throbber
COMPUTER NETWORKS
`
`ANDREW S. TANENEAUM
`
`CoIIisio
`
`5
`
`4 2
`
`4|001:0O04|
`
`01.
`
`1100110110
`
`0110110011
`
`Broadcastin
`
`SHALL I COMPARE THEE
`TO A SUMMEFI'S DAY?
`
`WELCOME
`
`TO THE
`
`INFORMATION
`
`SUPER
`
`HIGHWAY
`
`APPLE 1015 - Page 1
`
`
`
`
`

`
`
`
`Library of Congress Cataloging in Publication Data
`
`Tanenbaum, Andrew S. 1944-.
`
`Computer networks / Andrew S. Tanenbaum. —- 3rd ed.
`p.
`cm.
`
`Includes bibliographical references and index.
`ISBN 0—13—349945—6
`1.Computer networks.
`TK5105.5.T36 1996
`0O4.6——dc2O
`
`I. Title.
`
`96-4121
`CIP
`
`Editorial/production manager: Camille Trentacoste
`Interior design and composition: Andrew S. Tanenbaum
`Cover design director: Jerry Votta
`Cover designer: Don Martinetti, DM Graphics, Inc.
`Cover concept: Andrew S. Tanenbaum, from an idea by Marilyn Tremaine
`Interior graphics: Hadel Studio
`Manufacturing manager: Alexis R. Heydt
`Acquisitions editor: Mary Franz
`Editorial Assistant: Noreen Regina
`
`
`
`© 1996 by Prentice Hall PTR
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, New Jersey 0745 8
`
`The publisher offers discounts on this book when ordered in bulk quantities. For more information,
`contact:
`
`Corporate Sales Department, Prentice Hall PTR, One Lake Street, Upper Saddle River, NJ 07458.
`Phone: (800) 382-3419; Fax: (201) 236-7141. E-mail: corpsales@prenhal1.com
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without
`permission in writing from the publisher.
`
`All product names mentioned herein are the trademarks of their respective owners.
`
`Printed in the United States of America
`10
`9
`8
`7
`6
`5
`4
`
`ISBN O-13-349945-6
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall of Australia Pty. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`Prentice-Hall Hispanoamericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New Delhi
`Prentice—Ha11 of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janeiro
`
`APPLE 1015 - Page 2
`
`APPLE 1015 - Page 2
`
`

`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM
`
`131
`
`town, and the other one’s wife was the town telephone operator. He quickly saw
`that either he was going to have to invent automatic telephone switching equip-
`ment or he was going to go out of business. He chose the first option. For nearly
`100 years,
`the circuit switching equipment used worldwide was known as
`Strowger gear.
`(History does not record whether the now—unemployed switch-
`board operator got a job as an information operator, answering questions such as:
`What is the phone number of an undertaker?
`The model shown in Fig. 2—34(a) is highly simplified of course, because parts
`of the “copper” path between the two telephones may,
`in fact, be microwave
`links onto which thousands of calls are multiplexed. Nevertheless, the basic idea
`is valid: once a call has been set up, a dedicated path between both ends exists and
`will continue to exist until the call is finished.
`
`when call is made
`
`Physical copper
`connection set up
`
`\/
`
`Switching office
`
`COWPUYGV
`
`
`
`
`Packets queued up
`for subsequent
`transmission
`
`Computer
`
`Fig. 2-34. (a) Circuit switching. (b) Packet switching.
`
`An important property of circuit switching is the need to set up an end—to—end
`path before any data can be sent. The elapsed time between the end of dialing and
`the start of ringing can easily be 10 sec, more on long—distance or international
`calls. During this time interval, the telephone system is hunting for a copper path,
`as shown in Fig. 2—35(a). Note that before data transmission can even begin, the
`call
`request signal must propagate all
`the way to the destination, and be
`
`APPLE 1015 - Page 3
`
`APPLE 1015 - Page 3
`
`

`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM
`
`131
`
`town, and the other one’s wife was the town telephone operator. He quickly saw
`that either he was going to have to invent automatic telephone switching equip-
`ment or he was going to go out of business. He chose the first option. For nearly
`100 years,
`the circuit switching equipment used worldwide was known as
`Strowger gear.
`(History does not record whether the now-unemployed switch-
`board operator got a job as an information operator, answering questions such as:
`What is the phone number of an undertaker?
`The model shown in Fig. 2—34(a) is highly simplified of course, because parts
`of the “copper” path between the two telephones may,
`in fact, be microwave
`links onto which thousands of calls are multiplexed. Nevertheless, the basic idea
`is valid: once a call has been set up, a dedicated path between both ends exists and
`will continue to exist until the call is finished.
`
`when call is made
`
`Physical copper
`connection set up
`
`Switching office
`/ .
`
`
`Packets queued up
`for subsequent
`transmission
`
`
`
`Computer
`
`(13)
`
`Fig. 2-34. (a) Circuit switching. (b) Packet switching.
`
`An important property of circuit switching is the need to set up an end—to~end
`path before any data can be sent. The elapsed time between the end of dialing and
`the start of ringing can easily be 10 sec, more on long—distance or international
`calls. During this time interval, the telephone system is hunting for a copper path,
`as shown in Fig. 2—35(a). Note that before data transmission can even begin, the
`call
`request signal must propagate all
`the way to the destination, and be
`
`APPLE 1015 - Page 4
`
`APPLE 1015 - Page 4
`
`

`
`132
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`acknowledged. For many computer applications (e. g., point—of—sa1e credit verifi-
`cation), long setup times are undesirable.
`
`Call request signal
`l
`
`Propagation
`delay
`
`:1-
`r
`
`Call
`
`accept
`it signal
`
`<—-————Time
`
`(3)
`
`(b)
`
`(C)
`
`Fig. 2-35. Timing of events in (a) circuit switching,
`(c) packet switching.
`
`(b) message switching,
`
`As a consequence of the copper path between the calling parties, once the
`setup has been completed, the only delay for data is the propagation time for the
`electromagnetic signal, about 5 msec per l0OO km. Also as a consequence of the
`established path, there is no danger of congestion—that is, once the call has been
`put through, you never get busy signals, although you might get one before the
`connection has been established due to lack of switching or trunk capacity.
`An alternative switching strategy is message switching, shown in Fig.2-
`35(b). When this form of switching is used, no physical copper path is established
`in advance between sender and receiver. Instead, when the sender has a block of
`data to be sent, it is stored in the first switching office (i.e., router) and then for-
`warded later, one hop at a time. Each block is received in its entirety, inspected
`
`APPLE 1015 - Page 5
`
`APPLE 1015 - Page 5
`
`

`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM '
`
`133
`
`for errors, and then retransmitted. A network using this technique is called a
`store-and-forward network, as mentioned in Chap. 1.
`The first electromechanical telecommunication systems used message switch-
`ing, namely for telegrams. The message was punched on paper tape off—line at the
`sending office, and then read in and transmitted over a communication line to the
`next office along the way, where it was punched out on paper tape. An operator
`there tore the tape off and read it in on one of the many tape readers, one per out-
`going trunk. Such a switching office was called a torn tape office.
`With message switching, there is no limit on block size, which means that
`routers (in a modern system) must have disks to buffer long blocks.
`It also means
`that a single block may tie up a router—router line for minutes, rendering message
`Switching useless for interactive traffic. To get around these problems, packet
`switching was invented. Packet—switching networks place a tight upper limit on
`block size, allowing packets to be buffered in router main memory instead of on
`disk. By making sure that no user can monopolize any transmission line very long
`(milliseconds), packet—switching networks are well suited to handling interactive
`traffic. A further advantage of packet switching over message switching is shown
`in Fig. 2—35(b) and (c): the first packet of a multipacket message can be forwarded
`before the second one has fully arrived, reducing delay and improving throughput.
`For these reasons, computer networks are usually packet switched, occasionally
`circuit switched, but never message switched.
`Circuit switching and packet switching differ in many respects. The key
`difference is that circuit switching statically reserves the required bandwidth in
`advance, whereas packet switching acquires and releases it as it is needed. With
`circuit switching, any unused bandwidth on an allocated circuit is just wasted.
`With packet switching it may be utilized by other packets from unrelated sources
`going to unrelated destinations, because circuits are never dedicated. However,
`just because no circuits are dedicated, a sudden surge of input
`traffic may
`overwhelm a router, exceeding its storage capacity and causing it to lose packets.
`In contrast, with circuit switching, when packet switching is used,
`it
`is
`straightforward for the routers to provide speed and code conversion. Also, they
`can provide error correction to some extent.
`In some packet—switched networks,
`however, packets may be delivered in the wrong order tothe destination. Reor-
`dering of packets can never happen with circuit switching.
`Another difference is that circuit switching is completely transparent. The
`sender and receiver can use any bit rate, format, or framing method they want to.
`The carrier does not know or care. With packet switching, the carrier determines
`the basic parameters. A rough analogy is a road versus a railroad.
`In the former,
`the user determines the size, ‘speed, and nature of the vehicle; in the latter, the car-
`rier does. It is this transparency that allows voice, data, and fax to coexist within
`the phone system.
`A final difference between circuit and packet switching is the charging algo-
`rithm. Packet carriers usually base their charge on both the number of bytes (or
`
`APPLE 1015 - Page 6
`
`APPLE 1015 - Page 6
`
`

`
`134
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`packets) carried and the connect time. Furthermore, transmission distance usually
`does not matter, except perhaps internationally. With circuit switching,
`the
`charge is based on the distance and time only, not the traffic. The differences are
`summarized in Fig. 2~36.
`
`Item
`
`Circuit—switched
`
`Packet-switched
`
`“‘r—"
`
`FDedlcated “copper” path
`Bandwidth available
`Potentially wasted bandwidth
`
`Store-and-forward transmission
`
`Each packet follows the same route
`
`Yes
`Fixed
`Yes
`
`No
`
`Yes
`
`No
`Dynamic
`No
`
`Yes
`
`No
`
`-1
`
`Call setup
`When can congestion occur
`Charging
`
`K‘
`
`Required
`At setup time
`Per minute
`
`Not needed
`On every packet
`Per packet
`
`1
`
`Fig. 2-36. A comparison of circuit—switched and packet-switched networks.
`
`Both circuit switching and packet switching are so important, we will come
`back to them shortly and describe the various technologies used in detail.
`
`The Switch Hierarchy
`
`It is worth saying a few words about how the routing between switches is
`done within the current circuit—switched telephone system. We will describe the
`AT&T system here, but other companies and countries use the same general prin-
`ciples. The telephone system has five classes of switching offices, as illustrated
`in Fig. 2-37. There are 10 regional switching offices, and these are fully intercon-
`nected by 45 high—bandwidth fiber optic trunks. Below the regional offices are 67
`sectional offices, 230 primary offices, 1300 toll offices, and 19,000 end offices.
`The lower four levels were originally connected as a tree.
`Calls are generally connected at the lowest possible level. Thus if a sub-
`scriber connected to end office 1 calls another subscriber connected to end office
`
`1, the call will be completed in that office. However, a call from a customer
`attached to end office 1 in Fig. 2-37 to a customer attached to end office 2 will
`have to go toll office 1. However, a call from end office 1 to end office 4 will
`have to go up to primary office 1, and so on. With a pure tree, there is only one
`minimal route, and that would normally be taken.
`During years of operation, the telephone companies noticed that some routes
`were busier than others. For example, there were many calls from New York to
`Los Angeles. Rather than go all the way up the hierarchy, they simply installed
`direct trunks for the busy routes. A few of these are shown in Fig. 2-37 as
`
`APPLE 1015 - Page 7
`
`APPLE 1015 - Page 7
`
`

`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM
`
`135
`
`G,/—
`
`_=-'—-'‘‘ > —-"-S‘ __‘''-~‘:;
`
`\ 4’
`‘u.
`/*
`§~'.£4z..*...,y/-‘ ;s'§,'«{
`4'” ¢I.'D¢‘‘= *-
`$23}
`
`10 Regional
`offices
`
`t d)
`
`“i"'y
`
`in erconnec e
`
`I
`
`’II
`
`\‘
`
`s\
`
`,
`
`'1
`
`67 Sectional
`offices
`
`00 0 OOCO@@@
`
`\
`
`\
`,
`: X‘
`X ‘.
`I
`\\
`‘\
`‘,
`I
`\\
`,
`\
`\ \
`\\\\
`'
`\
`\\
`CCCCC CCCCCCCCC COCO ‘9'°°°E"“'
`offices
`
`offices
`
`1300 Toll
`offices
`
`1
`
`2
`
`3
`
`4
`
`5
`
`200 Miliionteiephones_
`
`19,000
`
`Fig. 2-37. The AT&T telephone hierarchy. The dashed lines are direct trunks.
`
`dashed lines. As a consequence, many calls can now be routed along many paths.
`The actual route chosen is generally the most direct one, but if the necessary
`trunks along it are full, an alternative is chosen. This complex routing is now pos-
`sible because a switching machine, like the AT&T 5 ESS, is in fact just a general
`purpose computer with a large amount of very specialized I/O equipment.
`
`Crossbar Switches
`
`Let us now turn from how calls are routed among switches to how individual
`switches actually work inside. Several kinds of switches are (or were) common
`within the telephone system. The simplest kind is the crossbar switch (also
`called a crosspoint switch), shown in Fig. 2-38.
`In a switch with n input lines
`and n output
`lines (i.e.,
`11
`full duplex lines),
`the crossbar switch has n2
`
`APPLE 1015 - Page 8
`
`APPLE 1015 - Page 8
`
`

`
`136
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`intersections, called crosspoints, where an input and an outputline may be con—
`nected by a semiconductor switch, as shown in Fig. 2—38(a).
`In Fig. 2—38(b) we
`see an example in which line 0 is connected to line 4, line 1 is connected to line 7,
`and line 2 is connected to line 6. Lines 3 and 5 are not connected. All the bits
`
`that arrive at the switch from line 4, for example, are immediately sent out of the
`switch on line 0. Thus the crossbar switch implements circuit switching by mak-
`ing a direct electrical connection, just like the jumper cables in the first—generation
`switches, only automatically and within microseconds.
`
`Potential connection
`
`Actual connection
`
`inputs
`
`(b) A crossbar switch
`Fig. 2-38. (a) A crossbar switch with no connections.
`with three connections set up: 0 with 4, l with 7, and 2 with 6.
`
`The problem with a crossbar switch is that the number of crossbars grows as
`the square of the number of lines into the switch.
`If we assume that all lines are
`full duplex and that there are no self—connections, only the crosspoints above the
`diagonal are needed. Still, n(rz —- 1)/2 crosspoints are needed. For n = 1000, we
`need 499,500 crosspoints. While building a VLSI chip with this number of
`transistor switches is possible, having 1000 pins on the chip is not. Thus a single
`crossbar switch is only useful for relatively small end offices.
`
`Space Division Switches
`
`By splitting the crossbar switch into small chunks and interconnecting them, it
`is possible to build multistage switches with many fewer_crosspoints. These are
`called space division switches. Two configurations are illustrated in Fig. 2—39.
`To keep our example simple, we will consider only three—stage switches, but
`
`APPLE 1015 - Page 9
`
`APPLE 1015 - Page 9
`
`

`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM
`
`137
`
`N=16,n=4,k=2
`
`N=16,n=4,k=3
`
`N
`-5- Crossbars
`
`N
`—n- Crossbars
`
`N
`F Crossbars
`
`N
`-n— Crossbars
`
`
`
`Fig. 2-39. Two space division switches with different parameters.
`
`switches with more stages are also possible. In these examples, we have a total of
`N inputs and N outputs. Instead of building a single N X N crossbar, we build the
`switch out of smaller rectangular Crossbars.
`In the first stage, each crossbar has n
`inputs, so we need N/n of them to handle all N incoming lines.
`The second stage has k Crossbars, each with N/n inputs and N/n outputs. The
`third stage is a repeat of the first stage, but reversed left to right. Each intermedi-
`ate crossbar is connected to each input crossbar and each output crossbar. Conse-
`quently, it is possible to connect every input to every output using either the first
`intermediate crossbar in Fig. 2—39(a) or using the second one.
`In fact, there are
`two disjoint paths from each input to each output, depending which intermediate
`crossbar is chosen. In Fig. 2—39(b) there are three paths for each input/output pair.
`With k intermediate stages (k is a design parameter), there are k disjoint paths.
`Let us now compute the number of crosspoints needed for a three—stage
`switch.
`In the first stage, there are N/n Crossbars, each with nk crosspoints, for a
`total of Nk.
`In the second stage,
`there are k Crossbars, each with (N/n)2
`crosspoints. The third stage is the same as the first. Adding up the three stages,
`we get
`
`Number of crosspoints = 2kN + k(N/n)2
`
`For N = 1000, n = 50 and k = 10, we need only 24,000 crosspoints instead of the
`499,500 required by a 1000 X 1000 single-stage crossbar.
`
`APPLE 1015 - Page 10
`
`
`
`.ss:_<wzrz«:w-.<~w.~».:,..
`
`APPLE 1015 - Page 10
`
`

`
`138
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`Unfortunately, as usual, there is no free lunch. The switch can block. Con-
`sider Fig. 2—39(a) again. Stage 2 has eight inputs, so a maximum of eight calls
`can be connected at once. When call nine comes by, it will have to get a busy sig-
`nal, even though the destination is available. The switch of Fig. 2—39(b) is better,
`handling a maximum of 12 calls instead of 8, but it uses more crosspoints. Some-
`times when making a phone call you may have gotten a busy signal before you
`finished dialing. This was probably caused by blocking part way through the net-
`work.
`
`It should be obvious that the larger k is, the more expensive the switch and the
`lower the blocking probability.
`In 1953, Clos showed that when k = 2n — 1, the
`switch will never block (Clos, 1953). Other researchers have analyzed calling
`patterns in great detail to construct switches that theoretically can block but do so
`only rarely in practice.
`
`Time Division Switches
`
`A completely different kind of switch is the time division switch, shown in
`Fig. 240. With time division switching, the n input lines are scanned in sequence
`to build up an input frame with n slots. Each slot has k bits. For Tl switches, the
`slots are 8 bits, with 8000 frames processed per second.
`
`Time slot
`
`interchanger
`
`.
`
`n output
`lines
`
`Output frame
`
`n word mapping table
`
`
`
`
`Time slots
`RAM buffer of
`n k-bit words
`
`C
`
`Fig. 2-40. A time division switch.
`
`The heart of the time division switch is the time slot interchanger, which
`accepts input frames and produces output frames in which the time slots have
`been reordered.
`In Fig. 2-40, input slot 4 is output first, then slot 7, and so on.
`Finally, the output frame is demultiplexed, with output slot 0 (input slot 4) going
`
`APPLE 1015 - Page 11
`
`APPLE 1015 - Page 11
`
`

`
`
`
`SEC. 2.4
`
`THE TELEPHONE SYSTEM
`
`139
`
`to line 0, and so on. In essence, the switch has moved a byte from input line 4 to
`output line 0, another byte from input line 7 to output line 1, and so on. Viewed
`from the outside, the whole arrangement is a circuit switch, even though there are
`no physical connections.
`The time slot interchanger works as follows: When an input frame is ready to
`be processed, each slot (i.e., each byte in the input frame) is written into a RAM
`buffer inside the interchanger. The slots are written in order, so buffer word 1‘
`contains slot i.
`
`After all the slots of the input frame have been stored in the buffer, the output
`frame is constructed by reading out the words again, but in a different order. A
`counter goes from 0 to n —— 1. At step j, the contents of word j of a mapping table
`is read out and used to address the RAM table. Thus if word 0 of the mapping
`table contains a 4, word 4 of the RAM buffer will be read out first, and the first
`slot of the output frame will be slot 4 of the input frame. Thus the contents of the
`mapping table determine which permutation of the input frame will be generated
`as the output frame, and thus which input line is connected to which output line.
`Time division switches use tables that are linear in the number of lines, rather
`than quadratic, but they have another limitation.
`It is necessary to store it slots in
`the buffer RAM and then read them out again within one frame period of 125
`usec. If each of these memory accesses takes T microsec, the time needed to pro-
`cess a frame is 2nT microsec, so we have 2nT = 125 or n = 125/2T. For a
`memory with lO0—nsec cycle time, we can support at most 625 lines. We can also
`turn this relation around and use it to determine the required memory cycle to sup—
`port a given number of lines. As with a crossbar switch, it is possible to devise
`multistage switches that split the work up into several parts and then combine the
`results in order to handle larger numbers of lines.
`\.
`
`2.5. NARROWBAND ISDN
`
`For more than a century, the primary international telecommunication infras-
`tructure has been the public circuit—switched telephone system. This system was
`designed for analog voice transmission and is inadequate for modern communica-
`tion needs. Anticipating considerable user demand for an end-to~end digital ser-
`vice (i.e., not like Fig. 2-17 which is part digital and part analog), the world’s tele-
`phone companies and PTTs got together in 1984 under the auspices of CCITT and
`agreed to build a new, fully digital, circuit—switched telephone system by the early
`part of the 21st Century. This new system, called ISDN (Integrated Services
`Digital Network), has as its primary goal the integration of voice and nonvoice
`services.
`It is already available in many locations and its use is growing slowly.
`In the following sections we will describe what it does and how it works. For
`further information, see (Dagdeviren et al., 1994; and Kessler, 1993).
`
`APPLE 1015 - Page 12
`
`APPLE 1015 - Page 12
`
`

`
`140
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`2.5.1. ISDN Services
`
`The key ISDN service will continue to be voice, although many enhanced
`features will be added. For example, many corporate managers have an intercom
`button on their telephone that rings their secretaries instantly (no call setup time).
`One ISDN feature is telephones with multiple buttons for instant call setup to
`arbitrary telephones anywhere in the world. Another feature is telephones that
`display the caller’s telephone number, name, and address on a display while ring-
`ing. A more sophisticated version of this feature allows the telephone to be con-
`nected to a computer, so that the caller’s database record is displayed on the
`screen as the call comes in. For example, a stockbroker could arrange that when
`she answers the telephone, the caller’s portfolio is already on the screen along
`with the current prices of all the caller’s stocks. Other advanced voice services
`include call forwarding and conference calls worldwide.
`Advanced nonvoice services are“remote electricity meter reading, and on—line
`medical, burglar, and smoke alarms that automatically call the hospital, police, or
`fire department, respectively, and give their address to speed up response.
`
`2.5.2. ISDN System Architecture
`
`It is now time to look at the ISDN architecture in detail, particularly the
`customer’s equipment and the interface between the customer and the telephone
`company or PTT. The key idea behind ISDN is that of the digital bit pipe, a con-
`ceptual pipe between the customer and the carrier through which bits flow.
`Whether the bits originated from a digital telephone, a digital terminal, a digital
`facsimile machine, or some other device is irrelevant. All that matters is that bits
`
`can flow through the pipe in both directions.
`The digital bit pipe can, and normally does, support multiple independent
`channels by time division multiplexing of the bit stream. The exact format of the
`bit stream and its multiplexing is a carefully defined part of the interface specifi-
`cation for the digital bit pipe. Two principal standards for the bit pipe have been
`developed, a low bandwidth standard for home use and a higher bandwidth stan-
`dard for business use that supports multiple channels that are identical to the home
`use channel. Furthermore, businesses may have multiple bit pipes if they need
`additional capacity beyond what the standard business pipe can provide.
`In Fig. 2—4l(a) we see the normal configuration for a home or small business.
`The carrier places a network terminating device, NT1, on the customer’s premises
`and connects it to the ISDN exchange in the carrier’s office, several kilometers
`away, using the twisted pair that was previously used to connect to the telephone.
`The NTl box has a connector on it into which a passive bus cable can be inserted.
`Up to eight ISDN telephones, terminals, alarms, and other devices can be con-
`nected to the cable, similar to the way devices are connected to a LAN. From the
`customer’s point of view, the network boundary is the connector on NTl.
`
`APPLE 1015 - Page 13
`
`APPLE 1015 - Page 13
`
`

`
`SEC. 2.5
`
`NARROWBAND ISDN
`
`141
`
`
`Customer's office
`<————— Carrier's office —-——>
`I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
`I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
`
`‘I
`
`ISDN Terminal
`
`lI
`
`ISDN
`T I
`Exchange
`
`;
`;
`ISDN
`ISDN
`ISDN
`:
`:
`Alarm
`Terminal
`Telephone
`._ ________________________________ ___J
`I______________________________________ _.._J
`
`
`
`-I—-0 internal
`“9IW°"<
`
`Customer's equipment
`
`Carrier's equipment
`
`(a)
`
`
`
`I
`
`Customer's office
`
`> <—
`
`Carrier's office
`
`
`
`T '
`I
`
`I
`|
`
`.
`
`" ““““““““““““““““““““““““ “I
`.******************************* "‘
`I
`I
`TE1 T
`I
`I
`I
`I
`TefITSII?I;\I H S
`I
`5 j E
`\’ \
`E
`I T: - U
`T°.
`,
`I
`I
`I
`carriers I
`N-I-2 jj 1- Exchan e mo internal
`S
`:
`-E...-1 / ISDN
`'
`9
`network:
`II
`I
`..I
`
`ISDN
`
`____________________________________ __
`Digital
`Carrier's equipment
`bit pipe
`
`A
`
`1
`
`ISDN
`
`Telephone
`
`,
`3
`I
`I j
`=15)“
`53% 1| ;
`'
`ISDN
`Terminal
`LAN Gateway
`I
`'
`
`I
`
`I E
`
`0 0 0 0
`
`EI
`
`__________________________________ _-J
`
`Customer's equipment
`
`(b)
`
`Fig. 2-41. (21) Example ISDN system for home use. (b) Example ISDN system
`with a PBX for use in large businesses.
`
`APPLE 1015 - Page 14
`
`APPLE 1015 - Page 14
`
`

`
`142
`
`THE PHYSICAL LAYER
`
`CHAP. 2
`
`the model of Fig. 2-4l(a) is inadequate because it is
`For large businesses,
`common to have more telephone conversations going on simultaneously than the
`bus can handle. Therefore, the model of Fig. 2-4l(b) is used.
`In this model we
`find a device, NT2, called a PBX (Private Branch eXchange), connected to NTl
`and providing the real interface for telephones, terminals and other equipment.
`An ISDN PBX is not very different conceptually from an ISDN switch, although
`it is usually smaller and cannot handle as many conversations at the same time.
`CCITT defined four reference points, called R, S, T, and U, between the
`various devices. These are marked in Fig. 2-41. The U reference point is the con-
`nection between the ISDN exchange in the carrier’s office and NTl. At present it
`is a two-wire copper twisted pair, but at some time in the future it may be
`replaced by fiber optics. The T reference point is what the connector on NTl pro-
`vides to the customer. The S reference point is the interface between the ISDN
`PBX and the ISDN terminals. The R reference point is the connection between
`the terminal adapter and non-lSDN‘<=~terminals. Many different kinds of interfaces
`will be used at R.
`
`2.5.3. The ISDN Interface
`
`The ISDN bit ‘pipe supports multiple channels interleaved by time division
`multiplexing. Several channel types have been standardized:
`
`A — 4-kHz analog telephone channel
`B — 64—kbps digital PCM channel for voice or data
`C — 8- or-16 kbps digital channel
`D - 16-kbps digital channel for out-of-band signaling
`E — 64—kbps digital channel for internal ISDN signaling
`H — 384-, 1536-, or l920-kbps digital channel
`
`It was not CClTT’s intention to allow an arbitrary combination of channels on the
`digital bit pipe. Three combinations have been standardized so far:
`
`1. Basic rate: 2B + lD
`
`2. Primary rate: 23B + lD (U.S. and Japan) or 30B + lD (Europe)
`
`3. Hybrid: 1A + lC
`
`The basic rate and primary rate channels are illustrated in Fig. 2-42.
`The basic rate should be viewed as a replacement for POTS (Plain Old Tele-
`phone Service) for home or small business use. Each of the 64—kbps B channels
`can handle a single PCM voice channel with 8-bit samples made 8000 timesea
`second (note that 64 kbps means 64,000 here, not 65,536). Signaling is on a
`separate 16-kbps D channel, so the full 64 kbps are available to the user (as in the
`CCITT 2.048-Mbps system and unlike the U.S. and Japanese Tl
`system).
`
`APPLE 1015 - Page 15
`
`APPLE 1015 - Page 15
`
`

`
`SEC. 2.5
`
`NARROWBAND ISDN
`
`143
`
`Q
`.1 Basic rate
`...:.
`
`(8)
`
`: D (16 kbps)
`_ B1 to B2
`
`Fig. 2-42. (a) Basic rate digital pipe. (b) Primary rate digital pipe.
`
`Because ISDN is so focused on 64—kbps channels, we refer to it as N-ISDN (Nar-
`rowband ISDN),
`to contrast it with broadband ISDN (ATM) to be discussed
`later.
`
`The primary rate interface is intended for use at the T reference point for
`businesses with a PBX.
`It has 23 B channels and l D channel (at 64 kbps) in the
`United States and Japan and 30 B channels and l D channel (at 64 kbps) in
`Europe. The 23B + lD choice was made to allow an ISDN frame fit nicely on
`AT&T’s T1 system. The 30B + ID choice was made to allow an ISDN frame fit
`nicely in CCITT’s 2.048 Mbps system. The 32nd time slot in the CCITT system
`is used for framing and general network maintenance. Note that the amount of D
`channel per B channel in the primary rate is much less than in the basic rate, as it
`is not expected that there will be much telemetry or low bandwidth packet data
`there.
`
`2.5.4. Perspective on N-ISDN
`
`N-ISDN was a massive attempt to replac,e_ the analog telephone system with a
`digital one suitable for both voice and nonvoice traffic. Achieving worldwide
`agreement on the interface standard for the basic rate was supposed to lead to a
`large user demand for ISDN equipment,
`thus leading to mass production,
`economies of scale, and inexpensive VLSI ISDN chips. Unfortunately,
`the
`standardization process took years and the technology in this area moved very
`rapidly, so that once the standard was finally agreed upon, it was obsolete.
`For home use, the largest demand for new services will undoubtedly be for
`video on demand. Unfortunately,
`the ISDN basic rate lacks the necessary
`bandwidth by two orders of magnitude. For business use, the situation is even
`bleaker. Currently available LANS offer at least 10 Mbps and are now being
`replaced by lOO—Mbps LANS. Offering 64—kbps service to businesses in the 1980s
`was a serious proposition. In the 1990s, it is a joke.
`Oddly enough, ISDN may yet be saved, but by a totally unexpected applica—
`tion: Internet access. Various companies now sell ISDN adaptors that combine
`the 2B + D channels into a single 144-kbps digital channel. Many Internet service
`providers also support these adaptors. The result is that people can access the
`
`APPLE 1015 - Page 16
`
`APPLE 1015 - Page 16
`
`

`
`416
`
`THE NETWORK LAYER
`
`CHAP. 5
`
`routers on the way. Normally, this option would only provide a few routers, to
`force a particular path. For example, to force a packet from London to Sydney to
`go west instead of east,
`this option might specify routers in New York, Los
`Angeles, and Honolulu. This option is most useful when political or economic
`considerations dictate passing through or avoiding certain countries.
`The Record route option tells the routers along the path to append their IP
`address to the option field. This allows system managers to track down bugs in
`the routing algorithms (“Why are packets from Houston to Dallas all Visiting
`Tokyo first?”) When the ARPANET was first set up, no packet ever passed
`through more than nine routers, so 40 bytes of option was ample. As mentioned
`above, now it is too small.
`Finally, the Timestamp option is like the Record route option, except that in
`addition to recording its 32-bit IP address, each router also records a 32-bit time-
`stamp. This option, too, is mostly for debugging routing algorithms.
`“V
`
`5.5.2. IP Addresses
`
`Every host and router on the Internet has an IP address, which encodes its net—
`work number and host number. The combination is unique: no two machines
`have the same IP address. All IP addresses are 32 bits long and are used in the
`Source address and Destination address fields of IP packets. The formats used
`for IP address

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket