Frame Relay Vs. IP Vpns

Total Page:16

File Type:pdf, Size:1020Kb

Frame Relay Vs. IP Vpns Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 02089 9/02 Contents: Table of Contents Introduction 2 Definition of Terms 2 “Virtual” Privacy and 3 the Value of Shared Networks The Three Definitions 3 or Distinctions of VPN The Case for Frame Relay 4 The Case for IP Virtual Private Networks 6 Conclusion 8 1 02089 9/02 Introduction: Introduction Definition of Terms Welcome to one in a series of white papers The following definitions will be used in this brought to you by Sprint. We believe it is white paper: important to inform you on issues in the industry and to keep you updated on our VPN — Virtual Private Network is a private current endeavors. communications network that uses a shared network as its Wide Area Network (WAN) A major challenge in today’s data transport backbone, thereby offering the appearance market is that businesses wanting to and functionality of a dedicated private implement a Virtual Private Network (VPN) network at a reduced price. are faced with a dizzying array of options and have few guidelines from which to make IP VPN — An IP Security (IPSec)-based VPN an educated decision. The sheer breadth of that uses encryption and authentication to available VPN offerings can be overwhelming, offer the appearance and functionality of a especially for those unfamiliar with the relative private data network over a shared IP network merits and capabilities of all the alternatives. such as the Internet. In this paper, IP VPN will be discussed in terms of both Sprint CPE- To answer this challenge, Sprint has based IP VPNs and Network-based IP VPNs. It developed this series of VPN white papers will not be discussed in relation to IP-enabled designed to help customers and prospects frame relay or MPLS VPNs. navigate the VPN decision-making process. Each paper in the series compares and QoS — Quality of Service refers to the contrasts different types of VPN solutions consistent performance of a network as and highlights the various communications supported by the network Service Level needs they can — and cannot — address. Agreements (SLAs). This white paper not only identifies the communications needs that can be solved CoS — Class of Service refers to traffic by VPNs, but also examines the relative differentiation. CoS provides the ability to capabilities of frame relay and IP VPNs in treat packets differently based on the packet’s delivering solutions. importance. Sprint has extensive knowledge and experience in this industry category. In fact, Sprint and Cisco are currently working together to develop, market and deliver nationwide IP and broadband solutions. The joint effort combines Cisco Systems’ best-in-class networking technology and equipment with Sprint state-of-the art network infrastructure and customer service capability. The companies are initially focused on dedicated Internet access, IP VPN, IP Telephony solutions, content delivery networks and metro Ethernet solutions. By joining forces on this project, Sprint and Cisco intend to define and establish IP industry standards. 2 02089 9/02 Virtual Definitions: “Virtual” Privacy and the Value of The Three Definitions or Shared Networks Distinctions of VPNs It wasn’t long ago that dedicated leased At the most basic level, all VPNs serve the lines were the only viable option for same purpose — they permit organizations to businesses requiring secure data transmission securely share data with key stakeholders. among multiple remote locations. At the This includes: time, this solution addressed most organizations’ • Sharing a particular subset of data with all communications needs; but the associated costs and complexities could be considerable stakeholders — especially for businesses with geographically • Sharing all data with a particular subset of dispersed employees or a large number of stakeholders branch offices. •Sharing a particular subset of data with a With the advent of Layer 21 technologies particular subset of stakeholders like frame relay, more cost-effective shared networking solutions became available. The following table shows which stakeholder Such solutions were seen as breakthroughs groups are served by each of the three because they allowed businesses to leverage fundamental types of VPNs. a service provider’s shared network resources • Intranet — employees at fixed locations to build “virtually” private networks. These (HQs, branch offices, small offices/home networks could mimic the appearance and offices, etc.) functionality of leased line services at a fraction of the cost. • Remote Access — employees “on the go” (telecommuters, mobile users, business Currently, most companies run at least a travelers, etc.) portion of their WAN over shared facilities. The key advantage is seen in the potential • Extranet — key business partners cost savings. With the rise of Internet and (suppliers, distributors, resellers, etc.) IP usage for business applications, the role of shared networks has accelerated in today’s corporate data networking environment. 3 02089 9/02 The Case for Frame Relay: The Case for Frame Relay Frame relay networks are considered private because each customer’s individual traffic is 1 Frame relay is a Layer 2 communications separated into a predetermined path, the PVC. protocol that enables the establishment of Unintended recipients cannot view traffic multiple independent circuits, or data links, that is not deliberately sent to them. In fact, over a single physical connection. The there is no way to misdirect traffic without protocol accomplishes this by packaging physical access to network facilities. In order data into variable length frames at their to intercept or corrupt traffic traveling on a source location, and then merging these frame network, an individual would need to frames into a single data stream for physically tap into the transport medium in transmission over a shared network resource. question — an intrusion that is easily detected This merging process, called statistical using widely available monitoring tools. multiplexing, ensures efficient use of capacity on the shared facilities and minimizes the Key Strengths end-to-end delay of frame delivery. Ability to support multiple Layer 3 In a frame relay network, each individual protocols. Frame relay is a Layer 2, or data logical connection is called a Permanent link, technology, and thus can support any Virtual Circuit (PVC). Beyond cost savings, Layer 3 protocol. Businesses running PVCs have two distinct advantages over applications based on non-IP protocols, such leased lines: as IPX, SNA or AppleTalk, should strongly consider implementing — or sticking with — • PVCs are software defined, so they can be a frame relay network. For companies created, altered or dismantled in a matter of running purely IP-based applications, this hours. This represents a tremendous time isn’t a key decision factor. savings over leased lines, which require Ability to address Internet security days, weeks or even months to deploy the concerns with a single firewall. Many physical components. corporate frame relay networks are built in a hub-and-spoke arrangement with a single Internet connection at the hub site. This • Every PVC has an associated Committed architecture requires all remote (spoke) offices Information Rate (CIR) that defines the to access the Internet via the central (hub) amount of bandwidth a customer is site. In this scenario, the company can protect provided on the shared network facility. their entire network from unauthorized access However, customers have the ability to via the Internet by using only one firewall transmit data on their PVC at rates up located at the hub site. The upside to such to the full port speed. This means a configuration is the need to pay for and customers can “burst” above standard manage no more than one firewall, which can be a significant benefit for customers capacity as needed for certain bandwidth- looking to save money and headaches on intensive applications. Sprint is one of Internet security. However, businesses whose the service providers that offers 0-CIR employees send and receive a considerable PVCs, which provide SLA guarantees on all traffic transmitted. 4 02089 9/02 The Case for Frame Relay: amount of Internet traffic should think twice question. For businesses with many sites, a about this type of configuration. The inefficient large number of PVCs can be required to use of bandwidth as Internet traffic traverses achieve this type of meshed configuration. the frame network to and from the hub site Since more PVCs translate to additional cost could end up costing more than deploying and complexity, companies interested in Internet connections and firewalls at each enabling direct communications between remote location. multiple locations should consider alternatives to frame relay networking. Ability to provide predictable performance for delay-sensitive traffic. Since the frames Potentially high network delay. Depending that carry data in frame relay networks are on the topology of a customer’s frame relay variable in length, network congestion network, packets traveling over a frame problems can arise when larger data blocks relay network may experience high latency queue up ahead of delay-sensitive traffic, relative to IP networks with any-to-any such as voice. To help alleviate this problem, connectivity. For example, in a hub-and- the Frame Relay Forum has ratified spoke configuration, traffic must first travel procedures to break down larger frames into to a hub site before reaching its final a series of smaller ones. While such methods destination. This added distance can slow are not official CoS protocols, they can the delivery of data. Once again, customers provide predictable delay patterns and looking for fast, direct connections among therefore maintain the integrity of many remote locations may be better served delay-sensitive traffic. Companies concerned by solutions other than frame relay. about the quality of any delay-sensitive traffic sent over their network may feel more Limited interoperability. Frame relay comfortable with a frame relay (as opposed backbones in existence today are managed to IP) solution.
Recommended publications
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • PDF Version of DM3530-005
    CHAPTER 6 – PART 5 Encryption Security Standards 1 BACKGROUND All USDA agencies and staff offices need to transmit Sensitive But Unclassified (SBU) over open networks. In using IT to continuously improve mission performance, the USDA is becoming more interconnected to open networks and other emergent global networks. The openness of these networks enables malicious cyber attacks against sensitive USDA assets and increases the potential risk to sensitive information. This risk is compounded through the use of the Internet and other non-secure mediums such as Wireless Local Area Network technology, Microwave, and Radio technologies. This technology includes utilizing Laptops and Personal Electronic Devices (such as cellular telephones, pagers and hand held computers) to communicate and process USDA information from any location. Encryption methods can protect sensitive information during storage and transmission. They provide important functionality to reduce the risk of intentional and accidental compromise and alteration of data. Encryption algorithms use a mechanism called a key, which is used to render the information unreadable during transmission. While the information is encrypted it is mathematically protected against disclosure because it is cannot be read by some one who does not have a corresponding key to decrypt the information. Encryption methods serve as part of the USDA defense-in-depth strategy and provide reasonable protection of sensitive information at a comparatively low cost. The primary factor that must be considered when determining if encryption is required is data sensitivity. Data sensitivity is a measure of the importance and nature of the information processed, stored, and transmitted by an IT system to the organization’s mission and day-to-day operations.
    [Show full text]
  • Lab – Configuring Frame Relay and Subinterfaces
    Lab – Configuring Frame Relay and Subinterfaces Topology © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19 Lab – Configuring Frame Relay and Subinterfaces Addressing Table Device Interface IPv4 and IPv6 Address Default Gateway 192.168.1.1/24 2001:DB8:ACAD:A::1/64 R1 G0/0 FE80::1 link-local N/A 10.1.1.1/30 2001:DB8:ACAD:B::1/64 S0/0/0 (DCE) FE80::1 link-local N/A FR S0/0/0 N/A N/A S0/0/1 (DCE) N/A N/A 192.168.3.1/24 2001:DB8:ACAD:C::3/64 R3 G0/0 FE80::3 link-local N/A 10.1.1.2/30 2001:DB8:ACAD:B::3/64 S0/0/1 FE80::3 link-local N/A 192.168.1.3/24 192.168.1.1 PC-A NIC 2001:DB8:ACAD:A::A/64 FE80::1 192.168.3.3/24 192.168.3.1 PC-C NIC 2001:DB8:ACAD:C::C/64 FE80::3 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Configure a Frame Relay Switch Part 3: Configure Basic Frame Relay Part 4: Troubleshoot Frame Relay Part 5: Configure a Frame Relay Subinterface Background / Scenario Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Unlike leased lines, Frame Relay requires only a single access circuit to the Frame Relay provider to communicate with multiple sites that are connected to the same provider.
    [Show full text]
  • High-Level Data Link Control
    ELEC3030 (EL336) Computer Networks S Chen High-Level Data Link Control • This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD) for ISDN, and Logic Link Control (LLC) for FDDI • The frame format is: Flag Address Control Data FCS Flag Note that address and control bits 8 8 8 variable 16 8 can be extended to 16 bits, so bit position 12 3 4 5 6 7 8 N(S)=send sequence number N(R)=receive sequence number that sequence number is 7-bit Information: 0 N(S) P/F N(R) S=supervisory function bits P/F • Frame flag: 01111110, so bit Supervisory: 1 0 S N(R) M=unumbered function bits stuffing is used Unumbered: 1 1 M P/F M P/F=poll/final bit • Address: For multipoint operation, it is used to identify the terminal that transmits or receives the frame and, in point-to-point link, it is used to distinguish Commands from Responses (2nd bit for C/R: 0/1). The address is now extended to 16 bits (1st bit indicates long/short 16/8 bits) • Checksum: FCS contains the remainder of a 16-bit CRC calculation of the frame. It may be extended to 32 bits, using a 32-bit CRC • Control: Three types of frames, I, S and U frames. The old protocol uses a sliding window with 3-bit sequence number and the maximum window size is N = 7. The control field is now extended to 16 bits with 7-bit sequence number 60 ELEC3030 (EL336) Computer Networks S Chen HDLC (continue) • I-frames: carry user data.
    [Show full text]
  • Lab Implementation of Ipv6 in Enterprise Network Using Cisco Packet Tracer
    Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 6564 – 6580 Research Article Lab Implementation of IPv6 in Enterprise Network Using Cisco Packet Tracer Mohammad Ali Sadata, Priyanka Meelb a,b Department of Information Technology, Delhi Technological University, India a [email protected], b [email protected] Article History: Received: 11 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published online: 28 April 2021 Abstract: As technology is growing fast, using technologies is also increasing because the previous technologies cannot support the new requirements. In this case, every company is trying to implement newly released technologies. As IPv4 was introduced, it has been used for a long time in networking. But now, the limitations of IPv4 are too much, such as address limitation, subnet-ting with complex structure, inefficient NAT employment. This is why IPv4 is not considered to be used anymore. Because of IPv4 problems, the IPv6 protocol is designed and developed to overcome IPv4 limitations. The efficiency of IPv6 is more in packet processing, and routing pro-vides a simple network configuration and improves the QoS by decreasing latency in the time of the data packet transformation. As IPv6 has many features and new supported services. With the emergence of IPv6, any enterprise companies are interested in implementing IPv6 in the enterprise network. An enterprise network includes protocols, virtual and physical networks that connect all systems and users on a LAN, and all applications in the cloud and data center. The main purpose of this research is to implement ipv6in the enterprise network.
    [Show full text]
  • How to Configure Frame Relay Over a DS3 Interface Between Two Rapier 24I Switches
    How to configure Frame Relay over a DS3 interface between two Rapier 24i switches Introduction This document provides a basic configuration example for configuring Frame Relay over a DS3 interface between two Rapier 24i switches. Frame Relay Frame Relay is a network service, defined by ITU-T (formerly CCITT), ANSI and vendor standards, to which switches may connect in order to communicate with one another and exchange data. Connections can be made via synchronous lines, DS3 lines, ISDN calls or G.703 TDM (Time Division Multiplexing) links. A Frame Relay network provides Data Link Connections (DLCs) between the switches connected to the network. These DLCs are set up by the Frame Relay network administration. One DLC is reserved for the communication of management information between the routers and the Frame Relay network, in a dialogue called the Local Management Interface (LMI). Frame Relay itself exists purely as a way for frames to get from one switch to another in an efficient manner. Frames sent to the network must contain the Data Link Connection Identifier (DLCI) of the DLC to use to deliver the frame. Except for LMI frames, the rest of the content of the frame is determined by the switch-to-switch communication and is not used by the network. In order for switches to transport multiple protocols across a single DLC the data being transmitted must be encapsulated to allow the remote switch to identify the type of network protocol packet contained in the frame. A common standard for carrying multiple protocols over Frame Relay is specified by the IETF in RFC 1294.
    [Show full text]
  • VPN Tech Brief MM
    A DETAILED ANALYSIS OF FR-VPNs vs. IP-VPNs VPNs Frame Relay A Comparison of IP-VPN and Frame Relay Services Description Secure Transmissions carriers may constitute a strong value proposi- tion for price-sensitive customers willing to Say “VPN” and most people think Internet Today, one way IP-VPNS are being deployed is give up SLA and security, a consideration that technology. Generically defined, a Virtual through ISPs who are building IP tunnels “traditional” carriers will not underestimate. Private Network (VPN) is a means of through their backbones as special, secure With the potential threat of new entrants, transmitting digital information over a shared paths for customers’ traffic. However, users carriers will have a strong incentive to protect public network infrastructure in which secure trust frame relay Permanent Virtual Circuits their installed base and resulting revenue. and reliable connectivity, management and (PVCs) to provide adequate security for most The ISP/carrier consolidation will also push addressing is equivalent virtually to that of a applications without having to create tunnels the service providers to rationalize and posi- private network. and use encryption as default. PVCs inherent- tion their own offerings within their product Despite the recent excitement about ly provide a “tunnel” of sorts in that the line so as to minimize cannibalization effects. IP-VPNs, Layer 2 VPNs have been available network operator (within the company or since the mid to late 1980s as VPDNs. Current service provider) establishes the DLCIs managed frame relay services run mission- associated with a different access device. In Flexibility and Any-to-Any critical applications and provide secure, stable addition, packets with corrupted addressing predictable and highly manageable solutions.
    [Show full text]
  • Medium Access Control Sublayer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Prof. Dr. Mesut Güneş Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Distributed, embedded Systems Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (()MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus ● Network Infrastructure ● Token Ring ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● PtProtoco ls use dtdtd to determ ine w ho gets next access to the channel Data Link Layer ● Medium Access Control (()MAC) sublay er Phy sical Laye r Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Rang e ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access - LLC IEEE 802.2 Logical Link Control ..
    [Show full text]
  • NIST SP 800-119, Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Data Link Protocols
    Data Link Protocols TCP/IP Suite and OSI Reference Model • The TCP/IP protocol stack does not define the lower layers of a complete protocol stack • In this lecture, we will address how the TCP/IP protocol stacks interfaces with the data link layer Data Link Layer The main tasks of the data link layer are: Transfer data from the network layer of one machine to the network layer of another machine Convert the raw bit stream of the physical layer into groups of bits (“frames”) Network Network Layer Layer Data Link Data Link Layer Layer Physical Physical Layer Layer Two types of networks at the data link layer Broadcast Networks: All stations share a single communication channel Point-to-Point Networks: Pairs of hosts (or routers) are directly connected Broadcast Network Point-to-Point Network Typically, local area networks (LANs) are broadcast and wide area networks (WANs) are point-to-point Local Area Networks Local area networks (LANs) connect computers within a building or a enterprise network Almost all LANs are broadcast networks Typical topologies of LANs are bus or ring or star We will work with Ethernet LANs. Ethernet has a bus or star topology. Bus LAN Ring LAN MAC and LLC In any broadcast network, the stations must ensure that only one station transmits at a time on the shared communication channel The protocol that determines who can transmit on a broadcast channel are called Medium Access Control (MAC) protocol The MAC protocol are implemented in the MAC sublayer which is the to Network Layer lower sublayer of the
    [Show full text]
  • Qos and Frame Relay
    QoS and Frame Relay Vesa Kosonen Helsinki University of Technology Laboratory of Telecommunications Technology P.O.Box 3000 02015 HUT, Finland Email: [email protected] Abstract it can be mentioned that there are many research projects going on where frame relay is involved. As we can see The purpose of this paper is to study quality of service frame relay is still in the headlines. What makes frame properties of frame relay. In this paper we first relay as an interesting alternative for transport concentrate on explaining the protocol architecture and technology? How is quality of service maintained in case related matters. The frame format is studied in detail. of congestion? These are some of the questions that will The behavior of frame relay network is under be discussed in this study. consideration, too. How does the frame find its way to the destination and what happens when there are errors? 1. A Short History of Frame Relay Then we will study some properties unique to frame relay. Finally we take a look how congestion control is In 1988 came out I.122 Recommendation entitled as realized in frame relay to keep up with high quality of “Framework for Providing Additional Packet Mode service. Bearer Services”. It introduced a new form of packet transmission that has become one of the most significant Introduction contributions of narrowband ISDN work. The title of this recommendation was changed with the release of the The rapid growth of Internet sets new requirements to 1993 version to “Framework for Frame Mode Bearer the networks used for the services of Internet.
    [Show full text]
  • Layer 2 Protocols
    Layer 2 Protocols Table of Contents Layer 2 Protocols -2 ........................................................................................................................ 2 Layer 2 Protocols -3 ........................................................................................................................ 4 Layer 2 Protocols -1 ........................................................................................................................ 6 Layer 2 Protocols -2 ........................................................................................................................ 7 Layer 2 Protocols -3 ........................................................................................................................ 8 Notices ............................................................................................................................................ 9 Page 1 of 9 Layer 2 Protocols -2 Layer 2 Protocols -2 Frame Relay • Packet-switching protocol • Lower overhead • Does not provides error correction Spanning Tree Protocol • Detects LANs topology • Calculates best path for transmission • Prevents multiple paths and/or loops 30 **030 All right, so let's get back to talking about Layer 2 protocols. The next ones we'll talk about just very briefly are frame relay, and Spanning Tree Protocol. We won't go much more into depth other than to say what they are. The frame relay protocol is a Layer 2 protocol. It helps with packet switching with Ethernet frames. There's a low overhead, meaning there's not
    [Show full text]