha have a
few hundred coworkers that share the same proxied Internet access and similar interests
or Net surfing patterns. Yet proxy caching is not a silver bullet. Limitations exist that can
render this technology much less useful.
It's reasonable to expect that proxy servers handling hundreds or thousands of Web
clients can become a network bottleneck. In addition to using servers with power
processors and large amounts of memory, administrators may also choose to deploy
multiple proxies to help avoid potential bottlenecks.
A proxy hierarchy creates multiple layers of caching support. Clients connect directly to
a first-level caching, and if a Web page is unavailable there locally, the request "misses"
and automatically gets passed to a second-level caching server, and so on.
Proxy caching differs from browser caching. Browsers automatically cache pages on the
client computer, whereas proxies can also cache pages on a remote Web server. Because
browsers already perform their own caching, introducing proxy caching into a network
will have only a second-order effect.
Proxy caches don't help much with refreshed pages. On some sites, Web pages are set
with HTML META tags to expire quickly; expired pages force the proxy cache to reload
that page. Similarly, caching is rendered ineffective by pages that change content
frequently, such as those on news sites, or weblogs.
Proxy caches also introduce measurement uncertainty into the Internet. Normally, a Web
server log will record identifying information of visiting clients such as their IP addresses
and domain names. For clients with proxy servers, all public requests are made on behalf
of the server, using its IP address and identity. Web sites that carefully track the patterns
of use of their visitors have much more difficulty in distinguishing unique client visits
through proxies.
FTP (File Transfer Protocol) supports the download of files over the Web. Before HTTP
was developed, FTP was an even more popular way to share files across the Internet. FTP
treats files as either simple text or binary format, and it is still commonly used to
download compressed archives of non-HTML data (like MP3 files, for example).
When manually configuring a browser, clients will need to know these details of the
proxy server arrangement. Most of the time, network administrators will configure the
proxies to serve all protocols to avoid any confusion.
A single port number is generally used for all of the supported protocols above. This port
should not be confused with the standard ports used by the protocols themselves (port 80
for HTTP, port 21 for FTP, and so on). This is a proxy port only, and it should never be
assigned to one of the reserved numbers.
Unfortunately, a single standard port number does not exist. Some numbers like 8000 and
8080 are used more commonly than others, but the number can be any unassigned value
up to 65535. Users manually configuring their browsers will need to be told this port
number by their network administrator.
For example, to configure IE to use a proxy server, first click on Tools to access the drop-
down menu. Click on the Internet Options... menu item to raise the Internet Options
dialog. This dialog is a property sheet featuring multiple tabs. Clicking on the
Connections tab makes available a dialog that includes a button in the bottom-right
corner named LAN Settings... . Finally, click this button to raise the Local Area Network
(LAN) Settings dialog; here is where proxy information must be entered.
IE6 supports both manual and automatic configuration options. As shown the Figure, the
"Use a proxy server" check box must be checked to enable the manual entering of a
proxy. Either the network host name or the IP address of the proxy server must be typed
in the "Address" field. In addition, any internal domains (such as intranet sites) that do
not need to go through a proxy can be entered here in order to bypass the server.
Figure 6.4: IE5 Internet Options, Connections tab
Chapter 7
E mail
Contents
• Email introduction
• Types of email
• Accessing email accounts
• Working principle of email
• Email protocols
• Components of email
• Signature
• Address Book
• Mail Boxes
• Smiley
• Acronyms
• Sending/Replying/Forwarding mails
• Configuration of Outlook Express
• Different folders of Outlook Express
• Checking the incoming mails
• Reading the mails
• Deleting the mails
• Composing mails
• Replying and Forwarding mails
• Setting up a web based account
• Checking the incoming mails
Objectives
After completion of this module you will be able to know:
1. what is Email
2. what are the types of email
3. how to access email accounts
4. the working principle of email
5. the different email protocols
6. the components of an email message
7. how to introduce Signature
8. what is Address Book
9. the different Mail Boxes
10. how to introduce Smiley
11. how to introduce Acronyms
12. how to Send/Reply/Forward mails
13. how to configure Outlook Express
14. the different folders of Outlook Express
15. how to check the incoming mails
16. how to Read/Delete/Compose the mails
17. how to Reply and Forward mails
18. Set up a web based account
19. Check the incoming mails
7.1 What is email?
Email is the method of electronically sending messages from one computer to another.
You can send or receive personal and business-related messages with attachments, such
as pictures or formatted documents. You can even send music and computer programs.
Email is the one of the popular service offered by Internet. It is the replacement of Postal
mail. Postal mail is known as Snail Mail because it is very slow. Email is cheaper and
faster than Postal Mail, less intrusive than a phone call, less hassle than a FAX.
Because of its speed and broadcasting ability, Email is fundamentally different from
paper-based communication.
Using email, differences in location and time zone are less of an obstacle to
communication.
Through Email you can exchange:
• Ideas,
• Agendas,
• Memos,
• Documents and
• Attachments
Just as a letter makes stops at different postal stations along its way, email passes from
one computer, known as a mail server, to another as it travels over the Internet. Once it
arrives at the destination mail server, it's stored in an electronic mailbox until the
recipient retrieves it. It is Store and Forward System. Copies can be sent automatically to
names on a distribution list. Advise delivery a confirm message when opened by the
recipient.
This whole process can take seconds, allowing you to quickly communicate with people
around the world at any time of the day or night.
To receive email, you must have an account on a mail server. This is similar to having an
address where you receive letters. One advantage over regular mail is that you can
retrieve your email from any location. Once you connect to your mail server, you
download your messages to your computer.
• An Email address.
• Email Programme at the client side.
To access your email account, you must be on the Internet. You can send and receive
email messages through an email program like Outlook Express or through a browser like
Internet Explorer. If you go through a browser, you are using web-mail. Most email
accounts can be accessed either way.
• If you access your mail through an email program, the messages are downloaded
to your computer and removed from the company’s mail server.
• If you access your mail through a browser (web-mail), the messages remain on
the company’s mail server until you delete them. Most web-mail accounts have a
maximum storage space. When your mailbox is completely filled, you will not be
able to receive any additional messages. You must regularly delete some
messages and empty the trash in order to free up storage space.
7.3.1 Mailers
• The following are Unix Mailers:
• Mail
• elm
• pine
• These are provided for the Shell Account Internet Users. They are Character
Based and we have to work on-line only, and no-off line working. Now all
the ISP are not providing Shell account.
• Eudora
• Pegasus.
• Out Look Express
The standard protocol used for sending Internet email is called SMTP, stands for Simple
Mail Transfer Protocol. It works in conjunction with POP servers. POP stands for Post
Office Protocol.
Username@domain name
[email protected]
[email protected]
First there is the user name that refers to the recipient's mailbox. User name should not
contain space or any special character except underscore. Then there's an at-sign (@).
Next comes the host name (sancharnet.in, yahoo.com), also called the domain name. This
refers to themail server, the computer where the recipient has an electronic mailbox. It's
usually the name of a company or organization.
The end of the domain name consists of a dot (".") followed by three or more letters
(such as .com and .gov) that indicate the top-level domain (TLD). This part of the
domain name indicates the type of organization or the country where the host server is
located.
PC
SMT Mail Mail With
Serve Clien ShellA/C
Transfer Agent ensures that the messages are transferred orderly fashion according to
SMTP. Mail Servers runs Transport Agent 24 hours. There are four types of programs
used in the process of sending and receiving mail. They are:
• MUA - Mail users agent. This is the program a user will use to type email. It
usually incorporates an editor for support. The user types the mail and it is passed
to the sending MTA.
• MTA - Message transfer agent is used to pass mail from the sending machine to
the receiving machine. There is a MTA program running on both the sending and
receiving machine. The MTA on both machines use the network SMTP (Simple
Mail Transfer Protocol) to pass mail between them, usually on port 25.
• LDA - Local delivery agent on the receiving machine receives the mail from its
MTA.
• Mail Notifier - This program notifies the recipient that they have mail.
Multipurpose Internet Mail Extension (MIME)
Emails are usually just text but can contain pictures, or other files. These 'attachments' or
'insertions' sometimes need special programs to be read.
SMTP cannot transmit executable files or other binary objects. There are a number of ad
hoc methods of encapsulating binary items in SMTP mail items, for example:
o Encoding the file as pure hexadecimal
o The UNIX UUencode and UUdecode utilities which are used to encode
binary data in the UUCP mailing system to overcome the same limitations
of 7-bit transport
o The Andrew Toolkit representation
None of these can be described as a de facto standard. UUencode is perhaps the
most pervasive due to the pioneering role of UNIX systems in the Internet.
• SMTP cannot transmit text data which includes national language characters since
these are represented by codepoints with a value of 128 (decimal) or higher in all
character sets based on ASCII.
• SMTP servers may reject mail messages over a certain size. Any given server
may have permanent and/or transient limits on the maximum amount of mail data
it can accept from a client at any given time.
• SMTP gateways which translate from ASCII to EBCDIC and vice versa do not
use a consistent set of code page mappings, resulting in translation problems.
• Some SMTP implementations or other mail transport agents (MTAs) in the
Internet do not adhere completely to the SMTP standards defined in RFC 821.
• The Common problems include:
o Removal of trailing white space characters (TABs and SPACEs)
o Padding of all lines in a message to the same length
o Wrapping of lines longer than 76 characters
o Changing of new line sequences between different conventions (for
instance <CR> characters may be converted to <CRLF> sequences)
o Conversion of TAB characters to multiple SPACEs.
MIME is a standard which includes mechanisms to solve these problems in a manner
which is highly compatible. Using the MIME you can send attachments in your email.
Attachments to emails can contain viruses! Do not open an attachment in an email unless
you know what it is and who it is from.
The POP3 mail protocol is the most commonly used mail protocol used for retrieving the
mail from the server to the client machine over PPP.
IMAP is also can be used for retrieving the mail from the server to the client machine.
But most of the Internet Service Providers support only POP3 and not IMAP.
• Header
• Body
The header contains the name and address of the recipient, the name and address of
anyone who is being copied, and the subject of the message, your name and address and
the date of the message.
Just like when sending a letter, you need the correct address. If you use the wrong address
or mistype it, your message will bounce back to you -- the old Return to Sender, Address
Unknown routine.
When you receive an email, the header tells you where it came from, how it was sent, and
when. It's like an electronic postmark.
Unlike a letter, which is sealed in an envelope, email is not as private. It's more like a
post card. Messages can be intercepted and read by people who really shouldn't be
looking at it. Avoid including any confidential information unless you have a way to
encrypt it.
7.13 Smiley
When we are talking to people face to face our body language, the tone of our voice,
gesture and facial expression will play important role. But through email you can
personalise your messages by using emotion icons called smileys. You can see some of
the
Smiley Meaning
:-) Smile
:-( Frown
:-| Expressionless
:-D Surprise laughing
:-/ Perplexed
:-Q Smoker
8-) Eye glass
:- Male
>- Female
:-e Disappointment
7.14 Acronym
You can use some abbreviations or acronyms in your email. The common acronyms are:
AE In Any Event
BTW By the way
FM Fine Magic
FC Fingers Crossed
FWIW For what it's worth
FYI For Your Information
FUA Frequently Used Acronyms
IAE In any event
IMO In my opinion
IMHO In my humble opinion
IMCO In my considered opinion
IOW In other words
NRN No Reply Necessary
OTOH On the other hand
PITA Pain in the butt
ROFL Rolling on floor, laughing.
RSN Real Soon Now [which may be a long time coming]
RTFM Read the Fine manual
SNAFU Situation Normal: All [bleeped] Up
SITD Still in the dark
TANSTAAFL There Ain't No Such Thing As A Free Lunch
TIA Thanks In Advance
TIC Tongue in cheek
TLA Three Letter Acronym (such as this)
YMMV Your Mileage May Vary
Outlook Express is most commonly used POP3 client software. It is coming along with
Internet Explorer. If you install Internet Explorer, Outlook Express will be automatically
installed in your Computer. We will see how to configure the Outlook Express in order to
send and receive mail.
7.17 Configuring Outlook Express
1. To launch the Outlook Express: Click Start Ö Programs Ö Outlook Express.
Outlook Express application will be opened as shown in figure 7-1.
Fig 7-1
2. Now from the Tools menu select the Accounts. Internet Account Dialog Box will
be opened as shown in fig 7-2.
Fig 7-2
3. Click the Add button; you will get a cascade menu as shown in fig 7-3.
Fig 7-3
4. Select the Mail… from the cascade menu. Internet Connection Wizard will start
as shown in fig 7-4
Fig 7-4
5. Type your name which will display when you send a mail that will appear in the
header. Click Next button.
6. In the next step you have to type your valid Email address as shown in fig 7-5.
After entering your email address click Next Button.
Fig 7-5
7. In this step you have to tell the Outlook Express to which Mail Server it has to
contact. You have to specify the Incoming Mail Server (POP3, IMAP or HTTP)
and Outgoing Mail Server IP address or Domain name here. This will be provided
by your Internet Service Provider at the time of getting your Internet Account.
You can specify the Incoming mail and Out Going mail as shown in Fig 7-6.
Fig 7-6
8. After entering the entries for POP3 server and SMTP server click the Next button.
In this step you have to give your Mail Account User Name and Password as
shown in Fig 7-7.
Fig 7-7
In this step don’t click Remember password check box if you computer is shared
by some body in order to avoid that others may check and read your mails. Click
next button.
9. Finally click the Finish Button to complete the configuration.
10. In the Internet Account Dialog box click the Mail tab and check that the account
you have created just now will appear as shown this the fig 7-8. If more than one
Account is created, all the accounts will be displayed. Select an account and click
Set as Default button. Now that account will become your default email account
Fig 7-8
11. You can close the dialog box by clicking the Close button.
Fig 7-9
4. Logon dialog box will appear as shown in fig 7-10. Type your user id and
password and click OK button.
Fig 7-10
5. Your Outlook Express will contact your POP 3 Server and down load the emails
to Inbox as shown in the fig 7-11.
Fig 7-11
Click on the mail. Outlook Express will open the mail in the bottom pane of the Inbox
Window. If you want to open the mail in a separate window double click on the mail. It
will open in a separate window as shown in fig 7-12. In this fig an undelivered message is
opened. When the message is not delivered, an undelivered message will be sent to you
from the postmaster stating the error conditions.
Fig 7-12
You can delete a group of mails at a time. For deleting a group of mails click on the first
mail and hold the Shift key and click on the last mail. All the mails (the first and the last
and in between mails) will be selected. Now you can press Delete key to delete them. For
selecting mail at random use control key instead of shift key.
If you want to move the mail back to your Inbox, right click on the mail. You will get a
short cut menu as shown in fig 7-13
Fig 7-13
From the short cut menu select Move to Folder. You will get Move dialog box as shown
in fig 7-14
Fig 7-14
In the move dialog box select Inbox and click Ok button. The mail will be moved to your
Inbox. You can move a group of mails also.
The “From:” address will be automatically inserted. If more than one account is
configured in your PC the default account address will be inserted. If you want to change
the other address you can select from the drop down list in the “From:” address drop
down list box.
In the To: address test box, you type the email id to whom you are going to send the mail.
You can type multiple addresses also here if you want to send to more than one person. In
that case use semi colon “;” to separate each mail id.
In the Cc: text box type the email id of the person to whom you want to send the copy of
this mail. Here also you can type multiple mail id separated by semi colon incase if you
want to send the copy to more than one person.
Some times you may want to include BCC, to send blind copies of the mails to many
persons. To include the Bcc box, click the View menu, and then select All Headers.
Type the relevant information in the Subject: text box. This will help the recipient to
understand the topic of the mail so that he can decide to read the mail immediately or at
leisurely.
The bottom portion of the window is for the body of your message. You can type the
message here. You can use the formatting tool bar for formatting the message what you
have typed.
After finish typing your message, click the Send button at the left top corner of the
window to send the mail.
The mail will go to the Outbox if your computer is not connected to Internet. If your
computer is already connected to the Internet, Outlook Express will contact the SMTP
Server and send the mail. Once the mail is delivered to SMTP server, then the copy of the
mail will be moved to Sent Items folder.
If you want to reply to all the persons mentioned in the To: address column and, CC:
column click Rely All button.
Web-based Mail
Some of the web sites are offering free email. Such mails are called as Web-based Mails.
With Web-based e-mail, to send and receive messages, you have to access the website.
For example the following web sites offer free email services:
http://mail.yahoo.com
http://www.mail.com
http://www.hotmail.com
http://www.rediff.com
First visit the web site from where you are having the Email account. Then log on to the
site by entering your account name and password. Now you can read your messages,
view attachments, send replies, forward messages. Most services offer online address
books to store your e-mail addresses and contact information. You can also set up folders
to manage your messages.
Type your User Name (or ID) in the text field beside UserID:, and your password in
the text field beside Password:.
Note: Your user name is not necessarily the same as your e-mail address. If you do not
know your user name, please contact your system administrator.
Now you are in your inbox. If not, click the Inbox link. The list of messages you
received – which are available in Inbox ─ will be listed. See the above figure. Now click
the link of any one of the mail you received. The content of that message will be
displayed. See the figure below:
For using the web based mail, you need not have neither Internet Account nor Personal
Computer. You can go to Internet Browsing center, visit the web site where you are
having the email account and then login to your account. Since it is free account you will
be getting unwanted junk mails called spam mails. Some web sites provide the spam
guard to protect you from getting unwanted spam mails.
Chapter 8
DNS
Contents
• Need of DNS
• Origin of DNS
• Understanding DNS
• Hierarchy of DNS
• Components of DNS
• Working of DNS
Objectives
After completion of this module you will be able to know:
• The need of DNS
• Origin of DNS
• Working method of DNS
• Hierarchy of DNS
• Components of DNS
DNS
While DNS is one of the least necessary technologies that make up the Internet as we
know it, it is also true that the Internet would never have become as popular as it is today
if DNS did not exist. Though this may sound like a bit of a contradiction, it is true, none
the less.
DNS stands for two things: Domain Name Service (or Domain Name System) and
Domain Name Servers. One acronym defines the protocol; the other defines the machines
that provide the service. The job that DNS performs is very simple: it takes the IP
addresses that computers connected to the Internet use to communicate with each other
and it maps them to hostnames.
Sounds pretty simple, doesn't it? Well, it is. But just because it's simple doesn't make it
any less important.
Human beings tend to have a difficult time remembering long strings of seemingly
arbitrary numbers. The way that our brains work, it's difficult to make information like
that stick. And that is where DNS comes in. It allows us to substitute words or phrases for
those strings of numbers. Words are a lot easier for people to remember than numbers,
especially when they can be tied to a specific idea that is linked to the website.
But how does DNS work? What makes it operate? How did it start?
http://www.bsnl.co.in/pages/cellone.htm
The first part is "http://", and that tells your PC what protocol (what language so to speak)
to use talking with this site. In this case, you are using HTTP (HyperText Transfer
Protocol). Another very common one for web designers to use is "ftp://" or File Transfer
Protocol. You would use it to connect to your web server to put the web pages you
created onto the server. You also see "https://" quite commonly. This simply means that
the connection between you and the web server is secure (meaning the information being
sent back and forth is encrypted). You should see "https://" when you are checking out,
especially when they are entering credit card information.
The next part, "www.bsnl.co.in" is called the Domain Name. The "www" used to be more
significant than it is today. Today, the "www" is, for the most part, assumed and you can
get to the same page regardless of whether or not you type in "www" your browser.
The part "/pages/cellone.htm" tells the web server to look in the directory called "pages"
and send the file called "cellone.htm" to your browser. It is just like the directories on
your PC.
The “in” of the Domain Name “www.bsnl.co.in” is called as Top Level Domain (TLD).
It is the right extreme portion of the domain name. For example the TLD of
www.yahoo.com is com.
8.2 IP address
Before we get into DNS, we need to explain what an IP address is. Every PC and server
has an IP address on the Internet. It has the format of 4 numbers, separated by periods,
and looks like "61.1.137.84". Each number should be between 0 and 255. Think of it as
your phone number on the internet, it must be unique. It would be bad to have 2 different
houses with the same phone number, and it would be bad to have 2 different machines
(more properly known as hosts) that have the same IP address on the Internet.
Enter DNS. DNS is an acronym for "Domain Name Service". It's whole purpose in life is
to translate between the friendly "www.bsnl.co.in" and the not-so-friendly 61.1.137.84. It
handles this translation for web sites, email, FTP servers, database servers, or any
machine within a domain name. Let's dig into the process of how that works.
DNS means Domain Name Service. It is actually a service that can keep large number of
machines’ IP addresses for huge network communication. Now the question arises why is
this needed. Let’s understand this with the help of an illustration.
Example: Let’s say rose1, rose2, rose3, rose4, and rose5 are the 5 machines in a network,
then for communication between each machine, each machine’s /etc/hosts in Unix (or
hosts.txt in Windows) file should have all the five entries of the machine name. Within
this small network there would be no problem if you add another machine say rose6 in
the network. But for this too, the network administrator has to go to each machine, add
the rose6 in /etc/hosts file and then comeback to the new comer rose6 machine and add
all the other entries (rose1...rose5) including its own name also in /etc/hosts (or hosts.txt)
file.
But what if the network is setup with say 60 machines and a 61st machine has to be
added? Then administrator will have to go to each machine again and write the new
machine’s name at /etc/hosts/ (or hosts.txt) file and again comeback and write all the 60
machines name on the 61st machine’s etc/hosts file which is a tedious and time taking job.
Thus, it is better to keep a centralized server, where all the IP addresses will stay and if a
new one does enter into the network then the change will have to be done at the server
and not on the client’s machine.
By November of 1983, a plan was laid out in RFCs 881, 882, and 883, also known as
‘The Domain Names Plan and Schedule,' ‘Domain Names -- Concepts And Facilities,'
and ‘Domain Names -- Implementation And Specification.' These three RFCs defined
what has developed into DNS as we know it today. Surprisingly, not a whole lot has
changed since that time.
Top-level domains are at the root of the DNS hierarchy and are therefore also called root
domains. These domains are organized geographically, by organization type, and by
function. Normal domains, such as microsoft.com, are also referred to as parent domains.
They’re called parent domains because they’re the parents of an organizational structure.
Parent domains can be divided into sub-domains, which can be used for groups or
departments within an organization.
1. Generic or Organization based TLD (e.g com, edu, gov, mil, net, org, int, aero,
museum, etc)
2. Geographical or country based TLD (e.g. in, us, au, etc). This TLS is having 2
letters.
3. Inverse (e.g. arpa). This TLD is to find domain name from IP address.
Sub-domains are often referred to as child domains. For example, the fully qualified
domain name (FQDN) for a computer within a human resources group could be
designated as jacob.hr.microsoft.com. Here, jacob is the host name, hr is the child
domain, and microsoft.com is the parent domain.
Domain Name System (DNS) is an Internet service that translates domain names into IP
addresses. DNS provides a database that stores a list of host names and their
corresponding IP address. This process is called name resolution or mapping. Name
resolution occurs when a program on a local computer requests a remote host for
resources. The local computer sends the host name of the server as part of the request. By
using the host name as an index, the DNS database is searched to resolve the IP address
of the host.
• Domain root: This is the node at the highest point of the hierarchical DNS tree. In
a DNS domain name, a trailing period represents the domain root tree (.). It is also
shown as two empty quotation marks representing a null value.
• Top-level domain: This is the next level in the hierarchical tree structure. It
represents the region or the type of organization to which a domain belongs. A
top-level domain name contains two or three letters such as com, edu, and mil.
• Second-level domain: This is a domain name registered under a specific top-level
domain, such as organizations based on type and geographical locations The
Second-level domain names have names with variable length. For example,
example.com is a second-level domain name.
• Subdomain: This is a domain created under a second-level domain. Organizations
need to create additional domains to represent organizational hierarchy and
various functional groups. A second-level domain also contains a name with
variable length.
• Host or resource: A host or resource computer is the last in the DNS hierarchy. It
helps find the IP address of the computer based on its host name.
A DNS domain is a logical group of computers that either request for DNS service or
respond to a service request. However, this logical group might also represent the
physical network. A DNS domain can represent all the computers internetworked in a
small business network. At the same time, DNS domain can also comprise physical
network that is spread across geographical locations. This logical grouping of computers
network is further grouped into smaller administrative units, called administrative
domains. An administrative domain is a group of computers in a single administrative
unit. Each administrative domain has two or more name servers for name resolution. All
administrative domains registered with the Internet form a hierarchical structure, called
the DNS domain namespace.
The domain namespace follows a hierarchical tree structure. Each node and leaf on the
tree represents either a set of resource or a DNS host. Based on the position in the
namespace hierarchy, each node is assigned a label. The root at the top of the hierarchy is
assigned the null label and is called the root domain. The nodes below the root are called
the top-level domains. The nodes below the top-level domain are called second-level
domain. An example of a second-level domain is example.com where ‘com’ is the top-
level domain. Domain created under an existing domain node is called a subdomain. For
example, resource.example.com is a subdomain of example.com. The name of a
subdomain is followed by the name of the domain that contains it. In a namespace,
domain name are read from left to right. Each label in a domain name is separated by a
dot ("."). A complete domain name also includes the root label ends with a dot.
When an organization registers for the second-level domain, a top-level domain label is
assigned based on the type of organization. Table 8-1 lists the commonly uses top-level
domains:
Resource Records (RRs) store and map domain names to the type of resources stored
within a domain. Each node in the hierarchical tree is associated with a set of resource
information.
Resource records contain information, such as the type, class, TTL, and RDATA. The
owner information is not maintained because it is very implicit to a resource record. The
variable part of the resource records maintained in a domain is the RDATA. This
differentiates between the resource records.
Note Short TTLs should be used to reduce caching in the resolver. To prohibit caching, a
zero value can be assigned to the TTL.
DNS servers, also called as name servers, are responsible for name resolution in a domain.
Each domain normally has two or more DNS name servers. The domain-specific
information, such as the list of IP addresses along with their host names, is stored in a
distributed database called the domain database. This information is distributed across the
name servers available in the domain. Name servers use this information to process
queries received from a DNS client. Each DNS server is responsible for a specific part of
the domain database. The DNS server becomes authoritative for that part of the database.
As an output, name server either sends back the IP address of the desired host or sends
referral that closely match to the address. However, the entire domain database is
replicated among the name servers to help name server continue the name resolution
process in case of communication link failure or inaccessibility of DNS hosts.
It stores the DNS database for its zone of authority. It is responsible for answering a
query from client. It is an authenticated server; hence called as Authoritative Sever
• Secondary server: Stores the copy of the master data file stored in the primary
name server. Each domain has one or more secondary name servers. A secondary
name sever is also authoritative for a domain. Secondary name servers are
delegated authority by the primary name server to perform name resolution. The
secondary name sever are immediately updated in case of a change in the master
data file.
It stores a copy of the database of the Primary server. Periodically it will collect the
database information from the Primary server. It is also an authenticated server hence
called as Authoritative Sever.
If primary server fails, then this will answer the query. Once in 3 hours (normally), it will
be updated automatically.
• Cache-only server: Stores the information received by the name servers in the
memory till it expires. This cached information is used to resolve queries. A
caching server that is not authoritative for a domain is called a cache-only server.
However, all name servers are caching servers.
To avoid response delay for a query, Cache server is used. It is a Non-authority server.
The TTL (Time To Live) parameter is related to this server. For example TTL duration
can be a maximum of 2 days.
DNS clients are local computers that are configured to receive DNS services from a DNS
server. DNS clients are configured with a resolver that queries DNS servers. The resolver
in a DNS client works as an interface between the applications installed on the DNS
client and the DNS server. Resolver receives requests from applications such as email
programs and sends a query to the DNS server. After the DNS server resolves the query
using the resource records, the desired information is returned to the DNS client in a data
format that is compatible with the local computer. To resolve a query, DNS client either
consults several DNS servers or retrieves the information from local cache.
DNS client and enduser program reside on a single computer. The interface that works
between a DNS client and enduser program is dependent on the local DNS server.
The governing bodies of the Internet maintain the Internet root domain, top-level
organizational and geographic domains. An organization needs to apply for membership
to join the Internet under the organizational or the geographical hierarchy.
The first type of server is called a ‘Root Name Server.' Each Top Level Domain (such
as .com, .edu, .us, .in, .sg etc) has one or more Root Name Servers which are responsible
for determining where the individual records are held. These servers are fairly static and
every machine on the internet has the capability of reaching any of them, as needed.
The servers that the Root Name Servers direct queries to are called ‘Authoritative Name
Servers'. These are the servers which hold the actual information on an individual domain.
This information is stored in a file called a ‘Zone File.' Zone files are the updated
versions of the original HOSTS.TXT file.
The final type of name server is called a ‘Resolving Name Server'. These are the servers
that do the majority of the work when you are trying to get to a machine with a certain
host name. Besides being responsible for looking up data, they also temporarily store the
data for hostnames that they have searched out in a cache, which allows them to speed up
the resolution for hostnames that are frequently visited.
The manner in which these servers work together is fairly straightforward. When you
attempt to go to a website, you type in a hostname in your web browser. Let's say, for
convenience, that you are going to www.foo.org. In your computers' settings is a list of
resolving name servers which it queries to find out what www.foo.org's IP address is.
The first thing that the resolving name servers will do is check their caches to see if the
DNS information for www.foo.org is already there. If it isn't, they will go and check with
the .org root name server to see which authoritative name server holds the zone file for
foo.org. Once they have that server's IP address, they connect to it.
Once the resolving name server has queried the authoritative name server, it replies back
to your computer with one of a number of different things. Ideally, it will report back
with the correct IP address and allow your computer to connect to the web server and
show you the web page that you were looking for. However, if the authoritative server is
down, doesn't have a record for the specific hostname that you are looking up, or if the
root server doesn't have a record that the domain name even exists, the resolving name
server will report an error to your computer.
Example:
Let's use the example that Ram types "www.bsnl.co.in" into his web browser. How does
his PC find the web server that has the page he is looking for, among the thousands of
web servers out there?
3. The DNS Server (198.6.1.1) gets the message, and assuming that the server
already knows what the IP address of www.bsnl.co.in is, it tells Ram's PC that the
IP address is 61.1.137.84.
4. Ram's PC gets the message that the IP address of www.bsnl.co.in is 61.1.137.84.
So his PC sends a message to 61.1.137.84 and asks "send me the default web page
at 61.1.137.84".
5. The web server (whose IP address is 61.1.137.84) sends the web page to Ram’s
browser.
That is a simplistic example of how your PC finds a particular web-server and web page.
The process of matching a domain name to a IP address is called resolving. So your PC
resolves the IP address from the domain name. Let's get into a little more detail.
For step 2, how does Ram's PC know that the IP address of the DNS Server is? There are
2 ways it learns what the address is. The first is that Ram asked his ISP what the address
was, and entered it himself. There are times manually entering (also known as statically
entering) the address is necessary or desirable, but usually the ISP automatically tells
your PC what the IP address of the DNS server is. This process is called "DHCP" or
Dynamic Host Configuration Protocol. When you select "Obtain IP address
automatically" in your Windows Network connections page, you are telling your PC to
use DHCP and to ask the ISP to give you the DNS Server address (among a bunch of
other things).
In step 3, we assumed that the DNS server already knew what the IP address of
www.bsnl.co.in was. What if it didn't already know? Let's assume that the DNS server
Ram's PC sent a request to, doesn't know where www.bsnl.co.in is.
Have you ever noticed that there are only so many variations of the end of the domain
name? There are .com, .gov, .net, .org, .us, .in, .biz, among others. When a DNS server
receives a request to resolve an IP address (translate from a domain name to a IP address)
for a domain that it doesn't know the answer to, it sends a message to any one of a small
number of servers. That small number of servers are responsible for knowing what the
"authoritative server" is for EVERY domain name. A realm would be .com, or .org for
example, and is properly called a top-level domain.
The message that Ram's DNS server sends to the top-level domain server "what is the
authoritative server for bsnl.co.in?". It is important to understand, that Ram's DNS Server
is NOT asking "what is the IP address of the web server for only one creations?". It is
only asking "where do I go to find out where the web server for bsnl.co.in is?"
Once Ram's DNS server knows where to go to get the answer for Ram's request, it sends
a message to the authoritative server asking "what is the IP address of the web server for
bsnl.co.in?". The authoritative server responds, and Ram's DNS Server tells Ram's PC the
IP address it needs to connect Ram to the webpage he is looking for.
To summarize the past few paragraphs, Ram's DNS server receives a request for an IP
address that it doesn't know. That server makes a request of a top-level domain server,
and gets a response with where to go to get the information that Ram is requesting. The
DNS server then makes a request of the authoritative server, and forwards the answer it
receives to the PC that made the first request. It sounds long and complex, but it happens
very quickly. One way to speed up the process is called caching. Caching is where the
DNS server remembers the response from the authoritative server for a period of time. So
if Babu makes the same request 5 minutes after Ram did, the DNS server doesn't have to
repeat the whole process. Caching will be brought up again in a bit.
Remember that Ram's DNS server cached the address for the web server of
www.bsnl.co.in, meaning that it remembers that www.bsnl.co.in is has the IP address of
61.1.137.84. Most DNS servers are set to remember that information for 24 hours. So if
Ram requests your web page at noon on Monday, Ram's DNS server will cache the IP
address of your web server until noon on Tuesday. If you change hosts at 1pm on
Monday, Ram will get your old website until at least noon on Tuesday. His DNS server is
giving Ram's PC the information it remembers, it doesn't check to see if that is still
accurate. So if your old website is down (maybe you have moved hosts, for example),
Ram can't get to your new website, until his DNS server refreshes the information (which
will point to the new web site).
Chapter 9
Objectives
After completion of this module you will be able to know:
• The different Remote Access Connections
• The different Remote Access Protocols
• Security aspects of Remote Access
• What is RADIUS
Remote access clients are connected to either the Remote Access Server's (RAS)
resources only (which is sometimes called point-to-point remote access connectivity), or
they are connected to the RAS server's resources and the resources of the network to
which the server is connected (which is called point-to-LAN remote access connectivity).
The latter type of connection enables remote access clients to access network resources as
if they were directly attached to the network.
A dial-in remote access connection consists of a remote access client, a remote access
server, and a WAN infrastructure, as shown in Figure 9.1. The physical or logical
connection between the remote access server and the remote access client is facilitated by
dial-in equipment installed at the client and server sites and by the telecommunications
network. The nature of the dial-in equipment and telecommunications network varies
depending on the type of connection being made.
Dial-in equipment consists of analog modems for the remote access client and the remote
access server, as shown in Figure 9.2. For large organizations, the remote access server is
attached to a modem array that can contain dozens or hundreds of modems, each of
which can service a different client.
Figure 9.2: Dial-in equipment and WAN infrastructure for PSTN connections
Integrated Services Digital Network (ISDN) is another form of dial-up connection that
provides greater transmission speeds and an all-digital connection. It is originally
designed as a digital replacement for the analog telephone network. The standard ISDN
installation is called the Basic Rate Interface (BRI) and consists of two 64-Kbps B
channels and one 16-Kbps D channel, the latter of which is used exclusively for control
traffic. This combination is sometimes called 2B+D. It is possible to combine the two B
channels into one 128-Kbps data pipe or use them separately with different devices, such
as ISDN telephones and fax machines.
Unlike most other high-speed WAN technologies, ISDN is a dial-up service that enables
you to connect to different destinations as needed. The connection process is extremely
fast, taking about half a second, as opposed to the lengthy dial, ring, and modem
negotiation sequence on standard PSTN connections. ISDN is not a portable technology,
even though it uses the same cables as PSTN connections. An ISDN connection requires
the installation of special equipment to provide its higher speeds. Despite its attributes,
ISDN still has not achieved great popularity because of its relatively high cost-per-
megabit of transmission speed. However, it does provide a higher-speed alternative for
RAS connections that functions with RRAS (Routing and Remote Access Service) just as
PSTN dial-ups do. Generally speaking, the dial-in RAS architecture is the same;
whatever type of WAN technology is providing the connection between the client and the
server.
After the WAN connection is established between the RAS client and server, the client
can access server resources using PPP. For the client to access resources on the network
to which the server is attached, the server functions as a router between the PPP
connection and a standard LAN protocol, such as Ethernet or Token Ring. Both PPP and
the LAN protocols provide support for all the standard network layer protocols, such as
TCP/IP, Internetwork Packet Exchange (IPX), NetBEUI, and AppleTalk. This enables
the RAS client to access virtually any type of resource on the server's network, just as if
the computer were directly connected to the LAN. The only perceivable difference is the
speed of the connection, which is much slower than a standard LAN connection.
The most basic form of security for any network connection is authentication, which is
the exchange and verification of credentials that identify the user to the network. To
prevent credentials (such as passwords) from being intercepted by third parties, RAS
supports a variety of authentication protocols that encrypt the user's credentials before
transmitting them over the network. When a client establishes a connection with a RAS
server using PPP, the two computers negotiate the use of a specific authentication
protocol that controls how the user credentials are exchanged. The authentication
protocols supported by RAS are as follows:
Data encryption encodes the data sent between the remote access client and the RAS
server. However, remote access data encryption provides protection only on the WAN
link between the RAS client and server. If end-to-end encryption is needed, such as
between a RAS client and another computer on the server network, you can use the IP
Security (IPsec) extensions to create an encrypted end-to-end connection after
establishing the RAS connection.
Data encryption on a remote access connection is based on a secret encryption key known
to the RAS server and the client. This shared secret key is generated during the user
authentication process. Data encryption is possible over dial-in remote access links when
using PPP along with EAP-TLS or MS-CHAP. As with authentication, you can configure
the RAS server to require data encryption. If the remote access client cannot perform the
required encryption, the connection attempt is rejected.
9.3.4 Callback
With callback, the remote client dials into the RAS server, authenticates itself, and then
severs the connection. The server then calls the client back and reestablishes the
connection. You can configure the server to call the client back at a preset number or at a
number specified by the client during the initial call. This enables a traveling user to dial
in and have the RAS server call back the remote access client at the current location,
saving telephone charges. When you configure the server to always call the client back at
the same number, you prevent unauthorized users from connecting to the server using
different telephone numbers.
9.3.5 Caller ID
RAS can use caller ID to verify that a call from a client is coming from a specified phone
number. You configure caller ID as part of the dial-in properties of the user account. If
the caller ID number of the incoming connection for that user does not match the
configured caller ID, the connection is denied.
9.3.6 Remote Access Account Lockout
The remote access account lockout feature enabled in the registry on the server providing
authentication specifies how many failed remote access authentication attempts a user is
permitted before the server denies remote access. Remote access account lockout is
especially important for VPN connections over the Internet. Malicious Internet users can
attempt to access an organization's intranet by repeatedly sending credentials (a valid user
name and a guessed password) during the VPN connection authentication process. With
remote access account lockout enabled, this type of attack is thwarted after a specified
number of failed attempts.
In addition to the various connection techniques described in the previous sections, you
can also control remote client access to your network in other ways. You can configure
individual Windows 2000 user accounts to permit or deny remote network access, and
you can create remote access policies to control whether remote users can access a server,
based on a variety of criteria.
We’ll see how Internet Service Providers (ISPs) can use the accounting feature to charge
for RADIUS services that are provided to a network.
Although RADIUS is a service, the term RADIUS can also refer to a protocol because
networking services are often named after the protocol that runs the service. (Just like the
FTP service is run by the FTP protocol, the RADIUS service is run by the RADIUS
protocol.)
9.5 Summary
• Remote access provides two different types of remote access connectivity: dial-in
remote access and virtual private network (VPN) remote access.
• A dial-in remote access connection consists of a remote access client, a remote
access server, and a wide area network (WAN) infrastructure.
• Remote access protocols, such as Point-to-Point Protocol (PPP), control the
connection establishment and transmission of data over WAN links.
• Generally remote access supports the following local area network (LAN)
protocols: Transmission Control Protocol/Internet Protocol (TCP/IP),
Internetwork Packet Exchange (IPX), AppleTalk, and NetBIOS Enhanced User
Interface (NetBEUI).
• Remote access offers a wide range of security features, including secure user
authentication, mutual authentication, data encryption, callback, caller ID, and
remote access account lockout.
Chapter 10
Security
Contents
• Various methods of social engineering
• Situations to watch out for
• Ways that information can be gleaned from employees.
• Various ways to secure the user’s computer and network access
• Enforced policies
• Encryption and authentication
• Firewalls.
• Incidence response plan
• Deal with an incident when it happens
• Test the plan before an actual incident occurs.
Objectives
After completion of this module you will be able to know:
1. various methods of social engineering
2. situations to watch out for
3. to reduce the number of ways that information can be gleaned from employees.
4. various ways to secure the user’s computer and network access
5. enforced policies, encryption and authentication, and properly configured and
installed firewalls.
6. how to formulate an incidence response plan
7. how to deal with an incident when it happens
8. how to test the plan before an actual incident occurs.
In a world where security has become an enormous factor and network administration
must cover everything from desktop support to business continuity planning, the scope of
IT duties has widened and budgets have narrowed.
This lesson covers several different aspects of security to help you find ways to keep your
network safe by spotting potential risks in the user environment before an incident
happens and showing you how to handle a security problem, should it occur. The lesson
also helps you evaluate your disaster recovery plan. It guides you through social
engineering, safe telecommuting, and the pitfalls of wireless LAN, and then takes you
through incident response, disaster recovery.
One of the biggest threats of which we, as security professionals, are often unaware and
cannot control is social engineering. There's very attention paid to the person-machine
interaction. This lesson focuses on some of the methods of social engineering that are
commonly used to obtain information that can enable an intruder to penetrate the best
hardware and software network defenses.
Before we get into the methods of social engineering, let's look at the planning of an
attack.
An intruder seldom decides to infiltrate an office randomly. The attack is usually very
methodical.
A social engineering attack is very similar to the way intelligence agencies penetrate their
targets:
1. Gather intelligence.
2. Select a specific vulnerable area as the entry point.
3. Execute the attack.
In the intelligence-gathering phase, the attacker can find readily available information
through the following:
• Dumpster diving
• Web pages
• Ex-employees
• Vendors
• Contractors
• Strategic partners
This information is the foundation for the next phase, in which the intruder looks for
weaknesses in the organization's personnel. Some of the most common targets are people
who work the following:
• Help desk
• Tech support
• Reception
• Administrative support
The last phase is the attack, also commonly known as the con. There are three broad
categories of attacks:
• Ego attacks
• Sympathy attacks
• Intimidation attacks
These attacks are discussed in further detail a little later in this lesson.
There are two levels at which social engineering occurs: the physical level and the
psychological level. Let's first look at the physical level, which is looking for information
in ways other than direct contact with the office or anyone in the office. We'll start with
dumpster diving.
Anyone looking to extort money from the office or to steal identities could have easily
made hundreds of thousands of rupees from the information they could have gleaned in
those dumpsters. They would have had access to Social Security numbers, addresses, and
a wealth of personal and financial information. This incredible security breach not only
jeopardized the clients, but upon release of the story in news papers, the office stock
plummeted and lawsuits ensued.
In any office, the potential for this type of information access is huge. What happens
when an employee is leaving the office? He cleans out his desk. Depending on how long
the employee has been there, what ends up in the garbage could be a goldmine for an
intruder. Other potential sources of information that are commonly thrown in the garbage
include
TIP
All these items should be disposed of properly. You should formulate a policy on
destruction of data. The safest policy is to physically destroy the media and the
information stored on it. Destruction is the only safe method of completely removing all
traces of information stored on a removable media device. All paper-generated
information should be shredded and/or taken away by a bonded destruction office.
The Web pages of an office are a great place to find out information and organizational
structure. Many companies also include the biographies of top executives. This
information can be used to impersonate that person or someone who is an associate of the
executive.
For example, you could call an office and ask the receptionist for Manohar. She tells you
that Manohar is out of the office until Monday. You ask who is in charge until he returns.
You are told Mary. You leave a message for Mary, requesting information that she would
have access to, saying you're working with Manohar and he said she could fax or e-mail
the information you need while he's out of the office.
E-mail social engineering is done by tricking someone into believing that the e-mail is a
legitimate request. Social engineering involves knowing the target and this includes
knowing the e-mail addresses of your target. For instance the I LOVE YOU virus uses
the social engineering technique. This virus created so much damage because it used an
emotion-triggering subject, I LOVE YOU.
WARNING
E-mail social engineering is a much more direct means of gaining access to a system
because attachments can launch worms, viruses, and back doors.
An ego attack is perhaps one of the favorite types of social engineering attacks simply
because you know that as network administrators, we all have big egos. The attacker
appeals to the vanity, or ego of the victim. The victim wants to prove how smart or
knowledgeable he is and unthinkingly provides sensitive information. We're all anxious
to show how much more we know than the next person or how much better our
equipment is than theirs. The perfect scenario for this type of engineering is a user group
meeting held after work. You know of several groups that meet once a month or so after
work in some of the local clubs. Mix egos and guess what happens?
It's amazing what employees will reveal without a whole lot of coaxing. How many of
the employees are unwitting revealing information in social settings without realizing
who they are talking to?
This can happen in any type of social setting. For example, suppose you attend a birthday
party for a friend. Some of the other attendees are also in the field and the topic of
conversation turns to servers. Everyone is comparing equipment. You'll know what
operating systems are running, what kind of equipment is running on each, and what
issues each one is having.
Talking about our jobs and comparing problems are simply part of human nature, and ego
attack victims never realize what has happened, but the information extracted can be
extremely dangerous in the wrong hands.
Ego attackers also target those they sense are frustrated with their current job position.
Unhappy employees are very likely to reveal information with little prodding because
they feel mistreated.
Attackers also have been known to pretend to be law enforcement officials, and their
victims feel obliged and sometimes even honored to help them by providing information.
The following are all examples social engineering that either use intimidation or prey on
sympathy:
• You receive a call from someone saying he's a General Manager. He states that
he's in real trouble. He's attempting to do a presentation for Microsoft and has
forgotten his password; therefore he can't log into the Web site to do the
presentation. He just changed it yesterday and can't remember what it is. He needs
to have it right away because he has a room full of clients waiting and he's
starting to look incompetent. This is an extremely important client that could
mean millions of dollars in revenue for the office.
• Someone you have never seen before approaches you as you're entering a secured
building. She has her hands full carrying coffee and doughnuts. She smiles
sweetly and says she has her ID badge in her pocket, but just doesn't seem to have
an extra hand to swipe the card and still carry all she has. She asks that you please
hold the door for her.
• You receive a call from the corporate office saying that a new mail server is being
put into place and there's an immediate need to verify current user accounts and
passwords. You are told that it's not safe to send this information via e-mail, and
are asked to please print it off and fax it directly to a number given to you. You're
told that the number is a direct line for the person putting the new server into
place.
These attacks are very successful because our business needs change daily and we live in
a fast-paced world. This type of attack plays on the empathy and sympathy of the victim,
and an attacker can shop around until he finds someone who will help.
Here are some social-engineering approaches an intruder can use to get information:
WARNING
Employees can exploit social engineering just as well as outsiders. Keep in mind that
more damage is done to a network by disgruntled employees than by outsiders.
You'll learn how to recognize a social engineering situation shortly. Here's a scenario that
actually happened:
A user came to a network administrator with his laptop and requested that it be joined to
the domain. The administrator logged the user off the laptop, logged in as himself, and
joined the laptop to the domain. So, what's wrong with that? The user had keystroke
logging software installed on the laptop. He proceeded to go back to his work area, read
the log file, log in as the administrator, browse to the main server, and copy the SAM
(Security Accounts Manager) to a file. (For those of you unfamiliar with the SAM, it
holds user account information that includes usernames and passwords.) He took the file
home and that evening ran L0phtCrack, which is password-cracking software, on the file.
The next day, he had the logins and passwords for every user in the office. He
periodically logged in as other users and accessed information he should not have. As
time went by, he got bolder, logging in as the administrator and shutting down services,
causing problems on the network. Eventually, his bragging got him into a bind and he
was dismissed for his actions. The best way to avoid this type of situation is to never join
a machine to the domain from a user's machine. The account should be created at the
server console instead.
Well, now that you know about the methods of social engineering, it's time to look at
how to spot a potential situation. To keep from becoming a victim, you should know how
to recognize an intruder. You can be neither suspicious nor trusting of everyone, so where
do you draw the fine line?
Remember the Manohar scenario from earlier in this lesson? If the office had a policy
requiring employees to obtain contact information when a call comes in for an out-of-the-
office employee, one sign to look for would be refusal to leave contact information. In
this example, the receptionist simply states that Mr. Manohar is out of the office, and then
asks for your name and a number at which you can be reached, and what the call is in
regard to, so that your call may be properly returned. If you're an intruder, would you
leave this information? Not likely. If you're a persistent intruder, you may press the
receptionist for information such as when Mr. Brown will return and who is in charge in
his absence, and act irate. This type of behavior is also a concern. The caller is
deliberately avoiding giving out information about him while trying to push the
receptionist into giving out more information about the employee.
What about someone who is rushing or is in a big hurry? We are all busy people; you're
in as big hurry as the next person. Look out for someone who tries to breeze by you as
you're entering a secure building. She may strike up a conversation, and then say she's
late for a big meeting and doesn't have time to be fishing for her ID badge, so she'll just
come in with you. If you allow this, you may be admitting an intruder into the building. A
genuine employee understands the security issue and finds her ID badge for admittance.
Name-dropping is often used to impress the people you are conversing with. Many folks
like to drop names -- it makes them feel more important. In social situations like the ones
described earlier, many a conversation begins with, "The other day I was talking to so-
and-so." If the speaker is talking about someone in your office, you get the feeling that he
knows something about what is going on in your office and that you might trust him.
Instead of proceeding to discuss the office, which is what the intruder wants, you may
want to ask him questions such as how do you know so-and-so to get a feel for whether
the person is being truthful or not. Of lesson, if he starts acting uneasy at the questions
you're asking, you know that he's a potential intruder.
Intimidation is one of the best ways to get information out of people, especially from
people who tend to be timid by nature. Employees should be able to address intimidation
situations without fear of punishment for not giving excellent customer service if they ask
additional questions or for more information.
Odd questions or asking for classified information can also be a dead giveaway that
someone is fishing for attack information. In the situation where the vice president
needed a password, the approach should be that this is a potential intruder and not a vice
president.
Good practices can neutralize many of these social engineering situations. We'll discuss
these practices next.
The impact of social engineering and the ease of an attack are usually high. Technical,
operational, and environmental controls individually will not prevent attacks. You need a
combination of all three along with user awareness training. Here's a list of items that can
be useful in preventing social engineering attacks:
• All employees should have a security mind-set and be able to question situations
that do not seem right.
• Cleaning crews should search the wastebaskets for sensitive information and turn
it over to management.
• Policies need to be in place for data destruction, including paper, hard drives, CDs,
disks, and so on.
• Implement self-service password management to address weaknesses with help
desk and password administration.
• Employees should have continued training in security awareness.
• Require all guests to sign in, wear a guest badge, and be escorted within the office.
• Have shredders located in convenient areas or hire a reputable office to pick up
and shred documents.
• Extra security training in the area of social engineering and office security
policies should be provided for security guards, receptionists, and help desk
employees.
• Put policies in place for how to handle situations where an unknown person tries
to slip in with a legitimate employee (called tailgating). Be sure that all employees
know the policy and enforce it.
• Instruct employees on what can and cannot be discussed in social settings outside
of work.
• Encrypt information on desktops, laptops, and PDAs.
• Have polices regarding e-mail and voice mail notifications for employees on
vacation or out of the building for a period of time.
• Have incident response teams to lessen the damage if a breach occurs.
• Apply technology where possible such as biometrics or electronic security badges.
• Test your defenses periodically.
This by no means covers everything or all situations. The important factors to remember
are that there must be policies in place and that all employees must be aware of these
policies. Training must start as soon as the job begins. Employees should know they play
a part in the security of the office and that their jobs depend on their vigilance.
You're faced with customer service and courtesy issues everyday. Technology cannot
control these situations. We all must rely on each other to use our best judgment when
revealing information about our office and ourselves. Remember, the best defense is a
good set of policies, proper education, and continued awareness training.
Many IT professionals work from home at least part of the time. All of this makes for a
flexible work environment. That flexibility can also cause the IT professional a huge
headache, because you have no control over what goes on in the confines of an
employee's home. There were strange incidents happening on the network. A cracker had
accessed the network and was wreaking havoc. No matter what this administrator did to
change and tighten security, the cracker always got back in. Eventually it was discovered
that the cracker was getting into the network through the administrator's home machine,
which was always left on and connected to the Internet.
With information security, you cannot allow even the top leaders to sidestep or ignore
policy. An employee cannot be allowed to work at home until the home machine is
secured. This should part of the security policy and all employees should have signed a
statement to that fact when they were hired. Should you find yourself in this situation, it
must be passed to the next level of management or someone who manages security.
What happens employees are allowed to work from home? They're given a office
machine or allowed to use their own, IT sets them up to access the network, and then we
forget about them.
Let's consider a few factors about telecommuting employees. After all, they're doing
office work. Most of them have children or spouses who use the same computer that they
use to access the work environment. Employees who have more that one computer
usually set up a home network. Those who care about their home aesthetics or don't want
to pull wire set up wireless networks at home.
Here are a few scenarios, each of which poses a threat to the work environment:
A office engineer has a daughter and a son who each have a laptop. The engineer
purchases a wireless router and hooks up all the machines -- including the work machine
-- so that all the machines can use the high-speed Internet connection.
One of the reasons that wireless is so popular with home users is that you can just plug it
in and have it start working. In this scenario, then, there's little probability that the
engineer enabled WEP (Wired Equivalent Privacy) on the laptops, so the computers are
left vulnerable because the information is sent in clear text.
An employee's home workstation is running Windows 98. (In all operating systems prior
to Windows NT, all passwords are stored in the .pwl file.) The Internet connection is
always on, because the children want Internet access on that computer, especially in the
summer when school's out. The virus software is disabled because it interferes with the
children's favorite game.
In this situation, the always-on connection leaves the machine open to. The .pwl file can
easily be accessed for a list of passwords, and disabling the virus software leaves the
unguarded against viruses.
You've installed keystroke-logging software to track where your children have been on
the Internet, because many times they use your computer unsupervised. This software
runs constantly.
You've made it extremely easy for a cracker to get your password to the network, because
all he has to do is read the log file. This is a giveaway -- he has no work to do because
you've done it for him. Keystroke logging software should not be used on a machine that
has been supplied by the employer unless the employer had installed it and is aware that
it's on the machine.
You are constantly having issues with your computer because you let your children use it.
What do you think the chances are that someone has already penetrated the network
where he works and is slowly stealing information or planting maladies?
Every office should have policies in place to protect the network from attacks via home
users. These might include the following:
TIP
Post information about patches and updates, whether the IT department supplies them or
the employee is expected to acquire them on his own. Posting provides no excuse for an
employee failing to comply.
Although it may seem like a lot of work, it's worth your while to periodically send
questionnaires to all employees working from home who are using office computers. The
main information you want from the employees is:
Then compare the current responses with the condition in which the machine left the
office. If this is done on a regular basis, you will soon be able to tell who is using the
computer strictly for work purposes and who is not. Often, what you'll find is that
children use the computer to play games and download music files. These require the
installation of additional programs. They also take up disk space and may require better
video cards as well as extra memory.
With policies in position, let's see how machines can be set up to securely connect to the
work environment from home.
As you learned in the previous section, you really have very little control over the home
user. Even with good policies in place, there's no guarantee that telecommuters will
follow them. What you can control is how the telecommuters connect to your network,
and that's what we'll discuss now.
When you allow telecommuters to access your network, they usually do so by first
connecting to the Internet and then connecting to the network A VPN (Virtual Private
Network) is a network connection that permits access via a secure tunnel created through
an Internet connection. Using an Internet-based VPN connection is very popular for
several reasons:
• Users in an organization can dial a local Internet access number and connect to
the corporate network for the cost of a local phone call.
• Administrative overhead is reduced with a VPN because the ISP (Internet Service
Provider) is responsible for maintaining the connectivity once the user is
connected to the Internet.
• There are various security advantages to using a VPN, including encryption,
encapsulation, and authentication.
For users who travel, a local access number usually is available. If possible, you should
provide this information to employees who travel -- it saves phone calls to the help desk
and enables them to test the numbers before they have to give presentations.
Figure 1 shows how a VPN works. Setting up the users' computers (clients) to connect to
the server is a two-step process:
Figure 1: VPN remote access over the Internet.
Once the client is setup, it can use the VPN. Here's how a client uses a VPN to access a
corporate LAN through the Internet:
1. The remote user dials into his local ISP and logs into the ISP's network.
2. The user initiates a tunnel request to the server on the corporate network. The
server authenticates the user and creates the other end of tunnel.
3. The user then sends data through the tunnel, which is encrypted by the VPN
software before being sent over the ISP connection.
4. The server receives the encrypted data, decrypts it, and forwards it to the
destination on the corporate network. Any information sent back to the remote
user is encrypted before being sent over the Internet.
VPNs provide great opportunities for employee productivity while reducing long-
distance charges, and a good VPN guarantees privacy and encryption. But it is
authentication that ensures the integrity of the data.
We've discussed the situations that home users get themselves into and how easily
passwords can be breached on unsecured machines. In order for a VPN to provide the
level of security that's intended, a solid means of authentication must be established. This
brings us to two-factor authentication.
In two-factor authentication, a user must supply two forms of ID before she can access a
resource: one is something she knows, such as a password, and the other is something she
has or is. For example, you may be required to type password and place your thumb on a
thumbprint scanner to properly identify yourself. Figure 2 illustrates this type of
authentication.
Figure 2: Two-factor authentication.
The most common form of this type of authentication is a smart card. The security in this
authentication is that both are need for validation. If the card is stolen, or the PIN is
discovered, neither one of these alone can enable someone else to log on as the user.
Smart card readers are attached to a computer port and a digital certificate is downloaded
to activate the card. Smart card logon requires the user to insert the card and enter a PIN
in order to log on.
The purpose of a VPN is to secure your network communications. There are two broad
categories of tunneling:
• Voluntary
• Compulsory
In voluntary tunneling, the situation is as described earlier and shown in Figure 2-1. The
cable modem dials the ISP, and the user is then connected to the VPN server via the
Internet.
In compulsory tunneling, the tunnel is set up between two VPN servers that act as routers
for network traffic. This type of tunnel is most useful for connecting a remote office with
its own network to a central office. Sometimes as an office is growing, it allows
employees to run offices out of their homes with those employees hiring several people to
work for them, or it may be in the situation where a contractor works out of an office that
is shared by other contractors. Figure 3 shows an example of this type of tunneling.
This type of server would be placed in a larger office but remote users and traveling
employees could create a connection with a local or corporate VPN server instead of
connecting to an ISP first, thus eliminating the need to supply traveling employees with a
list of local numbers for the ISP.
WARNING
Tunneling should not be used as a substitute for encryption. The strongest level of
encryption possible needs to be used within the VPN.
Let's take a look at personal firewalls that can be installed to help detect intrusions in
home computers.
The potential for crackers to access data through the telecommuter's machine has grown
substantially, and threatens to infiltrate our networks. Cracker tools have become more
sophisticated and difficult to spot. Always-connected computers, typically with static IP
addresses, give attackers copious amounts of time to discover and exploit system
vulnerabilities. How can a user know when his system is being threatened?
You can help thwart attacks by making sure that all telecommuters have firewalls
installed on their systems. Firewalls come in two varieties: software and hardware. Like
most other solutions, each has strengths and weaknesses. By design, firewalls close off
systems to scanning and entry by blocking ports or non-trusted services and applications.
Software firewalls are more flexible in that they enable the user to move from network to
network. Typically, the first time a program tries to access the Internet; a software
firewall asks whether it should permit the communication. You can opt to have the
firewall ask the user each time the program tries to get online. The prompts usually get so
annoying that most users end up making hasty decisions with little more information than
they originally had. Another danger is that firewall filtering can get too complicated for
the average user to fix easily, which makes users reluctant to deny permission to anything.
There should be help available to telecommuters to aid in configuring these types of
firewalls. Its one thing to say that telecommuters have firewalls, but quite another to
ensure that those firewalls are correctly configured.
In general, the average user will like the nature of hardware solutions because they
operate in the background without generating as many queries and alerts as software
firewalls. In addition, the physical installation is easy, but the normal home user won't
know how to configure the firewall should the default settings not be strong enough.
Remember that even a good firewall cannot protect the user if he does not think before he
downloads or does not exercise a proper level of caution. No system is foolproof, but the
right combination of hardware, software, and good habits can make your telecommuters'
computing environment safer.
We will see what actually happens when your network is invaded or damaged. We
develop and deploy hardware and software in such an extremely quick fashion to meet
the demand of business and home consumers that we don't always take the time to be
sure that these technologies are properly tested and secured. This puts our networks at
risk not only from the professional cracker but also from curious or disgruntled
employees.
Let's first look at intrusion detection and intrusion prevention systems that can help spot a
potential intrusion.
Intrusion-detection systems are also designed to catch attacks in progress within the
network, not just on the boundary between private and public networks. The two basic
types of IDSs are network based and host based. As the names suggest, network-based
IDSs look at the information exchanged between machines, and host-based IDSs look at
information that originates on the individual machines. Here are some specifics:
• Network-based IDSs monitor the packet flow and try to locate packets that may
have gotten through the firewall and are not allowed for one reason or another.
These systems have a complete picture of the network segment they are
configured to protect. They see entire network packets, including the header
information, so they're in a better position to distinguish network-borne attacks
than host-based IDS systems are. They are best at detecting DoS (Denial of
Service) attacks and unauthorized user access. Figure 4 details a network-based
IDS monitoring traffic to the network from the firewall.
Network-based IDSs try to locate packets not allowed on the network that the firewall
missed. Host-based IDSs collect and analyze data that originates on the local machine or
a computer hosting a service. Network-based IDSs tend to be more distributed.
Host-based and network-based approaches are complementary to each other because they
have different strengths and weaknesses. Many successful intrusion detection systems are
built using mixes of both, and ultimately, this is what network administrators should
consider for their own environments.
When an IDS alerts a network administrator of a successful or ongoing attack attempt, it's
important to have documented plans for incident response already in place. There are
several forms of response, including the following:
IDSs alert IT system administrators to potential security breaches within the perimeter of
a network environment, which is a good start. The problem with them is that they're
passive and reactive. They scan for configuration weaknesses and detect attacks after
they occur. When an attack occurs, it's reported, and combinations of antivirus and
intrusion detection vendors develop a rapid solution to distribute, but by that time, the
attack has delivered its payload and paralyzed the network or several networks. In fact,
the damage is often already done by the time the IDS alerts you to the attack.
Intrusion prevention software differs from traditional intrusion detection products in that
it can actually prevent attacks rather than only detecting the occurrence of an attack. IPS
architectures serve as the next generation of network security software that is proactive.
Host-based IPS will become increasingly popular in the next few years, possibly pushing
host-based IDS out of the picture.
• It actually secures internal resources from attacks based inside the network by
restricting behavior of potentially malicious code, providing a record of attack,
and notifying enterprise security personnel when an attack is repelled.
• It defines appropriate behaviors and then enforces those behaviors on every end-
user desktop and network server across an enterprise. By looking at system and
application behavior and defining which actions are legitimate and which are
suspect, an IPS can stop an errant system action when it attempts to do something
that is not in the realm of expected behavior.
• Rules can be configured to control which type of actions applications can perform
on files and system resources. As an intelligent agent, these run by intercepting
system actions, checking rules, and then allowing or denying the action in
question based on those rules.
• Statistical logging data can be used to generate reports that indicate overall
network health. IT staff can monitor how current rule sets are working and adjust
them, if necessary.
For an intruder, the real value of your network lies in key machines such as database
servers and the information they contain. An intruder won't celebrate breaking through
your firewall if all it gets him is access to a couple of printers. The idea of intrusion
prevention is to ensure exactly that. By allowing only certain behaviors on critical hosts,
the technology leaves an intruder with little freedom to do anything malicious.
If you have a personal firewall such as Norton Personal Firewall or ZoneAlarm, you
may've already seen intrusion prevention in its simplest form. Recall from the above that
this type of software relies on rules and scanning to spot inappropriate activity. It uses
predefined attack signatures, and it also learns what behaviors you'll allow every time
you click yes or no when an application wants to do something.
WARNING
Sometimes the data that is collected by these systems is overwhelming. When you start
trying to do something with the intrusion detection data, you realize the magnitude of
deciphering or reading the data is well beyond the resources and time you want to put in
to make it effective.
Often, incidents happen even though you have firewalls and intrusion detection. So,
you've got ten thousand alarms going off, five of them are probably valid, two of them
you really need to do something about, but you don't have the time or the resources to
find what those five are and what the two really are. You end up doing nothing because
you don't know how to respond. Please do not let this happen. Make the time and
resource to use these tools effectively.
No incident response solution is complete without a proper plan, so let's tackle that next.
Incident response refers to the actions an organization should take when it detects an
attack, whether ongoing or after the fact. It's similar in concept to a DRP (disaster
recovery plan) for responding to disasters. Incident response plans are needed so that you
can intelligently react to an intrusion. More importantly, there's the issue of legal liability.
You're potentially liable for damages caused by a cracker using your machine. You must
be able to prove to a court that you took reasonable measures to defend yourself from
crackers. Having an incident response plan definitely helps in this area. Unplanned
application and operating system outages have become commonplace. When an incident
occurs, the last thing you should do is panic, which, of course, is exactly what happens if
there is no plan in place or you have no idea where it is.
Don't overlook the effect an incident has on employees. The interruption to the workplace
not only causes confusion but also disrupts their schedules. Proper planning should be
beneficial to customers as well as employees.
The components of an Incidence Response Plan should include preparation, roles, rules,
and procedures.
10.3.3.1 Prepare
Although the preparation requirements may be different for each office, some of the
basics should include:
• A war room where the response team can assemble and strategize.
• A response team that will handle all facets of the incident.
• Contact information for the response team, vendors, and third-party providers.
• Change-control policies, which are useful especially when an application or
operating system needs to be rolled back.
• Software listing of the operating systems and applications being used so the scope
of the incident can be properly assessed.
• Monitoring tools to determine the health of the machines.
The incidence response team is responsible for containing the damage and getting the
systems back up and running properly. These steps include determination of the incident,
formal notification to the appropriate departments, and recovering essential network
resources. With this in mind, the team should comprise the following personnel:
• The entire team is responsible for the success of the incident handling.
• No one on the team is allowed to leave until the incident is handled.
• Everyone works from the war room. This is the central command post and
investigation takes place here.
Lastly, procedures need to be put into place. Let's discuss those procedures now.
Incidents happen from time to time in most of organizations no matter how strict security
policies and procedures are. It's important to realize that proper incident handling is just
as vital as the planning stage, and its presence may make the difference between being
able to recover quickly, and ruining business and customer relations. Customers need to
see that the company has enough expertise to deal with the problem.
Larger organizations should have an Incident Response Team. In the previous section, we
discussed the department members that should be assigned this task. Realize that this
team is not a full-time assignment; it's just a group of people who have obligations to act
in a responsible manner in case of an incident.
The basic premise of incident handling and response is that the company needs to have a
clear action plan on what procedures should take place when an incident happens. These
procedures should include:
This is a brief model and by no means is a complete plan. Every company must evaluate
its needs and plan accordingly. Once a plan is formulated, it must be tested, which brings
us to the last part of this lesson.
You formulate a plan, put it on a shelf, and when an incident happens, you realize there
are huge flaws in the plan. You forgot something or the person that you picked to do
internal communications support did an extremely poor job of handling his
responsibilities and left even though the rules for the team stated otherwise. The security
response team lead needs to be sure that every person onboard did the best they could and
performed the most appropriate action given the circumstances. This person also needs to
look at the situation to see if the overall strategy of the department is useful or where it
needs changing or fixing. The only way to do this before an actual incident is to test the
plan ahead of time.
The approach taken to test the plan depends on the strategies selected by the company.
Many times tests are conducted by what are called Tiger Teams. This can be an outside
group of consultants. The tests are often conducted without notification to the
departments involved in order to see how well the plan functions.
Firewall
Contents
• Various Generations of Firewalls
• FAQ.
Objectives
After completion of this module you will be able to know:
One of the simplest and least expensive forms of firewall protection is known as static
packet filtering. With static packet filtering, each packet entering or leaving the
network is checked and either passed or rejected depending on a set of user-defined
rules. Dealing with each individual packet, the firewall applies its rule set to
determine which packet to allow or disallow. You can compare this type of security
to the Gate-keeper at a club who allows people over 21 to enter and turns back those
who do not meet the age rule requirements. The static packet filtering firewall
examines each packet based on the following criteria:
• Source IP address
• Destination IP address
• TCP/UDP source port
• TCP/UDP destination port
For example, to allow e-mail to and from an SMTP server, a rule would be inserted into
the firewall that allowed all network traffic with a TCP source and destination port of 25
(SMTP) and the IP address of the mail server as either the source or destination IP
address. If this were the only filter applied, all non-SMTP network traffic originating
outside of the firewall with a destination IP address of the mail server would be blocked
by the firewall.
Many people have asked the question, “Is a router with an access list a firewall?” The
answer is yes, a packet filter firewall can essentially be a router with packet filtering
capabilities. (Almost all routers can do this.) Packet filters are an attractive option where
your budget is limited and where security requirements are deemed rather low.
But there are drawbacks. Basic packet filtering firewalls are susceptible to IP spoofing,
where an intruder tries to gain unauthorized access to computers by sending messages to
a computer with an IP address indicating that the message is coming from a trusted host.
Information security experts believe that packet filtering firewalls offer the least security
because they allow a direct connection between endpoints through the firewall. This
leaves the potential for a vulnerability to be exploited. Another shortcoming is that this
form of firewall rarely provides sufficient logging or reporting capabilities.
Within the same generation of static packet filtering firewalls are firewalls known as
stateful packet inspection firewalls. This approach examines the contents of packets
rather than just filtering them; that is, it considers their contents as well as their addresses.
You can compare this to the security screener at an airport. A ticket validates that you
must be traveling from your source to your destination; however, your carry-on contents
must be checked to get to your final destination.
These firewalls are called stateful because they can permit outgoing sessions while
denying incoming sessions. They take into account the state of the connections they
handle so that, for example, a legitimate incoming packet can be matched with the
outbound request for that packet and allowed in. Conversely, an incoming packet
masquerading as a response to a nonexistent outbound request can be blocked. By using
something known as session or intelligent filtering, most stateful inspection firewalls can
effectively track information about the beginning and end of network sessions to
dynamically control filtering decisions. The filter uses smart rules, thus enhancing the
filtering process and controlling the network session rather than controlling the individual
packets.
Basic routers typically do not perform stateful packet inspections unless they have a
special module. A dedicated firewall device or server (with software) is usually required
when the level of security demands stateful inspection of data in and out of a network.
Although stateful packet inspection offers improved security and better logging of
activities over static packet filters, it has its drawbacks as well. Setting up stateful packet
examination rules is more complicated and, like static packet filtering, the approach
allows a direct connection between endpoints through the firewall.
The next generation of firewalls attempted to increase the level of security between
trusted and untrusted networks. Known as application proxy or gateway firewalls, this
approach to protection is significantly different from packet filters and stateful packet
inspection. An application gateway firewall uses software to intercept connections for
each Internet protocol and to perform security inspection. It involves what is commonly
known as proxy services. The proxy acts as an interface between the user on the internal
trusted network and the Internet. Each computer communicates with the other by passing
all network traffic through the proxy program. The proxy program evaluates data sent
from the client and decides which to pass on and which to drop. Communications
between the client and server occur as though the proxy weren't there, with the proxy
acting like the client when talking with the server, and like the server when talking with
the client. This is analogous to a language translator who is the one actually directing and
sending the communication on behalf of the individuals.
Many information security experts believe proxy firewalls offer the highest degree of
security because the firewall does not let endpoints communicate directly with one
another. Thus, vulnerability in a protocol that could slip by a packet filter or stateful
packet inspection firewall could be caught by the proxy program. In addition, the proxy
firewall can offer the best logging and reporting of activities.
Of course, this security solution is far from perfect. For one thing, to utilize the proxy
firewall, a protocol must have a proxy associated with it. Failure to have a proxy may
prevent a protocol from being handled correctly by the firewall and potentially dropped.
Also, there is usually a performance penalty for using such a firewall due to the
additional processing for application-level protocols.
The most recent category of firewalls attempting to meet this demand performs what has
been termed stateful multilevel inspection, or SMLI. SMLI firewalls eliminate the
redundancy and CPU-intensive nature of proxy firewalls. SMLI's unique approach
screens the entire packet, OSI layers 2 through 7, and rapidly compares each packet to
known bit patterns of friendly packets before deciding whether to pass the traffic.
Coupled with or integrated into an intrusion-detection system (IDS), SMLI offers the first
glimpse of this new definition of a firewall. Among the products that use this new
technology are Check Point’s FireWall-1, Elron Software’s Internet Manager, and
SonicWall’s line of access security products.
11.2 Frequently Asked Questions
Why would you want a firewall?
Firewalls will protect your network from unwanted traffic. Many times, the unwanted
traffic is harmful traffic from hackers trying to exploit your network. You want a firewall
to protect your network, just as you want locks on your door and windows at your home.
NAT provides some security for your network as you do not have a real Internet IP
address and your network, usually, cannot be accessed from the Internet without some
outbound connection first being created from your private/inside network.
However, you still need a firewall to protect your network as NAT only hides your
network but doesn’t really stop any packets from entering your network.
What are IDS and IPS? Also, what do they have to do with firewalls?
An Intrusion Detection System (IDS) monitors for harmful traffic and alerts you when it
enters your network. This is much like a burglar alarm.
An Intrusion Prevention System (IPS) goes farther and prevents the harmful traffic from
entering your network.
IDS/IPS systems recognize more that just Layer 3 or Layer 4 traffic. They fully
understand how hackers use traffic to exploit networks and detect or prevent that harmful
traffic on your network.
Today, many IDS/IPS systems are integrated with firewalls and routers.
Firewalls can protect your network and its servers from being barraged by DoS traffic
and allow them to respond to legitimate requests, thus, allowing your company to
continue its business over the network.
For example, with Cisco PIX firewalls, you can configure them with the CLI interface
(called PixOs), or the PIX Device Manager (PDM), a Java-based interface that works
with a Web browser.
What is NIB?
Classification of NIB Nodes
Three Tier Architecture of NIB I
Components of NIB
Connectivity Architecture
Firewall Architecture
Inter - Connectivity among nodes
Bandwidth among nodes
Objectives
BSNL is also an Internet service provider, providing Internet service throughout the
entire country except in New Delhi and Mumbai, under the brand name of "Sanchar net".
Sancharnet provides free all India roaming and enables it's users to access their accounts,
using the same access code (172233) and user ID from any where in the Country.
The NIB Nodes are classified as A1, A2, B, C1, C2 & C3 on the basis of:
Functions to be carried out
International Connectivity
No. Of PSTN Subscriber
Routing (Internal & External)
Equipment Deployment
Trained Manpower Availability
Cost
12.3.2 Router
Router is a device that forwards data packets along networks. Routers are one of the vital
equipment of an ISP.
Basically a router is used for connecting o at least two networks, commonly two LANs or
WANs or a LAN and its ISP’s network. In the case of ISP nodes the any ISP node is
connected to another ISP Node at a remote location and hence this is WAN network and
Routers are used for routing the packets.
Routers use headers and forwarding tables to determine the best path for forwarding the
packets, and they use protocols such as ICMP to communicate with each other and
configure the best route between any two hosts.
12.3.3 Switch
A Switch is a inter-connecting component. Switches operate at the data link layer (layer 2)
and sometimes the network layer (layer 3) of the OSI Reference Model and therefore
support any packet protocol. In the ISP node, the switch is used to interconnect the RAS,
Router , Help Desk PC etc.
Connectivity among the above three components of an ISP node is as shown in the figure.
Secure Zone - This shall be highly protected zone. Only authorised and authenticated
personnel shall be permitted beyond this zone. DNS, NMS etc servers shall be in the zone.
Demilitarised Zone - This shall be semi-protected zone. Only users who have been
checked and authenticated shall gain access to this zone. Application servers like Proxy,
Radius, Email Server shall be in this zone.
Open Zone - These are open zones containing Remote Access Servers, Routers and
WWW servers.
12.6 Inter connectivity among various types of Nodes
Normally the C nodes are connected to B nodes and the B nodes are connected to A
nodes. But if a C node is very near to A node than to a B node then the C node will be
connected to A node.
Bareli
Kathua
Ghaziabad
Jammu
Jalland Bhopal
Jaipu Kanpur
Raj Patna Imphala
Poona Gauhati
Delhi Calcutta
Surat
Ahmedgbad
Mumbai
Baroda Chennai
Bangalore
Hyderabad
Ernakula
Madurai
Calicut Coimbatore
Type A I location Trichy
with Internet Gateway Trichur Trivandrum
Type A II locations Ooty
without
Type B
Type C I/ C II / CIII Illustration of Connectivity Diagram for
location Internet Locations of NIB
Multiple
Please see the diagram above for connectivity architecture of NIB I nodes. As far as A 1
nodes are concerned, they are mesh connected, ie each A 1 node is connected to every
other A 1 node.
12.7 Bandwidth between nodes
The bandwidth among nodes is as shown in the figure. However, based on traffic reports
and the bandwidth occupation, bandwidth between nodes will be increased as and when
requirement arises.
Chapter 13
Contents
Objectives
BSNL’s NIB-I is a TCP/ IP based network consisting of about 436 nodes covering most
of the district headquarters. The network comprises of a three-tier architecture with 14 A-
level nodes, 31 B-level nodes and the rest C-level nodes.
Among the 14 A-nodes, six of them are interconnected in near full mesh with link
bandwidth of 34 Mbps. These are referred to as A-1 cities. The remaining A-type cities
are referred to as A-2 nodes and are dual homed to the A-1 nodes with link bandwidths of
34 Mbps. All A-1 cities and Ernakulam (C type) have International Gateway.
The 31 B-level cities are connected to the 14 A-level nodes in a hierarchical with link
bandwidths of 4 Mbps. The C-nodes are connected to the B-nodes with link bandwidths
of 2 Mbps.
The National Internet Backbone (NIB-II) envisages the four Projects namely
Project 1 : MPLS based IP Infrastructure in 71 cities
Project 2.1 : Access Gateway Platform Narrowband,
Project 2.2 : Access Gateway Platform Broadband
Project 3 : Services Platform consisting of Messaging, Provisioning, Billing,
Customer Care and Enterprise Management System.
The VPN Service in any of the virtual nodes or any place in India requires physical
connectivity between the customer site and the nearest physical node.
As the demand for MPLS VPN grows, in addition to building connectivity of each
customer site to nearest physical node, option of aggregating the traffic from multiple
sites through an aggregation router was thought of.
In this regard, following norms for the deployment of Aggregation Router for
aggregating traffic from multiple sites of a customer in a particular city/SSA is followed.
[1] There should be dedicated Aggregation router for each customer for a
particular city /SSA
[2] The option of deployment of Aggregation router be explored under following
conditions.
(a) The number of sites to be connected in VPN for a particular customer
in a particular city / SSA is three or more
(b) The bandwidth requirement at each site under reference is 64 kbps
/128 kbps
(c) The city/SSA under reference should not be covered under list of 71
cities where NIB-II node is planned.
[3] The Aggregation router can be any normal router with multiple low speed
sync serial ports (upto 128 kbps) and at least one high-speed sync serial port (2
Mbps) for connectivity to nearest physical node.
[4] The Aggregation router thus deployed will act as a Customer Premise
equipment (CPE) for the edge router of VPN network
The Core routers in A1 nodes viz Delhi, Mumbai, Chennai, Kolkatta and Bangalore will
be connected on mesh topology on STM16. The Core routers in 9 nodes viz A2 Node
(Total 3) at Pune, Hyderabad & Ahmedabad and A3 Nodes (Total 6) at Lucknow,
Jullundhar, Jaipur, Indore, Ernakulam & Patna are connected to A1 Nodes in dual mesh
with link bandwidths of STM-16. The core routers in A4 nodes (Total 10) at Chandigarh,
Allahabad, Guwahati, Ranchi, Bhubaneshwar, Coimbatore, Raipur, Mangalore, Nagpur
and Vijayawada shall be dual homed over STM-1 links to the nearest A1/A2/A3 nodes.
There will be four edge routers in A1 Nodes, three edge routers in A2 Nodes, Two edge
routers in A3 Nodes and one edge router in A4 Node. One of the edge router in each A1,
A2, A3 and A4 Node will be collocated with the Core router in the above node,
connected through gigabit Ethernet Interface. The remaining edge routers in A1, A2 and
A3 nodes will be geographically distributed in each city to serve different pockets
interconnected on a SDH metro-ring fibre network with STM-1 interfaces for each edge
router
One number of Edge router will be deployed in 21 B1 nodes and 26 B2 Nodes. The edge
routers in B1 and B2 nodes will be dual homed to the core at A1, A2, A3 and A4.
The core routers in A1, A2 and A3 cities are proposed to be interconnected via the
DWDM systems .
The interconnectivity of core routers in A4 nodes and edge routers in B1 and B2 cities is
via STM-1 links connected through SDH rings
The following services shall be offered to customers using the MPLS based IP networks.
i.) Layer 3 MPLS VPN Services
• Intranet-Managed & Unmanaged
• Extranet Managed & Unmanaged
• Internet Access services
ii.) Layer 2 MPLS VPN Services
• Ethernet over MPLS
• Frame relay over MPLS
• PPP over MPLS
• Cisco HDLC over MPLS (Optional)
• VPLS (Virtual Private LAN service)
• Layer 2 Any-to-Any Interworking (Except ATM)
iii.) Encryption Services
iv.) Multicast Services
v.) Firewall Services
vi.) Network Address Translation (NAT) Services
9 Making the service very simple for customers to use even if they lack experience
in IP routing, alongwith Service Level Agreement (SLA) offerings.
The NIB-II Access Gateway platform shall provide Internet Access at any time of
the day, from any place, using any device such as PC, analog phone, wireless or mobile
phone, or Personal Digital Assistant (PDA). The Access Gateway Platform(AGP) is built
around two distinct platforms, one supporting a unified dial network architecture that
delivers voice, data and fax services through an open programmable gateway and the
other supporting a unified always-on Internet Access platform on Ethernet-IP. The open
programmable dial gateway is dimensioned to provide 80% plain data RAS and 20%
Universal RAS ports.
The solution shall be based on open interfaces that can be configured by use of network
elements of a third party.
13.4.3 NIBII-Project2.2
This Project is for the deployment of broadband services in 198 cities with 69 important
cities where Digital Subscriber Line Access Multiplexer (DSLAM) shall be deployed.
The cities are categorized under A1 (3 cites), A2 (3 cites), A3 (6 cites), A4 (10 cites), B1
(21 cites), B2 (cites), and others (129 cities). Delhi and Mumbai will not have any
broadband equipment under Project 2.2 of NIB-II.
• Primary source of Internet bandwidth for retail users for application such as Web
browsing, e-commerce etc
• Multicast video services, video on demad etc through Broadband Remote Access Server
(BRAS).
• Allow wholesale BRAS ports to be assigned to smaller ISPs through the franchises
model wherein the later has a separate network of DSLAMs, AAA, LDAP through a
revenue scheme of BSNL.
• Dialup VPN (VPDN) user connects to NIB-II through the Narrow band RAS and
connected to its private network through a secure L2TP tunnel established between
Narrowband RAS and Broadband RAS.
• Support for both prepaid and postpaid Broadband services.
1. All 198 cities will have DSLAMs and Tier2 LAN switches (for aggregation of
DSLAM).
2. All A cities and Noida (Total 23 cities) will have one BRAS, one SSSS and one
Tier 1 LAN switch.
3. There will be no BRAS, SSSS and Tier 1 LAN switch in any other cities. All
DSLAM are initially aggregated using Tier 2 LAN switch, through one pair of
dark fibre.
4. The 240 port DSLAM will have two numbers of FE interfaces.
5. The FX or GBIC module in DSLAM and LAN switch should be capable of
driving up to 10kms on a single mode fibre. The SX or GBIC module in LAN
switch used for connecting Tier2 to Tier1 will support 40kms distance.
6. In bigger cities like A1, A2, A3 and A4, one BRAS per city will be deployed.
There will be no BBRAS at B1 and B2 cities.
7. The DSLAMs in B1, B2 and other lower hierarchical cities will be aggregated
through Layer 2 switches, and will be connected to the nearest BRAS of A cities
on Ethernet over SDH.
8. The BRAS shall terminate the PPP sessions initiated by the customer and extend
the connection further to MPLS VPN/Internet as desired by the customer.
9. The DSLAM will in general be colocated with existing PSTN exchange, which
provides last mile access to customers over copper wire up to average span
lengths of 3 kms.
10. All DSLAM will be aggregated through Fast Ethernet (FE) interface except 480
port DSLAM, which will be aggregated through Gigabit Ethernet (GigE) interface.
Internet
Tier 1 Gigabit Ethernet LAN Switch Planned along with Interfaces per Switch
13.4.4 NIBII-Project3
Enterprise Management System (EMS)
[Messaging and Storage Service Platform, Provisioning, Billing & Customer care,
Enterprise Management System (EMS) and Security System.]
Brief Description of the Messaging and Storage Service Platform:
1. This shall envisage design and up gradation of the current messaging system to
grow from the existing infrastructure in NIB-I supporting 650,000 users to
support the increasing user base.
Internet
2. The Core messaging system shall be the heart of NIB-II that will enable BSNL to
add users across varied value added services. The salient aspects of the projects
are summarized as follows:
(i) Setting up proven, robust, scalable Messaging Solution with best in class
security components.
(ii) Roll out across the country supported by 5 Messaging & associated storage
systems at Delhi, Mumbai, Bangalore, Chennai and Kolkata.
(iii) Designed with High Availability architecture with no single point of failure
The proposed solution shall consist of the following components with the items of
functionality listed below:
(i) Messaging
a) DNS, AAA
b) MMP
c) LDAP (Consumer, Replicator Hub, Primary and Secondary)
d) SMTP IN & OUT
e) Messaging Servers
f) Address Book Servers, etc.
Internet
(ii) Storage
a) SAN Switch & SAN Storage
b) Tape Library
c) Staging Servers, etc.
Chapter 14
• The Front end and Back end used for each package
• Salient Features in each package
• Modules
Objectives
After completion of this module you will be able to know:
• Front end-JAVA
• Database-Oracle 8i
• Operating System-Sun Solaris Unix.
• Language- C, C++, JAVA, JAVA Script
In BSNL there is four Billing zones namely BSNL West, BSNL East, BSNL
South, and BSNL North. For example for BSNL west Zone the billing centre is at
Pune.
14.1.3 Modules
Arbor/OM is an order entry and management system that supports order handling
and workflow management activities for products and services in converging
telecommunications markets.
Arbor/OM operates in tandem with Arbor/BP, as the completed order data is used
for the provision of products, services, and accounts for future billing activity.
The Service Provisioning Module acts as a interface between OM and the Switch.
The Order from the OM Module is sent to the switch through the Service Provisioning
Module. SP is also part of the Mediation Module. SP is designed in CORBA.
(Component Object Request Broker Architecture)
Arbor/BP is the designated Rating and Billing Engine and will perform rating and
billing services offered by each of these circles to its subscribers.
The rating subsystem of Arbor/BP requires the mediation device to do the following:
Internet
Send one and only one usage event for one billable call. Essentially this means
mediation device will forward all billable calls to billing system, in case of exceptions
such as long duration calls which will be consolidated and sent as one billable record to
the billing system.
The source of collecting usage records i.e. the network elements may vary based
on the functions they handle. The various network elements that BSNL has are MSC,
SMSC, VMS, WAP, and IN. Therefore, the mediation device must have the ability to
connect to every network element and collect usage from it.
The IN platform will provide Pre-Paid, VPN and ARS (Advanced Routing
Services).Pre-paid Cdr’s are pre-rated, as they will be rated on the IN platform and
passed to Arbor/BP as pre-rated CDRs. Thus, no rating will be done by Arbor/BP for pre-
paid subscribers; however the CDR is still passed through the billing system and kept for
historical reference.
VPN and ARS CDR’s will be sent to the Arbor/BP from the IN platform via the
SSP.
DoT Soft is the first integrated Telecom Software Application in BSNL comprising of
Billing, Commercial, FRS & Directory Enquiry.
Developed by in-house group of Telecom Professionals of AP Telecom Circle, the
package was initially implemented at Guntur in 1997 making it the first Telecom District
in BSNL to have an integrated customer care and billing software.
Dotsoft is integrated with other systems such as call centre, BSNL portal (www.bsnl.in).
BSNL portal enables online bill payments and availability of duplicate bills for its
customers.
In addition, Dotsoft, AP has a tie-up with e-seva, the most popular e-governance project
of Andhra Pradesh government.
BSNL portal - www.bsnl.in, provides customers with a complete online delivery, review
and payment solution…all at a single mouse click.
application entry for WLL connections-Fixed & Mobile (permanent, service). Certain
application details can be changed. All India wait list transfer - Incoming & Outgoing.
2. Waitlist:- For all landline (except casual, temporary & service). For WLL-mobile
(permanent & service). Certain waitlist details can be changed. Out of turn and All India
shift incoming connections can be centralized / decentralized. Waitlist process for
landline connections (except casual, temporary & service). Waitlist entry is possible
through the offline mode also for landline connections.
3. Phone number store:- Phone numbers can be created for all valid levels and can be
marked reserved/blocked.
4. Messages to field:- Messages can be sent by CO to all field units for priority execution,
suspension, return back, continue etc.
5. Advice note release:- Capacity allocation to be done before bulk release. Advice notes
can be bulk released, single release, cancelled & revised by respective CO for land line
connections. For WLL, the release is single for cent/decent. Centralized release for out of
turn and AIS incoming cases is possible.
6. Advice note routing:- Routing is automatic to the concerned field officer (Outdoor /
MDF / Indoor ). For WLL mobile the routing is to Indoor only. For WLL fixed the
routing is to outdoor & indoor.
7. Advice note completion:- Completion of advice notes is online for all landline (except
ISDN) and WLL connections. However it is possible to complete manual released
/ system released advice notes through the offline mode. For ISDN connections, the
completion is only through the offline mode.
8. Subrouting:- COs, DEs-External, AEs-Outdoor, MDF, Indoor, Test desk can delegate
their work to their subordinates without disclosing their password.
9. Request registration:- Requests for working lines activities can be registered online.
The requests can be approved / suspended / cancelled by CO or referred to AO. After
approval, the advice note is generated.
10. Raise D/N:- CO or AO can raise demand note for any activity.
11. Level change:- Level change operations can be done with/without meter change.
12. Area transfer:- Area transfer can be done for a single number or in bulk.
13. Disconnections:- The disconnections for non payment are initiated centrally and flow
to AO. After approval, the flow is to Indoor. Reconnections are initiated by AO and then
flow to Indoor. No advice notes are released. These operations are possible through the
offline mode also.
Internet
14. Closures:- The closures for non payment are initiated centrally and flow to AO and
then CO. Advice notes are generated by CO which flow to the field. Reconnections are
through the request registration module.
15. Fault booking:- This is done online centralized for the SSA. Then the complaints are
routed automatically to the respective initial testing operators at MDF.
16. Fault routing:- Based on the initial test results, the fault is routed to the corresponding
SFC position (lineman at outdoor, indoor, MDF, cable). After the fault is rectified, it is
routed to the final test position.
17. Fault clearance:- The fault is checked at the final test position. It is either cleared or
sent back to SFC position.
18. Bulk Billing:- Billing can be done for all landline, ISDN, Centrex & WLL phones
(except casual). The billing can be done for some or all exchanges. Call records error
generation and clearance is possible. Unaddressed bills are generated for phones not
listed in the commercial database. Group billing is possible for grouped phones. It is
possible to bill deposits also.
19. Single Phone billing:- This is possible for any past period, future period or from any
past date to current date.
20. Billing periodicity:- Billing can be done monthly for landline(except STD-PTs), WLL,
Centrex, ISDN phones. Bi-monthly billing possible for all landline phones (except PTs),
WLL & Centrex. STD PT billing is fortnightly.
21. Discounts:- Individual bill / Group bill discounts are possible. Discount on
installation charges possible.
22. Bill operations:- A bill can be cancelled, given instalments, disputed or written off.
Instant & Final bills possible for closed connections. Bill adjustments, pay-by-date
extension can be done before payment for a single bill.
23. Bill payment:- Online payments can be done for all bills including group bills. This is
authorized to a specific cashier for that day only. After the time expiry of the counter, the
daily list is generated and tallied. The AO will then close the counter through a counter
close module. Online payment processing is then done. Offline payments entry &
processing are also possible through batch control. Receipt cancellation is possible.
Surcharge carry forward, waival is possible through authorization.
24. Trunk calls:- Trunk call / Phonogram entry is possible. Trunk rate evaluation is
automatic.
26. Ledgers:- Ledgers are generated for revenue, service tax and surcharge.
Internet
27. Voluntary deposits:- These deposits are adjusted in the bill. Interest calculation
module is also available.
28. Dishonoured cheques:- Bounced cheques can be entered in dotsoft to nullify the
payment.
30. Reports:- Various reports are possible on all customer related data.
31. Dotsoft Mail:- Dotsoft users can use this mail facility and chat even.
By this DoTSoft Package all the above steps are made online. Commercial online
reduces the headache of file management between various sections. Whenever a
Customer Pays money for new connection, Advice Note is released online without
any delay and the new connection is provided immediately on demand.
An integrated system such as DoTSoft ensures better customer satisfaction and
transparency in BSNL services.
14.3 TVARIT
14.3.1 Basic Details
TVARIT means immediate and this package is to avoid the delay provisioning of leased
lines all over the country.
Using this package we can do lot of things related to leased lines like
Fleet Management System is a web based software application. The design and
development of Fleet (Vehicle) Management System (FMS) software for BSNL was
done by O/o CGM IT Project Circle, BSNL, Pune. The location of Web/Database server
of FMS application is at Trivandrum, IT Cell, BSNL, Kerala Circle.
The package is designed in such a way that it aids in maintaining the hierarchical
design of SSA, Circle and BSNL HQ. All the information fed at the SSA level can be
forwarded to Circle Office. The Circle Office can feed the information about the vehicles
at Circle Office and receives the information from its SSAs/Units and then all these
collective data regarding detailed information of departmental vehicles and a brief
information about hired vehicles (no of hired vehicles and expenditure on them) in Circle
can be forwarded to the BSNL HQ.
Internet
• Front end-Unix
• Database-Oracle 9i
Internet
This package is used to generate PSTN bills from the meter reading of the
individual exchanges. This software reads the meter reading from the binary format
CDRs. The CDRs are collected from various switches in MOD or cartridge at periodic
interval. For one SSA one Billing centre will be there.
Gross metered calls are taken from the Open Meter Reading and Closed Meter
Reading.Usage charge is calculated from the Gross Metered Calls by applying the Rating
Engine. Accordingly bill is generated for every Consumer Number.
from anywhere in the BSNL network can access the system located at Trivandrum
through Internet. User-friendly interfaces are provided for entering data and any report as
per requirement can be generated. The application follows three-tier architecture for
BSNL, Circles and SSAs respectively.
¾ Separate input forms are available for inputting one time data (Closing status for
previous year ending) for DP, HRD, UP (Circle/SSA Administrators are only
permitted to input this data)
¾ It is a two stage process.
¾ In first stage data flow is from SSAs into central data store. In the next stage data
is processed based on the selected SSA/Circle/ BSNL HQ, Month and Year for
generating the Reports.
¾ Before storing the data (inputted by end users) into database, package takes care
of validation and correctness of the data, as it is required for generation of correct
MIS report.
¾ End users (SSA level) inputted data is stored in tables and are maintained Report
wise like. QPI, DP, UP, HRD etc., in a single MIS Database.
¾ Each SSA Data is stored in the database uniquely.
¾ Each row is identified with the Circle name, SSA name, month and year.
¾ For avoiding data duplication and maintaining data consistency normalization
techniques are used.
¾ The basic data used for generating the MIS Report at all levels and is strictly
adhering to the format of MIS supplied by BSNL HQ.
¾ Completion status of Form can be viewed and modified by Module Level users.
¾ Module can be viewed and modified by SSA Level Administrators and viewed by
users at SSA.
¾ All the Modules of all SSAs of a Circle can be viewed by respective Circle
Administrator and Users at Circle.
¾ All the reports SSAs and Circles can be viewed by Administrator and Users at HQ.
¾ Application generates MIS reports dynamically based on SSA, Month and Year of
selection.
¾ MIS report is available at the following levels:
o Form Level Report
Internet
The package envisages the total gamut of HR activities including staff details,
transfers, training, promotions, leave etc.
Staff master comprising of:
¾ Staff details
¾ Absorption details
¾ Police verification
¾ Training detail
¾ Present, Home town Address
¾ Career history
Internet
Creation of Units.
Attaching sections to unit.
Internet
Internet
Connectivity Diagram:
Internet
14.8.3 Modules
1. Head of Accounts
¾ Groups
¾ Types
¾ Major Heads
¾ Minor Heads
The Head of Accounts view is provided to all users.
The privilege is given only to the system administrator.
2. Estimate Masters
¾ Group
¾ Type
The privilege is given only to the system administrator.
3. Item Masters
Item Category - Broadly classified according to inventory heads like Switching
Equipments, Lines and Wires ,UG Cables, battery etc..
4. Consignee Master
¾ Helps in the preparation of Purchase Orders released from Circle or SSA.
¾ This facility is extended to all the users with Purchase Order
Management. This is a pool of officers from which consignee to a particular
Purchase Order is selected by Circle/SSA.
¾ Consignee addition by the SSA is compulsory since this is required for Circle
Purchase Order Preparation.
9. Tax Master
¾ Different taxes applicable to BSNL and pertaining to each circle can be entered
through this link.
¾ The privilege is given to each circle administrator.
Care should be taken to see that the in charge of the store depot and the consignee of the
Purchase order released from circle/SSA should be the same, otherwise the system will
not give permission to account the items in a store depot.
Internet
Chapter 15
ATM
(ASYNCHRONOUS TRANSFER MODE)
Contents
• Background information on ATM technology
• Difference between STM & ATM
• ATM protocol
• Different switching
• ATM interfaces and connections
• ATM network architecture
• ATM type of switches
• ATM cell format, UNI/NNI format
• ATM RM & layer functions
• ATM benefits
• ATM switch architecture
• ATM services
• Underlying transmission system for ATM
Objectives
After completion of this module you will be able to:
15.1 Introduction
1st generation switches are dedicated to specific purposes such as telephony, facsimile
and low speed data transfer used circuit switched telephone network. So high-speed data
transfer over this network is not possible due to lack of bandwidth, flexibility, quality of
transmission media and equipment. Then for the purpose of high-speed data transfer,
another network called packet switched network came into existence.
ITU-T (the new avatar of CCITT) set new standards for public telecom network. In 1984,
ITU-T defined a new method called 2nd generation switch known as ISDN " a network
that provides end to end digital connectivity to support a wide range of services including
voice and non-voice service, to which users have access by a limited set of standard
multipurpose UNI". For this, 2 interfaces called BRI or BRA (192Kbps) and PRI or PRA
(2.048Mbps) are defined at the basic rate of 64Kbps. By this, maximum transmission is
restricted to 2Mbps only.
With the basic bit rate of 64Kbps, the network can offer a maximum of 1.544Mbps
(called T1 link) or 2.048Mbps (called E1 link). So, such a type of working is called N-
ISDN. However with the concept of LAN, transmission of images with good resolution
may require higher bit rates. This leads the new conception and realization of 3rd
generation switch, based on B-ISDN. ITU-T in 1993, defines B-ISDN as "a service or
system requires transmission channels capable of supporting rates greater than PRA or
PRI".
Internet
The underlying technology that makes B-ISDN possible is ATM (Asynchronous Transfer
Mode).
Mode means specific method or way.
Transfer means transmission and switching aspects. Switching by means of Cell
Switching. Transmission by means of Primary rate of 155.52Mbps or above.
Asynchronous means information packets will be transferred based an irregular
or random occurrence pattern as they are filled according to the demand.
Hence "ATM is a method of transmission & switching of information in the form
of packets which may occur an irregular occurrence pattern as they are filled according to
the demand of the user".
Internet
15.3 STM
Y X
B Y A X
M
B A U
X
Fig-1
In the above Fig-1, even though the Cell X and B are empty, they will also be
Multiplexed and sent on the output side. By this, the bandwidth is not used effectively.
15.4 ATM
Y X
Y A
M
B A U
X
Fig-2
In the above Fig-2, the empty Cells X and B are not at all transferred towards
output side. By this, the output bandwidth is effectively used. This technique is used in
ATM switching
Packet switching technology is used.
Statistical multiplexing (another name of Asynchronous Time Division
Multiplexing) is used.
Cell Relay method is used.
Hence ATM is a standardized technology that enables the convergence of a
variety of services such as:
Internet
ATM is the protocol designed by ATM Forum and adopted by the ITU-T. ATM
can be thought of as the “Highway” of the information Super highway.
So ATM can do every thing that N-ISDN can do but with better quality.
In ATM System, the packet size is fixed to 53 octets known as a CELL. Any type
of traffic viz Voice, Data, Video, Synchronous or Asynchronous, Short or Long packets
can be converted into ATM Cells by a process known as emulation.
So ATM can also be called as Cell relaying technology or Cell switching
technology.
Can be called as B-ISDN services switch.
Primary rate of transmission in ATM is 155.52Mbps.
Circuit switching create a direct physical connection between two devices such as phones
or computers. As in Fig-3, devices A & G are connected by the switches 1,2 and 4 via
path I and III. Circuit switching is mostly used at the physical layer of OSI Model
D
II 3
A
E
I
B 1 2
F
C III
4
G
Fig-3
For Data communication Packet switching technology was designed. User data are
packetized and sent packet by packet using the path in shared manner. Two different
approaches are available under packet switching. One is called Datagram approach and
second is called Virtual circuit approach. The latter is used in ATM.
The identifier that is actually used for data transfer in Virtual circuit approach is
called the Virtual circuit identifier. A VCI is a smaller number that only has switch scope.
It is used by a frame.
When a frame arrives at a switch, it has one VCI. When it leaves, it has another
VCI. Fig-4 shows how the VCI in a data frame changes from one switch to another
Internet
VCI VCI
Switch
Data 21 Data 88
X
Fig-4
ATM or B-ISDN offers 2 types of connections called PVC & SVC and ATM services are
connection oriented.
A source and a destination may choose to have a dedicated virtual circuit. In this case, the
corresponding table entry is recorded for all switches by the system administrator. An
outgoing VCI is given to the source and an incoming VCI is given to the destination. The
source always uses this VCI to send frames to that particular destination. The source
always uses this VCI to send frames to that particular destination. The destination knows
that the frame is coming from that particular source if the frame carries the corresponding
Internet
incoming VCI. In a simple word, PVC is like a Hotline/P Wire/ Point to Point/ Leased line
and the nature is static. Fig-5 shows the PVC setup.
31 41 51
A x x B
11
Data 14 21 Data 54
22
x
Data 34 Data 44
Incoming Outgoing
Fig-5 Port VCI Port VCI
21 34 22 44
If a source needs connection with several destinations or any other destination, it needs a
PVC for each destination which is costly. An alternative approach is the SVC. So SVC
creates a temporary, short duration connection which exists only whenever data are being
transferred by the end users. In other words, this is dynamic in nature. This approach
requires a series of action called connection setup, setup acknowledgement, data transfer
and tear down phases. ATM supports both types of connections
ATM network consists of access devices called the end points, available at user end, are
connected through a interface called UNI to the ATM switch. Another ATM switch of the
network is connected through an interface called NNI. The architecture is shown in the
Fig-6.
Internet
UNI UNI
D
NNI NNI
A
Switch Switch Switch
E
B 1 2 3
F
C ATM
Network
End End
Points Points
Fig-6
Connection between two end points is accomplished through transmission path (TP),
virtual path (VP) and virtual circuit (VC).
A transmission path (TP) is the physical connection (wire/wireless) between an
end point and a switch or between two switches.
A TP is divided into several virtual paths (VPs). A virtual path provides a
connection or set of connections between two switches.
Within a VP, many circuits called virtual circuits (VCs) will be available which is
used for connection.
Cell networks are based on virtual circuits. All cells belonging to single message
follow the same VC and remain in their original order until they reach their destination.
TP, VP and VC are shown in Fig-7.
Internet
15.15 VPI/VCI
In a virtual circuit network, to route data from one end point to another, the virtual
connection need to be identified. For this purpose, the designer of ATM, created a
hierarchical identifier with 2 levels called virtual path identifier (VPI) and virtual circuit or
channel identifier (VCI). The VPI defines the specific VP and the VCI defines a particular
VC inside the VP. Both the connection identifier are shown in Fig-8.
VC1
VC2
VP1 VC3
VP2
VP3
Most of the switches (Core switch) within typical ATM network are routed using VPI
(VP switch). (i.e) The switching can be taken place by changing the VPI but keeping VCI
within VPI intact. Such switches are called VP switch. If switching can be taken place by
changing both the VPI and VCI, then such switches are called VC switch. The switches at
Internet
end points (Edge switch) of the ATM network use both VPIs and VCIs (VC switch). Both
switches are shown in Fig-9.
VP and VC Switching
VC Switch
VCI 1 VCI 2 VCI 3 VCI 4
VCI 1
VPI 1 VPI 3 VCI 3
VCI 2
VCI 1 VCI 1
VPI 4 VPI 5
VCI 2 VCI 2
VP Switch Port 3
Fig-9
At present, rate of transmission is 155Mbps called primary rate. Higher order is also
possible in multiple of 4 times.
ATM Cell consists of 2 fields called Header Field and Information Field as in Fig-10.
Fig-10
Internet
Header field is different for UNI and NNI in the ATM network
15.18.1.1 GF
FC ( Generic Flow Control - 4 bits)
It is used to assist the customer network in the cell flow control, but not carried
through the network.
This label identifies a particular virtual path and virtual channel or circuit on a
transmission link. The switching nodes use this information and along with the routing
information established at connecting setup, routes the cells to the appropriate output
ports. The switching nodes changes the input value of VPI/VCI fields to new output
values. Since VPI field is 8 bits (at UNI) and VCI has 16 bits field, a host can have
theoretically 256 bundles, each containing up to 65,536 circuits.
8 VPI bits provide 28 = 256 bundles
16 VCI bits provide 216 = 65,536 circuits
Internet
Having one of the two values ‘0’ or ‘1’, the CLP indicates priority of a cell when
the network element has to make the decision to drop the cell when its throughput
bandwidth exceeds its transfer rate.
In congestion situations, cells with CLP =1 may be dropped and not transferred at
all.
It identifies the payload type i.e. whether the cell payload contains user data or
network information and also provides congestion identification.
HEC code detects and corrects a single bit error or detects multi bit errors in the
header field. It is based on CRC-8 with the devisor polynomial as X8+X2+X+1.
Internet
The Information Field does not contain all the 48 octets of user data. One or two
octets are dedicated for administration and call sequence purpose.
The first octet (after the overhead bits or Header octets) consists of three sub
fields.
The first bit is known as the convergence sub layer indicator (CSI). It is used to
indicate whether the pointer is used or not.
The next three bits are sequential number (SN) from 000 to 111 used to detect the
type of cells.
The next three bits are the Sequence Number Protection (SNP). It performs error
detection on the CSI and SN sub fields.
One bit is not used at present.
The second octet is optional and is used as a pointer to mark the start of long
encapsulated messages.
48-octet information field is only scrambled.
Internet
15.19 Format
Management Plane:
All the management functions that relate to whole system are located in the
management plane, which is responsible for providing coordination between all planes.
Two types of functions i) Layer Management ii) Plane Management.
Layer Management:
1.Management functions relating to resources and parameters residing in its
protocol entities.
2.Handles specific OAM information flow for each layer.
Plane Management
Management of all the planes for its proper functions.
Control Plane
Responsible for the call control and connection control functions.
These are all signaling functions for setup, supervise and release a call or
connection.
Internet
User Plane
Deals with transport of user information, flow control and recovery from errors.
ATM standard defined 3 layers. They are from top to bottom, the AAL (ATM Adaptation
or Application Layer), the ATM Layer and the Physical Layer as in Fig-11
AAL Layer-3
ATM Layer-2
PHYSICAL Layer-1
Fig-11
Normally the end switches use all the 3 layers while the intermediate switches use
only the bottom 2 layers as in Fig-12
ATM ATM
AAL
AAL
PHYSICAL PHYSICAL
ATM
ATM
PHYSICAL
PHYSICAL
X X
End Switch Switch End
Point Point
ATM N/W
Fig-12
Internet
This Layer deals with issues related to physical connectivity of the transmission
medium and transmission of ATM Cells.
This layer is divided into 2 sub layers called
1.Physical Medium Dependent (PMD)
2.Transmission Convergence (TC)
Functions Of Physical Medium
It is the lowest sub layer and includes 2 functions namely
1.The PMD functions.
2.Bit timing functions.
PMD functions provide the bit transmission capability, including bit alignment.
Line coding and if necessary, electrical/optical conversions is performed by this layer. In
many cases PM will be an OFC. Other media such as coaxial and twisted pair cables are
also possible. The transmission functions are medium specific.
Bit timing functions are the generation and reception of waveforms suitable for
the medium, insertion and extraction of timing information, and line coding if required.
The TC sub layer performs 5 functions namely
1.Transmission frame generation & recovery.
2.Transmission frame adaptation is responsible for all actions to adapt the Cell
flow according to the payload structure of the transmission system (interface). Two
interfaces are defined namely (1) SDH based interface or Byte structured interface and (2)
Cell based interface.
Under SDH based interface, 155.520Mbps (STM-1) & 622.080Mbps (STM-4)
rates are recommended for UNI.
3. Cell delineation is the process, which allows identification of the Cell
boundaries.
4. HEC sequence generation/verification. This is the value for the 1st 4 octets of
the Cell header and inserts the result in the 5th octet HEC field. This is capable of
detecting and correcting single bit error & detecting certain multiple-bit errors.
Internet
5.Cell rate decoupling. The insertion & discarding of idle Cells is called Cell rate
decoupling.
It deals with flow issue of ATM Cells, Cell header related and path related issues.
Functions of ATM Layer
This layer is above the Physical Layer
This layer has got four functions:
1.Cell multiplex/demultiplex. VC and VP are multiplexed and demultiplexed.
2.VPI and VCI translation.
3.Cell header generation/extraction.
4.Generic Flow Control.
This layer lies between ATM Layer and Higher Layer. It has two functions.
1. Segmentation And Reassembly (SAR)
2. Convergence Sub layer (CS)
1) Service Specific Convergence Sub layer (SSCS)
2) Common Part Convergence Sub layer (CPCS)
AAL can be classified by four methods namely
1. Based on Timing. Timing between source and destination required or not
required. Real time services like voice & video required timing syn where as non-real
time services like data transfer not required syn.
2. Based on Bit rate. Bit rate constant or variable. Switched speech has CBR
where as packet transfer has VBR.
3. Based on Connection. Connection oriented or not.
4. Based on Services offered. 5 layers called AAL1 to AAL5.
Higher
Layer
AAL1 64Kbps Bits stream Packet size One Byte 48
Voice/Video in as 47 as Header
CBR Bytes w/o
Header
AAL2 No CBR, but low Short in 44 Bytes One Byte 48
bit rate & short packets data and 3 as Header
frame traffic like bytes
mobile services Header
Knockout switch, cross bar switch or single stage switch, shared memory switch, shared
medium switch, fully interconnected switch, space division switch, banyan switch or
multi stage switch, batcher-banyan switch and sunshine switch are the different type of
ATM switches. Batcher-Banyan switch is widely used
Internet
cells/sec)
The basic function of the ATM switching system is to route the cells from the input port
to the appropriate output port of the switch. The ATM switching system must contain the
function defined by the U-Plane, C-Plane and M-Plane of the B-ISDN PRM in addition
to relaying of cells. Also the ATM system should support & implement the traffic control
function based on ITU-T & ATM-F recommendations.
All these functions are distributed within the ATM system switch architecture as
in the Fig-13 with the following functional parts:
1) Input Modules (IMs)
2) Cell Switch Fabric (CSF)
3) Output Modules (OMs)
4) Connection Admission Control (CAC)
5) System Management (SM)
6) Muliplexer/Demultiplexer (Optional)
Internet
Non IM M
U OM
Native
ATM IM X
Switching
Network
(CSF)
Native IM OM
ATM
IM OM
Control
Fig-13 CAC SM
CAC
The signalling/control information is routed to CAC through CSF or from IM
directly. It performs the connection admission discussion and resource allocation for all
connections in the switch
SM
It is responsible for managing the entire switching system. It includes fault
management, performance management, configuration management, security
management, accounting management and traffic management by means of congestion
control. Also responsible to support Interim Local Management Interface for each UNI.
Mux/Demux
It is an optional item. It will be available only if non-native ATM devices are to
be interconnected with ATM switch.
Numbering Convention
It is defined as per ITU-T recommendation I-361 which says that:
Octets are sent in increasing order starting with octet 1. Therefore the header field
will be sent 1st followed by the information filed.
Bits within an octet are sent in decreasing order starting with bit 8.
So, for all fields, the 1st bit is the MSB.
CELL
A Cell is a block of fixed length. It is identified by a label at the ATM layer of the
B-ISDN PRM.
v) Unassigned Cell
vi) Meta signalling Cell
vii) OAM Cell
Idle Cell
This is inserted or extracted by the physical layer in order to adapt the Cell flow
rate to the available rate of the transmission system.
Valid Cell
This is a Cell with no header error or with a corrected error.
Invalid Cell
This is a Cell with a non-correctable header error.
Assigned Cell
This is a valid Cell that provides a service to an application using the ATM layer
service.
Unassigned Cell
This is an ATM Layer Cell, which is not an assigned Cell.
Meta Signalling Cell
This is used for establishing or releasing a switched virtual connection,
Administration and Maintenance of ATM node and the network channel connection.
Permanent Virtual Channel connection needs no Meta signalling.
OAM Cell
This is used for Operation & Maintenance.
ATM
Node
ATM
ATM SDH Node
Node RING
ATM
Node Fig-14
15.31 Conclusion
The key to efficient utilization of the ATM networks is the integration of multiple
services over a common infrastructure. Traffic management with QoS plays a significant
role. ATM is going in a big way to play in different flavor like BB etc. To support this,
various native ATM & as well as non native ATM protocols are defined.
Internet
Chapter 16
Contents
• Introduction.
• Circuit Switching.
• Packet Switching.
• Label Switching.
• MPLS Architecture.
• MPLS protocols.
• Traffic Engineering.
• Virtual Private Network.
Objectives
After the completion of the module, the trainee will be to know about
• Circuit Switching.
• Packet Switching.
• Label Switching.
• Evolution of the MPLS.
• Functions and features of MPLS.
• Function and features of VPN.
Internet
Circuit switch mainly supports the switching the voice paths. Digital spectrum is
divided into equal parts (64 kbps). Circuit switch uses these 64 kbps path for voice
switching. Voice samples of a particular conversation should reach the destination
sequentially through the 64 kbps digital path by maintaining maximum permissible delay
of 125 us, to avoid the loss of intelligence. In order to satisfy the above conditions,
switched path should be permanent until the end of the conversation. . Hence, the
routing becomes connection oriented. No other user also can intrude in that path. Also
the switched paths can be categorized according to the type of services and class of
services.
Example:-
Class of Services
Emergency Services Routes
Special Services Routes
Type of Services
Normal users (non priority users)
Prioritized users.
Then packets are arranged sequentially and then converted as message. Since the
packets are routed through different routes, this routing becomes connection loss.
Routing and no dedicated path is used between source and destination. Packet
switches are presently used in ISP Network.
The above techniques are used in Multi Protocol Label switching. Hence, MPLs
is the implementation of circuit switch model in the Packet switch area. MPLS
frame uses the various Data Link frames like ATM, Frame Relay PPP/Ethernet
etc. Since MPLS uses label switching and supports the multiple protocols, it is
called Multi Protocol Label Switching.
packets towards the destined CE. LER receives the multiplexed input from CE, and
extends the switched output towards the transit routers.
16.5.3 Label Switching Router
Label Switched Routers are basically working as transit switches in MPLS cloud.
It receives Labeled IP packets through the appropriate LSP. It analyses the Label bound
over the packet, consults the forwarding information table (LIB) and routes the packet
through the appropriately mapped out going LSP. When the LSR is routing the packets
from incoming LSP to outgoing LSP, it strips out the Incoming Label and assigns a new
label to same packet to ensure the security from the intruders. This process is known as
Label Swapping or Label Changing. MPLS Network architecture is as shown in the
diagram. Lines, shown between CE and LER carry the IP Packets bi-directionally.
16.5.4 Label Switched Paths
Within an MPLS domain, a path is set up for a given packet to travel based on an
FEC. The LSP is set up prior to data transmission. Lines, shown in the MPLS domain, are
the Label Switched Paths that carry labeled IP Packets between the routers. There are two
types of Label Switched Path. One is Static LSP and the other is Signaled LSP.
• Static LSPs
Static LSPs are configured manually on each LSR in the LSP. No signaling
protocol is used. To establish a static LSP, you configure the ingress LER, transit
LSRs, and egress LER, manually specifying the labels to be applied at each hop.
• Signalled LSPs
Signalled LSPs are configured only at the ingress LER. When the LSP is enabled,
RSVP signaling messages travel to each LSR in the LSP, reserving resources and
causing labels to be dynamically associated with interfaces. When a packet is
assigned to a signaled LSP, it follows a pre-established path from the LSP's ingress
LER to its egress LER.
LER receives destined IP packet 61.2.1.1 from the Customer Edge and selects the
correct label (5) from its LIB. It binds the selected label (5) according to the FEC over
the IP packet and sends it through the pre programmed LSP (2) towards the LSR 1. On
receipt of labeled IP Packet, LSR1 analyses label only and it will ignore the IP address.
It will consult its LIB for further routing. As the result it removes the incoming label (5),
winds the newly assigned label (3) over the IP Packet and sends it towards the LSR2 over
the assigned LSP (7). LSR2 consults its LIB and transmits the IP Packet after swapping
the incoming Label (3) with outgoing Label (10) towards the egress LER over the pre
assigned LSP (4). Egress LER stripes the label (10), goes through the destined IP address
(61.1.2.1) and hands over it to the correct CE.
Based on Class of service requirement: IP packets from different users are categorized
on the basis of class of services they are entitled and allotted with one Forward
Equivalence Class number .For an example, One FEC represents all the VOIP packets
received from different users and MPLS Domain a treats them equally.
Internet
Based on the prefixes of the IP addresses: FEC is assigned on the basis of the prefixes
of the IP address of the destination.
16.5.6 Label
A label in MPLS is used as the routing code like STD code in circuit switch. It
identifies the path a packet should traverse in the MPLS domain. Label is encapsulated
in a Data Link Layer 2 header. So, new layer is formed in between Network Layer and
Data Link Layer in OSI Layer concept. The name of the new layer is MPLS SHIM Layer.
Function of this layer is to bind the MPLS Label over the IP packet received from the
customer edge. Label contains the information about next hop address. Value of the label
is having local significance. So same label number can be reused in some other area.
MPLS Layer works between Network layer and Data Link Layer as shown in the
Diagram. Label binding and popping is done by the ingress and egress LERs respectively
while LSR does the Label Swapping.
• VPI/VPC of ATM, DLCI of Frame Relay are used as Labels, while they are
supported by MPLS.
Internet
• MPLS also supports the PPP. Shim Layer is created in between L3 header and L2
header in all LERs for the insertion of label to the IP packets received from
Customer Edge.
These are the obvious reasons for MPLS supporting these protocols. So data link
layers (such as frame relay or ATM), Layer-2 identifiers, such as data link
connection identifiers (DLCIs) in the case of frame-relay networks or virtual path
identifiers (VPIs)/virtual channel identifiers (VCIs) in case of ATM networks, can
be used directly as labels. The packets are then forwarded based on their label
value.
Labels are bound to an FEC as a result of some event or policy that indicates a
need for such binding. These events can be either data-driven bindings or control-driven
bindings. The latter is preferable because of its advanced scaling properties that can be
used in MPLS. Policy of label binding is based on
It achieved by stacking the label at LSR based on the instant of arrival packets through
the incoming LSPs. It is organized as a last-in, first-out stack. We refer to this as a "label
stack". Last label has 1 in the stack field, while others filled with 0 in the stack field.
16.6 Different types of protocols used in MPLS Networks
• Open Short Path first (OSPF) is the routing protocol, that multicasts the change
in routing table of a host to all other hosts with in the boundary of Network. In
MPLS Network, this protocol is used as Label Distribution Protocol between
peers. This protocol is one among the Interior Gateway Protocols (IGP)
• Border Gateway Protocol is also one among the routing protocol, which
provides loop-free inter domain routing between autonomous systems. An
autonomous system is a set of routers that operate under the same administration.
Here MPLS Domain becomes autonomous system. BGP is often run among the
VPN networks and MPLS Network.
• Protocol-independent multicast (PIM), which is used for multicast states label
mapping.
• Resource Reservation Protocol is not the routing protocol and works in
conjunction with other routing protocols to keep the Quality of Service with in the
MPLS cloud. It uses exchanging of labels pertaining to the services require time
management (on line services like Video Conferencing, IP Telephony etc. RSVP
provides the creation of Tunnels in MPLS Domain.
FEC–to-label bindings
This table contains the mapping information for binding the label over the IP
Packet based on the FEC. This table resides in LIB of LER.
.
MPLS architecture does not mandate a single method of signaling for label
distribution. It uses
Discovery messages – announce and maintain the presence of new router in the
network.
Session messages – establish maintain and terminate sessions between LDP peers
to exchange messages.
Advertisement messages-Create or change or delete mapping for FECs.
Notification messages – provides signaling error information.
Internet
• RSVP—used for traffic engineering and resource reservation. When the new VPN
/Video Conferencing/IP telephony user is created this protocol supports the
distribution distinguished Labels with in the MPLS domain, resulting with the
Traffic Engineered Tunnels which carry the distinguished user’s traffic.
• Protocol-independent multicast (PIM)—used for multicast states label mapping.
Some users may want to broadcast their messages to different users, this protocol
supports the distribution of multicast labels. As a result multiple of LSPs are
formed between single users to multi-user during the broadcast period only.
• BGP— VPN functions out side of the MPLS network. But it uses the MPLS
domain. Hence distinguished label is to be used when VPN- IP packet enters in
the MPLS domain. This protocol supports the distribution of such Labels.
• Hop-by-hop routing—Each LSR independently selects the next hop for a given
FEC. This methodology is similar to that currently used in IP networks. The LSR
uses any available routing protocols, such as OSPF, ATM private network-to-
network interface (PNNI), etc.
• Explicit routing—Explicit routing is similar to source routing, that contains all
the rout information. It uses the RSVP-TE signaling protocol. The ingress LSR
(i.e., the LSR where the data flow to the network first starts) specifies the list of
nodes through which the Traffic Engineered LSP traverses. The path specified
could be no optimal, as well. Along the path, the resources may be reserved to
ensure QoS to the data traffic. This eases traffic engineering throughout the
network, and differentiated services can be provided using flows based on policies
or network management methods. It uses the signaled LSP.
• Constraint-Based routing- to maintain the QOS, while routing the IP packets in
the MPLS network characteristics of the Path and Link to be selected.
Path involves much number of Links between the ingress and egress peers. Less loaded
path with minimum hops should be selected, while selecting the path.
Link involves the selection of next Hop and associated LSP. QOS dictates as follows.
1. Bandwidth of the LSP.
2. Permissible maximum delay. Whether the IP Packet should stand in the
Queue or it should be given priority.
CB- routing mechanism takes care of all the above. It uses the source routing concept
These labels not only contain information based on the routing table entry (i.e.,
destination, bandwidth, delay, and other metrics), but also refer to the IP header field
(source IP address), Layer 4 socket number information, and differentiated service. Once
this classification is complete and mapped, different packets are assigned to
corresponding Labeled Switch Paths (LSPs), where Label Switch Routers (LSRs) place
outgoing labels on the packets.
16.7 Traffic Engineering in MPLS
Traffic engineering is essential to optimize utilization of network. Network
resources should not be wasted. At the same time QOS is to be maintained for the users.
In MPLS Layer3 is overlaid with connection oriented switching function of Layer2. By
Internet
using this property, we can define Traffic Engineered dedicated paths for different
category of IP packets to maintain the QOS. Thus MPLS network is converted into
homogeneous to handle the heterogeneous type of traffic these dedicated paths are known
as Traffic Engineered Tunnels. MPLS uses the above concept. MPLS Tunnels are created
by using CR- Based Explicit Routing. Different type of TE Tunnels is created based on
the QOS of different users.
16.7.1 Inferences
1. LE Routers and LS Routers are not analyzing the entire IP address to select best
matching. Only they analyze the Label and LSP details that reduce the delay in
routing the data packets. Construction of Routing Table becomes simple. It looks
like circuit switch analyses the Rout Code only for routing the call.
2. LSPs and Labels are selected for routing according to the Forward Equivalence
Class of that IP Packet (category and priority) which is followed in the Circuit
Switch by the LSRs.
3. Since it is a connection oriented transmission protocol, loss of Packet is avoided.
4. Security is ensured, because of Label Swapping.
MPLs supports the following services efficiently with full integrity
Each VPN sight is provided with one router at the edge, that acts as the gateway
with the service provider network. It is known as”customer Edge”. Router, that
accommodates the CE is known as” Provider Edge”. There are two types of VPN model
basically.
In this case Provider Edge performs Layer 2 Services only, since Customer
Edge performs Layer3 functions. PE and P network is used to only provide the routing
and forwarding that supports the tunnel endpoints on between CE devices.
Peer VPN Model, in which CE is not having any routing resources for having direct
routing with other CEs. It has direct routing adjacency within the HUB. Out side of the
Hub it depends upon the Provider Edge. Here Provider Edge performs Layer3 function. It
works as shown in the diagram.
Internet
PE
PE
In such a way, a corporate can create his private data network by using public
MPLS network.
Internet
Chapter 17
• Overview of MLLN
• Structure of MLLN
• MLLN Network Management System
• Digital Cross connect
• Network Terminating Units
• Tellabs 8100 System Overview
Objectives:
• What is MLLN
• What is the structure of MLLN
• How a digital cross connect works
• What are the network terminating units
Internet
17.2 General
17.2.1 Leased Line.
A leased line is basically dedicated pair/pairs of copper wire connecting between two
points that is available 24 hours a day for use by a designated user (Individual or
Company). A synonym is non-switched line (as opposed to switched or dial up line).
A leased line can be a physical path owned by the user or rented from a telephone
company like BSNL/MTNL/VSNL. In earlier days these leased line equipment used to
be the same as that of the telecomm transmission equipment as the requirement of leased
line networks were low. With the burgeoning need for the leased line, now a days
Managed Leased Line Networks (MLLN) are being used
The MLLN also supports enhanced features such as Corporate Internet Access, Point to
Point Data, Point to Multipoint Data, LAN-IC, Hotline, EPABX Inter-connect, EPABX
Remote Extension and ISDN Line Extension, Virtual Private Network, etc.
Internet
B. Second stage Node: It will be located at major cities of a Telecom Circle, where
demand for leased line is high. It will provide following functionality:
(i) Connectivity to third stage nodes.
(ii) Leased line aggregation.
C. Third Stage Node: It will be located at smaller cities / towns of a Telecom Circle,
where demand for leased line is lower (near 10).
It will provide Leased Line aggregation.
17.3.1 Functional Requirements.
• NMS auto recognize any change of configuration of any network element. The change
of configuration or other settings locally at NTUs shall not be provided. All local settings
on VMUX and DXC shall be password protected.
• Re-initialisation of the network element shall be possible from NMS. This shall be
equivalent to manual start-up (physical jack-out and jack-in) of the network element. This
might be required in case of a complete or partial 'network element' stoppage due to
hardware/software failures.
• NMS has the capability to configure the bandwidth on demand of any leased line for
specified time of the day. This bandwidth on demand is configurable to all possible
programmable bandwidths of NTUs.
• NMS has the capability to assign priority to the leased line at the time of configuration.
This allows the high priority customer lines to be routed first to the standby route, in case
of failure of the main route.
• The configuration of the various network elements like building, viewing, and changing
is possible remotely from the central NMS. The configurations of the network elements
are stored at some place in NMS from where it can be retrieved in case of failure.
• It supports macro command facility to carry out the same kind of operation on a group
of interface by a single command.
• It is able to inform the operator about the problems occurring in the network elements
and their modules.
• The fault events are logged in a fault log file and are accessible when required through
database style facilities for information retrieval.
• The fault information provided contains type of network element, the time at which
fault occurred, time when it corrected.
Internet
• In addition to the fault information, it provides a brief explanation of the cause of the
fault and proposed corrective action to be taken to rectify the fault.
• The printout of active faults and fault log file is possible.
• It is possible to list:
(i) total number of active faults in the network.
(ii) Number of active faults in a specified network element.
(iii) Number of active faults in each of the faulty network elements.
• The equipments of MLLN is capable of reporting to a pre-specified destination on
detection of an alarm condition. Faults in the network elements, links & system generate
audible alarms also. The activation / inhibition of the audible alarm is controlled by the
Network Manager.
A. Status.
B. Control parameters.
C. Performance parameters.
D. Alarm information.
E. Configuration parameters.
F. Accounting and billing information.
• Data base hard disk memory is sufficient to store all the information in para above and
any other necessary system information for at least one month duration. This information
is auto backed up (or backed up by operator action) to secondary memory devices (off
line storage devices) before deleting / overwriting any portion of this information, on
completion of one complete month. Minimum, of 16 Gb of configured secondary storage
space (secondary hard disk / cartridges / tapes etc) is supplied.
• It supports the user identification and operator passwords with various privileges for
giving commands. It records all the login and logout operations done on the NMS. It is
able to set the time of expiry of the operator passwords. It supports password protection
for the for the network elements in the MLLN.
• Network Manager is able to create the operators' passwords. Network Manager is also
be able to control and limit operator's authorizations, rights and privileges. (Here
Network Manager is an account in NMS will full control, rights and privileges. Operator
created accounts by Network Manager for other personnel to help him in controlled way.)
• NMS allows changing of the password by the Network Manager for all accounts. NMS
allows Operator to change their own password. Change of password shall not required
system
• NMS provides for validation of source addresses of all the data that are coming from
the network elements. The data transport mechanism from network elements to NMS
centre has necessary in built facility for error checking and correction.
DACC or DXC is a large capacity cross connect device and is installed at different main
sites for providing VMUX connectivity. DACC is made up of Cluster Master control
subrack and slave subracks. Single Subrack (RXS-S) is used as slave subrack and its
units depend on the port capacity ordered. In addition to multiplexing and demultiplexing
the signal, the node takes also care of crossconnecting the signal. (The signal is first
demultiplexed into a lower level after which it is cross-connected and then multiplexed
again). A digital corss-connect (DXC) is a device used in transmission networks. It
separates channels coming from other devices and rearranges them into new channels for
output. A digital cross-connection means that the connection is set up and released by the
network operator, but not through subscriber, which is the case in switching.
(a) DXCs at metros (Delhi, Mumbai, Kolkata & Chennai) for maintenance regions will
be designated as Regional DXCs (R-DXC).
(b) DXCs of maintenance regions apart from Regional DXCs as above will be called
subregional DXCs (SR-DXC).
shall be connected to those SS-DXC under whose coverage area demand has grown, if
there are more than one SS-DXCs at a station.
SR-DXC to SR-DXC
Sub-Regional DXC to Sub-Regional DXC in the same region may initially be connected
by 1 E1 each.
REGIONAL NETWORK.
Multiple R-DXCs at the same station:R-DXC at metro stations consist of multiple DXCs.
Connectivity among these DXCs should be in mesh configuration of 2 E1s each to meet
the requirement of switching the time slots from a station connection at one DXC to the
destination connected on the other DXC.
R-DXC to SR-DXC:
• DXCs are to be connected to SR-DXCs in the same region by 3E1s each.
• R-DXCs are to be connected to all SR-DXCs in the distant regions also by 2E1s each to
start with.
• SR-DXC links are to be distributed among multiple DXCs at the metro stations to
MIinimize use of inter-DXC links at that station. At the start up it will not be possible to
connect SR-DXC to all of such DXCs. It may be done as and when additional links are
justified in future.
R-DXCs to SS-DXCs:
SS-DXC may also be connected directly to Regional DXC if the bandwidth consumed by
the circuits from the SSA to concerned Regional is more than 8 Mb. The E1s may be
optimally distributed among DXCs at SS-DXC side as well as R-DXC side such that the
use of inter DXC connectivity at the same station is minimized.
Internet
MLLN has to provide high reliability service and it is proposed to offer SLA for 99.5%
or better efficiency. Therefore, all the E1 links should be provided as rings wherever
available. In long distance network, E1, between same stations can be split into alternate
physical path of rings to the extent feasible. This will also save on port capacity required
for providing alternate path within MLLN.
Versatile Multiplexer (VMUS) is a small capacity cross connect device and is installed at
different sites for providing user connectivity. VMUX is made up of Basic Node, which
is the building block of the MLLN system. The VMUX is provided with two types of
interfaces to connect STU-160 ( SDSL product family used for point- to- point
connections) and CTU-S (HDSL product family modem , with line connection rate up to
4640 Kbit/s ) modems. The number of interfaces depends on the type of VMUX
configuration supplied. There are Four types of VMUXs supplied Viz. VMUX-Type I,
VMUX-Type-II, VMUX-Type-III/DC operation, VMUX-Type-III AC operation.
• The V-MUXs also have a digital cross connect capability and additional E1 ports have
been provided in the V-MUXs. Therefore inter-connectivity among V-MUXs in the same
city can be established using the spare E1 ports for extending local circuits.
• If there are more than one VMUXs in one exchange area, then depending upon
justification, one of the VMUXs can be dedicated to provide local circuits through direct
route to other VMUXs in the city. This will save DXC ports. However, SS-DXC
Internet
connectivity, where SS-DXC is available, shall also be maintained for setting up leased
circuits to VMUXs with which direct route is not available.
• Efforts should be made that no circuit should pass through more than three VMUXs.
However, use of more than four VMUXs in tandem for one circuit must be avoided.
• Routes shows as ‘standby’ are to be used for meeting incremental requirements of long
distance circuits from other V-MUXs if the direct routes are full and the other link has
spare capacity. This is done with the intention of saving port capacities. Protection path
can also be provided against failure of other links to SS/SR-DXC.
• V-MUX to DXCs connectivity in the same city/SDCA will serve two purposes: first to
set up circuits to other V-MUXs in the city and second to set up circuits going out of the
city.
• Direct V-MUX to V-MUX connectivity should be utilized for local circuits as per the
plan indicated above. However, for local circuits to other V-MUX areas where the
requirement is, say, less than 10 in the beginning, the circuits can be routed via the E1
link established with the DXC.
• Each V-MUX site in the city should be connected by at least two E1s to the SS DXC.
This connectivity may be distributed in case of multiple SS-DXCs. Number of E1s can be
increased as the requirement grows.
• If there are more than one VMUXs in the same exchange area, DXC connectivity may
be distributed on each of them.
• Base band modems (Network Terminating Units = NTUs) are usually customer
premises equipment (CPE). They are typical “last mile equipment.”
• NTUs can also be used for standalone point-to-point connections without the NMS.
• NTUs allow use of the existing telecom copper cables (twisted pair) for digital traffic
with medium distances (~5 km) and high speeds.
• NTUs must be capable of being managed from the centralised NMS for the following
essential parameters:
(i) Speed
(ii) Line loop testing
(iii) Diagnostic
• NTU on the DTE side must support the V.35/V.24/V.28/V.36/ V.11/G.703 data
interfaces.
• NTU must be functionally compatible for all features with the integrated Line drivers of
the VMUX ports.
• NTU should work with the line side interface, which is a built-in feature of the VMUX
and shall support the end to end manageability with NMS of the Managed Leased Line
Network.
• NTU must perform internal self-tests on power-up and provide a visual indication if an
internal failure is detected.
• After power-up, the NTU configurations shall be automatically downloaded from the
connected node.
Internet
Manageability
The concept of manageability is at present not a novelty, but rather a need. Today’s
leased line network is unmanaged. TRAI had advised the mandatory need of Service
Level Agreements (SLA), for every service being provided. This SLA is achieved with
statistics on an end to end status by MLLN. Today a degradation/disruption in service is
made known to the service provider on a subscriber notification. But in MLLN the
service provider can proactively detect and take corrective measures. In such an above
faulty status, MLLN feature of automatic re-routing of traffic ensures customer
satisfaction and also prevent a likely loss of revenue. Tomorrow, if the network customer
is to demand the service flexibility in SLA, the negotiable bandwidth during the different
time of the day, it can only be provided through MLLN.
Slave sub racks. The Basic Node is used as Slave sub rack to build the Cluster Node in
the MLLN system. The DXC comes in the following configurations.
DXC 32 Ports 1 1 0
DXC 64 Ports 1 2 0
DXC 64 Expandable to 128 Ports 1 2 2
DXC 96 Expandable to 128 Ports 1 3 1
DXC 128 Ports 1 4 0
DC 128 Expandable to 256 Ports 1 4 4
DXC 160 Ports 1 5 0
DXC 192 Ports 1 6 0
DXC 224 Ports 1 7 0
DXC 256 Ports 1 8 0
Each sub rack power supply unit receives –48 Volts DC through individual MCB placed
at the top rear side of each rack.
Configuration
64 Ports 96 Ports 128 Ports
Unit
Expandable to Expandable toExpandable to 256 Ports
128 Ports 128 Ports 256 Ports
RXS-CD 1 1 1 1
PFU-A 2 2 2 2
PFU-B 2 2 2 2
CCU 1 1 1 1
CXU-M 2 2 2 2
CXU-S 2 2 2 2
CXU-A 4 6 8 16
The E1 Cables are connected from QMH / G.703 – 120Q units in the Slave sub racks and
terminated on the DDF
VMUX is a small capacity cross connect device and is installed at different sites for
providing user connectivity. VMUX is made up of Basic Node, which is the building
block of the MLLN system. It is provided with different types of interfaces to connect
STU-160 and CTU-S modems. The number of interfaces depends upon the type of
VMUX configuration supplied. The different types of VMUXs are shown in the table
below.
The block diagram and power requirement of a VMUX rack is given below.
VMUX
Item
Type – I Type – II Type – III DC Type – III AC
RXS-S 1 1 1 1
XCG 1 1 1 1
PFU-A 1 1 1 0
PAU-10T 0 0 0 1
IUM-8 4 2 1 1
OMH 1 0 0 0
QMH / HCQ 0 1 1 1
Internet
QMH / G.703 2 0 0 0
N.B: The DXC and VMUX systems are installed in standard 19” coms rack with the
following dimensions.
Height: 2.048 m
Width: 0.596 m
Breadth: 0.325 m
DXC and VMUX equipments are designed to operate in a controlled environment. The
standards those are met by these equipments are as per ETSI 300019-1-3. The
environmental conditions that are required are:
1) Dust free clean environment.
2) A/c with temperature and humidity control.
3) A/c failure being exemptible for a maximum period of 2 hours at a time.
4) Operating temperature: 20 to 30°C.
The NTUs are located at customer premises and work on 230 Volt AC. Copper pair
connects the NTUs to the respective VMUX. The NTUs compatible with this network is
given below.
Chapter 18
Internet
DIAS
Contents
• Introduction
• DIAS Feature
• DIAS Architecture
• Interface
• Conclusion
Objectives
After completion of this module you will be able to:
• Understand the Introduction on DIAS
• Understand the
DIAS Feature
DIAS Architecture
Functional Components of DIAS
Interconnection of DIAS Components at CPE and SPE/APE
Internet
18.1 Introduction
The Direct Internet Access System (DIAS) jointly developed by Banyan Networks,
Madras and TeNet Group, IIT Madras, allows the Basic Telecom Service Providers to
provide simultaneously voice and always on Internet services or any one of the two over
the same copper pair of telephone lines to residential as well as corporate subscribers in
contrast to the existing PSTN (Public Switched Telecom Network) and ISDN (Integrated
Switched Digital Network) and Dial-up access.
DIAS is a high bandwidth Internet service and does not require any changes in the
existing cable network of the basic telecom system. It works with Existing Digital
Technology Switches and New Digital Technology Switches. It is scalable for advanced
applications.
This system provides the following two types of accessing speed to the customers.
a) 128 Kbps
b) 2048 Kbps
128 Kbps speed is provided by either only Internet access at a speed of 128 Kbps or
Internet access at 64 Kbps along with basic voice service at 64 Kbps.
2048 Kbps speed is provided by either Internet access at a speed of 2048 Kbps or Internet
access along with provision of 4 to 8 basic voice service. Internet speed is scaled down in
steps of 64 Kbps for off-hook condition of each phone.
i) Four IAN’s can be Cascaded for both data and voice to support 240 BDSU
or 80 HDSU subs
ii) Data cascading through Ethernet switch
iii) Voice cascading through E1 links
iv) Control cards and Power supply cards are working in Hot-Stand-By in each
IAN
18.1.1.5 General
i) CLI for IAN configuration
ii) RADIUS Client/Server S/W for AAA functions
iii) Blue Bill S/W for billing functions
iv) MySQL Data base
v) Computation Module for billing computing
vi) NAT support
vii) PPPOE support for Access with Radius Server
viii) DIAS View- Element Manager S/W (EMS)
ix) Stacking of IAN’s during concentration for Data and voice with
proprietary stack management protocol.
x) SNMP and MIB – II support for Network and Data management.
xi) V5.2 Support for Voice management.
xii) Secret ID between DSU and DIAS Server as Private key using
proprietary protocol for secured accounting and access information
xiii) Easy S/W up gradation from remotely using TFTP
xiv) Password sending on MD5 Digest (Encrypted Format)
xv) Dual Server Concept with Pulse Server Monitoring S/W
xvi) Supports 3 Subscriber Classification called Class-1,2 & 3. BSNL uses
Class-3 method. (Dynamic IP Address Allocation)
Interface
SPE /
CPE APE
Internet
Fig-1
18.2.1 CPE
Following are the equipments available at Customer Premises as in Fig 2.
a) BDSU (Basic Rate Digital Subscriber Unit)
b) HDSU (High Bit Rate Digital Subscriber Unit)
CPE
BDSU HDSU
Fig-2
18.2.1.1 BDSU
Basic Rate Digital Subscriber Unit is designed for the SOHO (Small Office Home
Office) users. It provides a permanent Internet connection at a maximum data rate of 128
Kbps, which drops to 64 Kbps dynamically when the telephone is in use for voice and
transparently goes back to 128 Kbps when the telephone goes Off-hook.
BDSU may be categorized as in Fig-3
BDSU-DA (BDSU for Data Alone) which provides always 128 Kbps speed of data and
BDSU-DV (BDSU for Data with Voice) which provides 128 Kbps/64 Kbps alternatively.
BSNL had chosen the latter one. Maximum 13 PC’s can be connected through
Hub/Switch with BDSU.
Internet
BDSU
Local
Local AC
AC Power
Power
BDSU- DA BDSU- DV
PC PC Phone
Fig-3
BDSU will have the following terminations /LED’s as in Fig-4 & Fig-5
6 5 4 3 2 1
1 2 3 4
Fig-5
18.2.1.2 HDSU
High Bit Rate Digital Subscriber Unit is designed for Corporate Subscriber with
maximum connectivity speed of 2048 Kbps.
Like BDSU, HDSU also may be categorized as (in Fig-6) HDSU- DA and HDSU-
DV. HDSU has Ethernet port (RJ45) for connecting Internet and RJ11 point for
termination of phone lines. HDSU-DV’s may be available in the following forms (as in
Fig-6) Maximum 13 PC’s can be connected through Hub/Switch with HDSU.
HDSU
HDSU-D8 RJ 45 PC
RJ 45
AC power
RJ 11
Phone 1
HDSU-DA HDSU-D4
RJ 45 RJ 45 RJ 11 Phone1 RJ 11
Phone 2
RJ 45 RJ 45 RJ 11 Phone2
PC PC .
RJ 11 Phone3 .
.
RJ 11 Phone4 .
RJ 11 Phone 8
Internet
Fig-6
HDSU-DV
AC- DC
Adapter
PC
Exchange
DSL cable
Fig -7
2) Connection-II(Multiple PC’s)
Internet
BDSU- DV
HDSU-DV
AC- DC
Adapter
Exchange
DSL cable
Fig - 8
1) Hardware
1. BDSU / HDSU
2. AC Power
3. Telephone Line
4. PC/PC’s
5. Ethernet Card
6. HUB/Switch/Router (Incase of SOHO)
2) Software
1. Username & Password
2. O.S (WIN-9X or High-end Version)
3. A.S (As per requirement)
4. Driver for Ethernet Card
5. PPPOE
18.2.2 SPE/APE
The equipments available at the Service Provider/Access Provider may be viewed as
follows:
Internet
18.2.2.1 IAN
Internet Access Node (IAN) is the most important and intelligent equipment of DIAS in
the sense that it is able to differentiate the PSTN and Internet traffic.
It is in the form of a sub rack which is mountable in a 19” cabinet (Main Rack) with
conventional cooling. The cabinet can accommodate a maximum of Four number of
IAN’s, Two number of LL2W units, a Ethernet Switch and one Router. The RADIUS
Server will be mounted on a separate Rack and provided adjacent to the cabinet.
RADIUS Server can be provided per exchange basis or as single unit for many exchanges
at a centralized basis.
BSNL provides at a centralized place called as DIAS Server or RADIUS Server. Both set
ups are shown in Fig-9 and Fig-10
IAN supports redundant power supply cards so that failure of one card will not affect the
system operation. Power supply cards are working as Hot-Stand-By It is a DC-DC
converter with a -48 V + / -8 V DC as input and 5V, 3.3V as DC and 75 V AC as
output.75V AC is used as Ringing current to sub phone instrument.
IAN sub rack consists of duplicate switch card, which is the basic fundamental part of the
system, which contains all the system software. All Protocols and IP Packet forwarding is
performed by this card. Switch cards are working as Hot-Stand-By. So in the case of a
failure of one switch card, the other card will take over.
During the change over condition of switch card, in the present software version, the data
calls will get disturbed for a small amount of time where as the voice calls will be
protected. Having 10 BaseT Ethernet port to connect with ISP through Ethernet switch,
console port for debugging through PC/Laptop at locally and CLI for System
configuration/maintenance.
Internet
E1 cards are the ones that connects the DIAS system to the PSTN, to ISP and Cascading
of other IAN’s for voice. These are achieved by 4 E1 ports of each E1 card. Working as
Hot-Stand-By operation for fault tolerant purpose.
Life Line Control card (LLC) is used to interface with PSTN on V5.2 signalling Protocol.
This card along with LLL are essential if DIAS to be interconnected with New
Technology switches for voice connectivity in V5.2 signalling.
Life Line Line card (LLL) used for V5.2 protocol connectivity. This is used to feed Dial
Tone/Power (as life line) in case of power failure of BDSU/HDSU at CPE.
One Child card in IAN separates / combines Two sets of 30 Sub ports input each, coming
from Two No. of LL2W cards into 5 sets of 12 Ports output each, & connected to each
BDSL card.
Internet
IAN sub-rack with six different type of cards are shown in Fig-11
S S B B B B B L L L P P
W W D D D D D L L L S S
S S S S S C L L U U
C C L L L L L 1 2 1 2
A A 1 2 3 4 5
R R
D D
1 2
Child card
Fig-11
Router
Ethernet Switch
IAN 1
IAN 2
VT
IAN 3 220/100
Terminal
IAN 4 with Key
RADIUS LL2W 1 board
Server
LL2W 2
Main Rack
Fig-9
Internet
Router
Ethernet Switch
IAN 1
IAN 2
IAN 3 VT
220/100
IAN 4 Terminal
LL2W 1 with
keyboard
LL2W 2
Main Rack
Fig-10
18.2.2.2 Block Diagram of IAN for PSTN and ISP connectivity as in Fig-12
ISP
Router Ethernet
Ethernet
Switch
Port
5 O/Ps
Each O/P is 12 ports
E1 E1
Ethernet Card 1 Card 2
2 E1 PSU
2 E1 2 E1 1&2
ISP ISP
Phone PSTN
5 V 3.3 V 75 V AC
LLC
Local cable DC
interface
BDSU/
HDSU LLL 1 LLL 2
30 Sub (2 W) 30 Sub (2 W)
Exchange MDF
Internet
Fig - 12
18.2.2.3 LL2W
DIAS supports a unit called LL2W (Life Line 2 Wire interface) or SMUX (Sub Mux) for
direct 2 wire connectivity with PSTN exchange having Existing Digital technology
switches (Not supporting V5.2 protocol). This unit consists of 10 line cards which
provide 12 ports each for 2 IAN’s, 2 controller cards and 2 power supply cards for 120
lines, which are working as Hot Stand-By respectively.
The controller card is connected with 2 E1 links coming From E1 card of IAN and
Demultiplexed To 5 sets of 12 ports which are connected 5 line cards.
In the reverse way the controller card is connected by 2 E1 links with E1 card of IAN
after multiplexed From 5 line cards.
Dedicated 2 Wire O/P from each port of line card is going towards PSTN for voice. One
controller card supports 4 E1 links for 2 IAN’s
So the DIAS cabinet can have Two number of LL2W units for 4 IAN’s
This unit is only as optional and the card configuration of LL2W is in Fig-13.
L L L L L C C L L L L L P P
I I I I I O O I I I I I S S
N N N N N N N N N N N N U U
E E E E E E E E E E
C C
A A
R R
D D
Fig-13
It does the authorization function to allow various Internet services for each user.
Logs the user Accounting information and pass on to Billing Server for consolidated
Billing purpose.
It listens on port 1812 for user authentication requests from DIAS (RADIUS clients)
It listens on port 1813 for accounting requests from DIAS (RADIUS clients) as
Accounting start and Accounting Stop for Accounting Log.
Client IP addresses are present in each client’s profile.
Users information are stored in MySQL Database.
User Password is exchanged in encrypted format using MD5 digest and shared key.
ISP Router
LAN
Fig-14
Blue Bill software is running on this Server. This is used to compute data usage of user
and appropriate charge using computation module.
System administrator can admin billing S/W from his PC to define new tariff, package
name, discounts for normal day/Holiday etc., Data limit, rate and validity period.
ISP Router
LAN
Fig-15
18.2.2.6 Router
ZYNO-220 , a versatile edge device performing the advanced routing function & for
DIAS.
ZYNO-220 ensures the bandwidth is efficiently managed for optimal usage of the ISP
link.
Optional features are NAPT (IP address sharing, Bandwidth control, Access control list ),
packet filtering firewall and QOS (CB-FBC).
ZYNO View (GUI S/W) allows full remote management and local configuration through
Telnet and local console respectively.
ZYNO – 220 supports one Ethernet port and 2 WAN ports. Ethernet port is used to
connect with Ethernet switch and WAN ports are used to connect with ISP from DIAS
via E1 links if required.
S A S A A L E P
Y L Y L C N R W
N M N M T K R R
8 7 6 5 4 3 2 1
|_____| |_____| |_____| |_____|
WAN 0 WAN 1 Ethernet Sys
Fig-16
16 Port Ethernet switch used in DIAS makes the network managers life easy. Gives
excellent throughput. Ensures secure communication. Two ports are connected to ZYNO
-220 WAN ports 0 & 1 for outgoing towards ISP. 2 ports are connected to both switch
card 1 & 2 of each IAN as input for switch. Incase more IAN’s are equipped, then they
also will be connected to Ethernet switch ports via switch cards of each IAN. Ethernet
switch is powered through AC 230 V drawn from 2KVA inverter. Adaptive Cut Through
Switching Techniques (Hybrid of Store & Forward and Cut Through Switch) used in this
Ethernet switch.
The Main Rack or Cabinet (as in Fig -9 & 10) is able to house a maximum of Four
number of IAN’s, one Router, one Ethernet Switch and two LL2W units (optional).
Conventional cooling mechanism is used.
This is connected to RJ45 connector of active switch card through RS232 interface, by
which the DIAS could be completely managed. DIAS also supports the Telnet Protocol,
using which one could login to the IAN and the complete CLI (Command Line Interface)
could be accessed remotely. The RJ45 cable to be changed to Active Switch card
manually only if one switch goes faulty.
RJ45 RJ45
VT Active
220/100 Switch
Terminal Card
in IAN
Key AC
Board 230 V
Fig-17
Internet
Ethernet
Switch
PC DIAS
With BDSU Local cable IAN
PPPOE interface
Customer End
PPPOE Request
from user
RADIUS
Response
Fig - 18
18.3 Interface
The physical link or interface ( as in Fig-1) between BDSU/HDSU and IAN is
established using a twisted copper pair. Incase of BDSU, the maximum copper length
allowed is 4 KM when 0.4 mm twisted pair copper is used. As regards HDSU, the
maximum copper length allowed is 2 KM if 0.4 mm twisted pair copper is used.
18.4 Conclusion
DIAS provides an excellent solution for accessing both Internet and voice services
simultaneously. It is a 24 hour Internet service through copper pair but without dialing. It
Internet
behaves like ISDN or leased circuits but it has its own characteristics. BSNL
implemented it in wider ways.
Internet
Chapter 19
Contents
• Introduction
• What is Broadband
• Broad Band Acess
• Wired Line Acess
• Wireless Acess
• Conclusion
Objectives
• About various Broad Band access technologies being deployed around the globe.
19.1 Introduction
Advances in telecommunications and data technology are creating new
opportunities for countries, businesses and individuals—just as the Industrial
Revolution changed fortunes around the globe. The new economy is defining how
people do business, communicate , shop, have fun, learn, and live on a global
basis—connecting everyone to everything. The evolution of Internet has come
into existence & Internet service is expanding rapidly. The demands it has placed
upon the public network, especially the access network, are great. However,
technological advances promise big increases in access speeds, enabling public
networks to play a major role in delivering new and improved
telecommunications services and applications to consumers .The Internet and the
network congestion that followed, has led people to focus both on the first and
last mile as well as on creating a different network infrastructure to avoid the
network congestion and access problems. The solution to this is Broadband.
where multiple such individual Broadband connections are aggregated and the
subscriber is able to access these interactive services including the Internet
through this POP. The interactive services will exclude any services for which a
separate licence is specifically required, for example, real-time voice transmission,
except to the extent that it is presently permitted under ISP licence with Internet
Telephony.”
Wiredline Wireless
WHY ADSL?
ADSL is in place due to both technical and marketing reasons. On the technical
side, there is likely to be more crosstalk from other circuits at the DSLAM (Digital
Subscriber Line Access Multiplex) end (where the wires from many local loops are close
together) than at the customer premises. Thus the upload signal is weakest, while the
download signal is strongest at the noisiest part of the local loop. It therefore makes
DSLAM transmit at a higher bit rate than does the modem on the customer end. Since the
typical home user in fact does prefer a higher download speed, thus telecom companies
chose to make a virtue out of necessity, hence ADSL come to place.
To obtain the asymmetrical data transfer to suit requirement of Internet and LAN
access, ADSL works by firstly splitting the available bandwidth on the twisted copper
wire (telephone wires) into three different channel:
ADSL uses two separate frequency bands. With standard ADSL, the band from
25.875 kHz to 138 kHz is used for upstream communication, while 138 kHz - 1104 kHz
is used for downstream communication.
Internet
First the POTS channel is splits off from the digital modem by filter, thus
guaranteeing uninterrupted POTS. After the POTS channel are splitted from the digital
data transfer bandwidth, the 26kHz to 1.1mhz data bandwidth could be further separated
by using one of two ways as describe below:
1)Frequency Division Multiplexing (FDM) :- FDM assigns one band for upstream data
and one band for downstream data. Time division multiplexing divides the downstream
path into one or more high speed channels and one or more low speed channels. But the
upstream path is only multiplexed into corresponding low speed.
2)Echo cancellation :- Echo cancellation assigns the upstream band to over-lap the
downstream. To separate them is by local echo cancellation. This technique is common
in V.32 and V.34 modems(Conventional Modems).
By using either one of the above techniques, ADSL splits off a 4khz region for
POTS at the DC end of the band.
Internet
Upstream Downstream
Basic
Telephone
Service
FDM
Frequency
Upstream Downstream
Basic
Telephone Echo
Service Cancellation
Frequency
ADSL MODULATION
In-Phase
an Filter
Output
Binary Constellatio To line
D/A Passband
Input n + Line Filter
Encoder
Quadrature
Filter
bn
Internet
In-Phase
Adaptive
filter ~
an Data
Line Out
Input A/D Decision Decod
Device er
~
bn
Quadrature
Filter
The major stages in transmitting and receiving could be seen in the following block
diagram .
DMT
Symbols
Transmitted
N (Complex) Serially
Sub-channel
Symbols
Internet
1 DMT
FFT Symbol Parallel
2 Decoder To Serial Data
line Output Out
Filter A/D Data
Buffer
DMT
Symbols
Received
Serially N (Complex)
Sub-channel
Symbols
The chunk of bits that are being assigned to each sub-channel as described above are
encoded as a set of quadrature amplitude modulated subsymbols. These subsymbols are
then pass into an Inverse Fourier Transform(IFFT) which combines the subsymbols into a
set of real-valued time domain samples, the output of the IFFT is then send a Parallel-to-
Serial block with cyclic prefix which is added to remove InterSymbol Interference (ISI)
between the sub-channels. The output is then pass into an digital to analog converter
which is then send through the twisted copper telephone wire. The receiver would receive
the signal from the twisted copper telephone wire and does the reverse process to
obtained the required data.
To reduce error in transmission and to counter those problem of using telephone lines as
a data transfer medium, DMT had uses Reed Solomon forward error correction
method .The size of this Reed Solomon codeword depends on the number of bits
assigned to each sub-channel.
Internet
Factors Determining ADSL Connectivity: More the distance from the DSLAM(Digital
Subscriber Line Access Multiplex) to the customer end the data rate reduces.Signal
attenuation and Signal to Noise Ratio are defining characteristics, and can vary
completely independently of distance (e.g., non-copper cabling, cable diameter).The
performance is also dependent to the line impedance, which can change dynamically
either dependent on weather conditions (very common for old overhead lines) or on the
number and quality of joints or junctions in a particular cable length.
ADSL standards
Standard name Standard type Downstream rate Upstream rate
ANSI T1.413-1998 Issue 2 ADSL 8 Mbit/s 1.0 Mbit/s
ITU G.992.1 ADSL (G.DMT) 8 Mbit/s 1.0 Mbit/s
ITU G.992.2 ADSL Lite (G.Lite) 1.5 Mbit/s 0.5 Mbit/s
ITU G.992.3/4 ADSL2 12 Mbit/s 1.0 Mbit/s
ITU G.992.3/4 Annex J ADSL2 12 Mbit/s 3.5 Mbit/s
ITU G.992.3/4 Annex L¹ ADSL2 12 Mbit/s 1.0 Mbit/s
ITU G.992.5 ADSL2+ 24 Mbit/s 1.0 Mbit/s
ITU G.992.5 Annex L¹ ADSL2+ 24 Mbit/s 1.0 Mbit/s
ITU G.992.5 Annex M ADSL2+ 24 Mbit/s 3.5 Mbit/s
Additionally, the non-Annex ADSL2 and ADSL2+ support an extra 256 kbit/s of
upstream if the bandwidth normally used for POTS voice calls is allocated for ADSL
usage.While the ADSL access utilizes the 1.1 MHz band, ADSL2+ utilizes the 2.2 MHz
band.
Very-high-speed DSL (VDSL) promises even higher speeds than ADSL, although
over much shorter distances. Originally named VADSL (A –Asymmetric) but was
later extended to support both symmetric & asymmetric.Requires one phone line and
supports voice & data.It works between 0.3-1.37 kms depending on speed. It supports
upstream data rate of 1.6-2.3 mbps & downstream data rate of 13-52 mbps. The
following figure illustrates shows the data rate, wire size & distance.
RADSL(Rate-Adaptive DSL)
As the name implies, rate-adaptive DSL (RADSL) modems adjust the data rate to match
the quality of the twisted-pair connection. Emerging software should make this an
automated process with little human intervention.
HDSL(High-Data-Rate DSL)
HDSL modem is viewed as equivalent of PCM stream(2 MBps) and offers the same
bandwidth both upstream and downstream. It can work up to a distance of 3.66 to 4.57
kms depending upon the speed required. It can deliver 2048 kbps
SDSL(Symmetric DSL)
Symmetrical digital subscriber line (SDSL) is similar to HDSL but requires only one pair
of wires. Transmission speed ranges from n x 64 kbps to 2.0 Mbps in both directions. In
this the upload and download streams are of equivalent bandwidth.
The cable network was primarily designed to deliver TV signals in one direction
from the Head-End to the subscribers homes. Operators had to upgrade the cable network
so that signals could flow bi-directionally.One spectrum is used for the signals that move
from the Head-End towards the cable subscriber. Another spectrum of signal frequencies
are used for the signals that move from the cable subscriber towards the Head-End. By
way of replacing the existing one way amplifiers with two way amplifiers,Cable
Operators are able to separate the upstream and downstream signals and amplify each
direction separately in the right frequency range. In the downstream direction (from the
network to the computer), network speeds can be up to 27 Mbps. In the upstream
direction (from computer to network), speeds can be up to 10 Mbps. Most modem
producers have selected a more optimum speed between 500 Kbps and 2.5 Mbps. A cable
modem with a splitter can provide Internet access to multiple PCs, if they are connected
via a local area network (LAN).Cable modems typically have an Ethernet output, so they
can connect to the LAN with a standard Ethernet hub or router.
Internet
2) Security: A more significant weakness of cable networks using a shared line is the risk
of loss of privacy, especially considering the availability of hacking tools for cable
modems.
3) Connectivity Problem :Many cable Internet providers are reluctant to offer cable
modem access without tying it to a cable television subscription.
4) Cost factor: The cost of Cable modem & splitters is high as complared to ADSL
modems.
PLC also called Broadband over Power Lines (BPL) or Power Line Telecoms (PLT),
is a wireline technology that is able to use the current electricity networks for data and
voice transmission. The carrier can communicate voice and data by superimposing an
analog signal over the standard 50 or 60 Hz alternating current (AC). Traditionally
electrical utilities used low-speed power-line carrier circuits for control of substations,
voice communication, and protection of high-voltage transmission lines.More recently,
high-speed data transmission has been developed using the lower voltage transmission
lines used for power distribution. A short-range form of power-line carrier is used for
home automation and intercoms.A computer (or any other device) would need only to
plug a BPL "modem" into any outlet in an equipped building to have high-speed Internet
access.
PLC modems transmit in medium and high frequency (1.6 to 30 MHz electric carrier).
The asymmetric speed in the modem is generally from 256 kbit/s to 2.7 Mbit/s. In the
repeater situated in the meter room the speed is up to 45 Mbit/s and can be connected to
256 PLC modems. In the medium voltage stations, the speed from the head ends to the
Internet
Internet is up to 135 Mbit/s. To connect to the Internet, utilities can use optical fiber
backbone or wireless link.
High-speed data transmission, or Broadband over Power Line uses the electric circuit
between the electric substations and home networks. A standard used for this is ETSI
PLT. PLC uses the following frequencies bands.
Low frequencies
High frequencies
z 2 to 30 MHZ (HF)
z Transmission rate about 1 to 40 Mbps
Getting beyond
the
transformer
Insert Power Line
Carrier at middle
voltage
Backhaul to NAP
(fiber, DSL, wireless,
satellite)
ADVANTAGES
The major advantage of BPL over regular cable or DSL connections is the availability
of the extensive infrastructure already available which would appear to allow more
people in more locations to have access to the Internet.
DISADVANTAGES
7. BPL is not likely to be available soon for high voltage (>66 kV) power
lines.
8. Conventional electronic surge arrestors severely attenuate BPL signal.
9. Other electronic devices (plasma screen TV’s, variable speed drives)
interfere with BPL signal or vice versa.
10. Existing vendors’ technologies are not interoperable.
11. There is not yet an IEEE standard for BPL
Optical fibers, clearly the chosen technology for transmission media, are beginning to
find their place in the subscriber's loop. Currently fiber costs are high as compared to
copper but there is a trend towards decreasing costs of optical fiber cables and photonics
employed. In addition the tremendous advantages in terms of information capacity of
fiber, its small weight and size over copper cable are making it a very attractive
technology to replace copper in subs loop when advanced broadband services need to be
offered to the customer. To carry the same information as one fiber cable we would need
hundreds of reels of twisted wire Cu cables. Further, fiber is 23 times lighter than Cu
cable and 36 times less in cross- sectional area. These features of light weight and small
size make it easier to handle fiber cable. In crowded city networks they can easily be
accommodated in existing ducted systems.
Fibre to the Curb(FTTC) in which the terminal equipment is located on the curb from
where it would be convenient to serve a suitable service area. Since the distribution
would still be copper, suitable location for the terminal would be one which optimizes the
cost, reduces back-feeding, reduces distribution cost and takes safety factors into
consideration. Space and power availability need to be confirmed before finalising the
location.
Fibre to the home/Office(FTTH/FTTO) in this method the fibre goes upto the
subscriber premises
Internet
Depending upon the location of the cabinet (CAB-see above diagrams ) or the terminal
equipment we call FTTC,FTTH or FTTO and FTTB. The optical fibre cabinet consists
of fibre optic transmission equipment and customer access equipment. It consists of three
internal chambers. A battery chamber that houses upto 2 batteries, an MDF chamber
housing MDF, alarms and fibre splice box, an equipment chamber housing transmission
and access equipment. Exchange side of cabinets connect to exchange on 2Mbps or
channel level or on a V 5.2 interface and subscriber side of cabinets connect to
subscribers via copper lines. These can be installed as outdoor or indoor cabinets.
Outdoor cabinets are environmentally fitted and could be installed on curbs or in remote
areas. Usual capacities of fibre optic cabinets have capacities 120, 240,480 and 1920
channels. Each cabinet requires two fibres for operation and one dark fibre-pair is usually
kept as spare. The fibre optic cabinets offer point to point connections and can take care
of POTS, ISDN(BA and PRI), DID, Payphones, 64Kbps leased lines.
Internet
c) Optical Network Unit (ONU) : It interfaces with subscriber terminals and works
under the control of OLT to implement the transmission protocol.It can be configured
in FTTC, FTTB and FTTH configurations
There are different PON technologies exists and are given below.
a) APON (ATM PON)
b) EPON (Ethernet PON)
c) GPON( Giga Bit EthernetPON) .
PON benefits
PON systems offer a number of benefits to the operator and the end users.
1).Fiber is less costly to maintain than copper based systems so operators can reduce
costs, increase profits or lower costs to the end-users.
2) The technology conserves fibre,passive elements and optical interfaces. All this leads
to cost effectiveness.
4) Both business and residential customers can be served on the same platform and
customers get better quality of service.
19.4.1 Bluetooth
not in the same room, as long as they are within up to 100 metres (328 feet) of each other,
dependent on the power class of the product. Products are available in one of three power
classes:
Class 1 (100 mW) [still readily available]: It has the longest range at up to 100 metres
(328 ft).
Class 2 (2.5 mW) [most common]: It allows transmission to a distance of 10 metres (33
ft).
With UWB (Ultra Wide Band technology) speed upto a maximum of 400Mbps is
achieved.
19.4.2 3G Mobile
Of late cellular mobile telephony has started maturing in delivering data access
over the air. The evolution of cellular mobile telephony has taken place in following steps
1. 2G – GSM, CDMA
2. 2.5G – GSM(GPRS/EDGE), CDMA 2000 1x
3. 3G – UMTS/WCDMA, CDMA 2000 1xEVDO/EVDV
The speeds achieved with above different cellular mobile telephony is given
below.
1).2G GSM/CDMA 9-14 Kbps
2).2.5G GSM
GPRS 115 Kbps
EDGE 384 Kbps
3).2.5G CDMA 2000 1x 170 Kbps
4).3
3G UMTS/WCDMA 384K (M), 2048K(S)
5).3G CDMA 2000 1x 384K (M), 2048K(S)
EVDO/EVDV
for wireless Internet access and wireless. Many computers are sold today with Wi-Fi
built-in; others require adding a Wi-Fi network card (Wireless Ethernet/LAN card).
A Wi-Fi-enabled device is able to connect to a local area network when near one
of the network's access points (see the figure below). The connection is made by radio
signals; there is no need to plug the device into the network. If the local area network is
connected to the Internet, the Wi-Fi device can have Internet access as well. The
geographical region covered by several access points is called a hotzone. The range of
an access point varies. The access point built into a typical Wi-Fi home router might have
a range of 45 m (150 ft) indoors and 90 m (300 ft) outdoors.
Capable of transmissions upto 54 Mbps and operates in 5 GHz band and uses an
orthogonal frequency division multiplexing OFDM encoding scheme .
IEEE 802.11b
Capable of transmissions of upto 11 Mbps and operates in 2.4 GHz band and uses
only DSSS encoding scheme.
IEEE 802.11g
Capable of transmissions upto 54 Mbps and operates in 2.4 GHz band and uses an
orthogonal frequency division multiplexing(OFDM) encoding scheme.
IEEE 802.11n
Capable of transmissions upto 100 Mbps and operates in 2.4 GHz band and uses
an orthogonal frequency division multiplexing(OFDM) encoding scheme.
Advantages of Wi-Fi
• Unlike packet radio systems, Wi-Fi uses unlicensed radio spectrum and does not
require regulatory approval for individual deployers.
• Allows LANs to be deployed without cabling, potentially reducing the costs of
network deployment and expansion. Spaces where cables cannot be run, such as
outdoor areas and historical buildings, can host wireless LANs.
• Wi-Fi products are widely available in the market. Different brands of access
points and client network interfaces are interoperable at a basic level of service.
• Competition amongst vendors has lowered prices considerably since their
inception.
• Many Wi-Fi roaming, in which a mobile client station such as a laptop computer
can move from one access point to another as the user moves around a building or
area.
• Many access points and network interfaces support various degrees of encryption
to protect traffic from interception.
• Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client
works in different countries around the world (although may require simple
software configuration).
Disadvantages of Wi-Fi
• Though the use of the 2.4 GHz Wi-Fi band does not require a license in most of
the world, local regulations do require that Wi-Fi devices stay below the local
regulatory limits on transmission power and accept interference from other
sources, including interference which causes the devices to no longer function.
Legislation/regulation is not consistent worldwide.
• The 802.11b and 802.11g flavors of Wi-Fi use the 2.4 GHz spectrum, which is
crowded with other equipment such as Bluetooth devices, microwave ovens,
cordless phones (900 MHz or 5.8 GHz are, therefore, alternative phone
frequencies one can use to avoid interference if one has a Wi-Fi network), or
video sender devices, among many others. This may cause a degradation in
performance. Other devices which use these microwave frequencies can also
cause degradation in performance.
• Closed access points can interfere with properly configured open access points on
the same frequency, preventing use of open access points by others.
Internet
• Power consumption is fairly high compared to other standards, making battery life
and heat a concern.
19.4.4 WiMAX
WiMAX is an acronym that stands for Worldwide Interoperability for
Microwave Access, a certification mark for products that pass conformity and
interoperability tests for the IEEE 8802.16 standards.(IEEE 802.16 is working group
number 16 of IEEE 802 specializing in point-to-multipoint Broadband wireless
access).WiMAX covers wider, metropolitan or rural areas. It can provide data rates up to
75 megabits per second (Mbps) per base station with typical cell sizes of 2 to 10
kilometers. This is enough bandwidth to simultaneously support (through a single base
station) more than 60 businesses with T1/E1-type connectivity and hundreds of homes
with DSL-type connectivity.
It is similar to Wi-Fi in concept, but has certain improvements are done at improving
performance and should permit usage over much greater distances. IEEE 802.16
networks use the same Logical Link Controller(standardized by IEEE 802.2) as in other
LANs and WANs, where it can be both bridged and routed to them. An important aspect
of the IEEE 802.16 is that it defines a MAC (Media Access Control) layer that supports
multiple physical layer specifications in 2 to 11 Ghz & 10 to 66 Ghz bands. It will
provide fixed, portable, and eventually mobile wireless broadband connectivity and also
provides POTS services.
WiMAX Subscriber
Station
WiMAX PSTN
Backhaul
POTS Internet
Customer Premise
(Home, Business or HOTSPOT)
The MAC is significantly different from that of Wi-Fi (and ethernet from which
Wi-Fi is derived). In Wi-Fi, the MAC uses contention access—all subscriber stations
wishing to pass data through an access point are competing for the AP's(Access points)
attention on a random basis. This can cause distant nodes from the AP to be repeatedly
Internet
interrupted by less sensitive, closer nodes, greatly reducing their throughput. By contrast,
the 802.16 MAC is a scheduling MAC where the subscriber station only has to compete
once (for initial entry into the network). After that it is allocated a time slot by the base
station. The time slot can enlarge and constrict, but it remains assigned to the subscriber
station meaning that other subscribers are not supposed to use it but take their turn. This
scheduling algorithm is stable under overload and oversubscription (unlike 802.11). It is
also much more bandwidth efficient. The scheduling algorithm also allows the base
station to control Quality of Service by balancing the assignments among the needs of the
subscriber stations.
This is also an important aspect of why WiMAX can be described as a
"framework for the evolution of wireless broadband" rather than a static implementation
of wireless technologies.
FSO TRANSCEIVER
Advantages of FSO
1.Significantly less expensive than fiber optic or leased lines
2.Much faster installation, days or weeks compared to months for fiber
optic cables
3.Transmission speed can be scaled to meet user’s needs; from 10 Mbps to
1.25 Gbps
4.Security is key advantage; not easy to intercept or decode
Internet
Disadvantage of FSO
1.Scintillation is temporal and spatial variations in light intensity caused
by atmospheric turbulence that acts like prism to distort FSO signals
2. Loss of Signal due to Fog (Intensity of Light is reduced) .
3. Interference of signal due to bird/flies obstructing the signal path.
4. Obstruction of signal by swaying of tall structures/buildings due to
winds and seismic activity.
PSTN
Internet
Content &
Application
Providers
Backhaul for
Hotspots
Data,PSTN
Video Access
Data,PSTN
Video Access
LMDS Cell Site
Disadvantages
a)Requires line-of-sight between buildings; LMDS network is limited by surrounding
objects
b)Affected by precipitation; LMDS systems are susceptible to interference from rain and
fog
networking . Similar to LMDS, MMDS can transmit video, voice, or data signals at 1.5
Mbps downstream and 300 Kbps upstream at distances up to 35 miles.Mounted MMDS
hub uses point-to-multipoint architecture. Pizza box (13 x 13 inch) directional antennas
are mounted at receiving location & a cable runs from antenna to MMDS wireless
modem, which converts analog signal to digital and may be attached to single computer
or LAN.
Advantages
a)Signal strength—low frequency MMDS RF signal travels farther and with less
interference than high-frequency LMDS RF signals
b)Cellsize—seven times larger than area covered by LMDS transmitters
c)Cost—MMDS is less expensive than LMDS
Disadvantages
a)Requires direct line-of-sight—makes installation difficult and eliminates locations
blocked by taller obstructions
b)Shared signals—decreased speed and throughput since users share same radio channel
c)Security—Unencrypted transmissions may be intercepted and read
d)Limited markets—available in limited areas in USA
19.4.7 SATELLITE
Satellite broadband offers two-way internet access via satellites orbiting the earth
about 22,000 miles above equator. The PC through a special satellite modem broadcasts
the requests to the satellite dish ,located on top of the roof/building which in trun
transmits and receives signal from the satellites. But satellite broadband is slower in both
uplink and downlink compared to any DSL technology for example.
At present we use VSAT (Very Small Aperture Terminals) & DTH (Direct To
Home) terminals for satellite transmission. C, Ku & Ka bands are used for services
involving fixed terminals and L band is used for mobile services. It Offers data rates 9.6
Kbps for a handheld terminal and 60 Mbps for a fixed VSAT terminal at present.
Satellite broadband has got an advantage, that it can be deployed in every region
in a country. Satellite explores the possibility of usage in rural areas where tough terrain
conditions prevails. It provides an always on Connection without dialling .It offers
incredible reliability, better than 99.9%. and need not worry about dropped connections
during critical transactions, or missed emails..
Internet
21.5 Conclusion
With the advent of new technologies in the field of communication which has
brought the world closer and closer, the consumer will be in a better position to choose
and reap the benefits, the broadband technology offers viz. High Speed Internet, Video
Conferencing, Telemedicine, Video on Demand ,Internet Radio, Instant messaging, etc.
Internet
Chapter 20
Introduction
History
Different types of Networks
Definition
Features
Applications
Characteristics
Objectives
20.1 Introduction
Next Generation Networks (NGN) are the next step in world communications.
NGNs are the culmination of 100 years of telecommunications evolution, combining the
scalability and reliability of the public telephone network with the reach and flexibility of
the Internet. The next-generation network seamlessly blends the public switched
telephone network (PSTN) and the public switched data network (PSDN), creating a
single multi service network.
Traditionally, now there are three separate networks: the PSTN voice network, the
wireless network and the data network (the Internet). NGN converts all of these three
networks into a common packet infrastructure. This intelligent, highly efficient
infrastructure delivers universal access and a host of new technologies, applications, and
service opportunities. The fundamental difference between NGN and today’s network is
the switch from current ‘circuit-switched’ networks to ‘packet-based’ systems such as
those using Internet Protocol (IP). The need for global standards is critical as most
operators expect to move to an IP infrastructure. One area to be addressed is the concept
of ‘nomadicity’, which will give fixed line and mobile users completely seamless
communication. It means that the underlying technology will be invisible to the user
regardless of a multi-service, multi-protocol, multi-vendor environment.
20.2 History
The global telecommunications infrastructure has evolved over the past 100 years. The
last two decades, however, have heralded seminal change that has accelerated this
Internet
At the crossroads
The telecommunications world is at the crossroads today. As the amount of data traffic
crossing the globe increases every second, the conventional infrastructure is seen to be
increasingly incapable of handling it. On the other hand, the flexible and efficient data
network — the Internet — can carry all forms of service traffic over it, but has been
found to be unsuited for telephony.
As is usually the case — the market found a way out. The clash of the old-world and the
new led to a wave of innovation and evolution for telecommunications. Today, copper
and fibre optic lines that used to carry voice traffic now also transmit data, fax, and video.
Traditional circuit switching is giving way to more efficient and flexible packet switching
technologies as a result of the explosive growth of IP (Internet Protocol) networks.
New companies are entering the telecommunications space as service providers and old
companies are adopting new business models built on new technology. In this
competitive marketplace, telecommunication firms are looking to enhance the services
they provide to their customers and reduce the costs of delivering them.
One critical area of communications infrastructure that has been rapidly evolving in
recent times has been switching technologies, as traditional switching functions give way
to next generation of telecommunication switches. Switching is the core of all
telecommunication networks, allowing efficient point-to-point communications without
direct connections between every node.
To operate in the demanding and highly intensive PSTN domain, telecom switches are
needed to be compatible with existing legacy systems and standard communications
protocols. They are expected to deliver the high reliability that is expected today from a
TDM network.
They are also expected to support value-added features and services that service
providers allow carriers to differentiate themselves based on service and scale on demand.
Internet
Circuit Switching
In a circuit-switched network, before communication can occur between two devices, a
circuit is established between them. Communication link from A to B, and B to A are
shown in figure. Once set up, all communication between these devices take place over
Internet
this circuit. The classic example of a circuit-switched network is the existing telephone
system. When A calls B and he answers, a circuit connection is established. That circuit
function the same way regardless of how many intermediate devices are used to carry the
voice. You use it for as long as you need it, and then terminate the circuit. The next time
you call, you get a new circuit, which may (probably will) use different hardware than the
first circuit did, depending on what's available at that time in the network.
Internet
In this network type, no specific path is used for data transfer. Instead, the data is
chopped up into small pieces called packets and sent over the network. The packets can
be routed, combined or fragmented, as required to get them to their eventual destination.
On the receiving end, the process is reversed—the data is read from the packets and re-
assembled into the form of the original data.
Packet Switching
In a packet-switched network, no circuit is set up prior to sending data between devices.
Blocks of data may take any number of paths as it journeys from one device to another.
In circuit switching, a circuit is first established and then used to carry all data between
devices. In packet switching no fixed path is created between devices that communicate;
it is broken into packets, each of which may take a separate path from sender to recipient.
The Internet
21. Built over PSTN to provide data service
22. Information is routed, not switched
23. Best efforts rather than guaranteed QoS
24. Intelligence at the edge, large variety of devices and services connected to
the internet
25. Unregulated
26. Many competing providers
27. No Universal Service Obligation or Emergency call service
28. Interconnect between clouds by peering or transit agreements
20.6.1 Telepresence
20.6.2 3D Imaging
Adding three-dimensional aspects to the imaging systems of Telepresence will further
enhance the experience of Telepresence. Initially, this sort of enhancement could have
applications for business users, enabling delegates to sit down to a virtual meeting and
hold real time discussions while viewing other delegates on three dimensional monitors..
Internet
Other applications are in the medical and educational fields .At a more advanced stage
Telepresence will become interchangeable with virtual reality, and applications in
entertainment are envisioned.
20.6.6 Tele-Learning/Tele-Education
The capacity requirements of these systems will vary according to the level of quality
sought from the video images, and it can therefore be expected that capacities of 2Mbit/s
or more would be required for video-conferencing applications.
20.6.7 Tele-Medicine
internet application. However, with increasingly intense gaming applications (e.g. high
resolution video graphics) more and more capacity is needed from telecommunications
networks to support multi-player real-time use.
Streaming video and audio entertainment will be important applications of next
generation networks as traditional broadcasting services and delivery methods converge
with telecommunications (e.g. interactive TV). Applications such as video on demand
(VOD) providing users with personalised viewing services and applications with added
interactivity will require high capacity networks to serve them.
Peer to peer networking of video, audio and even 3D virtual reality archives could also
bear heavily on next generation networks as users swap massive amounts of data.
Business Applications
Increasing levels of e-commerce will place increasing demands on next generation
networks. Highly secure and reliable next generation networks will in turn encourage the
growth of business applications as users become accustomed to and develop trust in e-
commerce applications.
Increased telecommunications traffic from applications such as online banking and
shopping will create large amounts of e-commerce traffic. Furthermore, video
conferencing and virtual reality show rooms may change the way in which we choose
products and services.
networks need to be both flexible and reliable. Although next generation networks will
develop in many different ways they will all have a common set of broad characteristics.
These characteristics are
29. Protocol Independence
30. Reliability
31. Controllability and Quality of Service
32. Programmability
33. Scalability
Protocol Independence
In order to facilitate multiple forms of communications, next generation networks will
need to be capable of operating a multitude of different communications protocols
Traditionally networks have been designed and implemented to transmit certain specific
types of data such as voice, video or data. This required separate networks, using
different sets of equipment (although usually using the same cables or transmission media)
to support multi-media communications.
Users
IP Network
Circuit Switched Network
Essentially, protocol independence is the ability of a network to operate any protocol that
may be required.).The ability of equipment to be multi-functional is increasingly required
by telecommunications operators. It enables them to save on operational costs as
equipment is managed from a single platform. Also, the physical space and hence costs
Internet
that are saved with multi-functional equipment is a critical factor. Another significant
factor is a reduction in the amount of power consumed by using less equipment.
Reliability
Increased dependency on advanced new applications in the future will place even greater
reliability requirements on next generation networks. Individuals’ expectations of
availability and quality of service, grounded in a perception of high quality in traditional
telephony and television services, will impose high standards of performance.
E-commerce applications will lead to highly resilient telecommunications networks as
businesses become increasingly reliant on telecommunications to function. For other
highly sensitive applications, such as tele-medicine, network reliability and resilience is
imperative, since a patient’s health could depend on the quality of the information
transmitted
In order to achieve the necessary levels of resilience and reliability next generation
networks will need more diverse topologies and redundant elements than is normal in
today’s networks.
Controllability
It is essential for network managers to be able to design, adapt and optimise their
networks to accommodate simultaneously different types of media with varying network
requirements. The main issue here is of quality of service, (i.e. the ability of a network to
provide a particular level of service or to guarantee a certain amount of bandwidth and
response time over a specified period). For example a voice or video conferencing
application could not normally afford to have information packets (i.e. pieces of the
conversation) lost or even delayed. Therefore these types of services need a guaranteed
high level of quality of service to function adequately. On the other hand, non critical
applications such as internet browsing can afford to lose occasional packets of
information as these can be re-sent without degrading the service.
Control of these aspects of a network is an important characteristic since it allows
network managers and network management software to optimise utilisation of network
resources by dynamically setting the balance between the amount of capacity that is
dedicated to real time applications and mission critical applications. Network managers
also need to control the amount of flexibility that is applied to non-real time services such
as file transfers (e.g. downloading of design files from a design centre to the
manufacturing plant). This is known as traffic engineering. Traffic engineering features
of next generation networks will help overcome both the problems of guaranteed quality
of service in current packet switched networks (e.g. IP) and the problem of wasted
capacity in dedicated circuit switched networks. See annex 1.
A common shortcoming of current packet switched networks is that it can be difficult for
telecommunications network operators to specify or guarantee an end to end quality of
service, particularly where part of the communications link is carried over a third party’s
network. For example a call originating on a network with a sufficiently high quality of
service may terminate on a network, perhaps in a different country, where the quality of
service is noticeably lower, thus resulting in a poor quality call. Using traffic engineering,
operators can define specific levels of service and then enter into service level
agreements with other operators who have similar traffic engineering capabilities. This
process facilitates further interconnection between operators and networks.
Internet
Programmability
The more programmable and re-configurable next generation networks are the more
flexible they will be, and the more they will be able to cope with new services and user
requirements. Programmability will allow for traffic engineering and the dynamic
allocation of network resources enabling next generation networks to adapt quickly to
new services or requirements.
Programmability yields more simple scalability since the less manual configuration that
has to be performed during a network upgrade the more quickly services can be expanded.
The time it takes to provision new capacity in networks can be reduced from several
weeks (in manually configurable networks) to a few hours or less through
programmability. Fully programmable networks could be upgraded remotely from a
single location eliminating the need for expensive site visits.
To aid interoperable and programmable networks open standards need to be supported by
all equipment vendors. This will mean the provisioning of open Application
Programming Interfaces (APIs) enabling developers to create software for equipment
from various vendors to operate in interconnected networks.
Scalability
Scalability is an important attribute that can help protect next generation networks from
becoming obsolete. In order to cope with growing traffic loads network operators will
have to over-provision transmission capacity (i.e. lay more fibre optics than currently
needed). Next generation network equipment will need to be scalable to allow for the
addition of capacity as required without the need to replace equipment once it reaches its
design capacity.
The more general purpose that telecommunications equipment is the greater the chance
that it can be programmed, adapted and scaled to cope with future needs.
Furthermore, next generation networks will need to be scalable in terms of address space
(i.e. the number of devices that can be connected and individually identified on a
network).
Softswitches
Soft switches are the key component that enables next-generation networks to be built..
They can be programmed to act as gateways allowing communication between packet
based networks (e.g. IP) and traditional circuit switched networks. The soft switch can
mediate between IP-centric, or VoIP services and circuit switched telephony services
converting all of the necessary added services accordingly.Soft switches execute the same
functions as traditional switches and are completely transparent to end-users.
Telecommunications companies are embracing soft switches because they are
functionally equivalent to conventional phone switches; only better, faster, and cheaper.
Soft switches tend to be modular, smaller, and less expensive than their conventional
switching counterparts. This modularity makes scaling easy, critical when telephony
markets and technologies can change overnight. All this is accomplished without any
compromises on the high availability and reliability delivered by conventional switches.
Internet
DSLAM
Digital Subscriber Line Access Module, used to connect multiple DSL users to the rest of
a network. A multi-service DSLAM interconnects to voice networks as well as other
data networks.
Conclusion
Today
• Multiple networks
• Simple devices
• Disparate services
Transition
• Converged packet
network
• Multimedia devices
• Linked services
Next Generation
Network(Tomorrow)
• Packet/optical network
• Multimedia services
• Ubiquitous broadband
• Integrated functionality
Internet
Chapter 23
Objectives
After completion of this practical you will be able to :
1)Open the browser. Type 192.168.1.1 in the address column and enter. A dialog box will
appear:
2) Type username as : admin and
password as: admin. And then click OK.
Internet
4) Click on the radio button PPP & the resulting page will be as follows:
Internet
5) .Please only do the following entries & leave the other entries as such.
6) We see the Magnifying Glass icon at the last row. Now press the Magnifying glass
Icon. Another window pops up.The resulting POP up window will appear as follows.
Internet
7) Select the Always on button under Change Status menu and then submit. This screen is
saved and pops up again.The resulting window will look as follows.
Internet
8) Now click the close button ,this window closes and the previous window in the
background appears.
Now the resulting window will look as follows.
Internet
10) Instead of REBOOT, We can switch off and switch on the modem which is as good
as REBOOT.
The MODEM configuration is over and is ready for installation at customer premises.
1)Go to the Browser and type http://192.168.1.1 and enter. A dialog box appears as
follows. Type against User name - admin & against Password- admin and click OK.
Internet
4) Select PVC0
Select PPPOE button and the resulting page will appear as follows.
Internet
5) Please enter the foolowing data and leave other data as such.
1) Please enter the user name & password as created for the particular subscriber.
2)Select click the enable button against DNS
3)Click APPLY .
7) Go to TOOLS.
Select System Settings.
Click SAVE & RESTART button.
Wait for 2 minutes till the device restarts.
Afterwards Switch OFF & ON the modem.
Now the Modem configuration is over and is ready for installation at sub premises.
Internet
1) Open the browser. Type 192.168.1.1 in the address column and enter. A dialog box
will appea as follows. Type username as : admin and password as: utstar and press enter.
Internet
4) There are many interface names available. Delete all entries except eth-0 clicking
Internet
5) Click on RFC 1483 interface. Delete all the entries in the screen by clicking the
button
Internet
Resulting page:
Internet
Internet
6) Click on ATM VC. Delete all except the entries with VCI value as 16 or 35 by
clicking the button. (for example in the following screen shot delete all entries
except entries 1 and 3)
Resulting page:
Internet
7) Click on WAN Tab. Click on PPP. There will be no PPP interface. Click on ‘Add’ key
Internet
9)Then the close the window,the resulting page will appear as follows.
Internet
10) Click on ‘Admin’ tab and the resulting page will appear as follows.
Internet
7)Click on System Commands which is on the left hand side. Now click SAVE ALL.The
configuration done on the MODEM is saved in the memory.
Internet