Solved

X.25 and X.28 INET WAN

Posted on 1998-12-02
1
346 Views
Last Modified: 2013-12-19
Hi!

My question is something related to WAN with X.25 at Server end and X.28 dialup connection at remote node end. Please give me the details of following questions assuming that X.25 INET 64 KBPS installation at Server end and X.28 9.6 KBPS dialup connection at remote node end :
1. Concept of the entire system. (Please answer in details with all technical aspects preferrably with pictorial diagram. Or refer some book or website from where I can get the required information.)
2. Detailed Data security mechanism.
3. Considering Pt.1 & 2 how far INET is reliable ?

Please also note is there any other solution of the above with the more or less same one time and recurring cost.
0
Comment
Question by:majorjohn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
istal112898 earned 20 total points
ID: 1566592
go to WWW.SCSITE.COM or WWWW.COURSE.COM they have there different networking book you can see, and then buy it in WWW.AMAZON.COM
X.25 goes as high as 2 MBITS currently but it has not been deployed. the protocol was updated in 1991 or 1992 it used to be 64 kb, but it goes higher now. It is not widely used in USA because it is not reliable(it uses Telephone lines which suddenly can be disconnected). It is better to get a Leased line dedicated to the service. 64 kb is used in Switch line and it is not good for WAN used because it is relatively slow. X.25 uses PADs (packet assembler and dissambler)
the X.25 protocol uses error checking which is good. not all WAN uses. The speed limitation is the problem with it. This technology is being replaced by Frame Relay and also ATM (uses Sonet and speed as high as 622 MBITS). so X.25 uses a SVC ( switched virtual circuit)
for the data security you will to use a VPN( virtual private network) which can encript the data and can avoid people to Monitor it. This is what it should be used through a Public network such as the Telephone company and the Internet.

now, the solution to it will be to use Frame relay , which is a combination of X.25 and ISDN. it uses PVC ( permanent Virtual circuit). however, it does not uses ERROR Check (CRC) the trhough put is faster. this Frame relay uses Fiber optic connections. The error checking is left to the devices at the end of each place. so it is not implemented in the cable. This type is used for transfering data all the time. it can use speed from 56 kb up to 1.544 Mbps. to do that you need to digital devices called CSU/DSU just like T1.with a router or a bridge at each end to direct traffic on and of the WAN link.
Now the good thing is that you can purchase framerelay services in 64 Kbps CIR (commited Information Rate). so you do not spend more money.
So called the Telephone company and ask them about Frame Relay service if it is support in your AREA.
Go to Barnes and Noble and Buy a book called a Guide to Networking Essential. That book is a FAT one. very recommended.

0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Increase size of DHCP scope? 16 129
RRAS AND DNS 15 85
Windows routing: allowing Internet and L2TP VPN simultaneously. 2 82
Windows 10 64bit Mapped drive issue 38 121
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question