Documente Academic
Documente Profesional
Documente Cultură
DSLAM
The DSLAM at the access provider is the equipment that
really allows DSL to happen. A DSLAM takes connections
from many customers and aggregates them onto a single,
high-capacity connection to the Internet. DSLAMs are
generally flexible and able to support multiple types of
DSL in a single central office, and different varieties of
protocol and modulation in the same type of DSL. In
addition, the DSLAM may provide additional functions
including routing or dynamic IP address assignment for the
customers.
The DSLAM provides one of the main differences between
user service through ADSL and through cable modems.
Because cable-modem users generally share a network loop
that runs through a neighborhood, adding users means
lowering performance in many instances. ADSL provides a
dedicated connection from each user back to the DSLAM,
meaning that users won't see a performance decrease as
new users are added -- until the total number of users
begins to saturate the single, high-speed connection to the
Internet. At that point, an upgrade by the service provider
can provide additional performance for all the users
connected to the DSLAM.
The copper wires have lots of room for carrying more than
your phone conversations -- they are capable of handling a
much greater bandwidth, or range of frequencies, than that
demanded for voice. DSL exploits this "extra capacity" to
carry information on the wire without disturbing the line's
ability to carry conversations. The entire plan is based on
matching particular frequencies to specific tasks.
SECURITY
Advantages of DSL:
• Internet connection can be left open and still the phone
line can be used for voice calls.
• The speed is much higher than a regular modem (1.5
Mbps vs. 56 Kbps)
• DSL doesn't necessarily require new wiring; it can use
the existing phone line.
• The company that offers DSL will usually provide the
modem as part of the installation.
Disadvantages of DSL:
• A DSL connection works better when the user is
closer to the provider's central office.
• The connection is faster for receiving data than it is for
sending data over the Internet.
XDSL
o Public-key encryption
In the DoD model, there are two main reasons for the
Internet layer’s existence: routing, and
providing a single network interface to the upper layers.
None of the other upper- or lower-layer protocols have any
functions relating to routing—
that complex and important task belongs entirely to the
Internet layer. The Internet layer’s second duty is to
provide a single network interface to the upper-layer
protocols. Without this layer, application programmers
would need to write “hooks” into every one of their
applications for each different Network Access protocol.
This would not only be a pain in the neck, but it would lead
to different versions of each application—one for Ethernet,
another one for Token Ring, and so on. To prevent this, IP
provides one single network interface for the upper-layer
protocols. That accomplished, it’s then the job of IP and the
various Network Access protocols to get along and work
together. All network roads don’t lead to Rome—they lead
to IP. And all the other protocols at this layer, as well as all
those in the upper layers, use it. Never forget that. Let me
say it again: all paths through the DoD model go through
IP.
The following are the protocols at the Internet layer:
o Internet Protocol (IP)
o Internet Control Message Protocol (ICMP)
o Address Resolution Protocol (ARP)
o Reverse Address Resolution Protocol (RARP)
IP Terminology
Bit
A bit is one digit; either a 1 or a 0.
Byte
A byte is 7 or 8 bits, depending on whether parity is used.
For the rest of this section,
always assume a byte is 8 bits.
Octet
An octet, made up of 8 bits, is just an ordinary 8-bit binary
number. In this chapter, the
Terms byte and octet are completely interchangeable.
Network address
The network address is the designation used in routing to
send packets to a
remote network—for example, 10.0.0.0, 172.16.0.0, and
192.168.10.0.
Broadcast address
This type of address is used by applications and hosts to
send information
to all nodes on a network. Examples include
255.255.255.255, which is all networks, all nodes;
172.16.255.255, which is all subnets and hosts on network
172.16.0.0; and 10.255.255.255, which broadcasts to all
subnets and hosts on network 10.0.0.0.
• Dotted-decimal, as in 172.16.30.56
• Binary, as in
10101100.00010000.00011110.00111000
• Hexadecimal (hex for short), as in AC.10.1E.38
All these examples represent the same IP address. Hex isn’t
used as often as dotted-decimal or binary when IP
addressing is being discussed, But sometimes an IP address
is stored in hex in some programs. The Windows Registry
is a good example of a program that stores a machine’s IP
address in hex.