Thursday, September 5, 2019
A Review On Public Switch Data Networks Information Technology Essay
A Review On Public Switch Data Networks Information Technology Essay A public data network is a network established and operated by a telecommunications administration, or a recognized private operating agency, for the specific purpose of providing data transmission services for the public. A public switched data network (PSDN) is a publicly-available packet-switched network, distinct from the PSTN. A general wide area network used to provide circuit switched data services for commercial users A publicly-available network supporting packet-switched data It is an all digital communications line that allows for the transmission of voice, data, video and graphics, at very high speeds, over standard communication lines It is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organizations network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization. A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two or more locations in exchange for a monthly rent (hence the term lease). It is sometimes known as a Private Circuit or Data Line in the UK. Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. The users computer or router uses an attached modem to encode and decode Internet Protocol packets and control information into and from analogue audio frequency signals, respectively. Feature Caller ID, Call Waiting, Voice Mail, and Call Forwarding à ®Ã¢â ¬Ã¢â ¬Need a connection establishment between end nodes. à ®Ã¢â ¬Ã¢â ¬Connection is maintained until one of end nodes terminates. à ®Ã¢â ¬Ã¢â ¬Connection is dedicated to the communication between two nodes. à ®Ã¢â ¬Ã¢â ¬Reduces the number and the total length of the links Data are transmitted in short messages called packets. à ®Ã¢â ¬Ã¢â ¬A connection between the two end-nodes is not maintained. à ®Ã¢â ¬Ã¢â ¬A node-to-node link can be dynamically shared by many packets. à ®Ã¢â ¬Ã¢â ¬Example : Public Data Network (PDN) likes X.25, Frame Relay. There are two types of PDN: CSPDN and PSPDN. Mostly used to provide leased-line connections between local area networks and the Internet Circuit switch network work by allowing multiple sessions to run between end-user by simply switchingto the most direct or available path Because a circuit switch dedicates bandwidth to each session, it is less effective from packet-switch. The advantage of circuit switch is transparent, and the path is always open, thus the delay through SCPDN is constant, which is ideal for real time application such as video. One of the disadvantage of CSPDN is they are very wasteful of bandwidth, because if the device is not transmitting data, the bandwidth will always be availalbe. Packet switch provide bandwidth on-demand. Advantage of PSPDN is it saved bandwidth, because they only use the bandwidth when there is data to transmit. All data in Packet switching is transmitted in frame/packets over a trunk, where each packet or frame can belong to a different session. All of the data being sent to the network is marked with a sequence number. This mean PSPDN can correct any data corrupt or loss within a network. Disadvantage of PSPDN is buffering. It builds on groups of standard transmission channels. Bearer channels (or B channels) transmit user information at relatively high speeds, while separate Data channels (or D channels) carry call set-up, signaling and other information. It handles all types of information. Unlike some other digital communications technologies, ISDN handles all types of information voice, data, studio-quality sound, still and moving images. They are all digitized, and transmitted at high speeds in the same flow of data. It handles many devices and many telephone numbers, on the same line. It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. There are many different classifications, implementations, and uses for VPNs. Typically, leased lines are used by businesses to connect geographically distant offices. Unlike dial-up connections, a leased line is always active. The fee for the connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance between end points and the speed of the circuit. Because the connection doesnt carry anybody elses communications, the carrier can assure a given level of quality. Dial-up connections to the Internet require no infrastructure other than the telephone network. Dial-up is often the only choice available for rural or remote areas where broadband installations are not prevalent due to low population and demand. Dial-up access may also be an alternative for users on limited budgets as it is offered free by some ISPs, though broadband is increasingly available at lower prices in many countries due to market competition. Network Interface Circuit-switched Packet Switching Packet Switching Circuit-switched Packet Switching Device-to-device interfaces are called reference points Interface R Located between Non-ISDN Terminal Equipment (TE2) and a Terminal Adapter (TA) Interface S/T Located between ISDN user equipment and Network Termination (NT1) equipment Interface U Located between NT1 equipment and an ISDN central office RJ45/RJ11 RJ45/RJ11 RJ45/RJ11 Components/ hardware configuration Consists of telephone lines, fiberoptic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables all inter-connected by switching centers which allows any telephone in the world to communicate with any other. In a LAN packet-switched environment, such as with an Ethernet network, the transmission of the data packets relies on packet switches, routers, and LAN cables using permanent virtual circuits (PVCs). Uses TDM (Time Division Multiplexing), SDH (Synchronous Digital Hierarchy) and PDH (Pleisochoronous Digital Hierarchy) Uses Frame Relay and STDM (Statistical Time Division Multiplexing) TE1- Any ISDN-ready device that connects directly to ISDN or connects to ISDN via an NT1. For example: a digital telephone, a GT 70 Series router. TE2- Any non-ISDN device that needs to be used with a Terminal Adapter (TA) to work with ISDN. For example: an analog FAX, PC, or analog telephone. TA-A device that converts non-ISDN communication to ISDN to allow non-ISDN devices to work with ISDN. NT1- A device located between the S/T and U reference points that allows communication between functional devices. Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by preventing message alteration. Leased lines are made up of the following components: a router, usually managed by the service provider, is installed into a customers comms room. The circuit is presented with an RJ45 connector as standard. local loop circuit, , links the router to the service providers local point of presence (POP). Network termination equipment (NTE) is attached to the wall in a comms room and is connected to either a fibre optic or copper local loop circuit. depending upon location, a back haul circuit may be used to link a customer to their service providers point of presence and then onto the internet gateway. This will take place behind the scenes and may run over a third partys national network. Protocols X.25 X.25 X.25 X.25 X.25 The LAPD (Link Access Protocol Channel D) is a layer 2 protocol Ipsec (Internet Protocol Security) SSL (Transport Layer Security) DTLS ( Datagram Transport Layer Security) SSH (Secure Shell VPN) Point-to-Point Protocol (PPP) Multi-Link Point-to-Point Protocol (ML-PPP) NetWare connect Point-to-Point Protocol (PPP) Multi-Link Point-to-Point Protocol (ML-PPP) NetWare connect Standards ITU-T, E.1263, E.164 CCITT/ITU-T ITU-T ITU-T ITU-T CCITT Q.920/921 IETF Wide Area Network Standard Wide Area Network Standard
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.