throbber
FIFTH EDITION
`
`DATA AND
`(COMPUTER
`COMMUNICATIONS
`
`WILLIAM STALLINGS
`
`
`
`=<)
`
`PRENTICE HALL
`Upper SADDLE RIVER, NEW JERSEY 07458
`
`1
`
`SAMSUNG 1014
`
`SAMSUNG 1014
`
`1
`
`

`

`Library of Congress Cataloging-in-Publication Data
`Stallings, William.
`Data and computer communications / William Stallings. —Sth ed.
`p.
`cm.
`Includes bibliographical references and index.
`ISBN(invalid) 0-02-415425-3
`1. Data transmission systems.
`TKS5105.S73
`1996
`004.6—dc20
`
`2. Computer networks.
`
`I. Title.
`96-24419
`CIP
`
`Publisher: Alan Apt
`Editor-in-Chief: Marcia Horton
`Production Manager: Bayani Mendoza de Leon
`Production Editor: Mona Pompili
`Managing Editor: Laura Steele
`Design Director: Amy Rosen
`
`Designer: Judy Matz-Coniglio
`Cover Designer: Tom Nery
`CoverIllustrator: Wendy Grossman
`Copy Editor: Chip Lee
`Manufacturing Buyer: DonnaSullivan
`Editorial Assistant: Shirley McGuire
`
`= © 1997 by Prentice-Hall, Inc.
`
`Simon & Schuster / A Viacom Company
`Upper Saddle River, New Jersey 07458
`
`Theauthor and publisherof this book have used their best efforts in preparing this book. These efforts
`include the development,research, and testing of the theories and programsto determine their
`effectiveness. The author and publishershall not beliable in any event for incidental or consequential
`damagesin connection with, or arising out of, the furnishing, performance,or use of these programs.
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without
`permission in writing from the publisher.
`
`Printed in the United States of America
`
`10098765 432 1
`
`ISBN QO-O2-415425-3
`
`PRENTICE-HALL INTERNATIONAL (UK) LIMITED, London
`PRENTICE-HALL OF AUSTRALIA PTy. LIMITED, Sydney
`PRENTICE-HALL CANADA,INC., Toronto
`PRENTICE-HALL HISPANOAMERICANA,S.A., Mexico
`PRENTICE-HALL OF INDIA PRIVATE LIMITED, New Delhi
`PRENTICE-HALL OF JAPAN, INC., Tokyo
`SIMON & SCHUSTER ASIA PTE. LTD., Singapore
`EDITORA PRENTICE-HALL DO BRASIL, LrDA., Rio de Janeiro
`
`
`
`2
`
`

`

`
`
`CHAPTER 1
`INTRODUCTION 1
`
`1.1.
`1.2
`1.3
`1.4
`1.5
`16
`
`2
`
`A Communications Model
`Data Communications
`5
`Data Communications Networking
`Protocols and Protocol Architecture
`Standards
`21
`Outline of the Book
`
`22
`
`7
`
`11
`
`APPENDIX 1A STANDARDS ORGANIZATIONS
`APPENDIX 1B INTERNET Resources
`31
`
`27
`
`PART ONE
`Data Communications 33
`
`CHAPTER 2
`DATA TRANSMISSION 33
`
`2.1
`2.2
`2.3.
`2.4
`2.5
`
`34
`Concepts and Terminology
`Analog and Digital Data Transmission
`Transmission Impairments
`55
`Recommended Reading
`64
`Problems
`64
`
`45
`
`67
`APPENDIX 2A FOURIER ANALYSIS
`APPENDIX 2B DECIBELS AND SIGNAL STRENGTH 71
`
`CHAPTER 3
`TRANSMISSION MEDIA 73
`
`Guided Transmission Media
`3.1
`3.2 Wireless Transmission
`85
`
`75
`
`
`
`3
`
`

`

`Xiv CONTENTS
`
`3.3
`3.4
`
`Recommended Reading
`Problems
`93
`
`93
`
`CHAPTER 4
`Data ENCODING 95
`
`Digital Data, Digital Signals
`4.1
`Digital Data, Analog Signals
`4.2
`Analog Data, Digital Signals
`4.3.
`Analog Data, Analog Signals
`4.4
`Spread Spectrum 128
`4.5
`Recommended Reading
`4.6
`Problems
`132
`4.7.
`APPENDIX 4A.
`PROOF OF THE SAMPLING THEOREM 136
`
`97
`107
`115
`121
`
`132
`
`CHAPTER 5
`THE DATA COMMUNICATION INTERFACE 139
`5.1.
`Asynchronous and Synchronous Transmission
`140
`5.2
`Line Configurations
`144
`5.3
`Interfacing
`145
`5.4
`Recommended Reading
`5.5
`Problems
`156
`
`156
`
`CHAPTER 6
`DaTA LINK CONTRL 157
`
`159
`FlowControl
`6.1.
`Error Detection
`164
`6.2
`Error Control
`171
`6.3
`High-Level Data Link Control (HDLC)
`6.4
`Other Data Link Control Protocols
`184
`6.5
`Recommended Reading
`186
`6.6
`Problems
`187
`6.7.
`APPENDIX 6A.
`PERFORMANCE Issues
`
`190
`
`176
`
`CHAPTER 7
`MULTIPLEXING 197
`
`7.1.
`7.2
`7.3.
`7.4
`7.5
`
`199
`Frequency-Division Multiplexing
`205
`Synchronous Time-Division Multiplexing
`Statistical Time-Division Multiplexing
`219
`Recommended Reading
`226
`Problems
`226
`
`4
`
`

`

`CONTENTS XV
`
`PART TWO
`Wide-Area Networks 229
`
`CHAPTER 8
`CIRCUIT SWITCHING 229
`
`8.1
`8.2.
`8.3.
`8.4
`8.5
`8.6
`8.7.
`
`231
`
`230
`Switched Networks
`Circuit-Switching Networks
`Switching Concepts
`234
`Routing in Circuit-Switched Networks
`Control Signaling
`244
`Recommended Reading 252
`Problems
`252
`
`240
`
`CHAPTER 9
`PACKET SWITCHING 253
`
`253
`
`9.1
`Packet-Switching Principles
`9.22
`Routing
`264
`9.3
`Congestion Control
`94
`X25
`282
`9.5
`Recommended Reading
`9.6
`Problems
`291
`APPENDIX 9A Least-CostT ALGORITHMS
`
`278
`
`291
`
`296
`
`304
`
`CHAPTER 10
`FRAME RELAY 301
`
`302
`10.1. Background
`10.2
`Frame Relay Protocol Architecture
`10.3
`Frame Relay Call Control
`307
`10.4 User Data Transfer
`313
`10.5 Network Function
`315
`10.6 Congestion Control
`316
`10.7 Recommended Reading
`10.8
`Problems
`325
`
`325
`
`CHAPTER 1 1
`ASYNCHRONOUS TRANSFER MODE (ATM) 327
`11.1.
`Protocol Architecture
`328
`11.2 ATM Logical Connections
`113 ATMCells
`334
`11.4 Transmission of ATM Cells
`
`329
`
`338
`
`5
`
`

`

`XVi CONTENTS
`
`1L5
`11.6
`11.7
`11.8
`
`342
`ATM Adaptation Layer
`Traffic and Congestion Control
`Recommended Reading
`359
`Problems
`360
`
`347
`
`PART THREE
`Local Area Networks 363
`
`CHAPTER 12
`LAN TECHNOLOGY 363
`
`12.1
`12.2
`12.3
`12.4
`12.5
`12.6
`12.7
`
`364
`LAN Architecture
`Bus/Tree LANs
`337
`Ring LANs
`385
`Star LANs
`389
`393
`Wireless LANs
`Recommended Reading
`Problems
`399
`
`399
`
`CHAPTER 13
`LAN Systems 401
`
`402
`
`13.1
`13.2
`13.3
`13.4
`35
`13.6
`13.7
`13.8
`
`Ethernet and Fast Ethernet (CSMA/CD)
`Token Ring and FDDI
`413
`100VG-AnyLAN 427
`ATMLANs
`431
`Fibre Channel
`435
`Wireless LANs
`442
`Recommended Reading
`Problems
`448
`
`447
`
`APPENDIX 13A_ DiciTat SIGNAL ENCODING FOR LANs
`APPENDIX 13B PERFORMANCE IssuES
`458
`
`451
`
`CHAPTER 14
`BRIDGES 465
`
`14.1
`14.2
`14.3
`14.4
`14.5
`
`466
`Bridge Operation
`Routing with Bridges
`ATM LAN Emulation
`Recommended Reading
`Problems
`495
`
`470
`487
`495
`
`6
`
`

`

`CONTENTS XVii
`
`PART FOUR
`Communications Architecture and
`Protocols 497
`
`CHAPTER 15
`PROTOCOLS AND ARCHITECTURE 497
`
`498
`
`Protocols
`15.1
`15.2 OSI
`510
`15.3. TCP/IP Protocol Suite
`15.4 Recommended Reading
`15.5
`Problems
`526
`
`520
`526
`
`CHAPTER 16
`INTERNETWORKING 527
`
`529
`Principles of Internetworking
`16.1
`16.2 Connectionless Internetworking
`534
`16.3 The Internet Protocol
`541
`16.4 Routing Protocol
`549
`16.5
`IPv6(IPng)
`559
`16.6
`ICMPv6
`578
`16.7 Recommended Reading
`16.8
`Problems
`582
`
`582
`
`CHAPTER 17
`TRANSPORT PROTOCOLS 585
`
`586
`17.1 Transport Services
`17.2
`Protocol Mechanisms
`591
`17.3 TCP 610
`17.4 UDP 619
`17.5 Recommended Reading
`17.8
`Problems
`620
`
`619
`
`CHAPTER 18
`NETWORK SECURITY 623
`
`624
`Security Requirements and Attacks
`18.1
`Privacy with Conventional Encryption
`627
`18.2.
`18.3 Message Authentication and Hash Functions
`18.4
`Public-Key Encryption and Digital Signatures
`
`638
`649
`
`7
`
`

`

`XVili CONTENTS
`
`IPv4 and IPv6 Security
`18.5
`18.6 Recommended Reading
`18.8
`Problems
`665
`
`659
`664
`
`CHAPTER 1 9
`DISTRIBUTED APPLICATIONS 667
`
`668
`
`19.1. Abstract Syntax Notation One (ASN.1)
`19.2. Network Management—SNMPV2_
`685
`19.3. Electronic Mail—SMTP and MIME 697
`19.4 Uniform Resource Locators (URL) and Universal Resource Identifiers
`(URI)
`712
`19.5 Hypertext Transfer Protocol (HTTP)
`19.6 Recommended Reading
`736
`19.7.
`Problems
`737
`
`719
`
`APPENDIX A
`ISDN AND BROADBAND ISDN_739
`
`Al Overview of ISDN 740
`A.2
`ISDN Channels
`747
`A.3 User Access
`750
`752
`A.4
`ISDN Protocols
`A.5
` BroadbandISDN 764
`A.6
`Recommended Reading
`A.7
`Problems
`768
`
`768
`
`APPENDIX B
`RFCs CITED IN THIS BOOK 771
`
`GLOSSARY 773
`
`REFERENCES 785
`
`INDEX 791
`
`8
`
`

`

`
`
`6.408 Wide-Area Networks
`
`CHAPTER 8
`
`
`
`CIRCUIT SWITCHING
`
` 8.1 Switching Networks
`
`8.2 Circuit-Switching Networks
`8.3 Switching Concepts
`8.4 Routing in Circuit-Switched Networks
`8.5 Control Signaling
`8.6 Recommended Reading
`8.7 Problems
`
`
`
`
`
`9
`
`

`

`230 CHAPTER 8 / CIRCUIT SWITCHING
`
`
`e the invention of the telephone,circuit switching has been the dominant
`nology for voice communications, and it will remain so well into he
`era. This chapter begins with an introduction to the concept of;
`switched communications network and then looks at the key characteristics of::
`
`circuit-switching network.
`
`
`Fortransmission of data' beyondalocal area, communicationis typically achievall
`by transmitting data from source to destination through a networkof intermediate
`switching nodes; this switched-network design is sometimes used to implement
`LANs and MANsaswell. The switching nodesare not concerned with the contenn
`of the data; rather, their purposeis to provide a switchingfacility that will move he
`data from node to node until they reach their destination. Figure 8.1 illustratesa
`simple network. The end devices that wish to communicate may bereferred toa
`stations. The stations may be computers, terminals, telephones, or other comm ni-
`cating devices. We will refer to the switching devices whose purposeis to provide
`communication as nodes, which are connected to each other in some topology by
`transmission links. Each station attaches to a node, and the collection of nodes is
`referred to as a communications network.
`:
`
`
`
`LEGEND
`
`
`LE] = Endstation
`4
`© = Communication network node
`j
`FIGURE 8.1 Simple switching network.
`"Weuse this term here in a very general sense to include voice, image, and video, as well as ord ing
`data(e.g., numerical, text).
`
`
`
`10
`
`10
`
`

`

`8.2 / CIRCUIT-SWITCHING NETWORKS 231
`
`The types of networks that are discussed in this and the next three chapters
`are referred to as switched communication networks. Data entering the network
`from a station are routed to the destination by being switched from nodeto node.
`For example, in Figure 8.1, data from station A intendedfor station F are sent to
`node 4. They may then be routed via nodes 5 and 6 or nodes 7 and6 tothe desti-
`nation. Several observationsare in order:
`
`1. Some nodes connect only to other nodes(e.g., 5 and 7). Their sole task is the
`internal(to the network) switching of data. Other nodes have oneor moresta-
`tions attached as well; in addition to their switching functions, such nodes
`accept data from anddeliver data to the attachedstations.
`2. Node-node links are usually multiplexed, using either frequency-division
`multiplexing (FDM)or time-division multiplexing (TDM).
`Usually, the network is not fully connected; that is, there is not a direct link
`between every possible pair of nodes. However,it is always desirable to have
`more than onepossible path through the networkfor eachpair ofstations; this
`enhancesthereliability of the network.
`
`3
`
`Two quite different technologies are used in wide-area switched networks:cir-
`cuit switching and packet switching. These two technologies differ in the way the
`nodes switch information from one link to another on the way from sourceto des-
`tination. In this chapter, we look atthe details of circuit switching; packet switching
`is pursued in Chapter 9. Two approaches that evolved from packet switching,
`namely frame relay and ATM,are explored in Chapters 10 and11, respectively.
`
`
`
`Communication via circuit switching implies that there is a dedicated communica-
`tion path betweentwostations. That path is a connected sequence of links between
`network nodes. On each physicallink, a logical channel is dedicated to the connec-
`tion. Communication via circuit switching involves three phases, which can be
`explained with reference to Figure 8.1.
`
`1. Circuit establishment. Before any signals can be transmitted, an end-to-end
`(station-to-station) circuit must be established. For example, station A sends
`a request to node 4 requesting a connection to station EF. Typically, the link
`from A to4is a dedicated line, so that part of the connection already exists.
`Node 4 mustfind the next leg in a route leading to node 6, Based on routing
`information and measuresof availability and, perhaps,cost, node 4 selects the
`link to node5, allocates a free channel (using frequency-division multiplexing,
`FDM,ortime-division multiplexing, TDM) onthatlink and sends a message
`requesting connectionto E.So far, a dedicated path has been established from
`A through4 to 5. Because a numberofstations may attach to 4,it must be able
`to establish internal paths from multiple stations to multiple nodes. The
`remainder of the process proceeds similarly. Node 5 dedicates a channel to
`node 6 and internally ties that channel to the channel from node 4. Node 6
`
`11
`
`11
`
`

`

`232 CHAPTER 8 / CIRCUIT SWITCHING
`completes the connectionto E. In completing the connection,a test is made to
`determineif E is busy or is prepared to accept the connection.
`2. Data transfer. Information can now be transmitted from A through the net-
`work to E. The data maybe analog ordigital, depending on the nature of the
`network. As the carriers evolve to fully integrated digital networks,the use of
`digital (binary) transmission for both voice and data is becoming the dominant
`method. Thepath is A-4 link, internal switching through 4, 4-5 channel,inter-
`nal switching through 5, 5-6 channel, and internal switching through 6, 6-E
`link. Generally, the connectionis full-duplex.
`3. Circuit disconnect. After some period of data transfer, the connectionis ter-
`minated, usually by the action of one of the two stations. Signals must be prop-
`agated to nodes4,5, and 6 to deallocate the dedicated resources.
`Note that the connection path is established before data transmission begins.
`Thus, channel capacity must be reserved between each pair of nodes in the path,
`and each node must have available internal switching capacity to handle the
`requested connection. The switches must have the intelligence to makethese allo-
`cations and to devise a route through the network.
`Circuit switching can be ratherinefficient. Channel capacity is dedicated for
`the duration of a connection, evenif no data are being transferred. For a voice con-
`nection,utilization maybe rather high, butit still does not approach 100 percent.
`For a terminal-to-computer connection, the capacity may be idle during mostof the
`time of the connection. In terms of performance, there is a delay prior to signal
`transfer for call establishment. However, once the circuit is established, the network
`is effectively transparentto the users. Informationis transmitted ata fixed datarate
`with no delay other than that required for propagation through the transmission
`links. The delay at each nodeis negligible.
`Circuit switching was developed to handle voice traffic but is now also used
`for data traffic. The best-known exampleof a circuit-switching network is the pub-
`lic telephone network (Figure 8.2); this is actually a collection of national networks
`interconnected to form the international service. Although originally designed
`and implemented to service analog telephone subscribers, the network handles
`substantial data traffic via modem andis gradually being converted to a digital
`network. Another well-known application ofcircuit switching is the private branch —
`exchange (PBX), used to interconnect telephones within a building or office. Cir-
`cuit switchingis also used in private networks—corporationsor otherlarge organi-
`zations interconnecting their various sites; these usually consist of PBX systemsat
`each site interconnected by dedicated, leased lines obtained from one of the carri-
`ers, such as AT&T.A final common example of the application of circuit switching
`is the data switch. The data switch is similar to the PBX but is designed to inter
`connect digital data-processing devices, such as terminals and computers.
`A public telecommunications network can be described using four generic
`architectural components:
`¢ Subscribers: The devices that attach to the network.It is still the case that
`most subscriber devices to public telecommunications networks are tele
`phones, but the percentage of data traffic increases year by year.
`
`—
`—
`
`—
`
`|
`
`12
`
`12
`
`

`

`8.2 / CIRCUIT-SWITCHING NETWORKS 233
`
`Long-distance
`office
`
`Long-distance
`
`office
`
`S|OO00000000bOO
`==10000004000
`
`
`
`
`Subscriber loop
`
`
`Connecting trunk
`
`Intercity trunk
`
`End office
`
`FIGURE 8.2 Public circuit-switching network.
`
`° Local loop: Thelink between the subscriber and the network,also referred to
`as the subscriber loop. Almost all local loop connections used twisted-pair
`wire. The length of a local loopis typically in a range from a few kilometers
`to a few tens of kilometers.
`Exchanges: The switching centers in the network. A switching center that
`directly supports subscribers is known as an end office. Typically, an end office
`will support many thousandsofsubscribersin a localized area. There are over
`19,000 endoffices in the UnitedStates,soit is clearly impractical for each end
`office to have a direct link to each of the other end offices; this would require
`on the order of 2 X 10® links. Rather, intermediate switching nodesare used.
`° Trunks: The branches between exchanges. Trunks carry multiple voice-
`frequency circuits using either FDM or synchronous TDM. Earlier, these
`were referred to ascarrier systems.
`
`Subscribers connect directly to an endoffice, which switches traffic between
`subscribers and betweena subscriber and other exchanges. The other exchangesare
`responsible for routing and switching traffic between endoffices; this distinction is
`shownin Figure 8.3. To connect two subscribers attached to the same end office, a
`circuit is set up between them in the same fashion as described before. If two sub-
`scribers connect to different end offices, a circuit between them consists of a chain
`of circuits through one or more intermediate offices. In the figure, a connectionis
`established betweenlines a andb by simply setting up the connection through the
`end office. The connection between c and d is more complex. In c’s endoffice, a
`connection is established between line c and one channel on a TDM trunk to the
`intermediate switch. In the intermediate switch, that channelis connected to a chan-
`nel on a TDMtrunk to d’s endoffice. In that end office, the channel is connected
`to line d.
`Circuit-switching technology has been driven by those applications that han-
`dle voice traffic. One of the key requirements for voicetraffic is that there must be
`
`13
`
`13
`
`

`

`
`
`234 CHAPTER 8 / CIRCUIT SWITCHING
`
` End
`office
`
`
`
`
`
`
`.
`1 Intermediate
`exchange
`
`FIGURE8.3 Circuit establishment.
`
`virtually no transmission delay and certainly no variation in delay. A constantsig-
`nal transmission rate must be maintained, as transmission and reception occur at
`the samesignal rate. These requirements are necessary to allow normal humancon-
`versation. Further, the quality of the received signal must be sufficiently high to pro-
`vide, at a minimum,intelligibility.
`Circuit switching achieved its widespread, dominant position becauseit is well
`suited to the analog transmission of voice signals; in today’s digital world,its ineffi-
`ciencies are more apparent. However,despite the inefficiency, circuit switching will
`remain an attractive choice for both local-area and wide-area networking. Oneof
`its key strengthsis that it is transparent. Once a circuit is established, it appears asa
`a direct connection to the two attached stations; no special networking logic is
`neededat either point.
`
`8.3
`
`SWITCHING CONCEPTS
`
`4
`
`The technologyof circuit switching is best approached by examining the operation
`of a single circuit-switched node. A network built arounda single circuit-switching
`nodeconsists of a collection of stations attached to a central switching unit. The cen-
`tral switch establishes a dedicated path between any two devices that wish to com
`municate. Figure 8.4 depicts the major elements of such a one-node network. The
`dotted lines inside the switch symbolize the connections that are currently active.
`|
`
`The heart of a modernsystem is a digital switch. The function of the digital
`switch is to providea transparentsignal path between any pair of attached devices.
`Thepath is transparentin that it appears to the attached pair of devices that thet :
`
`is a direct connection between them. Typically, the connection must allow full-
`duplex transmission.
`:
`
`The network-interface element represents the functions and hardware need
` ctif
`to connect digital devices, such as data processing devices and digital telephones,
`
`14
`
`14
`
`

`

`cavern
`
`PACKET SWITCHING
`
`
`
`9.1 Packet-Switching Principles
`9.2 Routing
`9.3 Congestion Control
`9.4 X.25
`
`9.5 Recommended Reading
`9.6 Problems
`Appendix 9A Least-Cost Algorithms
`
`15
`
`

`

`254 CHAPTER 9 / PACKET SWITCHING
`
`m round 1970, research began on a new form ofarchitecture for long-distance
`
`digital data communications: packet switching. Although the technology of
`> = yacket switching has evolved substantially since that time,it is remarkable
`
`that (1) the basic technology of packet switching is fundamentally the same today
`as it was in the early-1970s networks,and (2) packet switching remainsoneofthe
`few effective technologies for long-distance data communications.
`This chapter provides an overview of packet-switching technology. Wewill
`see that many of the advantages of packet switching (flexibility, resource sharing,
`robustness, responsiveness) come with a cost. The packet-switching networkis a
`distributed collection of packet-switching nodes. Ideally,all packet-switching nodes
`would always know the state of the entire network. Unfortunately, because the
`nodesare distributed, there is always a time delay between a changein status in one
`portion of the network and the knowledge of that change elsewhere. Furthermore,
`there is overhead involved in communicating status information. Asa result, a
`packet-switching network can never perform “perfectly,” and so elaborate algo-
`rithms are used to cope with the time delay and overhead penalties of network
`operation. These sameissues will appear again when wediscuss internetworking in
`Part IV.
`The chapter begins with an introduction to packet-switching network princi-
`ples. Next, we lookat the internal operation of these networks, introducing the con-
`cepts of virtual circuits and datagrams. Following this, the key technologies of
`routing and congestion control are examined. The chapter concludes with an intro-
`duction to X.25, which is the standard interface between an end system and a
`packet-switching network.
`
`
`The long-haul circuit-switching telecommunications network was orginally de-
`signed to handle voice traffic, and the majority of traffic on these networks con-
`tinues to be voice. A key characteristic of circuit-switching networks is that
`resources within the network are dedicated to a particular call. For voice connec-
`tions, the resulting circuit will enjoy a high percentage ofutilization because, most
`of the time, oneparty orthe otheris talking. However,as the circuit-switching neta
`work beganto be usedincreasingly for data connections, two shortcomings became
`apparent:
`
`e Ina typical user/host data connection (e.g., personal computer user logged on
`to a database server), much of the timethe line is idle. Thus, with data con-—
`nections, a circuit-switching approachisinefficient.
`|
`e In a circuit-switching network,
`the connection provides for transmission |
`at constant data rate. Thus, each of the two devices that are connected|
`must transmit and receive at the same data rate as the other; this limits the
`utility of the network in interconnecting a variety of host computers and
`terminals.
`
`
`
`16
`
`16
`
`

`

`9.1 / PACKET-SWITCHING PRINCIPLES 255
`
`To understand how packet switching addresses these problems, let us briefly
`summarize packet-switching operation. Data are transmitted in short packets. A
`typical upper bound on packetlength is 1000 octets (bytes). If a source has a longer
`messageto send,the message is broken upintoa series of packets (Figure 9.1). Each
`packet contains a portion (or all for a short message) of the user’s data plus some
`control information. The control information, at a minimum,includes the informa-
`tion that the network requires in order to be able to route the packet through the
`network and deliver it to the intended destination. At each node en route, the
`packetis received,stored briefly, and passed on to the next node.
`Let us return to Figure 8.1, but now assume that it depicts a simple packet-
`switching network. Consider a packet to be sent from station A to station E. The
`packet will include control information that indicates that the intended destination
`is E. The packetis sent from A to node 4. Node 4 stores the packet, determines the
`nextleg of the route (say 5), and queuesthe packet to go outon that link (the 4-5
`link). When the link is available, the packet is transmitted to node 5, whichwill for-
`ward the packet to node6, and finally to E. This approach has a numberof advan-
`tages overcircuit switching:
`
`e Line efficiency is greater, as a single node-to-node link can be dynamically
`shared by manypackets over time. The packets are queued up and transmit-
`ted as rapidly as possible over the link. By contrast, with circuit switching,
`time on a node-to-nodelink is preallocated using synchronous time-division
`multiplexing. Muchofthe time, such a link may be idle because a portion of
`its time is dedicated to a connection whichisidle.
`e A packet-switching network can perform data-rate conversion. Twostations
`of different data rates can exchange packets because each connectsto its node
`at its proper datarate.
`
`!
`
`\
`
`\\
`
`\
`
`!
`
`4
`
`j
`
`hy
`
`Control information
`(packet header)
`SSS
`
`Packet
`
`FIGURE 9.1 Packets.
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`.
`
`17
`
`
`
`17
`
`

`

`256 CHAPTER 9 / PACKET SWITCHING
`
`e Whentraffic becomes heavy ona circuit-switching network, somecalls are
`blocked;that is, the network refuses to accept additional connection requests
`until the load on the network decreases. On a packet-switching network,
`packetsarestill accepted, but delivery delay increases.
`e Priorities can be used. Thus, if a node has a number of packets queued for
`transmission, it can transmit the higher-priority packets first. These packets
`will therefore experience less delay than lower-priority packets.
`
`Switching Technique
`A station has a message to send through a packet-switching network thatis of
`length greater than the maximum packetsize. It therefore breaks the message up
`into packets and sends these packets, one at a time, to the network. A question
`arises as to how the network will handle this stream of packets as it attempts to
`route them through the networkanddeliver them to the intendeddestination; there
`are two approachesthat are used in contemporary networks: datagram andvirtual
`circuit.
`In the datagram approach, each packetis treated independently,with noref-
`erence to packets that have gone before. Let us consider the implication of this
`approach. Suppose that station A in Figure 8.1 has a three-packet message to send
`to E.It transmits the packets, 1-2-3, to node 4. On each packet, node 4 must make
`a routing decision. Packet 1 arrives for delivery to E. Node 4 could plausibly for-
`wardthis packetto either node 5 or node7 as the nextstepin the route. In this case,
`node 4 determinesthat its queue of packets for node 5 is shorter than for node7, so
`it queues the packet for node 5. Ditto for packet 2. But for packet 3, node 4 finds
`that its queue for node 7 is now shorter and so queues packet3 for that node. So the
`packets, each with the samedestination address, do notall follow the same route.
`Asa result, it is possible that packet 3 will beat packet 2 to node 6. Thus,it is also
`possible that the packets will be delivered to E in a different sequence from the one
`in which they weresent. It is up to E to figure out how to reorder them. Also,it is
`possible for a packet to be destroyed in the network. For example,if a packet-
`switching node crashes momentarily, all of its queued packets may belost. If this
`were to happen to one of the packets in our example, node 6 has no way of know-
`ing that one of the packets in the sequence of packets has beenlost. Again,it is up
`to E to detect the loss of a packet andfigure out how to recoverit. In this technique,
`each packet, treated independently,is referred to as a datagram.
`In the virtual-circuit approach, a preplanned route is established before any
`packets are sent. For example, suppose that A has one or more messages to send t0_
`E.It first sends a special control packet, referred to as a Call-Request packet, to 4,
`_
`requesting a logical connection to E. Node 4 decides to route the request andall
`subsequent packets to 5, which decides to route the request and all subsequent
`packets to 6, whichfinally delivers the Call-Request packetto E. If E is prepared to”
`accept the connection,it sends a Call-Accept packet to 6. This packet is passed back
`through nodes 5 and 4 to A. Stations A and E may now exchangedata over the
`route that has been established. Because the route is fixed for the duration of the
`logical connection,it is somewhatsimilarto a circuit in a circuit-switching network,
`and is referred to as a virtual circuit. Each packet now contains a virtual-circuit
`identifier as well as data. Each node on the preestablished route knows where to
`
`18
`
`18
`
`

`

`9.1 / PACKET-SWITCHING PRINCIPLES 257
`
`direct such packets; no routing decisions are required. Thus, every data packet from
`A intendedfor E traverses nodes4, 5, and 6; every data packet from E intended for
`A traverses nodes 6, 5, and 4. Eventually, one of the stations terminates the con-
`nection with a Clear-Request packet. At any time, each station can have more than
`onevirtual circuit to any otherstation and can have virtualcircuits to more than one
`station.
`So, the main characteristic of the virtual-circuit technique is that a route
`betweenstations is set up prior to data transfer. Note that this does not meanthat
`this is a dedicated path, as in circuit switching. A packetis still buffered at each
`node, and queued for output over a line. The difference from the datagram
`approachis that, with virtualcircuits, the node need not make a routing decision for
`each packet; it is made only onceforall packets using thatvirtual circuit.
`If two stations wish to exchange data over an extended period of time, there
`are certain advantages to virtualcircuits. First, the network may provide services
`related to the virtual circuit, including sequencing and error control. Sequencing
`refers to the fact that, because all packets follow the same route, they arrive in the
`original order. Error controlis a service that assures not only that packets arrive in
`proper sequence,butthatall packets arrive correctly. For example,if a packet in a
`sequence from node 4 to node6fails to arrive at node6, or arrives with an error,
`node6 can request a retransmission ofthat packet from node 4, Another advantage
`is that packets should transit the network morerapidly with a virtualcircuit;it is not
`necessary to make a routing decision for each packet at each node.
`One advantage of the datagram approach is that the call setup phase is
`avoided. Thus,if a station wishes to send only oneora few packets, datagram deliv-
`ery will be quicker. Another advantage of the datagram service is that, becauseit is
`more primitive, it is more flexible. For example, if congestion develops in one part
`of the network, incoming datagrams can be routed away from the congestion. With
`the use ofvirtual circuits, packets follow a predefined route, andit is thus more dif-
`ficult for the network to adapt to congestion. A third advantage is that datagram
`delivery is inherently morereliable. With the use of virtual circuits, if a node fails,
`all virtual circuits that pass through that nodeare lost. With datagram delivery,if a
`node fails, subsequent packets mayfind an alternate route that bypasses that node.
`Most currently available packet-switching networks make use of virtualcir-
`cuits for their internal operation. To some degree, this reflects a historical motiva-
`tion to provide a network that presentsa service as reliable (in terms of sequencing)
`as a circuit-switching network. There are, however, several providers of private
`packet-switching networks that make use of datagram operation. From the user’s
`point of view, there should be verylittle difference in the external behavior based
`on the use of datagramsorvirtualcircuits. If a manageris faced with a choice, other
`factors such as cost and performance should probably take precedence over
`whether the internal network operation is datagram or virtual-circuit. Finally, it
`should be noted that a datagram-style of operation is common in internetworks
`(discussed in Part IV).
`
`Packet Size
`
`One importantdesign issue is the packet size to be used in the network. Thereis a
`significant relationship between packet size and transmission time,as illustrated in
`
`19
`
`19
`
`

`

`258 CHAPTER 9 / PACKET SWITCHING 2-packet message
`
`10-packet message
`
`1-packet message
`
`FIGURE 9.2 Effect of packet size on transmission time.
`
`Figure 9.2. In this example, it is assumed thatthereis a virtual circuit from station —
`X through nodesa and b to station Y. The message to be sent comprises 30 octets,
`|
`and each packet contains 3 octets of control information, which is placed at the |
`
`20
`
`20
`
`

`

`9.1 / PACKET-SWITCHING PRINCIPLES 259
`
`beginning of each packetandis referredto as a header.If the entire message is sent
`as a single packet of 33 octets (3 octe

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket