SlideShare a Scribd company logo
1 of 31
Asynchronous Transfer Mode
          (ATM)




        (C) All rights reserved by Professor Wen-Tsuen Chen
                                           1
An Overview of ATM
• ATM is Asynchronous Transfer Mode.
• ATM is originally the transfer mode for
  implementing Broadband ISDN (B-ISDN).
• In 1988, CCITT (from ITU) issued the first two
  recommendations relating to B-ISDN:
  – I.113 Vocabulary of Terms for Broadband Aspects of
    ISDN
  – I.121 Broadband Aspects of ISDN
• In 1911, the ATM Forum was created with the
  goal of accelerating the development of ATM
  standards.
                 (C) All rights reserved by Professor Wen-Tsuen Chen
                                                    2
An Overview of ATM
• Connection-oriented packet-switched network
• Used in both WAN and LAN settings
• Signaling (connection setup) Protocol:
  – Q.2931
• Packets are called cells (53 bytes)
  – 5-byte header + 48-byte payload
• Commonly transmitted over SONET
  – other physical layers possible
• Connections can be switched (SVC), or
  permanent (PVC).
                  (C) All rights reserved by Professor Wen-Tsuen Chen
                                                     3
Variable vs. Fixed-Length Packets
• No Optimal Length
  – if small: high header-to-data overhead
  – if large: low utilization for small messages
• Fixed-Length Easier to Switch in
  Hardware
  – simpler
  – enables parallelism


                (C) All rights reserved by Professor Wen-Tsuen Chen
                                                   4
Big vs. Small Packets
• Small Improves Queue behavior
   – finer-grained pre-emption point for scheduling link
       • maximum packet = 4KB
       • link speed = 100Mbps
       • transmission time = 4096 x 8/100 = 327.68us
       • high priority packet may sit in the queue 327.68us
       • in contrast, 53 x 8/100 = 4.24us for ATM
   – near cut-through behavior
       • two 4KB packets arrive at same time
       • link idle for 327.68us while both arrive
       • at end of 327.68us, still have 8KB to transmit
       • in contrast, can transmit first cell after 4.24us
       • at end of 327.68us, just over 4KB left in queue

                     (C) All rights reserved by Professor Wen-Tsuen Chen
                                                        5
Big vs Small (cont)

• Small Improves Latency (for voice)
  – voice digitally encoded at 64KBps (8-bit samples at
    8KHz)
  – need full cell’s worth of samples before sending cell
  – example: 1000-byte cells implies 125ms per cell (too
    long)
  – smaller latency implies no need for echo cancellors
• ATM Compromise: 48 bytes = (32+64)/2


                (C) All rights reserved by Professor Wen-Tsuen Chen
                                                   6
An Overview of ATM
• ATM operates on a best effort basis.
• ATM guarantees that cells will not be disordered.
• Two types of connections:
   – Point-to-point
   – Multipoint (Multicast)
• Four Types of Services:
   – CBR (Constant Bit Rate)
   – VBR (Variable Bit Rate)
   – ABR (Available Bit Rate) Flow Control, Rate-based,
     Credit- based
   – UBR (Unspecific Bit Rate) No Flow control.
• Aggregate Bandwidth vs. Shared Medium (FDDI, Fast
  Ethernet).
                   (C) All rights reserved by Professor Wen-Tsuen Chen
                                                      7
ATM Network Structure




     (C) All rights reserved by Professor Wen-Tsuen Chen
                                        8
Cell Format
   4     8       16        3      1        8         384 (48 bytes)
  GFC   VPI      VCI      Type   CLP   HEC (CRC-8)      Payload




• User-Network Interface (UNI)
  – host-to-switch format
  – GFC: Generic Flow Control (still being defined)
  – VCI: Virtual Circuit Identifier
  – VPI: Virtual Path Identifier
  – Type: management, congestion control, AAL5
    (later)
  – CLPL Cell Loss Priority
  – HEC: Header Error Check (CRC-8)


                 (C) All rights reserved by Professor Wen-Tsuen Chen
                                                    9
Cell Format
     12       16         3     1        8         384 (48 bytes)
     VPI      VCI       PTI   CLP   HEC (CRC-8)      Payload


• Network-Network Interface (NNI)
  – switch-to-switch format
  – GFC becomes part of VPI field




                (C) All rights reserved by Professor Wen-Tsuen Chen
                                                   10
ATM Characteristics

• No error protection or flow control on
  a link-by-link basis.
• ATM operates in a connection-
  oriented mode.
• The header functionality is reduced.
• The information field length is
  relatively small and fixed.
             (C) All rights reserved by Professor Wen-Tsuen Chen
                                                11
ATM Protocol Stack

                Management plane


  Control plane User plane

Higher Layers    Higher Layers


 ATM Adaptation Layer
            Virtual Channel Functions
ATM Layer                                    Plane management
                Virtual Path Functions

   Physical Layer (PMD)                  Layer management



                    (C) All rights reserved by Professor Wen-Tsuen Chen
                                                       12
Physical Layer Interface Specification

•   SONET STS-3C
•   SONET STS-12
•   DS3
•   STP for ATM LAN
•   etc.




                (C) All rights reserved by Professor Wen-Tsuen Chen
                                                   13
ATM Layer Service
•   Transparent transfer of 48-octet data unit
•   Deliver data in sequence on a connection
•   Two levels of multiplexing
•   Three types of connections
    – Point-to-point
    – Point-to-Multipoint
    – Multipoint-to-Multipoint
• Transport is best-effort
• Network QoS negotiation
• Traffic control and congestion control
                    (C) All rights reserved by Professor Wen-Tsuen Chen
                                                       14
ATM Layer Functions
• Cell multiplexing and switching
• Cell rate decoupling
• Cell discrimination based on pre-defined
  VPI/VCI
• Quality of Service (QoS)
• Payload type characterization
• Generic flow control
• Loss priority indication and Selective cell
  discarding
• Traffic shaping
                 (C) All rights reserved by Professor Wen-Tsuen Chen
                                                    15
Pre-assigned VPI/VCI Values
• Unassigned Cell Indication (VPI = 0, VCI = 0)
• Meta signaling (VCI=1)
   – Meta signaling is the bootstrap procedure used to
     establish and release a signaling VC. Not used for
     PVC setup.
• General broadcasting signaling (VCI=2)
• OAM F4 flow indication -- segment and end-
  to-end (VCI=3 and VCI=4)
• Point-to-Point Signaling (VCI=5)
• Carriage of Interim Local Management
  Interface (ILMI) messages (VPI=0, VCI=16) Chen
                 (C) All rights reserved by Professor Wen-Tsuen
                                                    16
Cell Rate Decoupling and Cell
           Discrimination
• Cell Rate Decoupling
  – ATM sending entity adds unassigned cells to the assigned
    cell stream in order to adjust to the cell rate acquired by the
    payload capacity of the physical layer (R).
• Cell Discrimination
  –   Meta signaling
  –   General broadcast signaling
  –   Point-to-point Signaling
  –   Segment OAM F4 flow cell
  –   End-to-end OAM F4 flow cell
  –   ILMI message
                       (C) All rights reserved by Professor Wen-Tsuen Chen
                                                          17
  –   User data
Virtual Channels, Virtual Paths,
   and the Physical Channel


                虛 擬路徑                                    虛 擬路徑
      虛 擬通道                    實體線路                              虛 擬通道
                                                                    100
                                 細胞                       100
100
200      100                                                        200


100                                                                 100
200
300
          200      300/40   300/10   200/300   100/100    200       200
                                                                    300

 10                                                                  10
 20
 30
          300                                             300        20
                                                                     30
 40                                                                  40




                    (C) All rights reserved by Professor Wen-Tsuen Chen
                                                       18
Virtual Channels
The virtual channel (VC) is the fundamental unit of
 transport in a B-ISDN. Each ATM cell contains an explicit
 label in its header to identify the virtual channel.
   a Virtual Channel Identifier (VCI)
   a Virtual Path Identifier (VPI)
A virtual channel (VC) is a communication channel that
 provides for the transport of ATM cells between two or
 more endpoints for information transfer.
A Virtual Channel Identifier (VCI) identifiers a particular
 VC within a particular VP over a UNI or NNI.
A specific value of VCI has no end-to-end meaning.

                     (C) All rights reserved by Professor Wen-Tsuen Chen
                                                        19
Virtual Paths
A   Virtual Path (VP) is a group of Virtual Channels that are
  carried on the same physical facility and share the same
  Virtual Path Identifier (VPI) value.
 The VP boundaries are delimited by Virtual Path
  Terminators (VPT).
 AT VPTs, both VPI and VCI are processed.
 Between VPTs associated with the same VP, only the VPI
  values are processed (and translated) at ATM network
  elements.
 The VCI values are processed only at VPTs, and are not
  translated at intermediate ATM network elements.

                    (C) All rights reserved by Professor Wen-Tsuen Chen
                                                       20
Segmentation and Reassembly
• ATM Adaptation Layer (AAL)
  – AAL 1 and 2 designed for applications that
    need guaranteed rate (e.g., voice, video)
  – AAL 3/4 designed for packet data
  – AAL 5 is an alternative standard for packet
    data

              AAL                   AAL

         …                                      …
              ATM                  ATM


              (C) All rights reserved by Professor Wen-Tsuen Chen
                                                 21
AAL Reference Structure
               SAP


      Service Specific CS (SCCS)
             (may be Null)
                                      Convergence
            Primitives                Sublayer (CS)

AAL   Common Part CS (CPCS)


             Primitives


            SAR(Common)                   SAR



              (C) All rights reserved by Professor Wen-Tsuen Chen
                SAP                              22
AAL


    Service Specific Layers       message
L
a
y          AAL
e                               48 byte payloads
                                              ...
r
           ATM                   add 5 byte header
                                              ...
        Transmission
M       Convergence
G         Sublayer
M
T          PMD



            (C) All rights reserved by Professor Wen-Tsuen Chen
                                               23
ATM Adaptation Layers (AAL)
• In order to carry data units longer than 48 octets in
  ATM cells, an adaptation layer is needed.
• The ATM adaptation layer (AAL) provides for
  segmentation and reassembly of higher-layer data
  units and for detection of errors in transmission.
• Since the ATM layer simply carries cells without
  concern for their contents, a number of different
  AALs can be used across a single ATM interface.
• The AAL maps the user, control, or management
  protocol data units into the information field of the
  ATM cell and vice versa.
• To reflect the spectrum of applications, four service
  classes have been defined by CCITT. 24
                  (C) All rights reserved by Professor Wen-Tsuen Chen
AAL Service Classification
                  Class A    Class B   Class C        Class D       Signalling
                  Circuit  Packetized Connection
                                                      Datagram       (Q.93B)
                 Emulation voice/video Oriented
                                        Data
Attribute
                                        AAL 3         AAL 4
                 AAL1       AAL2                                      SAAL
                                                 AAL 5
Timing between
 source and
                     Required                    Not required
 destination


Bit Rate         Constant                  Variable

Connection           Connection oriented           Connectionless
 Mode


                            (C) All rights reserved by Professor Wen-Tsuen Chen
                                                               25
AAL 1 (Constant Bit Rate -CBR)
          Functions
• Emulation of DS1 and DS3 Circuits
• Distribution with forward error correction
• Handle cell delay for constant bit rate
• Transfer timing information between source and
  destination
• Transfer structure information (structure pointer)
• Provide indication of unrecoverable lost or errored
  information                SAR PDU

              Header SN   SNP       47 Octets Payload




                CSI Seq rights CRC EP by Professor Wen-Tsuen Chen
                  (C) All      reserved          26
                   Count
                 1    3         3       1
AAL 2 Protocol Data Unit (PDU)

                 ATM PDU
                         SAR PDU

Header SN   IT      47 Octets Payload   LI   CRC



  SN:  Sequence number
  IT: Information Type:BOM,COM,EOM,SSM
  Length Indicator




                      (C) All rights reserved by Professor Wen-Tsuen Chen
                                                         27
AAL 3/4

• Convergence Sublayer Protocol Data Unit
  (CS-PDU)
      8     8      16          < 64 KB   0– 24   8    8     16

     CPI   Btag   BASize   User data     Pad     0   Etag   Len



  – CPI: commerce part indicator (version field)
  – Btag/Etag:beginning and ending tag
  – BAsize: hint on amount of buffer space to
    allocate
  – Length: size of rights reserved by Professor Wen-Tsuen Chen
               (C) All
                       whole PDU               28
Cell Format
     40        2       4      10      352 (44 bytes)     6       10

 ATM header   Type   SEQ     MID      Payload          Length   CRC-10


– Type
   • BOM: beginning of message
   • COM: continuation of message
   • EOM end of message
– SEQ: sequence of number
– MID: message id
– Length: number of bytes of PDU in this cell

                     (C) All rights reserved by Professor Wen-Tsuen Chen
                                                        29
AAL 5 PDU Structure
• The Simple and Efficient Adaptation Layer
  (SEAL), attempts to reduce the
  complexity and overhead of AAL 3/4.
• It eliminates most of the overhead of AAL
  3/4.
• AAL 5 comprises a convergence sublayer
  and a SAR sublayer, although the SAR is
  essentially null.

             (C) All rights reserved by Professor Wen-Tsuen Chen
                                                30
AAL5
• CS-PDU Format
       < 64 KB   0– 47 bytes      16      16        32

        Data        Pad        Reserved   Len     CRC-32



  – pad so trailer always falls at end of ATM
    cell
  – Length: size of PDU (data only)
  – CRC-32 (detects missing or misordered
    cells)
• Cell Format
  – end-of-PDU bit in Type field of ATM header
                 (C) All rights reserved by Professor Wen-Tsuen Chen
                                                    31

More Related Content

What's hot

Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerSonali Chauhan
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13daniel ayalew
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPTAshutha K
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATMMadhumita Tamhane
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing timeDeepak John
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authenticationmbadhi
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 

What's hot (20)

Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen Schiller
 
UMTS Protocols
UMTS ProtocolsUMTS Protocols
UMTS Protocols
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
GSM
GSMGSM
GSM
 
Handover
HandoverHandover
Handover
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Kerberos
KerberosKerberos
Kerberos
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing time
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Cellular network
Cellular networkCellular network
Cellular network
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 

Viewers also liked

Viewers also liked (10)

Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Isdn
IsdnIsdn
Isdn
 
Integrated services digital network (isdn)
Integrated services digital network (isdn)Integrated services digital network (isdn)
Integrated services digital network (isdn)
 
ISDN Integrated Services Digital Network
ISDN Integrated Services Digital NetworkISDN Integrated Services Digital Network
ISDN Integrated Services Digital Network
 
ISDN
ISDNISDN
ISDN
 
Atm Networks
Atm Networks Atm Networks
Atm Networks
 
ISDN
ISDNISDN
ISDN
 
Isdn
IsdnIsdn
Isdn
 
ISDN & DSL
ISDN & DSLISDN & DSL
ISDN & DSL
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 

Similar to Atm (20)

Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
 
Atm
AtmAtm
Atm
 
atm
atmatm
atm
 
ATM
ATMATM
ATM
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
 
Atm Percobaan
Atm PercobaanAtm Percobaan
Atm Percobaan
 
Atm
AtmAtm
Atm
 
ATM.pdf
ATM.pdfATM.pdf
ATM.pdf
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
 
11 atm
11 atm11 atm
11 atm
 
Switching systems lecture6
Switching  systems lecture6Switching  systems lecture6
Switching systems lecture6
 
Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)
 
S dutta
S duttaS dutta
S dutta
 
Atm
AtmAtm
Atm
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Atm presentation M.TECH ( PPT FILE )
Atm presentation M.TECH ( PPT FILE )Atm presentation M.TECH ( PPT FILE )
Atm presentation M.TECH ( PPT FILE )
 
3 rd sem atm M.TCH ( PPT FILE )
3 rd sem atm M.TCH ( PPT FILE )3 rd sem atm M.TCH ( PPT FILE )
3 rd sem atm M.TCH ( PPT FILE )
 
Doc 20191126-wa0106
Doc 20191126-wa0106Doc 20191126-wa0106
Doc 20191126-wa0106
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Frame relay
Frame relayFrame relay
Frame relay
 

More from Mohd Arif

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 

More from Mohd Arif (20)

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network management
Network managementNetwork management
Network management
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Atm

  • 1. Asynchronous Transfer Mode (ATM) (C) All rights reserved by Professor Wen-Tsuen Chen 1
  • 2. An Overview of ATM • ATM is Asynchronous Transfer Mode. • ATM is originally the transfer mode for implementing Broadband ISDN (B-ISDN). • In 1988, CCITT (from ITU) issued the first two recommendations relating to B-ISDN: – I.113 Vocabulary of Terms for Broadband Aspects of ISDN – I.121 Broadband Aspects of ISDN • In 1911, the ATM Forum was created with the goal of accelerating the development of ATM standards. (C) All rights reserved by Professor Wen-Tsuen Chen 2
  • 3. An Overview of ATM • Connection-oriented packet-switched network • Used in both WAN and LAN settings • Signaling (connection setup) Protocol: – Q.2931 • Packets are called cells (53 bytes) – 5-byte header + 48-byte payload • Commonly transmitted over SONET – other physical layers possible • Connections can be switched (SVC), or permanent (PVC). (C) All rights reserved by Professor Wen-Tsuen Chen 3
  • 4. Variable vs. Fixed-Length Packets • No Optimal Length – if small: high header-to-data overhead – if large: low utilization for small messages • Fixed-Length Easier to Switch in Hardware – simpler – enables parallelism (C) All rights reserved by Professor Wen-Tsuen Chen 4
  • 5. Big vs. Small Packets • Small Improves Queue behavior – finer-grained pre-emption point for scheduling link • maximum packet = 4KB • link speed = 100Mbps • transmission time = 4096 x 8/100 = 327.68us • high priority packet may sit in the queue 327.68us • in contrast, 53 x 8/100 = 4.24us for ATM – near cut-through behavior • two 4KB packets arrive at same time • link idle for 327.68us while both arrive • at end of 327.68us, still have 8KB to transmit • in contrast, can transmit first cell after 4.24us • at end of 327.68us, just over 4KB left in queue (C) All rights reserved by Professor Wen-Tsuen Chen 5
  • 6. Big vs Small (cont) • Small Improves Latency (for voice) – voice digitally encoded at 64KBps (8-bit samples at 8KHz) – need full cell’s worth of samples before sending cell – example: 1000-byte cells implies 125ms per cell (too long) – smaller latency implies no need for echo cancellors • ATM Compromise: 48 bytes = (32+64)/2 (C) All rights reserved by Professor Wen-Tsuen Chen 6
  • 7. An Overview of ATM • ATM operates on a best effort basis. • ATM guarantees that cells will not be disordered. • Two types of connections: – Point-to-point – Multipoint (Multicast) • Four Types of Services: – CBR (Constant Bit Rate) – VBR (Variable Bit Rate) – ABR (Available Bit Rate) Flow Control, Rate-based, Credit- based – UBR (Unspecific Bit Rate) No Flow control. • Aggregate Bandwidth vs. Shared Medium (FDDI, Fast Ethernet). (C) All rights reserved by Professor Wen-Tsuen Chen 7
  • 8. ATM Network Structure (C) All rights reserved by Professor Wen-Tsuen Chen 8
  • 9. Cell Format 4 8 16 3 1 8 384 (48 bytes) GFC VPI VCI Type CLP HEC (CRC-8) Payload • User-Network Interface (UNI) – host-to-switch format – GFC: Generic Flow Control (still being defined) – VCI: Virtual Circuit Identifier – VPI: Virtual Path Identifier – Type: management, congestion control, AAL5 (later) – CLPL Cell Loss Priority – HEC: Header Error Check (CRC-8) (C) All rights reserved by Professor Wen-Tsuen Chen 9
  • 10. Cell Format 12 16 3 1 8 384 (48 bytes) VPI VCI PTI CLP HEC (CRC-8) Payload • Network-Network Interface (NNI) – switch-to-switch format – GFC becomes part of VPI field (C) All rights reserved by Professor Wen-Tsuen Chen 10
  • 11. ATM Characteristics • No error protection or flow control on a link-by-link basis. • ATM operates in a connection- oriented mode. • The header functionality is reduced. • The information field length is relatively small and fixed. (C) All rights reserved by Professor Wen-Tsuen Chen 11
  • 12. ATM Protocol Stack Management plane Control plane User plane Higher Layers Higher Layers ATM Adaptation Layer Virtual Channel Functions ATM Layer Plane management Virtual Path Functions Physical Layer (PMD) Layer management (C) All rights reserved by Professor Wen-Tsuen Chen 12
  • 13. Physical Layer Interface Specification • SONET STS-3C • SONET STS-12 • DS3 • STP for ATM LAN • etc. (C) All rights reserved by Professor Wen-Tsuen Chen 13
  • 14. ATM Layer Service • Transparent transfer of 48-octet data unit • Deliver data in sequence on a connection • Two levels of multiplexing • Three types of connections – Point-to-point – Point-to-Multipoint – Multipoint-to-Multipoint • Transport is best-effort • Network QoS negotiation • Traffic control and congestion control (C) All rights reserved by Professor Wen-Tsuen Chen 14
  • 15. ATM Layer Functions • Cell multiplexing and switching • Cell rate decoupling • Cell discrimination based on pre-defined VPI/VCI • Quality of Service (QoS) • Payload type characterization • Generic flow control • Loss priority indication and Selective cell discarding • Traffic shaping (C) All rights reserved by Professor Wen-Tsuen Chen 15
  • 16. Pre-assigned VPI/VCI Values • Unassigned Cell Indication (VPI = 0, VCI = 0) • Meta signaling (VCI=1) – Meta signaling is the bootstrap procedure used to establish and release a signaling VC. Not used for PVC setup. • General broadcasting signaling (VCI=2) • OAM F4 flow indication -- segment and end- to-end (VCI=3 and VCI=4) • Point-to-Point Signaling (VCI=5) • Carriage of Interim Local Management Interface (ILMI) messages (VPI=0, VCI=16) Chen (C) All rights reserved by Professor Wen-Tsuen 16
  • 17. Cell Rate Decoupling and Cell Discrimination • Cell Rate Decoupling – ATM sending entity adds unassigned cells to the assigned cell stream in order to adjust to the cell rate acquired by the payload capacity of the physical layer (R). • Cell Discrimination – Meta signaling – General broadcast signaling – Point-to-point Signaling – Segment OAM F4 flow cell – End-to-end OAM F4 flow cell – ILMI message (C) All rights reserved by Professor Wen-Tsuen Chen 17 – User data
  • 18. Virtual Channels, Virtual Paths, and the Physical Channel 虛 擬路徑 虛 擬路徑 虛 擬通道 實體線路 虛 擬通道 100 細胞 100 100 200 100 200 100 100 200 300 200 300/40 300/10 200/300 100/100 200 200 300 10 10 20 30 300 300 20 30 40 40 (C) All rights reserved by Professor Wen-Tsuen Chen 18
  • 19. Virtual Channels The virtual channel (VC) is the fundamental unit of transport in a B-ISDN. Each ATM cell contains an explicit label in its header to identify the virtual channel. a Virtual Channel Identifier (VCI) a Virtual Path Identifier (VPI) A virtual channel (VC) is a communication channel that provides for the transport of ATM cells between two or more endpoints for information transfer. A Virtual Channel Identifier (VCI) identifiers a particular VC within a particular VP over a UNI or NNI. A specific value of VCI has no end-to-end meaning. (C) All rights reserved by Professor Wen-Tsuen Chen 19
  • 20. Virtual Paths A Virtual Path (VP) is a group of Virtual Channels that are carried on the same physical facility and share the same Virtual Path Identifier (VPI) value.  The VP boundaries are delimited by Virtual Path Terminators (VPT).  AT VPTs, both VPI and VCI are processed.  Between VPTs associated with the same VP, only the VPI values are processed (and translated) at ATM network elements.  The VCI values are processed only at VPTs, and are not translated at intermediate ATM network elements. (C) All rights reserved by Professor Wen-Tsuen Chen 20
  • 21. Segmentation and Reassembly • ATM Adaptation Layer (AAL) – AAL 1 and 2 designed for applications that need guaranteed rate (e.g., voice, video) – AAL 3/4 designed for packet data – AAL 5 is an alternative standard for packet data AAL AAL … … ATM ATM (C) All rights reserved by Professor Wen-Tsuen Chen 21
  • 22. AAL Reference Structure SAP Service Specific CS (SCCS) (may be Null) Convergence Primitives Sublayer (CS) AAL Common Part CS (CPCS) Primitives SAR(Common) SAR (C) All rights reserved by Professor Wen-Tsuen Chen SAP 22
  • 23. AAL Service Specific Layers message L a y AAL e 48 byte payloads ... r ATM add 5 byte header ... Transmission M Convergence G Sublayer M T PMD (C) All rights reserved by Professor Wen-Tsuen Chen 23
  • 24. ATM Adaptation Layers (AAL) • In order to carry data units longer than 48 octets in ATM cells, an adaptation layer is needed. • The ATM adaptation layer (AAL) provides for segmentation and reassembly of higher-layer data units and for detection of errors in transmission. • Since the ATM layer simply carries cells without concern for their contents, a number of different AALs can be used across a single ATM interface. • The AAL maps the user, control, or management protocol data units into the information field of the ATM cell and vice versa. • To reflect the spectrum of applications, four service classes have been defined by CCITT. 24 (C) All rights reserved by Professor Wen-Tsuen Chen
  • 25. AAL Service Classification Class A Class B Class C Class D Signalling Circuit Packetized Connection Datagram (Q.93B) Emulation voice/video Oriented Data Attribute AAL 3 AAL 4 AAL1 AAL2 SAAL AAL 5 Timing between source and Required Not required destination Bit Rate Constant Variable Connection Connection oriented Connectionless Mode (C) All rights reserved by Professor Wen-Tsuen Chen 25
  • 26. AAL 1 (Constant Bit Rate -CBR) Functions • Emulation of DS1 and DS3 Circuits • Distribution with forward error correction • Handle cell delay for constant bit rate • Transfer timing information between source and destination • Transfer structure information (structure pointer) • Provide indication of unrecoverable lost or errored information SAR PDU Header SN SNP 47 Octets Payload CSI Seq rights CRC EP by Professor Wen-Tsuen Chen (C) All reserved 26 Count 1 3 3 1
  • 27. AAL 2 Protocol Data Unit (PDU) ATM PDU SAR PDU Header SN IT 47 Octets Payload LI CRC  SN: Sequence number  IT: Information Type:BOM,COM,EOM,SSM  Length Indicator (C) All rights reserved by Professor Wen-Tsuen Chen 27
  • 28. AAL 3/4 • Convergence Sublayer Protocol Data Unit (CS-PDU) 8 8 16 < 64 KB 0– 24 8 8 16 CPI Btag BASize User data Pad 0 Etag Len – CPI: commerce part indicator (version field) – Btag/Etag:beginning and ending tag – BAsize: hint on amount of buffer space to allocate – Length: size of rights reserved by Professor Wen-Tsuen Chen (C) All whole PDU 28
  • 29. Cell Format 40 2 4 10 352 (44 bytes) 6 10 ATM header Type SEQ MID Payload Length CRC-10 – Type • BOM: beginning of message • COM: continuation of message • EOM end of message – SEQ: sequence of number – MID: message id – Length: number of bytes of PDU in this cell (C) All rights reserved by Professor Wen-Tsuen Chen 29
  • 30. AAL 5 PDU Structure • The Simple and Efficient Adaptation Layer (SEAL), attempts to reduce the complexity and overhead of AAL 3/4. • It eliminates most of the overhead of AAL 3/4. • AAL 5 comprises a convergence sublayer and a SAR sublayer, although the SAR is essentially null. (C) All rights reserved by Professor Wen-Tsuen Chen 30
  • 31. AAL5 • CS-PDU Format < 64 KB 0– 47 bytes 16 16 32 Data Pad Reserved Len CRC-32 – pad so trailer always falls at end of ATM cell – Length: size of PDU (data only) – CRC-32 (detects missing or misordered cells) • Cell Format – end-of-PDU bit in Type field of ATM header (C) All rights reserved by Professor Wen-Tsuen Chen 31