CS计算机代考程序代写 case study Excel algorithm DCF255

DCF255

DCF255
Lecture 7 | Switching and Routing

Agenda
Data Link Layer
Logical Link Layer
Media Access Layer
Switched Networks
Circuit and Packet Switching
Switch and Router Operation
Network Virtualization
MLPS Networks
VoIP Networks

May require more than one slide
2

Data Link Layer
2 Layers: MAC and LLC

3

Data Link Layer
The data is actually divided into two layers
Logical Link Layer
Media Access Layer
Logical Link Layer designed for older Ethernet 802.2 and is used by some LAN/WAN technologies. Not used by modern Ethernet 802.3
Media Access Layer is used by shared networks and is based on the CSMA/CD protocol

Data Link Layer
Logical Link Layer
Media Access Layer
The data link layer is not a single layer, but 2 layers: Logical Link Layer and the Media Access Layer  
 
 
The Logical Link Layer is only used by 802.2 Ethernet (old Ethernet) and will not be discussed. Modern Ethernet is defined by the IEEE 802.3 standard and does not use the Logical Link Layer. However, all types of Ethernet have one think in common- they all use the Media Access Layer to access the network. This layer uses a protocol called CSMA/CD to control how network PCs accee the communications channel.
4

Media Access Layer

The media access layer controls who can send on a shared medium based on protocol CSMA/CD

CSMA/CD
CS – each computer NIC listens to the noise level on the line, when the noise is low, it sends data
MA – nothing preventing 2 computers to send data at the same time, if they do, collision and data is lost
CD – each computer NIC listens to the noise level and if it detects a spike in noise, a collision has occurred. Both devices stop sending. Special packet sent to delete transmission
Each computer then waits a random amount of time and resends the data

How collision can be detected?
detecting voltage level on the line
detecting /energy power level
detecting simultaneous transmission & reception
CSMA/CD not used on switched Ethernet because each device has a dedicated path.

CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. To understand Ethernet, you must first understand CSMA/CD.
The term Carrier Sense means that Ethernet NICs listen to the network channel for noise level and only transmit when the noise level goes down, meaning that no other PCs are transmitting .
Multiple Access means that there is nothing to prevent two Ethernet devices from transmitting at the same time. In CSMA/CD when a device wants to transmit data it must first access the transmission channel and determine whether the channel is free. If the channel is not free (noise level is high) it waits and checks again after a brief amount of time. If the channel is free, the mode transmits data. Any PC can transmit its data. However, if two nodes transmit at the same time a collision will occur which will destroy the data.
This is where the third component Collision Detection comes in. If a collision occurs ( a spike in the noise level), both devices stop transmitting. The NIC cards of each device will send a special 32 bit sequence that indicates to the rest of the network, that its previous transmission was faulty and that those data frames are to be deleted. Each node then waits a random amount of time and, if the network channel is free, it automatically retransmits the data.
On a wired Ethernet switched network the media access layer is not used because each device has a dedicated channel to transmit. However, wireless Ethernet is a shared medium and the process outlined above is followed (actually,a wireless network use a protocol called CSMA/CA. It works like CSMA/CD, but has extra steps to avoid collisions).
On a heavily trafficked network segment, collisions are fairly common. The larger the segment the more collisions will occur. Collisions combined with broadcast traffic can eat up the bandwidth of the channel and network performance will suffer. Performance can be improved by dividing the “collision domain” into smaller segments using switches.

5

CSMA/CA

CSMA/CA uses three strategies: the interframe space (IFS), contention window, and acknowledgments
The station ready to transmit a frame, senses the medium by checking the energy level at the carrier frequency.
IFS-First, collisions are avoided by deferring transmission even if the channel is found idle. When an idle channel is found, the station does not send immediately. It waits for a period of time called the interframe space or IFS.

On a wired Ethernet switched network the media access layer is not used because each device has a dedicated channel to transmit. However, wireless Ethernet is a shared medium and the process CSMA/CD is used, but has extra steps to avoid collisions).
The algorithm of wireless CSMA/CD is above, notice that the wireless device is checking for collision after each bit is sent. If a collision is detected, the device stops transmitting, waits for the noise level to fall and retransmits the bit. The goal is to avoid a collision in wireless because the time to retransmit a frame, due to a collision, will adversely affect performance on a shared medium.

This is the CSMA protocol with collision avoidance.
• The station ready to transmit, senses the line by using one of the persistent strategies.
• As soon as it find the line to be idle, the station waits for an IFG (Interframe gap) amount of time.
• If then waits for some random time and sends the frame.
• After sending the frame, it sets a timer and waits for the acknowledgement from the receiver.
• If the acknowledgement is received before expiry of the timer, then the transmission is successful.
• But if the transmitting station does not receive the expected acknowledgement before the timer expiry then it increments the back off parameter, waits for the back off time and resenses the line.
Whenever the channel is found idle, the station does not transmit immediately. It waits for a period of time called interframe gap (IFS).
• When channel is sensed to be idle, it may be possible that same distant station may have already started transmitting and the signal of that distant station has not yet reached other stations.
• Therefore the purpose of IFG time is to allow this transmitted signal to reach other stations.
 
On a wired Ethernet switched network the media access layer is not used because each device has a
6

CSMA/CA
Contention window- is an amount of time divided into slots.
A station that is ready to send chooses a random number of slots as its wait time.
The number of slots in the window changes according to the binary exponential backoff strategy.
This means that it is set to one slot the first time and then doubles
Acknowledgment- With all these precautions:
there still may be a collision
Data may also be corrupted during the transmission.
The positive acknowledgment and the time-out timer can help guarantee that the receiver has received the frame.

This is the CSMA protocol with collision avoidance.
Algorithm:
• The station ready to transmit, senses the line by using one of the persistent strategies.
• As soon as it find the line to be idle, the station waits for an IFS (Interframe space) amount of time.
• It then waits for some random time (contention window slot time) and sends the frame.
• After sending the frame, it sets a timer and waits for the acknowledgement from the receiver.
• If the acknowledgement is received before expiry of the timer, then the transmission is successful.
• But if the transmitting station does not receive the expected acknowledgement before the timer expiry then it increments the back off parameter, waits for the back off time and resenses the line.
Whenever the channel is found idle, the station does not transmit immediately. It waits for a period of time called interframe space (IFS).
• When channel is sensed to be idle, it may be possible that same distant station may have already started transmitting and the signal of that distant station has not yet reached other stations.
• Therefore the purpose of IFS time is to allow this transmitted signal to reach other stations.
7

Switched Networks
Circuit Switched and Packet Switched

8

Switched Networks

Switching is a method to move any type of data through the network using as switch hardware.
The two fundamental techniques are:
Circuit Switching
Packet Switching
Datagram Switching
Virtual Circuits

A switched network consists of a series of interlinked nodes, called switches.
Switches are devices capable of creating temporary connections between two or more devices linked to it.
In a switched network, some of these nodes are connected to the end systems (computers or telephones, for example). Others are used only for routing

Broadly speaking there are 2 types of switching networks
Circuit Switched networks and
Packet Switched networks
9

Circuit Switching

Used by the PSTN when connecting land lines
Dedicated circuit ideal for voice, live audio and videoconferencing
Temporary or Permanent Circuit
Using circuit switching requires establishing a path, transmitting the data and disconnecting the circuit
Other examples of circuit switched networks are: ISDN (Integrated Services Digital Network) , X.21,  High-Speed Circuit-Switched Data (HSCSD) service in cellular systems such as GSM.
Two types of switches used by circuit switched networks are: crossbar switch and multistage switch and they operate at the physical layer

Circuit Switching too inefficient to send data

Public switching telephone network (PTN)

Circuit Switching is physical layer technique.
In circuit switching a connection is established between two network nodes before they begin transmitting data. Bandwidth is dedicated to this connection and remains available until the users terminate the communication. The Public Telephone Switched Network (PSTN) is a perfect example of a circuit switched network and for voice communication it is a good choice. For example, some network applications benefit from a “dedicated” path. Such as live audio or videoconferencing which can’t tolerate the time delay if the data packets had to take different paths.. Circuits can be permanent or temporary. Applications which use circuit switching may have to go through three phases: establish a circuit, transfer the data and disconnect the circuit. Another example of circuit switched networks is if you connect your home PC to an ISP’s access line using DSL, previously discussed. Other examples of circuit switched networks are: ISDN (Integrated Services Digital Network) , X.21,  High-Speed Circuit-Switched Data (HSCSD) service in cellular systems such as GSM. Two types of switches used by circuit switch networks: crossbar switch and multistage switch.

10

Packet Switching

Packet Switching most popular form of connection. Used on the Internet and Ethernet networks
Large messages fragmented into smaller messages each one individually addressed
On demand resource allocation. Faster with less congestion

Virtual Circuits (Datalink layer)
A combination of circuit switched and datagram switching
A temporary circuit created as in circuit switching and and like datagram switching, data are packetized and each packet carries address in the header but the address has local jurisdiction i.e.; the address of the next switch
All packets follow the same path to destination

Datagram switching (Network layer)
Each packet is treated independently of other
Packets may take different paths/routes to reach its destination
Packets may arrive out of order
There is no connection setup and tear down

Packet Switching
A dedicated circuit is good for voice communication it is not good for transmitting digital data. The dedicated circuit is too inefficient in bandwidth when a million bits can be sent in a fraction of a second. Therefore Packet Switching is the most popular form of connection for Ethernet and the Internet.

Two types of packet switched networks
Datagram switching
Datagram switching (Network layer)
In datagram switching each packet is treated independently to all other packets. Depending on the current network situation (congestion or unavailability of the next hop) packets may take different routes/paths to the destination. Datagram switching is a connectionless approach where no connection establishment or tear down take place.

For example, suppose you and 4 of your friends had a card with the number 1 to 5 on it. And you all decided to travel independently from Seneca@York to the CN tower. One person may take a bus to the tower, another may take the subway, another a taxi and one may decide to drive his/her own car. By each travelling his/her own path, no one path will be congested. But if a traffic jam occurs and the ones driving or taking a taxi are delayed, all will eventually reach the Tower.

The only problem is that some of your friends may arrive at the tower out of sequence (number 4 arrives before number 1), requiring the message to be reassembled in order.
This is how packet switched networking works. Large messages are fragmented into small individual messages. Because of the time, it takes to reassemble the packets into a message, packet switching requires speedy connections, if used for live audio or video transmission. The biggest advantage of packet switching is its efficient use of bandwidth by not holding a connection open until a message reaches its destination, Packet switching also enhances line efficiency as packets from multiple applications can be multiplexed over the carrier. The Internet uses packet switching; packet switching enables the user to differentiate data streams based on priorities. Packets are stored and forwarded based on their priority to provide quality of service.
2. Virtual Circuits
Virtual circuit is the combination of circuit switched and packet switched techniques where data is packetized and for sending it to the destination a temporary path known as virtual circuit is established. All the packets followed the same path to the destination during the session. The header of the packet contains the address of the next switch should be and the channel on which the packet is being carried, not end-to-end address like in datagram switching where the destination address is the IP address of the destination node. There are three phases of communication:
Three phases of communication:
Connection establishment
Data transfer
Connection tear down

11

Packet Switching

Two types of switching

Circuit Switching

Packet Switching

Frames are switched across single networks ——- Packets are routed across internets

Note:
The term “Packet-Switching” is a misnomer because on single network frames are switched and on internets packets are routed. Unfortunately, data communications do not have terminology police to ensure consistent use of terms. Thus, Packet-Switching is a generic term for fragmentation of large messages into smaller ones which are independently addressed and sent across a link. The term is correctly used when referring to how the Internet routes packets, the term is never used on single networks or internets.

We must try to be consistent – Frames are switched across single networks – Packets are routed across internets

12

Switch Operation
Across single switched network

13

Switch

A switch  is a networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
Switches forward frames based on MAC address.
The switches port copies the MAC address of the device attached to it

Much faster than routers and improve performance when collisions or broadcast traffic slow network down

Note: Circuit switching also uses switching hardware that use to connect users for voice communication (both analog and digital), and it is different from layer 2 and layer 3 switches used by packet switching networks.

Switching is a process to forward frames coming in one port and forwarded out the destination port which copies the MAC address of the device attached to it. Switching is used because it is much faster than routing. It is used to improve performance by minimizing broadcast and collision traffic which consume bandwidth.

Switches forward frames based on MAC address.

The switches port copies the MAC address of the device attached to it

Much faster than routers and improve performance when collisions or broadcast traffic slow network down

14

Switch Operation

Host A needs to send frame to Host B

2 different paths CDF or CEF

Switch uses its switching table

For Host B use send to Switch E

Switches only know their neighbour

Process repeated at each switch across each physical link.

The path across a single network is called a “Data-Link”

Suppose Host A wishes to send information to Host B. We can see there are 2 switched paths CDF and CEF. When the frame arrives at switch C, how does switch C know to send the information to switch E, instead of switch D? The answer is switch C has a switching table with two columns: one for the destination of the frame, and the other for the switch to use to reach the destination host

This switch-by-switch decision making continues across each physical link until the final switch forwards the frame to Host B. Switches only know their neighbor; they do not know the entire path. The path from Host A to CEF and final to Host B is called a data link. There is only 1 data link across a single network, regardless of the number of switches used.

When the Internet was being developed, ARPANET consisted of several switched networks with no communication between them. Bob Kahn and Vint Cerf devised a new device which they called a “gateway” which used a technology which linked single networks together. Today, we call this device a router ( the term gateway is still used as a point of access to a network)
Routing is built on top of switching as discussed last lecture

15

Router Operation
Across internets

16

Router Operation

A router is a more complex device than a switch and must determine the best path for a packet among many paths
Router is an internet layer device that connects multiple IP networks to exchange packets between them
Switches are organized in a hierarchical manner so there is only one path
Routers are organized in a “mesh” manner with many alternate paths
Router maintains routing table for finding the best path to the destination of incoming data packet

Unlike, switches which are organized in a hierarchical fashion and only have one path to the destination host, a router is organized in a mesh with multiple paths to the destination host. This is especially true for routers that border the Internet. The rows in the routing table are in the thousands with each row identifying a destination path. Thus, the router must make a forwarding decision as to the best route making routing much slower than switching. Routers have specific routing algorithms to help in the decision making,
17

Router Operation

How the router makes a the forwarding decision will depend on the routing protocol

Follow 3 steps:

AND IPv4 address with subnet mask to find the destination network

Compare destination network with each line in its routing table. Best match is longest match.

Multiple matching addresses metric used to choose best match,

Subnet mask divides the IP address into a network address and host address. One part identifies the host (computer), the other part identifies the network to which it belongs. 
Suppose an ip address of a computer is 205.16.37.39/28.
The network address is :
205 . 16 . 37 . 39
11001101 . 00010000 . 00100101 . 00100111
255 . 255 . 255 . 240
11111111 . 11111111 . 11111111 . 11110000

205 . 16 . 37 . 32

How the router finds the best path is based on the type of routing protocol. We will not be discussing routing protocols.
But regardless of the protocol all routers follow a 3 step process

. The router finds the destination IP address. IPv4 by ANDing the IP address with the network mask.
The router than compares the destination address with each line in its routing table. The router must run through all of the lines because as a “mesh” it will probably have multiple paths to the same destination network. All of the paths found, the router will use the “longest match” to find the best path.

For example, suppose a packet was destined to MySeneca on the Seneca College network, IPv4 142.204.250.120. The router would apply the mask of 255.255.0.0 which means that the address range is 16 bits. If we apply this mask to the network address, we get 142.204.0.0.

The router then compares the network address of 142.204 to every row in its routing table. Because routers are connected to meshes, the router can’t stop after the first match, but must process through all rows to find all matching paths. From the list of matches, the router must decide which route is the best-match. The rule the router follows is which route is the longest match. For example, if the routing table showed 2 routes to MySeneca, 142.204.0.0/16 and 142.204.0.0/24, and the packet was destined for network 142.204.250.120; the router would choose the destination row with the 24 bit host. Why? The router’s job is to get the packet as close to the destination as possible, and the longest match rule ensures the packet will get to the Seneca subnet of 250.

Sometimes, however, you will not only have multiple matches, but some rows may have the same longest match. In this case the router uses some metric to break the tie. The metric will depend on the routing protocol used. Usually, the tie breaker will be the shortest distance. For example, suppose two rows had identical matches, but one row had a metric of 2 and the other of 6. The router would choose the metric of 2, or the shortest distance to the destination. Two hops is shorter than 6 hops. The metric could also be cost, which is preset by the administrator for each route and the route in this case would choose the route with the lowest cost.

18

Switch and Router Operation
A Case Study

19

Switch\Router Operation; Case Study

Routers connect different signal networks together. Single networks have no idea what a router is, they only know how to deliver frames to their neighbour. They do not open the packet and look inside to see the message in the frame. Routers work by acting as hosts on the network. Like a PC, a router has a NIC and a unique IP address. Unlike switches, routers and PCs have software that can open the frame to see the packet and view the source and destination IP addresses. Kahn and Cerf solved the problem of connecting single networks by creating a new type of message, an IP packet. Unlike frames, IP packets travel across all networks from source to destination.
Host A on Network Y, wants to send an application message to Host B on Network Z. On Network Y, the router acts as a destination host, accepting the frame across Network Y data link. Router O creates a new frame acceptable to Network Z. Looking at its routing table, Router O, knows that to reach Network Z, it needs to send the frame to interface 4.5.6.7. Router P acts like a host accepting the frame from Router O and forwards the frame to switch J. Switch J uses its switching table to forward the frame to switch H which in turn forwards it to switch G and finally to Host B.

20

Switch\Router Operation; Case Study

Type Number Description
Physical Links 9 AC,CE,EF,FO,OP,PJ,JH,HG,GB
Data Links 3 AO,OP,PB
Frames 3 AO,OP,PB
Packet 1 AB
Route 1 AB

We can see forwarding frames is done link by link. From the table below we can see that there are 9 physical links. Each single network has a single data link across it, so there are 3 data links, indicated in red in the diagram. For each data link, a frame must be created which is compatible with the next network. This is the job of the Router O. It removes the Network Y frame header, and recreates a WAN header compatible with the data link to Router P. Then it recalculates the LAN trailer and forwards the IP packet based on the destination IP address. Router P receives the packet, rips off the WAN header and recreates a LAN header compatible with Network Z. Router P also recalculates the LAN trailer and forwards the frame across the data link of Network Z to Host B. A route is a path taken by a packet from the source to the destination host across and internet. There is always only one packet created by Host A and one route from Host A to Host B as indicated by the dashed red line.

21

Network Virtualization
What is it and the benefits

22

What is a Network Virtualization (NV)?
Traditional Network devices:
Control Plane and Data Plane are in same hardware
All the network devices were controlled separately
Network Virtualization:
Control Plane and Data Plane are separated
All Control Planes are centralized virtually on a server under software development network (SDN)
The network administrator can manage, add, modify the networking activities very fast
Improved cloud networking and security.

Traditional Network vs Network Virtualization

NV Control Plane and Data Plane

Example of Network Virtualization

Traditional Network
Network Virtualization

Network Virtualization (NV) Benefites
Increase the time of network supplying from weeks to minutes
By using automation in NV instead of manual processing, it achieves greater efficiency in network operation.
Network workloads can be placed and moved separately of the physical topology
As security in the data center or cloud networking, NV improved networking security.

MPLS
Data Networks

28

MPLS

MPLS networks have switches that function at layer 3

Routing slow must pass packet to Internet layer to read IP address

Add MAC address to frame to pass frame to next link

Must recalculate the FCS

MLPS simplifies routing by making it more like switching

Traditionally, switches are layer 2, Data link devices; however, more modern switches work at layer 3 which is the Internet layer and forward packets based on IP address. These new switches are in fact routers which work like switches.
Earlier in this lecture we looked at how routers handle IP packets. They open the LAN frame to find the incoming packet’s destination IP address, then they compare the address to every row in the routing table, select the best match, recalculate the FCS and send the packet out the appropriate port to reach the next link towards the destination host. The next packet arrives and the router follows the same procedure. This processing can lead to latency as each router forwards the packet. Multiprotocol Label Switching (MPLS) is a new standard which greatly simplifies routing and basically allows the router to function like a switch. This technology can be used with any LAN technology, like Ethernet, but is currently being used by third parties to provide MAN and WAN configurations. More importantly, MPLS is done completely transparently to the sending and receiving host. MPLS adds a new header in between the existing LAN and IP headers (note: the LAN and IP headers are not changed).
On an MPLS network, when two hosts begin to communicate, they do not immediately send packets, Instead, they determine the best path for the packets. This best path is called the “label-switched path”. This dedicated path is slow to set up, but once created all subsequent packets can be forwarded very quickly. This is especially true if the MPLS network is controlled by a 3rd party MAN service provider, as in the diagram below. In this situation, each site can have a unique label number and each router only has one path to the destination host, like a switch. The router does not have to open the packet and pass the packet to the Internet layer to find the destination IP address. Also, since the packet is not opened and new MAC addresses for the next link in the route, the FCS does not have to be recalculated. These factors greatly decrease the latency of a typical router.
For example, a host at Site A wants to send a packet to a host at Site D. Host D on the MAN network is assigned a label of 3. Host A sends an ordinary LAN frame and IP packet to the host at Site D. The first MPLS capable router places a label header in between the LAN frame header and the IP header with the label number 3. This label number identifies the label-switch path to Site D. No further routing is necessary. Since each router knows the one path to the destination network, the router is in fact functioning like a switch. The last label-switched router removes the label because the packet has reached the destination Site D.
MPLS greatly simplifies the routing process and provides faster routing. The technology is also being used on internets. For example, if a route gets too congested, the traffic can be moved between 2 routers to an alternative route. Many ISPs are using this technology to provide better load balancing on their network. Technically, there is no limit to how far MPLS networks can work. They could be used for WANs and speed up the Internet, however, this is unlikely to happen due to coordination difficulties between ISPs.

29

MPLS

Site A wants to send a packet to Site D

Calculate the best route called “label-switched path”

Path assigned unique address

New MLPS header added between LAN header and IP header with new address

Each address is unique within the data network

Traditionally, switches are layer 2, Data link devices; however, more modern switches work at layer 3 which is the Internet layer and forward packets based on IP address. These new switches are in fact routers which work like switches.
Earlier in this lecture we looked at how routers handle IP packets. They open the LAN frame to find the incoming packet’s destination IP address, then they compare the address to every row in the routing table, select the best match, recalculate the FCS and send the packet out the appropriate port to reach the next link towards the destination host. The next packet arrives and the router follows the same procedure. This processing can lead to latency as each router forwards the packet. Multiprotocol Label Switching (MPLS) is a new standard which greatly simplifies routing and basically allows the router to function like a switch. This technology can be used with any LAN technology, like Ethernet, but is currently being used by third parties to provide MAN and WAN configurations. More importantly, MPLS is done completely transparently to the sending and receiving host. MPLS adds a new header in between the existing LAN and IP headers (note: the LAN and IP headers are not changed).
On an MPLS network, when two hosts begin to communicate, they do not immediately send packets, Instead, they determine the best path for the packets. This best path is called the “label-switched path”. This dedicated path is slow to set up, but once created all subsequent packets can be forwarded very quickly. This is especially true if the MPLS network is controlled by a 3rd party MAN service provider, as in the diagram below. In this situation, each site can have a unique label number and each router only has one path to the destination host, like a switch. The router does not have to open the packet and pass the packet to the Internet layer to find the destination IP address. Also, since the packet is not opened and new MAC addresses for the next link in the route, the FCS does not have to be recalculated. These factors greatly decrease the latency of a typical router.
For example, a host at Site A wants to send a packet to a host at Site D. Host D on the MAN network is assigned a label of 3. Host A sends an ordinary LAN frame and IP packet to the host at Site D. The first MPLS capable router places a label header in between the LAN frame header and the IP header with the label number 3. This label number identifies the label-switch path to Site D. No further routing is necessary. Since each router knows the one path to the destination network, the router is in fact functioning like a switch. The last label-switched router removes the label because the packet has reached the destination Site D.
MPLS greatly simplifies the routing process and provides faster routing. The technology is also being used on internets. For example, if a route gets too congested, the traffic can be moved between 2 routers to an alternative route. Many ISPs are using this technology to provide better load balancing on their network. Technically, there is no limit to how far MPLS networks can work. They could be used for WANs and speed up the Internet, however, this is unlikely to happen due to coordination difficulties between ISPs.

30

VoIP
Networks

31

VoIP

VoIP applications growing in the business sector

Business deals with one network

Increases mobility

Increases worker collaboration

Improves customer relations

Programmers are now designing applications which combine both data and voice. Businesses like the convergence because it means they only manage one network; this is less expensive and more efficient than managing separate networks. In addition, since calls are made using the Internet, governments have not taxed VoIP calls like land lines, thus calls are much cheaper. Employees like it too because VoIP applications increase mobility and are available from the warehouse, home or on the road. VoIP applications also increase collaboration between and improve customer relations by allowing video chat, Web conference, and instant messaging (each technology can be used individually or all of them simultaneously), through a single, easy-to-use interface. Callers are less likely to get ensnared in voicemail menus or put on hold, which can improve customer loyalty and company profits. For the above reasons, VoIP applications are growing in the business sector. We should have a basic understanding of the technology and how it works.

32

VoIP Applications : Client\Server Architecture

Client
PC with speakers, microphone and VoIP software
or IP-enabled Phone with VoIP software
Built-in CODECS to convert digital IP packet to analog voice

VoIP is a client/server architecture which uses data devices to send real time audio communication as well as data over the TCP/IP Ethernet network. The servers set up the connection, and once made, the clients then send IP packets back and forth until the call has ended and the servers take down the connection. There is an excellent 1 hour tutorial on VoIP on you tube from Eli the Computer Guy
Clients
The clients can be a PC with speakers and microphone and VoIP software. A client could also be a specialized VoIP telephone, which looks like a regular land line, but instead of using a standard RJ-11 connector, it uses an RJ-45 connector. These telephones have built in codecs to convert the digital IP packet to analog voice. A traditional land line can also be a client provided the VoIP communication goes through a media gateway which does the conversion.
 
33

VoIP Applications: Client\Server Architecture

Server
Two signaling protocols H.323 and SIP
SIP newer Internet standard and replace H.323 in time
Server service offered by all Telcos, Cable companies and 3rd party providers

OfficeSIP is an Open Source Server Service which can be installed on Windows

Servers
There are two major VoIP signaling protocols, H.323 which is an ITU-T standard or SIP (Session Initiation Protocol) created by the IETF. SIP is the newer standard and will probably replace H.323 in time. All of the major telcos and cable companies offer VoIP services. Most businesses and home users are buying the service from third party providers.

But there is an open source version called OfficeSIP which works with Windows and can be downloaded onto any PC to act as a server.
 
Eli the Computer Guy, “Introduction to VoIP” at https://www.youtube.com/watch?v=2x3Ie6VZ_sg

34

VoIP Applications: Client\Server Architecture

VoIP require real time transmission TCP to slow
UDP is used lower overhead than TCP
Combined with RTP (real time protocol)
Adds a header between the UDB header and application message
Header adds a sequence number and timestamp to avoid jitter

One would think that VoIP would be based on the TCP Transport protocol. TCP is connection-oriented which means that it sets up a pathway from source to destination before sending any packets. It also has an acknowledgement system which guarantees delivery. However, these features of TCP create latency in the communication greater than 250 milliseconds which makes verbal communication impossible. Voice needs to be transmitted in real time. To provide better voice communication, the UDP, User Datagram Protocol is used. This protocol is connectionless, does not guarantee delivery and reduces the processing load an VoIP phones. To improve UDP the Real Time Protocol (RTP) is used in conjunction. This protocol places a RTP header in between UDP header and the application message. The header adds a sequence number, so that all packets can be associated with the same conversation and reassembled in the correct order, and a time stamp. VoIP is highly sensitive to jitter, which is variable latency in packet delivery; the time stamp helps the receive to know which packets are to be played relative to the previous packet. This allows smooth playback. If packets are lost, the receiver can create fake noise for the lost codec bytes by extrapolating between the content of the proceeding and following packets.

35

Programming VoIP Applications

Use prebuilt SDK kits to build:
Softphone
VoIP gateway server
PBX system
Saves development time

Common kit for Windows is Ozeki VoIP SIP SDK

http://www.voip-sip-sdk.com/p_24-ozeki-voip-sip-sdk-quick-start-guide-voip.html

Cross Platform kit is Asterisk which is open source, free to use and can be modified
to http://www.asterisk.org/get-started

With the popularity of VoIP applications, you will no doubt be writing VoIP applications. It is important to understand some programming concepts. To get started programming VoIP applications for Windows using the .NET languages (including C#, C, C++, VB, etc.) there are several VoIP development kits. These kits allow you to build a “softphone” – a PC with telephone capabilities, a VoIP gateway sever, or a PBX system. These kits save development time because the libraries and components are prebuilt and can be integrated into your application. A common kit for Windows is Ozeki VoIP SIP SDK. A trial version can be downloaded from www.voip-sip-sdk.com. To get more information on how to use Ozeki go to http://www.voip-sip-sdk.com/p_24-ozeki-voip-sip-sdk-quick-start-guide-voip.html
A cross platform, open source SDK is Asterisk. It includes all components necessary to build softphones, PBXs, or VoIP gateways. Asterisk is open source, free to use and can be modified to fit organizational needs. It is stable, reliable and used by many of the Fortune 1000 list of companies. For more information on getting started with Asterisk go to http://www.asterisk.org/get-started

36

Summary
The data link layer is divided into two sub layers: Logical Link Control and the Media Access Control. The former is used by older Ethernet and some other technologies. The latter is used by wireless Ethernet which shares bandwidth
The protocol of the MAC sublayer is CSMA/CD. This protocol controls when and how hosts send data and respond to collisions. A variation of this protocol called CSMA/CA is used for wireless Ethernet to avoid collisions and having to retransmit
Switches are layer 2 devices and forward frames based on the MAC address. Routing are layer 3 devices and forward packets based on the IP address. Routing is more complicated and slower than switching because routers are connected to meshes and must determine the best route among alternate paths. Switches work in a hierarchical fashion and only have one path to the destination
MPLS is a new technology which basically makes router work like switches. A MPLS is currently being used as a MAN technology to make routing faster
VoIP applications are growing in the business world because they combine data and voice into one network which lowers cost. VoIP applications also increase mobility and improve customer satisfaction. Writing VoIP applications should be done with prebuilt SDK kits such as Ozeki for Windows and Asterisk for cross platform applications

References
Data Communication and Networking 5/e By Behrouz Forouzan
Data and Computer Communications 7/e William Stallings

38

Packets are routed across internets. Frames are switched across single networks.

/docProps/thumbnail.jpeg