Sunteți pe pagina 1din 20

DATA COMMUNICATIONS, DATA

NETWORKS, AND THE INTERNET


Effective and efficient data communication and networking facilities are vital to
any enterprise. Three different forces have consistently driven the architecture and
evolution of data communications and networking facilities: traffic growth,
development of new services, and advances in technology.

Communication traffic, both local (within a building or building complex) and


long distance, both voice and data, has been growing at a high and steady rate for
decades

The continuing growth in high-speed network offerings with the continuing drop in
prices encourages the expansion of services. Thus, growth in services and growth
in traffic capacity go hand in hand.

Finally, trends in technology enable the provision of increasing traffic capacity and
the support of a wide range of services. Four technology trends are particularly
notable:

1. The trend toward faster and cheaper, both in computing and communications,
continues.
 In terms of computing, this means more powerful computers and
clusters of computers capable of supporting more demanding applications,
such as multimedia applications.
 In terms of communications, the increasing use of optical fiber has brought
transmission prices down and greatly increased capacity. For example, for
long-distance telecommunication and data network links, recent offerings of
dense wavelength division multiplexing (DWDM) enable capacities of
many terabits per second. For local area networks (LANs) many enterprises
now have Gigabit Ethernet backbone networks and some are beginning to
deploy 10-Gbps Ethernet.
2. Both voice-oriented telecommunications networks, such as the public switched
telephone network (PSTN), and data networks, including the Internet, are more
“intelligent” than ever.
3. The Internet, the Web, and associated applications have emerged as dominant
features of both the business and personal world, opening up many
opportunities
4. There has been a trend toward ever-increasing mobility for decades, liberating
workers from the confines of the physical enterprise. Innovations include
voice mail, remote data access, pagers, fax, e-mail, cordless phones, cell phones
and cellular networks, and Internet portals.
 Telecommunication & Data communication
Telecommunication

Any process that permits the channel from a sender to one or more receivers of
information of any nature, delivered in an easy to use form by any electromagnetic
system.

Data communication

A subset of telecommunication involving the transmission of data to and from


computers and components of computer systems.

Difference:

 They are both a form of communication; data communication is a subset of


Telecommunication
 Telecommunication sends data between two links by means of electromagnetic.
(Like satellite), while data communication means send data by
telecommunication, it consists of codes of 0’s and 1’s. In computer means,
 Data communication is digital data and telecommunication is equipped to send
digital data to receiver.
 Telecommunication is any communication over a distance. Data
communication usually implies digital, and often excludes voice services.

 A COMMUNICATIONS MODEL

A simple model of communications, illustrated by the block diagram in Figure


1.2a. The fundamental purpose of a communications system is the exchange of
data between two parties. Figure 1.2b presents one particular example, which is
communication between a workstation and a server over a public telephone
network

 Source. This device generates the data to be transmitted; examples are


telephones and personal computers.
 Transmitter: Usually, the data generated by a source system are not
transmitted directly in the form in which they were generated. Rather, a
transmitter transforms and encodes the information in such a way as to produce
electromagnetic signals that can be transmitted across some sort of transmission
system.
 Transmission system: This can be a single transmission line or a complex
network connecting source and destination.
 Receiver: The receiver accepts the signal from the transmission system and
converts it into a form that can be handled by the destination device.
 Destination: Takes the incoming data from the receiver.

 Data Communications Tasks


 Transmission system utilization  Addressing
 Interfacing  Routing
 Signal generation  Recovery
 Synchronization  Message formatting
 Exchange management  Security
 Error detection and correction  Network management
 Flow control
Above table lists some of the key tasks that must be performed in a data
communications system.

1. Transmission system utilization, refers to the need to make efficient use of


transmission facilities that are typically shared among a number of
communicating devices. Various techniques (referred to as multiplexing) are
used to allocate the total capacity of a transmission medium among a number of
users.

2. To communicate, a device must interface with the transmission system


depending on the use of electromagnetic signals over a transmission medium.

3. Once an interface is established, signal generation is required for


communication. The properties of the signal, such as form and intensity, must
be such that the signal is (1) capable of being propagated through the
transmission system and (2) interpretable as data at the receiver.

4. Synchronization between transmitter and receiver means the receiver must be


able to determine when a signal begins to arrive and when it ends. It must also
know the duration of each signal element.

5. Exchange management between two/more parties. For example, in a telephone


conversation, one party must dial the number of the other, causing signals to be
generated that result in the ringing of the called phone. The called party
completes a connection by lifting the receiver.

6. Error detection and correction are required in circumstances where errors


cannot be tolerated.

7. Flow control is required to assure that the source does not overwhelm the
destination by sending data faster than they can be processed and absorbed.
8. Addressing and routing means when more than two devices share a
transmission facility, a source system must indicate the identity of the intended
destination. The transmission system must assure that only the specific
destination system receives the data.

9. Further, the transmission system may itself be a network through which various
paths may be taken. A specific route through this network must be chosen.

10.Recovery techniques are needed in situations in which an information


exchange, such as a database transaction or file transfer, is interrupted due to a
fault somewhere in the system.

11.Message formatting is an agreement between two parties as to the form of the


data to be exchanged or transmitted, such as the binary code for characters.

12.Sometimes it is important to provide security in a data communications system.

1. The sender of data may wish to be assured that only the intended receiver
actually receives the data. And the receiver of data may wish to be assured that
the received data have not been altered in transit and that the data actually come
from the claimed sender.

13.Network management capabilities are needed to configure the system, monitor


its status, react to failures and overloads, and plan intelligently for future
growth.

 A Data Communications Model

Suppose that the input device and transmitter are components of a personal
computer. The user of the PC wishes to send a message m to another user. The
input data are transferred to the transmitter as a sequence of voltage shifts [g(t)]
representing bits on some communications bus. The transmitter is connected
directly to the medium and converts the incoming stream [g(t)] into a signal [s(t)]
suitable for transmission; The transmitted signal s(t) presented to the medium is
subject to a number of impairments, before it reaches the receiver. Thus, the
received signal r(t) may differ from s(t). The receiver will attempt to estimate the
original s(t), based on r(t) and its knowledge of the medium, producing a sequence
of bits These bits are sent to the output personal computer, In many cases, the
destination system will attempt to determine if an error has occurred and, if so,
cooperate with the source system to eventually obtain a complete, error-free block
of data.
 Types of Computer Networks
A computer network, or a network, is a collection of computers and other
hardware interconnected by communication channels that allow sharing of
resources and information. Types:

o LAN (local area network)


o MAN (metropolitan area network)
o WAN (wide area network
1. LAN
A LAN is a high-speed data network that covers a relatively
small geographic area. It connects workstations, personal
computers, printers, server, and other devices. LAN gives
computer user many advantages, including shared access to
devices and applications, file exchange between connected
users, and communications between users via electronic
mail and other applications.
 LAN (Local Area Network) is a group of computers and
other network devices which are connected together.
 All the devices that are part of LAN are within a
building or multiple building.
 LAN network has very high speed mainly due to
proximity of computer and network devices.
 LAN connection speeds can be 10Mbps or 100Mbps or
1000Mpbs also.
 LAN uses Guided Media.

2. MAN
 MAN (Metropolitan Area Network) is a larger network
of computers and other network devices which are
connected together and usually spans several buildings
or large geographical area.
 All the devices that are part of MAN span across
buildings or small town.
 MAN network has lower speed compared to LAN.
 MAN connection speeds can be 10Mbps or 100Mbps.
 MAN uses Guided Media or Unguided media.

3. WAN
 WAN (Wide Area Network) is a group of computers and other network devices which
are connected together which is not restricted to a geographical location. Internet is
WAN.

 All the devices that are part of WAN have no geographical boundaries.

 WAN speed varies based on geographical location of the servers. WAN connects
several LANs.

 WAN connection speeds can be 10Mbps or 100Mbps.


 WAN mainly uses Guided Media or Unguided
media. Its long distance communications, which
may or may not be provided by public packet
network.

 Difference between Internet and Intranet

Internet Intranet
1. Intranet is network of Computers
1. Internet is network of Computers
designed for a specific group of users.
which is open for all

2. Internet itself contains a large number 2. Intranet can be accessed from Internet
of intranets. but with restrictions.

3. Unlimited number of users. 3. Limited number of Users.

4. Visitors traffic is unlimited. 4. Limited visitors traffic.

5. Contains unlimited source of 5. Contains only specific group purpose


information. information.

6. Collection of various LANs, WANs


6. Mostly any of LAN or MAN or WAN.
and MANs.

(several intranet = internet)

 How internet works?


Figure 1.4 illustrates the key elements that comprise the Internet. The purpose of
the Internet, of course, is to interconnect end systems, called hosts; Most hosts that
use the Internet are connected to a network, such as a local area network (LAN) or
a wide area network (WAN). These networks are in turn connected by routers.
Each router attaches to two or more networks.

The Internet operates as follows:

A host may send data to another host anywhere on the Internet. The source host
breaks the data to be sent into a sequence of packets, called IP datagrams or IP
packets. Each packet includes a unique numeric address of the destination host.
This address is referred to as an IP address, because the address is carried in an IP
packet. Based on this destination address, each packet travels through a series of
routers and networks from source to destination. Each router, as it receives a
packet, makes a routing decision and forwards the packet along its way to the
destination.
Hosts are sometimes grouped together in a LAN. Individual hosts and LANs are
connected to an Internet service provider (ISP) through a point of presence
(POP).The connection is made in a series of steps starting with the customer
premises equipment (CPE). The CPE is the communications equipment located
onsite with the host.

Internet Terminology
Central Office (CO)
The place where telephone companies terminate customer lines and locate
switching equipment to interconnect those lines with other networks.
Customer Premises Equipment (CPE)
Telecommunications equipment placed at the customer’s end Telephone handsets,
modems, cable TV set-top boxes, and digital subscriber line routers are examples.

Internet Service Provider (ISP)


A company that provides other companies or individuals with access to, or
presence on, the Internet. An ISP has the equipment and the telecommunication
line access required to have a POP on the Internet for the geographic area served.
Network Access Point (NAP)
In the United States, a network access point (NAP) is one of several major Internet
interconnection points that serve to tie all the ISPs together.
Network Service Provider (NSP)
A company that provides backbone services to an Internet service provider (ISP).
Typically, an ISP connects at a point called an Internet exchange (IX) to a regional
ISP that in turn connects to an NSP backbone.
Point of Presence (POP)
A site that has a collection of telecommunications equipment, usually refers to ISP
or telephone company sites. An ISP POP is the edge of the ISP’s network;
connections from users are accepted and authenticated here. An Internet access
provider may operate several POPs distributed throughout its area of operation to
increase the chance that their subscribers will be able to reach one with a local
telephone call.
The key elements of a LAN are
• Topology
• Transmission medium
• Wiring layout
• Medium access control

Together, these elements determine not only the cost and capacity of the LAN, but
also the type of data that may be transmitted, the speed and efficiency of
communications, and even the kinds of applications that can be supported.
LAN Topologies

In the context of a communication network, the term topology refers to the way in
which the end points, or stations, attached to the network are interconnected.
Topology is the arrangement of the various elements (links, nodes, etc.) of
computer or network

1. Bus 2. Tree 3. Ring 4. Star

1. Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial,
to which many network devices and workstations are attached along the
length. Server is at one end of the bus. When a workstation has to send data, it
transmits packets with destination address in its header along the bus. The data
travels in both the directions along the bus. When the destination terminal sees the
data, it copies it to the local disk.

Advantages of Bus Topology


These are the advantages of using bus topology −
 Easy to install and maintain
 Can be extended easily
 Very reliable because of single transmission line
Disadvantages of Bus Topology
These are some disadvantages of using bus topology −
 Troubleshooting is difficult as there is no single point of control
 One faulty node can bring the whole network down
 Dumb terminals cannot be connected to the bus
2. Tree Topology
The tree topology is a generalization of the bus topology. The transmission
medium is a branching cable with no closed loops. The tree layout begins at a point
known as the headend. One or more cables start at the headend, and each of these
may have branches. The branches in turn may have additional branches to allow
quite complex layouts. Again, a transmission from any station propagates
throughout the medium and can be received by all other stations.

Advantages of Tree Topology


These are some of the advantages of using tree topology −
 Existing network can be easily expanded
 Point-to-point wiring for individual segments means easier installation and
maintenance
 Well suited for temporary networks
Disadvantages of Tree Topology
These are some of the disadvantages of using tree topology −
 Technical expertise required to configure and wire tree topology
 Failure of backbone cable brings down entire network
 Insecure network
 Maintenance difficult for large networks
3. Ring Topology
In the ring topology, the network consists of a set of repeaters joined by point-to
point links in a closed loop. The repeater is a comparatively simple device,
capable of receiving data on one link and transmitting them, bit by bit, on the
other link as fast as they are received. The links are unidirectional; that is, data are
transmitted in one direction only, so that data circulate around the ring in one
direction (clockwise or counterclockwise).
Advantages of Ring Topology
These are the advantages of using ring topology −
 Small cable segments are needed to connect two nodes
 Ideal for optical fibres as data travels in only one direction
 Very high transmission speeds possible
Disadvantages of Ring Topology
These are some the disadvantages of using ring topology −
 Failure of single node brings down the whole network
 Troubleshooting is difficult as many nodes may have to be inspected before
faulty one is identified
 Difficult to remove one or more nodes while keeping the rest of the network
intact
4. Star Topology
In star topology, server is connected to each node individually. Server is also called
the central node. Any exchange of data between two nodes must take place through
the server. It is the most popular topology for information and voice networks as
central node can process data received from source node before sending it to the
destination node.

Advantages of Star Topology


These are the advantages of using star topology −
 Failure of one node does not affect the network.
 Troubleshooting is easy as faulty node can be detected from central node
immediately.
 Simple access protocols required as one of the communicating nodes is
always the central node.
Disadvantages of Star Topology
These are the disadvantages of using star topology −
 Long cables may be required to connect each node to the server.
 Failure of central node brings down the whole network.
 Frame transmission in Bus LAN
In bus system a transmission from any station propagates throughout the medium
and can be received by all other stations. Two problems present themselves in this
arrangement. First, because a transmission from any one station can be received by
all other stations, there needs to be some way of indicating for whom the
transmission is intended. Second, a mechanism is needed to regulate transmission.

To solve these problems, stations transmit data in small blocks, known as frames.
Each frame consists of a portion of the data that a station wishes to transmit, plus a
frame header that contains control information. Each station on the bus is assigned
a unique address, or identifier, and the destination address for a frame is included
in its header Figure 15.3 illustrates the scheme.

In this example, station C wishes to transmit a frame of data to A. The frame


header includes A’s address. As the frame propagates along the bus, it passes B. B
observes the address and ignores the frame. A, on the other hand, sees that the
frame is addressed to itself and therefore copies the data from the frame as it goes
by. With the bus or tree, no special action needs to be taken to remove frames from
the medium. When a signal reaches the end of the medium, it is absorbed by the
terminator.
 Frame transmission in Ring LAN
Each station attaches to the network at a repeater and can transmit data onto the
network through the repeater. As with the bus and tree, data are transmitted in
frames. As a frame circulates past all the other stations, the destination station
recognizes its address and copies the frame into a local buffer as it goes by. The
frame continues to circulate until it returns to the source station, where it is
removed (Figure 15.4). Because multiple stations share the ring, medium access
control is needed to determine at what time each station may insert frames.

Switching

• Circuit switching

• Packet switching

• Frame relay

• Asynchronous transfer mode (ATM)


Circuit Switching In a circuit-switching network, a dedicated communications
path is established between two stations through the nodes of the network. That
path is a connected sequence of physical links between nodes. On each link, a
logical channel is dedicated to the connection. Data generated by the source station
are transmitted along the dedicated path as rapidly as possible. At each node,
incoming data are routed or switched to the appropriate outgoing channel without
delay. The most common example of circuit switching is the telephone network.

Packet Switching A quite different approach is used in a packet-switching


network. In this case, it is not necessary to dedicate transmission capacity along a
path through the network. Rather, data are sent out in a sequence of small chunks,
called packets. Each packet is passed through the network from node to node along
some path leading from source to destination. At each node, the entire packet is
received, stored briefly, and then transmitted to the next node. Packet-switching
networks are commonly used for terminal-to-computer and computer-to-computer
communications.

Fig: Example of

Packet Switching.
Frame Relay

 Frame is extended packet containing information about the destination and


responsible for selecting suitable route-correct virtual circuit at the minimum
bandwidth required.
 Frame relay is a protocol that defines how frames are routed using packet
switching technique at a faster rate than packet switching.
 It is used for traffic transmission between LANs and between LAN and
endpoints of WAN.
 Errors are checked and caught in end system.
 Frame relay was developed to take advantage of these high data rates and low
error rates. Whereas the original packet-switching networks were designed with
a data rate to the end user of about 64 kbps, frame relay networks are designed
to operate efficiently at user data rates of up to 2 Mbps.

ATM

Asynchronous transfer mode (ATM), sometimes referred to as cell relay,


is a culmination of developments in circuit switching and packet switching. ATM
can be viewed as an evolution from frame relay.

 ATM is a general class of digital packet switching technology that relay and
route traffic by means of an address contained within the header.
 Unlike more familiar packet technology or frame relay, ATM uses fixed
length packets called cells
 ATM is a switching technique (a set of protocol) using TDM
 Data is split and encoded into small packets of fixed size (called cell)
 Each packet can be routed differently along virtual paths set up in the
network
 Constant data rate using packet switching technique
 Anything from 10 Mbps to Gbps
 Voice, video, data

The most obvious difference between frame relay and ATM is that

Frame relay uses variable-length packets, called frames, and ATM uses fixed-
length packets, called cells.

As with frame relay, ATM provides little overhead for error control, depending on
the inherent reliability of the transmission system and on higher layers of logic in
the end systems to catch and correct errors.

By using a fixed packet length, the processing overhead is reduced even further for
ATM compared to frame relay.

The result is that ATM is designed to work in the range of 10s and 100s of Mbps,
and in the Gbps range.
 Comparison Between Frame Relay and ATM

BASIS FOR
FRAME RELAY ATM
COMPARISON

Packet size Variable Fixed

Processing overhead Increased Decreased

Implemented in more than one


Data transfer Takes place within a LAN
area network.

Cost Inexpensive Cost is higher


Speed Low High
QoS (Quality of
Quantifiable QoS is not provided. Offers quantifiable QoS.
Service)
No support is provided for error Error and flow control is
Error control
and flow control provided.
Data rate 64 Kbps up to 45 Mbps. 155.5 Mbps or 622 Mbps.

Reliability Low Good

Throughput Medium High

Delay High Less

Circuit switching
Advantage

 The dedicated circuit established between sender and receiver provides a


guaranteed data rate.
 Circuit is dedicated to the call – no interference, no sharing
 Guaranteed quality of service

Packet switching
Advantage

 Packet switching is cost efficient, because switching devices do not need


massive amount of secondary storage.
 Security
 Bandwidth used to full potential
 Devices of different speeds can communicate
 Not affected by line failure (redirects signal)
 Availability – no waiting for a direct connection to become available
PROTOCOL ARCHITECTURE, TCP/IP,
AND INTERNET-BASED APPLICATIONS
Protocol: A formatted blocks of data that obey a set of rules or conventions known
as a protocol. A protocol is used for communication between units in different
systems.
The key features of a protocol are as follows:
• Syntax: Concerns the format of the data blocks
• Semantics: Includes control information for coordination and error handling
• Timing: Includes speed matching and sequencing

Protocol Architecture
A protocol architecture is the layer structured of hardware and software that
supports exchange of data between systems.
In a protocol architecture, the modules are arranged in a vertical stack. Each layer
in the stack performs a related subset of the functions required to communicate
with another system.
Types:
 Three-layer model
 TCP/IP model
 OSI model
Three-layer model
In very general terms, communications can be said to involve three agents:
applications, computers, and networks. One example of an application is a file
transfer operation. Thus, the transfer of data from one application to another
involves first getting the data to the computer in which the application resides and
then getting it to the intended application within the computer. With these concepts
in mind, it appears natural to organize the communication task into three relatively
independent layers:
1. Network access layer
2. Transport layer
3. Application layer

1. Network access layer: The network access layer is concerned with the
exchange of data between a computer and the network to which it is attached. The
sending computer must provide the network with the address of the destination
computer, so that the network may route the data to the appropriate destination.
The sending computer may wish to invoke certain services, such as priority,
different standards have been developed for circuit switching, packet switching,
local area networks, and others.
2. Transport layer: Regardless of the nature of the applications that are
exchanging data, there is usually a requirement that data be exchanged reliably.
Thus, it makes sense to collect those mechanisms in a common layer shared
by all applications; this is referred to as the transport layer.
3. Application layer: Finally, the application layer contains the logic needed to
support the various user applications. For each different type of application, such
as file transfer, a separate module is needed that is peculiar to that application.
Protocol Data Unit (PDU)

Operation of the protocol architecture

TCP/IP Model:
The TCP/IP protocol architecture is a result of protocol research and development
conducted on the experimental packet-switched network, funded by the Defense
Advanced Research Projects Agency (DARPA), and is generally referred to as the
TCP/IP protocol suite. This protocol suite consists of a large collection of protocols
that have been issued as Internet standards by the Internet Activities Board (IAB).
We can organize the communication task for TCPIIP into five relatively
independent layers:
1. Application layer
2. Host-to-host, or transport layer
3. Internet layer
4. Network access layer
5. Physical layer

 The physical layer covers the physical interface between a data transmission
device (e.g., workstation, computer) and a transmission medium or network.
This layer is concerned with specifying the characteristics of the transmission
medium, the nature of the signals, the data rate, and related matters.
 The network access layer is concerned with the exchange of data between an
end system and the network to which it is attached. The sending computer must
provide the network with the address of the destination computer, so that the
network may route the data to the appropriate destination. The sending
computer may wish to invoke certain services, such as priority; different
standards have been developed for circuit-switching, packet-switching (e.g.,
X.25), local area networks (e.g., Ethernet), and others.
 The network access layer is concerned with access to and routing data across
a network for two end systems attached to the same network. In those cases
where two devices are attached to different networks, procedures are needed to
allow data to traverse multiple interconnected networks. This is the function of
the internet layer. The internet protocol (IP) is used at this layer to provide the
routing function across multiple networks.
 Regardless of the nature of the applications that are exchanging data, there is
usually a requirement that data be exchanged reliably. Thus, it makes sense to
collect those mechanisms in a common layer shared by all applications; this is
referred to as the host-to-host layer, or transport layer. The Transmission
Control Protocol (TCP) is the most commonly used protocol to provide this
functionality
 Finally, the application layer contains the logic needed to support the various
user applications. For each different type of application, such as file transfer, a
separate module is needed that is peculiar to that application.
 Operation of TCP and IP
The OSI Model
The open systems interconnection (OSI) model was developed by the International
Organization for Standardization (ISO) as a model for a computer communications
architecture and as a framework for developing protocol standards. It consists of
seven layers:

• Application
• Presentation
• Session
• Transport
• Network
• Data link
• Physical

Figure 2.6 illustrates the OSI model and provides a brief definition of the functions
performed at each layer. The intent of the OSI model is that protocols be developed
to perform the functions of each layer.
 Comparison TCP/IP vs OSI
The designers of OSI assumed that this model would come to
dominate computer communications, eventually replacing
TCP/IP. This has not happened. The overall seven-layer model
has not flourished. Instead, the TCP/IP architecture has come to
dominate. There are a number of reasons for this outcome.

Perhaps the most important is that the key TCP/IP protocols


were mature and well tested at a time when similar OSI
protocols were in the development stage. When businesses began
to recognize the need for interoperability across networks, only
TCP/IP was available and ready to go.

Another reason is that the OSI model is unnecessarily complex,


with seven layers to accomplish what TCP/IP does with fewer
layers.

 Integrated Services Digital Network (IDN)


 IDN was the first network to be developed by the consultative Committee for
International Telephony and Telegraph.
 Standardizes digital hardware; which meant combining functions of switching
and transmission into a single hardware.
 Disadvantages for example the customers still remained on the analog
connections. The companies offering telecommunication would still have to do
a much expensive analog-digital conversion.
 Integrated Services Digital Network (ISDN)

• ISDN is a set of communication standards for


simultaneous digital transmission of voice, video, data, and other network
services over the traditional circuits of the public switched telephone network.
• ISDN: both data and VoIP over a single line. The voice service is digitized at
the customer premises, combined with any data services, and then these
Integrated Services would be transmitted to the phone companies’ central
office.
• ISDN is employed as the network, data-link and physical layers in the context
of the OSI model.
• Narrowband ISDN (N-ISDN), and Broadband ISDN (B-ISDN)
• In a videoconference, ISDN provides simultaneous voice, video, and text
transmission between individual desktop videoconferencing systems and group
(room) videoconferencing systems.
 Broadband Integrated Services Digital Network (B-ISDN)
• B-ISDN is a concept that was conceived in 1980’s when telecommunication
industry expected a digital service to overtake the analog services. This was
done by adding end-to-end circuit switched services which named Broadband
Integrated Services Digital Network or simply B-ISDN.

S-ar putea să vă placă și