BROADBAND AND HIGH SPEED NETWORKS

Similar documents
ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

BROADBAND AND HIGH SPEED NETWORKS

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

ATM Technology in Detail. Objectives. Presentation Outline

ATM Logical Connections: VCC. ATM Logical Connections: VPC

Asynchronous Transfer Mode (ATM) ATM concepts

DigiPoints Volume 1. Leader Guide. Module 12 Asynchronous Transfer Mode. Summary. Outcomes. Objectives. Prerequisites

Chapter 10. Circuits Switching and Packet Switching 10-1

Bandwidth-on-Demand up to very high speeds. Variety of physical layers using optical fibre, copper, wireless. 3BA33 D.Lewis

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

Master Course Computer Networks IN2097

1997, Scott F. Midkiff 1

Asynchronous. nous Transfer Mode. Networks: ATM 1

Asynchronous Transfer Mode

Ethernet Switches (more)

Ch. 4 - WAN, Wide Area Networks

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Module 10 Frame Relay and ATM

Internetworking Part 1

CPEG 514. Lecture 11 Asynchronous Transfer Mode (ATM) CPEG 514

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

This Lecture. BUS Computer Facilities Network Management X.25. X.25 Packet Switch. Wide Area Network (WAN) Technologies. X.

ATM Networks. Raj Jain

Communication Networks

ATM Asynchronous Transfer Mode revisited

Switched Multimegabit Data Service

ATM networks. C. Pham Université de Pau et des Pays de l Adour LIUPPA Laboratory

Distributed Queue Dual Bus

Wireless Networks. Communication Networks

Internet Architecture and Protocol

Switched Multimegabit Data Service (SMDS)

Layer 2 functionality bridging and switching

Asynchronous_Transfer_Mode_Switching

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets

Lecture 7. Network Layer. Network Layer 1-1

CS 4390 Computer Networks. Transport Services and Protocols

Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN)

ATM Networks: An Overview

Basic concept of ATM communication

ATM Introduction. The Grand Unification 2005/03/11. (C) Herbert Haas

Lecture 03 Chapter 11 Asynchronous Transfer Mode

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Module 3. Wide Area Networking (WAN)

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

BROADBAND AND HIGH SPEED NETWORKS

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Lesson 3 Network technologies - Controlling

PRACTICES FNC Guide to ATM GUIDE TO ATM CROSS PRODUCT DOCUMENTATION ISSUE 1, JANUARY 2002 FUJITSU NETWORK COMMUNICATIONS, INC.

BROADBAND AND HIGH SPEED NETWORKS

Local Area Network Overview

GFP Considerations for RPR

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

NETWORK PARADIGMS. Bandwidth (Mbps) ATM LANS Gigabit Ethernet ATM. Voice, Image, Video, Data. Fast Ethernet FDDI SMDS (DQDB)

Introduction. ATM Technology. What is ATM? Agenda

CISC452 Telecommunications Systems. Lesson 6 Frame Relay and ATM

ACE-2002, ACE-2002E. Multiservice Access Concentrators/ ATM Network Termination Units FEATURES

ASYNCHRONOUS TRANSFER MODE

Module 10 Frame Relay and ATM

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.

Common Protocols. The grand finale. Telephone network protocols. Traditional digital transmission

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

The Design and modeling of input and output modules for an ATM network switch

Appendix 5 - ATM Technology in Detail

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

Defining Networks with the OSI Model. Module 2

Advanced Internet Technologies

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

WAN Technologies (to interconnect IP routers) Mario Baldi

Introduction to Protocols

Chapter 15 Computer and Multimedia Networks

Introduction to Open System Interconnection Reference Model

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Backbone network technologies. T Jouni Karvo, Timo Kiravuo

EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers)

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

Metropolitan Area Networks

Cell Format. Housekeeping. Segmentation and Reassembly AAL 3/4

Wide area networks: packet switching and congestion

Lecture 4 Wide Area Networks - Asynchronous Transfer Mode

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

INTRODUCTORY COMPUTER

Computer Networks (Introduction to TCP/IP Protocols)

ATM Quality of Service (QoS)

ET4254 Communications and Networking 1

Need For Protocol Architecture

Need For Protocol Architecture

Internetworking Models The OSI Reference Model

DS3/ATM Physical Layer Interface Specification

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Backbone network technologies. T Jouni Karvo, Timo Kiravuo

Transcription:

BROADBAND AND HIGH SEED NETWORKS

LAYERS The function and associated information of the planes is as follows: The reference model is composed of the following planes: Control lane manages the call and connection. User lane manages the transfer of data, flow control, and error control. Management lane : This plane contains two components: Layer management manages functions, such as the detection of failures and protocol problems. lane management manages and coordinates functions related to the complete system.

LAYER FUNCTIONS The higher layers The user services are supported in these layers. Four classes of service have been identified: Class A connection oriented constant bit rate, e.g. speech Class B connection oriented with timing between the source and destination, e.g. video Class C connection oriented without timing, e.g. data Class D connectionless, e.g. data from LANs and MANs The adaption layer The AAL converts application data into data units in order to provide support for user applications. All AAL functions are performed at the edges of the network, and all AAL information is carried within the cell information fields transparently by the layer. The layer This layer takes and returns data from the AAL and generates and interprets the cells respectively. The layer transports the data according to the protocol information in the cell headers transparently. The physical layer This is the lowest level layer, and it is responsible for the transmission of cells as bit streams across a physical medium.

REFERENCE MODEL OSI Reference Model Reference Model Application resentation Session Transport Network Data Link hysical lane Management Layer Management Control lane User lane Q.2931 Upper Layers Adaptation Layer Layer hysical Layer 4

REFERENCE MODEL User UL AAL Network User UL AAL hysical hysical hysical hysical hysical UNI NNI NNI UNI Transfer of User ayload 5

REFERENCE MODEL Endpoint Endpoint Upper Layers AAL hysical User Control AAL Control Control hysical Control Upper Layers AAL hysical Cell Cell 6

REFERENCE MODEL Host Host User Application User Application Application Application resentation resentation Session Session Transport Transport Network (N) Network Network Network (N) Data Link (D) hysical () D UNI AAL Network AAL UNI D Data Link (D) hysical () Router ( Endpoint) NNI Router ( Endpoint) 7

REFERENCE MODEL Host Host User Application User Application Application Application resentation resentation Session Session Transport Transport Network (N) Network Network Network (N) Data Link (D) hysical () D AAL AAL D Data Link (D) hysical () UNI UNI Router ( Endpoint) Switch NNI Network Switch Router ( Endpoint) 8

REFERENCE MODEL The physical and AAL layers are divided into two sublayers, one at the bottom that does the work and a convergence sublayer on the top that provides the proper interface to the layer above it. 9

REFERENCE MODEL AAL hysical CS SAR TC MD roviding the standard interface Segmentation and reassembly Flow control Cell header generation/extraction Virtual circuit/path management Cell multiplexing and demultiplexing Cell delineation Header checksum generation and verification Cell rate decoupling acking/unpacking cells from the enclosing envelope Bit timing hysical medium 10

THE HYSICAL LAYER The physical layer is divided into two parts: A. The physical medium-dependent (MD) sublayer. B. The transmission convergence (TC) sublayer. A. The MD sublayer provides two key functions: It synchronizes transmission and reception by sending and receiving a continuous flow of bits with associated timing information. It provides the physical medium specifications used, including connector types and cable. Examples of physical medium standards for include Synchronous Digital Hierarchy/Synchronous Optical Network (SDH/SONET), DS-3/E3, 155Mbps over Multi-Mode Fiber (MMF), and over Shielded Twisted-air (ST) cabling. B. The TC sublayer has four functions: Cell delineation: It maintains cell boundaries, allowing devices to locate cells within a stream of bits. Header error control (HEC) sequence generation and verification: It generates and checks the header error control code. Cell-rate decoupling: To maintain synchronization, it inserts idle cells at the sending end and extract them at the receiving end to adapt the rate of valid cells to the payload capacity of the transmission system. Transmission frame adaptation: To package cells into frames acceptable to the particular physical layer implementation. 11

HEADER CHECKSUMMING Each cell contains a 5-byte header consisting on 4 bytes followed by a 1-byte checksum (HEC). The contents of the header are meaningless to the TC sublayer. The checksum only covers the first four header bytes, not the payload field. It is up to the higher layers to checksum the payload field. The HEC scheme corrects all single-bit errors and detects many multi-bit errors as well. 12

CELL TRANSMISSION Once the HEC has been generated and inserted into the cell by the TC sublayer, the cell is ready for transmission. Transmission media comes in two categories: asynchronous and synchronous. When an asynchronous medium is used, a cell can be sent whenever it is ready to go. No timing restrictions exist. With a synchronous medium, cells must be transmitted according to a predefined timing pattern. If no data cell is available when needed, the TC sublayer adds idle cells. Another kind of non-data cell is Operation and Maintenance (OAM) cell which used by the switches for exchanging control information for keeping the system running. The job of matching the output rate to the rate of the underlying transmission system is a task of the TC sublayer. Finally, the TC sublayer generates the SONET/SDH framing and pack the cells inside. 13

CELL RECETION On the receiver side, the TC sublayer: Takes an incoming bit stream, locates the cell boundaries. Verifies the headers (discarding cells with invalid headers). rocesses OAM cells. asses the data cells up to the layer. With SDH/SONET, cells can be aligned with the synchronous payload envelope (SE), so the SE pointer in the SONET/SDH header points to the start of the first full cell. 14

THE LAYER It defines the layout of a cell and tells what the header fields mean. It also deals with Virtual circuit/path management. Flow control is also handled by this layer. The layer is responsible for the simultaneous sharing of virtual circuits over a physical link (cell multiplexing) and passing cells through the network (cell relay) by using the VCI/VI information in the header of each cell. 15

THE ADATATION LAYER (AAL) adaptation layer (AAL) Combined with the layer, the AAL is roughly similar to the data link layer of the OSI model. The AAL is responsible for isolating higher-layer protocols from the details of the processes. The adaptation layer prepares user data for conversion into cells and segments the data into 48-byte cell payloads, and reassembles them at the other end Finally, the higher layers residing above the AAL accept user data, arrange it into packets, and hand it to the AAL. The AAL layer is split into : A segmentation and Reassembly sublayer (SAR): It breaks packets up into cells on the transmission side and put them back together again at the destination. A Convergence Sublayer (CS): It makes it possible to have systems offer different kinds of services to different applications (e.g., file transfer and video on demand have different requirements concerning error handling timing, etc.). 16

RINCILE TASKS OF THE AAL The AAL is designed to support different types of applications and different types of traffic, such as voice, video, and data. Once the analog signals have been converted to digital, all transmissions can be treated as data bits. However, if we examine the transmission requirements of voice and data, they are quite different. Voice and lower-quality video transmissions exhibits a high tolerance for errors. In contrast, data transmissions have no tolerance for errors. ackets may be discarded in the event of congestion in the network. The network delay for the voice and video cells must be constant and must be low. In contrast, specific data applications exhibit different delay requirements. For example, LANto-LAN traffic is more delay sensitive than E-mail traffic. Voice and video transmissions require a short queue length at the network nodes in order to reduce delay. However, data packets require the queue length to be longer to prevent packet loss. 17

CONGESTION CONTROL Several strategies are used in networks for Congestion Control: Admission Control. Resource Reservation. Rate-Based Congestion Control. 18

ADMISSION CONTROL The major tool for preventing congestion is admission control. When a host wants a new virtual circuit, it must describe the traffic to be offered and the service expected. The network can then check if it is possible to handle this connection without affecting the existing connections. Multiple potential routes may have to be examined to find one which can do the job. If no route can be located, the call is rejected. A small number of high-bandwidth users can severely affect many low-bandwidth users. To prevent this users should b divided into classes based on usage. 19

RESOURCE RESERVATION The second technique is to reserve resources during call setup time. The network has the possibility of reserving enough bandwidth along the path to handle that rate. If the SETU message hits a line that is full, it must backtrack and look for an alternative path. With CBR and VBR traffic, it is generally not possible for the sender to slow down, even in the event of congestion. With UBR, the cells are just dropped. With ABR traffic, it is possible for the network to signal one or more senders and ask them to slow down temporarily until the network can recover. It is an interest of the sender to comply, because the network can punish the sender by throwing out the excess cells. There are two solutions: Credit-Based Solution & Rate-Based Solution The credit-based solution requires each switch to maintain, per virtual circuit, a credit a number of buffers reserved for that circuit. As long as each transmitted cell has a buffer waiting for it, congestion could never arise. The switch vendors are against of this solution because of the large overhead. The rate-based solution congestion control scheme was adopted. It works like this: After every k data cells, each sender transmits a special Resource Management (RM) cell. This cell travels along the same path as the data cells, but it is treated specially by the switches along the way. When it gets to the destination, it is examined, updated, and sent back to the sender. In addition, overloaded switches generate RM cells and ship them back to the sender. 20