SlideShare a Scribd company logo
Module 4
Protocols and Interfaces
By: Ms. Pradnya Saval
Asst. Prof. TCET
Mumbai
Contents
• Issues in IPV4
• IPV6 protocol
• Mature Packet Switching Protocols:
• ITU Recommendation X.25,
• User Connectivity,
• Theory of Operations,
• Network Layer Functions,
• X.75 Internetworking Protocol
IPV4
• 32-Bit Addressing (2^32 Addresses = 4,294,967,296)
• Studies say that there will not be enough addresses anymore in future due to
the increase in mobile IP generation
Issues in IPV4
• Less Address Space
• IP address starvation
• Distribution of addresses (USA >50%)
• Routing is complicated
• Realization of new technologies (Mobile computing, real time services,
multicast, security, QOS, etc.)
IPV6
• 128-bit addresses (2^128 Addresses = 3.4*10^38)
• IPv6 resolves the following issues:
• Larger address space
• Better header format
• New options
• Allowance for extension
• Support for resource allocation
• Support for more security
IPV4 & IPV6 Header Format
Extension Headers
Extension Headers (Cont..)
 Hop-by-Hop Option: The hop-by-hop option is used when the source needs to pass information to all
routers visited by the datagram.
 Source Routing: The source routing extension header combines the concepts of the strict source route and
the loose source route options
 Fragmentation: The source or a router is required to fragment if the size of the datagram is larger than the
MTU of the network over which the datagram travels.
 Authentication: The authentication extension header has a dual purpose: it validates the message sender and
ensures the integrity of data
 Encrypted Security Payload: The encrypted security payload (ESP) is an extension that provides
confidentiality and guards against eavesdropping.
 Destination Option: The destination option is used when the source needs to pass information to the
destination only. Intermediate routers are not permitted access to this information
TRANSITION FROM IPv4 TO IPv6
TRANSITION FROM IPv4 TO IPv6 (Cont..)
• Dual Stack:
• To determine which version to use when sending a packet to a destination, the source host queries the
DNS. If the DNS returns an IPv4 address, the source host sends an IPv4 packet. If the DNS returns
an IPv6 address, the source host sends an IPv6 packet.
TRANSITION FROM IPv4 TO IPv6 (Cont..)
• Tunneling:
• Tunneling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a region that
uses IPv4.
TRANSITION FROM IPv4 TO IPv6 (Cont..)
• Header Translation:
• Header translation is necessary when the majority of the Internet has moved to IPv6 but some systems
still use IPv4.
Switched Communication Network
• Three Types of Switched Communication Network
• Circuit Switched
• Message Switched
• Packet Switched
• Datagram Approach
• Virtual Circuit Approach
Packet Switched Datagram and Virtual Circuit Approach
X.25 Network
• X.25 is a standard reliable protocol for WAN communications
• It is typically used in the packet-switched networks (PSNs) of common carriers, such as the
telephone companies.
• Subscribers are charged based on their use of the network.
• Uses Virtual Circuit Approach
• The devices used in X.25 network fall into three general categories:
• data terminal equipment (DTE),
• data circuit-terminating equipment (DCE),
• packet-switching exchange (PSE) 15
ITU Recommendation X.25 Network
16
ITU Recommendation X.25 Network (Cont..)
• Data Terminal Equipment (DTE)
• Devices are end systems that communicate across the X.25 network.
• They are usually terminals, personal computers, or network hosts, and are located on the
premises of individual subscribers.
• Data communication Equipment (DCEs)
• are communications devices, such as modems and packet switches that provide the interface
between DTE devices and a PSE, and are generally located in the carrier's facilities.
• Packet-switching Exchange (PSEs)
• are switches that compose the bulk of the carrier's network. They transfer data from one
DTE device to another through the X.25 PSN. 17
ITU Recommendation X.25 Network (Cont..)
Packet Assembler/Disassembler
• The packet assembler/disassembler (PAD) is a device commonly found in X.25
networks.
• The PAD is located between a DTE device and a DCE device and it performs
three primary functions:
• buffering (storing data until a device is ready to process it),
• packet assembly,
• and packet disassembly 18
X.25 Network - Protocol Suite
19
The X.25 protocol suite maps to the lowest three layers of the OSI reference model. The layers are:
• Physical Level: Deals with the physical interface between an attached station and the link that
attaches that station to the packet-switching node. X.21 is the most commonly used physical
layer standard.
X.25 Network - Protocol Suite
• Frame (Link) Level:
• Facilitates reliable transfer of data across the physical link by transmitting the data as
a sequence of frames.
• Uses Link Access Protocol Balanced (LAPB), bit oriented protocol.
• Link Layer performs following functions:
• Transfer of data in an efficient and timely fashion
• Synchronization of the link to ensure that the receiver is in step with the transmitter
• Detection of transmission errors and recovery of errors.
• Identification and reporting of procedural errors to higher level for recovery 20
X.25 Network - Protocol Suite
Packet Level:
• Responsible for end-to-end
connection between two DTEs.
• Also called as Packet layer Protocol
(PLP)
• Procedures:
• SVC
• PVC
• DGs
• Fast Select 21
• Functions performed are:
• Establishing connection
• Transferring data
• Terminating a connection
• Error and flow control
• With the help of X.25 packet layer, data are
transmitted in packets over external virtual circuits.
Advantages and Drawbacks
Advantages and Drawbacks (Cont..)
User Connectivity
• ITU-T Recommendations X.3, X.28 and X.29 are defined as link-level
protocols that provide DTE with asynchronous terminal interfaces to X.25
networks.
• Communicate only via low-speed asynchronous mode.
• X.25 also provides synchronous user connectivity.
• There are three examples of asynchronous and BSC DTE terminal
connectivity options.
Interface Protocols of X.25 packet switching network
Interface Protocols of X.25 packet switching
network (Cont..)
• Recommendation X.121: Defines the international numbering plan for packet switching
networks.
• Recommendation X.28: Defines the operational control of these functions between the
character mode terminal DTE device and the DCE packet assembler/disassembler.
• Recommendation X.29: Defines the same controls, but for the host computer destination.
• Recommendation X.3: Defines a PAD concentrator function for start-mode or character-
mode DTE devices.
• Recommendation X.22: Defines X.25 synchronous dial-up mode for DTE services.
Theory of Operations
1. Traffic Characteristics
2. X.25 Packet Switching Operation
Traffic Characteristics
• To understand packet switching protocols following details must be known:
• Types of traffic for transport
• Characteristics of traffic
• Bursty Traffic:
• Data Transmission with duration of less than 5 seconds.
• Often travels in one direction rather than equally in both direction.
• Eg: HTTP browsing
Traffic Characteristics
• Packet Switching networks accommodate traffic that is not delay-
sensitive.
• Two primary requirements for packet networks are burstiness
and delay-insensitive traffic.
• Due to dynamic allocation of bandwidth technique used by
packet switching, bursty delay-insensitive traffic is ideal for
transport over a packet switching network.
• The figure shows that:
• Low speed terminal users at site A, B and C.
• High Speed user host.
• Terminals could use low speed X.3 circuits to
request information downloads from the host.
• Terminal traffic is very light (low-bandwidth
usage) compared to the data traffic from the
host (high-bandwidth usage).
• The single 56Kbps multiplexed X.25 line from
the host into the packet switching network
depicts the efficiency of asymmetrical traffic
patterns where the host will transmit much
more traffic than it receives.
X.25 Packet Switching Operation
X.25 Packet Switching Operation (Cont..)
• Packet Switching Network shows 6 nodes (1-6) each with 3 users (terminal A, B,
and C)
• Each user device is acting as a DTE and each network node is acting as a DCE.
• Packets are routed based on the routing table via different paths.
• Reassembly is done at the receiving node.
• The DTE device transmits data to the network via synchronous mode
X.25protocol.
• Error checking and retransmission is done at every node.
Network Layer Functions &
X.75 Internetworking
Protocol
Network Layer Functions
• It uses X.25 protocol as it defines the network layer features and functions.
• The concepts are used with respect to:
1. PVCs and VC/SVC
2. VC and LCNs
3. X.25 Control Packet Format
4. Normal Data Packet Format
5. Flow Control and Windowing
6. Fast Connect Option
PVCs and SVCs/VC
• Two types of X.25 virtual circuits exists:
• Switched Virtual Circuits (SVCs): These are temporary connections used for
irregular data transfers. They require 2 DTE devices establish, maintain, and terminate a
session each time the devices need to communicate. Eg: Telephonic Call
• Permanent Virtual Circuits (PVCs): These are permanently established connections
used for frequent and consistent data transfers. PVCs do not require that session be
established and terminated. Therefore, DTEs can begin transferring data whenever
necessary because the session is always active.
PVCs and SVCs/VC (Cont..)
• Three users of a public X.25
packet switching network.
• Each user has a single DS0
access circuit to network.
• Each PVCs carries traffic in both
the directions.
• SVCs operate in the same
manner, but are established and
terminated on demand.
PVCs and SVCs/VC (Cont..)
• Figure shows the standard SVCs X.25 packet
transfer sequence.
• The establishment of an SVC virtual call, data
transfer and then call clearing.
• Data transfer stage can last any amount of time.
• The delay factor must be taken into consideration
during the design.
LCN Assignment
• LCN: Logical Channel Number
• The following 5 events occur:
• Link is set up between local DTE & DCE node and also between the remote DTE &
DCE.
• VC is established between the local and remote DTE.
• Data is transferred between two DTEs.
• VC is released.
• Link is disconnected.
LCN Assignment (Cont..)
• Upto 4095 (2^12) multiplexed channels between each DTE and DCE are
provided.
• The calling and called hosts use different numbers.
X.25 Control Packet Formats
Figure depicts the packet format for call request and
incoming calls
X.25 Control Packet Formats (Cont..)
Control packet are used for VC setup and termination.
• The fields used are:
1. General format identifier: Indicates the general format of the rest of the header (call setup,
clearing, flow control, reset or data packet.)
2. Logical Channel Group Number (LCGN): Logical significance for each logical channel.
3. LCNs: Assigned for each incoming and outgoing virtual circuit for each DCE and DTE.
4. Control Packet Type Identifier: Related packet type (format identifier) from DCE to DTE
and from DTE to DCE.
5. Additional Bytes: Contain information that is packet specific (call request or incoming packets,
reset, etc.)
X.25 Control Packet Formats (Cont..)
• The various packet types in X.25 packet format are:
1. Clear Packet
2. Interrupt Packet
3. RR and RNR Packet
4. Reset Packet
5. Restart Packet
6. Diagnostic Packet
Normal Data Packet Format
Normal Data Packets are transferred
after the call setup and before call
termination.
Normal Data Packet Format
• The bits used in the Normal Data Packet Format are:
• Qualified bit (Q): Distinguish between user data or user device control data stream.
• Data bit (D): Set to 0 if the flow and acknowledgment have local significance. Set to 1 to designate
end-to-end-significance.
• LCGN and LCNs: Together provide 12 bits needed to form the VC.
• P(R) and P(S): Designated for the receive and send sequence count respectively.
• More (M) bit: Set to 0 throughout the length of the message, set to 1 for last packet of the message.
• Data field: Specifies the maximum size and contains the actual user data.
Flow Control and Windowing
Flow Control and Windowing (Cont..)
• The send and receive sequence numbers in X.25 packet level are also used to
provide flow control between the packet level source and sink.
• Source is a transmitting device and sink is a device that receives.
• The sequence numbers are incremented modulo the maximum window size.
• The figure before uses Modulo 4 i.e. 0,1,2,3.
• The RSN in the acknowledgment indicates the next SSN expected in the next
packet from the other end of the virtual circuit.
Flow Control and Windowing (Cont..)
• The RSN acts as an acknowledgement for all packets up to one less than the
RSN.
• The transmitter can send no more packets than modulo-1 without
acknowledgment.
• As shown in the figure three packets and then waits for the acknowledgment
before sending any additional packets. This is called as sliding window flow
control protocol.
Flow Control and Windowing (Cont..)
• This process allows the receiver to control the maximum rate of
transmission over a virtual circuit, mainly used for traffic control.
• The RSN acknowledgment can be piggybacked in the packet header for a
packet headed in the opposite direction on a virtual circuit, or can be sent in
a separate acknowledgment packet.
• Window Size is directly proportional to traffic load on the logical
channel so recources should be wisely used.
Fast Connect Option
Fast Connect Option
• Fast Connect Option is also available for fast packet transactions in X.25.
• Each packet has the call request format together with the data so the
establishment of a virtual circuit is not required.
• There are two types of fast connect option:
• Fast select call
• Fast select with immediate clear
Fast Connect Option (Cont..)
1. Fast select call:
• The packet select packet from user A has both call request and user data (upto 128bytes
of data) and user B can respond with a call-accept packet that also contains user data
from user B.
• The rest of the call connection and disconnect works the same as an SVC call
2. Fast select with immediate clear:
• This is similar to fast select with the call request packet establishing the connection and
the clear indication packet terminating the connection.
X.75 Internetworking Protocol
X.75 Internetworking Protocol (Cont..)
• ITU-T Recommendation X.75 defines the protocol structure and procedures
for internetworking multiple X.25 packet switching private data networks
(PSPDNs).
• X.75 can be used to:
• share network resources and data across the international or mutiprovider area.
• connect larger backbone packet switches to one another.
• Translate address in conjunction with the X.121 address protocol standard.
• Multilink procedures to support multiple links between signalling terminal exchange (STE).
X.75 Internetworking Protocol (Cont..)
• The figure shows DTEs from 2 separate X.25 networks located in US and
UK communicating via X.75 protocol.
• The X.75 link is transparent to the end user.
• The figure is an example of X.75 being used as an international packet
switching service.
Ad

More Related Content

What's hot (20)

Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
Dr Rajiv Srivastava
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
X.75 Internetworking protocol
X.75 Internetworking protocolX.75 Internetworking protocol
X.75 Internetworking protocol
Pradnya Saval
 
Switching
Switching Switching
Switching
Abid Ali
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
Meenakshi Paul
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
X.25
X.25X.25
X.25
Madhumita Tamhane
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
Abdelkhalik Mosa
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
Nt Arvind
 
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
Destro Destro
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Chapter13
Chapter13Chapter13
Chapter13
KathirKathiresan4
 
X.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOLX.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOL
Rajkumar Mondal
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
pkaviya
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
Aalok Shah
 
Chap 03
Chap 03Chap 03
Chap 03
Shraddha Patel
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
Dr Rajiv Srivastava
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
X.75 Internetworking protocol
X.75 Internetworking protocolX.75 Internetworking protocol
X.75 Internetworking protocol
Pradnya Saval
 
Switching
Switching Switching
Switching
Abid Ali
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
Abdelkhalik Mosa
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
Nt Arvind
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
Destro Destro
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
pkaviya
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
Aalok Shah
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 

Similar to Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol (20)

Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
SnehPrasad2
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptx
DharshanB8
 
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
SnehPrasad2
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
Fabio Almeida- Oficina Eletrônica
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
zaisahil
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
LAVANYAsrietacin
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
Karthikeyan Dhayalan
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
MohammedAnas871930
 
unit 3 computer networks-switching,packet switching,internet protocol.
unit 3 computer networks-switching,packet switching,internet protocol.unit 3 computer networks-switching,packet switching,internet protocol.
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
chali100
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
zaisahil
 
Computer Network
Computer NetworkComputer Network
Computer Network
Rubaya Mim
 
1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx
NaserDelic1
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
Chap 03
Chap 03Chap 03
Chap 03
Shraddha Patel
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
ABDUL WAHAB KORAI
 
Unit 1 Circuit and Packet Switching.pptx
Unit 1 Circuit and Packet Switching.pptxUnit 1 Circuit and Packet Switching.pptx
Unit 1 Circuit and Packet Switching.pptx
Vikas Goyal
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
Dr. Shivashankar
 
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): fra...
SnehPrasad2
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptx
DharshanB8
 
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
SnehPrasad2
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
zaisahil
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
Karthikeyan Dhayalan
 
unit 3 computer networks-switching,packet switching,internet protocol.
unit 3 computer networks-switching,packet switching,internet protocol.unit 3 computer networks-switching,packet switching,internet protocol.
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
campus_design_eng1.ppt
campus_design_eng1.pptcampus_design_eng1.ppt
campus_design_eng1.ppt
chali100
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
zaisahil
 
Computer Network
Computer NetworkComputer Network
Computer Network
Rubaya Mim
 
1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx1 - Understending Local Area network (1).pptx
1 - Understending Local Area network (1).pptx
NaserDelic1
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
Unit 1 Circuit and Packet Switching.pptx
Unit 1 Circuit and Packet Switching.pptxUnit 1 Circuit and Packet Switching.pptx
Unit 1 Circuit and Packet Switching.pptx
Vikas Goyal
 
Ad

More from Pradnya Saval (20)

Erp implementation and lifecycle
Erp implementation and lifecycleErp implementation and lifecycle
Erp implementation and lifecycle
Pradnya Saval
 
Electronic customer relationship management (e crm)
Electronic customer relationship management (e crm)Electronic customer relationship management (e crm)
Electronic customer relationship management (e crm)
Pradnya Saval
 
Data warehouse and data mining
Data warehouse and data miningData warehouse and data mining
Data warehouse and data mining
Pradnya Saval
 
Concepts of erp
Concepts of erpConcepts of erp
Concepts of erp
Pradnya Saval
 
Understanding major functional systems
Understanding major functional systemsUnderstanding major functional systems
Understanding major functional systems
Pradnya Saval
 
Supply chain management (scm)
Supply chain management (scm)Supply chain management (scm)
Supply chain management (scm)
Pradnya Saval
 
Knowledge process outsourcing
Knowledge process outsourcingKnowledge process outsourcing
Knowledge process outsourcing
Pradnya Saval
 
Erp softwares
Erp softwaresErp softwares
Erp softwares
Pradnya Saval
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
Pradnya Saval
 
Deep Learning - RNN and CNN
Deep Learning - RNN and CNNDeep Learning - RNN and CNN
Deep Learning - RNN and CNN
Pradnya Saval
 
Integrated services - IntServ
Integrated services - IntServIntegrated services - IntServ
Integrated services - IntServ
Pradnya Saval
 
WAN Technology - ATM
WAN Technology - ATMWAN Technology - ATM
WAN Technology - ATM
Pradnya Saval
 
Data Communication and Optical Network
Data Communication and Optical Network Data Communication and Optical Network
Data Communication and Optical Network
Pradnya Saval
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
Pradnya Saval
 
Data Communications and Optical Network - Forouzan
Data Communications and Optical Network - ForouzanData Communications and Optical Network - Forouzan
Data Communications and Optical Network - Forouzan
Pradnya Saval
 
Integrated services and RSVP - Protocol
Integrated services and RSVP - ProtocolIntegrated services and RSVP - Protocol
Integrated services and RSVP - Protocol
Pradnya Saval
 
Differentiated services - Advance Routing
Differentiated services - Advance RoutingDifferentiated services - Advance Routing
Differentiated services - Advance Routing
Pradnya Saval
 
Theory of operations - Mature Packet Switching Protocols
Theory of operations - Mature Packet Switching ProtocolsTheory of operations - Mature Packet Switching Protocols
Theory of operations - Mature Packet Switching Protocols
Pradnya Saval
 
User connectivity - Mature Packet Switching Protocols
User connectivity - Mature Packet Switching ProtocolsUser connectivity - Mature Packet Switching Protocols
User connectivity - Mature Packet Switching Protocols
Pradnya Saval
 
IP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay ModelIP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay Model
Pradnya Saval
 
Erp implementation and lifecycle
Erp implementation and lifecycleErp implementation and lifecycle
Erp implementation and lifecycle
Pradnya Saval
 
Electronic customer relationship management (e crm)
Electronic customer relationship management (e crm)Electronic customer relationship management (e crm)
Electronic customer relationship management (e crm)
Pradnya Saval
 
Data warehouse and data mining
Data warehouse and data miningData warehouse and data mining
Data warehouse and data mining
Pradnya Saval
 
Understanding major functional systems
Understanding major functional systemsUnderstanding major functional systems
Understanding major functional systems
Pradnya Saval
 
Supply chain management (scm)
Supply chain management (scm)Supply chain management (scm)
Supply chain management (scm)
Pradnya Saval
 
Knowledge process outsourcing
Knowledge process outsourcingKnowledge process outsourcing
Knowledge process outsourcing
Pradnya Saval
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
Pradnya Saval
 
Deep Learning - RNN and CNN
Deep Learning - RNN and CNNDeep Learning - RNN and CNN
Deep Learning - RNN and CNN
Pradnya Saval
 
Integrated services - IntServ
Integrated services - IntServIntegrated services - IntServ
Integrated services - IntServ
Pradnya Saval
 
WAN Technology - ATM
WAN Technology - ATMWAN Technology - ATM
WAN Technology - ATM
Pradnya Saval
 
Data Communication and Optical Network
Data Communication and Optical Network Data Communication and Optical Network
Data Communication and Optical Network
Pradnya Saval
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
Pradnya Saval
 
Data Communications and Optical Network - Forouzan
Data Communications and Optical Network - ForouzanData Communications and Optical Network - Forouzan
Data Communications and Optical Network - Forouzan
Pradnya Saval
 
Integrated services and RSVP - Protocol
Integrated services and RSVP - ProtocolIntegrated services and RSVP - Protocol
Integrated services and RSVP - Protocol
Pradnya Saval
 
Differentiated services - Advance Routing
Differentiated services - Advance RoutingDifferentiated services - Advance Routing
Differentiated services - Advance Routing
Pradnya Saval
 
Theory of operations - Mature Packet Switching Protocols
Theory of operations - Mature Packet Switching ProtocolsTheory of operations - Mature Packet Switching Protocols
Theory of operations - Mature Packet Switching Protocols
Pradnya Saval
 
User connectivity - Mature Packet Switching Protocols
User connectivity - Mature Packet Switching ProtocolsUser connectivity - Mature Packet Switching Protocols
User connectivity - Mature Packet Switching Protocols
Pradnya Saval
 
IP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay ModelIP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay Model
Pradnya Saval
 
Ad

Recently uploaded (20)

QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 

Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol

  • 1. Module 4 Protocols and Interfaces By: Ms. Pradnya Saval Asst. Prof. TCET Mumbai
  • 2. Contents • Issues in IPV4 • IPV6 protocol • Mature Packet Switching Protocols: • ITU Recommendation X.25, • User Connectivity, • Theory of Operations, • Network Layer Functions, • X.75 Internetworking Protocol
  • 3. IPV4 • 32-Bit Addressing (2^32 Addresses = 4,294,967,296) • Studies say that there will not be enough addresses anymore in future due to the increase in mobile IP generation
  • 4. Issues in IPV4 • Less Address Space • IP address starvation • Distribution of addresses (USA >50%) • Routing is complicated • Realization of new technologies (Mobile computing, real time services, multicast, security, QOS, etc.)
  • 5. IPV6 • 128-bit addresses (2^128 Addresses = 3.4*10^38) • IPv6 resolves the following issues: • Larger address space • Better header format • New options • Allowance for extension • Support for resource allocation • Support for more security
  • 6. IPV4 & IPV6 Header Format
  • 8. Extension Headers (Cont..)  Hop-by-Hop Option: The hop-by-hop option is used when the source needs to pass information to all routers visited by the datagram.  Source Routing: The source routing extension header combines the concepts of the strict source route and the loose source route options  Fragmentation: The source or a router is required to fragment if the size of the datagram is larger than the MTU of the network over which the datagram travels.  Authentication: The authentication extension header has a dual purpose: it validates the message sender and ensures the integrity of data  Encrypted Security Payload: The encrypted security payload (ESP) is an extension that provides confidentiality and guards against eavesdropping.  Destination Option: The destination option is used when the source needs to pass information to the destination only. Intermediate routers are not permitted access to this information
  • 10. TRANSITION FROM IPv4 TO IPv6 (Cont..) • Dual Stack: • To determine which version to use when sending a packet to a destination, the source host queries the DNS. If the DNS returns an IPv4 address, the source host sends an IPv4 packet. If the DNS returns an IPv6 address, the source host sends an IPv6 packet.
  • 11. TRANSITION FROM IPv4 TO IPv6 (Cont..) • Tunneling: • Tunneling is a strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4.
  • 12. TRANSITION FROM IPv4 TO IPv6 (Cont..) • Header Translation: • Header translation is necessary when the majority of the Internet has moved to IPv6 but some systems still use IPv4.
  • 13. Switched Communication Network • Three Types of Switched Communication Network • Circuit Switched • Message Switched • Packet Switched • Datagram Approach • Virtual Circuit Approach
  • 14. Packet Switched Datagram and Virtual Circuit Approach
  • 15. X.25 Network • X.25 is a standard reliable protocol for WAN communications • It is typically used in the packet-switched networks (PSNs) of common carriers, such as the telephone companies. • Subscribers are charged based on their use of the network. • Uses Virtual Circuit Approach • The devices used in X.25 network fall into three general categories: • data terminal equipment (DTE), • data circuit-terminating equipment (DCE), • packet-switching exchange (PSE) 15
  • 17. ITU Recommendation X.25 Network (Cont..) • Data Terminal Equipment (DTE) • Devices are end systems that communicate across the X.25 network. • They are usually terminals, personal computers, or network hosts, and are located on the premises of individual subscribers. • Data communication Equipment (DCEs) • are communications devices, such as modems and packet switches that provide the interface between DTE devices and a PSE, and are generally located in the carrier's facilities. • Packet-switching Exchange (PSEs) • are switches that compose the bulk of the carrier's network. They transfer data from one DTE device to another through the X.25 PSN. 17
  • 18. ITU Recommendation X.25 Network (Cont..) Packet Assembler/Disassembler • The packet assembler/disassembler (PAD) is a device commonly found in X.25 networks. • The PAD is located between a DTE device and a DCE device and it performs three primary functions: • buffering (storing data until a device is ready to process it), • packet assembly, • and packet disassembly 18
  • 19. X.25 Network - Protocol Suite 19 The X.25 protocol suite maps to the lowest three layers of the OSI reference model. The layers are: • Physical Level: Deals with the physical interface between an attached station and the link that attaches that station to the packet-switching node. X.21 is the most commonly used physical layer standard.
  • 20. X.25 Network - Protocol Suite • Frame (Link) Level: • Facilitates reliable transfer of data across the physical link by transmitting the data as a sequence of frames. • Uses Link Access Protocol Balanced (LAPB), bit oriented protocol. • Link Layer performs following functions: • Transfer of data in an efficient and timely fashion • Synchronization of the link to ensure that the receiver is in step with the transmitter • Detection of transmission errors and recovery of errors. • Identification and reporting of procedural errors to higher level for recovery 20
  • 21. X.25 Network - Protocol Suite Packet Level: • Responsible for end-to-end connection between two DTEs. • Also called as Packet layer Protocol (PLP) • Procedures: • SVC • PVC • DGs • Fast Select 21 • Functions performed are: • Establishing connection • Transferring data • Terminating a connection • Error and flow control • With the help of X.25 packet layer, data are transmitted in packets over external virtual circuits.
  • 24. User Connectivity • ITU-T Recommendations X.3, X.28 and X.29 are defined as link-level protocols that provide DTE with asynchronous terminal interfaces to X.25 networks. • Communicate only via low-speed asynchronous mode. • X.25 also provides synchronous user connectivity. • There are three examples of asynchronous and BSC DTE terminal connectivity options.
  • 25. Interface Protocols of X.25 packet switching network
  • 26. Interface Protocols of X.25 packet switching network (Cont..) • Recommendation X.121: Defines the international numbering plan for packet switching networks. • Recommendation X.28: Defines the operational control of these functions between the character mode terminal DTE device and the DCE packet assembler/disassembler. • Recommendation X.29: Defines the same controls, but for the host computer destination. • Recommendation X.3: Defines a PAD concentrator function for start-mode or character- mode DTE devices. • Recommendation X.22: Defines X.25 synchronous dial-up mode for DTE services.
  • 27. Theory of Operations 1. Traffic Characteristics 2. X.25 Packet Switching Operation
  • 28. Traffic Characteristics • To understand packet switching protocols following details must be known: • Types of traffic for transport • Characteristics of traffic • Bursty Traffic: • Data Transmission with duration of less than 5 seconds. • Often travels in one direction rather than equally in both direction. • Eg: HTTP browsing
  • 29. Traffic Characteristics • Packet Switching networks accommodate traffic that is not delay- sensitive. • Two primary requirements for packet networks are burstiness and delay-insensitive traffic. • Due to dynamic allocation of bandwidth technique used by packet switching, bursty delay-insensitive traffic is ideal for transport over a packet switching network.
  • 30. • The figure shows that: • Low speed terminal users at site A, B and C. • High Speed user host. • Terminals could use low speed X.3 circuits to request information downloads from the host. • Terminal traffic is very light (low-bandwidth usage) compared to the data traffic from the host (high-bandwidth usage). • The single 56Kbps multiplexed X.25 line from the host into the packet switching network depicts the efficiency of asymmetrical traffic patterns where the host will transmit much more traffic than it receives.
  • 32. X.25 Packet Switching Operation (Cont..) • Packet Switching Network shows 6 nodes (1-6) each with 3 users (terminal A, B, and C) • Each user device is acting as a DTE and each network node is acting as a DCE. • Packets are routed based on the routing table via different paths. • Reassembly is done at the receiving node. • The DTE device transmits data to the network via synchronous mode X.25protocol. • Error checking and retransmission is done at every node.
  • 33. Network Layer Functions & X.75 Internetworking Protocol
  • 34. Network Layer Functions • It uses X.25 protocol as it defines the network layer features and functions. • The concepts are used with respect to: 1. PVCs and VC/SVC 2. VC and LCNs 3. X.25 Control Packet Format 4. Normal Data Packet Format 5. Flow Control and Windowing 6. Fast Connect Option
  • 35. PVCs and SVCs/VC • Two types of X.25 virtual circuits exists: • Switched Virtual Circuits (SVCs): These are temporary connections used for irregular data transfers. They require 2 DTE devices establish, maintain, and terminate a session each time the devices need to communicate. Eg: Telephonic Call • Permanent Virtual Circuits (PVCs): These are permanently established connections used for frequent and consistent data transfers. PVCs do not require that session be established and terminated. Therefore, DTEs can begin transferring data whenever necessary because the session is always active.
  • 36. PVCs and SVCs/VC (Cont..) • Three users of a public X.25 packet switching network. • Each user has a single DS0 access circuit to network. • Each PVCs carries traffic in both the directions. • SVCs operate in the same manner, but are established and terminated on demand.
  • 37. PVCs and SVCs/VC (Cont..) • Figure shows the standard SVCs X.25 packet transfer sequence. • The establishment of an SVC virtual call, data transfer and then call clearing. • Data transfer stage can last any amount of time. • The delay factor must be taken into consideration during the design.
  • 38. LCN Assignment • LCN: Logical Channel Number • The following 5 events occur: • Link is set up between local DTE & DCE node and also between the remote DTE & DCE. • VC is established between the local and remote DTE. • Data is transferred between two DTEs. • VC is released. • Link is disconnected.
  • 39. LCN Assignment (Cont..) • Upto 4095 (2^12) multiplexed channels between each DTE and DCE are provided. • The calling and called hosts use different numbers.
  • 40. X.25 Control Packet Formats Figure depicts the packet format for call request and incoming calls
  • 41. X.25 Control Packet Formats (Cont..) Control packet are used for VC setup and termination. • The fields used are: 1. General format identifier: Indicates the general format of the rest of the header (call setup, clearing, flow control, reset or data packet.) 2. Logical Channel Group Number (LCGN): Logical significance for each logical channel. 3. LCNs: Assigned for each incoming and outgoing virtual circuit for each DCE and DTE. 4. Control Packet Type Identifier: Related packet type (format identifier) from DCE to DTE and from DTE to DCE. 5. Additional Bytes: Contain information that is packet specific (call request or incoming packets, reset, etc.)
  • 42. X.25 Control Packet Formats (Cont..) • The various packet types in X.25 packet format are: 1. Clear Packet 2. Interrupt Packet 3. RR and RNR Packet 4. Reset Packet 5. Restart Packet 6. Diagnostic Packet
  • 43. Normal Data Packet Format Normal Data Packets are transferred after the call setup and before call termination.
  • 44. Normal Data Packet Format • The bits used in the Normal Data Packet Format are: • Qualified bit (Q): Distinguish between user data or user device control data stream. • Data bit (D): Set to 0 if the flow and acknowledgment have local significance. Set to 1 to designate end-to-end-significance. • LCGN and LCNs: Together provide 12 bits needed to form the VC. • P(R) and P(S): Designated for the receive and send sequence count respectively. • More (M) bit: Set to 0 throughout the length of the message, set to 1 for last packet of the message. • Data field: Specifies the maximum size and contains the actual user data.
  • 45. Flow Control and Windowing
  • 46. Flow Control and Windowing (Cont..) • The send and receive sequence numbers in X.25 packet level are also used to provide flow control between the packet level source and sink. • Source is a transmitting device and sink is a device that receives. • The sequence numbers are incremented modulo the maximum window size. • The figure before uses Modulo 4 i.e. 0,1,2,3. • The RSN in the acknowledgment indicates the next SSN expected in the next packet from the other end of the virtual circuit.
  • 47. Flow Control and Windowing (Cont..) • The RSN acts as an acknowledgement for all packets up to one less than the RSN. • The transmitter can send no more packets than modulo-1 without acknowledgment. • As shown in the figure three packets and then waits for the acknowledgment before sending any additional packets. This is called as sliding window flow control protocol.
  • 48. Flow Control and Windowing (Cont..) • This process allows the receiver to control the maximum rate of transmission over a virtual circuit, mainly used for traffic control. • The RSN acknowledgment can be piggybacked in the packet header for a packet headed in the opposite direction on a virtual circuit, or can be sent in a separate acknowledgment packet. • Window Size is directly proportional to traffic load on the logical channel so recources should be wisely used.
  • 50. Fast Connect Option • Fast Connect Option is also available for fast packet transactions in X.25. • Each packet has the call request format together with the data so the establishment of a virtual circuit is not required. • There are two types of fast connect option: • Fast select call • Fast select with immediate clear
  • 51. Fast Connect Option (Cont..) 1. Fast select call: • The packet select packet from user A has both call request and user data (upto 128bytes of data) and user B can respond with a call-accept packet that also contains user data from user B. • The rest of the call connection and disconnect works the same as an SVC call 2. Fast select with immediate clear: • This is similar to fast select with the call request packet establishing the connection and the clear indication packet terminating the connection.
  • 53. X.75 Internetworking Protocol (Cont..) • ITU-T Recommendation X.75 defines the protocol structure and procedures for internetworking multiple X.25 packet switching private data networks (PSPDNs). • X.75 can be used to: • share network resources and data across the international or mutiprovider area. • connect larger backbone packet switches to one another. • Translate address in conjunction with the X.121 address protocol standard. • Multilink procedures to support multiple links between signalling terminal exchange (STE).
  • 54. X.75 Internetworking Protocol (Cont..) • The figure shows DTEs from 2 separate X.25 networks located in US and UK communicating via X.75 protocol. • The X.75 link is transparent to the end user. • The figure is an example of X.75 being used as an international packet switching service.