Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ISBN 0-558-69515-9
342
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
CHAPTER
ISBN 0-558-69515-9
343
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
344
Chapter Objectives After reading this chapter, you should be able to Explain the need for a communications network for wide area voice and data communications. Define circuit switching and describe the key elements of circuit-switching networks. Discuss the important applications of circuit switching, including public networks, private networks, and software-defined networks. Define packet switching and describe the key elements of packet-switching technology. Discuss the important applications of packet switching, including public and private networks. Discuss the relative merits of circuit switching and packet switching and analyze the circumstances for which each is most appropriate.
This chapter begins with a general discussion of switched communications networks. The remainder of the chapter focuses on wide area networks and, in particular, on traditional approaches to wide area network design: circuit switching and packet switching.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
345
C Personal computer 1 3 B 5 2
Server
Personal computer
Switching node
E Personal computer
7 Personal computer
Figure 12.1
stations attached as well; in addition to their switching functions, such nodes accept data from and deliver data to the attached stations. 2. Node-station links are generally dedicated point-to-point links. Node-node links are usually multiplexed links, using either frequency division multiplexing (FDM) or some form of time division multiplexing (TDM). 3. Usually, the network is not fully connected; that is, there is not a direct link between every possible pair of nodes. However, it is always desirable to have more than one possible path through the network for each pair of stations. This enhances the reliability of the network. Two different technologies are used in wide area switched networks: circuit switching and packet switching. These two technologies differ in the way the nodes switch information from one link to another on the way from source to destination. In the remainder of this chapter, we look at the details of both of these technologies.
Basic Operation
Circuit switching is still the dominant technology for voice communications today, although the volume of packet-based voice communication continues to grow. Communication via circuit switching implies that there is a dedicated communication
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
346
path between two stations. That path is a connected sequence of links between network nodes. On each physical link, a channel is dedicated to the connection. The most common example of circuit switching is the telephone network. Communication via circuit switching involves three phases, which can be explained with reference to Figure 12.1. 1. Circuit establishment. Before any signals can be transmitted, an end-to-end (station-to-station) circuit must be established. For example, station A sends a request to node 4 requesting a connection to station E. Typically, the link from A to 4 is a dedicated line, so that part of the connection already exists. Node 4 must find the next leg in a route leading to E. Based on routing information and measures of availability and perhaps cost, node 4 selects the link to node 5, allocates a free channel (using FDM or TDM) on that link and sends a message requesting connection to E. So far, a dedicated path has been established from A through 4 to 5. Because a number of stations may attach to 4, it must be able to establish internal paths from multiple stations to multiple nodes. How this is done is discussed later in this section. The remainder of the process proceeds similarly. Node 5 allocates a channel to node 6 and internally ties that channel to the channel from node 4. Node 6 completes the connection to E. In completing the connection, a test is made to determine if E is busy or is prepared to accept the connection. 2. Data transfer. Data can now be transmitted from A through the network to E. The transmission may be analog voice, digitized voice, or binary data, depending on the nature of the network.As the carriers evolve to fully integrated digital networks, the use of digital (binary) transmission for both voice and data is becoming the dominant method. The path is as follows: A-4 link, internal switching through 4, 4-5 channel, internal switching through 5, 5-6 channel, internal switching through 6, 6-E link. Generally, the connection is full duplex, and signals may be transmitted in both directions simultaneously. 3. Circuit disconnect. After some period of data transfer, the connection is terminated, usually by the action of one of the two stations. Signals must be propagated to nodes 4, 5, and 6 to deallocate the dedicated resources. Note that the connection path is established before data transmission begins. Thus, channel capacity must be reserved between each pair of nodes in the path and each node must have available internal switching capacity to handle the requested connection. The switches must have the intelligence to make these allocations and to devise a route through the network. Circuit switching can be rather inefficient. Channel capacity is dedicated for the duration of a connection, even if no data are being transferred. For a voice connection, utilization may be rather high, but it still does not approach 100%. For a client/server connection, the capacity may be idle during most of the time of the connection. In terms of performance, there is a delay prior to signal transfer for call establishment. However, once the circuit is established, the network is effectively transparent to the users. Information is transmitted at a fixed data rate with no delay other than the propagation delay through the transmission links. The delay at each node is negligible.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
12.2 / CIRCUIT-SWITCHING NETWORKS Table 12.1 Applications of Circuit Switching and Packet Switching Circuit Switching
Public Telephone Network Provide interconnection for two-way voice exchange between attached telephones. Calls can be placed between any two subscribers on a national and international basis. This type of network handles an increasing volume of data traffic. Private Branch Exchange Provide a telephone and data exchange capability within a single building or cluster of buildings. Calls can be placed between any two subscribers within the local site; interconnection is also provided to public or private wide area circuit-switched networks. Private Wide Area Network Provide interconnection among a number of sites. Generally used to interconnect PBXs that are part of the same organization. Data Switch Provide for the interconnection of terminals and computers within a local site.
347
Packet Switching
Public Data Network (PDN)/Value-Added Network (VAN) Provide a wide area data communications facility for computers and terminals. The network is a shared resource, owned by a provider who sells the capacity to others. Thus, it functions as a utility service for a number of subscriber communities. Private Packet-Switching Network Provide a shared resource for one organizations computers and terminals. A private packet-switching network is justified if there are a substantial number of devices with a substantial amount of traffic in one organization.
Circuit switching was developed to handle voice traffic but is now also used for data traffic. Some of the key applications of circuit switching are summarized in Table 12.1. The best-known example of a circuit-switching network is the public telephone network (Figure 12.2). This is actually a collection of national networks interconnected to form the international service. Although originally designed and implemented to service analog telephone subscribers, it handles substantial data traffic via
Long-distance office Long-distance office
End office
End office
Subscriber loop
Connecting trunk
ISBN 0-558-69515-9
Intercity trunk
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
348
modem and is now primarily a digital network. Another well-known application of circuit switching is the private branch exchange (PBX), used to interconnect telephones within a building or office. Circuit switching is also used in private networks. Typically, such a network is set up by a corporation or other large organization to interconnect its various sites. Such a network usually consists of PBX systems at each site interconnected by dedicated, leased lines obtained from a carrier, such as AT&T. A public telecommunications network can be described using four generic architectural components: Subscribers: The devices that attach to the network. It is still the case that most subscriber devices to public telecommunications networks are telephones, but the percentage of data traffic increases year by year. Subscriber line: The link between the subscriber and the network, also referred to as the subscriber loop or local loop. Almost all local loop connections use twisted-pair wire. The length of a local loop is typically in a range from a few kilometers to a few tens of kilometers. Exchanges: The switching centers in the network. A switching center that directly supports subscribers is known as an end office. Typically, an end office will support many thousands of subscribers in a localized area. There are over 19,000 end offices in the United States, so it is clearly impractical for each end office to have a direct link to each of the other end offices; this would require on the order of 2 108 links. Rather, intermediate switching nodes are used. Trunks: The branches between exchanges. Trunks carry multiple voicefrequency circuits using either FDM or synchronous TDM. These are also referred to as carrier systems. Subscribers connect directly to an end office, which switches traffic between subscribers and between a subscriber and other exchanges. The other exchanges are responsible for routing and switching traffic between end offices. This distinction is shown in Figure 12.3. To connect two subscribers attached to the same end office, a
a b End office
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
349
circuit is set up between them in the same fashion as described before. If two subscribers connect to different end offices, a circuit between them consists of a chain of circuits through one or more intermediate offices. In the figure, a connection is established between lines a and b by simply setting up the connection through the end office. The connection between c and d is more complex. In cs end office, a connection is established between line c and one channel on a TDM trunk to the intermediate switch. In the intermediate switch, that channel is connected to a channel on a TDM trunk to ds end office. In that end office, the channel is connected to line d. Circuit-switching technology has been driven by its use to carry voice traffic. One of the key requirements for voice traffic is that there must be virtually no transmission delay and certainly no variation in delay. A constant signal transmission rate must be maintained, because transmission and reception occur at the same signal rate. These requirements are necessary to allow normal human conversation. Further, the quality of the received signal must be sufficiently high to provide, at a minimum, intelligibility. Circuit switching achieved its widespread, dominant position because it is well suited to the analog transmission of voice signals. In todays digital world, its inefficiencies are more apparent. However, despite the inefficiency, circuit switching is and will remain an attractive choice for both local area and wide area networking. One of its key strengths is that it is transparent. Once a circuit is established, it appears like a direct connection to the two attached stations; no special networking logic is needed at the station.
Control Signaling
Control signals are the means by which the network is managed and by which calls are established, maintained, and terminated. Both call management and overall network management require that information be exchanged between subscriber and switch, among switches, and between switch and network management center. For a large public telecommunications network, a relatively complex control signaling scheme is required. SIGNALING FUNCTIONS Control signals affect many aspects of network behavior, including both network services visible to the subscriber and internal mechanisms. As networks become more complex, the number of functions performed by control signaling necessarily grows. The following functions are among the most important: 1. Audible communication with the subscriber, including dial tone, ringing tone, busy signal, and so on. 2. Transmission of the number dialed to switching offices that will attempt to complete a connection. 3. Transmission of information between switches indicating that a call cannot be completed. 4. Transmission of information between switches indicating that a call has ended and that the path can be disconnected. 5. A signal to make a telephone ring.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
350
6. Transmission of information used for billing purposes. 7. Transmission of information giving the status of equipment or trunks in the network. This information may be used for routing and maintenance purposes. 8. Transmission of information used in diagnosing and isolating system failures. 9. Control of special equipment such as satellite channel equipment. As an example of the use of control signaling, consider a typical telephone connection sequence from one line to another in the same central office: 1. Prior to the call, both telephones are not in use (on-hook). The call begins when one subscriber lifts the receiver (off-hook); this action is automatically signaled to the end office switch. 2. The switch responds with an audible dial tone, signaling the subscriber that a number may be dialed. 3. The caller dials a number, which is communicated as a called address to the switch. 4. If the called subscriber is not busy, the switch alerts that subscriber to an incoming call by sending a ringing signal, which causes the telephone to ring. 5. Feedback is provided to the calling subscriber by the switch: a. If the called subscriber is not busy, the switch returns an audible ringing tone to the caller while the ringing signal is being sent to the called subscriber. b. If the called subscriber is busy, the switch sends an audible busy signal to the caller. c. If the call cannot be completed through the switch, the switch sends an audible reorder message to the caller. 6. The called party accepts the call by lifting the receiver (off-hook), which is automatically signaled to the switch. 7. The switch terminates the ringing signal and the audible ringing tone, and establishes a connection between the two subscribers. 8. The connection is released when either subscriber hangs up. When the called subscriber is attached to a different switch than the calling subscriber, the following switch-to-switch trunk signaling functions are required: 1. The originating switch seizes an idle interswitch trunk and sends an off-hook indication on the trunk so that the address may be communicated. 2. The terminating switch sends an off-hook followed by an on-hook signal, known as a wink. This indicates a register-ready status. 3. The originating switch sends the address digits to the terminating switch. This example illustrates some of the functions performed using control signals. Signaling can also be classified functionally as supervisory, address, call information, and network management. The term supervisory is generally used to refer to control functions that have a binary character (true/false; on/off), such as request for service, answer, alerting, and return to idle. They deal with the availability of the called subscriber and of the
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
351
needed network resources. Supervisory control signals are used to determine if a needed resource is available and, if so, to seize it. They are also used to communicate the status of requested resources. Address signals identify a subscriber. Initially, an address signal is generated by a calling subscriber when dialing a telephone number. The resulting address may be propagated through the network to support the routing function and to locate and ring the called subscribers phone. The term call information refers to those signals that provide information to the subscriber about the status of a call. This is in contrast to internal control signals between switches used in call establishment and termination. Such internal signals are analog or digital electrical messages. In contrast, call information signals are audible tones that can be heard by the caller or an operator with the proper phone set. Supervisory, address, and call information control signals are directly involved in the establishment and termination of a call. Network management signals are used for the maintenance, troubleshooting, and overall operation of the network. Such signals may be in the form of messages, such as a list of preplanned routes being sent to a station to update its routing tables. These signals cover a broad scope, and it is this category that will expand most with the increasing complexity of switched networks. LOCATION OF SIGNALING Control signaling needs to be considered in two contexts: signaling between a subscriber and the network, and signaling within the network. Typically, signaling operates differently within these two contexts. Signaling between a telephone or other subscriber device and the switching office to which it attaches is, to a large extent, determined by the characteristics of the subscriber device and the needs of the human user. Signals within the network are entirely computer-to-computer. Internal signaling is concerned not only with the management of subscriber calls but also with the management of the network itself. Thus, for internal signaling, a more complex repertoire of commands, responses, and set of parameters is needed. Because two different signaling techniques are used, the local switching office to which the subscriber is attached must provide a mapping between the relatively less complex signaling technique used by the subscriber and the more complex technique used within the network. For intranetwork signaling, Signaling System Number 7 (SS7) is used on most digital networks. COMMON CHANNEL SIGNALING Traditional control signaling in circuit-switching networks has been on a per-trunk or inchannel basis. With inchannel signaling, the same channel is used to carry control signals as is used to carry the call to which the control signals relate. Such signaling begins at the originating subscriber and follows the same path as the call itself. This has the merit that no additional transmission facilities are needed for signaling; the facilities for voice transmission are shared with control signaling. As public telecommunications networks become more complex and provide a richer set of services, the drawbacks of inchannel signaling become more apparent. The information transfer rate is quite limited with inchannel signaling because the same capacity is shared with the information being transmitted. With such limits, it is difficult to accommodate, in a timely fashion, any but the simplest form of control messages. To take advantage of the potential services and to cope with the increasing
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
352
complexity of evolving network technology, a richer and more powerful control signal repertoire is needed. A second drawback of inchannel signaling is the amount of delay from the time a subscriber enters an address (dials a number) and the connection is established. The requirement to reduce this delay is becoming more important as the network is used in new ways. For example, computer-controlled calls, such as with transaction processing, use relatively short messages; therefore, the call setup time represents an appreciable part of the total transaction time. Both of these problems can be addressed with common channel signaling, in which control signals are carried over paths completely independent of the voice channels. One independent control signal path can carry the signals for a number of subscriber channels and hence is a common control channel for these subscriber channels. Internal to the network, common channel signals are transmitted on paths that are logically distinct from those that carry the subscriber information. In some cases, these may be physically distinct transmission facilities; in other cases, separate logical channels on shared trunks are used. The common channel can be configured with the bandwidth required to carry control signals for a rich variety of functions. Thus, both the signaling protocol and the network architecture to support that protocol are more complex than inchannel signaling. However, the continuing drop in computer hardware costs makes common channel signaling increasingly attractive. The control signals are messages that are passed between switches and between a switch and the network management center. Thus, the control signaling portion of the network is in effect a distributed computer network carrying short messages. With inchannel signaling, control signals from one switch are originated by a control processor and switched onto the outgoing channel. On the receiving end, the control signals must be switched from the voice channel into the control processor. With common channel signaling, the control signals are transferred directly from one control processor to another, without being tied to a voice signal. This is a simpler procedure and one that is less susceptible to accidental or intentional interference between subscriber and control signals. This is one of the main motivations for common channel signaling. Another key motivation for common channel signaling is that call setup time is reduced. Consider the sequence of events for call setup with inchannel signaling when more than one switch is involved. A control signal will be sent from one switch to the next in the intended path. At each switch, the control signal cannot be transferred through the switch to the next leg of the route until the associated circuit is established through that switch. With common channel signaling, forwarding of control information can overlap the circuit-setup process. Common channel techniques can also be used external to the network, at the interface between the subscriber and the network.This is the case with ISDN (Integrated Digital Services Network) and many other digital networks. For external signaling, a logically distinct channel on the subscriber-network link is devoted to control signaling, used for setting up and tearing down connections on other logical channels on that link. Thus, a multiplexed link is controlled by a single channel over that link.
ISBN 0-558-69515-9
Softswitch Architecture
The latest trend in the development of circuit-switching technology is generally referred to as the softswitch. In essence, a softswitch is a general-purpose computer
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
353
running specialized software that turns it into a smart phone switch. Softswitches cost significantly less than traditional circuit switches and can provide more functionality. In particular, in addition to handling the traditional circuit-switching functions, a softswitch can convert a stream of digitized voice bits into packets. This opens up a number of options for transmission, including the increasingly popular voice over IP (Internet Protocol) approach (VoIP). In any telephone network switch, the most complex element is the software that controls call processing. This software performs call routing and implements call-processing logic for hundreds of custom calling features. Typically, this software runs on a proprietary processor that is integrated with the physical circuit-switching hardware. A more flexible approach is to physically separate the call processing function from the hardware switching function. In softswitch terminology, the physical switching function is performed by a media gateway (MG) and the call processing logic resides is a media gateway controller (MGC). Often, these are combined in to a single gateway module. Figure 12.4, based on [COFF04], contrasts the architecture of a traditional PBX circuit switch with the softswitch architecture. The traditional digital PBX can
Digital endpoint
Analog endpoint
Gateway
Enterprise IP network
IP endpoint Gateway
IP endpoint
PSTN
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
354
accommodate both analog and digital endpoints. The most common endpoints are telephones; other endpoints are fax machines, modems, PDAs, and telephony applications running on laptop computers. The other typical components of a digital PBX include the following: Control processor: To run the software that operates the system features. Modules: House interface cards that provide endpoint interfaces to the switch. In the case of analog endpoints, the module interface converts between analog and digital. Inter-module switching: Allows the interconnection of ports in different modules, using circuit switching. One module provides an interface to the public switched telephone network (PSTN). Figure 12.4b illustrates, in general terms, the softswitch PBX architecture. The control processor is often an off-the-shelf server that runs communications application software on a standard operating system. The system can accommodate traditional analog and digital telephones as well as IP phones.
Basic Operation
The long-haul circuit-switching telecommunications network was originally designed to handle voice traffic, and the majority of traffic on these networks continues to be voice. A key characteristic of circuit-switching networks is that resources within the network are dedicated to particular calls. For voice connections, the resulting circuit will enjoy a high percentage of utilization because, most of the time, one party or the other is talking. However, as the circuit-switching network began to be used increasingly for data connections, two shortcomings became apparent: In a typical user/host data connection (e.g., personal computer user logged on to a database server), much of the time the line is idle. Thus, with data connections, a circuit-switching approach is inefficient. In a circuit-switching network, the connection provides for transmission at a constant data rate. Thus, each of the two devices that are connected must transmit and receive at the same data rate as the other. This limits the utility of the network in interconnecting a variety of host computers and workstations.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
355
Figure 12.5
To understand how packet switching addresses these problems, let us briefly summarize packet-switching operation. Data are transmitted in short packets. A typical upper bound on packet length is approximately 1500 octets (bytes). If a source has a longer message to send, the message is broken up into a series of packets (Figure 12.5). Each packet contains a portion (or all for a short message) of the users data plus some control information. The control information, at a minimum, includes the information that the network requires to be able to route the packet through the network and deliver it to the intended destination. At each node en route, the packet is received, stored briefly, and passed on to the next node. Figure 12.6 illustrates the basic operation. A transmitting computer or other device sends a message as a sequence of packets (a). Each packet includes control information indicating the destination station (computer, terminal, etc.). The packets are initially sent to the node to which the sending station attaches. As each packet arrives at this node, it stores the packet briefly, determines the next leg of the route, and queues the packet to go out on that link. When the link is available, each packet is transmitted to the next node (b). All of the packets eventually work their way through the network and are delivered to the intended destination. The packet-switching approach has a number of advantages over circuit switching: Line efficiency is greater, because a single node-to-node link can be dynamically shared by many packets over time. The packets are queued up and transmitted as rapidly as possible over the link. By contrast, with circuit switching, time on a node-to-node link is preallocated using synchronous time division multiplexing. Much of the time, such a link may be idle because a portion of its time is dedicated to a connection that is idle. A packet-switching network can carry out data-rate conversion. Two stations of different data rates can exchange packets, because each connects to its node at its proper data rate.
ISBN 0-558-69515-9
When traffic becomes heavy on a circuit-switching network, some calls are blocked; that is, the network refuses to accept additional connection requests until the load on the network decreases. On a packet-switching network, packets are still accepted, but delivery delay increases.
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
356
(a)
3
2
1
(b) 3
2
1
(c)
3
(d)
3
2
(e)
357
Priorities can be used. If a node has a number of packets queued for transmission, it can transmit the higher-priority packets first. These packets will therefore experience less delay than lower-priority packets. Packet switching also has disadvantages relative to circuit switching: When a packet passes through a packet-switching node, it incurs a delay not experienced in circuit switching. At a minimum, it incurs a transmission delay equal to the length of the packet in bits divided by the incoming channel rate in bits per second; this is the time it takes to absorb the packet into an internal buffer. In addition, there may be a variable delay due to processing and queuing in the node. Because the packets between a given source and destination may vary in length, may take different routes, and may be subject to varying delay in the switches they encounter, the overall packet delay can vary substantially. This phenomenon, called jitter, may not be desirable for some applications (for example, in real-time applications including telephone voice and real-time video). To route packets through the network, overhead information including the address of the destination and often sequencing information must be added to each packet, which reduces the communication capacity available for carrying user data. This is not needed in circuit switching once the circuit is set up. More processing is involved in the transfer of information using packet switching than in circuit switching at each node. In the case of circuit switching, there is virtually no processing at each switch once the circuit is set up.
Switching Technique
A station has a message to send through a packet-switching network that is of greater length than the maximum packet size. It therefore breaks the message into packets and sends these packets, one at a time, to the network. A question arises as to how the network will handle this stream of packets as it attempts to route them through the network and deliver them to the intended destination. Two approaches are used in contemporary networks: datagram and virtual circuit. In the datagram approach, each packet is treated independently, with no reference to packets that have gone before. This approach is illustrated in Figure 12.6. Each node chooses the next node on a packets path, taking into account information received from neighboring nodes on traffic, line failures, and so on. So the packets, each with the same destination address, do not all follow the same route, and they may arrive out of sequence at the exit point. In this example, the exit node restores the packets to their original order before delivering them to the destination. In some datagram networks, it is up to the destination rather than the exit node to do the reordering. Also, it is possible for a packet to be damaged in the network. For example, if a packet-switching node crashes momentarily, all of its queued packets may be lost. Again, it is up to either the exit node or the destination to detect the loss of a packet and decide how to recover it. In this technique, each packet, treated independently, is referred to as a datagram.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
358
In the virtual circuit approach, a preplanned route is established before any packets are sent. Once the route is established, all the packets between a pair of communicating parties follow this same route through the network. This is illustrated in Figure 12.7. Because the route is fixed for the duration of the logical
(a)
3
(b)
3
2
(c)
(d)
2
1
ISBN 0-558-69515-9
(e)
359
connection, it is somewhat similar to a circuit in a circuit-switching network and is referred to as a virtual circuit. Each packet now contains a virtual circuit identifier as well as data. Each node on the preestablished route knows where to direct such packets; no routing decisions are required. At any time, each station can have more than one virtual circuit to any other station and can have virtual circuits to more than one station. So the main characteristic of the virtual-circuit technique is that a route between stations is set up prior to data transfer. Note that this does not mean that this is a dedicated path, as in circuit switching. A packet is still buffered at each node and queued for output over a line. The difference from the datagram approach is that, with virtual circuits, the node need not make a routing decision for each packet. It is made only once for all packets using that virtual circuit. If two stations wish to exchange data over an extended period of time, there are certain advantages to virtual circuits. First, the network may provide services related to the virtual circuit, including sequencing and error control. Sequencing refers to the fact that, because all packets follow the same route, they arrive in the original order. Error control is a service that assures not only that packets arrive in proper sequence but also that all packets arrive correctly. For example, if a packet in a sequence from node 4 to node 6 fails to arrive at node 6, or arrives with an error, node 6 can request a retransmission of that packet from node 4.Another advantage is that packets should transit the network more rapidly with a virtual circuit; it is not necessary to make a routing decision for each packet at each node. One advantage of the datagram approach is that the call setup phase is avoided. Thus, if a station wishes to send only one or a few packets, datagram delivery will be quicker. Another advantage of the datagram service is that, because it is more primitive, it is more flexible. For example, if congestion develops in one part of the network, incoming datagrams can be routed away from the congestion. With the use of virtual circuits, packets follow a predefined route, and thus it is more difficult for the network to adapt to congestion. A third advantage is that datagram delivery is inherently more reliable. With the use of virtual circuits, if a node fails, all virtual circuits that pass through that node are lost. With datagram delivery, if a node fails, subsequent packets may find an alternate route that bypasses that node.
ISBN 0-558-69515-9
360
public network owned or controlled by the government and referred to as a public data network (PDN). The other packet-switching alternative is a network dedicated to the needs of a single organization. The organization may own the packet-switching nodes or lease an entire dedicated packet-switching network from a network provider. In either case, the links between nodes are again leased telecommunications lines. Thus, a business is faced with an array of choices for meeting wide area networking needs. These choices include a number of high-speed options, such as frame relay and ATM. In this section, we explore the various traditional WAN options, to get some feel for the types of tradeoffs involved. The issues are revisited in Chapter 13. Before beginning our evaluation of these alternatives, it is useful to consider the overview of circuit switching and packet switching provided in Table 12.2. While both circuit switching and packet switching can be used for data transmission, each has its particular strengths and weaknesses for a given application.
Table 12.2 Relative Merits of Circuit Switching and Packet Switching of Data Circuit Switching
Advantages Compatible with voice. Economies of scale can be realized by using the same network for voice and data. Commonality of calling procedures for voice and data. No special user training or communication protocols are needed to handle data traffic. Predictable, constant rate for data traffic. Disadvantages Subject to blocking. This makes it difficult to size the network properly. The problem is less severe with the use of dynamic nonhierarchical routing techniques. Requires subscriber compatibility. The devices at each end of a circuit must be compatible in terms of protocol and data rate, since the circuit is a transparent connection. Large processing and signal burden. For transactiontype applications, data calls are of short duration and need to be set up rapidly. This proportionally increases the overhead burden on the network. Packet Switching Advantages Provides speed conversion. Two attached devices with different data rates may exchange data; the network buffers the data and delivers them at the appropriate data rate. Appears nonblocking. As the network load increases, the delay increases, but new exchanges are usually permitted. Efficient utilization. Switches and trunks are used on demand rather than dedicating capacity to a particular call. Logical multiplexing. A host system can have simultaneous conversations with a number of terminals over a single line. Disadvantages Complex routing and control. To achieve efficiency and resilience, a packet-switched network must employ a complex set of routing and control algorithms. Delay. Delay is a function of load. It can be long and it is variable.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
361
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
362
quantified and analyzed. Then we consider some other issues that are also important in selecting a network. COST/PERFORMANCE CONSIDERATIONS Data communications traffic can be roughly classified into two categories: stream and bursty. Stream traffic is characterized by lengthy and fairly continuous transmission. Examples are file transfer, telemetry, other sorts of batch data processing applications, and digitized voice communication. Bursty traffic is characterized by short, sporadic transmissions. Interactive client/server traffic, such as transaction processing, data entry, and time sharing, fits this description. Facsimile transmission is also bursty. The public circuit-switching network approach makes use of dial-up lines. The cost is based on data rate, connection time, and distance. As we have said, this is quite inefficient for bursty traffic. However, for occasional stream-oriented requirements, this may be the most appropriate choice. For example, a corporation may have distributed offices. At the close of the day, each office transfers a file to headquarters summarizing the activities for that day. A dial-up line used for the single transfer from each office appears to be the most cost-effective solution. When there is a high volume of stream traffic among a few sites, the most economical solution is to obtain dedicated circuits among sites. These circuits, also known as leased lines or semipermanent circuits, may be leased from a telecommunications provider, such as a telephone company, or from a satellite provider. The dedicated circuit carries a constant fixed cost based on data rate and, in some cases, distance. If the traffic volume is high enough, then the utilization will be high enough to make this approach the most attractive. On the other hand, if the traffic is primarily bursty, then packet switching has the advantage. Furthermore, packet switching permits terminals and computer ports of various data rates to be interconnected. If the traffic is primarily bursty but is of relatively modest volume for an organization, a public packet-switching network provides the best solution. In this case, the network provides a packet transmission service to a variety of subscribers, each of which has moderate traffic requirements. If there is a number of different subscribers, the total traffic should be great enough to result in high utilization. Hence, the public network is cost effective from the providers point of view. The subscriber gets the advantages of packet switching without the fixed cost of implementing and maintaining the network. The cost to the subscriber is based on both connection time and traffic volume but not distance. If the volume of an organizations bursty traffic is high and is concentrated among a small number of sites, a private packet-switching network is the best solution. With a lot of bursty traffic among sites, the private packet-switching network provides much better utilization and hence lower cost than using circuit switching or simple dedicated lines. The cost of a private network (other than the initial fixed cost of the packet switching nodes and the dedicated lines) is based solely on distance. Thus, it combines the efficiencies of public packet switching with the time and volume independence of dedicated circuits.
ISBN 0-558-69515-9
OTHER CONSIDERATIONS In addition to the issues of cost and performance, the choice of network should also take into account control, reliability, and security. An organization large enough to need a wide area data network will come to rely heavily on that network. Accordingly, it is vital that management be able to
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
363
ISBN 0-558-69515-9
maintain proper control of the network to provide an efficient and effective service to users. We will explore this topic at some length in Chapter 19. For our purposes here, we can say that three aspects of control are significant in comparing various network approaches: strategic control, growth control, and day-to-day operation of the network. Strategic control involves the process of designing and implementing the network to meet the organizations unique requirements. With public packet switching, the subscriber has virtually no strategic control over service levels, reliability, or maintenance. The network is intended as a public utility to serve the average customer. With either dedicated lines or a private packet-switching network, the user organization can decide on the capacity and level of redundancy that it is willing to pay for. Growth control allows users to plan for network expansion and modifications arising as their needs change. A private packet-switching network provides the most flexibility in accommodating needs for growth. Additional packet switching nodes, more trunks, and higher-capacity trunks can be added as needed. These raise the overall capacity and reliability of the network. Although the user has control over the number and capacity of lines in a dedicated-line design, there is less flexibility for incrementally expanding the network. Again, with a public packet-switching network, the user has no control over growth. The users needs are satisfied only if they happen to be within the capabilities of the public network. With respect to day-to-day operation, the user is concerned with accommodating peaks of traffic and with quickly diagnosing and repairing faults. Packet-switching networks can be designed with effective centralized network control that allows the network to be adjusted to changing conditions. Of course, in the case of the public network, the user is dependent on the network provider. As in any public utility, such as a transportation system, there tend to be rush hours in public networks when service levels decline. Day-today control is more difficult to automate in the case of dedicated lines; available tools are comparatively few and crude because we are not dealing with a unified network. The inherent reliability of a packet-switching network is higher than that of a collection of dedicated lines. The network consists of a set of shared facilities and is equipped with centralized, automated network control facilities. Faults can be easily located and isolated and the traffic shifted to the healthy part of the network. A public network may be able to afford a greater investment in redundancy and control tools, because the cost is spread over many users. Further, the user is relieved of the burden of developing the expertise required to keep a large data communications network operational. Finally, data security is vital to most corporations. We explore this topic in detail in Chapter 18. For purposes of the present discussion, we can say that use of a private network or dedicated lines will clearly afford greater security than a public packet-switching network. Public networks can use various access control mechanisms to limit the ways in which users can obtain data across the network. Those same control mechanisms are useful in private networks, because an organization may wish to segregate various communities of users. Table 12.3 summarizes the difference among the various communications approaches.
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
364
Public Packet
Service limited to that which suits average customer. Provided by service supplier to satisfy average requirements. Transparent and automatic recovery from failure. Public users, network access control.
Private Packet
Network design, service, and maintenance can be given priority and controlled by user. Integrated into all equipment; centralized fault isolation and detection. Transparent and automatic recovery from failure. Private users only, network access control.
Reliability
Security
APPLICATION NOTE Switching Discussions about switching can be confusing because there are so many protocols, different possible layers of networking models, and different types of switches. For many organizations, the type of switching used to send data from the local site to external destinations can be a complete mystery due to the complexity of wide area networks and a reduced level of local control. Once the data leave the home network, there may be little that a local network administrator can do to affect its travel. Usually the influence of the local network staff is limited to the customer premises equipment and the type of connection going offsite. To make things more difficult, next generation networks will make use of multilayer switching techniques such as layer 3 switching (layer 2 routing), optical switching, and application layer switching. In the next couple of paragraphs we will try to provide some guidance into the switching terms that a typical network administrator is likely to run into and some of the terms used to describe external connectivity. Almost all local area networks run the Internet Protocol (IP) over some form of Ethernet. Ethernet nodes are usually connected to each other via a layer 2 switch that examines layer 2 addresses in the frame prior to forwarding. The traffic encapsulated within the Ethernet frame is the IP-based data. The IP packet header includes all the information necessary for getting the packet from source to destination. This means that we are using a datagram approach. While upper-layer protocols like the Transmission Control Protocol (TCP) can control the flow of data to a certain extent, they do not change the type of switching/routing used. If we include the idea that any routers involved are processing the IP packets flowing between networks, we could classify this type of transmission as a packet-switching network with a datagram approach. Alternately, we might say that we used Ethernet switching and IP-based routers (packet switches) to move the traffic along. Both packet switching and its counterpart, circuit switching, are described in this chapter.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
365
When traffic must travel offsite, it will be transferred to the network of the Internet service provider (ISP) for processing. Essentially, this is the beginning of the Internet. The Internet is actually a huge collection of networks. Web sites or Web servers are also attached to these networks. The ISP networks can vary quite a bit in terms of protocols used, speeds available, and the type of switching when compared to the local area networks of their customers. One consistent item is that all networks attached to the Internet transmit and receive IP packets. As a packet travels from source to destination, it will likely cross several different network types before arriving. Upon entering the ISP network, routing decisions must be made. If the network utilizes a datagram approach, no further action is taken as the IP packets contain all of the necessary information and no circuit is required. However, if the network utilizes virtual circuits for establishing a pathway from one end of the ISP network to the other, this circuit must be established before any data can be forwarded. Examples of protocols utilizing virtual circuits are frame relay and asynchronous transfer mode, (ATM). Note that Ethernet rarely survives past the customer connection to the Internet. Once the circuit has been established, the data are forwarded, with each network node making forwarding decisions based on the connection setup. Thus, a routing decision (typically layer 3) is made upon entrance to the network and then lower-layer switching decisions are made as the data cross the network. This virtual circuit is only valid to the border of the providers network. All packets heading for the same destination follow the same path. At the edge, another routing decision must be made and a hand-off completed to the following network. At this point, the process starts again for each network until the destination is reached. The primary reason we process traffic in this fashion is for an improvement in speed. The advantage is that we do not have to process layer 3 IP addresses for the packets. Switching data at layer 2 is almost always faster than routing data at layer 3, no matter what kind of network you are on. Since these virtual circuit connections have a setup and teardown procedure and the circuit is allocated to that connection, this type of forwarding is called circuit switching. In another example of circuit switching, a dial-up user initially connects to an ISP with a telephone call from a modem and the data are handled in the exact same fashion circuit switching. The only difference is that instead of voice, the data started out as digital from the computer. Once the circuit-switched telephone call to the ISP is made, data can be transferred. The packets all follow the same path to the ISP. Internally, the ISP will have a standard IP network running over Ethernet that simply forwards the data to the correct router output interface. This interface may subsequently be connected to another, larger ISP using T carriers, a frame relay or an ATM networkbut they all will carry IP packets as their payload. The packet passes through a router and is forwarded to the next network link. Note that at no time are the contents of the layer 3 IP datagrams manipulated. They are simply being carried over a different layer 2 network. The term switching has many meanings, but all of them usually refer to the process of forwarding traffic between locations. The type of external switching that an organization selects is a decision that is often dependent upon factors such as bandwidth requirements, cost, and availability. There are a large number of protocols that can be used for connecting to the outside world, but choosing the correct type requires a survey of available products and an understanding of local requirements.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
366
12.5 SUMMARY
The use of a direct point-to-point link for information communications is impractical for all but the most limited requirements. For cost-effective, practical information communications, some sort of communications network is needed. For communications outside the range of a single building or a cluster of buildings, a wide area network (WAN) is employed.Two basic technologies are employed: circuit switching and packet switching. Circuit switching is used in public telephone networks and is the basis for private networks built on leased lines and using on-site circuit switches. Circuit switching was developed to handle voice traffic but can also handle digital data, although this latter use is often inefficient. With circuit switching, a dedicated path is established between two stations for communication. Switching and transmission resources within the network are reserved for the exclusive use of the circuit for the duration of the connection. The connection is transparent: Once it is established, it appears to attached devices as if there were a direct connection. Packet switching is employed to provide an efficient means of using the shared facilities in a data communications network. With packet switching, a station transmits data in small blocks, called packets. Each packet contains some portion of the user data plus control information needed for proper functioning of the network. Public packet-switching networks are available, to be shared by a number of separate subscriber communities. The technology may also be employed to build a private packet-switching network. The choice between circuit and packet switching depends on a host of considerations, including cost, performance, reliability, and flexibility. Both technologies will continue to be important in wide area networking.
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
367
Review Questions
12.1 12.2 Why is it useful to have more than one possible path through a network for each pair of stations? Concerning a switched communications network, answer the following as either true or false. a. All switching nodes are connected to every other node. b. Links between switching nodes utilize some sort of multiplexing technique. c. Switching nodes provide connectivity for a single end station. What are the four generic architectural components of a public communications network? Define each term. Answer the following as either true or false regarding circuit switching. a. A complete connection from end to end must be completed before data transmission can occur. b. There are three basic stages; connection setup, data transfer, and connection termination. c. Circuit switching is very efficient. What is the principal application that has driven the design of circuit-switching networks? Distinguish between static and alternate routing in a circuit-switching network. What is the difference between inchannel and common channel signaling? The control signals used in the public switched telephone network are part of what architecture? Explain the difference between datagram and virtual circuit operation. What are some advantages of private networks?
12.3 12.4
ISBN 0-558-69515-9
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.
368
CHAPTER 12 / CIRCUIT SWITCHING AND PACKET SWITCHING 12.11 12.12 12.13 What are some of the limitations of using a circuit-switching network for data transmission? What is a value-added network (VAN)? Why is packet switching impractical for digital voice transmission?
Problems
12.1 12.2 How far away from your local switching center is your business or home? In the public switched telephone network, your call is set up and switched based on the numbers that you dial. These numbers actually provide different frequency sounds or tones to the switching center. What is this signaling called? Define the following parameters for a switching network: N number of hops between two given end systems L message length in bits B data rate, in bits per second (bps), on all links P fixed packet size, in bits H overhead (header) bits per packet S call setup time (circuit switching or virtual circuit) in seconds D propagation delay per hop in seconds a. For N 4, L 3200, B 9600, P 1024, H 16, S 0.2, D 0.001, compute the end-to-end delay for circuit switching, virtual circuit packet switching, and datagram packet switching. Assume that there are no acknowledgments. Ignore processing delay at the nodes. b. Derive general expressions for the three techniques of part (a), taken two at a time (three expressions in all), showing the conditions under which the delays are equal. Consider a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch. The average telephone is used to make four calls per 8-hour workday, with a mean call duration of six minutes. Ten percent of the calls are long distance. What is the maximum number of telephones an end office can support? Explain the flaw in the following reasoning: Packet switching requires control and address bits to be added to each packet. This introduces considerable overhead in packet switching. In circuit switching, a transparent circuit is established. No extra bits are needed. a. Therefore, there is no overhead in circuit switching. b. Because there is no overhead in circuit switching, line utilization must be more efficient than in packet switching. Assuming no malfunction in any of the stations or nodes of a network, is it possible for a packet to be delivered to the wrong destination? Consider a packet-switching network of N nodes, connected by the following topologies: a. Star: One central node with no attached station; all other nodes attach to the central node. b. Loop: Each node connects to two other nodes to form a closed loop. c. Fully connected: Each node is directly connected to all other nodes. For each case, give the average number of hops between stations.
ISBN 0-558-69515-9
12.3
12.4
12.5
12.6 12.7
Business Data Communications, Sixth Edition, by William Stallings. Published by Prentice Hall. Copyright 2009 by Pearson Education, Inc.