Tuesday 8 December 2009

the operation of switching and signalling within core networks

The purpose of signalling is so that when the caller dials a number they hear progress tones such as the dial-tone, the ringing or busy signals etc. also the caller might hear a digital message telling them the number they have dialled in is not in service or it has been changed. Signals in public networks are used for billing, monitoring and links to advance features for carriers to exchange traffic with each other. Signalling is used also to process every switched call on the public switched network and the public cell network.


Touch-tone phones use 8 voice-frequency tones for signalling, pushing a button will result in one low-tone and one high-tone to be transmitted at the same time.





Pressing the number seven on the keypad will result in 1209Hz and 852Hz being sent at the same time.







The above shows In-channel and Common-channel Signalling.




The latest standard for Common-Channel signalling is 64 kbits/S.
The 4 phases of carrying traffic in a telephone network are the idle phase which is when the terminal of the subscriber (the phone or computer) is idle. Then there is the connection set-up phase which is when a telephone call or a data connection between two or more subscribers is being set-up, the there is the transfer phase which is when the call is in progress or data is being exchanged between the subscribers. And finally there is the release phase which is when the call or the data connection is being released.

There are two types of switching circuit switching and packet switching. In circuit switching the path is decided before the data transmission begins. The system decides on which route to follow, based on a resourse-optimzing algorithm, and transmission goes according to the path. For the whole length of the communication session between the two communicating bodies, the route is dedicated and exclusive and released only when the session ends. In packet-switching the packets of data are sent towards their destination irrespective of each other. Each packet has to find its own path to the destination. There is no predetermined path, the decision as to which node to hop to in the next step is taken only when a node is reached. Each packet finds its way using the information it carries such as the source and destination IP addresses.


Each Packet from a datagram is sent independently and some of the packets may arrive out-of-order. This means the destination node must reorder, but the packets may be lost so the destination node or exit node must detect the lost packet.




A virtual circuit has a pre-planned route determined before the packets are sent. There is not a dedicated line as in circuit switching, as others can use the same circuit, so the packets may be queued. Each of the packets has a virtual circuit identifier or a VCI.

Advantages of a datagram are that the call time setup is avoided, datagrams can be routed away from any congestion, the delivery is more reliable, suitable when only a few packets need to be transmitted and if the node fails the datagrams will find another route.

Advantages of a virtual circuit are that a virtual circuit is suitable when packets are to be transmitted between 2 computers for a period of time, services can be provided for virtual circuit such as error control which is when if a packet arrives at one node with an error code it can be requested again, and virtual circuits are faster because there is no routing decision required at each node.

Next i will include som equestions and there answers that I have completed about Voice over IP (VoIP) and Voice over ATM (VoATM)

Voice over IP

1. State what VoIP is.

2. Discuss Voice Quality with VoIP.

3. List 4 different applications of VoIP

4. Describe one of those applications via diagram or text

Voice over ATM

5. What is ATM

6. Discuss the ATM Cell

7. Discuss VoATM

8. What are the advantages and disadvantages of ATM

1. VoIP enables data networks such as the internet, local area networks and wide area networks to be used for voice communication and it reduces the cost of communication.

2. Voice quality is very important in VoIP and the quality must be as good as the PSTN. There are 3 factors that affect voice quality in ViOP, transmission delay is the first which is the time it takes a packet from source to destination, the second is Jitter delay which is the difference in arrival time between packets and the third is packet loss which is when if a packet is dropped there is a gap in the conversation eg. You won’t be able to makeout the full word or sentence you are being told, packet loss with VoIP can cause big bits of a conversation to be lost.

3. Four applications of VoIP are computer to computer, computer to multiple sites, voice or internet via ISP and voice over intranet or LAN.

4. Computer to multiple sites is a traditional analog telephone attached to an IP telephony enabled PBX and this requires an expensive adapter.

5. ATM or asynchronous transfer mode is a connection-oriented, cell based technique for the transfer of information, ATM can be used for the transfer of audio, video and data. ATM is an extremely fast broadband switching technology eg high bandwidth.

6. ATM uses a uniform 53 byte cell, 5 bytes of addressing information, 48 bytes of payload. The benefit of the small cell size is reduced latency in transmitting through the network nodes. There is a disadvantage which is because of the small cell size it means that there is increased overhead.

7. Class A provides for Voice Over ATM and class A includes constant bit rate or CBR services for connection-oriented transfer with end-to-end synchronisation. Protocol AAL 1 supports services class A and some examples of this include PCM-coded voice, circuit-emulated connections having a bit rate of n x 64kbits/s or n x 2Mbits/s and video signals coded for constant bit rate.

8. The advantages of ATM are that it provides hardware switching, allows dynamic bandwidth of bursty traffic, it provides QoS for multimedia and voice, it scales in speed and network size, its used for LAN and WAN, has good network management capabilities and is used by 80-85% of internet backbone networks. But there are some disadvantages which are it has small cell size, has high overhead, has a high service cost, requires new equipment and requires new technical expertise.

Structure of the PSTN hierarchy

The PSTN hierarchy is made up of main distribution frames, wide area tandems, digital junction switching units, remote concentrator units and the digital local exchange. The subscriber lines will go into the main distribution frame or MDF and from there go to the digital local exchange or DLE. The signal is then sent on to the wide area tandem (WAT)/ digital junction switching unit (DJSU) or to the digital main switching unit (DMSU) and then sent to the international gateway.

Digital Local Exchanges, Remote Concentrator Units, Digital Main Switching Unit, Digital Derived Services Switching Centre, Gateways all of hese are major elements of the PSTN and are described below.

The digital local exchange relates to an exchange for connecting telecommunications terminals of subscribers to a telecommunications network, comprising subscriber lines in which the telecommunications terminals are linked with the exchange. The exchange is operated by a first network operator and is used by further network operators. The subscriber lines and subscribers are associated with one of said network operators each and the subscribers select the exchange through the telecommunications terminals to make a telecommunications link through the network operator.

 

The remote concentrator unit is a unit that consolidates subscriber lines. This equipment facilitates the use of lesser amounts of loop plant to serve a greater number of end users. All calls are switched by the central office switch to which the remote concentrator is connected. The voice or data path will always extend to the host switch even for calls between subscribers served by the same remote concentrator.

The Digital Local Switching Unit connects to the concentrator and routes calls to different DLSUs or DMSUs depending on the destination of the call. The main part of the DLSU is the Digital Switch which consists of time switches and a space switch. Incoming signals on the 30 channels from the concentrator units is connected to time switches. The purpose of these is to take any incoming individual time slot and connect it to an outgoing time slot and so perform a switching and routing function. Each DMSU is connected to all the other DMSUs and involves a much smaller number of links than required to link together DLEs. If used to route international calls is known as an international Gateway. The DMSUs are the original long-distance exchanges.

The DDSN intelligent network will allow a range of new features to be offered as Advanced Linkline to linkline service providers. These will include: time and day routing, call allocator, call queuing, call barring, alternative destination on busy, call prompter, courtesy response and command routing.

A default gateway is a router on a computer network that serves as an access point to another network. In homes, the gateway is usually the ISP-provided device that connects the user to the Internet. In enterprises, however, the gateway is the computer that routes the traffic from a workstation to the outside network. In such a situation, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which uses headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.

What is TCP/IP?

The TCP/IP model also uses the modular approach but only contains 4 while the OSI model uses 7. The layers of the TCP/IP model have much more diverse tasks than the OSI model, considering that certain layers of the TCP/IP model are the same as several of the OSI model. The layers of the TCP/IP are NETWORK ACCESS LAYER – this specifies the form in which data must be routed whichever type of network is being used, the INTERNET LAYER – that is responsible for supplying the data packet or datagram, TRANSPORT LAYER – that provides the routing data along with the mechanisms making it possible to know the status of the transmission and finally the APPLICATION LAYER – this incorporates standard network applications such as telnet, SMTP, FTP etc.


What is the OSI model?

The OSI model (open systems interconnection) was established by ISO in order to implement a communications standard between computers that are on a network (the rules that manage the communications between computers on a network). The aim of having the system, in layers is to separate the problem into different parts depending on their level of abstraction. Each of the layers of the OSI model will communicate with an adjacent level that would be above or below it. The OSI model has 7 layers while the TCP/IP model only has 4. These layers are the PHYSICAL LAYER – that defines the way in which data is physically converted into digital signals on the communication media such as electric pulses, light modulation etc., THE DATA LINK LAYER – that defines the interface with the network interface card and the sharing of the transmission media, THE NETWORK LAYER – that makes it possible to manage addressing and routing of any data (their path via the network), THE TRANSPORT LAYER – this is in charge of data transport, its division into packets and management of potential transmission errors, THE SESSION LAYER – which defines the opening and destruction of communication sessions between networked machines, THE PRESENTATION LAYER – that defines the format of data that is handled by the application layer independently of the system, and finally THE APPLICATION LAYER – that provides the interface with applications and is the closest level to the users, managed directly by the software.

What are LAN topologies?

Three common local area network topologies are star, ring and linear bus. Star network s would be one of the most common topologies. The simplest star network would consist of a central switch, hub or computer that will act as a conduit to transmit messages and any other computers in the network would be connected to that one main computer, and the transmission lines between them would form a graph with the topology of a star. A ring topology is when each of the nodes of the network are connected to two other nodes in the network and with the first and last nodes being connected to each other, that would form a ring. Any data that would be transmitted would travel from one node to the next until its destination has been reached. Data would usually flow in only one direction only. Linear bus topologies is a topology in which all of the nodes in a network are connected to a common transmission medium which has two end points( this is the bus, but is also known as the backbone) any data that is transferred between nodes in the network would be transmitted over this common transmission medium and is able to be received by all of the nodes in the network at the same time.

What are LANs and WANs and what components are needed to make one?

What are LANs and WANs?

Local area networks (LANs) are computer networks that cover a small area such as a home, school, office or small group of buildings. Local area networks have a high-transfer rate, a smaller geographic range and don’t need leased communication lines as much. Wide area networks are computer networks that cover a much larger area compared to a LAN such as metropolitan, regional or national boundaries. An example of a WAN is the internet which is the largest and most well known.

What is needed to make a Local area network or Wide area network?

File servers, workstations, network interface cards, hubs, switches, repeaters, bridges, routers and gateways would all be needed for a LANs and WANs, but in LANs, routers would not be used.

File servers will stand at the heart of most networks and is a very fast computer with a very large amount of RAM, storage space and has a fast network interface card. The network operating system software resides on this computer along with any software and data that would need to be shared. The server will control the communication of information between the nodes on a network such as when it might be asked to send a word processor programme to one of the workstations, receive a database file from another workstation and store e-mail messages during the same time. This all requires a computer that can store a lot of information and share it very quickly.

Workstations are the user computers that are connected into a network. A normal workstation is a computer that is configured with a network interface card, networking software and the proper cables. The workstations do not necessarily need floppy disk drives because files can be saved on the networks file server. Almost any computer can serve as a workstation in a network.

Network interface cards provide the physical connection between the network and the computer workstation. Most network interface cards are internal with the card having been fitted into a expansion slot inside the PC. Laptops can be bought with a NIC built in or with network cards that slot into a PCMCIA slot. The network interface card is a major factor in finding out the speed and performance of a network. It is a good idea to use the fastest network card available for the type if workstation you have. A NIC would now come with speeds from 10 Mbps to 1000 Mbps or 1 Gbps. The most common NICs are Ethernet cards and token ring cards. Ethernet would be the most popular method, although wireless access is now common.

Hubs are devices that connect twisted pair or fibre optic Ethernet devices together. Hubs would work at the physical part of a network. Hubs may be active or passive, an active hub regenerates signals and passes them along (also called a mulitport repeater) and a passive hub is simply a central connection point with no amplification or regeneration of the data being transmitted. Hybrid hubs will maximize networks efficiency by interconnecting different types of cables and topologies. Hubs today are no longer used, switches would be used instead.

A switch determine destinations of messages and sends it only to the destination port, it provides full bandwidth to each station on a network. Switches will also handle several conversations on a network at one time. Switches used to be more expensive than hubs but you can’t buy hubs anymore because switches provide for better performance and would be the device of choice for many technicians.

Since signals will lose their strength as it passes along a cable if would be necessary to boost the signal with a device called a repeater. A repeater will electrically amplify the signal it receives and will rebroadcast it. Repeaters can be separate devices or they can be incorporated into a switch or hub. They would be used when the total length of your network cable exceeds the standards that are set for the type of cable being used.

A bridge is a device that will take a large LAN a segment it into two smaller, more efficient networks. A bridge will monitor the information traffic on both sides of the network so it can pass packets of information to the correct location. Most bridges can “listen” to the network and figure out the address of each computer on both sides of the bridge automatically. The bridge can look at each message and, if it necessary, broadcast it on both sides of the network. The bridge manages the traffic to keep optimum performance on each side of the network. It works as if it is a traffic policeman at a busy crossroads, it keeps information flowing on both sides of the network but it will not allow unnecessary traffic through. Bridge can be used to connect different types of cabling or physical topologies, but bridges must be used between networks with the same protocol.

A router will connect different types of networks together and is typically used for wide area networks (WANs). Routers use IP addresses and select the best path to route a message, based on the destination’s address and where it is located. A router can direct traffic to prevent collisions and is smart enough to know when the traffic will be needed to be directed along back roads and shortcuts. While bridges know the MAC addresses of all computers on each side of a network, the routers will know the IP addresses of computers, bridges and any other routers on the network. Routers can even listen top all the traffic on a network and determine which parts are the busiest and redirect the traffic away from the busiest paths until they become cleared so that traffic can use those routes again. If you only have one single computer on a local area network that you want connected to the internet you will need a router. In this case the router will act as a translator between the information on your computer/LAN and the internet and will also determine the best route for the data to be sent over. A router can direct signal traffic efficiently, route messages between any two protocols, route messages between linear bus, star and star-wired topologies, route messages across fibre optic, coaxial and twisted-pair cabling.

A gateway in a network is a device that will translate between two dissimilar protocols. For example a gateway can link and translate between local area networks with different protocols.

The Architecture of Microsoft XP and Linux





There are four basic types of user mode processes in XP, the first is system support processes (not service processes) such as logon, or Winlogon, and the session manager. The second is service processes that are started by service control manager e.g.- host Win32 services such as Task Scheduler. The third is user applications such as DOS, Windows 3.1 and Win32. And finally environment subsystem that emulates other operating systems, for example Windows XP only supports the Win32 environment. Applications pass operating system service requests through dynamic link libraries. A DLL is a set of functions or data that interface between user applications and operating system.



A conventional operating system usually segregates virtual memory into kernel space and user space. Kernel space is only reserved for running the kernel, kernel extensions and some devices drivers. In most operating systems the kernel memory is never swapped out to disk. User space is the memory area where all user mode applications work and this memory can be swapped out when necessary. Shown below is a simplified diagram of the Windows XP Architecture.


Kernel components of Windows XP are Executive, kernel, device drivers, hardware abstraction layer and windowing and graphics. Executive provides basic operating system services such as memory management and security. Kernel provides low-level operating system functions such as thread scheduling. Device drivers translate input/output requests to hard input/output requests. The hardware abstraction layer insulates the kernels/drivers. The windowing and graphics implements the user interface such as Windowing interface or graphical user interface (GUI).



The architecture for Linux is given in the simplified diagram below. The system calls interface user space with kernel and then there is five main subsystems. These are process scheduler that controls access to the processor, Memory management that permits multiple processes to share memory and uses virtual memory to run portions of processes, Virtual file system that presents common interface to all devices, network interface and finally Interprocess communication.







 
Click Here! Click Here!