Dialup is simply the application of the Public Switched Telephone Network (PSTN) to carry data on behalf of the end user. It involves a customer premises equipment (CPE) device sending the telephone switch a phone number to direct a connection to. The AS3600, AS5200, AS5300, and AS5800 are all examples of routers that have the capability to run a PRI along with banks of digital modems. The AS2511, on the other hand, is an example of a router that communicates with external modems.
Since the time of Internetworking Technologies Handbook, 2nd edition, the carrier market has continued to grow, and there have been demands for higher modem densities. The answer to this need was a higher degree of interoperation with the telco equipment and the refinement of the digital modem: a modem capable of direct digital access to the PSTN. This has allowed the development of faster CPE modems that take advantage of the clarity of signal that the digital modems enjoy. The fact that the digital modems connecting into the PSTN through a PRI or a BRI can transmit data at more than 53 K using the V.90 communication standard attests to the success of the idea.
Dialup technology traces its origins back to the days of the telegraph. Simple signals being sent across an extended circuit were created manually by tapping contacts together to turn the circuit either on or off. In an effort to improve the service, Alexander Graham Bell invented the telephone in 1875 and changed communication forever. Having the capability to send a voice across the line made the technology more accessible and attractive to consumers. By 1915, the Bell system stretched from New York to San Francisco. Demand for the service drove technological innovations, which led to the first transatlantic phone service in 1927 via radio signal. Other innovations along the way included microwave stations that started connecting American cities in 1948, integrated digital networks to improve the quality of service, and communication satellites, which went into service in 1962 with the launch of Telstar 1. By 1970, more than 90 percent of American homes had telephone service.
In 1979 the modulator-demodulator (modem) was introduced, and dialup networking was born. The early modems were slower and subject to proprietary communication schemes. Early uses of modems were for intermittent point-to-point WAN connections. Often, the call would come into a regular phone at a data center. An operator would hear modem tones and place the handset onto a special cradle that was the modem.
In the late 1980s, the ITU-T began setting up V-series recommendations to standardize communications between both data communications equipment (DCE) and data terminal equipment (DTE). Early standards included these:
Modems increased greatly in sophistication in the late 1980s. This was due in part to the breakup of the Bell system in 1984. With the client premises equipment in the hands of free enterprise, competition spurred on the development of speedier connections. More recent standards include these:
The first access servers were the AS2509 and the AS2511. The AS2509 could support 8 incoming connections using external modems, while the AS2511 could support 16. The AS5200 was introduced with 2 PRIs and could support 48 users using digital modemsthis represented a major leap forward in technology. Modem densities have increased steadily, with the AS5300 supporting four and then eight PRIs. The AS5800 was later introduced to fill the needs of carrier class installations needing to handle dozens of incoming T1s and hundreds of user connections
A couple of outdated technologies bear mentioning in a historical discussion of dialer technology. 56 Kflex is an older (pre-V.90) 56 K modem standard that was proposed by Rockwell. Cisco supports version 1.1 of the 56 Kflex standard on its internal modems, but it recommends migrating the CPE modems to V.90 as soon as possible. Another outdated technology is the AS5100. The AS5100 was a joint venture between Cisco and a modem manufacturer. The AS5100 was created as a way to increase modem density through the use of quad modem cards. It involved a group of AS2511s built as cards that were inserted into a backplane shared by quad modem cards, and a dual T1 card.
Today dialup is still used as an economical alternative (depending on the connection requirements) to dedicated connectivity. It has important uses as backup connectivity, in case the primary lines go down. Dialup also offers the flexibility to create dynamic connections as needed.
This section provides information from various dialup options. Also included are advanced options for dialup connectivity and various dialup methods.
![]() |
Note So what's an acceptable level? Studies have shown the voice range to be 300 Hz to 3400 Hz. 4000 Hz covers the range, but according to Nyquist's theorem, sound must be sampled at twice that rate to capture both the high and the low of the sound waves. |
The encoding and decoding of voice is done by a piece of telco gear called a CODEC. The CODEC was needed to allow backward-compatibility with the old analog phones that were already in widespread use when the digital network was introduced. Thus, most phones found in the home are simple analog devices.
Dialup connectivity across POTS lines has historically been limited to about 33,600 bps via modemoften referred to as V.34 speeds. Recent improvements have increased the speed at which data can be sent from a digital source to a modem on a POTS line, but using POTS lines on both ends of the connection still results in V.34 connectivity in both directions.
Intended for home use, this application of ISDN uses the same copper as a POTS line, but it offers direct digital connectivity to the telephone network. A special piece of equipment known as a terminal adapter is required (although, depending on the country, it may be integrated into the router or DCE device). Always make sure to checkthe plug used to connect to the wall socket looks the same whether it's the S/T or U demarcation point.
Normally, a Basic rate interface (BRI) interface has two B (bearer) channels to carry data, and one D (delta) channel to carry control and signaling information. Local telephone carriers may have different plans to suit local needs. Each B channel is a 64 K line. The individual 64 K channels of the telephone network are commonly referred to as digital service 0 (DS0). This is a common denominator regardless of the types of services offered, as will be shown later in this chapter.
The BRI interface is a dedicated connection to the switch and will remain up even if no calls are placed.
![]() |
Note So how do three channels get across a single pair of copper wires? It's a process called time division multiplexing (TDM). The signals on the cable are divided into time slots. This means that both ends of the line must synchronize their timing when the line is initialized. Having the line up shows a state of MULTIPLE_FRAME_ESTABLISHED, which, among other things, means the clocking is synchronized and the two devices communicating are now sending TDM frames back and forth. |
The T1/E1 line is designed for use in businesses. T1 boasts 24 TDM channels run across
a cable with 2 copper pairs. E1 offers 32 channels, although 1 is dedicated to frame synchronization. As is the case with the BRI, the T1/E1 connection goes directly into the telco switch. The connection is dedicated, so like a BRI, the T1/E1 remains connected and communicating to the switch all the timeeven if there are no active calls. Each of the channels in the T1/E1 is just a B channel, which is to say that it's a 64-K DS0. The T1/E1 is also referred to as digital service 1 (DS1).
The North American T1 uses frames to define the timing between individual channels. For T1s, each frame has 24 9-bit channels (8 bits of data, 1 bit for framing). That adds up to 193 bits per frame. So, at 8000 of those per second, the T1 is carrying 1.544 Mbps between the switch and the customer premises equipment (CPE).
The E1 similarly uses frames for timing, but the E1 uses 32 8-bit channels for a 256-bit frame. Again at the 8000 Hz rate, the channel yields 2.048 Mbps of traffic between the switch and the CPE. Most of the world uses the E1.
Depending on the region, various line code and framing schemes will have to be used for the CPE and the switch to understand each other. For example, in North America, the encoding scheme most often seen is called binary 8 zero substitution (B8ZS), and the most common framing done is extended super frame (ESF). The telco through which the T1/E1 service is purchased must indicate which line code and framing should be used.
For dialup purposes, there are two types of T1/E1: Primary Rate Interface (PRI) and channel associated signaling (CAS). PRI and CAS T1/E1s are normally seen in central locations that receive calls from remote sites or customers.
T1 Channel associated signaling (CAS) lines have 24 56K channelspart of each channel is borrowed for call signaling. This type of service is also called robbed-bit signaling. The E1 CAS still uses only the 16th channel for call signaling, but it uses the R2 international standard for analog call signals.
CAS is not an ISDN interface; it allows only analog calls to come into the access server. This is often done to allow an access server to work with a channel bank, and this scenario is seen more commonly in South America, Europe, and Asia.
Advances in access server technology have allowed the development of new standards to take advantage of better connectivity at the server end. These standards are X2, 56 Kflex, and V.90. X2 and 56 Kflex represent earlier proprietary standards that were made obsolete by V.90. The assumption made by all these standards is that the access server has digital connectivity to the telephone network. The new model is shown in Figure 15-2:
Notice that the signal goes through only one analog conversion. Because the conversion is done on the client's side, traffic generated by the client modem is limited to V.34 speeds. The traffic coming from the access server is not subject to the noise problems that an analog conversion would introduce, so it can be sent at much higher speeds. Thus, the client can receive data at v.90 speeds but can send data at only V.34 speeds.
So how does it really work? Here's the overall flow of the data as it goes through a modem as shown in Figure 15-3:
Going from the DTE device, the data is sent through the UART, which handles buffering and flow control with the host. The data compressor passes the data to the packetizer, which puts a checksum on it and sends it on to the DSP. The packetizer also handles retransmits if the data doesn't get through to the other DCE. The data travels onward to the digital to analog processor, which pushes the data out the RJ11 jack to the phone line. Receiving data goes in the reverse process.
In theory, V.90 modems could send data at 56 kbps, but because of limits placed on the phone lines by government agencies, 53 kbps is all that is currently possible.
PPP bears mentioning because it is so vital to the operation of dialup technologies. Until PPP came along in 1989 (RFC 1134currently up to RFC 1661), dialup protocols were specific to the protocol being used. To use multiple protocols, it was necessary to encapsulate any other protocols within packets of whatever protocol the dialup link was running. Many of the proprietary link methods (such as SLIP) didn't even have the capability to negotiate addressing. Fortunately, PPP does this and many more things with flexibility and extensibility. PPP connection establishment happens in three phases: Link Control Protocol (LCP), authentication, and Network Control Protocol (NCP). (See Chapter 13, "Point-to-Point Protocol," for more information.)
LCP is the lowest layer of PPP. Because PPP does not follow a client/server model, both ends of the point-to-point connection must agree on the negotiated protocols. When negotiation begins, each of the peers wanting to establish a PPP connection must send a configure request (CONFREQ). Included in the CONFREQ are any options that are not the link default. These often include maximum receive unit, async control character map, authentication protocol, and the magic number. At this stage, the peers negotiate their authentication method and indicate whether they will support PPP multilink.
In the general flow of LCP negotiations, there are three possible responses to any CONFREQ:
1. A configure-acknowledge (CONFACK) must be issued if the peer recognizes the options and agrees to the values seen in the CONFREQ.
2. A configure-reject (CONFREJ) must be sent if any of the options in the CONFREQ are not recognized (such as some vendor-specific options) or if the values for any of the options have been explicitly disallowed in the configuration of the peer.
3. A configure-negative-acknowledge (CONFNAK) must be sent if all the options in the CONFREQ are recognized, but the values are not acceptable to the peer.
The two peers continue to exchange CONFREQs, CONFREJs, and CONFNAKs until each sends a CONFACK, until the dial connection is broken, or until one or both of the peers indicates that the negotiation cannot be completed.
Authentication is an optional phase, but it is highly recommended on all dial connections. In some instances, it is a requirement for proper operationdialer profiles, being a case in point.
The two principal types of authentication in PPP are the Password Authentication Protocol (PAP) and the Challenge Handshake Authentication Protocol (CHAP), defined by RFC 1334 and updated by RFC 1994.
When discussing authentication, it is helpful to use the terms requester and authenticator to distinguish the roles played by the devices at either end of the connection, although either peer can act in either role.
Requester describes the device that requests network access and supplies authentication information; the authenticator verifies the validity of the authentication information and either allows or disallows the connection. It is common for both peers to act in both roles when a DDR connection is being made between routers.
PAP is fairly simple. After successful completion of the LCP negotiation, the requester repeatedly sends its username/password combination across the link until the authenticator responds with an acknowledgment or until the link is broken. The authenticator may disconnect the link if it determines that the username/password combination is not valid.
CHAP is somewhat more complicated. The authenticator sends a challenge to the requester, which then responds with a value. This value is calculated by using a "one-way hash" function to hash the challenge and the CHAP password together. The resulting value is sent to the authenticator along with the requester's CHAP host name (which may be different from its actual host name) in a response message.
The authenticator reads the host name in the response message, looks up the expected password for that host name, and then calculates the value that it expects the requester
to send in its response by performing the same hash function the requester performed.
If the resulting values match, the authentication is successful. Failure should lead to a disconnection. By RFC standards, the authenticator can request another authentication at any time during the connection.
NCP negotiation is conducted in much the same manner as LCP negotiation with CONFREQs, CONFREJs, CONFNAKs, and CONFACKs. However, in this phase of negotiation, the elements being negotiated have to do with higher-layer protocolsIP, IPX, bridging, CDP, and so on. One or more of these protocols may be negotiated. Refer to the following RFCs for more detail on their associated protocols:
The Multilink Point-to-Point Protocol (MLP, RFC 1990) feature provides a load-balanced method for splitting and recombining packets to a single end system across a logical pipe (also called a bundle) formed by multiple links. Multilink PPP provides bandwidth on demand and reduces transmission latency across WAN connections. At the same time, it provides multivendor interoperability, packet fragmentation with proper sequencing, and load calculation on both inbound and outbound traffic. The Cisco implementation of multilink PPP supports the fragmentation and packet sequencing specifications in RFC1717.
Multilink PPP works over the following interface types (single or multiple):
Multichassis multilink PPP (MMP), on the other hand, provides the additional capability for links to terminate at multiple routers with different remote addresses. MMP can also handle both analog and digital traffic.
This functionality is intended for situations in which there is a large pool of dial-in users, and a single access server cannot provide enough dial-in ports. MMP allows companies to provide a single dialup number to their users and to apply the same solution to analog and digital calls. This feature allows Internet service providers, for example, to allocate a single ISDN rotary number to several ISDN PRIs and not have to worry about whether a user's second link is on the same router.
MMP does not require reconfiguration of telephone company switches.
Another technology that should be mentioned because of its importance is Authentication, Authorization, and Accounting (AAA). The protocols used in AAA can be either TACACS or RADIUS. These two protocols were developed in support of a centralized method to keep track of users and accesses made on a network. AAA is employed by setting up a server (or group of servers) to centrally administer the user database. Information such as the user's password, what address should be assigned to the user, and what protocols the user is allowed to run can be controlled and monitored from a single workstation. AAA also has powerful auditing capabilities that can be used to follow administratively important trends such as connection speeds and disconnect reasons. Any medium or large dialup installation should be using AAA, and it's not a bad idea for small shops, either.
Most routers support automated methods for dynamic links to be connected when traffic that needs to get to the other end arrives. Cisco's implementation is called dial-on-demand routing (DDR). It provides WAN connectivity on an economical, as-needed basis, either as a primary link or as backup for a nondial serial link.
At its heart, DDR is just an extension of routing. Interesting packets are routed to a dialer interface that triggers a dial attempt. Each of the concept's dialer interface and interesting traffic bear explanation.
The term dialer has a few meanings, depending on the specifics of the configuration, but in general, it refers to the interface where the routing is actually happening. This is the interface that knows the address and phone number where the traffic is supposed to go. When looking at the routing table, the dialer interface should be the interface referenced for the next hop to reach the network on the other side. The dialer interface does not have to be the physical interface that is doing the dialing, but it can be made so by placing the configuration command dialer in-band in a physical interface. Thereafter, the interface becomes a dialer. For example, an async interface is not a dialer by default, but placing the configuration command dialer in-band in the async interface causes dialer behavior on that interface. For example, calls received by that async interface after applying the command will have an idle timeout applied to the connection from then on. An example of a physical interface that is also a dialer by default would be the BRI interface.
![]() |
Note An idle timer is used by Cisco IOS to track how long a connection has gone without interesting traffic. By default, it's set to 2 minutes; after 2 minutes of inactivity, the call is hung up. |
Beyond making physical interfaces into dialers, there are interfaces called dialer interfaces. These are logical interfaces that call upon real interfaces to place calls. The advantage of using a dialer interface is flexibility. A group of potential DDR links can share a handful of BRI interfaces. Dialer interface configuration comes in two flavors: dialer map-based (sometimes referred to as legacy DDR) and dialer profiles. Which method you use depends on the circumstances under which you need dial connectivity. Dialer map-based DDR was first introduced in IOS Version 9.0; dialer profiles were introduced in IOS Version 11.2.
The term interesting is used to describe packets or traffic that will either trigger a dial attempt or, if a dial link is already active, reset the idle timer on the dialer interface. For a packet to be considered interesting, it must have these characteristics:
Packets are never automatically considered to be interesting (by default). Interesting packet definitions must be explicitly declared in a router or access server configuration.
In long-distance situations, a user often dials into a local ISP and uses an IPSec-encrypted tunnel going back to a home gateway system that allows access to the rest of the corporate network. In this example, the phone call itself costs nothing, and an account with the local ISP could be significantly less expensive than the long-distance charges that would otherwise be incurred. As another example, a BRI attached at a central office located in an area that offers inexpensive rates on ISDN could have database servers configured to call out to other sites and exchange data periodically. Each site needs only one BRI line, which is significantly less expensive than dedicated links to each of the remote locations. Finally, in the case of a backup link, the savings are seen when the primary link goes down but business continues, albeit slower than normal.
There's also speed to consider. Dialup connectivity has a strong high-end bandwidth, particularly with the capability to tie channels together using PPP multilink, but dedicated connectivity through a serial port can outperform dialup connections.
Another consideration is security. Certainly, any PPP connection should be authenticated, but this presents anyone with the dialup number an opportunity to break into the system. A significant part of any dialup system's configuration concerns the capability to keep out unwanted guests. The good news is that it can be done, and AAA goes a long way toward dealing with this problem. However, it is a disadvantage to have potential intruders coming in through dialup lines.
Dialup technology has been around for a long time, but only in the last 20 years or so have the phone lines been available for dialup networking. In that time, a number of standards have been created to make sure that modems can communicate properly with each other and with the systems that employ them. Cisco moved into the access market with the AS2509 and AS2511, which used external analog modems, but Cisco currently produces access servers with cutting edge digital modem technology.
Current dialup technologies include the venerable POTS line as a low-cost and ubiquitous means of connecting via modem. To do this, it uses a single channel, or DS0. A step up from the POTS line is the ISDN BRI line, with two DS0 channels and a D channel used for signaling. Getting up to industrial-strength lines is the T1/E1. The T1 has 24 channels,
and the E1 has 32, although the E1 uses slot 0 for framing and slot 16 for call signaling. PRI service is geared to allow ISDN clients to connect, while CAS will allow only asynchronous calls in.
Modems themselves have advanced considerably in recent years to take advantage of the direct digital connection that the access server modems have to the PSTN. This results in V.90 connections that can transfer data from the server to the client at speeds up to 53 kbps. Because of the analog conversion on the analog line, transmissions from the client modem are still capable of only 33.6 kbps.
After a connection is established, it's important to have a robust transport to use the link. PPP fills that need. With its three-phase startupLCP, authentication, and NCPPPP adapts to its environment and can learn its connection information while supporting a strong authentication scheme. PPP can extend a connection into a bundle across multiple connections by using PPP multilink. A step beyond that is extending the PPP multilink capability across multiple chassis. For large installations, this is invaluable because users get their PPP multilink sessions wherever the vacant DS0s are.
Dial-on-demand routing (DDR) uses two important concepts: the dialer and interesting traffic. The dialer is simply the interface that is handling the routing and controlling whether a call is placed. Interesting traffic is the traffic that has been defined as worth bringing up the link or keeping it up for.
When to use dialup technology is a question of usage pattern. In some circumstances, such as with a mobile endpoint, dialup is the only solution that will work. Also, in cases where intermittent connectivity is needed, it can be more cost-effective. However, if connectivity is needed most of the time, dialup may become the more costly alternative. Speed is another concern: Dialup connections are not typically as fast as a dedicated network connection. Security can be a concern for dialup sites as well.
Obviously, dialup technology has a place today at the outer edge of the network, providing access to those who need it from unfamiliar locations or from locations where better technologies are simply not available. Whenever the need calls for flexibility or low utilization in a connection, dialup technologies should be looked at as a viable solution.
QHow many years did it take the telephone to reach 90 percent of the homes in the United States?
AThe telephone was invented in 1875, and in 1970, 90 percent of American homes had a phoneit took 95 years.
QWhich V series recommendations pertain to bits per second?
AV.21, V.23, V.27ter, V.29, V.32bis, V.34, and V.90.
QHow many DS 0s are in a BRI, T1, and E1m respectively?
ATwo in a BRI (although the D channel might be considered a third); 24 in a T1; and 32 in an E1.
QWhat is the flow of data going through a modem from the RJ 11 to the DTE?
AThe data flows in the RJ 11 jack to the analog-to-digital converter. The DSP then gets the data and forwards it on to the packetizer, which sends the data to the data compressor. The decompressed data is then sent to the UART, which gets the data to the DTE device.
QWhat are the three phases of PPP negotiation? Why is the order significant?
ALCP, authentication, and NCP. LCP must complete first because it determines whether the link is viable and negotiates the link properties between the two peers. LCP also finds out whether authentication is needed. Authentication happens before network protocols are negotiated so that the network protocol negotiation will be capable of identifying the incoming user or host and assigning the appropriate network attributes.
QHow does interesting traffic relate to the idle timer?
AInteresting traffic determines whether the link will remain up or time out. Interesting traffic resets the idle timer to zero.
QIs a BRI interface a dialer? How would an async interface become a dialer?
AA BRI interface is a dialer. An async interface could become a dialer by having the dialer in-band configuration command entered into it.
QWhen is dialup connectivity appropriate to use? When isn't it appropriate?
ADialup connectivity is adaptable but expensive. For intermittent connections or connections in which the endpoints move around, dialup is a convenient and sensible use. For permanent connectivity or links that stay up most of the time, it is not appropriate.
Cisco Systems. Cisco IOS Dial Solutions. Indianapolis: Cisco Press, 1998.
ftp://ftp.cisco.com/pub/rfc/RFC/
http://hea-www.harvard.edu/~fine/ISDN/overview.html
http://isds.bus.lsu/edu/cvoc/projects/TechLibrary/CableIS/history.html
http://www.digitalcentury.com/encyclo/update/cmodem.html http://www.itu.int/itudoc/itu-t/rec/v/
Posted: Wed Feb 20 21:23:44 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.