SlideShare uma empresa Scribd logo
1 de 29
X.25
X.25
Introduction
X.25 Devices and Protocol Operation
Packet Assembler/Disassembler
X.25 Session Establishment
X.25 Virtual Circuits
The X.25 Protocol Suite
Packet-Layer Protocol
Link Access Procedure, Balanced
The X.21bis Protocol
LAPB Frame Format
X.121 Address Format
X.25
   X.25 (ITU-it) is protocol standard for WAN
    communications
   It defines how connections between user devices and
    network devices are established and maintained.
   X.25 is designed to operate effectively regardless of the
    type of systems connected to the network.
   It is typically used in the packet-switched networks
    (PSNs) of common carriers, such as the telephone
    companies
   Subscribers are charged based on their use of the
    network.
X.25

   The development of the X.25 standard was initiated by
    the common carriers in the 1970s.
   At that time, there was a need for WAN protocols
    capable of providing connectivity across public data
    networks (PDNs)
   X.25 is now administered as an international standard
    by the ITU-T.
X.25 Devices and Protocol Operation



X.25 network devices fall into three general categories:
1.    Data Terminal Equipment (DTE),
2.    Data Circuit-terminating Equipment (DCE),
3.    Packet-switching Exchange (PSE)
Data Terminal Equipment (DTE),



Data terminal equipment devices are end systems that
communicate across the X.25 network.
They are usually

terminals,
personal computers, or network hosts,
and are located on the premises of individual
subscribers.
Data Circuit-terminating Equipment (DCE),



DCE devices are communications devices, such as
modems and packet switches, that provide the interface
between DTE devices and a PSE, and are generally
located in the carrier's facilities.
PSEs are switches that compose the bulk of the carrier's
network. They transfer data from one DTE device to
another through the X.25 PSN.
Packet-switching Exchange (PSE)

   PSEs are switches that compose the bulk of the
    carrier's network. They transfer data from one DTE
    device to another through the X.25 PSN
DTEs, DCEs, and PSEs Make Up an X.25 Network
Packet Assembler/Disassembler

   The packet assembler/disassembler (PAD) is a
    device commonly found in X.25 networks.
   The PAD is located between a DTE device and
    a DCE device, and it performs three primary
    functions:
   Buffering (storing data until a device is ready to
    process it),
   Packet assembly,
   Packet disassembly.
Packet Assembler/Disassembler

The PAD buffers data sent to or from the DTE device. It
also assembles outgoing data into packets and forwards
them to the DCE device. (This includes adding an X.25
header.) Finally, the PAD disassembles incoming packets
before forwarding the data to the DTE. (This includes
removing the X.25 header.)
Two types of X.25 virtual circuits exist: switched and
permanent.

Switched virtual circuits (SVCs) are temporary
connections used for irregular data transfers. They
require that two DTE devices establish, maintain,
and terminate a session each time the devices need
to communicate.

Permanent virtual circuits (PVCs) are permanently
established connections used for frequent and
consistent data transfers. PVCs do not require that
sessions be established and terminated. Therefore,
DTEs can begin transferring data whenever
necessary because the session is always active
Packet-Layer Protocol
PLP is the X.25 network layer protocol. PLP manages
packet exchanges between DTE devices across virtual
circuits. PLPs also can run over Logical Link Control 2
(LLC2) implementations on LANs and over Integrated
Services Digital Network (ISDN) interfaces running Link
Access Procedure on the D channel (LAPD).
The PLP operates in five distinct modes: call setup, data
transfer, idle, call clearing, and restarting.
Four types of PLP packet fields
            exist:
•General Format Identifier (GFI)—Identifies packet parameters,
such as whether the packet carries user data or control information,
what kind of windowing is being used, and whether delivery
confirmation is required.
•Logical Channel Identifier (LCI)—Identifies the virtual circuit
across the local DTE/DCE interface.
•Packet Type Identifier (PTI)—Identifies the packet as one of 17
different PLP packet types.
•User Data—Contains encapsulated upper-layer information. This
field is present only in data packets. Otherwise, additional fields
containing control information are added.
Link Access Procedure, Balanced

   LAPB is a data link layer protocol that manages
    communication and packet framing between DTE and
    DCE devices. LAPB is a bit-oriented protocol that
    ensures that frames are correctly ordered and error-
    free.
   Three types of LAPB frames exist: information,
    supervisory, and unnumbered
X.121 Address Format
X.121 addresses are used by the X.25 PLP in call setup mode to establish SVCs
   The X.121 Address field includes the International Data
    Number (IDN), which consists of two fields: the Data
    Network Identification Code (DNIC) and the National
    Terminal Number (NTN).
   DNIC is an optional field that identifies the exact PSN in
    which the destination DTE device is located. This field is
    sometimes omitted in calls within the same PSN. The
    DNIC has two subfields: Country and PSN. The Country
    subfield specifies the country in which the destination
    PSN is located. The PSN field specifies the exact PSN
    in which the destination DTE device is located.
   The NTN identifies the exact DTE device in the PSN for
    which a packet is destined. This field varies in length.
Summary
X.25 is an ITU-T standard protocol that defines how connections
between user devices and network devices are established and
maintained

PLP, which maps to the network layer

•LAPB, which maps to the data link layer

•X.21bis, EIA/TIA-232, EIA/TIA-449, EIA-530,
and G.703, which map to the physical layer

Mais conteúdo relacionado

Mais procurados

Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Cdma system
Cdma systemCdma system
Cdma systemtrimba
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareChih-Yu Lin
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 

Mais procurados (20)

Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
WLAN
WLANWLAN
WLAN
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Data link layer
Data link layerData link layer
Data link layer
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Cdma system
Cdma systemCdma system
Cdma system
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Hiperlan
HiperlanHiperlan
Hiperlan
 

Semelhante a X.25

High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxDharshanB8
 
presentation detaillé parfaitement a propos du frameRelay
presentation detaillé parfaitement a propos du  frameRelaypresentation detaillé parfaitement a propos du  frameRelay
presentation detaillé parfaitement a propos du frameRelayOthmane88
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Networkzaisahil
 

Semelhante a X.25 (20)

X-25.ppt
X-25.pptX-25.ppt
X-25.ppt
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptx
 
X.25
X.25X.25
X.25
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
presentation detaillé parfaitement a propos du frameRelay
presentation detaillé parfaitement a propos du  frameRelaypresentation detaillé parfaitement a propos du  frameRelay
presentation detaillé parfaitement a propos du frameRelay
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Frame relay
Frame relay Frame relay
Frame relay
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Frame relay
Frame relayFrame relay
Frame relay
 
Wan
WanWan
Wan
 
frame relay
frame relayframe relay
frame relay
 
frame relay.pdf
frame relay.pdfframe relay.pdf
frame relay.pdf
 
Networking
NetworkingNetworking
Networking
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
broadband
broadband broadband
broadband
 
X.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOLX.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOL
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
 

Mais de Ali Usman

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer OverviewAli Usman
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and ArchitectureAli Usman
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current IssuesAli Usman
 
Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 WebAli Usman
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P Ali Usman
 
Database , 15 Object DBMS
Database , 15 Object DBMSDatabase , 15 Object DBMS
Database , 15 Object DBMSAli Usman
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMSAli Usman
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 ReplicationAli Usman
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 ReliabilityAli Usman
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency ControlAli Usman
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 TransactionsAli Usman
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query OptimizationAli Usman
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localizationAli Usman
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction Ali Usman
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 SemanticAli Usman
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data IntegrationAli Usman
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution DesignAli Usman
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 BackgroundAli Usman
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 IntroductionAli Usman
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor SpecificationsAli Usman
 

Mais de Ali Usman (20)

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
Islamic Arts and Architecture
Islamic Arts and  ArchitectureIslamic Arts and  Architecture
Islamic Arts and Architecture
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current Issues
 
Database , 17 Web
Database , 17 WebDatabase , 17 Web
Database , 17 Web
 
Database ,16 P2P
Database ,16 P2P Database ,16 P2P
Database ,16 P2P
 
Database , 15 Object DBMS
Database , 15 Object DBMSDatabase , 15 Object DBMS
Database , 15 Object DBMS
 
Database ,14 Parallel DBMS
Database ,14 Parallel DBMSDatabase ,14 Parallel DBMS
Database ,14 Parallel DBMS
 
Database , 13 Replication
Database , 13 ReplicationDatabase , 13 Replication
Database , 13 Replication
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 
Database ,11 Concurrency Control
Database ,11 Concurrency ControlDatabase ,11 Concurrency Control
Database ,11 Concurrency Control
 
Database ,10 Transactions
Database ,10 TransactionsDatabase ,10 Transactions
Database ,10 Transactions
 
Database , 8 Query Optimization
Database , 8 Query OptimizationDatabase , 8 Query Optimization
Database , 8 Query Optimization
 
Database ,7 query localization
Database ,7 query localizationDatabase ,7 query localization
Database ,7 query localization
 
Database , 6 Query Introduction
Database , 6 Query Introduction Database , 6 Query Introduction
Database , 6 Query Introduction
 
Database , 5 Semantic
Database , 5 SemanticDatabase , 5 Semantic
Database , 5 Semantic
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
 
Database, 3 Distribution Design
Database, 3 Distribution DesignDatabase, 3 Distribution Design
Database, 3 Distribution Design
 
Database ,2 Background
 Database ,2 Background Database ,2 Background
Database ,2 Background
 
Database , 1 Introduction
 Database , 1 Introduction Database , 1 Introduction
Database , 1 Introduction
 
Processor Specifications
Processor SpecificationsProcessor Specifications
Processor Specifications
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

X.25

  • 1. X.25 X.25 Introduction X.25 Devices and Protocol Operation Packet Assembler/Disassembler X.25 Session Establishment X.25 Virtual Circuits The X.25 Protocol Suite Packet-Layer Protocol Link Access Procedure, Balanced The X.21bis Protocol LAPB Frame Format X.121 Address Format
  • 2. X.25  X.25 (ITU-it) is protocol standard for WAN communications  It defines how connections between user devices and network devices are established and maintained.  X.25 is designed to operate effectively regardless of the type of systems connected to the network.  It is typically used in the packet-switched networks (PSNs) of common carriers, such as the telephone companies  Subscribers are charged based on their use of the network.
  • 3. X.25  The development of the X.25 standard was initiated by the common carriers in the 1970s.  At that time, there was a need for WAN protocols capable of providing connectivity across public data networks (PDNs)  X.25 is now administered as an international standard by the ITU-T.
  • 4. X.25 Devices and Protocol Operation X.25 network devices fall into three general categories: 1. Data Terminal Equipment (DTE), 2. Data Circuit-terminating Equipment (DCE), 3. Packet-switching Exchange (PSE)
  • 5. Data Terminal Equipment (DTE), Data terminal equipment devices are end systems that communicate across the X.25 network. They are usually terminals, personal computers, or network hosts, and are located on the premises of individual subscribers.
  • 6. Data Circuit-terminating Equipment (DCE), DCE devices are communications devices, such as modems and packet switches, that provide the interface between DTE devices and a PSE, and are generally located in the carrier's facilities. PSEs are switches that compose the bulk of the carrier's network. They transfer data from one DTE device to another through the X.25 PSN.
  • 7. Packet-switching Exchange (PSE)  PSEs are switches that compose the bulk of the carrier's network. They transfer data from one DTE device to another through the X.25 PSN
  • 8. DTEs, DCEs, and PSEs Make Up an X.25 Network
  • 9. Packet Assembler/Disassembler  The packet assembler/disassembler (PAD) is a device commonly found in X.25 networks.  The PAD is located between a DTE device and a DCE device, and it performs three primary functions:  Buffering (storing data until a device is ready to process it),  Packet assembly,  Packet disassembly.
  • 10. Packet Assembler/Disassembler The PAD buffers data sent to or from the DTE device. It also assembles outgoing data into packets and forwards them to the DCE device. (This includes adding an X.25 header.) Finally, the PAD disassembles incoming packets before forwarding the data to the DTE. (This includes removing the X.25 header.)
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Two types of X.25 virtual circuits exist: switched and permanent. Switched virtual circuits (SVCs) are temporary connections used for irregular data transfers. They require that two DTE devices establish, maintain, and terminate a session each time the devices need to communicate. Permanent virtual circuits (PVCs) are permanently established connections used for frequent and consistent data transfers. PVCs do not require that sessions be established and terminated. Therefore, DTEs can begin transferring data whenever necessary because the session is always active
  • 16.
  • 17. Packet-Layer Protocol PLP is the X.25 network layer protocol. PLP manages packet exchanges between DTE devices across virtual circuits. PLPs also can run over Logical Link Control 2 (LLC2) implementations on LANs and over Integrated Services Digital Network (ISDN) interfaces running Link Access Procedure on the D channel (LAPD). The PLP operates in five distinct modes: call setup, data transfer, idle, call clearing, and restarting.
  • 18. Four types of PLP packet fields exist: •General Format Identifier (GFI)—Identifies packet parameters, such as whether the packet carries user data or control information, what kind of windowing is being used, and whether delivery confirmation is required. •Logical Channel Identifier (LCI)—Identifies the virtual circuit across the local DTE/DCE interface. •Packet Type Identifier (PTI)—Identifies the packet as one of 17 different PLP packet types. •User Data—Contains encapsulated upper-layer information. This field is present only in data packets. Otherwise, additional fields containing control information are added.
  • 19. Link Access Procedure, Balanced  LAPB is a data link layer protocol that manages communication and packet framing between DTE and DCE devices. LAPB is a bit-oriented protocol that ensures that frames are correctly ordered and error- free.  Three types of LAPB frames exist: information, supervisory, and unnumbered
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. X.121 Address Format X.121 addresses are used by the X.25 PLP in call setup mode to establish SVCs
  • 28. The X.121 Address field includes the International Data Number (IDN), which consists of two fields: the Data Network Identification Code (DNIC) and the National Terminal Number (NTN).  DNIC is an optional field that identifies the exact PSN in which the destination DTE device is located. This field is sometimes omitted in calls within the same PSN. The DNIC has two subfields: Country and PSN. The Country subfield specifies the country in which the destination PSN is located. The PSN field specifies the exact PSN in which the destination DTE device is located.  The NTN identifies the exact DTE device in the PSN for which a packet is destined. This field varies in length.
  • 29. Summary X.25 is an ITU-T standard protocol that defines how connections between user devices and network devices are established and maintained PLP, which maps to the network layer •LAPB, which maps to the data link layer •X.21bis, EIA/TIA-232, EIA/TIA-449, EIA-530, and G.703, which map to the physical layer