Free Essay

Frame Relay and X.25

In:

Submitted By fikkie
Words 429
Pages 2
NAME: AKINDELE ADETOUN OLUWAFISAYO
MATRIC NUMBER: 110502029
COURSE CODE: CSC 410
COURSE TITLE: DATA COMMUNICATION AND NETWORKS
LECTURER: DR. OGUNDIPE
DATE: 28TH APRIL, 2014

QUESTION:
Differentiate between X.25 and Frame Relay.
The biggest difference between Frame Relay and X.25 is that X.25 guarantees data integrity and network managed flow control at the cost of some network delays. Frame Relay switches packets end to end much faster, but there is no guarantee of data integrity at all. Frame Relay is cost effective, partly due to the fact that the network buffering requirements are carefully optimized. Compared to X.25, with its store and forward mechanism and full error correction, network buffering is minimal. Frame Relay is also much faster than X.25: the frames are switched to their destination with only a few byte time delay, as opposed to several hundred milliseconds delay on X.25.

An evolution beyond the X.25 protocol, Frame Relay is a network interface standard based on statistical multiplexing. By combining the flexibility of X.25 packet protocol with the performance of private lines, Frame Relay Service can move data much more efficiently than the packet protocol. In fact, Frame Relay Service streamlines the processing steps associated with X.25 error detection/correction and routing procedures.

Frame Relay technology takes advantage of highly accurate digital networks with their reduced line errors and intelligent network end point devices with their end-to-end error checking protocols. The reduced per packet processing time allows you to process more user data. Also, the upgrade to Frame Relay Service is simple and cost effective because Frame Relay Service is based on the HDLC protocol, which is popular among LAN bridges, routers and other communications devices.

The following are also the comparisons between Frame Relay and X.2
1. Call Control
X.25 connection establishment and release (call control) use in-band signalling within the same virtual channel used for user data transmission causing additional overhead. Frame Relay call control uses separate virtual channels identified by reserved DLCI using the LMI (Local Management Interface) protocol.
2. Routing vs. Switching
X.25 performs packet switching on OSI layer 3 (network layer); Frame Relay performs packet switching on OSI layer 2 (data-link). Frame Relay does not use any layer 3 protocol.
3. Flow Control
Frame Relay (FR) doesn't perform flow control between frame handlers (FR routers). X.25 routers have to acknowledge each frame; in case of frame errors frames have to be retransmitted and acknowledged. Frame Relay relies on flow control performed by higher layer protocols.

Similar Documents

Free Essay

It530 - Unit 3 Frame Relay in a Wan

...medium-sized business that will need to consider WAN technology using Frame relay technology within the company for the future expansion to other towns and cities. The Frame relay analysis will include the operation of frame relay, what equipment is needed, what switching technologies are employed by frame relay and how frame relay is actually brought into the business premises. Frame Relay in a WAN Frame Relay Frame Relay is one of the most common WAN protocols. This high performance protocol operates at the Physical and Data Link layers of the OSI, performing any type of serial interface. This technology was developed at an attempt to resolve some of the communication problems that the other protocols would not. There was an increased need for higher speeds, an increased need for larger bandwidth efficiency, an increase in intelligent network devices that lower protocol processing, and the need to connect LANs and WANs. The Frame relay evolved passed the X.25 as a less careful, but less burdensome protocol designed to transmit packets across a network. (Horton, 2010) Frame relay is known all around the world in many different networks. There are many terms that describe and refer to Frame relay and Wide Area Networking in telecommunications. These terms are also noted when referring to Local Area Networking as well. The table below describes these terms. (Horton, 2010) Table 1 – Frame Relay Terms CIR Committed Information Rate – the minimum level of throughput...

Words: 1228 - Pages: 5

Free Essay

Ntc 362

...Protocol Paper NTC/362 Fundamentals of Networking Protocol Paper Introduction Switching, whether it is packet or circuit, is an essential portion of any network. By not using the right equipment, or using it properly, you can cause massive lag time or jitter within your own system. This will result in packet collision, loss of data, and could result in loss of business. Open Systems Interconnection Protocol Model In order for two computers to be able to interchange data and information, they first must establish communicate with each other. Protocols allow for this communication to take place (Goleniewski). The Open Systems Interconnection (OSI) Model gives a logical design that is used for communication between systems. The OSI Model is layered with seven subcomponents: Application (7), Presentation (6), Session (5), Transport (4), Network (3), Data Link (2) and Physical (1). Each one of these layers presents a collection of services. These services are provided to the layers that are above and below that specific layer. In addition to these, the OSI Model also details the transfer of computer packets using layer protocols (Goleniewski). The Application layer has the role of maintaining the exchange of information between a computer’s programs and services on the network. The Presentation layer makes it possible for software applications to read information by formatting it. Support for connections between sessions is handled through the Session layer. It...

Words: 1290 - Pages: 6

Premium Essay

Packet Switching

...Некоммерческое Акционерное Общество АЛМАТИНСКИЙ УНИВЕРСИТЕТ ЭНЕРГЕТИКИ И СВЯЗИ Кафедра иностранных языков СЕМЕСТРОВАЯ РАБОТА №2 По дисциплине: «Английский язык» Технический перевод Специальность: 6M071900 – Радиотехника электроника и телекоммуникации Выполнила: Шаймагамбетова А.А. № з. к.: 12М3068 Группа СССп-12-01 Проверила: Бухина С.Б. __________________________ «_____»_________________________2012 год Алматы 2012 СОДЕРЖАНИЕ 1 Annotation 3 2 PACKET SWITCHING 3 3 КОММУТАЦИЯ ПАКЕТОВ 6 ТЕРМИНОЛОГИЧЕСКИЙ СЛОВАРЬ 10 СПИСОК ЛИТЕРАТУРЫ 11 Annotation This text describes packet switching, its modes and history. The main topic of this text is how packet switching works. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. The concept of switching small blocks of data was first explored by Paul Baran in the early 1960s. Independently, Donald Davies at the National Physical Laboratory (NPL) in the UK had developed the same ideas a few years. Two major packet switching modes exist; (1) connectionless packet switching, also known as datagram switching...

Words: 3704 - Pages: 15

Free Essay

Wan Connection Types

...What's the best WAN connection type for you? 14Comments more + * Email * Print * Add to Favorites * Del.icio.us * Digg * Hacker News * LinkedIn * Reddit * Technorati By Warren Heaton August 16, 2000, 7:00am PDT When designing a wide area network (WAN), one of the most challenging issues is choosing the correct connection type. You need to consider several factors before implementation can begin—and a solid understanding of all the connection types is critical to making the right choice. Most carriers offer three connection types: 1. Circuit-switched connections 2. Packet-switched or cell-switched connections 3. Dedicated connections Each type of connection has its advantages and disadvantages. This article will summarize what each connection type has to offer, with consideration given to bandwidth, availability, cost, and ease of management. Circuit-switched connections Circuit-switched connections are currently the most popular type of WAN connection. Circuit switching transmits data streams and datagrams across dedicated physical circuits. To provide asynchronous dial-in and ISDN services, the telephone companies use circuit switching. Asynchronous dial-in The public switched telephone network (PSTN) uses circuit-switched technology to provide asynchronous services (otherwise known as normal telephone service). Asynchronous dial-in connections offer a low-bandwidth, easily managed, cost-effective solution that...

Words: 817 - Pages: 4

Free Essay

Designing a Secure Network

...WAN Design with Frame Relay David Horton CST-443 Abstract This paper gives a high-level overview of how to design a Wide Area Network (WAN) using Frame Relay technology. Aspects of the WAN design process are explored through the use of a fictitious manufacturing company called Zippy's Chips. The Zippy's WAN design covers the topics of weighing alternative technologies, setting up basic Frame Relay Permanent Virtual Circuit (PVC) connections, adding redundant links and scaling the network for future growth. Table of Contents Frame Relay in a Nutshell.......................................................................................................................... 2 Terminology.......................................................................................................................................... 2 Basic Concepts...................................................................................................................................... 2 A Sample Design...................................................................................................................................3 Deciding if Frame Relay is Right for the Network.................................................................................... 4 Advantages of Frame Relay...................................................................................................................4 Disadvantages of Frame Relay..............................................................

Words: 3194 - Pages: 13

Free Essay

Protocols

...and packet switching are as follows: • X.25 • Frame Relay • ATM or Asynchronous Transfer Mode protocol • TCP/IP X.25 is probably one of the very first of packet switching protocols. It performs really well, especially considering how long it has been around. X.25 uses a virtual circuit approach, mainly using POTS or plain old telephone service lines, which are different from lines such as ISDN. The POTS lines are analog copper lines, so they can experience a lot of errors. But, once the lines have been connected, X.25 connections are really reliable. It's quite an efficient way to send packets across various data networks, with the X.25 protocol redundant error checking at each of the nodes. Frame relay is different because it doesn't require the need for analog wires or overhead wires like X.25 does. But this means that Frame Relay doesn't have the added framing and processing that X.25 has that provide guaranteed data transfers. It also doesn't have link to link reliability. So if a frame is corrupted, it is discarded, which is different than TCP as it detects and recovers any and all discarded frames. Asynchronous Transfer Mode protocol is used with either a coaxial cable, twisted pair, or fiber. ATM also takes advantage of a 53-btye cell, having 48 application bytes and 5 bytes are allocated for the ATM headers. ATM shows a lot more enhancements over Frame Relay, as its speed is at 155-622 Mbps data rates. Although...

Words: 487 - Pages: 2

Free Essay

X.25 Protocol

...X.25 Protocol A history of the X.25 Protocol Tim Elliott Morrisville State College Abstract X.25 is a Wide Area Network standard suite of protocols for packet switching developed by the International Telecommunication Union-Telecommunication Standardization Sector in the early 1970’s. It was designed to support traditional data networking over telephone wiring. Though widely used in the 1980’s, it has been largely replaced by newer IP standards such as frame relay. The purpose of this protocol is to effectively transmit data between different types of systems across a public data network. The main communication groups that ran this form of packet-switched network were the telephone companies but as technology has moved away from these slower forms, the public sector has seen this all but disappear in America. It should be said though that many places around the world still use this because of the cost to upgrade to newer hardware, but that market segment is shrinking quickly. A history of the X.25 Protocol In this paper, I will be talking about many of the technical aspects, the history and some of the situations where the X.25 protocol is still in use today. In Section 1, I will talk about where it fits on the OSI layered architecture and discuss the Network and Data Link layer. In Section 2, I will describe some of the common equipment that this protocol used with the Physical Layer of the OSI model. In Section 3 I will discuss some of the problems that have been...

Words: 2304 - Pages: 10

Premium Essay

Team a Protocol Paper

...Protocol Paper Team A: Amy Dippolino, Christine Giles, Bill Groom, and Scott Schultz NTC/362: Fundamentals of Networking November 2, 2015 Stanley Kuchel Protocol Paper Network communication is vital to any organization that is trying to conduct any type of business, but a lot of people fail to realize all the vital components that must work together in order to make this work. This is why it is important to know the OSI model is constructed and how data moves up and down this stack. However, there are other components that are just as important such as, TCP/IP, circuit and packet switching, and the major protocols that circuit and packet switching use. These processes are truly important because without them the way we communicate today would not exist. Open Systems Interconnection Protocol The Open Systems Interconnection (OSI) is a framework for how applications will communicate and work over a network. There are seven layers of related functions that a computer can provide for a user, which define the how two endpoints communicate in a telecommunication network. “The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to put a signal on a network cable or out over Wi-Fi or other wireless protocol” (WhatIs.com, 2015). Below is a description of these seven layers. Layer | Name | Description | 7 | Application Layer | This role identifies how the user...

Words: 2378 - Pages: 10

Premium Essay

Week 3 Team

...Week 3 Team Assignment NTC/362 November 24, 2014 OSI Model The Open Systems Interconnection (OSI) has been a reference for model network protocols since the mid-1990s. The OSI is formally known as the Open Systems Interconnection (OSI) model ISO/IEC 7498-1. The International Organization for Standardization (ISO), is a global standards-settings group that is comprised of members from various national standards groups. International Electrotechnical Commission (IEC) is another global standards-settings group; however, it focuses on electrical, electronic, and related technologies. (Foundational Focus: OSI Model-Breaking Down the Seven Layers, 2013) The OSI model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that data...

Words: 2317 - Pages: 10

Premium Essay

Protocol Paper

...Protocol Paper NTC/362 The Open Systems Interconnection (OSI) protocol model is a reference model developed by the International Organization for Standardization (ISO) The ISO created the model to assist manufacturers in creating network devices and its software. It consist of seven layers in total. The first layer is the Physical Layer, at this layer communication between devices actually take place. Bits are sent and received across physical mediums like cable and radio waves. Hardware devices include hubs and repeaters. The next layer is the Data Link layer; it provides a reliable method for transmitting data across the communication link. It's broken up into two sub layers called the Logical Link Control (LLC) and the Media Access Control (MAC). LLC sub-layer handles error checking and flow control. It also is responsible for communicating with the Network Layer. MAC is the lower sub-layer and maps between logical (IP) and physical (MAC) addresses and access to the network media. Switches typically are a Layer 2 hardware device. The next layer is the network layer. Here IP addressing and routing of messages to their proper final destination occurs. Routers communicate at this layer, taking advantage of collision detection and forwarding packets based on the IP Address. The Transport Layer is the 4th Layer, it manages the data delivery between system or hosts. The communication protocols can be connectionless like User Datagram Protocol, UDP...

Words: 664 - Pages: 3

Premium Essay

Mis589 Wk4 Mini-Case Mega Corp

...MIS589_WK4_Mini-case-MegaCorp_PC Questions: MegaCorp is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order management system that coordinates orders, raw materials, and inventory across all 14 factories. What type of WAN architecture and WAN service would you recommend? Why? Recommendations: When designing a WAN, numerous factors must be considered. Organizations attempting to connect multiple factories or offices and remote personnel must take into account a number of variables that will impact overall costs and network functionality. When designing and implementing wide area networks (WANs) that integrate voice, video, asynchronous and synchronous data and LAN traffic, all aspects of the organization's goals must be factored into the WAN design. Specific attention must also be paid to upfront cost, line charges, network throughput, security, and the inclusion of application and emerging technologies. Requirements will change, depending on whether you are creating a new network, modifying an existing network or integrating an existing network with other networks. Assuming there is an existing network, the next step is to inventory the network, identifying the circuits and all associated hardware (routers, firewalls) and software supporting the network, and summarizing all network-related expenses. Finally, access to network performance statistics (such as throughput...

Words: 622 - Pages: 3

Free Essay

Computer Science

...Part-1 1. What are common carriers, local exchange carriers, and interexchange carriers? A common carrier is a private company that sells or leases communication services and facilities to the public. Common carriers are profit-oriented, and their primary products are services for voice and data transmissions, both over traditional wired circuits as well as cellular services. Common carriers often supply a broad range of computer-based services, such as the manufacturing and marketing of specialized communication hardware and software. A common carrier that provides local telephone services (e.g., BellSouth) is commonly called a local exchange carrier (LEC), while one that provides long distance services (e.g., MCI) is commonly called an interexchange carrier (IXC). As the LECs move into the long distance market and IXCs move into the local telephone market, this distinction may disappear. 3. Explain how cloud architecture works. Cloud architecture is represented as a cloud with connection points. Users of circuit switched services lease the connection points (e.g., telephone lines) into the common carrier’s network, which is called the cloud. This architecture is very flexible and hides its internal details. Circuits can be established as needed between any computers attached to the cloud at any point. However, data can only be transmitted while a circuit is established, and only to the one location it connects to. These designs are simpler for...

Words: 1686 - Pages: 7

Premium Essay

Computer

...routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time Full duplex is just the opposite of half duplex. It handles traffice in both directions simultaneously. The correct answer(s): C Identify the switching method that receives the entire frame...

Words: 23850 - Pages: 96

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Free Essay

Computer Networking

...Protocol Notations 1.4.1. Service Primitives 1.4.2. Sequence Diagrams 1.4.3. State Transition Diagrams 1.5. Standards 1.6. Further Reading 1.7. Summary 1.8. Exercises 2. The Physical Layer 2.1. Equipment 2.1.1. Equipment Types 2.1.2. Connection Types 2.2. Transmission 2.2.1. Signal Types 2.2.2. Modulation 2.2.3. Digitization 2.2.4. Synchronization 2.2.5. Transmission Media 2.3. Multiplexing 2.3.1. Space Division Multiplexing (SDM) vi Communication Networks 6 10 1 2 2 4 7 7 8 9 9 10 10 11 11 12 12 13 14 15 16 18 19 19 19 20 20 21 22 23 24 27 28 Copyright © 2005 PragSoft 2.3.2. Frequency Division Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window Protocol 3.4. Data Link Layer Standards 3.4.1. BSC 3.4.2. HDLC 3.5. Further Reading 3.6. Summary 3.7. Exercises 4. The Network Layer 4.1. Network Services 4.2. Switching Methods 4.2.1. Circuit Switching 4.2.2. Packet Switching 4.3. Packet Handling 4.3.1. Packet Structure 4.3.2. Routing 4.3.3. Congestion Control 4.3.4. Error Handling 4.4. Internetworking 4.4.1. Network Sublayers...

Words: 60074 - Pages: 241