SlideShare a Scribd company logo
1 of 39
Download to read offline
Frame Relay
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and
Science, karimnagar
• A Virtual Circuit is a circuit used in
transportation of data over a packet switch
networks.
• Virtual Circuit appears as if there is a
physical path established between and source
and destination so that all packets(data) can
be routed over that path during the
transmission.
• Frame Relay is a virtual-circuit wide-area
network that was designed in the late 1980s
• Frame Relay operates at a higher speed
44.376 Mbps
• Frame Relay allows bursty data.
• Frame relay operates in just the physical and
Data Link layers and can easily be used as a
backbone network to provide services to
higher layer protocols, such as the Internet
Protocol.
• Frame Relay allows a frame size of 9000 bytes,
which can accommodate all local area network
frame sizes.
• Frame Relay is less expensive than other
traditional WANs like DSL, cable TV.
• Frame Relay has error detection only but not
correction at the data link layer. There is no flow
control.
• There is not even a retransmission policy if a
frame is damaged; it is silently dropped.
Frame Relay Architecture
• Figure shows an example of a Frame Relay
network connected to the Internet.
• The routers are used to connect LANs and
WANs in the Internet.
• In the figure, the Frame Relay WAN is used
as one link connected to global Internet
• Frame Relay is a virtual circuit network.
• A virtual circuit in Frame Relay is identified
by a number called a Data Link Connection
Identifier (DLCI)
• Frame Relay provides
➢ Permanent Virtual Circuits
➢Switched Virtual Circuits
Permanent Virtual Circuits
• A source and a destination may choose to have
a Permanent Virtual Circuit (PVC).
• The connection setup is simple.
• The corresponding table entry is recorded for
all switches by the administrator electronically
• An Outgoing DLCI is given to the source and an
Incoming DLCI is given to the destination.
• PVC connections have two drawbacks.
• First, they are costly because two parties pay for
the connection all the time even when it is not in
use.
• Second, a connection is created from one source
to one single destination. If a source needs
connections with several destinations, it needs a
PVC for each connection.
Switched Virtual Circuit (SVC)
• The SVC creates a temporary, short connection that
exists only when data are being transferred between
source and destination.
• It requires two phases mainly establishment phase
and termination phase.
• There is a table for each switch to route the frames
by matching incoming port DLCI with an outgoing
port DLCI.
Switches
• Each switch in a Frame Relay network has a
table to route frames.
• The table matches an incoming port-DLCI
combination with an outgoing port-DLCI
combination.
• The only difference is that VCIs are replaced
by DLCIs
Layers of Frame relay
• Frame Relay has only physical and data link
layers.
Physical Layer
• No specific protocol is defined for the
physical layer in Frame Relay.
• Frame Relay supports any of the protocols
recognized by ANSI.
Data Link Layer
• Frame Relay uses a simple protocol that does
not support flow or error control.
• It only has an error detection mechanism.
• Figure below shows the format of a Frame
Relay frame
Address (DLCI) field
• The address field is divided into two parts 1st byte
2nd byte.
• The first 6 bits of the first byte makes up the first
part of the DLCI.
• The second part of the DLCI uses the first 4 bits
of the second byte.
• These bits are part of the 10-bit data link
connection identifier
Command/response (CIR)
The command/response (C/R) bit is provided to
allow upper layers to identify a frame as either a
command or a response. It is not used by the Frame
Relay protocol.
Extended address (EA)
The extended address (EA) bit indicates whether the
current byte is the final byte of the address. An EA
of 0 means that another address byte is to follow. An
EA of 1 means that the current byte is the final one.
Forward Explicit Congestion Notification
(FECN)
➢FECN bit can be set by any switch to indicate
that traffic is congested.
➢This bit informs the destination that
congestion has occurred.
➢In this way, the destination knows that it
should expect delay or a loss of packets.
Backward explicit congestion notification
(BECN)
• BECN bit is set (in frames that travel in the
other direction) to indicate a congestion
problem in the network.
• This bit informs the sender that congestion
has occurred.
• In this way, the source knows it needs to slow
down to send data in order to prevent the loss
of packets.
Discard eligibility (DE)
• The discard eligibility (DE) bit indicates the
priority level of the frame.
• In emergency situations, switches may have to
discard frames to relieve bottlenecks and keep
the network from collapsing due to overload.
• When set (DE=1), this bit tells the network to
discard this frame if there is congestion.
• This bit can be set either by the sender of the
frames (user) or by any switch in the network
FRADs
• To handle frames arriving from other
protocols, frame Relay uses a device called a
Frame Relay assembler/ disassembler
(FRAD)
• A FRAD assembles and disassembles frames
coming from other protocols to allow them to
be carried by Frame Relay frames.
• A FRAD can be implemented as a separate
device or as part of a switch
VOFR
• Frame Relay networks offer an option called Voice Over
Frame Relay (VOFR) that sends voice through the network.
• Voice is digitized using PCM and then compressed. The
result is sent as data frames over the network.
• This feature allows the inexpensive sending of voice over
long distances.
• However, note that the quality of voice is not as good as voice
over a circuit-switched network such as the telephone
network
Local Management Information(LMI)
• LMI is a protocol added recently to the Frame Relay
to provide more management features.
• In particular LMI can provide
➢ A keep-alive mechanism to check if data are flowing.
➢ A multicast mechanism to allow a local end system to
send frames to more than one remote end system.
➢ A mechanism to allow an end system to check the
status of a switch (e.g., to see if the switch is
congested).
Asynchronous Transfer Mode
ATM
• Asynchronous Transfer Mode (ATM) is the
protocol designed by the ATM Forum and
adopted by the ITU-T.
• The combination of ATM and SONET will
allow high-speed interconnection of all the
world's networks.
ATM Architecture
• ATM is a switching network in which the data is
transmitted from source to destination.
• Source and destination are referred as the endpoints
which are user access devices.
• The endpoints are connected to the switches
through an interface called user-to-network
interface (UNI)
• The switches are connected through network-to-
network interfaces (NNIs)
• ATM provides connection oriented services
such type of services are known as Virtual
Connection.
• Connection between two endpoints is
accomplished through
• Transmission paths (TPs)
• Virtual paths (VPs)
• Virtual circuits (VCs).
• A transmission path (TP) is the physical
connection (wire, cable, satellite, and so on)
between an endpoint and a switch or between
two switches.
• Think of two switches as two cities. A
transmission path is the set of all highways
that directly connect the two cities.
• A transmission path is divided into
several virtual paths.
• A virtual path (VP) provides a
connection or a set of connections
between two switches.
• Think of a virtual path as a highway
that connects two cities.
• Each highway is a virtual path; the set
of all highways is the transmission path.
• Cell networks are based on virtual circuits
(VCs).
• All cells belonging to a single message follow
the same virtual circuit and remain in their
original order until they reach their
destination.
• Think of a virtual circuit as the lanes of a
highway (virtual path).
Figure shows the relationship between VP VC
TP
ATM Cells
• ATM transmits, switches and multiplexes
information in fixed length cells.
• It is the basic data unit in an ATM network
• A cell is only 53 bytes long with 5 bytes allocated
to the header and 48 bytes carrying the payload
(user data may be less than 48 bytes).
• The main idea for using small data cells is that it
reduces jitter (as a variation in the delay of
received packets)
ATM layers
• The ATM standard defines three layers.
They are from top to bottom,
Application Adaptation Layer (AAL)
ATM layer
physical layer
• Physical layer
This layer specifies certain rules of
how a signal should be encoded and also
specify physical medium and transmission
characteristics (e.g., modes of transmission)
ATM layer
• The ATM layer provides routing, traffic
management, switching, and multiplexing
services.
• It processes outgoing traffic by accepting 48-
byte segments from the AAL layer and
transforming them into 53-byte cells by the
addition of a 5-byte header
AAL
• This Application Adaptation Layer defines how
to segment and reassemble higher-layer packets
into ATM cells, and how to handle various
transmission aspects in the ATM layer.
• The main services provided by AAL (ATM
Adaptation Layer) are:
• Segmentation and reassembly
• Handling of transmission errors
• Handling of lost and misinserted cell conditions
• Timing and flow control
Thank you

More Related Content

What's hot (19)

Frame relay
Frame relayFrame relay
Frame relay
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Basic concept of frame relay
Basic concept of frame relayBasic concept of frame relay
Basic concept of frame relay
 
Frame relay
Frame relayFrame relay
Frame relay
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
Atm intro
Atm introAtm intro
Atm intro
 
ATM
ATMATM
ATM
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Frame relay
Frame relayFrame relay
Frame relay
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Module3 part1
Module3 part1Module3 part1
Module3 part1
 
Frame relay
Frame relayFrame relay
Frame relay
 
EMERSON EDUARDO RODRIGUES Cdma 20001 x performance indicator
EMERSON EDUARDO RODRIGUES Cdma 20001 x performance indicatorEMERSON EDUARDO RODRIGUES Cdma 20001 x performance indicator
EMERSON EDUARDO RODRIGUES Cdma 20001 x performance indicator
 

Similar to Frame Relay: Virtual Circuit Protocol for Bursty Data

ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...JebaRaj26
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxHirazNor
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanPradnya Saval
 
Computer Network
Computer NetworkComputer Network
Computer NetworkRubaya Mim
 
Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)Kiran Chhatwani
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxDharshanB8
 
Unit 1 atm networks
Unit 1 atm networksUnit 1 atm networks
Unit 1 atm networksmanjuladeepa
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Shamima Akther
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 

Similar to Frame Relay: Virtual Circuit Protocol for Bursty Data (20)

ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 
Atm Percobaan
Atm PercobaanAtm Percobaan
Atm Percobaan
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)Asynchronous transfer mode (ATM)
Asynchronous transfer mode (ATM)
 
x.25,fram relay mod2.pptx
x.25,fram relay mod2.pptxx.25,fram relay mod2.pptx
x.25,fram relay mod2.pptx
 
ATM.pdf
ATM.pdfATM.pdf
ATM.pdf
 
Synchronous optical networking (SONET)
Synchronous optical networking (SONET) Synchronous optical networking (SONET)
Synchronous optical networking (SONET)
 
Unit 1 atm networks
Unit 1 atm networksUnit 1 atm networks
Unit 1 atm networks
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Frame Relay: Virtual Circuit Protocol for Bursty Data

  • 1. Frame Relay Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. • A Virtual Circuit is a circuit used in transportation of data over a packet switch networks. • Virtual Circuit appears as if there is a physical path established between and source and destination so that all packets(data) can be routed over that path during the transmission.
  • 3. • Frame Relay is a virtual-circuit wide-area network that was designed in the late 1980s • Frame Relay operates at a higher speed 44.376 Mbps • Frame Relay allows bursty data. • Frame relay operates in just the physical and Data Link layers and can easily be used as a backbone network to provide services to higher layer protocols, such as the Internet Protocol.
  • 4. • Frame Relay allows a frame size of 9000 bytes, which can accommodate all local area network frame sizes. • Frame Relay is less expensive than other traditional WANs like DSL, cable TV. • Frame Relay has error detection only but not correction at the data link layer. There is no flow control. • There is not even a retransmission policy if a frame is damaged; it is silently dropped.
  • 6. • Figure shows an example of a Frame Relay network connected to the Internet. • The routers are used to connect LANs and WANs in the Internet. • In the figure, the Frame Relay WAN is used as one link connected to global Internet
  • 7. • Frame Relay is a virtual circuit network. • A virtual circuit in Frame Relay is identified by a number called a Data Link Connection Identifier (DLCI) • Frame Relay provides ➢ Permanent Virtual Circuits ➢Switched Virtual Circuits
  • 8. Permanent Virtual Circuits • A source and a destination may choose to have a Permanent Virtual Circuit (PVC). • The connection setup is simple. • The corresponding table entry is recorded for all switches by the administrator electronically
  • 9. • An Outgoing DLCI is given to the source and an Incoming DLCI is given to the destination. • PVC connections have two drawbacks. • First, they are costly because two parties pay for the connection all the time even when it is not in use. • Second, a connection is created from one source to one single destination. If a source needs connections with several destinations, it needs a PVC for each connection.
  • 10. Switched Virtual Circuit (SVC) • The SVC creates a temporary, short connection that exists only when data are being transferred between source and destination. • It requires two phases mainly establishment phase and termination phase. • There is a table for each switch to route the frames by matching incoming port DLCI with an outgoing port DLCI.
  • 11. Switches • Each switch in a Frame Relay network has a table to route frames. • The table matches an incoming port-DLCI combination with an outgoing port-DLCI combination. • The only difference is that VCIs are replaced by DLCIs
  • 12. Layers of Frame relay • Frame Relay has only physical and data link layers.
  • 13. Physical Layer • No specific protocol is defined for the physical layer in Frame Relay. • Frame Relay supports any of the protocols recognized by ANSI.
  • 14. Data Link Layer • Frame Relay uses a simple protocol that does not support flow or error control. • It only has an error detection mechanism. • Figure below shows the format of a Frame Relay frame
  • 15.
  • 16. Address (DLCI) field • The address field is divided into two parts 1st byte 2nd byte. • The first 6 bits of the first byte makes up the first part of the DLCI. • The second part of the DLCI uses the first 4 bits of the second byte. • These bits are part of the 10-bit data link connection identifier
  • 17. Command/response (CIR) The command/response (C/R) bit is provided to allow upper layers to identify a frame as either a command or a response. It is not used by the Frame Relay protocol. Extended address (EA) The extended address (EA) bit indicates whether the current byte is the final byte of the address. An EA of 0 means that another address byte is to follow. An EA of 1 means that the current byte is the final one.
  • 18. Forward Explicit Congestion Notification (FECN) ➢FECN bit can be set by any switch to indicate that traffic is congested. ➢This bit informs the destination that congestion has occurred. ➢In this way, the destination knows that it should expect delay or a loss of packets.
  • 19. Backward explicit congestion notification (BECN) • BECN bit is set (in frames that travel in the other direction) to indicate a congestion problem in the network. • This bit informs the sender that congestion has occurred. • In this way, the source knows it needs to slow down to send data in order to prevent the loss of packets.
  • 20. Discard eligibility (DE) • The discard eligibility (DE) bit indicates the priority level of the frame. • In emergency situations, switches may have to discard frames to relieve bottlenecks and keep the network from collapsing due to overload. • When set (DE=1), this bit tells the network to discard this frame if there is congestion. • This bit can be set either by the sender of the frames (user) or by any switch in the network
  • 21. FRADs • To handle frames arriving from other protocols, frame Relay uses a device called a Frame Relay assembler/ disassembler (FRAD) • A FRAD assembles and disassembles frames coming from other protocols to allow them to be carried by Frame Relay frames. • A FRAD can be implemented as a separate device or as part of a switch
  • 22.
  • 23. VOFR • Frame Relay networks offer an option called Voice Over Frame Relay (VOFR) that sends voice through the network. • Voice is digitized using PCM and then compressed. The result is sent as data frames over the network. • This feature allows the inexpensive sending of voice over long distances. • However, note that the quality of voice is not as good as voice over a circuit-switched network such as the telephone network
  • 24. Local Management Information(LMI) • LMI is a protocol added recently to the Frame Relay to provide more management features. • In particular LMI can provide ➢ A keep-alive mechanism to check if data are flowing. ➢ A multicast mechanism to allow a local end system to send frames to more than one remote end system. ➢ A mechanism to allow an end system to check the status of a switch (e.g., to see if the switch is congested).
  • 26. ATM • Asynchronous Transfer Mode (ATM) is the protocol designed by the ATM Forum and adopted by the ITU-T. • The combination of ATM and SONET will allow high-speed interconnection of all the world's networks.
  • 28. • ATM is a switching network in which the data is transmitted from source to destination. • Source and destination are referred as the endpoints which are user access devices. • The endpoints are connected to the switches through an interface called user-to-network interface (UNI) • The switches are connected through network-to- network interfaces (NNIs)
  • 29. • ATM provides connection oriented services such type of services are known as Virtual Connection. • Connection between two endpoints is accomplished through • Transmission paths (TPs) • Virtual paths (VPs) • Virtual circuits (VCs).
  • 30. • A transmission path (TP) is the physical connection (wire, cable, satellite, and so on) between an endpoint and a switch or between two switches. • Think of two switches as two cities. A transmission path is the set of all highways that directly connect the two cities.
  • 31. • A transmission path is divided into several virtual paths. • A virtual path (VP) provides a connection or a set of connections between two switches. • Think of a virtual path as a highway that connects two cities. • Each highway is a virtual path; the set of all highways is the transmission path.
  • 32. • Cell networks are based on virtual circuits (VCs). • All cells belonging to a single message follow the same virtual circuit and remain in their original order until they reach their destination. • Think of a virtual circuit as the lanes of a highway (virtual path).
  • 33. Figure shows the relationship between VP VC TP
  • 34. ATM Cells • ATM transmits, switches and multiplexes information in fixed length cells. • It is the basic data unit in an ATM network • A cell is only 53 bytes long with 5 bytes allocated to the header and 48 bytes carrying the payload (user data may be less than 48 bytes). • The main idea for using small data cells is that it reduces jitter (as a variation in the delay of received packets)
  • 35. ATM layers • The ATM standard defines three layers. They are from top to bottom, Application Adaptation Layer (AAL) ATM layer physical layer
  • 36. • Physical layer This layer specifies certain rules of how a signal should be encoded and also specify physical medium and transmission characteristics (e.g., modes of transmission)
  • 37. ATM layer • The ATM layer provides routing, traffic management, switching, and multiplexing services. • It processes outgoing traffic by accepting 48- byte segments from the AAL layer and transforming them into 53-byte cells by the addition of a 5-byte header
  • 38. AAL • This Application Adaptation Layer defines how to segment and reassemble higher-layer packets into ATM cells, and how to handle various transmission aspects in the ATM layer. • The main services provided by AAL (ATM Adaptation Layer) are: • Segmentation and reassembly • Handling of transmission errors • Handling of lost and misinserted cell conditions • Timing and flow control