SlideShare a Scribd company logo
Unit-I
ATM (ASYNCHRONOUS TRANSFER MODE)
ATM (Asynchronous Transfer Mode)
Asynchronous Transfer Mode (ATM) is the cell relay protocol designed by the ATM Forum and
adopted by the ITU-T.
A cell is a small data unit of fixed size. In a cell network, which uses the cell as the basic unit of
data exchange, all data are loaded into identical cells that can be transmitted with complete
predictability and uniformity.
FRAME RELAY NETWORK
CELL RELAY NETWORK
Why Cell Relay Network ?
Design Goals
Among the challenges faced by the designers of ATM, six stand out.
• Foremost is the need for a transmission system to optimize the use of high-data-rate transmission
media, in particular optical fiber. In addition to offering large bandwidths, newer transmission media
and equipment are dramatically less susceptible to noise degradation. A technology is needed to take
advantage of both factors and thereby maximize data rates.
•The system must interface with existing systems and provide wide-area interconnectivity between
them without lowering their effectiveness or requiring their replacement.
• The design must be implemented inexpensively so that cost would not be a barrier to adoption. If
ATM is to become the backbone of international communications, as intended, it must be available at
low cost to every user who wants it.
• The new system must be able to work with and support the existing telecommunications hierarchies
(local loops, local providers, long-distance carriers, and so on).
• The new system must be connection-oriented to ensure accurate and predictable delivery.
• Last but not least, one objective is to move as many of the functions to hardware as possible (for
speed) and eliminate as many software functions as possible (again for speed).
ARCHITECTURE OF ATM NETWORK
The user access devices, called
the endpoints, are connected
through a user-to-network
interface (UNI) to the switches
inside the network.
The switches are connected
through network-to-network
interfaces (NNIs).
How it connects?
Virtual Connection
Connection between two endpoints is
accomplished through transmission
paths (TPs), virtual paths (VPs), and
virtual circuits (VCs).
A transmission path (TP) is the
physical connection (wire, cable,
satellite, and so on) between an
endpoint and a switch or between two
switches.
A transmission path is the set of all
highways that directly connect the
two cities.
Cell networks are based on virtual circuits (VCs). All cells
belonging to a single message follow the same virtual circuit
and remain in their original order until they reach their
destination.
Think of a virtual circuit as the lanes of a highway
The lengths of the VPIs for UNIs and NNIs are
different. In a UNI, the VPI is 8 bits, whereas in an
NNI, the VPI is 12 bits. The length of the VCI is the
same in both interfaces (16 bits). We therefore can say
that a virtual connection is identified by 24 bits in a UNI
and by 28 bits in an NNI
Cell
The basic data unit in an ATM network is called a cell. A cell is only 53 bytes long with 5
bytes allocated to the header and 48 bytes carrying the payload (user data may be less
Connection Establishment and Release
ATM has two types of connections: PVC and SVC
PVC: PVC A permanent virtual-circuit connection is established between two endpoints by the
network provider. The VPls and VCIs are defined for the permanent connections, and the values
are entered for the tables of each switch.
SVC: SVC In a switched virtual-circuit connection, each time an endpoint wants to make a
connection with another endpoint, a new virtual circuit must be established. ATM cannot do the
job by itself, but needs the network layer addresses and the services of another protocol (such
as IP).
ATM Layers
The ATM standard defines three layers. They are, from top to bottom, the application adaptation
layer, the ATM layer, and the physical layer.
ATM Layers in Endpoint Devices
ATM Layer
ATM Layer provides
• Routing
• Traffic Management
• Switching
• Multiplexing Services
It processes outgoing traffic by accepting 48-byte segments from the AAL sublayers and transforming
them into 53-byte cells by the addition of a 5-byte header.
ATM Header Format
ATM uses two header format.
o Generic flow control (GFC). The 4-bit GFC field provides flow control at the UNI level. The ITU-T
has determined that this level of flow control is not necessary at the NNI level. In the NNI
header, therefore, these bits are added to the VPI. The longer VPI allows more virtual paths to
be defined at the NNI level. The format for this additional VPI has not yet been determined.
o Virtual path identifier (VPI). The VPI is an 8-bit field in a UNI cell and a 12-bit field in an NNI cell.
o Virtual circuit identifier (VCI). The VCI is a 16-bit field in both frames.
o Payload type (PT). In the 3-bit PT field, the first bit defines the payload as user data or
managerial information. The interpretation of the last 2 bits depends on the first bit.
o Cell loss priority (CLP). The I-bit CLP field is provided for congestion control. A cell with its CLP
bit set to I must be retained as long as there are cells with a CLP of O. We discuss congestion
control and quality of service in an ATM network in Chapter 24.
o Header error correction (HEC). The HEC is a code computed for the first 4 bytes of the header. It
is a CRC with the divisor x8 + x2 + x + 1 that is used to correct single-bit errors and a large class of
multiple-bit errors.
Application Adaption Layer
AAL1: AAL1 supports applications that transfer information at constant bit rates, such as video and
voice. It allows ATM to connect existing digital telephone networks such as voice channels and T lines.
AAL2: It is used for low-bit-rate traffic and short-frame traffic such as audio (compressed or
uncompressed), video, or fax. A good example ofAAL2 use is in mobile telephony.
AAL Type 3/4: supports VBR, data traffic, connection-oriented, asynchronous traffic (e.g. X.25 data) or
connectionless packet data (e.g. SMDS traffic) with an additional 4-byte header in the information
payload of the cell. Examples include Frame Relay and X.25.
AAL Type 5: is similar to AAL 3/4 with a simplified information header scheme. This AAL assumes that
the data is sequential from the end user and uses the Payload Type Indicator (PTI) bit to indicate the
last cell in a transmission. Examples of services that use AAL 5 are classic IP over ATM, Ethernet Over
ATM, SMDS, and LAN Emulation (LANE). AAL 5 is a widely used ATM adaptation layer protocol. This
protocol was intended to provide a streamlined transport facility for higher-layer protocols that are
connection oriented.
QOS ATM
A number of parameters are used to define the QOS. These include the
1. Cell Error Ratio,
2. Cell Loss Ratio,
3. Cell Misinsertion Rate,
4. Cell Transfer Delay,
5. Cell Delay Variation
….
A number of classes of QOS are supported by the network and fall into either a Specified QOS or an
Unspecified QOS class. Among all the classes of QOS the network must only support the Specified
QOS class 1 which is the circuit emulation service and constant bit rate video. A specified QOS may
have two cell loss objectives, for the high and low priority traffic. The unspecified QOS has no
specified objectives given to the user but may have internal parameters for the network but these
may change during a call. Even though there are no QOS the call may have specified traffic
parameters, in fact that would be desirable for the network. This type of traffic could be the so called
best-effort traffic. This allows the network to respond to time variable resources. The unspecified
QOS is optional for the network to support.
Degradation of QOS may arise for many different reasons and one of these is the ATM switch. The
buffer capacity could be a complex multiple queue system with an algorithmicaly defined service rule
that could be based on priorities. The switch may thus introduce loss under heavy load. Of particular
interest to JPL is that the buffering strategies for wide area low speed networks may be more complex
than for high speed local area networks due to the detection of the PDU by a higher level. For
compliant connections the QOS will be supported for at least the number of conforming cells as
specified in the conformance definition. For non-compliant connections the network does not need
to support and QOS. The QOS of a VPC will be the combination of the strictest set of QOS's of the
underlying VCC's.
THANKS

More Related Content

What's hot

Multiplexing
MultiplexingMultiplexing
Multiplexing
Neeraj Garwal
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
Humayoun Kabir
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
Naqeeb Ullah Kakar
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
ZillayHuma Mehmood
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
Easy n Inspire L
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Ali Usman
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Sdh total final
Sdh total finalSdh total final
Sdh total final
Manish Desai
 
Wap ppt
Wap pptWap ppt
Wap ppt
Abhijit Nath
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
CSMA/CA
CSMA/CACSMA/CA
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
Hareem Naz
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 

What's hot (20)

Multiplexing
MultiplexingMultiplexing
Multiplexing
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Sdh total final
Sdh total finalSdh total final
Sdh total final
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
IntServ & DiffServ
IntServ & DiffServIntServ & DiffServ
IntServ & DiffServ
 
Data link layer
Data link layer Data link layer
Data link layer
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Switching
SwitchingSwitching
Switching
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Congestion control
Congestion controlCongestion control
Congestion control
 

Similar to Asynchronous Transfer Mode

Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
MH Shihab
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Meenakshi Devi
 
ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)
university of Gujrat, pakistan
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
Pradnya Saval
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
Shamima Akther
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
seanraz
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
JebaRaj26
 
ATM
ATMATM
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
Deepak John
 
Doc 20191126-wa0106
Doc 20191126-wa0106Doc 20191126-wa0106
Doc 20191126-wa0106
university of Gujrat, pakistan
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
Deepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
Deepak John
 
First presentation-ccn
First presentation-ccnFirst presentation-ccn
First presentation-ccn
riarana10
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
sheikhparvez4
 
Switching systems lecture6
Switching  systems lecture6Switching  systems lecture6
Switching systems lecture6
Jumaan Ally Mohamed
 
lecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxlecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptx
AMITKUMAR938671
 

Similar to Asynchronous Transfer Mode (20)

ATM.pdf
ATM.pdfATM.pdf
ATM.pdf
 
Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
 
ATM Network
ATM NetworkATM Network
ATM Network
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
 
ATM
ATMATM
ATM
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Doc 20191126-wa0106
Doc 20191126-wa0106Doc 20191126-wa0106
Doc 20191126-wa0106
 
S dutta
S duttaS dutta
S dutta
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
First presentation-ccn
First presentation-ccnFirst presentation-ccn
First presentation-ccn
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
 
Switching systems lecture6
Switching  systems lecture6Switching  systems lecture6
Switching systems lecture6
 
lecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxlecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptx
 

More from Nishant Munjal

Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Functions & Recursion
Functions & RecursionFunctions & Recursion
Functions & Recursion
Nishant Munjal
 
Array, string and pointer
Array, string and pointerArray, string and pointer
Array, string and pointer
Nishant Munjal
 
Programming in C
Programming in CProgramming in C
Programming in C
Nishant Munjal
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
Nishant Munjal
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
Nishant Munjal
 
Shell Programming Concept
Shell Programming ConceptShell Programming Concept
Shell Programming Concept
Nishant Munjal
 
VI Editor
VI EditorVI Editor
VI Editor
Nishant Munjal
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Nishant Munjal
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
Nishant Munjal
 
SQL Queries Information
SQL Queries InformationSQL Queries Information
SQL Queries Information
Nishant Munjal
 
Database Design and Normalization Techniques
Database Design and Normalization TechniquesDatabase Design and Normalization Techniques
Database Design and Normalization Techniques
Nishant Munjal
 
Concurrency Control
Concurrency ControlConcurrency Control
Concurrency Control
Nishant Munjal
 
Transaction Processing Concept
Transaction Processing ConceptTransaction Processing Concept
Transaction Processing Concept
Nishant Munjal
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Relational Data Model Introduction
Relational Data Model IntroductionRelational Data Model Introduction
Relational Data Model Introduction
Nishant Munjal
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 
Technical education benchmarks
Technical education benchmarksTechnical education benchmarks
Technical education benchmarks
Nishant Munjal
 
Bluemix Introduction
Bluemix IntroductionBluemix Introduction
Bluemix Introduction
Nishant Munjal
 

More from Nishant Munjal (20)

Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Functions & Recursion
Functions & RecursionFunctions & Recursion
Functions & Recursion
 
Array, string and pointer
Array, string and pointerArray, string and pointer
Array, string and pointer
 
Programming in C
Programming in CProgramming in C
Programming in C
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
 
Shell Programming Concept
Shell Programming ConceptShell Programming Concept
Shell Programming Concept
 
VI Editor
VI EditorVI Editor
VI Editor
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
SQL Queries Information
SQL Queries InformationSQL Queries Information
SQL Queries Information
 
Database Design and Normalization Techniques
Database Design and Normalization TechniquesDatabase Design and Normalization Techniques
Database Design and Normalization Techniques
 
Concurrency Control
Concurrency ControlConcurrency Control
Concurrency Control
 
Transaction Processing Concept
Transaction Processing ConceptTransaction Processing Concept
Transaction Processing Concept
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Relational Data Model Introduction
Relational Data Model IntroductionRelational Data Model Introduction
Relational Data Model Introduction
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 
Technical education benchmarks
Technical education benchmarksTechnical education benchmarks
Technical education benchmarks
 
Bluemix Introduction
Bluemix IntroductionBluemix Introduction
Bluemix Introduction
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

Asynchronous Transfer Mode

  • 2. ATM (Asynchronous Transfer Mode) Asynchronous Transfer Mode (ATM) is the cell relay protocol designed by the ATM Forum and adopted by the ITU-T. A cell is a small data unit of fixed size. In a cell network, which uses the cell as the basic unit of data exchange, all data are loaded into identical cells that can be transmitted with complete predictability and uniformity.
  • 3. FRAME RELAY NETWORK CELL RELAY NETWORK Why Cell Relay Network ?
  • 4. Design Goals Among the challenges faced by the designers of ATM, six stand out. • Foremost is the need for a transmission system to optimize the use of high-data-rate transmission media, in particular optical fiber. In addition to offering large bandwidths, newer transmission media and equipment are dramatically less susceptible to noise degradation. A technology is needed to take advantage of both factors and thereby maximize data rates. •The system must interface with existing systems and provide wide-area interconnectivity between them without lowering their effectiveness or requiring their replacement. • The design must be implemented inexpensively so that cost would not be a barrier to adoption. If ATM is to become the backbone of international communications, as intended, it must be available at low cost to every user who wants it. • The new system must be able to work with and support the existing telecommunications hierarchies (local loops, local providers, long-distance carriers, and so on). • The new system must be connection-oriented to ensure accurate and predictable delivery. • Last but not least, one objective is to move as many of the functions to hardware as possible (for speed) and eliminate as many software functions as possible (again for speed).
  • 5. ARCHITECTURE OF ATM NETWORK The user access devices, called the endpoints, are connected through a user-to-network interface (UNI) to the switches inside the network. The switches are connected through network-to-network interfaces (NNIs).
  • 6. How it connects? Virtual Connection Connection between two endpoints is accomplished through transmission paths (TPs), virtual paths (VPs), and virtual circuits (VCs). A transmission path (TP) is the physical connection (wire, cable, satellite, and so on) between an endpoint and a switch or between two switches. A transmission path is the set of all highways that directly connect the two cities. Cell networks are based on virtual circuits (VCs). All cells belonging to a single message follow the same virtual circuit and remain in their original order until they reach their destination. Think of a virtual circuit as the lanes of a highway
  • 7. The lengths of the VPIs for UNIs and NNIs are different. In a UNI, the VPI is 8 bits, whereas in an NNI, the VPI is 12 bits. The length of the VCI is the same in both interfaces (16 bits). We therefore can say that a virtual connection is identified by 24 bits in a UNI and by 28 bits in an NNI
  • 8.
  • 9. Cell The basic data unit in an ATM network is called a cell. A cell is only 53 bytes long with 5 bytes allocated to the header and 48 bytes carrying the payload (user data may be less
  • 10. Connection Establishment and Release ATM has two types of connections: PVC and SVC PVC: PVC A permanent virtual-circuit connection is established between two endpoints by the network provider. The VPls and VCIs are defined for the permanent connections, and the values are entered for the tables of each switch. SVC: SVC In a switched virtual-circuit connection, each time an endpoint wants to make a connection with another endpoint, a new virtual circuit must be established. ATM cannot do the job by itself, but needs the network layer addresses and the services of another protocol (such as IP).
  • 11. ATM Layers The ATM standard defines three layers. They are, from top to bottom, the application adaptation layer, the ATM layer, and the physical layer.
  • 12. ATM Layers in Endpoint Devices
  • 13. ATM Layer ATM Layer provides • Routing • Traffic Management • Switching • Multiplexing Services It processes outgoing traffic by accepting 48-byte segments from the AAL sublayers and transforming them into 53-byte cells by the addition of a 5-byte header.
  • 14. ATM Header Format ATM uses two header format.
  • 15. o Generic flow control (GFC). The 4-bit GFC field provides flow control at the UNI level. The ITU-T has determined that this level of flow control is not necessary at the NNI level. In the NNI header, therefore, these bits are added to the VPI. The longer VPI allows more virtual paths to be defined at the NNI level. The format for this additional VPI has not yet been determined. o Virtual path identifier (VPI). The VPI is an 8-bit field in a UNI cell and a 12-bit field in an NNI cell. o Virtual circuit identifier (VCI). The VCI is a 16-bit field in both frames. o Payload type (PT). In the 3-bit PT field, the first bit defines the payload as user data or managerial information. The interpretation of the last 2 bits depends on the first bit. o Cell loss priority (CLP). The I-bit CLP field is provided for congestion control. A cell with its CLP bit set to I must be retained as long as there are cells with a CLP of O. We discuss congestion control and quality of service in an ATM network in Chapter 24. o Header error correction (HEC). The HEC is a code computed for the first 4 bytes of the header. It is a CRC with the divisor x8 + x2 + x + 1 that is used to correct single-bit errors and a large class of multiple-bit errors.
  • 16. Application Adaption Layer AAL1: AAL1 supports applications that transfer information at constant bit rates, such as video and voice. It allows ATM to connect existing digital telephone networks such as voice channels and T lines. AAL2: It is used for low-bit-rate traffic and short-frame traffic such as audio (compressed or uncompressed), video, or fax. A good example ofAAL2 use is in mobile telephony. AAL Type 3/4: supports VBR, data traffic, connection-oriented, asynchronous traffic (e.g. X.25 data) or connectionless packet data (e.g. SMDS traffic) with an additional 4-byte header in the information payload of the cell. Examples include Frame Relay and X.25. AAL Type 5: is similar to AAL 3/4 with a simplified information header scheme. This AAL assumes that the data is sequential from the end user and uses the Payload Type Indicator (PTI) bit to indicate the last cell in a transmission. Examples of services that use AAL 5 are classic IP over ATM, Ethernet Over ATM, SMDS, and LAN Emulation (LANE). AAL 5 is a widely used ATM adaptation layer protocol. This protocol was intended to provide a streamlined transport facility for higher-layer protocols that are connection oriented.
  • 17. QOS ATM A number of parameters are used to define the QOS. These include the 1. Cell Error Ratio, 2. Cell Loss Ratio, 3. Cell Misinsertion Rate, 4. Cell Transfer Delay, 5. Cell Delay Variation
  • 18. …. A number of classes of QOS are supported by the network and fall into either a Specified QOS or an Unspecified QOS class. Among all the classes of QOS the network must only support the Specified QOS class 1 which is the circuit emulation service and constant bit rate video. A specified QOS may have two cell loss objectives, for the high and low priority traffic. The unspecified QOS has no specified objectives given to the user but may have internal parameters for the network but these may change during a call. Even though there are no QOS the call may have specified traffic parameters, in fact that would be desirable for the network. This type of traffic could be the so called best-effort traffic. This allows the network to respond to time variable resources. The unspecified QOS is optional for the network to support. Degradation of QOS may arise for many different reasons and one of these is the ATM switch. The buffer capacity could be a complex multiple queue system with an algorithmicaly defined service rule that could be based on priorities. The switch may thus introduce loss under heavy load. Of particular interest to JPL is that the buffering strategies for wide area low speed networks may be more complex than for high speed local area networks due to the detection of the PDU by a higher level. For compliant connections the QOS will be supported for at least the number of conforming cells as specified in the conformance definition. For non-compliant connections the network does not need to support and QOS. The QOS of a VPC will be the combination of the strictest set of QOS's of the underlying VCC's.