CCITT X.25 Network Layer Standards

66 Communication Networks Copyright © 2005 PragSoft 3. Some subnets use virtual circuits, some datagrams. This situation has no easy solution. A practical way of addressing it is to use either a network level virtual circuit protocol or a network level datagram protocol for internetworking and require all participating subnets and IWUs that do not support that mode to implement both modes. Given that the subnets may use different network architectures and different protocols, many incompatibilities need to be overcome by the IWUs and gateways, including the following: • Different types of service and network user interfaces • Different message formats • Different addressing schemes • Different packet switching modes • Different routing methods • Different error handling methods • Different security measures

4.5. Network Layer Standards

Network services discussed in Section 4.1 are defined by the ISO 8348 and CCITT X.213 standards. ISO 8880-2 and ISO 8880-3, respectively, provide standards for the provision and support of network services for the virtual circuit and datagram models. Internetworking and the internal breakdown of the network layer into sublayers is covered by the ISO 8648 standard. CCITT X.121 provides a numbering plan for data network addressing on an international basis. There are many other standards pertaining to the network layer. Below we will look at three influential networking and internetworking standards: X.25, X.75, and ISO 8473.

4.5.1. CCITT X.25

X.25 is probably the most widely-known network layer standard. It has been in existence since 1974 and has been revised a number of times. X.25 enjoys widespread use in the industry for connecting DTEs to packet networks, and has found its way to many network products. X.25 encompasses the bottom three layers of the OSI model. For its bottom two layers, however, it simply refers to other standards. It recommends X.21 and X.21 bis see Chapter 2 for its physical layer, and LAP-B see Chapter 3 for its www.pragsoft.com Chapter 4: The Network Layer 67 data link layer. Many vendors have also used other standards instead of these in their products. Strictly speaking, X.25 provides no routing or switching functions. It simply provides an interface between DTEs and network DCEs. As far as X.25 is concerned, the network is an abstract entity, capable of providing end-to-end connections. Figure 4.50 illustrates the role of X.25 in a typical end-to-end connection. The two logical channels between DTEs and DCEs at either end are joined through the packet network to complete an external virtual circuit. X.25 makes no assumptions about the internal mode of the packet network. This may be virtual circuit or datagram. Figure 4.50 X.25 scope and layers. Packet Network X.25 X.21 LAPB L6 L4 L7 L5 X.25 X.21 LAPB X.25 X.21 LAPB DCE DCE X.25 X.25 X.25 X.21 LAPB L6 L4 L7 L5 Logical Channel Logical Channel External Virtual Circuit X.25 provides three types of external virtual circuits which, although similar in many respects, serve different applications: • Virtual Call VC. Virtual calls consist of three sequential phases: i call setup which involves the caller and the callee exchanging call request and call accept packets, ii data transfer which involves the two ends exchanging data packets, and iii call clear which involves the exchanging of call clear packets. • Permanent Virtual Circuit PVC. The virtual circuit is permanently assigned by the network, hence the DTEs are guaranteed that a connection will always be available. There is no need for call setup or call clearing, and the data transfer is as in VC. • Fast Select Call . Fast select calls are similar to virtual calls, except that the call setup and the call clear packets may contain up to 128 octets of user data. A variation of this type of circuit provides for the immediate clearing of the call after the first phase. Fast select calls in effect emulate a datagram facility, which is useful for situations where the communication between the two DTEs is limited to a couple of short messages. X.25 provides for sequencing of packets using the send and receive sequence numbers. Flow control is based on the sliding window protocol. Error control uses the Go-Back-N method. All these are used in a similar fashion to their use in HDLC. 68 Communication Networks Copyright © 2005 PragSoft There are three general categories of X.25 packet formats: data packets, control packets, and interrupt packets see Figure 4.51. Most packet types fall into the control packet category. Interrupt packets are used for implementing the network layer’s expedited data service. These are assigned a higher priority, can carry up to 32 octets of user data, and bypass the normal flow control procedures. To avoid flooding the network, only one unconfirmed interrupt packet is allowed at a time. Figure 4.51 X.25 packet format categories. Data Packet: Packet Format Logical ChannelGroup Numbers SendReceive Sequence Numbers User Data Control Packet: Packet Format Logical ChannelGroup Numbers Packet Type Packet Type-dependent Control Info e.g., source and destination DTE addresses, facilities, data Interrupt Packet: Packet Format Logical ChannelGroup Numbers Packet Type: ‘interrupt packet’ Interrupt-related Data X.25 packets support all the network services described in section 4.1, as well as three other services: diagnostic, registration, and restart. Diagnostic packets are used to communicate additional error-related information between X.25 stations. Registration packets enable X.25 subscribers to optimize the network services assigned to them by conveying appropriate requests to the network. Restart packets reset all the logical channels and all the virtual circuits; they are useful for dealing with serious network failures. Other protocols often associated with X.25 are: X.3, X.28, and X.29 collectively referred to as triple-X. These define the functions and the interfaces for a Packet AssemblerDisassembler PAD. The role of the PAD is to allow conventional character-based terminals to be connected to X.25. It assembles the characters from a terminal into a packet ready for transmission and disassembles an incoming packet into a character sequence for terminal consumption. X.3 defines the PAD parameters. X.28 defines the interface between the PAD and the terminal. www.pragsoft.com Chapter 4: The Network Layer 69 X.29 defines the interface between the PAD and the remote host. Figure 4.52 illustrates. It is worth noting that the triple-X have no clear place in the OSI model. Also, their role will diminish over time as X.25 terminals become more widespread. Figure 4.52 The triple-X protocols. X.25 DTE Dumb Terminal X.28 PAD X3 X.29 Packet Network DCE DCE X.25

4.5.2. CCITT X.75