Data Transmission in PSTN: Baud Rate
Data Transmission in PSTN: Baud Rate
The  transmission  medium  is  the  physical   foundation  for  all   the  data
communications.   The  amount  of  data  carried  across  the  networks  crossed
the voice trafc level. The data is growing at a rate of 30 percent per year. It
will take 12 years to double the amount of voice carried on the network at
the current growth rate whereas the data is doubling appro!imately every
"0 days. In the beginning data transmission was organi#ed using telegraph
or  tele!  networks  as  they  could  carry  digital   signals  directly.   $ut  teletype
machines   were  slow   noisy  and  consumed  large  amounts   of   power.   The
speed was limited to 110 bauds. %$aud rate is a measure of the rate at which
binary data are transmitted and received&.  $ut data rates for transmission
have been on the rise. 'ith public switched telephone network there is a
possibility  of   carrying  signals  at  higher  speeds.   (ublic  switched  telephone
networks and electronic ()$*+s are designed to carry analog voice signals.
They can be used for data transmission by employing suitable interfaces.
Data Rates in PSTN
Baud rate. The ma!imum rate of signal transitions that can be supported by a
channel is known as baud rate. $aud rate is a close measure of information
throughput   or  the  e,ective  information  data  transfer  rate  from  sender  to
receiver. Thus baud rate is one that can be supported in a noiseless channel.
'e   know   a   voice   channel   in   a   (-T.  is   band   limited   with   a   nominal
bandwidth of 3.1 k/#. ) ma!imum data rate that a noiseless or ideal voice
channel can support can be obtained from the .y0uist theorem
1 2 2 $ log2 3 bps ...%1.1&
where 1 2 4a!imum data rate %in $aud or bps&
$ 2 $andwidth of the channel
3 2 .umber of discrete levels in the signals.
5or a 3 k/# channel and a binary signal the ma!imum data rate is 6000
bps if the signal level is two.
5or higher data rates we translate information rate into symbols per
second. ) symbol is any element of an electrical signal that can be used to
represent   one  or   more  binary  data  bits.   The  rate  at   which  symbols   are
transmitted is the symbol rate. This rate may be represented as a systems
baud rate. 5ig. 1.1 illustrates the pulse representation of the binary numbers
used to code the samples
In 5ig. 1.1 shown each three digit binary number that speci7es a 0uanti#ed
sample value is called a word. 8g is called guard time between pulses.
Bit rate. In the noisy channel there is an absolute ma!imum limit for the bit
rate.   This  limit  arises  because  the  di,erence  between  two  ad9acent  signal
levels become comparable to the noise level when the number of signal level
is increased. 5or noisy channel data rate is calculated by
1b 2 $ log2 %1 : -;.& ...%1.2&
'here 1b 2 1ata rate in noisy channel %in bps&
$ 2 $andwidth of the channel
-;. 2 -ignal to noise ratio.
5or -;. of 30 d$ and 3 k/# $andwidth noisy channel 1b is 30000 bps.
Relation between baud rate (or symbol rate) and bps : The baud rate
and bit rate are related as
1b 2 1 < n ...%11.3&
where n 2 number of bits re0uired to represent signal levels.
In the e!ample considered for baud rate e!planation n is assumed as one.
/ence  baud  rate  is  e0ual   to  bps.   5ig.   1.2  illustrates  the  relation  between
baud and bit rates.
)bove  %a& shows the baud rate e0ual to bit rate. 5ig. 11.2 %b& and %c& shows
the baud rate e0ual to one=half and one=fourth of bit rate respectively. It is
proved that up to 2>00 bauds may be transmitted reliably through a (-T.
voice   channel.   $y   increasing   the   signal   levels   the   e,ective   bit   rate
increases.
5or   low=speed  applications   the  di,erence  between  baud  and  bit   rate  are
insigni7cant.
Thus  300  and  1200  bps  modems  orginally  used  with  personal   computers
were fre0uently referred
to as 300 or 1200 baud modems.
Data Communications Link
In order to communicate from a terminal computer or any e0uipment 
the following si! parts have to be put together in proper order.
1. The transmission medium that carries the trafc between source and 
destination.
2. 1ata communication e0uipment or data circuit terminating e0uipment 
%18?&.
3. 1ata terminal e0uipment %1T?&.
>. 8ommunication protocols and software.
@. Terminal devices.
6. Interface.
below shows the typical arrangement of the communication link for the data 
communication. 1ata link refers to the process of connecting or linking two 
stations together.
Transmission   medium.  The   transmission   medium  include   communication
channels path links trunks and circuits. The transmission medium may be a
telephone  lines   coa!ial   cable   twisted  pair   5iber  cable   radio  waves  %free
space& microwave link or satellite link.
Terminal   devices.  These  are  the  end  points   in   a   communication   link.
Terminal   devices  are  also  called  as  nodes.   5or  the  two  point  network   the
node points are the primary station and the remote or secondary station. )
primary station is responsible for establishing and maintaining the data link
between  it   and  a  secondary  station.   The  terminal   devices  includes  main
frame computer personal computer peripherals such as printers keyboards
5)* machines and data display terminals.
Data  terminal   equipment  (DTF).  The  terminal   devices   communication
station  A)BT  and line  control  unit %38A& grouped together and named as
1T?. 5ig. 11.> shows typical arrangement of 1T?.
Connection-Oriented and Connectionless Services
Layers can offer two different types of service to the layers above them: connection-oriented and 
connectionless. In this section we will look at these two types and examine the differences 
between them.
Connection-oriented service is modeled after the telephone system. To talk to someone, you pick
up the phone, dial the number, talk, and then han up. !imilarly, to use a connection-oriented
network service, the service user first establishes a connection,  uses the connection,  and then
releases the connection. The essential aspect of a connection is that it acts like a tube: the sender
pushes ob"ects #bits$ in at one end, and the receiver takes them out at the other end. In most cases
the order is preserved so that the bits arrive in the order they were sent.
In  some  cases  when  a  connection  is  established,   the  sender,   receiver,   and  subnet   conduct   a
neotiation  about   parameters  to  be  used,   such  as  maximum  messae  si%e,   &uality  of  service
re&uired, and other issues. Typically, one side makes a proposal and the other side can accept it,
re"ect it, or make a counterproposal.
In  contrast,   connectionless  service  is  modeled  after   the  postal   system.   'ach  messae  #letter$
carries the full destination address, and each one is routed throuh the system independent of all
the others. (ormally, when two messaes are sent to the same destination, the first one sent will
be the first one to arrive. )owever, it is possible that the first one sent can be delayed so that the
second one arrives first.
'ach service can be characteri%ed by a &uality of service. !ome services are reliable in the sense
that   they  never   lose  data.   *sually,   a  reliable  service  is  implemented  by  havin  the  receiver
acknowlede   the   receipt   of   each   messae   so   the   sender   is   sure   that   it   arrived.   The
acknowledement   process  introduces  overhead  and  delays,   which  are  often  worth  it   but   are
sometimes undesirable.
+ typical situation in which a reliable connection-oriented service is appropriate is file transfer.
The owner of the file wants to be sure that all the bits arrive correctly and in the same order they
were sent. ,ery few file transfer customers would prefer a service that occasionally scrambles or
loses a few bits, even if it is much faster.
-eliable  connection-oriented  service  has  two  minor   variations:   messae  se&uences   and  byte
streams.   In  the  former   variant,   the  messae  boundaries   are  preserved.   .hen  two  /012-byte
messaes   are  sent,   they  arrive  as   two  distinct   /012-byte  messaes,   never   as  one  1023-byte
messae. In the latter, the connection is simply a stream of bytes, with no messae boundaries.
.hen 1023 bytes arrive at the receiver, there is no way to tell if they were sent as one 1023-byte
messae, two /012-byte messaes, or 1023 /-byte messaes. If the paes of a book are sent over
a  network  to  a  phototypesetter   as   separate  messaes,   it   miht   be  important   to  preserve  the
messae boundaries. 4n the other hand, when a user los into a remote server, a byte stream
from the user5s computer to the server is all that is needed. 6essae boundaries are not relevant.
+s mentioned above, for some applications, the transit delays introduced by acknowledements
are unacceptable.  4ne such application is diiti%ed voice traffic. It is preferable for telephone
users to hear a bit of noise on the line from time to time than to experience a delay waitin for
acknowledements. !imilarly, when transmittin a video conference, havin a few pixels wron
is no problem, but havin the imae "erk alon as the flow stops to correct errors is irritatin.
(ot   all   applications   re&uire   connections.   7or   example,   as   electronic   mail   becomes   more
common,   electronic   "unk  is   becomin   more   common  too.   The   electronic   "unk-mail   sender
probably does not want to o to the trouble of settin up and later tearin down a connection "ust
to send one item. (or is /00 percent reliable delivery essential, especially if it costs more. +ll
that is needed is a way to send a sinle messae that has a hih probability of arrival, but no
uarantee.   *nreliable   #meanin   not   acknowleded$   connectionless   service   is   often   called
dataram   service,   in   analoy   with   teleram   service,   which   also   does   not   return   an
acknowledement to the sender.
In other situations, the convenience of not havin to establish a connection to send one short
messae   is   desired,   but   reliability  is   essential.   The  acknowleded  dataram  service  can  be
provided  for  these  applications.   It   is  like  sendin  a  reistered  letter   and  re&uestin  a  return
receipt. .hen the receipt comes back, the sender is absolutely sure that the letter was delivered
to the intended party and not lost alon the way.
!till   another  service  is  the  re&uest-reply  service.   In  this  service  the  sender  transmits  a  sinle
dataram containin a re&uest8 the reply contains the answer. 7or example, a &uery to the local
library askin where *ihur is spoken falls into this cateory. -e&uest-reply is commonly used
to implement communication in the client-server model: the client issues a re&uest and the server
responds to it. 9elow fi summari%es the types of services discussed above.
The concept of usin unreliable communication may be confusin at first. +fter all, why would
anyone actually prefer unreliable communication to reliable communication: 7irst of all, reliable
communication   #in  our   sense,   that   is,   acknowleded$   may  not   be   available.   7or   example,
'thernet   does  not   provide  reliable  communication.   ;ackets  can  occasionally  be  damaed  in
transit. It is up to hiher protocol levels to deal with this problem. !econd, the delays inherent in
providin a reliable service may be unacceptable,  especially in real-time applications such as
multimedia. 7or these reasons, both reliable and unreliable communication coexist.
The OSI Reference Model
The 4!I model #minus the physical medium$ is shown in fi below. This model is based on a
proposal   developed  by  the  International   !tandards  4rani%ation  #I!4$  as  a  first   step  toward
international standardi%ation of the protocols used in the various layers #<ay and =immermann,
/>3?$. It was revised in />>@ #<ay, />>@$. The model is called the  I!4 4!I #4pen !ystems
Interconnection$ -eference 6odel because it deals with connectin open systems-that is, systems
that are open for communication with other systems. .e will "ust call it the 4!I model for short.
Figure for . The OSI reference model.
The 4!I model has seven layers. The principles that were applied to arrive at the seven layers 
can be briefly summari%ed as follows:
/. + layer should be created where a different abstraction is needed.
1. 'ach layer should perform a well-defined function.
?. The function of each layer should be chosen with an eye toward definin internationally 
standardi%ed protocols.
2. The layer boundaries should be chosen to minimi%e the information flow across the 
interfaces.
@. The number of layers should be lare enouh that distinct functions need not be thrown
toether in the same layer out of necessity and small enouh that the architecture does not
become unwieldy.
9elow we will discuss each layer of the model in turn, startin at the bottom layer. (ote that the
4!I model itself is not a network architecture because it does not specify the exact services and
protocols to be used in each layer. It "ust tells what each layer should do. )owever, I!4 has also
produced standards for all the layers, althouh these are not part of the reference model itself.
'ach one has been published as a separate international standard.
The Physical Layer
The physical layer  is concerned with transmittin raw bits over a communication channel. The
desin issues have to do with makin sure that when one side sends a / bit, it is received by the
other side as a / bit, not as a 0 bit. Typical &uestions here are how many volts should be used to
represent a / and how many for a 0, how many nanoseconds a bit lasts, whether transmission
may proceed simultaneously in both directions, how the initial connection is established and how
it is torn down when both sides are finished, and how many pins the network connector has and
what each pin is used for. The desin issues here larely deal with mechanical, electrical, and
timin interfaces, and the physical transmission medium, which lies below the physical layer.
The ata Lin! Layer
The main task of the data link layer  is to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer. It accomplishes this task by
havin the sender break up the input data into data frames  #typically a few hundred or a few
thousand  bytes$   and  transmit   the  frames   se&uentially.   If   the  service  is  reliable,   the  receiver
confirms correct receipt of each frame by sendin back an acknowledement frame.
+nother issue that arises in the data link layer #and most of the hiher layers as well$ is how to
keep a fast transmitter from drownin a slow receiver in data. !ome traffic reulation mechanism
is  often  needed  to  let   the  transmitter   know  how  much  buffer   space  the  receiver   has  at   the
moment. 7re&uently, this flow reulation and the error handlin are interated.
9roadcast networks have an additional issue in the data link layer: how to control access to the
shared channel. + special sublayer of the data link layer, the medium access control sublayer,
deals with this problem.
The "et#or! Layer
The network layer  controls the operation of the subnet. + key desin issue is determinin how
packets are routed from source to destination. -outes can be based on static tables that are 55wired
into55   the   network   and   rarely   chaned.   They   can   also   be   determined   at   the   start   of   each
conversation, for example, a terminal session #e.., a loin to a remote machine$. 7inally, they
can be hihly dynamic, bein determined anew for each packet, to reflect the current network
load.
If too many packets are present in the subnet at the same time, they will et in one another5s way,
formin bottlenecks.  The control  of such  conestion  also  belons to the network layer.  6ore
enerally, the &uality of service provided #delay, transit time, "itter, etc.$ is also a network layer
issue.
.hen a packet has to travel from one network to another to et to its destination, many problems
can arise. The addressin used by the second network may be different from the first one. The
second one may not accept the packet at all because it is too lare. The protocols may differ, and
so  on.   It   is  up  to  the  network  layer   to  overcome  all   these  problems  to  allow  heteroeneous
networks to be interconnected.
In broadcast networks, the routin problem is simple, so the network layer is often thin or even 
nonexistent.
The Trans$ort Layer
The basic function of the transport layer  is to accept data from above, split it up into smaller
units if need be, pass these to the network layer, and ensure that the pieces all arrive correctly at
the other end. 7urthermore, all this must be done efficiently and in a way that isolates the upper
layers from the inevitable chanes in the hardware technoloy.
The transport layer also determines what type of service to provide to the session layer, and,
ultimately, to the users of the network. The most popular type of transport connection is an error-
free point-to-point channel that delivers messaes or bytes in the order in which they were sent.
)owever, other possible kinds of transport service are the transportin of isolated messaes, with
no   uarantee   about   the   order   of   delivery,   and   the   broadcastin   of   messaes   to   multiple
destinations. The type of service is determined when the connection is established. #+s an aside,
an error-free channel is impossible to achieve8 what people really mean by this term is that the
error rate is low enouh to inore in practice.$
The transport layer is a true end-to-end layer, all the way from the source to the destination. In
other words, a proram on the source machine carries on a conversation with a similar proram
on the destination machine, usin the messae headers and control messaes. In the lower layers,
the  protocols   are  between  each  machine  and  its   immediate  neihbors,   and  not   between  the
ultimate   source   and  destination   machines,   which  may  be   separated   by  many  routers.   The
difference between layers / throuh ?, which are chained, and layers 2 throuh A, which are end-
to-end, is illustrated in 7i. /-10.
The Session Layer
The   session  layer   allows   users   on  different   machines   to  establish  sessions  between   them.
!essions offer various services, includin  dialo control  #keepin track of whose turn it is to
transmit$, token manaement #preventin two parties from attemptin the same critical operation
at   the  same  time$,   and  synchroni%ation  #checkpointin  lon  transmissions   to  allow  them  to
continue from where they were after a crash$.
The Presentation Layer
*nlike lower layers, which are mostly concerned with movin bits around, the presentation layer
is concerned with the syntax and semantics of the information transmitted. In order to make it
possible for computers with different data representations to communicate, the data structures to
be exchaned can be defined in an abstract way, alon with a standard encodin to be used 55on
the wire.55 The presentation layer manaes these abstract data structures and allows hiher-level
data structures #e.., bankin records$, to be defined and exchaned.
The %$$lication Layer
The application layer  contains a variety of protocols that are commonly needed by users. 4ne
widely-used application protocol is )TT; #)yperText Transfer ;rotocol$, which is the basis for
the .orld .ide .eb. .hen a browser wants a .eb pae, it sends the name of the pae it wants
to the server usin )TT;. The server then sends the pae back. 4ther application protocols are
used for file transfer, electronic mail, and network news.
The TCP&IP Reference Model
Let us now turn from the 4!I reference model to the reference model used in the randparent of
all   wide  area  computer   networks,   the  +-;+('T,  and  its  successor,   the  worldwide  Internet.
+lthouh we will ive a brief history of the +-;+('T later, it is useful to mention a few key
aspects   of   it   now.   The   +-;+('T  was   a   research   network   sponsored   by  the   <o<  #*.!.
<epartment   of   <efense$.   It   eventually  connected   hundreds   of   universities   and  overnment
installations, usin leased telephone lines. .hen satellite and radio networks were added later,
the existin protocols had trouble interworkin with them, so a new reference architecture was
needed. Thus, the ability to connect multiple networks in a seamless way was one of the ma"or
desin  oals  from  the  very  beinnin.   This  architecture  later   became  known  as  the  TC;BI;
-eference 6odel, after its two primary protocols. It was first defined in #Cerf and Cahn, />A2$.
+ later perspective is iven in #Leiner et al., />3@$. The desin philosophy behind the model is
discussed in #Clark, />33$.
Diven the <o<5s worry that some of its precious hosts, routers, and internetwork ateways miht
et blown to pieces at a moment5s notice, another ma"or oal was that the network be able to
survive  loss  of   subnet   hardware,   with  existin  conversations   not   bein  broken  off.   In  other
words, <o< wanted connections to remain intact as lon as the source and destination machines
were functionin, even if some of the machines or transmission lines in between were suddenly
put   out  of  operation.   7urthermore,   a  flexible  architecture  was  needed  since  applications  with
diverent   re&uirements   were  envisioned,   ranin  from  transferrin  files   to  real-time  speech
transmission.
The Internet Layer
+ll these re&uirements led to the choice of a packet-switchin network based on a connectionless
internetwork  layer.   This  layer,   called  the  internet   layer,   is  the  linchpin  that   holds  the  whole
architecture toether. Its "ob is to permit hosts to in"ect packets into any network and have them
travel independently to the destination #potentially on a different network$. They may even arrive
in a different order than they were sent, in which case it is the "ob of hiher layers to rearrane
them, if in-order delivery is desired. (ote that 55internet55  is used here in a eneric sense, even
thouh this layer is present in the Internet.
The analoy here is with the #snail$ mail system. + person can drop a se&uence of international
letters into a mail box in one country, and with a little luck, most of them will be delivered to the
correct address in the destination country. ;robably the letters will travel throuh one or more
international mail ateways alon the way, but this is transparent to the users. 7urthermore, that
each country #i.e., each network$ has its own stamps, preferred envelope si%es, and delivery rules
is hidden from the users.
The internet layer defines an official packet format and protocol called I; #Internet ;rotocol$.
The  "ob  of  the  internet   layer   is  to  deliver  I; packets  where  they  are  supposed  to  o.   ;acket
routin  is   clearly  the  ma"or   issue  here,   as   is   avoidin  conestion.   7or   these  reasons,   it   is
reasonable to say that the TC;BI; internet layer is similar in functionality to the 4!I network
layer. 7iure /-1/ shows this correspondence.
Figure '-('. The TCP&IP reference model.
The Trans$ort Layer
The layer above the internet layer in the TC;BI; model is now usually called the transport layer.
It   is   desined   to   allow  peer   entities   on   the   source   and   destination   hosts   to   carry   on   a
conversation, "ust as in the 4!I transport layer. Two end-to-end transport protocols have been
defined  here.   The  first   one,   TC;  #Transmission  Control   ;rotocol$,   is   a  reliable  connection-
oriented protocol that allows a byte stream oriinatin on one machine to be delivered without
error on any other machine in the internet. It framents the incomin byte stream into discrete
messaes and  passes each  one on to the internet   layer. +t  the  destination,  the  receivin TC;
process reassembles the received messaes into the output stream. TC; also handles flow control
to make sure a fast sender cannot swamp a slow receiver with more messaes than it can handle.
The   second   protocol   in   this   layer,   *<;   #*ser   <ataram   ;rotocol$,   is   an   unreliable,
connectionless protocol for applications that do not want TC;5s se&uencin or flow control and
wish to provide their own. It is also widely used for one-shot, client-server-type re&uest-reply
&ueries and applications in which prompt delivery is more important than accurate delivery, such
as transmittin speech or video. The relation of I;, TC;, and *<; is shown in 7i. /-11. !ince
the model was developed, I; has been implemented on many other networks.
Figure '-((. Protocols and net#or!s in the TCP&IP model initially.
The %$$lication Layer
The TC;BI; model does not have session or presentation layers. (o need for them was perceived,
so they were not included. 'xperience with the 4!I model has proven this view correct: they are
of little use to most applications.
4n top of the transport layer is the application layer. It contains all the hiher-level protocols.
The  early  ones  included  virtual   terminal   #T'L('T$,   file  transfer  #7T;$,   and  electronic  mail
#!6T;$, as shown in 7i. /-11. The virtual terminal protocol allows a user on one machine to
lo onto a distant machine and work there. The file transfer protocol provides a way to move
data efficiently from one machine to another. 'lectronic mail was oriinally "ust a kind of file
transfer, but later a speciali%ed protocol #!6T;$ was developed for it. 6any other protocols have
been added to these over the years: the <omain (ame !ystem #<(!$ for mappin host names
onto their network addresses, ((T;, the protocol for movin *!'('T news articles around, and
)TT;, the protocol for fetchin paes on the .orld .ide .eb, and many others.
The )ost-to-"et#or! Layer
9elow the internet layer is a reat void. The TC;BI; reference model does not really say much
about what happens here, except to point out that the host has to connect to the network usin
some protocol so it can send I; packets to it. This protocol is not defined and varies from host to
host and network to network. 9ooks and papers about the TC;BI; model rarely discuss it.
%synchronous Transfer Mode
Eet   another,   and  far   more   important,   connection-oriented   network   is   +T6  #+synchronous
Transfer 6ode$. The reason for the somewhat strane name is that in the telephone system, most
transmission is synchronous #closely tied to a clock$, and +T6 is not.
+T6 was desined in the early />>0s and launched amid truly incredible hype #Dinsbur, />>F8
Doralski, />>@8 Ibe, />>A8 Cim et al., />>28 and !tallins, 1000$. +T6 was oin to solve all the
world5s networkin and telecommunications problems by merin voice, data, cable television,
telex,   teleraph,   carrier  pieon,   tin  cans  connected  by  strins,   tom-toms,   smoke  sinals,   and
everythin else into a sinle interated system that could do everythin for everyone. It did not
happen. In lare part, the problems were similar to those we described earlier concernin 4!I,
that   is,   bad  timin,   technoloy,   implementation,   and  politics.   )avin  "ust   beaten  back  the
telephone companies in round /, many in the Internet community saw +T6 as Internet versus the
Telcos: the !e&uel. 9ut it really was not, and this time around even diehard dataram fanatics
were aware that the Internet5s &uality of service left a lot to be desired. To make a lon story
short,  +T6  was much more  successful  than 4!I,  and  it  is  now widely  used  deep within  the
telephone system, often for movin I; packets. 9ecause it is now mostly used by carriers for
internal transport, users are often unaware of its existence, but it is definitely alive and well.
%TM *irtual Circuits
!ince +T6 networks are connection-oriented, sendin data re&uires first sendin a packet to set
up the connection. +s the setup packet wends its way throuh the subnet, all the routers on the
path make an entry in their internal tables notin the existence of the connection and reservin
whatever resources are needed for it.  Connections are often called virtual circuits, in analoy
with the physical circuits used within the telephone system. 6ost +T6 networks also support
permanent virtual circuits, which are permanent connections between two #distant$ hosts. They
are similar to leased lines in the telephone world. 'ach connection, temporary or permanent, has
a uni&ue connection identifier. + virtual circuit is illustrated in 7i. /-?0.
Figure '-+,. % virtual circuit.
4nce a connection has been established, either side can bein transmittin data. The basic idea
behind +T6 is to transmit all information in small, fixed-si%e packets called cells. The cells are
@? bytes lon, of which @ bytes are header and 23 bytes are payload, as shown in 7i. /-?/. ;art
of   the   header   is   the   connection   identifier,   so  the   sendin  and  receivin   hosts   and  all   the
intermediate routers can tell which cells belon to which connections. This information allows
each router to know how to route each incomin cell. Cell routin is done in hardware, at hih
speed. In fact, the main arument for havin fixed-si%e cells is that it is easy to build hardware
routers   to  handle  short,   fixed-lenth  cells.   ,ariable-lenth  I;  packets   have  to  be  routed  by
software, which is a slower process. +nother plus of +T6 is that the hardware can be set up to
copy  one  incomin  cell   to  multiple  output   lines,   a  property  that   is   re&uired  for   handlin  a
television proram that is bein broadcast to many receivers. 7inally, small cells do not block
any line for very lon, which makes uaranteein &uality of service easier.
Figure '-+'. %n %TM cell.
+ll cells follow the same route to the destination. Cell delivery is not uaranteed, but their order
is. If cells / and 1 are sent in that order, then if both arrive, they will arrive in that order, never
first 1 then /. 9ut either or both of them can be lost alon the way. It is up to hiher protocol
levels to recover from lost cells. (ote that althouh this uarantee is not perfect, it is better than
what the Internet provides. There packets can not only be lost, but delivered out of order as well.
+T6, in contrast, uarantees never to deliver cells out of order.
+T6 networks are orani%ed like traditional .+(s, with lines and switches #routers$. The most
common speeds for +T6 networks are /@@ 6bps and F11 6bps, althouh hiher speeds are also
supported. The /@@-6bps speed was chosen because this is about what is needed to transmit hih
definition television. The exact choice of /@@.@1 6bps was made for compatibility with +TGT5s
!4('T transmission system.The F11 6bps speed was chosen so that four /@@-6bps channels
could be sent over it.
The %TM Reference Model
+T6 has its own reference model,   different from  the 4!I  model  and also  different from the
TC;BI; model. This model is shown in 7i. /-?1. It consists of three layers, the physical, +T6,
and +T6 adaptation layers, plus whatever users want to put on top of that.
Figure '-+(. The %TM reference model.
The physical layer deals with the physical medium: voltaes, bit timin, and various other issues.
+T6 does not prescribe a particular set of rules but instead says that +T6 cells can be sent on a
wire or fiber by themselves, but they can also be packaed inside the payload of other carrier
systems. In other words, +T6 has been desined to be independent of the transmission medium.
The +T6 layer deals with cells and cell transport. It defines the layout of a cell and tells what the
header fields mean. It also deals with establishment and release of virtual circuits. Conestion
control is also located here.
9ecause most applications do not want to work directly with cells #althouh some may$, a layer
above the +T6 layer has been defined to allow users to send packets larer than a cell. The +T6
interface sements these packets, transmits the cells individually, and reassembles them at the
other end. This layer is the ++L #+T6 +daptation Layer$.
*nlike the earlier two-dimensional reference models, the +T6 model is defined as bein three-
dimensional, as shown in 7i. /-?1. The user plane deals with data transport, flow control, error
correction, and other user functions. In contrast, the control plane is concerned with connection
manaement.   The  layer   and  plane  manaement   functions  relate  to  resource  manaement   and
interlayer coordination.
The physical and ++L layers are each divided into two sublayers, one at the bottom that does the
work and a converence sublayer on top that provides the proper interface to the layer above it.
The functions of the layers and sublayers are iven in 7i. /-??.
Figure '-++. The %TM layers and su-layers. and their functions.
The ;6< #;hysical 6edium <ependent$ sublayer interfaces to the actual cable. It moves the bits
on  and  off   and  handles   the  bit   timin.   7or   different   carriers   and  cables,   this   layer   will   be
different.
The other sublayer of the physical layer is the TC #Transmission Converence$ sublayer. .hen
cells are transmitted, the TC layer sends them as a strin of bits to the ;6< layer. <oin this is
easy. +t the other end, the TC sublayer ets a pure incomin bit stream from the ;6< sublayer.
Its "ob is to convert this bit stream into a cell stream for the +T6 layer. It handles all the issues
related   to   tellin   where   cells   bein   and   end   in   the   bit   stream.   In   the   +T6  model,   this
functionality is in the physical layer. In the 4!I model and in pretty much all other networks, the
"ob of framin, that is, turnin a raw bit stream into a se&uence of frames or cells, is the data link
layer5s task.
+s we mentioned earlier, the +T6 layer manaes cells, includin their eneration and transport.
6ost of the interestin aspects of +T6 are located here. It is a mixture of the 4!I data link and
network layers8 it is not split into sublayers.
The   ++L  layer   is   split   into   a   !+-  #!ementation   +nd   -eassembly$   sublayer   and   a   C!
#Converence !ublayer$.  The lower sublayer breaks up packets into cells on the transmission
side and puts them back toether aain at the destination. The upper sublayer makes it possible to
have +T6 systems offer different kinds of services to different applications #e.., file transfer
and video on demand have different re&uirements concernin error handlin, timin, etc.$.
+s it is probably mostly downhill for +T6 from now on, we will not discuss it further in this
book. (evertheless, since it has a substantial installed base, it will probably be around for at least
a  few  more  years.   7or  more  information  about  +T6,   see  #<obrowski   and  Drise,   100/8   and
Dadecki and )eckart, />>A$.
Pac!et S#itching
.ith messae switchin, there is no limit at all on block si%e, which means that routers #in a
modern system$ must have disks to buffer lon blocks. It also means that a sinle block can tie
up a router-router line for minutes, renderin messae switchin useless for interactive traffic. To
et   around  these  problems,   packet   switchin  was  invented,   as  described  in  Chap.   /.   ;acket-
switchin networks place a tiht upper limit on block si%e, allowin packets to be buffered in
router   main  memory  instead  of   on  disk.   9y  makin  sure  that   no  user   can  monopoli%e  any
transmission   line   very   lon   #milliseconds$,   packet-switchin   networks   are   well   suited   for
handlin interactive traffic. + further advantae of packet switchin over messae switchin is
shown in 7i. 1-?>#b$ and #c$: the first packet of a multipacket messae can be forwarded before
the second one has fully arrived, reducin delay and improvin throuhput. 7or these reasons,
computer networks are usually packet switched, occasionally circuit switched, but never messae
switched.
Circuit switchin and packet switchin differ in many respects. To start with, circuit switchin
re&uires that a circuit be set up end to end before communication beins. ;acket switchin does
not re&uire any advance setup. The first packet can "ust be sent as soon as it is available.
The result of the connection setup with circuit switchin is the reservation of bandwidth all the
way from the sender to the receiver. +ll packets follow this path. +mon other properties, havin
all   packets   follow  the  same   path  means   that   they  cannot   arrive  out   of   order.   .ith  packet
switchin there is no path, so different packets can follow different paths, dependin on network
conditions at the time they are sent. They may arrive out of order.
;acket switchin is more fault tolerant than circuit switchin. In fact, that is why it was invented.
If a switch oes down, all of the circuits usin it are terminated and no more traffic can be sent
on any of them. .ith packet switchin, packets can be routed around dead switches.
!ettin up a path in advance also opens up the possibility of reservin bandwidth in advance. If
bandwidth  is  reserved,   then  when  a  packet   arrives,   it   can  be  sent   out   immediately  over   the
reserved bandwidth. .ith packet switchin, no bandwidth is reserved, so packets may have to
wait their turn to be forwarded.
)avin bandwidth reserved in advance means that no conestion can occur when a packet shows
up #unless more packets show up than expected$. 4n the other hand, when an attempt is made to
establish a circuit, the attempt can fail due to conestion. Thus, conestion can occur at different
times with circuit switchin #at setup time$ and packet switchin #when packets are sent$.
If a circuit has been reserved for a particular user and there is no traffic to send, the bandwidth of
that   circuit   is   wasted.   It   cannot   be  used  for   other   traffic.   ;acket   switchin  does   not   waste
bandwidth and thus is more efficient from a system-wide perspective. *nderstandin this trade-
off is crucial for comprehendin the difference between circuit switchin and packet switchin.
The  trade-off   is   between  uaranteed  service  and  wastin  resources   versus   not   uaranteein
service and not wastin resources.
;acket   switchin  uses  store-and-forward  transmission.  + packet   is  accumulated  in  a  router5s
memory, then sent on to the next router. .ith circuit switchin, the bits "ust flow throuh the
wire continuously. The store-and-forward techni&ue adds delay.
+nother difference is that circuit switchin is completely transparent. The sender and receiver
can use any bit rate, format, or framin method they want to. The carrier does not know or care.
.ith packet switchin, the carrier determines the basic parameters. + rouh analoy is a road
versus a railroad. In the former, the user determines the si%e, speed, and nature of the vehicle8 in
the latter, the carrier does. It is this transparency that allows voice, data, and fax to coexist within
the phone system.
+ final difference between circuit and packet switchin is the charin alorithm. .ith circuit
switchin,   charin  has   historically  been  based  on  distance   and  time.   7or   mobile   phones,
distance usually does not play a role, except for international calls, and time plays only a minor
role #e.., a callin plan with 1000 free minutes costs more than one with /000 free minutes and
sometimes niht or weekend calls are cheaper than normal$. .ith packet switchin, connect time
is not an issue, but the volume of traffic sometimes is. 7or home users, I!;s usually chare a flat
monthly rate because it is less work for them and their customers can understand this model
easily, but backbone carriers chare reional networks based on the volume of their traffic. The
differences are summari%ed in 7i. 1-20.
Figure (-/,. % com$arison of circuit-s#itched and $ac!et-s#itched net#or!s.
9oth circuit switchin and packet switchin are important enouh that we will come back to
them shortly and describe the various technoloies used in detail