Directory services are used to store information about network resources and users in an enterprise. They provide a centralized, organized method for locating and managing these resources. A directory service stores data in a hierarchical structure with objects and attributes. Some key directory services are Microsoft Active Directory, Novell eDirectory, LDAP, and DNS. Active Directory in particular is widely used and provides features like user authentication, authorization, and policies across a Windows network.
2. Directory Services
• Directory services are an essential part of
today‘s network-centric computing
infrastructure.
• Directory-enabled applications -now power
almost all the mission critical processes of an
enterprise, including resource planning, value
chain management, security and firewalls, and
resource provisioning.
• So what exactly is a Directory Service?
3. Directory Services:
• A DS is the collection of software and processes that
store information about your enterprise, subscribers,
or both.
• Ex. is the Domain Name System (DNS), which is
provided by DNS servers. A DNS server stores the
mappings of computer host names and other forms of
domain name to IP addresses. A DNS client sends
questions to a DNS server about these mappings (e.g.
what is the IP address of test.example .com?).
• The mapping of host names enables users of the
computing resources to locate computers on a
network, using host names rather than complex
numerical IP addresses.
4. • In a telephone directory , the nodes are names and the data
items are telephone numbers.
• In the DNS the nodes are domain names and the data items
are IP addresses (and alias, mail server names, etc.).
• In a directory used by a network operating system, the nodes
represent resources that are managed by the OS, including
users, computers, printers and other shared resources.
A directory service is a shared information infrastructure for
locating, managing, administering, and organizing common
items and network resources, which can include volumes,
folders, files, printers, users, groups, devices, telephone
numbers and other objects. A directory service is an important
component of a NOS (Network Operating System)
Directory Services:
5. Directory Services: a directory service can be considered an
extension of a database, directory services generally have the
following characteristics:
Hierarchical naming model
• A hierarchical name scheme uses a tree structure that reflects the actual
structure of a company. At the topmost (first) node of the tree is the
organization name, which is usually the company name. After the
organization name are organizational units, which you create to suit the
structure of the company; you can organize the structure geographically,
departmentally, or both.
• A hierarchical name may include these components:
– Common name (CN) -- Corresponds to a user's name or a server's name. All names must include a common name
component.
– Organizational unit (OU) -- Identifies the location of the user or server in the organization. Domino allows for a
maximum of four organizational units in a hierarchical name. Organizational units are optional.
– Organization (O) -- Identifies the organization to which a user or server belongs. Every name must include an
organization component.
– Country (C) --Identifies the country in which the organization exists. The country is optional.
– An example of a hierarchical name that uses all of the components is:
– Julia Herlihy/Sales/East/Renovations/USTypically a name is entered and displayed in this abbreviated format, but it is
stored internally in canonical format, which contains the name and its associated components, as shown in the
following example:
– CN=Julia Herlihy/OU=Sales/OU=East/O=Renovations/C=US
6. Directory Characteristics:
• Extended search capability
Directory services provide robust search
capabilities, allowing searches on individual
attributes of entries.
• Distributed information model
A directory service enables directory data to
be distributed across multiple servers within a
network.
• Shared network access
The resources are shared over the network.
7. Directory Characteristics:
• Replicated data
Directories support replication (copies of directory data
on more than one server) which make information
systems more accessible and more resistant to failure.
• Data store optimized for reads
The storage mechanism in a directory service is
generally designed to support a high ratio of reads to
writes.
• Extensible schema
The schema describes the type of data stored in the
directory. Directory services generally support the
extension of schema, meaning that new data types can
be added to the directory.
8. For example,
• An employee directory for a company will include all
employees of that company and certain types of information
associated with those employees.
• All useful information must be systematically associated with
the entry for each employee in the directory.
• As changes occur (New hires, terminations, promotions, job
changes and so on.), The directory needs to be updated to
reflect the changes.
9. Directory structure:
• Directory structure serves as the administrative aspect of
directory and fulfills 2 purpose:
– 1.Object Identification
• that ensures, all objects within a directory can be uniquely
identified.
– 2. Object Organization
• The organization of objects represented in a directory also serves
to make access to information about the objects in the directory
easier.
• This can also assist in the management of information in the
directory through the grouping (or partitioning) in some structured
manner so that the groups of objects can be managed separately.
10. • You should know about five important
directory services: Novell eDirectory,
Microsoft’s Windows NT domains, Microsoft’s
Active Directory, X.500 Directory Access
Protocol, and Lightweight Directory Access
Protocol
11. Novell eDirectory
• Novell eDirectory has been available since 1993,
introduced as NDS as part of NetWare 4.x.
• NetWare is a computer network operating system
developed by Novell.
• This product was rapidly implemented in Novell
networks, particularly in larger organizations that
had many NetWare servers and needed its
capabilities.
• eDirectory is a reliable, well made directory service.
12. • NDS can be installed to run under Windows
NT, SunMicrosystems’s Solaris and UNIX and
as well as under Novelle’s own Netware.
• So, it can be used to control a multi-platform
network.
• You manage the eDirectory tree from a client
computer logged in to the network with
administrative privileges.
13. • eDirectory is a hierarchical, object oriented
database used to represent certain assets in
an organization in a logical tree, including
organizations, organizational units, people,
positions, servers, volumes, workstations,
applications, printers, services, and groups.
• eDirectory can manage more than a billion
objects in a tree.
14. Windows NT Domains
• The Windows NT domain model breaks an organization into
chunks called domains, all of which are part of an
organization.
• The domains are usually organized geographically, which helps
minimize domain-to-domain communication requirements
across WAN links, although you’re free to organize domains as
you wish.
• Each domain is controlled by a primary domain controller
(PDC), which might have one or more backup domain
controllers (BDCs) to kick in if the PDC fails.
15. • All changes within the domain are made to the PDC, which
then replicates those changes to any BDCs. BDCs are read-
only, except for valid updates received from the PDC.
• In case of a PDC failure, BDCs automatically continue
authenticating users. To make administrative changes to a
domain that suffers PDC failure, any of the BDCs can be
promoted to PDC.
• Once the PDC is ready to come back online, the promoted BDC
can be demoted back to BDC status.
16. • Windows NT domains can be organized into one of four
domain models:
■ Single domain
In this model, only one domain contains all network resources.
■ Master domain
The master model usually puts users at the top-level domain and then
places network resources, such as shared folders or printers, in lower level
domains (called resource domains). In this model, the resource domains
trust the master domain.
■ Multiple master domain
This is a slight variation on the master domain model, in which users might
exist in multiple master domains, all of which trust one another, and in
which resources are located in resource domains, all of which trust all the
master domains.
■ Complete trust
This variation of the single-domain model spreads users and resources
across all domains, which all trust each other.
17. • You choose an appropriate domain model depending on the
physical layout of the network, the number of users to be
served, and other factors.
• Explicit trust relationships must be maintained between
domains using the master or multiple master domain model,
and must be managed on each domain separately.
• Maintaining these relationships is one of the biggest
difficulties in the Windows NT domain structure approach, at
least for larger organizations.
• If you have 100 domains, you must manage the 99 possible
trust relationships for each domain, for a total of 9,900 trust
relationships. For smaller numbers of domains (for example,
fewer than 10 domains), management of the trust
relationships is less of a problem, although it can still cause
difficulties.
18. X.500 DIRECTORY ACCESS
PROTOCOL
• X.500 is a series of computer networking standards covering
electronic directory services.
• The X.500 series was developed by ITU-T, formerly known as
CCITT, and first approved in 1988.
• ISO was a partner in developing the standards, incorporating
them into the Open Systems Interconnection suite of
protocols.
19. X.500 DIRECTORY ACCESS
PROTOCOL
• The protocols defined by X.500 include :
– DAP (Directory Access Protocol)
– DSP (Directory System Protocol)
– DISP (Directory Information Shadowing Protocol)
– DOP (Directory Operational Bindings Management Protocol)
– As these protocols used the OSI networking stack, a number of
alternatives to DAP were developed to allow Internet clients to access
the X.500 directory using the TCP/IP networking stack.
– The most well-known alternative to DAP is Lightweight Directory
Access Protocol (LDAP).
– While DAP and the other X.500 protocols can now use the TCP/IP
networking stack, LDAP remains a popular directory access protocol.
20. X.500 DIRECTORY ACCESS
PROTOCOL
• The primary concept of X.500 is that there is a single Directory
Information Tree (DIT), a hierarchical organization of entries
which are distributed across one or more servers, called
Directory System Agents (DSA).
• An entry consists of a set of attributes, each attribute with
one or more values.
• Each entry has a unique Distinguished Name, formed by
combining its Relative Distinguished Name (RDN), one or
more attributes of the entry itself, and the RDNs of each of
the superior entries up to the root of the DIT.
21. X.500 DIRECTORY ACCESS
PROTOCOL
• Client –DUA, server-DSA
• There are two sub protocols used to
communicate between systems.
• 1. communication protocol between DUA and
DSA is called DAP(Directory access protocol).
• 2. communication protocol between one DSA
and another DSA is called DSP(Directory
System protocol).
22. X.500 DIRECTORY ACCESS
PROTOCOL
• DAP specifies how an X.500 DUA communicates with
a DSA to issue a query.
• Using DAP, users can view,modify,delete and search
for information stored in the X.500 directory if they
have suitable access permission.
• DAP is complex protocol with lot of overhead.
• LDAP is used to access and update directory
information in x.500 directories.so, LDAP is more
suitable than DAPfor implementation on internet.
23. ACTIVE DIRECTORY ARCHITECTURE
• Active Directory (AD) is a directory service that Microsoft
developed for Windows domain networks.
• It is included in most Windows Server operating systems as a
set of processes and services.
• Initially, Active Directory was only in charge of centralized
domain management. Starting with Windows Server 2008,
however, Active Directory became an umbrella title for a
broad range of directory-based identity-related services.
• A server running Active Directory Domain Services (AD DS) is
called a domain controller. It authenticates and authorizes all
users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and
installing or updating software.
25. Container Object
• A container object is simply an object that stores
other objects.
• Container objects are function as the branches of the
tree.
• AD uses container objects such as organizational unit
(OUs) and groups to store other objects.
• Container can store other container or leaf objects,
such as users and computers.
26. Leaf Object
• A leaf object stands alone and cannot store
other objects.
27.
28. Object naming in AD
• Every object in active directory database is uniquely
identified.
• The naming conventions are based on the LDAP standard.
• The distinguished name (DN) of an object consist of the name
of the domain in which the object is located, plus the path
down the domain tree through the container objects to the
object itself.
• The part of object’s name that is stored in the object itself is
called its relative distinguished name (RDN)
29. DN & RDN
• Every object in active directory database is uniquely identified
by name that can be expressed in several forms.
• Naming conventions are based on LDAP standard defined by
RFC2251 published by IETF.
• The distinguished name(DN) of an object made up of the
name of the domain in which the object is located, plus the
path down the domain tree through the container objects to
the object itself.
• The part of an object’s name that is stored in the object itself
is called its relative distinguished name(RDN).
30.
31. Canonical name
• Most AD applications refer to objects using
their canonical names.
• Canonical name is DN in which the domain
name comes first ,followed by the names of
the object’s parent containers working down
from the root of the domain and separated by
forward slashes, followed by object’s RDN as
follows:
• Zacker.com/sales/inside/jdoe
32. LDAP notation
• DN can also be expressed in LDAP notation.
• LDAP notation reverses the order of the object
names, starting with the RDN on the left and
the domain name on the right.
• Elements are separated by commas and
include the LDAP abbreviations that define
each type of element.
• Ldap://cz1.zacker.com/cn=jdeo,ou=inside,ou=
sales,dc=zacker,dc=com
• cn=common name ou=organizational unit dc=domain component
33. Globally unique Identifiers
• In addition to its DN, every object in the tree has a globally
unique identifier(GUID), which is a 128-bit number that is
automatically assigned by Directory System Agent when
object is created.
• DN can be changed but GUID can not be changed .
• The directory system agent (DSA) is a collection of services
and processes that run on each Windows 2000 Server and
later domain controller and provides access to the data store.
The data store is the physical store of directory data located
on a hard disk.
34. User principle names
• DN are used by applications and services when they
communicate with AD, but they are not easy for users to
understand ,type or remember.
• So each user object has a UPN that consists of username and
suffix , separated by @ symbol, just like standard email
address.
• User account name. Also known as the logon name.
UserName
• Separator. A character literal, the at sign (@).
• UPN suffix. Also known as the domain name.
Example.Microsoft.com
35. LDAP
• Lightweight Directory Access Protocol
• As the name suggests, it is a lightweight client-server
protocol for accessing directory services, specifically
X.500-based directory services
• Directory services play an important role in
developing intranet and Internet applications by
allowing the sharing of information about users,
systems, networks, services, and applications
throughout the network.
36. LDAP
• LDAP is software protocol for enabling anyone to
locate organization, individuals and other resources
such as files and devices in a network, whether on
the public internet or on a corporate intranet.
• It is lightweight version of DAP , which is part of
X.500, a standard for directory services in a network.
• It is lighter because in its initial version it did not
include security features.
• Microsoft includes it as part of what it calls active
directory in a number of products including Outlook
Express.
37. LDAP
• LDAP allows you to search for an individual
without knowing where they’re located.
• LDAP directory is organized in a simple “tree”
hierarchy consisting of the following levels:
• The root directory, which branches out to
• Countries, each of which branches out to
• Organizations, which branch out to
• Organizational units, which branches out to
• individuals
38.
39. Forests, Trees, Roots and Leaves
Forest:--
– A forest is a collection of one or more Active Directory domains. The first
domain installed in a forest is called the forest root domain.
– A forest contains single definition of network configuration and share a
common global catalog, directory schema, logical structure and directory
configuration.
– No data is replicated by Active Directory outside the boundaries of the forest.
Therefore, the forest defines a security boundary.
– At the top of each directory tree is the root.
Trees:--Trees are created within the forest. If a domain is a subdomain of another
domain, the two domains are considered a tree.
Leaves:--
A leaf object represents an actual resource on the network, such as a
workstation, printer, shared directory, file, or user account. Leaf objects can
not contain other objects.
40.
41. Active Directory Architecture:
Various Components of Active Directory are as below-
OBJECTS
Objects are the network resources. There are basically 3 Type of Objects which are
further categorized as below –
Container Objects
– Default Container Objects
• Computers
• Users
• Built-in
• Foreign Security Principles
– Generic or Created Container Objects
• Domain
– Domain Categories –
» Single Domain
» Master Domain
» Multiple Master Domain
– Domain Terminologies –
» Tree
» Forest
» Trust Relationship –
• Two way Trust
• Transitive Trust
• Site
• Organizational Units
Leaf Objects
Other Objects
42.
43. CONTAINER OBJECTS
• A container object holds other objects.
• They have a defined location in the directory sub-tree hierarchy.
• A container is very similar to the folder concept in Windows. A folder contains files and other
folders. In Active Directory, a container holds objects and other containers.
• Container Objects can be categorized in 2 types –
– Default Container Objects
– Generic/ Created Container Objects
DEFAULT CONTAINER OBJECT
– There are several container objects that are installed by default when you promote the first domain
controller on your network.
– They differ from manually created containers because their object attribute type is literally named a
container.
– They don’t have the same properties as other generic Active Directory containers (such as sites, domains,
and OUs).
– You cannot delete them nor can you create new objects of that container object type.
– You can also not associate Group Policy Objects with these.
• COMPUTERS
• USERS
• BUILTIN
• FOREIGN SECURITY PRINCIPALS
GENERIC AND CREATED CONTAINER OBJECTS
– There are three major types of containers that are configured manually and are considered as generic –
• Domain
• Site
• Organizational Units
– These objects are most often used to link group policy objects.
– When you link a group policy to a container it enforces that policy on all the objects (users, computers,
nested groups etc.) inside it.
44. Domains – The domain container holds all of the other objects that are a
part of that domain and also hold organizational unit objects and their
contents.
-Domains are responsible for creating Trees and Forest as well as maintain
trust relationship between each other to access the resources of other
domains.
45. • A Windows domain is a form of a computer network in which all user
accounts, computers, printers and other security principals, are registered
with a central database (called a directory service) .
• Authentication takes place on domain controllers.
• Each person who uses computers within a domain receives a unique user
account that can then be assigned access to resources within the domain
• Windows domains can be organized into following domain models.
• Single domain: In this model, only one domain contains all network
resources.
• Master domain: The master model usually puts users at the top-level
domain and then places network resources, such as shared folders or
printers, in lower-level domains (called resource domains). In this model,
the resource domains trust the master domain.
• Multiple master domains: This is a slight variation on the master domain
model, in which users might exist in multiple master domains, all of which
trust one another, and in which resources are located in resource
domains, all of which trust all the master domains.
46. TREES
A tree is a group of domains that have the same DNS name; for example,
nks.com (the top domain), sales.nks.com and software.sal
es.nks.com (the child domains).
47. FORESTS
• A forest is a collection of trees, which can be treated as
one administrative unit and Active Directory
automatically manages trusts between domains.
• For security purposes, organizations have set up
multiple forests, but trusts between forests must be
managed manually by the administrator.
• Because the forest is a security boundary, each forest
does not trust or allow access from any other forest by
default.
• However, in Windows Server 2003 and higher Active
Directory, transitive trust relationships can be manually
established between forests to establish cross-forest
access to resources, so that users in one forest can
access resources in another forest.
48.
49. TRUST RELATIONSHIP
There are basically 2 types of trusts –
a. TWO WAY
When you create a new child domain, the child domain
automatically trusts the parent domain, and vice versa. At
the practical level, this means that authentication requests
can be passed between the two domains in both directions.
b. TRANSITIVE
An automatic trust association between parent and child
domains and between root domains in a Windows Active
Directory forest. For example, if domain A trusts B, and B
trusts C, then A automatically trusts C.
50.
51. Sites
• A site is actually a physical grouping of objects based
upon IP Addresses.
• A site cannot span multiple physical locations, but
rather encompasses network objects and devices in
one area.
• For example, the XYZ company has offices in pune,
delhi, and ahmedabad. Each office is a physical
location, and therefore is considered as a “site”.
• The site container is a logical representation of what is
physically true.
• Specifically, sites are used to distinguish between local
and remote locations.
52. Organizational Units
• They are simple a container that the administrator
creates that he can use for any purpose.
• Most administrators will create logical
organizational units and place users and/or groups
inside them in order to setup specific permissions or
policy.
• For example, he may create an organizational unit
called “Accounting” and place the executives and the
accounting department into it in so that they can have
access to specific resources that are not available to
the rest of the network.
53. LEAF OBJECT
• Objects are either container objects or leaf
objects (also called non-container objects).
• A container object stores other objects
and a leaf object does not.
• For example, a folder is a container object
for files, which are leaf objects.
• Leaf objects are located at the end of the
sub-tree hierarchy.
54. OTHER OBJECTS
In addition active directory also supports some other types of objects like
Group, Contact, Shared Folder and Printer as listed in below.
• Group –
– A group object represents a collection of user accounts, computer accounts,
contacts and other groups that can be managed as a single unit.
– Groups facilitate role based access to network resources.
– There are two types of groups – Security and Distribution groups.
– Security groups are mainly used for the purpose of providing access to
network resources.
– Distribution groups are not security enabled and can be used only for
communication purpose.
– Groups can vary in scope which limits its membership and scope of operation.
• Contact – A contact object contains the contact information about people
who are associated with the organization.
• Shared folder – A shared folder object is used to share files across the
network.
• Printer – A printer object corresponds to a printer resource in a network.
55. ATTRIBUTES
Attributes are characteristics of objects in the directory. For
example, the attributes of a user might include the user’s first and
last names, department, and e-mail address
SCHEMA
• The schema is the component that defines all object classes and
attributes that AD uses to store data.
• It is sometimes referred to as the blueprint for AD.
• The schema is replicated among all domain controllers in the
forest. Any change that is made to the schema is replicated to every
domain controller.
• In Schema each attribute is defined only once and can be used in
multiple classes. For example, the Description attribute is defined
once but is used in many different classes.
• Each class of objects in the Active Directory schema has attributes
that ensure:
– Unique identification of each object in a directory data store.
– security principals (users, computers, or groups)
– Compatibility with LDAP standards for directory object names.
56. LDAP NOTATION
Three object naming formats that are supported by AD are –
LDAP DN and RDN names
• LDAP defines operations for adding, searching, modifying, and
deleting directory entries.
• An LDAP server is required to provide a LDAP directory service.
• LDAP is based on entries; an entry is a set of attributes identified by
a globally unique Distinguished Name (DN).
• Each of a directory entry’s attributes has a type and one or more
values.
• The attributes in a directory entry’s distinguished name(DN) are
arranged in a hierarchy from right to left with the rightmost
attribute as the top entry and with the leftmost attribute(s) that are
unique to its level called a Relative Distinguished Name (RDN).
• A DN is a sequence of RDNs.
57.
58.
59. LDAP URL’s
• An LDAP URL begins with the prefix “LDAP,”
and then it names the server holding Active
Directory services followed by the attributed
name of the object (the distinguished name).
For example:
• LDAP://ADserver.example.com/cn=nikhil,
ou=People, dc=example, dc=com
60. LDAP based canonical names
• By default, Active Directory administrative tools
display object names using the canonical name
format, which lists the RDNs from the root
downward and without the RFC 1779 naming
attribute descriptors (dc=, ou=, or cn=).
• The canonical name uses the DNS domain name
format
• DN: cn=nikhil, ou=People, dc=example, dc=com
• Canonical Name: example.com/people/nikhil
62. What is Remote Network Access?
The remote access technology allows
logging into system as an authorized user
from any location.
Where it is Used?
Remote access is commonly used on
corporate computer network but can also
be utilized on home network.
63. If only the file or network service are
needed , then remote access network is
the best solution.
64. Why Remote Access Network?
Internet Access
Remote access to stored private or shared
files on the LAN
Access centralized Database
Access hosted web Application
For send or receive E-mail
Remote access to a centralized application ,
such as an accounting system
66. Content over view
What is PSTN
Evolution of PSTN
Band width allocation
Numbering schemes
Call set-up, signaling and
switching
67. What is PSTN?
PSTN - short for public switched telephone network, also
knows as the plain old telephone system(POTS) is
basically the inter-connected telephone system over
which telephone calls are made via copper wires.
PSTN is based on the principles of circuit switching
Therefore when a call is made a particular dedicated
circuit activates which eventually deactivates when the
call ends
Telephone calls transmits as analogue signals across
copper wires
69. Evolution of PSTN
Inception
1876 – Invention of the first telephone by sir Alexander
Graham Bell
• Telephones were sold in pairs and the customers
were supposed to lay out there own cables
• Connectivity type – point to point connections
• Network structure – mesh topology
28th January 1878 – Worlds’ first telephone exchange
was established at New-Haven in Connecticut in the USA
• Network structure – star topology
• Switching technique – manual switching
71. Intermediate
1887 – Almon Brown Strowger invented the first
electromechanical switch, known as the Strowger
switch or step by step switch
Switch operated according to the train of
pulses generated by the customer
premises telephone
Pulses were generated by a telegraph key
on the telephone until the dial was
introduces
1920’s – Rotary dial telephones enters service
72. Intermediate
1935 – Crossbar switches were introduced
Intersecting bars move to make contact in order
to complete the circuit
Markers were used to control exchanges
Takes only 1/10 of a second to complete a call
1950 – Time division multiplexing (TDM) is introduced
1960’s – touch tone pad phones were introduces
1968 – stored program control switching was introduces
An electronic switch
Upgradable to new versions since software
dependant
Call set-up is controlled by programmed
software's
74. Present
In today’s PSTN, call routing from source to destination
is predominantly controlled by digital switches that
were introduced in the 1970’s
Apart from voice communications, data
communications are also provided via the PSTN at
present
DMS - 100 digital
switch
76. Bandwidth allocation
voice bandwidth – 300 – 3400Hz
DSL frequency bands
Up stream – 25.875kHz –138kHz
Down stream – 142kHz –1104kHz
77. Numbering schemes
• n = country code + international access code
• most international access code are either (00) or
(011) except for few exceptions like (009 - Nigeria) and
(119 - Cuba)
A PSTN number comprises of,
• A international access code/exit code (IAC/EC)
• A country code (CC)
• A national destination code also know as an area code
(NDC/AC)
• A subscriber number (SN)
Maximum length of a number is 15digits
78. Signaling
Signaling is the controlling of communications
Basically anything but voice transmission is signaling
Ex : call setup, call termination, billing , caller ID etc…
There are types of signaling
Channel associated signaling (CAS) - signaling information is
transmitted within the same voice channels
Also know as in-band signaling
Ex : Dual tone multi frequency signaling (DTMF)
Common channel signaling (CCS) - signaling information is
transmitted via a separate channel
Also know as out-band signaling
Ex : signaling system #7 (SS7)
79. Switching systems
Switching systems, basically are what determines the routing
pathway of a call
Switches are contained in local exchanges and central
offices
81. Call setup process
Example : Suppose the calling subscriber dialed “5834975”
At first the exchange(294) which the calling subscriber is directly
connected to, examines the dialed digits “583-4975”
Secondly it acts upon the first three digits and access its look up
table to rout the call to the “583” exchange
Then the “583” exchange acts upon the information
It identifies the dialed number and connects the correct subscriber loop
which matches the “4975” number
Then ring current is applied to the loop to alert the called subscriber
and when the call is answered conversation begins
83. INTRODUCTI
ON
• Integrated Services
Digital Network (ISDN)
is a set of communication
standards for digital
telephone connection and
the transmission of voice
and data over a digital line.
• Integrated Service Digital
Network (ISDN) is a set
of CCITT/ITU standards.
WORKING OF ISDN
84. • Home and business users who install an ISDN adapter receive Web pages
at up to 128Kbps compared with the maximum 56Kbps rate of a modem
connection.
• ISDN requires adapters at both ends of the transmission, so your access
provider also needs an ISDN adapter.
• There are two levels of service:
1. The Basic Rate Interface (2B+D) – Intended for the home and small
enterprise. (Consist of two 64Kbps B-channels and one 16Kbps D-channel.
Thus user can have up to 128Kbps service.)
(B channel is a telecommunications term which refers to the ISDN channel in
which the primary data or voice communication is carried. It has a bit rate of
64 kbit/s in full duplex. D channel is a telecommunications term which refers
to the ISDN channel in which the control and signalling information is
carried. The bit rate of the D channel of a basic rate interface is 16 kbit/s,
whereas it amounts to 64 kbps on a primary rate interface.)
1. The Primary Rate Interface(23B+D) – Intended for larger users. (Consist of
23 B-channels and one 64Kbps D-channel In the United States or 30 B-
channels and 1 D-channel in Europe.)
85. ISDN channel Types
• Bearer channel (B channel) :
• A bearer channel is defined at a rate of 64 Kbps. It is the basic
user channel and can carry any type of digital information in
full-duplex mode as long as the required transmission rate
does not exceed 64 Kbps.
• Data Channel (D channel) :
• A data channel can be either 16 or 64 Kbps, depending on the
needs of the user. The name says data but the primary
function of a D channel is to carry control signaling for the B
channel.
• Hybrid channel (H channel) :
• Hybrid channels are available with data rates of 384 Kbps
(H0), 1536 Kbps (H11), or 1920 Kbps (H12). These rates suit H
channels for high data-rate applications such as video,
teleconferencing and so on.
86.
87. SUPPORTED SERVICES
• Voice calls
• Facsimile
• Videotext
• Teletext
• Electronic Mail
• Database access
• Data transmission and voice
• Connection to internet
• Electronic Fund transfer
• Image and graphics exchange
• Document storage and transfer
• Audio and Video Conferencing
• Automatic alarm services to fire stations, police, medical etc.
88. CONCLUSION
• ISDN is concept is the integration of both Analog or
voice data together with digital data over the same
network.
• Although the ISDN you can install is integrating
these on a medium designed for Analog
transmission, broadband ISDN is intended to extend
the integration of both services throughout the rest
of the end-to-end path using fiber optic and radio
media.
89. SUMMARY
• ISDN Stands for Integrated Service Digital
Network.
• It is standard for transmission of voice and data over
digital line
• Two level of services The Basic Rate interface and
The Primary Rate Interface.
91. What is DSL ?
Digital Subscriber Line (DSL, originally, digital subscriber
loop) is a communication medium, which is used to transfer
internet through copper wire telecommunication line.
DSL is a technology which uses the existing transmission
medium (telephone wire) to provide high – speed transfer of
information across the internet.
Along with cable internet, DSL is one of the most popular
ways ISP’s provide broadband internet access.
DSL allows simultaneous voice and high – speed data service
such as super fast internet access over a single pair of
copper telephone wire.
Although the transmitted information is in digital form, the
transmission medium is usually an analog carrier signal (or
the combination of many analog carrier signals) that is
modulated by the digital information signal.
Network Management & Administration 91
92. How DSL Works ?
The underlying technology of transport across DSL
facilities uses high-frequency sinusoidal carrier wave
modulation, which is an analog signal transmission.
A DSL circuit terminates at each end in a modem which
modulates patterns of bits into certain high-frequency
impulses for transmission to the opposing modem. Signals
received from the far-end modem are demodulated to
yield a corresponding bit pattern that the modem
retransmits, in digital form, to its interfaced equipment,
such as a computer, router, switch, etc.
If we ask that how we achieve such thing i.e., both
telephone and internet facility, then the answer is by
using splitters or DSL filters. Basically, the use of
splitter is to splits the frequency and make sure that
they can’t get interrupted.
Network Management & Administration 92
94. Types of DSL :
There are Two Types of DSL’s :
1) Symmetric DSL – SDSL, splits the upstream and downstream
frequencies evenly, providing equal speeds to both
uploading and downloading data transfer. This connection
may provide 2 Mbps upstream and downstream. It is mostly
preferred by small organizations.
2) Asymmetric DSL – ADSL, provides a wider frequency range
for downstream transfers, which offers several times faster
downstream speeds. An ADSL connection may offer 20 Mbps
downstream and 1.5 Mbps upstream, It is because most
users download more data than they upload.
► ADSL are widely used DSL modems. There are Two Splitting
Methods used.
Network Management & Administration 94
95. The CAP System :
An earlier and more easily implemented standard was the
carrierless amplitude/phase (CAP) system, which was used
on many of the early installations of ADSL.
CAP operates by dividing the signals on the telephone line
into three distinct bands:
Voice conversations are carried in the 0 to 4 KHz (kilohertz)
band, as they are in all POTS circuits.
The upstream channel (from the user back to the server) is
carried in a band between 25 and 160 KHz.
The downstream channel (from the server to the user)
begins at 240 KHz and goes up to a point that varies
depending on a number of conditions (line length, line
noise, number of users in a particular telephone company
switch) but has a maximum of about 1.5 MHz (megahertz).
This system, with the three channels widely separated,
minimizes the possibility of interference between the
channels on one line, or between the signals on different
lines.
Network Management & Administration 95
96. CAP System Diagram :
Network Management & Administration 96
97. The DMT System :
DMT also divides signals into separate channels, but doesn't use two
fairly broad channels for upstream and downstream data. Instead,
DMT divides the data into 247 separate channels, each 4 KHz wide.
One way to think about it is to imagine that the phone company
divides your copper line into 247 different 4-KHz lines and then
attaches a modem to each one. You get the equivalent of 247
modems connected to your computer at once.
Each channel is monitored and, if the quality is too impaired, the
signal is shifted to another channel. This system constantly shifts
signals between different channels, searching for the best channels
for transmission and reception.
In addition, some of the lower channels (those starting at about 8
KHz), are used as bidirectional channels, for upstream and
downstream information.
Monitoring and sorting out the information on the bidirectional
channels, and keeping up with the quality of all 247 channels, makes
DMT more complex to implement than CAP, but gives it more
flexibility on lines of differing quality.
Network Management & Administration 97
99. Advantages of DSL :
Broadband Internet and Phone can be used at same time.
And it is because the voice is transferred on other
frequency and digital signals are transferred on others.
Faster internet above 2 Mbps. (Dial up connection
provides 52 Kbps connection).
No special wiring is needed.
DSL internet is a very cost-effective method and is best
in connectivity.
User can choose between different
connection speeds and pricing from various providers.
Network Management & Administration 99
100. Disadvantages of DSL :
DSL Internet service only works over a limited physical
distance and remains unavailable in many areas where
the local telephone infrastructure does not support DSL
technology.
Your DSL connection works faster if you live closer to
provider’s central office. The farther your home is from
ISP’s office the more your speed will reduce.
The connection is faster for receiving data than it is for
sending data over the Internet.
Network Management & Administration 100
102. History
• CATV origins date back to 1924 when some cable
broadcasting was done using cable in European cities.
• In 1948, community antenna received were built where over-
the-air signal reception was limited.
• Today, CATV offers Analog and digital channels. Receiving
digital channels typically requires a cable box conversion.
• The abbreviation CATV is often used for cable television. It
originally stood for Community Access Television or
Community Antenna Television, from cable television's origins
in 1948. In areas where over-the-air TV reception was limited
by distance from transmitters or mountainous terrain, large
"community antennas" were constructed, and cable was run
from them to individual homes.
103. CATV
• Community Access Television(CATV) is also commonly
known as Cable TV.
• Cable television is a system of delivering television
programming to consumers via radio frequency (RF)
signals transmitted through coaxial cables, or in more
recent systems, light pulses through fiber-optic cables.
• This contrasts with broadcast television (also known as
terrestrial television), in which the television signal is
transmitted over the air by radio waves and received by a
television antenna attached to the television.
• satellite television, in which the television signal is
transmitted by a communications satellite orbiting the
Earth and received by a satellite dish on the roof.
106. CATV
• FM radio programming, high-speed Internet,
telephone services, and similar non-television
services may also be provided through these cables.
• Analog television was standard in the 20th century,
but since the 2000s, cable systems have been
upgraded to digital cable operation.
• CATV is an shared cable system that uses a tree-
and-branch topology in which multiple households
within a neighborhood share the same cable.
107.
108. Virtual :
Virtual means not real or in a different state of being.
Private :
Private means to keep something secret from the general
public.
Network :
A network consists of two or more devices that can freely
and electronically communicate with each other via cables
and wire.
109. VPN, Virtual Private Network, is defined as a network
that uses public network paths but maintains the
security and protection of private networks.
It can transmit information over long distances
effectively and efficiently.
Large corporations, educational institutions, and
government agencies use VPN technology to enable
remote users to securely connect to a private network.
The VPN uses strong encryption and restricted, private
data access which keeps the data secure from the other
users of the underlying network.
110. VPN
A virtual private network (VPN) extends a private
network across a public network, such as the Internet.
It enables users to send and receive data across shared
or public networks as if their computing devices were
directly connected to the private network.
Applications running across the VPN may therefore
benefit from the functionality, security, and
management of the private network
111. Virtual Private Networks may allow employees to securely
access a corporate intranet while located outside the office.
They are used to securely connect geographically separated
offices of an organization, creating one cohesive network.
Individual Internet users may secure their wireless
transactions with a VPN, to circumvent geo-restrictions
and censorship, or to connect to proxy servers for the
purpose of protecting personal identity and location.
However, some Internet sites block access to known VPN
technology to prevent the circumvention of their geo-
restrictions
112. A VPN is created by establishing a virtual point-to-
point connection through the use of dedicated
connections, virtual tunneling protocols, or traffic
encryption.
A VPN available from the public Internet can provide
some of the benefits of a wide area network (WAN).
From a user perspective, the resources available within
the private network can be accessed remotely.
113.
114. VPNs cannot make online connections completely
anonymous, but they can usually increase privacy and
security. To prevent disclosure of private information,
VPNs typically allow only authenticated remote access
using tunneling protocols and encryption techniques.
The VPN security model provides:
Confidentiality such that even if the network traffic is
sniffed at the packet level (see network sniffer and
Deep packet inspection), an attacker would only see
encrypted data
Sender authentication to prevent unauthorized users
from accessing the VPN
Message integrity to detect any instances of tampering
with transmitted messages
115. Tunneling
In computer networks, a tunneling protocol allows a network
user to access or provide a network service that the underlying
network does not support or provide directly.
One important use of a tunneling protocol is to allow a foreign
protocol to run over a network that does not support that
particular protocol; for example, running IPv6 over IPv4.
Another important use is to provide services that are impractical
or unsafe to be offered using only the underlying network
services; for example, providing a corporate network address to a
remote user whose physical network address is not part of the
corporate network.
Because tunneling involves repackaging the traffic data into a
different form, perhaps with encryption as standard, a third use
is to hide the nature of the traffic that is run through the tunnels.
116. The tunneling protocol works by using the data
portion of a packet (the payload) to carry the packets
that actually provide the service.
Tunneling uses a layered protocol model such as
those of the OSI or TCP/IP protocol suite, but usually
violates the layering when using the payload to carry a
service not normally provided by the network.
Typically, the delivery protocol operates at an equal or
higher level in the layered model than the payload
protocol.
117. Types of VPN
Remote Access VPN:- Also called as Virtual Private dial-up
network (VPDN) is mainly used in scenarios where remote
access to a network becomes essential. Remote access VPN
allows data to be accessed between a company’s private network
and remote users through a third party service provider;
Enterprise service provider
Site to Site VPN – Intranet based: This type of VPN can be
used when multiple Remote locations are present and can be
made to join to a single network. Machines present on these
remote locations work as if they are working on a single network.
Site to Site VPN – Extranet based: This type of VPN can be
used when several different companies need to work in a shared
environment. E.g. Distributors and service companies. This
network is more manageable and reliable
118. A ‘VPN Protocol’ is the set of procedures a VPN service
uses to keep you protected online.
IP security (IPSec)
Secure Sockets Layer (SSL)
Point-To-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
119. IPSec:
IPsec VPN is one of two common VPN protocols, or set
of standards used to establish a VPN connection.
IPsec is set at the IP layer, and it is often used to allow
secure, remote access to an entire network.
SSL:
Secure Sockets Layer, or SSL VPN, is the second
common VPN protocol.
A big plus for SSL VPNs is that they can allow
segmented access for users. For example, users can be
limited to checking email and accessing shared drives
rather than having access to the entire network.
120. Point to Point Tunneling Protocol:
Point-to-point tunneling protocol (PPTP) is a set of
communication rules that govern the secure implementation
of virtual private networks (VPN), which allow organizations
a method of extending their own private networks over the
public Internet via "tunnels.“
Layer 2 Tunneling Protocol :
In computer networking, Layer 2 Tunneling Protocol (L2TP)
is a tunneling protocol used to support virtual private
networks (VPNs) or as part of the delivery of services by ISPs.
It does not provide any encryption or confidentiality by itself.
121. PPTP (Point-to-Point Tunneling Protocol) it’s the most
widely supported VPN method among Windows users
and it was created by Microsoft in association with
other technology companies.
The disadvantage of PPTP is that it does not provide
encryption and it relies on the PPP (Point-to-Point
Protocol) protocol to implement security measures
But compared to other methods, PPTP is faster and it
is also available for Linux and Mac users.
122. L2TP (Layer 2 Tunneling Protocol) it’s another
tunneling protocol that supports VPNs. Like PPTP,
L2TP does not provide encryption and it relies on PPP
protocol to do this.
The difference between PPTP and L2TP is that the
second one provides not only data confidentiality but
also data integrity.
L2TP was developed by Microsoft and Cisco as a
combination between PPTP and L2F(Layer 2
Forwarding).
123. IPsec protocol can be used for encryption in
correlation with L2TP tunneling protocol. It is used as
a “protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting
each IP packet of a data stream”. IPSec requires
expensive, time consuming client installations and this
can be considered an important disadvantage.
124. SSL (Secure Socket Layer) is a VPN accessible via https
over web browser. The advantage of this SSL VPN is
that it doesn’t need any software installed because it
uses the web browser as the client application.
Through SSL VPNs the user’s access can be restrict to
specific applications instead of allowing access to the
whole network.
126. VPN Client
• A VPN client is a software based technology that establishes a
secure connection between the user and a VPN server.
• Some VPN clients work in the background automatically, while
others have front-end interfaces that allow users to interact with and
configure them.
• VPN clients are often applications that are installed on a computer,
though some organizations provide a purpose-built VPN client that
is a hardware device pre-installed with VPN software.
• Both sides of VPN connection must be running compatible VPN
software using compatible protocols.
• For the remote access VPN solutions, the software you install
depends on the VPN itself.
127. VPN Client
• Dedicated VPN solutions also sell client software that we can
distribute to our users. Usually this software carries a per-copy
charge.
• Mainly there are two types of VPN clients:
a) Native or built-in VPN clients
b) Third Party VPN clients
• Some of the VPN Software which are used now a days are as listed
below:
1. Cisco System VPN Client
2. SoftEther VPN
3. OpenVPN Client
128. SSL VPN
• SSL VPN means Secure Socket Layer Virtual Private
Network.
• An SSL VPN is a form of VPN that can be used with a
standard Web browser. In contrast to the traditional
Internet Protocol Security (IPSec) VPN.
• This VPN does not required the installation of
specialized client software on the end user’s computer.
• It’s used to give remote users with access to Web
applications, client/server applications and internal
network connections.
129. SSL VPN
• VPN provides a secure communications mechanism data and
other information transmitted between two endpoints.
• SSL VPN consists of one or more VPN devices to which the
users connects by using his Web browser.
• The traffic between the Web browser and the SSL VPN
device is encrypted with the SSL protocol or its successor, the
Transport Layer Security protocol.
• An SSL VPN offers versatility, ease of use and granular
control for the range of users on a variety of computers,
accessing recourses from many locations.
131. Types of SSL VPN
1. SSL Protocol VPN: -
This type of SSL VPN allows for a single SSL connection to a
Web site so the end user securely access multiple network
services.
The site is called portal because it is one door that leads to
many other resources.
The remote user accesses the SSL VPN Gateway using any
modern Web browser, identifies himself or herself to the
gateway using an authentication method supported by the
gateway and is then presented with a web page that acts as the
portal to the other services.
132. Types of SSL VPN
2. SSL Tunnel VPN: -
This type of SSL VPN allows a Web browser to securely access
multiple network services, including applications and protocols that
are not Web based, through a tunnel that is running under SSL.
SSL tunnel VPNs require that the Web browser be able to handle
active content, which allows them to provide functionally that is not
accessible to the SSL portal VPNs.
Example of active content include Java, JavaScript, Active X or Flash
applications or plug-ins.