Virtual Concatenation DATA OVER SONETSDH DOS
3.1 INTRODUCTION
The ATM architecture was designed with a view to transmitting voice, video, and data on the same network. These different types of traffic have different tolerance levels for packet loss and end-to-end delay, as shown in Table 3.1. For instance, packets containing voice have to be delivered on time so that the play-out process at the destination does not run out of data. On the other hand, the loss of some data might not necessarily deteriorate the quality of the voice delivered at the destination. At the other extreme, when transporting a data file, loss of data cannot be tolerated since this will compromise the file’s integrity, but there is no stringent requirement that the file should be delivered as fast as possible. The ATM architecture is based on the packet-switching principle and is connection- oriented. That is, in order for a sender to transmit data to a receiver, a connection has to be established first. The connection is established during the call setup phase, and when the transfer of data is completed, it is torn down. There is neither error control nor flow control between two adjacent ATM nodes. Error control is not necessary, since the links in a network have a very low bit-error rate. In view of this, the payload of a packet is not protected against transmission errors. However, the header is protected in order to guard against forwarding a packet to the wrong destination The recovery of a lost packet or a packet that is delivered to its destination with erroneous payload is left to the higher protocol layers. The lack of flow control requires congestion control schemes that permit the ATM network operator to carry as much traffic as possible without losing too many cells.3.2 THE STRUCTURE OF THE HEADER OF THE ATM CELL
The ATM packet is known as cell, and it has a fixed size of 53 bytes. It consists of a pay- load of 48 bytes and a header of 5 bytes see Figure 3.1. Several considerations – mostly related to the efficient transport of voice – led ITU-T to decide on such a small fixed- size packet. Two different formats for the cell header were adopted, one for the user network interface UNI and a slightly different one for the network-network interface NNI. The Table 3.1 Tolerance levels by traffic type. Traffic Type Tolerance Levels Packet-loss sensitive Delay sensitive Voice Low High Video Moderate High Data High Low Header Payload 48 bytes 5 bytes Figure 3.1 The ATM cell. THE STRUCTURE OF THE HEADER OF THE ATM CELL 49 1 2 3 4 5 6 7 8 GFC VPI VPI VCI VCI VCI PTI CLP HEC Information payload 1 2 3 4 5 6 . . . 53 b y t e s UNI cell format 1 2 3 4 5 6 7 8 VPI VPI VCI VCI VCI PTI CLP HEC Information payload 1 2 3 4 5 6 . . . 53 NNI cell format b y t e s Figure 3.2 The structure of the cell header. UNI is concerned with the interface between an ATM end device and the ATM switch to which it is attached. An ATM end device is any device that can be attached directly to an ATM network and that can transmit and receive ATM cells. The NNI is used between two ATM switches belonging to the same network or to two different networks. The format of the cell header for these two interfaces is shown in Figure 3.2. As we can see, these two formats differ only in the first field. We now proceed to discuss in detail each field in the header. Understanding the meaning of these fields helps to better understand the ATM network architecture. The generic flow control GFC field permits multiplexing of transmissions from several terminals on the same user interface. It is used to control the traffic flow from the end device to the network. An ATM connection is identified by the combined virtual path identifier VPI and virtual channel identifier VCI . Such a connection is referred to as a virtual channel connection VCC . The VPIVCI field is 24 bits in the UNI interface and 28 bits in the NNI interface. The VPI field is 8 bits in the UNI interface and 12 bits in the NNI interface. Therefore, in a UNI interface, there can be a maximum of 256 virtual paths, and in an NNI interface, there can be a maximum of 4096 virtual paths. In each interface, there can be a maximum of 65,536 VCIs. A VPI can be assigned to any value from 0 to 255. VCI values are assigned as follows: 0 to 15 are reserved by ITU-T, 16 to 31 are reserved by the ATM Forum, and 32 to 65,535 are used for user VCCs. The combined VPI and VCI allocated to a connection is known as the connection identifier CI. That is, CI = {VPI, VCI}. A virtual channel connection between two users consists of a path through a number of different ATM switches. For each point-to-point link that lies on this path, the connection is identified by a different VPIVCI. That is, each VPIVCI has local significance and is translated to a different VPIVCI at each switch that the cell traverses. This operation is referred to as label swapping since the connection identifier is also known as a label, a term adapted later on in MPLS. Label swapping involves a look-up in the switchingParts
» COMMUNICATION NETWORKS Connection Oriented Network
» An ATM Connection EXAMPLES OF CONNECTIONS
» An MPLS Connection EXAMPLES OF CONNECTIONS
» A Telephone Connection EXAMPLES OF CONNECTIONS
» A Wavelength Routing Optical Network Connection
» The American National Standards Institute ANSI
» The Institute of Electrical and Electronics Engineering IEEE
» The Internet Engineering Task Force IETF
» The ATM Forum STANDARDS COMMITTEES
» The MPLS and Frame Relay Alliance The Optical Internetworking Forum OIF
» The DSL Forum STANDARDS COMMITTEES
» The Section, Line, and Path Overheads
» The STS-1 Section, Line, and Path Overheads
» THE SONET STS-3 FRAME STRUCTURE
» SONETSDH DEVICES Connection Oriented Network
» Two-fiber Unidirectional Path Switched Ring 2F-UPSR
» Two-fiber Bidirectional Line Switched Ring 2F-BLSR
» Four-fiber Bidirectional Line Switched Ring 4F-BLSR
» GFP Client-independent Functions THE GENERIC FRAMING PROCEDURE GFP
» GFP Client-dependent Functions THE GENERIC FRAMING PROCEDURE GFP
» Virtual Concatenation DATA OVER SONETSDH DOS
» Link Capacity Adjustment Scheme LCAS
» INTRODUCTION Connection Oriented Network
» THE STRUCTURE OF THE HEADER OF THE ATM CELL
» The Transmission Convergence TC Sublayer
» The Physical Medium-Dependent PMD Sublayer
» THE ATM LAYER Connection Oriented Network
» Scheduling Algorithms THE ATM SWITCH ARCHITECTURE
» ATM Adaptation Layer 1 AAL 1
» ATM Adaptation Layer 2 AAL 2
» ATM Adaptation Layer 5 AAL 5
» ATMARP CLASSICAL IP AND ARP OVER ATM
» Types of Parameters TRAFFIC CHARACTERIZATION
» Standardized Traffic Descriptors
» Empirical Models TRAFFIC CHARACTERIZATION
» Probabilistic Models TRAFFIC CHARACTERIZATION
» QUALITY OF SERVICE QOS PARAMETERS
» The CBR Service ATM SERVICE CATEGORIES
» The RT-VBR Service ATM SERVICE CATEGORIES
» The NRT-VBR Service ATM SERVICE CATEGORIES
» The UBR Service ATM SERVICE CATEGORIES
» The ABR Service ATM SERVICE CATEGORIES
» The GFR Service ATM SERVICE CATEGORIES
» CONGESTION CONTROL Connection Oriented Network
» PREVENTIVE CONGESTION CONTROL Connection Oriented Network
» Equivalent Bandwidth CALL ADMISSION CONTROL CAC
» The ATM Block Transfer ABT Scheme
» Virtual Path Connections CALL ADMISSION CONTROL CAC
» The Generic Cell Rate Algorithm GCRA
» Packet Discard Schemes BANDWIDTH ENFORCEMENT
» The Available Bit Rate ABR Service
» THE SIGNALING PROTOCOL STACK
» The SSCOP THE SIGNALING ATM ADAPTATION LAYER SAAL
» Primitives THE SIGNALING ATM ADAPTATION LAYER SAAL
» THE SIGNALING CHANNEL Connection Oriented Network
» ATM ADDRESSING Connection Oriented Network
» THE FORMAT OF THE SIGNALING MESSAGE
» Information Elements IE THE SIGNALING PROTOCOL Q.2931
» Q.2931 Messages THE SIGNALING PROTOCOL Q.2931
» The IP Header THE INTERNET PROTOCOL IP: A PRIMER
» IP Addresses THE INTERNET PROTOCOL IP: A PRIMER
» Label Allocation Schemes THE MULTI-PROTOCOL LABEL SWITCHING MPLS ARCHITECTURE
» The Next Hop Label Forwarding Entry NHLFE
» Explicit Routing THE MULTI-PROTOCOL LABEL SWITCHING MPLS ARCHITECTURE
» An Example of the Use of the Label Stack
» Schemes for Setting up an LSP
» Hybrid ATM Switches MPLS OVER ATM
» Label Spaces, LDP Sessions, and Hello Adjacencies
» The LDP Messages THE LABEL DISTRIBUTION PROTOCOL LDP
» CR-LSP Setup Procedure THE CONSTRAINED-BASED ROUTING LABEL DISTRIBUTION
» The Label Mapping Message The Traffic Parameters TLV
» Classes of Service THE CONSTRAINED-BASED ROUTING LABEL DISTRIBUTION
» Reservation Styles THE RESOURCE RESERVATION PROTOCOL RSVP
» Soft State THE RESOURCE RESERVATION PROTOCOL RSVP
» The Path Message THE RESOURCE RESERVATION PROTOCOL RSVP
» The Resv Message THE RESOURCE RESERVATION PROTOCOL RSVP
» Service Classes and Reservation Styles
» The RSVP-TE Path and Resv Messages
» RSVP-TE Extensions THE RESOURCE RESERVATION PROTOCOL – TRAFFIC
» WDM OPTICAL NETWORKS Connection Oriented Network
» Multi-mode and Single-mode Optical Fibers
» Impairments HOW LIGHT IS TRANSMITTED THROUGH AN OPTICAL FIBER
» Photo-detectors and Optical Receivers
» Optical Amplifiers COMPONENTS
» Optical Cross-connects OXCs COMPONENTS
» Lightpaths WAVELENGTH ROUTING NETWORKS
» Traffic Grooming WAVELENGTH ROUTING NETWORKS
» Point-to-point Links WDM Optical Rings
» Mesh Optical Networks PROTECTION SCHEMES
» The Optical Channel Och Frame
» Overhead Types THE ITU-T G.709 STANDARD – THE DIGITAL WRAPPER
» CONTROL PLANE ARCHITECTURES Connection Oriented Network
» RSVP-TE Extensions For GMPLS
» LDP Extensions for UNI Signaling
» RSVP Extensions For UNI Signaling
» A Space Switch OPTICAL PACKET SWITCHING
» Reservation and Release of Resources in an OXC
» Scheduling of Bursts at an OBS Node
» Lost Bursts OPTICAL BURST SWITCHING OBS
» Signaling Messages THE JUMPSTART PROJECT
» The Signaling Message Structure
» Addressing THE JUMPSTART PROJECT
» The Routing Architecture THE JUMPSTART PROJECT
» The Discrete Multi-tone DMT Technique
» Bearer Channels THE ADSL-BASED ACCESS NETWORKS
» The ADSL Super Frame Schemes for Accessing Network Service Providers
» The ADSL2 and ADSL2+ Standards
» The Physical Layer THE CABLE-BASED ACCESS NETWORK
» The DOCSIS MAC Protocol Operation
» Frame Structures for Downstream and Upstream Transmission
» The PLOAM Cell THE ATM PASSIVE OPTICAL NETWORK
» The Divided-slots Cell THE ATM PASSIVE OPTICAL NETWORK
» Churning THE ATM PASSIVE OPTICAL NETWORK
» Ranging THE ATM PASSIVE OPTICAL NETWORK
» Channel-Associated Signaling CAS BACKGROUND
» Narrowband ISDN N-ISDN BACKGROUND
» Digital Subscriber Signaling System No. 1 DSS1
» VOICE OVER ATM SPECIFICATIONS
» Structured DS1E1J2 N × 64 Kbps Service DS1E1J2 Unstructured Service
» Switched and Non-Switched Trunking
» IWF Functionality for Switched Trunking
» IWF Functionality for Non-switched Trunking
» User Functions THE AAL 2 SERVICE-SPECIFIC CONVERGENCE SUBLAYER SSCS
» The Service-Specific Convergence Sublayer
» SSSAR THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
» SSTED THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
» SSADT THE SEGMENTATION AND REASSEMBLY SSCS FOR AAL 2
Show more