Local & Metropolitan Area Networks

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode.
ATM Asynchronous Transfer Mode. ATM Networks Use optical fibre similar to that used for FDDI networks ATM runs on network hardware called SONET ATM cells.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 – Circuit Switching and Packet Switching.
William Stallings Data and Computer Communications 7th Edition
CS 408 Computer Networks Congestion Control (from Chapter 05)
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
ATM: DESCRIPTIONS M. RAZIF AZMAL B. M. OTHMANWET SHAH RIZAD B. ISMAIL WET RASHA AFZAL B. SHAFII WET AHMAD AFIFI B. MOHD ZAKI WET
Asynchronous Transfer Mode (ATM)
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) High Speed Network.
Protocols and the TCP/IP Suite Asynchronous Transfer Mode (ATM)
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 5 Asynchronous Transfer Mode (ATM)
EE 4272Spring, 2003 Chapter 11. ATM and Frame Relay Overview of ATM Protocol Architecture ATM Logical Connections ATM Cells ATM Service Categories ATM.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 ATM (Asynchronous Transfer Mode) Cell Relay protocol designed by the ATM Forum and adopted by the ITU-T.
Connecting LANs, Backbone Networks, and Virtual LANs
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Data Communications and Networking
Chapter 13: Frame Relay & ATM Business Data Communications, 6e.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 – Circuit Switching and Packet Switching.
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Integrated Services Digital Network (ISDN) Developed by ITU-T in 1976 Set of protocols that combines.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
Internetworking and ATM Lecture 8, April 30, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 5 Asynchronous Transfer Mode (ATM) by Zornitza Genova Prodanoff.
Chapter 6 – Connectivity Devices
Data and Computer Communications Circuit Switching and Packet Switching.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Computer Networks with Internet Technology William Stallings
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Chapter 13: Frame Relay & ATM Business Data Communications, 5e.
Lecture 12 X.25. X.25 is a packet switching wide area network developed by ITU-T in Originally it was designed for private use Definition : X.25.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
William Stallings Data and Computer Communications
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Chapter 3. Communication Networks Wen-Shyang Hwang KUAS EE.
Department of Computer and IT Engineering University of Kurdistan
WAN – Packet and Cell-switched Networks
Chapter 3 Asynchronous Transfer Mode (ATM). Synchronous vs. Asynchronous  ATM- cell switching technology (asynchronous)  TDM – circuit switching technology.
1 Business Telecommunications Data and Computer Communications Chapter 11 Asynchronous Transfer Mode and Frame Relay.
Virtual Circuit Networks Frame Relays. Background Frame Relay is a Virtual Circuit WAN that was designed in late 80s and early 90s. Prior to Frame Relays.
Komunikasi Data Asynchronous Transfer Mode
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
William Stallings Data and Computer Communications
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
William Stallings Data and Computer Communications
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

Local & Metropolitan Area Networks ACOE322 Lecture 4 Metropolitan Area Networks Dr. L. Christofi

0. Overview In this section the following topics will be covered: Internetworking devices Wide Area Networks 2.1 ISDN and Broadband ISDN 2.2 X.25 2.3 Frame Relay 2.4 ATM 3. Congestion & Quality of Service Dr. L. Christofi

1. Internetworking In most cases, a LAN or WAN is not an isolated entity An organization may have multiple LANs of the same type at various sites and need them to be interconnected via a WAN An interconnected set of networks may appear as a larger network from the user’s point of view. If each of the constituent networks retains its identity, and special mechanisms are needed for communicating across multiple networks, then the entire configuration is called an Internet. Private internets within the same organization or company are called Intranets Dr. L. Christofi

Interconnecting devices How to get more users attached to a LAN? How to extend a single LAN? How to connect different LANs? Dr. L. Christofi

Interconnecting devices Repeater Hub Bridge Switch Router Gateway Dr. L. Christofi

Repeater: what is it? Connects segments of a LAN. It forwards every frame; it has no filtering capability A repeater is a regenerator, not an amplifier works at the Physical layer Regenerates received bits before it sends them out connects different half-duplex network segments either extends the number of users or the total span (by improving the quality of the transmitted signal) no separation of collision domains Dr. L. Christofi

Repeater: how it works? To begin understanding how a repeater works, it is important to understand first that as data leaves a source and goes out over the network, it is transformed into either electrical or light pulses that pass along the networking media. These pulses are referred to as signals. When signals first leave a transmitting station, they are clean and easily recognizable. However, the longer the cable length, the weaker and more deteriorated the signals become as they pass along the networking media. The purpose of a repeater is to regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. The term repeater originally meant a single port “in” and a single port “out” device. But today, multiple-port repeaters also exist. Repeaters are classified as Layer 1 devices in the OSI model, because they act only on the bit level and look at no other information. Dr. L. Christofi

Repeaters Dr. L. Christofi

Hub multi-port repeater (physical hardware device) provides physical star topology no intelligence no separations of collision domains all the hosts compete for the shared bandwidth Dr. L. Christofi

Hubs Ethernet Hub All nodes share 10 Mbps One device sending at a time Adding hubs or concentrators into the network offered an improvement on thin and thick Ethernet technology. Hubs are sometimes referred to as Ethernet concentrators or Ethernet repeaters; they are basically self-contained Ethernet segments within a box. Unshielded twisted-pair (UTP) cabling was used, but the fundamental limitation of a shared technology remained. As you can see in the Figure, Ethernet is fundamentally a shared technology - all users of a given LAN segment “fight” for the same amount of bandwidth. This situation is analogous to cars all trying to get onto the freeway at once. In the network, even though each device has its own cable segment that connects into the hub, they all share the same fixed amount of bandwidth. Frames, or packets, in a network all vie for bandwidth. Although physically it looks like all users have their own segment to their workstation, they are all interconnected inside the hub, so the hub is still a shared Ethernet technology. Also, these devices are passive, meaning that they’re virtually transparent to the end users. The end users don’t even know that they exist. In addition, the devices have no role in terms of a forwarding decision in the network, nor do they provide any segmentation within the network because they work at Layer 1 in the OSI framework. Ethernet concentrator “Self-contained” Ethernet LAN in a box Passive Works at physical layer 1 Dr. L. Christofi

Hubs (more explanation) The purpose of a hub is to regenerate and retime network signals. Similar characteristics to those of the repeater. The difference between a repeater and a hub is the number of cables that connect to the device. Whereas a repeater typically has only 2 ports, a hub generally has from 4 to 20 or more ports. Whereas a repeater receives on one port and repeats on the other, a hub receives on one port and transmits on all other ports. The following are the most important properties of hubs: Hubs amplify and propagate signals through the network. Hubs do not require filtering, or path determination or switching. Hubs are used as network concentration points. Hubs are used most commonly in Ethernet 10BASE-T or 100BASE-T networks. Hubs are used to create a central connection point for the wiring media and to increase the reliability of the network. Allowing any single cable to fail without disrupting the entire network increases the reliability of the network. This feature differs from the bus topology where having one cable fail disrupts the entire network. (Network topology is discussed later in this module.) Hubs are considered Layer 1 devices because they only regenerate the signal and repeat it out all of their ports (network connections). Dr. L. Christofi

Bridge (1) works at the layer 2 (requires software) connects two networks of the same type LAN to LAN (example: WLAN to Fast Ethernet) forwards data (1 packet @ the time) depending on the destination address in the data packet (not the IP address, but the physical (MAC) address that is unique for every Network Interface Card (NIC)) all computers are in the same sub-network packet filtering separates collision domains – larger network spans a stand alone device or a PC with the special NIC and the accompanied software Dr. L. Christofi

Bridge (2) Dr. L. Christofi

Bridges explained (1) A bridge is a Layer 2 device designed to create two or more LAN segments, each of which is a separate collision domain. That is, they were designed to create more useable bandwidth. The purpose of a bridge is to filter traffic on a LAN—to keep local traffic local—yet allow connectivity to other parts (segments) of the LAN for traffic that is directed there. You might wonder, then, how the bridge knows which traffic is local and which is not. The answer is the same one the postal service uses when asked how it knows which mail is local. It looks at the local address. Every networking device has a unique MAC address on the NIC. The bridge keeps track of which MAC addresses are on each side of the bridge and makes its decisions based on this MAC address list. Bridges filter network traffic by looking only at the MAC address. Therefore, they can rapidly forward traffic representing any network layer protocol. Because bridges look only at MAC addresses, they are not concerned with network layer protocols. Consequently, bridges are concerned only with passing or not passing frames, based on their destination MAC addresses. The following are the important properties of bridges: Bridges are more intelligent than hubs—that is, they can analyze incoming frames and forward (or drop) them based on addressing information. Bridges collect and pass packets between two or more LAN segments. Bridges create more collision domains, allowing more than one device to transmit simultaneously without causing a collision. Bridges maintain address tables. Dr. L. Christofi

Bridges explained (2) What really defines a bridge is its Layer 2 filtering of frames and how this is actually accomplished. Just as was the case of the repeater/hub combination, another device, called a switch (which you learn about next in this section), is used for multiple bridge connections. In order to filter or selectively deliver network traffic, bridges build tables of all MAC addresses located on a network and other networks and map them. If data comes along the network media, a bridge compares the destination MAC address carried by the data to MAC addresses contained in its tables. If the bridge determines that the destination MAC address of the data is from the same network segment as the source, it does not forward the data to other segments of the network. If the bridge determines that the destination MAC address of the data is not from the same network segment as the source, it forwards the data to the appropriate segment. By performing this process, bridges can significantly reduce the amount of traffic between network segments by eliminating unnecessary traffic. Dr. L. Christofi

Switch (1) basically a multi-port bridge provides a better network performance forwards more than a single packet at a time separates collision domains – larger total network span bandwidth not shared Dr. L. Christofi

Switches explained Switches, also referred to as LAN switches often replace shared hubs and work with existing cable infrastructures to ensure that they are installed with minimal disruption of existing networks. Like bridges, switches connect LAN segments, use a table of MAC addresses to determine the segment on which a datagram needs to be transmitted, and reduce traffic. Switches operate at much higher speeds than bridges, and can support new functionality, such as virtual LANs. Switches are data link layer devices that, like bridges, enable multiple physical LAN segments to be interconnected into single larger network. Similar to bridges, switches forward and flood traffic based on MAC addresses. Because switching is performed in hardware instead of in software, it is significantly faster. You can think of each switch port as a microbridge; this process is called microsegmentation. Thus each switch port acts as a separate bridge and gives the full bandwidth of the medium to each host. Dr. L. Christofi

Switches—Layer 2 Switched Ethernet Ethernet Switch Backbone 10 Multiple devices sending at the same time Ethernet Switch Each Node has 10 Mbps Backbone Switches provide even better control, at least at Layer 2. As you can see in the Figure, we’ve improved the model of traffic going through the network. Returning to the traffic analogy, we have actually subdivided the main highway so that each car has its own lane to drive on through the network. And fundamentally, this functionality can be provided in data networks as well. Each station has its own cable into the network- analogous to each workstation having its own “lane” through the “highway”. Then with functionality known as microsegmentation, each workstation gets its own dedicated segment through the network. Microsegmentation enables the travel of multiple, simultaneous conversations through the switch at any given time. Hubs and bridges offer only limited numbers of simultaneous conversations at a time. Remember that if two stations try to communicate in a hubbed environment, collisions result. In a switched environment, however, collisions don´t occur because each workstation has its own dedicated path through the network. The network actually has dramatically more bandwidth, and each station now has a dedicated 10-Mbps worth of bandwidth. Dr. L. Christofi

Switch (2) Dr. L. Christofi

One device sending at a time Multiple devices sending at the same time Switches versus Hubs Hub Ethernet 10 One device sending at a time All nodes share 10 Mbps Ethernet Switch Backbone Switched Ethernet 10 Multiple devices sending at the same time Remember when considering switches versus hubs that with hubs all traffic fights for the same fixed amount of bandwidth. The Figure shows improved traffic flow through the network because each workstation has a dedicated lane. Each node has 10 Mbps Dr. L. Christofi

Router connects different sub-networks Layer 3 (Network layer) device forwarding of packets (routing) is based on IP addresses not on MAC addresses more expensive than a switch (requires CPU) Layer 3 switches (only work with IP packets) Dr. L. Christofi

Gateway A gateway is a network point that acts as an entrance to another network. On the internet, in terms of routing, the network consists of gateway nodes and host nodes. Host nodes are computer of network users and the computers that serve contents (such as Web pages). Gateway nodes are computers that control traffic within your company’s network or at your local internet service provider (ISP) Dr. L. Christofi

What is the difference between? Bridge: device to interconnect two LANs that use the SAME Logical Link Control protocol but may use different medium access control protocols. Router: device to interconnect SIMILAR networks, e.g. similar protocols and workstations and servers Gateway: device to interconnect DISSIMILAR protocols and servers, and Macintosh and IBM LANs and equipment Dr. L. Christofi

Internetworking example (1) a simple internet Dr. L. Christofi

Internetworking example (2) Dr. L. Christofi

2. Wide Area Networks 2.1 ISDN and Broadband ISDN 2.2 X.25 2.3 Frame Relay 2.4 ATM Dr. L. Christofi

Integration of Voice, Video & Data Also called “Convergence” Networks that were previously transmitted using separate networks will merge into a single, high speed, multimedia network in the near future First step (already underway) Integration of voice and data Next Step Video merging with voice and data Will take longer partly due to the high data rates required for video Dr. L. Christofi

2.1 Integrated Services Digital Network (ISDN) Was develop by ITU-T in 1976 Combines digital telephony and data transport services Aim is to digitise the telephone network so that it allows the integration and transmission of voice, data and video over existing telephone lines The goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media Dr. L. Christofi

ISDN Services Bearer services: Teleservices: Supplementary services: Provide the means to transfer information (voice, data and video) between without changing the content of the information Teleservices: The network may changed or process the contents of the data Rely on the facilities of the bearer services Supplementary services: Provide additional functionality to the bearer services and the teleservices Dr. L. Christofi

History (1) Voice communication over analog networks Telecommunications networks were entirely analog Voice and data communications over analog networks Modems will developed to allow digital exchanges over existing analog lines Analog and digital services to subscribers Add digital technologies while continuing analog services Dr. L. Christofi

History (2) Integrated digital network (IDN) A combination of networks available for different purposes Allows a variety of networks – packet switched, circuit switched Digital pipes – using time-multiplexed channels sharing very-high-speed paths Integrated services digital network (ISDN) All the services are in digital Voice are digitised Allow all communication connections to occur via a single interface Dr. L. Christofi

Channels ISDN standard defines three channels with different transmission rate: Channel B (Bearer): 64kbps Channel D (Data): 16kbps, 64 kbps Channel H (Hybrid): 384 (H0), 1536 (H11), 1920 (H12) kbps Dr. L. Christofi

Interface types Two types of digital subscriber loops: Basic rate interface (BRI): consisting of two B channels and one 16 kbps D channel (2B+D) Used in residential and small office User-to-user communication Primary rate interface (PRI): consisting 30 B channels and one 64 kbps D channel (30B+D) User-to-network communication LAN connect to other LANs Dr. L. Christofi

Broadband ISDN The original ISDN is known as narrowband ISDN (N-ISDN) As technology advances, N-ISDN is not enough to cope with the requirement. Broadband ISDN (B-ISDN) is developed to provide for the needs for the next generation, with data rates in the range of 600 Mbps (400 times faster than the PRI) B-ISDN is based on the change from metal cable to fiber-optic cable. Dr. L. Christofi

B-ISDN: Types of Services Interactive: Those that require two-way exchanges between either two subscribers or between a subscriber and a service provider There are three types: Conversational: phone calls or real time services (video telephony, video conferencing) Messaging: store and forward exchanges (voice mail, data mail, video mail) Retrieval: retrieve information from information centre (videotex: allows subscribers to select video data from an on-line library) Dr. L. Christofi

B-ISDN: Types of Services Distributive: Unidirectional sent from provider to subscribers Without user control: broadcast to user without user’s having requested them or having control over either broadcast times or content (commercial TV) With user control: broadcast to user in a round-robin fashion (educational broadcasting, pay TV – a program is made available in a limited number of time slots, a user need to activate the television to receive it) Dr. L. Christofi

2.2 X.25 It is a packet switching wide area network Introduced in 1976 Interface between host and packet switched network Almost universal on packet switched networks and packet switching in ISDN Defines three layers Physical Link Packet Dr. L. Christofi

X.25 Layers Physical Link Packet Interface between attached station and link to node Data terminal equipment DTE (user equipment) Data circuit terminating equipment DCE (node) Uses physical layer specification X.21 Reliable transfer across physical link Sequence of frames Link Link Access Protocol Balanced (LAPB) Subset of HDLC Packet External virtual circuits Logical connections (virtual circuits) between subscribers Dr. L. Christofi

X.25 Use of Virtual Circuit Dr. L. Christofi

Virtual Circuit Service Virtual Call Dynamically established Permanent Virtual Circuit (PVC) Fixed network assigned virtual circuit Multiplexing DTE can establish 4095 simultaneous virtual circuits with other DTEs over a single DTC-DCE link Packets contain 12 bit virtual circuit number Dr. L. Christofi

2.3 Frame Relay Designed to be more efficient than X.25 Developed before ATM Larger installed base than ATM ATM now of more interest on high speed networks Dr. L. Christofi

Frame Relay - Differences Call control carried in separate logical connection Multiplexing and switching at layer 2 Eliminates one layer of processing No hop-by-hop error or flow control End to end flow and error control (if used) are done by higher layer Single user data frame sent from source to destination and ACK (from higher layer) sent back Dr. L. Christofi

Comparing Frame Relay Advantages: Operates at higher speed Operates in just the physical and data link layers – can be used easily as a backbone network to provide services to protocols that already have a network layer protocol Allows bursty data – do not have fixed data rate, user can send 6Mbps for 2 sec, 3.44Mbps for 1 sec and nothing for 7sec Allows a frame size of 9000 bytes which is enough for all LAN frames Less expensive than other traditional WANs Dr. L. Christofi

Comparing Frame Relay Disadvantages: Although can operate at 44.376 Mbps but is still not high enough for protocols with higher data rates (B-ISDN) As it allows variable length frames – may create varying delays for different users Because of varying delay, it is not suitable to send sensitive data like real time voice or video Dr. L. Christofi

Protocol Architecture Dr. L. Christofi

Control Plane Between subscriber and network Separate logical channel used Similar to common channel signaling for circuit switching services Data link layer LAPD (Q.921) Reliable data link control Error and flow control Between user (TE) and network (NT) Used for exchange of Q.933 control signal messages Dr. L. Christofi

User Plane End to end functionality Transfer of info between ends LAPF (Link Access Procedure for Frame Mode Bearer Services) Q.922 Frame delimiting, alignment and transparency Frame mux and demux using addressing field Ensure frame is integral number of octets (zero bit insertion/extraction) Ensure frame is neither too long nor short Detection of transmission errors Congestion control functions Dr. L. Christofi

Frame Relay Virtual Circuits Frame relay is a virtual circuit that does not use physical addresses to define the DTEs connected to the network In frame relay, the virtual circuit network sits in data link layer and not in network layer like in X.25 It is identified by a number called data link connection identifier (DLCI) When a network established a virtual circuit, a DTE is given a DLCI number and the local DTE uses this DLCI to send frame to the remote DTE There are two types of VC: Permanent VC Switched VC Dr. L. Christofi

Factors of Frame Relay Traffic Committed Information Rate (CIR) defines an average rate in bits per second Excess burst size defines the maximum number of bits in excess of committed burst size that a user can send during a predefined period of time. Dr. L. Christofi

2.4 Asynchronous Transfer Mode (ATM) ATM can transmit voice, video and data across LANs, MANs, and WANs. ATM is an international standard that implements a high-speed, connection-oriented, cell-switching, and multiplexing technology that is designed to provide users with virtually unlimited bandwidth. ATM is the cell relay protocol The combination of ATM and B-ISDN will allow high speed interconnection of all of the world’s network Dr. L. Christofi

Cell Network A cell is a small data unit of fixed size As cell is of fixed size, the transmission is thus predictable and uniform In packet switching, to avoid the wastage of large unused data field, some protocols provide variable sizes to users and thus unpredictable In cell networks, packets of different sizes and formats reach the cell network, are split into multiple small data units of equal length and loaded into cells The cells are then multiplexed with other cells and routed through the cell network Dr. L. Christofi

Advantages of Cells Due to small and fixed cells, cells from each line arrive at their respective destinations in an approximation of a continuous stream this allow real time transmissions like phone call The predictability of the fixed cell size allows switches and terminals to treat each cell as a unit rather than as a bit stream this makes the network operation more efficient and cheaper Dr. L. Christofi

Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks Multiple logical connections over single physical interface In ATM flow on each logical connection is in fixed sized packets called cells Minimal error and flow control Reduced overhead Data rates (physical layer) 2Mbps to 622Mbps Dr. L. Christofi

Protocol Architecture Dr. L. Christofi

Reference Model Planes User plane Provides for user information transfer Control plane Call and connection control Management plane Plane management whole system functions Layer management Resources and parameters in protocol entities Dr. L. Christofi

ATM Logical Connections Virtual Channel connections (VC) Analogous to virtual circuit in X.25 Basic unit of switching Between two end users Full duplex Fixed size cells Data, user-network exchange (control) and network-network exchange (network management and routing) Virtual Path connection (VP) Bundle of VCC with same end points Dr. L. Christofi

ATM Connection Relationships Dr. L. Christofi

ATM Architecture The user devices (end points) are connected through user-to-network interface (UNI) to switches inside the network ATM uses switches to route cell from a source end point to the destination end point The switches are connected through network-to-network interfaces (NNIs) Connection between two end points is accomplished through transmission paths (TPs), virtual paths (VPs), and virtual circuits (VCs) Dr. L. Christofi

Architecture of an ATM Network Dr. L. Christofi

ATM Architecture Transmission Path (TP) is the physical connection between an end point and a switch or between two switches A TP is divided into several virtual path Virtual Path (VP) provides a connection or a set of connections between two switches Cell network is based on Virtual Circuits (VCs) In VC, to route data from one end point to another, the virtual connections need to be identified Dr. L. Christofi

ATM Identifiers ATM has a hierarchical identifier with two levels: Virtual path identifier (VPI): defines the specific VP Virtual circuit identifier (VCI): defines a particular VC The VPI is the same for all virtual connections that are bundled (logically) into one VP Like X.25 and Frame Relay, ATM uses Permanent Virtual Circuit (PVC) and Switched Virtual Circuit (SVC) In PVC, VPIs and VCIs are defined for the permanent connections In SVC, it needs network layer addresses and the services of another protocol like B-ISDN to establish a VC each time an end point wants to make a connection Dr. L. Christofi

TP, VPs and VCs Connection between two endpoints is accomplished through transmission paths (TPs), virtual paths (VPs), and virtual circuits (VCs). TP Physical connection (write, cable, statellite, and so on) VP Provide a connection or a set of connection between two switches VC A single message path between source and destination Dr. L. Christofi

Example of VPs and VCs Note that a virtual connection is defined by a pair of numbers: the VPI and the VCI. Dr. L. Christofi

Connection Identifiers Dr. L. Christofi

AN ATM CELL An ATM cell Header format Dr. L. Christofi

ATM switching Cells are “self routing” When cell reaches a node: Virtual channel/path determined during call setup Same channel/path for all cells Routing tables in each node in path updated with next node address When cell reaches a node: Node retrieves channel/path identifier from cell header Looks up identifier routing table to get next node in path Sends cell out port associated with next node May modify header along the way if necessary Switching method and high speed physical links allow use with real time, isochronous data: Cells arrive at destination in order of sending Cells arrive at destination at rate comparable to sending Dr. L. Christofi

Advantages of Virtual Paths Simplified network architecture Increased network performance and reliability Reduced processing Short connection setup time Enhanced network services Dr. L. Christofi

Virtual Channel connection Uses Between end users End to end user data Control signals VPC provides overall capacity VCC organization done by users Between end user and network Control signaling Between network entities Network traffic management Routing Dr. L. Christofi

VP/VC Characteristics Quality of Service (QoS) A user of a VC is provided with a quality of service specified by parameters such as cell loss ratio and cell delay variation Switched and semi-permanent channel connections A switched VC (SVC) is an on-demand connection, which requires call control signaling for setup and tearing down Call sequence integrity The sequence of transmitted cells within a VCC is preserved Traffic parameter negotiation and usage monitoring Can be negotiated between a user and the network for each VC VP connection only Virtual channel identifier restriction within VP Dr. L. Christofi

Control Signaling - VC Done on separate connection Semi-permanent VC Meta-signaling channel Used as permanent control signal channel User to network signaling virtual channel For control signaling Used to set up VCs to carry user data User to user signaling virtual channel Within pre-established VP Used by two end users without network intervention to establish and release user to user VC Dr. L. Christofi

Control Signaling - VP Semi-permanent Customer controlled Network controlled Dr. L. Christofi

ATM Cells Fixed size 5 Byte header 48 Byte information field Small cells reduce queuing delay for high priority cells Small cells can be switched more efficiently Easier to implement switching of small cells in hardware Dr. L. Christofi

ATM Cell Format Dr. L. Christofi

Header Format Generic flow control Virtual path identifier Only at user to network interface Controls flow only at this point Virtual path identifier Virtual channel identifier Payload type e.g. user info or network management Cell loss priority Header error control Dr. L. Christofi

Header Error Control 8 bit error control field Calculated on remaining 32 bits of header Allows some error correction Dr. L. Christofi

Transmission of ATM Cells ATM cells can be transmitted at one of several data rates: 622.08Mbps 155.52Mbps 51.84Mbps 25.6Mbps 2.048Mbps Transmission infrastructure to carry ATM payload Cell Based physical layer SDH based physical layer Dr. L. Christofi

Cell Based Physical Layer No framing imposed Continuous stream of 53 octet cells Cell delineation based on header error control field Dr. L. Christofi

SDH Based Physical Layer Imposes structure on ATM stream e.g. for 155.52Mbps Use STM-1 (STS-3) frame Can carry ATM and STM payloads Specific connections can be circuit switched using SDH channel SDH multiplexing techniques can combine several ATM streams Dr. L. Christofi

ATM Service Categories Real time Constant bit rate (CBR) Real time variable bit rate (rt-VBR) Non-real time Non-real time variable bit rate (nrt-VBR) Available bit rate (ABR) Unspecified bit rate (UBR) Guaranteed frame rate (GFR) Dr. L. Christofi

Real Time Services Amount of delay Variation of delay (jitter) Dr. L. Christofi

CBR Fixed data rate continuously available Tight upper bound on delay Uncompressed audio and video Video conferencing Interactive audio A/V distribution and retrieval Dr. L. Christofi

rt-VBR Time sensitive application Tightly constrained delay and delay variation rt-VBR applications transmit at a rate that varies with time e.g. compressed video Produces varying sized image frames Original (uncompressed) frame rate constant So compressed data rate varies Can statistically multiplex connections Dr. L. Christofi

nrt-VBR May be able to characterize expected traffic flow Improve QoS in loss and delay End system specifies: Peak cell rate Sustainable or average rate Measure of how bursty traffic is e.g. Airline reservations, banking transactions Dr. L. Christofi

UBR May be additional capacity over and above that used by CBR and VBR traffic Not all resources dedicated Bursty nature of VBR For application that can tolerate some cell loss or variable delays e.g. TCP based traffic Cells forwarded on First In First Out (FIFO) basis Best-effort service Dr. L. Christofi

ABR Application specifies peak cell rate (PCR) and minimum cell rate (MCR) Resources allocated to give at least MCR Spare capacity shared among all ARB sources e.g. LAN interconnection Dr. L. Christofi

ATM Bit Rate Services Dr. L. Christofi

Guaranteed Frame Rate (GFR) Designed to support IP backbone subnetworks Better service than UBR for frame based traffic Including IP and Ethernet Optimize handling of frame based traffic passing from LAN through router to ATM backbone Used by enterprise, carrier and ISP networks Consolidation and extension of IP over WAN ABR difficult to implement between routers over ATM network GFR better alternative for traffic originating on Ethernet Network aware of frame/packet boundaries When congested, all cells from frame discarded Guaranteed minimum capacity Additional frames carried of not congested Dr. L. Christofi

ATM Adaptation Layer Support for information transfer protocol not based on ATM PCM (voice) Assemble bits into cells Re-assemble into constant flow IP Map IP packets onto ATM cells Fragment IP packets Use LAPF over ATM to retain all IP infrastructure Dr. L. Christofi

Adaptation Layer Services Handle transmission errors Segmentation and re-assembly Handle lost and mis-inserted cells Flow control and timing Dr. L. Christofi

Supported Application types Circuit emulation VBR voice and video General data service IP over ATM Multiprotocol encapsulation over ATM (MPOA) IPX, AppleTalk, DECNET) LAN emulation Dr. L. Christofi

AAL Protocols Convergence sublayer (CS) Support for specific applications AAL user attaches at SAP Segmentation and re-assembly sublayer (SAR) Packages and unpacks info received from CS into cells Four types AAL Type 1 AAL Type 2 AAL Type 3/4 AAL Type 5 Dr. L. Christofi

AAL Protocols Dr. L. Christofi

AAL Types AAL Type 1 (AAL1) AAL Type 2 (AAL2) AAL Types 3/4 (AAL3/4) CBR source SAR packs and unpacks bits Block accompanied by sequence number AAL Type 2 (AAL2) VBR Analog applications AAL Types 3/4 (AAL3/4) Connectionless or connected Message mode or stream mode AAL Type 5 (AAL5) Streamlined transport for connection oriented higher layer protocols Dr. L. Christofi

3. CONGESTION What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of the network Congestion control aims to keep number of packets below level at which performance falls off dramatically Data network is a network of queues Generally 80% utilization is critical Finite queues mean data may be lost Dr. L. Christofi

Queues at a Node Dr. L. Christofi

Effects of Congestion Packets arriving are stored at input buffers Routing decision made Packet moves to output buffer Packets queued for output transmitted as fast as possible Statistical time division multiplexing If packets arrive to fast to be routed, or to be output, buffers will fill Can discard packets Can use flow control Can propagate congestion through network Dr. L. Christofi

Practical Performance Ideal assumes infinite buffers and no overhead Buffers are finite Overheads occur in exchanging congestion control messages Dr. L. Christofi

Effects of Congestion - No Control Dr. L. Christofi

Mechanisms for Congestion Control Dr. L. Christofi

Backpressure If node becomes congested it can slow down or halt flow of packets from other nodes May mean that other nodes have to apply control on incoming packet rates Propagates back to source Can restrict to logical connections generating most traffic Used in connection oriented that allow hop by hop congestion control (e.g. X.25) Not used in ATM nor frame relay Only recently developed for IP Dr. L. Christofi

Choke Packet Control packet Rather crude mechanism Generated at congested node Sent to source node e.g. ICMP source quench From router or destination Source cuts back until no more source quench message Sent for every discarded packet, or anticipated Rather crude mechanism Dr. L. Christofi

Implicit Congestion Signaling Transmission delay may increase with congestion Packet may be discarded Source can detect these as implicit indications of congestion Useful on connectionless (datagram) networks e.g. IP based (TCP includes congestion and flow control - see chapter 17) Used in frame relay LAPF Dr. L. Christofi

Explicit Congestion Signaling Network alerts end systems of increasing congestion End systems take steps to reduce offered load Backwards Congestion avoidance in opposite direction to packet required Forwards Congestion avoidance in same direction as packet required Dr. L. Christofi

Categories of Explicit Signaling Binary A bit set in a packet indicates congestion Credit based Indicates how many packets source may send Common for end to end flow control Rate based Supply explicit data rate limit e.g. ATM Dr. L. Christofi

Traffic Management Fairness Quality of service Reservations May want different treatment for different connections Reservations e.g. ATM Traffic contract between user and network Dr. L. Christofi

Congestion Control in Packet Switched Networks Send control packet to some or all source nodes Requires additional traffic during congestion Rely on routing information May react too quickly End to end probe packets Adds to overhead Add congestion info to packets as they cross nodes Either backwards or forwards Dr. L. Christofi

Frame Relay Congestion Control Minimize discards Maintain agreed QoS Minimize probability of one end user monopoly Simple to implement Little overhead on network or user Create minimal additional traffic Distribute resources fairly Limit spread of congestion Operate effectively regardless of traffic flow Minimum impact on other systems Minimize variance in QoS Dr. L. Christofi

Traffic Rate Management Must discard frames to cope with congestion Arbitrarily, no regard for source No reward for restraint so end systems transmit as fast as possible Committed information rate (CIR) Data in excess of this liable to discard Not guaranteed Aggregate CIR should not exceed physical data rate Committed burst size Excess burst size Dr. L. Christofi

Operation of CIR Dr. L. Christofi

ATM Traffic Management High speed, small cell size, limited overhead bits Still evolving Requirements Majority of traffic not amenable to flow control Feedback slow due to reduced transmission time compared with propagation delay Wide range of application demands Different traffic patterns Different network services High speed switching and transmission increases volatility Dr. L. Christofi

Cell Delay Variation For ATM voice/video, data is a stream of cells Delay across network must be short Rate of delivery must be constant There will always be some variation in transit Delay cell delivery to application so that constant bit rate can be maintained to application Dr. L. Christofi

Network Contribution to Cell Delay Variation Packet switched networks Queuing delays Routing decision time Frame relay As above but to lesser extent ATM Less than frame relay ATM protocol designed to minimize processing overheads at switches ATM switches have very high throughput Only noticeable delay is from congestion Must not accept load that causes congestion Dr. L. Christofi

Quality of Service What is Quality-of-Service? QoS refers to traffic control mechanisms that seek to either differentiate performance based on application or network-operator requirements, or provide predictable or guaranteed performance to applications, sessions, or traffic aggregates. Why is this an issue? The default service in many packet networks is to give all applications the same service, and not consider any service requirements to the network This is called a best-effort service. Dr. L. Christofi

Quality of Service Who needs Quality-of-Service? Video and audio conferencing  bounded delay and loss rate Video and audio streaming  bounded packet loss rate Time-critical applications (real-time control)  bounded delays “valuable applications”  better service than less valuable applications How are Quality-of-Service requirements specified? QoS requirements can be specified as Delay Delay Variation (Jitter) Throughput Error Rate Dr. L. Christofi

References W. Stalling, Local and Metropolitan Area Networks, 6th edition, Prentice Hall, 2000 B.A. Forouzan, Data Communications and Networking, 3rd edition, McGraw-Hill, 2004 W. Stallings, Data and Computer Communications, 7th edition, Prentice Hall, 2004 F. Halsall, Data Communications, Computer Networks and Open Systems, 4th edition, Addison Wesley, 1995 Dr. L. Christofi