depends greatly on a particular company s current products or installed base.

Size: px
Start display at page:

Download "depends greatly on a particular company s current products or installed base."

Transcription

1 Exploiting the advantages of connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Abstract This paper proposes a scheme for taking advantage of the properties of both connectionless (CL) and connection-oriented (CO) networks to carry traffic from existing applications. Specifically, it proposes a solution for allowing data generated by endpoints on a CL (IP) network to be redirected to CO networks if there is an advantage from the user or service provider perspective. The advantage to a user is that the user can ask for and receive a guaranteed quality of service for a specific flow. The advantage to a service provider is that bandwidth utilization in a packet-switched CO network is better than in a CL network with precomputed routes since bandwidth can be dynamically allocated to flows on an as-needed basis. These advantages only exist when the CO network is operated in a switched mode (i.e., some connection setup actions are performed for each arriving flow) rather than in a provisioned mode (where all these actions are performed a priori). This paper addresses the problem of how to internetwork a CL (IP) network with a switched CO network. Our solution is based on interworking routing schemes of the two networks, halting or turning around datagrams during connection setup, and performing protocol conversion rather than encapsulation (on the user plane) to reduce overheads, which results in a further improvement of bandwidth utilization. The CO network can be an MPLS (MultiProtocol Label Switching) or RSVP (Resource reservation Protocol) based IP network, a WDM (Wavelength Division Multiplexed) network, an ATM (Asynchronous Transfer Mode) network, or an STM (Synchronous Time Multiplexing) network, such as the telephony network or a SONET network. The choice of a CO network depends greatly on a particular company s current products or installed base. The paper also presents a detailed discussion of why we propose operating CO networks in a switched mode for carrying data generated by IP applications. We show that operating any of the

2 2 above-listed CO networks in a provisioned mode is less efficient than a network of typical CL IP routers for the purposes of carrying bursty IP traffic. We also consider perceived drawbacks of the switched mode of operation, i.e., of having to deal with short-lived flows and large call handling capacities, and present our solutions to these issues. 1 Introduction Connectionless (CL) networks and connection-oriented (CO) networks have some fundamental distinguishing features. CO networks are those in which connection setup is performed prior to information transfer. In CL networks, no explicit connection setup actions are executed prior to transmitting data; instead, data packets are routed to their destinations based on information in their headers. These two types of networks enjoy advantages and disadvantages from both the user perspective and the service provider perspective. CL networks, for instance, do not suffer the delay and processing overhead associated with connection setup. In contrast, information about the connections in CO networks helps in providing service guarantees and, furthermore, makes it possible to most efficiently use network resources (e.g., bandwidth) by switching them to appropriate connections as they are established. The need to exploit the advantages of both CL and CO networks has long been recognized. Two examples are the use of SS7 (Signaling System No. 7) CL networks in conjunction with the CO telephony network, and the use of RSVP (Resource reservation Protocol [1]) in IP networks. In both these solutions, applications explicitly choose the networking mode appropriate to their needs. In this paper, we propose a different way to exploit the advantages of both networking modes (CO and CL). In our approach, existing applications running on endpoints continue operating in their currently-used networking mode (CO or CL). We propose that certain network nodes then decide whether

3 3 to continue carrying the information in this mode or whether to redirect the traffic to a network of the opposite networking mode. Not all nodes of the first network need to have the ability to make these redirect decisions. Only some nodes that have connectivity to both the CL network and the CO network need this capability. We call such nodes CL-CO gateways or CO-CL gateways based on whether the traffic-generating endpoint is in the CL network or in the CO network, respectively. This redirect capability is needed if either (i) the users desire service requirements different from those possible under the currently-used networking modes of their applications, or (ii) the service provider sees a potential advantage (such as lower cost or improved bandwidth utilization) in using an alternate networking mode than that assumed by the applications. In the former case, our proposal is to have users prespecify their new service requirements at subscription time, which are then met using traffic redirection to offer users their new service requirements without altering applications at their endpoints. In the latter case, if user service requirements can be met using both networks, traffic can be redirected if it proves advantageous to the service provider. As an example, consider telephone users who prefer that their connections be carried on the Internet to take advantage of lower costs. This desire can be specified at subscription time. The users, however, continue using their existing phone devices that have been designed to operate in the CO mode. Telephony-Internet gateways then redirect those users traffic from the telephony network on to the Internet. As another example, consider Internet users who want stricter quality-of-service guarantees for their file transfer application than is currently offered by the Internet. Such requirements are indicated to the service provider at subscription time while users continue using their existing file transfer applications assuming the CL mode. In this case, the CL-CO gateways perform the opposite function by redirecting traffic generated by Internet users on to some CO network that offers the required QoS guarantees. In Section 5, we list some of the benefits that service providers see in each mode.

4 4 To allow traffic to be redirected between CL and CO networks (in order to exploit the advantages of each), there are two cases to consider: traffic arriving from endpoints on the CL network is redirected on to a CO network, and traffic arriving from endpoints on the CO network is redirected on to a CL network. In general, information may actually be transported through a sequence of multiple CO and CL networking modes. General internetworking configurations with a combination of CO and CL modes can arise out of necessity (because, for example, only one mode is available some places) or intentionally to exploit the advantages of both CO and CL modes. It is fairly straightforward to redirect traffic originated by endpoints of a CO network to a CL network since, in a CO network, a call setup is generated, which can then be carried transparently through the CL network to set up a connection from the far-end CO-CL gateway to the destination endpoint on the CO network. Data arriving on the connection after it has been set up is carried in the CL mode on the segment between the CO-CL gateways. On the other hand, accepting data generated by an endpoint on a CL network at a CL-CO gateway and then setting up a connection in the CO network causes problems since there is a significant difference in the magnitude of user data arrival rates in current CL networks (packets arriving every few microseconds, or less) and current call setup times in CO networks (order of milliseconds). Buffering packets at the CL-CO gateway, while waiting for a connection to be set up, then becomes impractical. In this paper, we focus primarily on the more challenging problem of redirecting traffic generated by endpoints on a CL network on to a CO network. Our solution has two parts. First, we propose techniques that cause data to flow from the CL network nodes to the CL-CO gateways. This is done by setting up routing tables to take into account shortest paths that exist through the CO network. Second, we address the problem of how traffic (user-plane data) arriving at the CL-CO gateways is handled (until the desired connection is established in the CO network), given the long call setup delays asso-

5 5 ciated with CO networks. We propose either (i) halting the packets by, for example, intercepting TCP open-connection (Synchronize) segments while setting up the connection, or (ii) turning around a few packets back on to the CL network using, for example, source routing until the connection is set up. In Section 3, we discuss these and other schemes that fall into these two broad categories of halting and turning around. Before presenting our solutions in Sections 3 and 4, however, we first define the specific problem of interest in greater detail in Section 2. In Section 5, we provide additional motivation for solving these problems, and, in Section 6, we show that multiple networks (each with a different networking technology) can beneficially coexist by drawing an analogy to transportation networks. Finally, in Section 7, we make some comparisons of our approach to other existing proposals, and, in Section 8, we present our conclusions. 2 Problem Definition As stated in Section 1, this paper addresses the problem of internetworking a CL network and a CO network specifically for traffic generated by endpoints on the CL network. Since IP networks are currently the most dominant CL networks in use, we rephrase our problem formulation as follows: How do you internetwork an IP network (operated in CL mode) with a CO network (operated in the switched mode)? The problem statement emphasizes that the IP network is operated in CL mode because, currently, new protocols are being designed to allow for a CO mode of operation of an IP network (we treat this case in Section 4). Also, we emphasize that the CO network is operated in a switched mode; for clarification, we now consider the definition of this mode of operation and its alternatives. In CO networks, connection setup is performed prior to information transfer. Connection setup

6 6 actions consist of determining a route for the connection, allocating bandwidth (and possibly buffer) resources on the links and switches on the route, assigning and distributing labels or positions (e.g., time slots or wavelengths) based on whether the CO network is packet- or circuit-switched, respectively, programming connection information into switch fabrics and endpoints. If one or more of these actions occurs in response to a request to set up a connection for a specific data exchange, then the CO network is said to be operated in switched mode. 1 Otherwise, the CO network is said to be operated in provisioned mode. For example, when SONET is used to create pointto-point links between IP routers, then it is operating in a provisioned mode; the SONET connections are not set up for specific data transfers, but rather to just transport IP packets between routers. In Section 5, we discuss the advantages and disadvantages of the two modes (switched and provisioned), and, in Section 7, we list the advantages and disadvantages of internetworking IP networks with CO networks operated in these two modes. Fig. 1 shows a simple diagram of the two basic internetwork configurations we consider in this CL... Endpoint CL... CL... CL... CL... CL-CO Gateway CL-CO Gateway CL-CO Gateway CL-CO Gateway CO... CO... A. Parallel B. Interconnecting Fig. 1 Two modes of internetworking CO and CL networks 1. This definition allows for resources to be shared among multiple flows even in a switched mode of operation. More (shared) resources are reserved as additional flows arrive and are admitted.

7 7 paper. Fig. 1A shows a switched CO network in parallel with a CL network, and Fig. 1B shows a switched CO network between ( interconnecting ) two CL networks. The parallel configuration could occur, for example, if two service providers, one with an IP-router-based network and the other with a CO-switch-based network, offer enterprises long-distance connectivity of their geographically distributed networks. The interconnecting configuration occurs, for instance, when an enterprise decides to route all their traffic through a specific service provider who happens to use a CO network. More general internetwork configurations are also possible (e.g., combinations of Fig. 1A and Fig. 1B, and networks with greater numbers of CL-CO and CO-CL transitions). In both parallel and interconnecting configurations, the problem of how to contend with CL data arriving at CL-CO gateways before a connection has been established through the CO network needs to be solved. However, the issue of how to set up routing tables at the routers in the CL network to take advantage of shorter paths that may exist through the CO network (or to meet users subscribed-to service requirements) arises only for the parallel configuration (Fig. 1A) since communication paths between the CL-CO gateways exist in both the CL and the CO networks. In Fig. 1B, there is no choice but to direct the traffic to the CO network, which implies that the routing issue is answered more readily. In Fig. 1A, it is also important to note that while a connection is being set up in the CO network, communication can still take place through the CL networks. Furthermore, even after the connection is established in the CO network, data can be allowed to flow simultaneously through the CL and CO networks if both networks meet the user s needs. Fig. 2 shows one CL network (the IP network) and three important examples of CO networks: ATM (Asynchronous Time Multiplexed), STM (Synchronous Time Multiplexed) and WDM (Wavelength Division Multiplexed) networks 2. In this paper, we assume all three CO networks can be operated in the 2. In this paper, we assume WDM networks are circuit-switched (and, hence, CO). Newer WDM packet-switching technologies are currently under research.

8 8 switched mode. As a fourth example of a CO network (not pictured), traffic generated by applications assuming the CL mode can be carried in a CO mode through the IP network itself, if we apply RSVP or LDP (Label Distribution Protocol) [2] from router to router rather than from endpoint to endpoint. We Endpoint IP network IP routers ATM network STM network WDM network STM ATM WDM optical switches switches ADMs/crossconnects (PDH/ SONET/SDH) Endpoint Connectionless (CL) Fig. 2 Four types of networks Connection-oriented (CO) ADM: Add-Drop Multiplexer PDH: Plesiochronous Digital Hierarchy SDH: Synchronous Digital Hierarchy SONET: Synchronous Optical Networks STM: Synchronous Transfer Mode WDM: Wavelength Division Multiplexed discuss this special case in Section 4. It is a special case because every CO node also has CL capability; for the three CO networks shown in Fig. 2, the CO nodes do not have collocated CL capability. Assuming that all three CO networks shown in Fig. 2 are physically connected to the IP network (i.e., as in Fig. 1A), the problem is to design methods of directing some traffic (from applications, for example, that desire service requirements different from that offered in the CL network) from IP routers to any of the three switched CO networks and then back on to the IP network prior to reaching the end destinations. We only consider endpoints physically connected to the IP network (see Fig. 2) because, as stated in Section 1, we are not considering the problem of how to redirect traffic originated by endpoints of a CO network to a CL network in this paper. In Section 5, we explain in greater detail why we are interested in solving this problem (especially

9 9 why the use of switched CO networks), and we make some additional observations about CL and CO networks. First, however, we present some solutions. 3 A gateway that internetworks an IP network and any switched CO network As defined in Section 1, CL-CO gateways (as shown in Fig. 3) are IP routers that are equipped to decide when to redirect traffic on to a switched CO network. In addition, these CL-CO gateways are also nodes of the CO network and therefore execute the routing and signaling protocols of the CO network. For example, a CL-CO gateway between an IP network and a WDM network is both an IP router and a WDM optical cross-connect or add/drop multiplexer. R 1 R 6 R 3 R 5 R 2 R 7 R 4 GW 1 GW 2 Switch 1 Switch 2 Switch 3 Switch 4 Switch 5 IP network (consisting of IP routers) GW 3 CO network Fig. 3 Internetworking of an IP network and a switched CO network In this section, we discuss actions performed in the CL-CO gateways that enable the internetworking of connectionless IP networks and CO networks operated in a switched mode. These actions define our proposed solution, and consist of: 1. Creating routing tables that enables data flow from the IP network to the CO network. 2. Designing user-plane actions to handle IP packets that arrive at CL-CO gateways to be carried on (not-yet-established) connections in the CO network, plus IP packets that arrive at CL-CO gateways but then remain in the CL network. These two sets of actions are described in Sections 3.1 and 3.2, respectively. Both internetworking configurations shown in Fig. 1 need the set of user-plane actions, while only the parallel configura-

10 10 tion of Fig. 1A needs the set of routing actions. In Fig. 1B (the interconnecting configuration), there is only one option for routing packets between the CL islands, i.e., through the CO network. Hence, no special routing actions are needed to create data flows to the CL-CO gateways. 3.1 Routing related actions There are two ways (described in Sections and 3.1.2) to create the routing tables that will enable data flow from the IP network to the CO network: the CO network can be represented as a non-broadcast network in the IP routing protocol (this affects routing information at CL-CO gateways and other routers). integrated routing tables for both the IP and CO networks can be maintained at the CL-CO gateways. A third scheme (described in Section 3.1.3), which allows for user-specific routing information to be maintained at the CL-CO gateways, can be operated in conjunction with either of the above schemes Representing the CO network as a non-broadcast network Consider the OSPF (Open Shortest Path First) routing protocol [3] commonly used in IP networks. In the most common configurations, routers running OSPF are connected via point-to-point links or broadcast networks, such as ethernet. However, OSPF also allows routers to be interconnected via nonbroadcast networks. A common interpretation of the term non-broadcast network is a switched CO network, such as an X.25 network or ATM network. Thus, OSPF allows routers to be interconnected via a CO network without provisioned connections; provisioned connections are treated merely as point-to-point links by OSPF. To handle non-broadcast networks, two modes of operation are recommended in the OSPF specification [3]: (i) NBMA (Non-Broadcast Multi-Access) and (ii) point-to-multipoint. In the NBMA mode, the non-broadcast network emulates a broadcast network and assigns designated routers (and backup designated routers) to generate network state advertisements, while in the point-to-multipoint mode, the non-broadcast network is advertised as a set of point-to-point links

11 11 between some of the routers on the non-broadcast network. Using either of these modes, the CO network is represented as part of the IP network topology. Routing tables constructed in the IP routers (including the CL-CO gateways) take into account the presence of the non-broadcast network, and enable traffic to flow from the IP network to the CO network and back to the IP network if paths through the CO network are shorter according to some measure of interest. For purposes of this discussion, we assume that the CO network is operated in a point-to-multipoint mode. Use of the NBMA mode is equally applicable. Also, while the description below assumes the OSPF routing protocol, the concept is readily applicable to other IP routing protocols. We use the network of Fig. 3 to illustrate the concept. CL-CO gateway nodes GW 1, GW 2, and GW 3 generate Link State Advertisements (LSAs) that report point-to-point links between themselves even when there are no connections between the CL-CO gateways. For example, GW 1 sends an OSPF LSA to router R 6 indicating that it has direct links to routers GW 2 and GW 3. The links reported in the LSAs appear in the OSPF topology database of all the routers in the same OSPF area and have associated link weights. In the Fig. 3 example, the network view of all the IP routers (including the CL-CO gateways) could be as shown in Fig. 4. The weight shown next to each link is an operator-assigned link R 1 5 R 6 R GW R R 5 2 R 7 1 GW 2 1 R IP network (consisting of IP routers) GW 3 Fig. 4 Topological view of each router (and gateway) weight. In this example, the shortest path from R 4 to R 7 is R 4 GW 3 GW 2 R 7, while the short-

12 12 est path from R 4 to R 5 is R 4 R 3 R 5. Thus, based on the link weights, part of the end-to-end path can be taken through the CO network, or the entire end-to-end path may be taken through the IP network. For paths that take gateway-to-gateway links, connections need to be set up through the CO network (from CL-CO gateway to CL-CO gateway) when data arrives at a CL-CO gateway Maintaining integrated IP-CO routing tables at the CL-CO gateways In this scheme, no announcements are made about the CO network by the CL-CO gateways. Packets only appear at a CL-CO gateway if it is part of the shortest path according to the IP routing tables. Besides the IP and CO routing tables, CL-CO gateways also maintain a routing table that integrates information about the IP and CO networks. Each CL-CO gateway determines shortest paths to IP destinations by comparing its path on the two networks for each destination. The shorter of the two paths is maintained at the CL-CO gateway in an integrated IP-CO routing table for each destination address. Given that the CL-CO gateway is an IP router, it needs to maintain a database of routes to IP addresses that do not make use of the CO network, since these databases are synchronized between adjacent routers. However, the shortest path used is that indicated in the integrated IP-CO routing table. For example, the OSPF topology database maintained at the IP routers in Fig. 4 would not know about the three links between the CL-CO gateways. If R 6 needs to send data to R 4, it will send it through GW 1 with the expected route of R 6 GW 1 R 3 R 4. However, the integrated IP-CO routing table in GW 1 indicates that a shorter path exists to R 4 via GW 3, and, consequently, the data will follow the path R 6 GW 1 GW 3 R 4. Notice that this integrated routing scheme requires that a CL-CO gateway be at least double-homed in to the IP network in order for it to receive any transit packet (not destined for itself) from the IP network; otherwise, it could not be part of the shortest path according to the IP routing tables. Furthermore, since the availability of the CO network is unknown to the IP routers, the amount of traffic that

13 13 will be sent to the CL-CO gateways will probably be smaller than can be handled by the CO network User-specific routing information at the CL-CO gateways As stated in Section 1, one motivation for building these CL-CO gateways is to allow users to exploit the advantages of CO and CL networks without having to change their existing applications. Thus, if users specify their desired service requirements at subscription time, the network provider can set user-specific routing tables at the CL-CO gateways. Once data is directed to CL-CO gateways from IP routers based on generic routing tables (using either of the schemes described in Sections or 3.1.2), the user-specific routing then determines which users flows are sent to the CO network. 3.2 User-plane actions Having addressed in Section 3.1 the routing related actions that enable data flow from the IP network to the CO network, in this section we focus on user-plane actions to handle IP packets that arrive at CL-CO gateways. Connections are set up through the CO network for some, but not necessarily all, of the arriving TCP and UDP flows. Thus, CL-CO gateways need to both handle traffic from flows for which connections are set up, as well as continue forwarding packets through the CL network from flows for which connections are not set up. The decision to set up connections is made at the CL-CO gateways, based on the user-specified service requirements and the traffic situation in the CL and CO networks; specific algorithms are beyond the scope of this paper. If the routing scheme used is that of Section 3.1.2, neither type of traffic poses a serious problem since the default path expected by the IP network provides a path from the CL-CO gateways through the IP network to the destination. For instance, for the first type of traffic, packets can be forwarded on the IP network while a connection is being set up. Later in this section, we discuss other solutions for handling packets while a connection is being set up. However, if the routing scheme of Section is used, then both types of traffic - flows for which

14 14 a connection is set up and flows for which a connection is not set up - pose a problem. First, for traffic that requires a connection, a situation unnatural to CO networks arises in that user data is presented to a CO network without a request for connection setup. Typically, this does not happen. For example, we do not start speaking into a phone before dialing. Similarly, a connection is first set up from a PC to an IP router through the telephony network (for PCs with modem access to the Internet), and then an IP application (one that generates IP traffic), such as a web browser, is started at the endpoint PC. Second, if the routing scheme of Section is used and a connection is not set up for a particular traffic flow, then that traffic needs to be forwarded through the CL network. However, shortest paths as computed by the IP routers (using the routing scheme of Section 3.1.1) may require the use of links between CL-CO gateways that do not actually exist. Before listing some solutions to handle these two different types of problems, we first identify four types of IP datagrams that could arrive at a CL-CO gateway: (i) TCP SYN segments, (ii) TCP data segments that arrive at a CL-CO gateway without a preceding TCP SYN segment (e.g., because the IP routing tables change after the TCP SYN was sent), (iii) UDP datagrams from applications that have an initial end-to-end exchange (such as H.245 exchanges before multimedia data is sent in UDP datagrams), and (iv) UDP datagrams from applications without such an exchange. We propose solutions corresponding to each of these types of IP datagrams, plus an additional flow control scheme. First, for flows for which a connection is set up through the CO network, we propose the following mechanisms: 1. Intercept and hold a TCP SYN (Synchronize) segment at the CL-CO gateway while a connection is being set up in the CO network (Section 3.2.1). 2. For TCP data segments that arrive at CL-CO gateways without a preceding TCP SYN segment (e.g., due to routing table changes), use TCP foolers to indicate a zero receive-window size, thus halting data flow until the connection is set up (Section 3.2.2).

15 15 3. Use application protocol message indications to trigger the setup of connections for UDP traffic from applications that have an initial end-to-end exchange. For example, an H.245 open logical channel message [4] is sent end-to-end prior to sending RTP (Real Time Protocol) data as UDP datagrams if H.323 [5] is used in conjunction with RTP for multimedia communication (Section 3.2.3). 4. For UDP datagrams from applications without initial end-to-end exchanges, two schemes can be used while setting up connections: i. Turn back IP datagrams to the CL network using IP source routing to override routing tables at the routers (Section 3.2.4). ii. Use a set of small-bandwidth provisioned connections for such datagrams (Section 3.2.5). 5. Use flow control mechanisms to stop user data flow while a switched connection is being set up in the CO network (Section 3.2.6). Second, to handle the traffic for which connections are not set up, we can use two of the mechanisms listed above. Specifically, either (i) default routing tables in IP routers can be overridden to carry this traffic through a route on the CL network using source routing, or (ii) connections can be provisioned between pairs of CL-CO gateways that are declared to be connected by point-to-point links in OSPF or any alternate routing protocol. Finally, to reduce layer overheads and thus improve bandwidth utilization, we propose using userplane protocol conversion instead of protocol encapsulation for TCP and UDP flows that are handled with switched connections through the CO network. This scheme, described in Section 3.2.7, can be used in conjunction with any of the above-listed schemes for flows handled through the CO network with switched connections TCP Synchronize segments TCP uses a three-way handshake between endpoints to open a connection before sending data (see Fig. 5). The SYN (synchronize) segment is sent to synchronize starting sequence numbers on both sides

16 16 Endpoint SYN Endpoint SYN SYN: Synchronize ACK: Acknowledgment ACK Fig. 5 Three-way handshake in TCP needed to achieve reliable transport. Our proposal is to have the CL-CO gateway detect a SYN segment and trigger a connection setup procedure through the CO network, while, at the same time, holding up the SYN segment. No user data packets will arrive at the CL-CO gateways for this flow since data packets will not be transmitted until the three-way handshake shown in Fig. 5 is completed. The SYN segment is typically a zero-payload TCP segment with 20 bytes for the TCP header and 20 bytes for the IP header. The SYN flag is set in the Flags field of the TCP header. Since routes are often asymmetric in the IP network, the SYN sent by the first endpoint may trigger the setup of a unidirectional connection, and the SYN sent by the other endpoint could similarly lead to the setup of a unidirectional connection in the opposite direction. Different CL-CO gateways could be involved in the two directions of the connection. Time-outs involved in the three-way handshake shown in Fig. 5 are typically long enough to allow for connection setup through the CO network. Consider the networks shown in Fig. 3. If an endpoint connected to R 4 opens a TCP connection to an endpoint connected to R 7, R 4 will send the IP datagram carrying the TCP SYN segment to CL-CO gateway GW 3 to route it to GW 2 and then on to R 7 since this is the shortest path assuming the routing scheme of Section (see Fig. 4). Upon receiving the IP datagram, CL-CO gateway GW 3 will first look for an existing connection to GW 2. If there is none, it will check to see if the datagram is a TCP SYN segment. If it is, GW 3 will initiate a connection setup procedure to GW 2 through the CO network

17 17 using its signaling protocol. The shortest path between these CL-CO gateways may, for example, be through Switch 3 and Switch 1. Meanwhile, GW 3 holds the TCP SYN segment and does not forward it. When connection setup confirmation is received at GW 3, it will send the IP datagram carrying the TCP SYN segment on the new connection to GW 2 that goes through Switch 3 and Switch 1. Releases of connections in the CO network are initiated if there is no traffic for a given time period. FIN (Finish) segments and RST (Reset) segments, which are TCP segments used for normal and abortive releases, respectively, cannot be counted on to initiate connection release in the CO network because routes may change in the IP network during the lifetime of the TCP flow. Furthermore, there may be advantages to keeping connections in the CO open longer than the lifetimes of TCP flows. For example, in typical HTTP (Hypertext Transfer Protocol) implementations, a new TCP connection is created for each transaction and terminated as soon as the transaction completes [6]. However, often there will be several consecutive transactions from a client to a web server; hence, keeping the connection open even after the TCP flow has been terminated could simplify the setup actions required when a subsequent TCP flow arrives TCP foolers Upon receiving a TCP data segment without having seen a corresponding SYN segment, the CL-CO gateway immediately generates an ACK (Acknowledgment) segment with the window size set to 0 (a TCP fooler from the CL-CO gateway rather than from the destination endpoint) to cause the sending endpoint to stop sending data. Once a new connection is set up in the CO network, a new ACK can be sent by the CL-CO gateway with a non-zero window size. While the connection is being set up, if the persist timer [7] happens to send a query to determine if the window size has been increased, the CL- CO gateway intercepts the query and responds to it. If the persist query happens to get routed through a different path and the destination endpoint answers indicating a non-zero window size, then TCP seg-

18 18 ments for the flow may again start to appear at the CL-CO gateway before connection setup is complete. If this happens, the CL-CO gateway will simply send another TCP fooler (i.e., an ACK with window size set to 0) Application-dependent handling of UDP datagrams UDP is currently primarily used for support applications, such as DNS (Domain Name Service) and SNMP (Simple Network Management Protocol), rather than any primary applications, such as web access, telnet, file transfer, electronic mail, etc. However, for Internet telephony and other multimedia traffic, RTP (Real Time Protocol) has been defined to use UDP. This is a primary application in that significant user data can be expected to be generated. To handle this latter type of UDP datagram, we propose that connections be set up when certain H.245 messages, such as open logical channel messages, arrive at CL-CO gateways. These H.245 messages, part of the H.323 protocol suite [5] that supports multimedia applications, are typically sent end-to-end to assign UDP port numbers for audio and video traffic. These messages can be treated in a manner similar to TCP SYN segments as triggers for connection setups at the CL-CO gateways Source routing In this solution, IP datagrams are turned around and sent back to the IP network if the routing scheme of Section indicates that the shortest path is through the CO network, but the connection is not yet established. Only the first few datagrams need to be sent back to the IP network (i.e., while the connection is being set up). Subsequent datagrams are routed on the direct link between CL-CO gateways once the connection has been set up. To avoid looping of datagrams that are turned around and sent back to the IP network, we propose using source routing to force intermediate routers to use the source route carried in the datagram header instead of the path indicated by their precomputed routing tables.

19 19 For the example given in Section 3.2.1, if CL-CO gateway GW 3 detects one of the cases for invoking this scheme, it will add a source route R 4 R 3 R 5 R 7 to the datagram and send it back on the interface to R 4. This route is chosen since it is the shortest path between R 4 and R 7 that does not include GW 3 (see Fig. 4). Routers R 4, R 3, and R 5 will route the datagram according to the source route rather than their precomputed routing tables. The first few datagrams follow this route while GW 3 initiates the setup of a connection through the CO network. Once established, the connection will carry the IP datagrams to R 7 through the CO network. It is interesting to note that this approach of using source routing to override precomputed routing tables can be used even within the IP network whenever there is congestion. In other words, if a precomputed route becomes overly congested, a router can use this option of creating a source route on the alternate path and thereby override the precomputed routing tables Provisioned connections While the source-routing scheme described in Section works in theory, in practice the source routing capability is not enabled in many existing routers, even when the routers are equipped with the required software. In such cases, we need an alternate solution for handling UDP datagrams generated by applications without initial end-to-end exchanges but requiring a connection. For such cases, we propose provisioning small-capacity pipes through the CO network between pairs of CL-CO gateways that are announced as having links by the IP routing protocol. Capacities of these provisioned connections can be adjusted based on usage. In addition, it is important to recognize that only the first few UDP datagrams need to use the provisioned connection. Once the switched connection is established (perhaps using the same route as the provisioned connection), then it will carry the remaining UDP datagrams through the CO network. Consequently, the capacity needed for provisioned connections is small.

20 Flow control Recall that the basic problem we are addressing in Section 3.2 is how to deal with packets that show up at a CL-CO gateway while a switched connection is being set up in the CO network to the far-end CL-CO gateway. Naturally, one way to deal with this situation is to make use of simple backpressure flow control signals, if possible, in the CL network. This way, packets will be halted from reaching (and overflowing) the CL-CO gateway, until the connection is established. In the meantime, the packets will be buffered at routers in the CL network, until the flow control signals permit the packets to reach the CL-CO gateway again. Unfortunately, in some situations, this flow control may temporarily stop all traffic on a link, not just packets of the new connection. It is preferred to use a selective flow control signal that only halts (on the link into the CL-CO gateway, or back to the generating endpoint) packets associated with the new connection. One simple example of a backpressure flow control signal is the PAUSE function that is used to implement flow control on full-duplex Ethernet links (including the recent gigabit Ethernet standard). A router (such as a CL-CO gateway) that needs to temporarily inhibit incoming packets (e.g., while it sets up a connection in the CO network) simply sends a PAUSE frame that indicates how long the fullduplex partner should wait before sending more packets. The router or endpoint that receives the PAUSE frame stops sending packets for the period specified. PAUSE periods can either be extended or canceled (by the CL-CO gateway) by transmitting another PAUSE frame with the revised PAUSE parameter Protocol conversion Noting that IP headers are essentially overhead bytes needed to route packets through the IP network, we consider protocol conversion schemes in the CL-CO gateways as a means to improve bandwidth efficiency. Protocol conversion is possible when the CO network is operated in a switched mode,

21 21 and can be used in conjunction with the previously described schemes for flows handled through the CO network. The alternative to protocol conversion is protocol encapsulation, which is used when the CO network is operated in a provisioned mode. By encapsulation, we mean that packets of one network are tunneled through the second network by adding headers for the second network on to the packets from the first network. For example, if the CO network in use is a provisioned ATM network, then an IP datagram (with its IP header) is encapsulated into an AAL5 frame, which is then segmented into ATM cells for transport through the ATM network. Recently it has been noted that up to 45% of IP traffic in the backbone is either 40- or 44-byte-long datagrams [8]. When these datagrams are encapsulated into ATM cells, due to LLC/SNAP encapsulation [9], ATM cell and AAL5 overheads, each such datagram occupies two ATM cells. This leads to an overall bandwidth waste of 20% when IP datagrams are carried in ATM cells. To avoid such inefficiencies 3, an alternative to encapsulation is protocol conversion in which case the user payload is extracted from the IP datagram and carried directly on connections in the CO network. For example, if the CO network is an ATM network, then application data is carried in an AAL5 frame through the ATM network. Since AAL5 performs transport-layer functions, the TCP header can also be converted to an AAL5 header in a switched (rather than provisioned) ATM network. In other words, TCP/IP headers are converted into AAL5/ATM headers. By doing this, it appears that TCP connections are terminated at the CL-CO gateways from each endpoint of the communication, and a connection of the type supported by the CO network is set up between the CL-CO gateways. Conversion is typically used when one endpoint of the communication is on one network and the other is on the second network (see, for example, Path 1 in Fig. 6). For example, if a user with an Internet telephony PC connected to the Internet via an ethernet link is communicating with a user that has a 3. See the Appendix for further examples of protocol stacks that result from encapsulation.

22 22 telephone, then voice signals sent by the Internet user are extracted from the IP datagrams in the CL- CO gateway node (CL-CO gateway I in Fig. 6) and carried directly on a DS0 circuit in the STM CO network. Encapsulation is typically used when the two communicating endpoints are on the same network, but part of the transport is over a second network (see, for example, Path 2 in Fig. 6). In this case, encapsulation is used as an easy means of reconstructing the packet for transport on the first network at the far end. For the example Path 2 shown in Fig. 6, CL-CO gateway III would easily extract the IP dat- Endpoint A IP network Endpoint B CL-CO Gateway I Path 1 CL-CO Gateway II Endpoint C CL-CO Gateway III Path 2 CO network Endpoint D Fig. 6 Protocol conversion vs. encapsulation agram from the AAL5 frame and send it on its way through the IP network to endpoint C. If provisioned connections are used through the CO network, then encapsulation appears to be the only choice for paths such as Path 2 in Fig. 6. However, if switched connections are used through the CO network, then TCP/IP header fields can be passed during connection setup to the far-end gateway, and protocol conversion can be used. Since we focus on the use of switched connections through the

23 23 CO network in this paper, we recommend the use of protocol conversion to reduce overhead. Protocol conversion can be applied to both parallel and interconnecting configurations of Fig. 1, all three CO networks shown in Fig. 2, and in conjunction with all the routing schemes discussed in Section 3.1. Furthermore, it can be used for both TCP and UDP flows. 4 A gateway that interworks a CL IP network with a CO IP network Currently, two solutions are being pursued in the IETF for adding a CO networking mode to IP routers: RSVP [1] and MPLS/LDP (MultiProtocol Label Switching/Label Distribution Protocol) [2]. In both these approaches, those routers that are upgraded to support these CO modes continue supporting the CL mode of operation. This property makes this switched CO network different from the CO networks shown in Fig. 2 since, in the latter case, CO switches do not have CL IP routing capability. In this section, we apply our solution, described in Section 3, to this special case. Consider both configurations shown in Fig. 7. Nodes in the CO/CL cloud are IP routers equipped with RSVP or MPLS capability and are hence called CO/CL IP switches. The CL-CO IP gateways are IP routers equipped with RSVP or MPLS capability that are connected to CL-only IP routers (in the CL cloud) and have additional capability to recognize when to initiate the setup of a connection using RSVP or LDP messages. Thus, Fig. 7 shows three types of nodes: (i) CL IP routers, (ii) CO/CL IP switches, and (iii) CL-CO IP gateways. Some of the schemes presented in Section 3 can be used in the CL-CO IP gateways to possibly trigger connection setup from router-to-router. First, consider an RSVP-based CO/CL IP network. The subset of schemes applicable to this case includes: 1. The routing scheme of Section 3.1.3, where user-specific information triggers the setup of connections. 2. The TCP-based scheme of Section that initiates connection setup following the reception

24 24 CL... Endpoint CL... CL... CL... CL... CL-CO IP Gateway CL-CO IP Gateway CL-CO IP Gateway CL-CO IP Gateway CO/CL A. Parallel B. Interconnecting IP routers with RSVP or MPLS capability, referred to as CO/CL IP Switches Fig. 7 Internetworking of CL IP networks with a CO/CL IP network of SYN segments. 3. The TCP-fooler scheme of Section that initiates connection setup following the reception of a TCP data segment without having seen a corresponding SYN segment. 4. The scheme of Section with application-dependent handling of UDP datagrams, where, for example, H.245 messages trigger RSVP connection setups. CO/CL Since a default forwarding path exists using the CL capability of the CO/CL IP switches, the sourcerouting and provisioned-connections schemes described in Sections and are not required. Also, the routing schemes of Sections and are not required since all the nodes shown in Fig. 7 participate in the same IP routing protocol, thus automatically creating data flows to the CO network. This above solution allows for the use of RSVP from router-to-router rather than from endpoint-to-endpoint, which means that RSVP islands can be created without requiring all routers in the IP network to be upgraded all at once. Clearly, the configuration of Fig. 7 can be repeated multiple times in an endto-end flow that traverses many RSVP islands. This allows for a gradual introduction of RSVP routers. We note here that while RSVP provides the means to operate the IP network in switched CO mode, its use of the IP protocol in the user-plane is wasteful since, once connections are set up, packet headers no longer need to carry destination addresses. Lower protocol overhead is possible in a CO mode that

25 25 uses shorter headers. Instead of an RSVP-based CO/CL IP network, suppose the CO nodes of Fig. 7 are MPLS-based IP routers. Then, we propose applying the same subset of schemes from Section 3 that are applicable for RSVP. In the current MPLS specification, although LDP hooks have been provided for downstreamon-demand label allocation, no mention is made of the procedures that trigger such requests. Using our schemes of Sections 3.1.3, 3.2.1, 3.2.2, and 3.2.3, we propose that CL-CO IP gateways can trigger the downstream-on-demand label allocation scheme. In addition, the protocol conversion scheme of Section can be applied in MPLS-based CO/CL IP networks. The current MPLS specification requires the shim header (or in the case of ATM, the ATM header) to be carried between the IP header and the layer-2 header. This implies the use of protocol encapsulation. We propose using conversion to reduce the protocol overhead and improve bandwidth utilization. This is possible because we are proposing the use of LDP in a switched mode, i.e., some connection setup actions are performed for each arriving flow for which a connection setup is triggered. In addition, protocol conversion is possible in the MPLS solution (unlike the RSVP solution) because the user-plane protocol for the CO-handled flows (for example, ATM, with ATM switching hardware used for the label switches) is different from the userplane protocol for the CL traffic. In summary, our solution for internetworking a CL IP network with a switched CO network can be used even when the latter is an island of MPLS or RSVP CO/CL IP switches. 5 Motivation for solving the problem Why is it important to study this internetworking problem of a switched CO network with the CL IP network? Since the IP network has access to the endpoints that are generating bursty traffic (e.g., data and MPEG video), it is probably easiest to just keep this traffic on the IP network. Why then should we

26 26 bother trying to route some of the traffic already on the IP network on to a CO network? As stated in Section 1, there are potential user and service-provider benefits in redirecting traffic to the CO network. If users desire service guarantees for given flows (without changing the applications) and can specify their requirements, this is probably better handled with a CO network that is capable of reserving resources on-demand. From a service provider s perspective, there may be an opportunity to use bandwidth more efficiently with a switched CO network than with an existing CL network. Also, in a switched CO network, a service provider can bill on a call level, if desired. Many different resource-sharing and switching techniques can be employed in CL networks and CO networks. This results in a wide spectrum of networking options and blurs the distinctions between CL and CO networks. Various levels of performance guarantees are possible, corresponding to various degrees of isolation between traffic flows. On the other hand, more partitioning of network resources leads to less efficient use of network resources (e.g., bandwidth) when carrying bursty IP traffic. In the subsections that follow, we first describe some characteristics of various CL and CO networking modes (Section 5.1). Then, since the bandwidth utilization (of interest to the service provider) depends to large extent on the network s switching technique, we discuss some differences between packet switching and circuit switching (Section 5.2). Finally, we discuss the implications of the various networking modes when they are combined with different switching modes (Section 5.3). 5.1 CL and CO networking modes To enable fast packet forwarding in CL networks, routes are typically preconfigured by precomputing the routing tables in IP routers. The routes can be precomputed based on operator-assigned link weights only (as is done in most IP networks today), or on a scheme that takes into account available bandwidth [10]. In either case, there is some partitioning of resources that causes the bandwidth to sometimes be underutilized on certain links even while other links are congested. To more efficiently

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University mv@poly.edu What is the internetworking problem: how to connect different types

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Network Technologies

Network Technologies Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN) Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

SDH and WDM A look at the physical layer

SDH and WDM A look at the physical layer SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

1. Public Switched Telephone Networks vs. Internet Protocol Networks

1. Public Switched Telephone Networks vs. Internet Protocol Networks Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

SDH and WDM: a look at the physical layer

SDH and WDM: a look at the physical layer SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and

More information

Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks

Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks M H Pradeep Kumar Asst. Professor, Dept of ECE, BIT Institute of Technology, Hindupur, India ABSTRACT: With the combination

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Implementing VoIP support in a VSAT network based on SoftSwitch integration Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai. Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Introduction to WAN Technologies

Introduction to WAN Technologies CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various

More information

How To Understand The Internet From A Telephone To A Computer (For A Computer)

How To Understand The Internet From A Telephone To A Computer (For A Computer) Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT SEPTEMBER 2014. Computer Networks EXAMINERS REPORT

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT SEPTEMBER 2014. Computer Networks EXAMINERS REPORT BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT SEPTEMBER 2014 Computer Networks EXAMINERS REPORT General Comments This session is again like the April

More information

Multimedia Communications Voice over IP

Multimedia Communications Voice over IP Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony

More information

Lecture Computer Networks

Lecture Computer Networks Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Internet Protocol (IP)/Intelligent Network (IN) Integration

Internet Protocol (IP)/Intelligent Network (IN) Integration Internet Protocol (IP)/Intelligent Network (IN) Integration Definition The convergence of the public switched telephone network (PSTN) and Internet protocol (IP) data networks promises exciting opportunities

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking CS 640: Introduction to Computer Networks Aditya Akella Lecture 1 Introduction http://www.cs.wisc.edu/~akella/cs640/f07 1 Goals of This Class Understand principles and practice of networking ow are modern

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

MPLS. Packet switching vs. circuit switching Virtual circuits

MPLS. Packet switching vs. circuit switching Virtual circuits MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information