click for audio related to this page
This lesson examines connection service options. Many network connection choices are available, and each has advantages and disadvantages. We begin with simple telephone lines and move on to cover high-speed digital services.
The issue is simple: it is difficult and expensive to move data quickly over long distances. The three factors an administrator must take into account when considering how to implement modem communications are:
Dial-up lines are common telephone lines. They are slow, require users to make a connection for each communication session manually, and can be unreliable for transmitting data. However, for some companies it may be practical to temporarily use a dial-up communication link between sites for a certain amount of time each day to transfer files and update databases.
Run the c07dem16 video located in the Demos folder on the CD accompanying this book to view a presentation of a dial-up communication link.
Carriers are continually improving their dial-up line service. Some digital lines support data transmission speeds of up to 56 Kbps using error correction, data compression, and synchronous modems.
Leased (Dedicated) Lines
Leased, or dedicated, lines provide full-time, dedicated connections that do not use a series of switches to complete the connection. The quality of the line is often higher than the quality of a telephone line designed for voice transmission only. They typically range in speed from 56 Kbps to 45 Mbps or more.
Run the c07dem17 video located in the Demos folder on the CD accompanying this book to view a presentation of leased (dedicated) lines.
Most long-distance carriers use switched circuits to provide what appears
to be a dedicated line. These are called "virtual private networks" (VPNs).
The key difference between RAS service on a server computer and on a client computer lies in the number of simultaneous connections allowed. For example, a Windows NT Server allows 256 inbound connections, whereas a Windows NT Workstation client allows only one.
Once a user has made a connection, the telephone lines become transparent (invisible to—not perceived by—the user), and users at the remote client can access all network resources just as they would if they were sitting at their computers at the network site. Figure 7.20 shows a remote client connected to a network server using RAS.
Figure 7.20 RAS allows remote users to access the network
The physical connection to a RAS server can be made using several different media. These include the following:
RAS supports three connection protocols. The oldest, dating from 1984, is the Serial Line Interface protocol (SLIP). It has a number of shortcomings. SLIP does not support dynamic IP addressing or the NetBEUI or IPX protocols, it cannot encrypt logon information, and it is supported only by RAS clients.
Point-to-Point Protocol (PPP) overcomes many of the limitations of SLIP. In addition to TCP/IP, it supports the IPX, NetBEUI, AppleTalk, and DECnet protocols. It also supports encrypted passwords.
Point-to-Point Tunneling Protocol (PPTP) is an essential part of VPN technology. Like PPP, it does not discriminate among protocols. PPTP provides secure transmission over TCP/IP networks because its connections are encrypted. This enables highly private network links over the public Internet.
RAS and Security
The actual methods by which RAS ensures security can vary with the operating system. RAS security functions include:
To plan for a RAS installation, begin by gathering appropriate documentation about the network and its users. Information you will need includes:
After RAS is installed, it has to be configured. Be prepared to provide settings for the communication ports, network protocols, and RAS encryption.
Configuring Dial-Up Networks If the server will be used to dial other networks, the Internet, or other computers, these connections must be configured. The method of configuration depends on the computer and network operating systems in use.
Limitations of RAS
Using a RAS connection is not always the best choice to achieve network expansion. But it does provide many features and opportunities that might not be otherwise available. It is important to know when to choose RAS and when to select a different option.
Use RAS if you determine that your bandwidth requirements are not greater
than 128 Kbps, if you do not require a full-time connection, or if you
must keep system costs down. Do not use RAS if you need a higher bandwidth
than that provided by an asynchronous modem or if you need a dedicated
PPTP provides a way to route IP, IPX, or NetBEUI point-to-point protocol
packets over a TCP/IP network. By encapsulating these dissimilar protocol
packets, any of these packets can be sent over the TCP/IP network. This
virtual WAN is supported through the public networks such as the Internet.
Using components such as bridges and routers, along with communications service providers, a LAN can be expanded from an operation that serves a local area to encompass a wide area network that can support data communications statewide, countrywide, or even worldwide. To the user, the WAN appears to function like a local area network. When a WAN has been properly implemented, it appears indistinguishable from a LAN.
Most WANs are combinations of LANs and other types of communications components connected by communication links called "WAN links." WAN links can include:
Communication between LANs will involve one of the following transmission technologies:
The fact that the PSTN was designed primarily for voice-grade communication makes it slow; dial-up analog lines require modems that can make them even slower. Figure 7.21 shows a typical dial-up connection. Because the PSTN is a circuit-switched network, the connection quality is inconsistent. Any single communication session will be only as good as the circuits linked for that particular session. Over long distances—country to country, for example—there can be considerable inconsistency in the circuits from one session to the next. With ADSL technology becoming more available, improvements are likely to be made to dial-up lines in the future.
Figure 7.21 An analog telephone line can connect two computers using modems
Dedicated Analog Lines
Unlike dial-up lines that must be reopened each time they are used, dedicated (or leased) analog lines remain open at all times. A leased analog line is faster and more reliable than a dial-up connection. However, it is also relatively expensive, because the carrier is dedicating resources to the leased connection whether or not the line is being used.
Dial-Up or Dedicated?
No type of service is best for all users. The best choice will depend on a number of factors including:
Organizations requiring a faster, more secure transmission environment than that which analog lines provide can turn to digital data service (DDS) lines. DDS provides point-to-point synchronous communication at 2.4, 4.8, 9.6, or 56 Kbps. Point-to-point digital circuits are dedicated circuits that are provided by several telecommunications carriers. The carrier guarantees full-duplex bandwidth by setting up a permanent link from each endpoint to the LAN.
The primary advantage of digital lines is that they provide transmission that is nearly 99 percent error free. Digital lines are available in several forms, including DDS, T1, T3, T4, and switched 56.
Because DDS uses digital communication, it does not require modems (See Figure 7.22). Instead, DDS sends data from a bridge or router through a device called a Channel Service Unit/Data Service Unit (CSU/DSU). This device converts the standard digital signals that the computer generates into the type of digital signals (bipolar) that are part of the synchronous communication environment. It also contains electronics to protect the DDS service provider's network.
Figure 7.22 Digital data service line connecting two remote networks
For higher data speeds, T1 service is perhaps the most widely used type of digital line. It is a point-to-point transmission technology that uses two-wire pairs (one pair to send and the other to receive) to transmit a full-duplex signal at a rate of 1.544 Mbps. T1 is used to transmit digital voice, data, and video signals.
T1 lines are among the most costly of all WAN links. Subscribers who do not need or cannot afford the bandwidth of an entire T1 line can subscribe to one or more T1 channels in 64 Kbps increments, known as Fractional T-1 (FT-1).
Outside the United States, T1 service might not be available, but a similar service, called E1, often is. E1 is very similar to T1, but has a signaling rate of 2.048 Mbps.
Multiplexing Developed by Bell Labs, T1 uses technology called multiplexing, or "muxing." Several signals from different sources are collected into a component called a multiplexer and fed into one cable for transmission. At the receiving end, the data is demultiplexed back into its original form. This approach emerged when telephone cables, which carried only one conversation per cable, became overcrowded. The solution to the problem, called a T-Carrier network, enabled Bell Labs to carry many calls over one cable.
Dividing the Channel A T1 channel can carry 1.544 megabits of data per second, the basic unit of T-Carrier service. T1 divides this into 24 channels and samples each channel 8000 times per second. Using this method, T1 can accommodate 24 simultaneous data transmissions over each two-wire pair.
Each channel sample incorporates eight bits. Because each channel is sampled 8000 times per second, each of the 24 channels can transmit at 64 Kbps. This data rate standard is known as DS-0. The 1.544 Mbps rate is known as DS-1.
DS-1 rates can be multiplexed to provide even greater transmission rates, known as DS-1C, DS-2, DS-3, and DS-4. These have the transmission rates listed in Table 7.3 that follows:
Table 7.3 Digital Transmission Rates
|Signal level||Carrier system||T-1 channels||Voice channels||Data rate (Mbps)|
Copper wire will accommodate T1 and T2. However, T3 and T4 require a high-frequency medium such as microwave or fiber-optic cable.
T3 and Fractional T-3 leased line service provides voice and data-grade service from 6 Mbps to 45 Mbps. These offer the highest-capacity leased-line service commonly available today. T3 and FT-3 are designed for transporting large volumes of data at high speed between two fixed points. A T3 line can be used to replace several T1 lines.
Switched 56 Service
Both local and long-distance telephone companies offer Switched 56 Service,
a LAN-to-LAN digital dial-up service that transmits data at 56 Kbps. Switched
56 is merely a circuit-switched version of a 56-Kbps DDS line. The advantage
of Switched 56 is that it is used on demand, thereby eliminating the expense
of a dedicated line. Each computer using this service must be equipped
with a CSU/DSU that can dial up another Switched 56 site.
How Packet Switching Works
The original data package is broken into packets, and each packet is tagged with a destination address and other information. This makes it possible to send each packet separately over the network.
In packet switching, as shown in Figure 7.23, packets are relayed through stations in a computer network along the best route currently available between the source and the destination.
Each packet is switched separately. Two packets from the same original data package can follow completely different paths to reach the same destination. The data paths selected for individual packets are based on the best route open at any given instant.
Even when each packet travels along a different path and the packets composing a message arrive at different times or out of sequence, the receiving computer is still able to reassemble the original message.
Figure 7.23 Simple packet-switching network
Switches direct the packets over the possible connections and pathways. These networks are sometimes called any-to-any connections. Exchanges in the network read each packet and forward them along the best route available at that moment.
Packet size is kept small. If there is an error in transmission, retransmitting a small packet is easier than retransmitting a large packet. Also, small packets tie up switches for only short periods of time.
Using packet-switching networks to send data is similar to shipping vast quantities of merchandise by truck instead of loading it all onto one train. If a problem should arise with the merchandise on one truck, it is easier to fix or reload than it would be to clean up the mess after a train runs off the track. Also, single trucks do not tie up crossings and intersections (switches) as trains do.
Packet-switching networks are fast and efficient. To manage the tasks of routing traffic and assembling and disassembling packets, such networks require some intelligence from the computers and software that control delivery. Packet-switching networks are economical because they offer high-speed lines on a per-transaction basis instead of for a flat-fee rate.
Many packet-switching networks use virtual circuits. These are circuits composed of a series of logical connections between the sending computer and the receiving computer. The circuit is bandwidth allocated on demand, not an actual cable or permanent, physical link between two stations. The connection is made after both computers exchange information and agree on communication parameters that establish and maintain the connection. These parameters include the maximum message size and the path the data will take.
Virtual circuits incorporate the following communication parameters to ensure reliability:
Switched Virtual Circuits (SVCs) In Switched Virtual Circuits (SVCs), the connection between end computers uses a specific route across the network. Network resources are dedicated to the circuit, and the route is maintained until the connection is terminated. These are also known as point-to-many-point connections.
Permanent Virtual Circuits (PVCs) Permanent Virtual Circuits
(PVCs) are similar to leased lines that are permanent and virtual, except
that the customer pays only for the time the line is used.
An X.25 packet-switching network, as shown in Figure 7.24, uses switches, circuits, and routes, as available, to provide the best routing at any particular time. Because these components (switches, circuits, and routes) change rapidly depending on the need and what is available, they are sometimes depicted as clouds. The clouds are intended to convey the idea that this is an ever-changing situation, or that there is no standard set of circuits.
Figure 7.24 X.25 packet switching uses the best routing for each transmission
The early X.25 networks used telephone lines to transmit data. This was an unreliable medium that resulted in frequent errors, so X.25 incorporated extensive error checking. As a consequence of all of the error checking and retransmission, X.25 can appear to be slow.
Today's X.25 protocol suite defines the interface between a synchronous packet-mode host or other device and the public data network (PDN) over a dedicated or leased-line circuit. This interface is a data terminal equipment/data communications equipment (DTE/DCE) interface.
Examples of DTEs include:
Figure 7.25 Examples of DTEs
Frame relay is an advanced fast-packet variable-length, digital, packet-switching technology. With this technology, designers have stripped away many X.25 accounting and checking functions that are not necessary in a reliable, secure, fiber-optic circuit environment.
Frame relay, as shown in Figure 7.26, is a point-to-point system that uses a PVC to transmit variable length frames at the data-link layer. The data travels from a network over a digital leased line to a data switch and into the frame-relay network. It passes through the frame-relay network and arrives at the destination network.
Figure 7.26 Frame relay uses a point-to-point system
Frame-relay networks are popular because they are much faster than other switching systems at performing basic packet-switching operations. This is because frame relay uses PVC so the entire path from end-to-end is known. There is no need for frame-relay devices to perform packet disassembly and reassembly, or to provide best-path routing.
Frame-relay networks can also provide subscribers with bandwidth as needed, which lets the customer make nearly any type of transmission.
Frame-relay technology requires a frame-relay-capable router or bridge
to successfully transmit data over the network. A frame-relay router needs
at least one WAN port for a connection to the frame-relay network and another
port for the LAN.
ATM is a broadband cell relay method that transmits data in 53-byte cells rather than in variable-length frames. Figure 7.27 illustrates an ATM cell. These cells consist of 48 bytes of application information with five additional bytes of ATM header data. For example, ATM would divide a 1000-byte packet into 21 data frames and put each data frame into a cell. The result is a technology that transmits a consistent, uniform packet.
Figure 7.27 ATM cells have 48 bytes of data and a 5-byte header
Network equipment can switch, route, and move uniform-sized frames much more quickly than it can move random-sized frames. The consistent, standard-sized cell uses buffers efficiently and reduces the work required to process incoming data. The uniform cell size also helps in planning application bandwidth.
Theoretically, ATM can offer throughput rates of up to 1.2 gigabits per second. Currently, however, ATM measures its speed against fiber-optic speeds that can reach as high as 622 Mbps. Most commercial ATM boards will transmit data at about 155 Mbps.
As a reference point, at 622 Mbps ATM could transmit the entire contents of the latest edition of the Encyclopedia Britannica, including graphics, in less than one second. If the same transfer were tried using a 2400-baud modem, the operation would take more than two days.
ATM can be used in LANs and WANs at approximately the same speed in each. ATM relies on carriers such as AT&T and Sprint for implementation over a wide area. This creates a consistent environment that does away with the concept of the slow WAN and the differing technologies used in the LAN and WAN environments.
ATM components are currently available through only a limited number of vendors. All hardware in an ATM network must be ATM-compatible. Implementing ATM in an existing facility will require extensive equipment replacement. This is one reason why ATM has not been adopted more quickly.
However, as the ATM market matures, various vendors will be able to provide:
ATM Switches ATM switches are multiport devices that can act as either of the following:
Figure 7.28 ATM switches act as multiplexers allowing multiple data input
ATM technology requires special hardware and exceptional bandwidth to
reach its potential. Applications that support video or voice would overwhelm
most older network environments and frustrate users trying to use the network
for normal business. Also, implementing and supporting ATM requires expertise
that is not widely available.
Basic Rate ISDN divides its available bandwidth into three data channels. Two of these move data at 64 Kbps, while the third transmits at 16 Kbps.
The 64 Kbps channels are known as B channels. These can carry voice, data, or images. The slower 16 Kbps channel is called the D channel. The D channel carries signaling and link management data. ISDN Basic Rate desktop service is called 2B+D.
A computer connected to an ISDN service can use both B channels together for a combined 128 Kbps data stream. If both end stations also support compression, much higher throughput can be achieved.
Primary Rate ISDN uses the entire bandwidth of a T1 link by providing 23 B channels at 64 Kbps and one D channel at 64 Kbps. The D channel is used only for signaling and link management.
Networks that plan to use ISDN services should consider whether to use
Basic Rate or Primary Rate, based on their need for data throughput. ISDN
is the digital replacement for PSTN and, as such, is a dial-up service
only. It is not designed to be a 24-hour (like T1) or bandwidth-on-demand
(like frame relay) service.
FDDI is used to provide high-speed connections for various types of networks. FDDI can be used for metropolitan area networks (MANs) to connect networks in the same city with a high-speed fiber-optic cable connection. It is limited to a maximum ring length of 100 kilometers (62 miles), so FDDI is not really designed to be used as a WAN technology.
Networks in high-end environments use FDDI to connect components, such as large and small minicomputers, in a traditional computer room. These are sometimes called "back-end networks." These networks typically handle file transfer far more than interactive communication. When communicating with a mainframe, minicomputers or personal computers often require constant, real-time use of the media. They might even need exclusive use of the media for extended periods of time.
FDDI works with backbone networks to which other low-capacity LANs can connect. It is not wise to connect all the data-processing equipment in a company to a single LAN because the traffic can overload the network, and a failure can halt the company's entire data-processing operation.
LANs that require high data rates and fairly extensive bandwidth can use FDDI connections. These are networks composed of engineering computers or other computers that must support high-bandwidth applications such as video, computer-aided design (CAD), and computer-aided manufacturing (CAM).
Any office requiring high-speed network operations might consider using FDDI. Even in business offices, the need to produce graphics for presentations and other documentation can saturate and slow a network.
While FDDI uses a standard token-passing system, there are differences between FDDI and 802.5. A computer on an FDDI network can transmit as many frames as it can produce within a predetermined time before letting the token go. As soon as a computer has finished transmitting, it releases the token.
Because a computer releases the token when it has finished transmitting, there can be several frames circulating on the ring at once. This explains why FDDI offers higher throughput than a Token Ring network, which allows only one frame at a time to circulate.
FDDI operates at 100 Mbps over a dual-ring topology that supports 500 computers over a distance of up to 100 kilometers (62 miles).
FDDI uses shared network technology. This means that more than one computer at a time can transmit. Although FDDI can provide 100 Mbps service, the shared network approach can still become saturated. For example, if 10 computers all transmit at 10 Mbps, the total transmission will equal 100 Mbps. In transmitting video or multimedia, even the 100 Mbps transmit rate can become a bottleneck.
As shown in Figure 7.29, FDDI uses the token-passing system in a dual-ring setting. Traffic in an FDDI network consists of two similar streams flowing in opposite directions around two counter-rotating rings. One ring is called the "primary ring" and the other is called the "secondary ring."
Figure 7.29 FDDI uses a dual-ring topology
Traffic usually flows only on the primary ring. If the primary ring fails, FDDI automatically reconfigures the network so that the data flows onto the secondary ring in the opposite direction.
One of the advantages of the dual-ring topology is redundancy. One of the rings is used for transmission, and the other is used for backup. If there is a problem, such as a ring failure or a cable break, the ring reconfigures itself and continues transmitting.
The total cable length of both rings combined must not exceed 200 kilometers (124 miles), and it cannot hold more than 1000 computers. However, because the second, redundant ring protects against ring failure, the total capacities should be divided in half. Therefore, each FDDI network should be limited to 500 computers and 100 kilometers (62 miles) of cable. Also, there must be a repeater every two kilometers (1.24 miles) or less.
Computers may connect to one or both FDDI cables in a ring. As shown in Figure 7.30, those that connect with both cables are known as Class A stations, and those that connect to only one ring are called Class B stations.
If there is a network failure, Class A stations can help reconfigure the network; Class B stations cannot.
Figure 7.30 Class A computers connect to both rings; Class B computers connect to only one
FDDI in a Star FDDI computers can accommodate point-to-point links to a hub. This means that FDDI can be implemented using the star-ring topology. This is an advantage in that it can:
All computers in an FDDI network are responsible for monitoring the token-passing process. To isolate serious failures in the ring, FDDI uses a system called beaconing. With beaconing, the computer that detects a fault sends a signal, called a "beacon," onto the network. The computer continues to send the beacon until it notices a beacon from its upstream neighbor, and then it stops sending. This process continues until the only computer sending a beacon is the one directly downstream of the failure.
As illustrated in Figure 7.31, Computer 1 faults. Computer 3 detects the fault, starts to beacon, and continues to do so until it receives a beacon from Computer 2. Computer 2 continues to beacon until it receives a beacon from Computer 1. Because Computer 1 is the one with the fault, Computer 2 will continue to beacon and pinpoint the fault's location on Computer 1.
Figure 7.31 FDDI uses beaconing to isolate problems
When the beaconing computer finally receives its own beacon, it assumes the problem has been fixed and regenerates a token; then the network returns to normal operation.
FDDI's primary medium is fiber-optic cable. This means that FDDI is:
SONET is a standard for optical transport that was formulated by the Exchange Carriers Standards Association (ECSA) for ANSI. SONET has also been incorporated into the Synchronous Digital Hierarchy recommendations of the CCITT, also known as the International Telecommunications Union (ITU), which sets the standards for international telecommunications.
SONET defines optical-carrier (OC) levels and electrical-equivalent synchronous transport signals (STSs) for the fiber optic-based transmission hierarchy.
SONET uses a basic transmission rate of STS-1, which is equivalent to 51.84 Mbps. However, higher-level signals are achievable and are integer multiples of the base rate. For example, STS-3 is three times the rate of STS-1 (3 X 51.84 = 155.52 Mbps). An STS-12 would be a rate of 12 x 51.84 = 622.08 Mbps.
SONET provides sufficient payload flexibility that it can be used as
the underlying transport layer for BISDN ATM cells. BISDN is a single ISDN
network that can handle voice, data, and video services. ATM is the CCITT
standard that supports cell-based voice, data, video, and multimedia communication
in a public network under BISDN. The ATM Forum is aligning with SONET as
the transport layer for cell-based traffic.
SMDS uses the same fixed-length cell relay technology as ATM. One SMDS line with the appropriate bandwidth connects into the local carrier and can provide connections between all sites without a call setup or teardown procedure. SMDS does not perform error checking or flow control; that is left up to the sites being connected.
SMDS is compatible with the IEEE 802.6 MAN standard as well as with BISDN, but SMDS provides management and billing services not specified in the IEEE 802.6 specification.
SMDS uses the distributed queue dual bus (DQDB) as the interface and
access method for the network. SMDS is a dual-bus topology that forms a
ring that is not closed.
A medium-sized computer firm lost its telephone service every Monday morning for nearly six months. Each Monday, employees would arrive at work to find that the telephone system was not working. Because no one in the company had the expertise to solve the problem, they contacted their telephone vendor, who sent someone out to repair the system. The telephone company sent a different technician each time, and each time it took the technician only about 15 minutes to fix the system.
One Monday, one of the computer firm's own technicians went to watch the telephone vendor's technician bring the system back up. The technician simply located the telephone system's surge suppressor and hit the reset switch. That was the total fix, and anyone who knew how to reset the surge suppressor (simply by pressing a reset button) could now repair the telephone system.
The point of this story is that even in a complex environment, problems and their solutions do not necessarily have to be complex.
While the answer was ultimately simple, the telephone company's technician was the only person who had the initial expertise necessary to locate and eliminate the problem. If you have WAN communication problems and you have eliminated the LAN's local components as a source of trouble, do not hesitate to call the service provider to ask for help. While this can result in an initial expense, time and money will be saved in the long run.
With that story in mind, forge ahead and work through the following troubleshooting problem.
You are the multitalented network administrator and technician for this computer firm. Your LAN is connected to another LAN in a city 806 kilometers (500 miles) away. The communication link is a digital T1 with a multiplexer that allows you to send telephone conversations and data simultaneously on the same link.
When you came into work on Monday morning, you immediately began to hear complaints from employees who could not use the WAN to access resources at the other site. After some checking, you discovered that you can use the T1 for telephone conversations, but you cannot send or receive data over the link. You now examine all the equipment and connectors but cannot see any obvious loose or frayed connections, and all of the equipment appears to be plugged in and turned on.
What can you do to start the troubleshooting process?
Recently, the company has begun to develop projects that involve team members from more than one office. Each office has resources that the other two do not; the current projects require all of these resources. The internal networks have had frequent cable problems, and each time they have a problem, the entire office network goes down until the problem is resolved.
The management team would like a network design that offers easier troubleshooting, less down time, and provides WAN communication between sites. They would like the WAN connection to be able to support about 256 Kbps of data and several analog telephone conversations between sites (the long-distance bills have been unacceptably high). The combination of long-distance and Federal Express charges should be eliminated by the WAN. Management would like the WAN to be able to continue operating even if one of the WAN links should fail.
If the answers to any of the first three questions was yes, you need a modem. Your next step is to research which vendor's modem best fits your needs.
If the answer is yes, you should consider a modem pool.
If the answer is yes, you might need remote access service. To implement this, you will also need a remote access server.
The determining factors in choosing a WAN connection service include:
A rule of thumb among many experienced network professionals is to use a bridge when dealing with nonroutable protocols. Otherwise, use a router.
If the answer is yes, keep that in mind while you answer the next question.
Many network professionals prefer to use routers when it is possible to use either a bridge or a router to solve the problem. Their general rule is to use a bridge only with nonroutable protocols. In other cases, they use a router. The cost difference between a bridge and a router is small when weighed against the additional capabilities of a router.
If the answer is yes, you probably need point-to-point service.
If the answer is yes, you probably need a point-to-multipoint service.
If the answer is yes, you probably need a multipoint-to-multipoint service.
If the answer is yes, you might need multiple links.
Frame relay and other switching technologies provide redundancy, but not at the transmitting or receiving site. Also, because service providers bill for packet switching by the packet, switching technology can be either more or less expensive than T1, depending on the type of data and frequency of transmission. The service provider is the best source of information about costs.
You will need to do some homework and research service providers to answer this.
Before filling out this chart, you will need to research different vendors and products to identify those that best fit your system's needs.
|Component||Number||Notes and parameters|
|5. Multiple T1|