SlideShare a Scribd company logo
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
28 
Switching and Multicast Schemes in Asynchronous Transfer Mode Networks By Dr. Brijesh Kr. Gupta, Mr. Roop Ranjan Prof. & Head , Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306 Asst. Prof., Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306 
ABSTRACT The purpose of this paper is to provide an overview of the ATM switching technology and to describe various multicast schemes in ATM Networks. One of the most promising solutions of ATM switches is based on the shared-memory principle. A shared- memory ATM switch provides sharing of memory space among its switches ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM under conditions of identical memory size. We studied various multicast schemes, which are presented in this paper. Key Words: ATM Switch, buffer allocation, multicasting, queue length threshold, shared memory switch. 1. INTRODUCTION The telecommunications industry is rapidly becoming a high bandwidth and high speed network environment due to fast growing market demands for multimedia applications. New multimedia based applications (such as data, voice, video and image) require greater bandwidth with capability of handling multiservice traffic on the same network. One technology known as asynchronous transfer mode (ATM) was developed and is continually being further enhanced to meet this demand. ATM is a high speed, packet switching network technology capable of supporting many classes of traffic. It incorporates the advantage of fiber optic techniques to transport a wide range of traffic types such as voice, video, image and various data traffic. ATM is a standard being developed by 2 major organizations: the ATM Forum and the ITU-T. The ATM standards define guidelines needed to support cell-based voice, data, video, and multimedia communication in a public network under Broadband ISDN. Although ATM standards are very well defined, there is one area that is not included the overall standard. It is the area of ATM switching. By default, ATM switch vendors use a wide variety of techniques to build their switches based on their own research and development efforts. Therefore, this paper will provide the reader with ATM basics overview in addition to a general description of the major components of an ATM switch and various switch design techniques being implemented by ATM switch vendors. 2. ATM SWITCHING FUNCTIONS As described earlier in previous sections, user traffic information is routed through the network via virtual paths or channels. Therefore, one key function of an 
ATM switch is its ability to buffer cells and quickly relay them without cell loss. However, ATM switches not only relay cells but must also perform control and management functions in order to support both asynchronous and synchronous traffic as well as connectionless and connection-oriented traffic. An ATM switch contains a set of input and output ports, which are utilized to interconnect to users, other switches, and other network elements. It also has interfaces to exchange control and management information with special purpose networks (i.e., network management systems). According to ATM standards, the switching function of ATM switches are categorized into 3 planes based on the Broadband ISDN model: User plane (U-plane),Control plane (C-plane), and Management plane (M-plane).The User plane relay user information cells from input ports to appropriate output ports by processing cell headers. It is useful to note that in the User plane, cell payloads are carried transparently through the network. Therefore, this cell relay function can be divided into 3 major blocks: the input module at the input port, the cell switch matrix that performs the routing function, and the output modules at the output ports. The Control plane deals with call establishment and release of virtual path/virtual channel connections. Information in control cells payload is not transparent to the network because it contains signaling information required for setting-up connections. The Management plane provides management functions to ensure correct and efficient network operation. The management function can further be divided as follows:  Fault management  Performance management  Configuration management  Security management  Accounting management  Traffic management 3. MULTICASTING SCHEMES 3.1 UNICASTING AND BROADCASTING Unicasting means sending a message from a single source to a single destination. Whereas in broadcasting a message is sent to all the destinations like in the television, the signals are broadcasted to all the destinations through the satellites. 3.2 Multicasting 
Multicast can be simply defined as the ability to send one message to one or more in a single operation. This is different than using replicated unicast which sends messages from one node to a group of nodes by sending to each node individually. This will incur one operation for each destination node and is non-atomic. A 1:N multicast allows one source to reach N
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
29 
destinations. An M:N multicast allows M sources to reach N destinations. 3.3 Why Multicasting ? 
Many envisioned applications in asynchronous transfer mode (ATM) networks are multicast in nature and are expected to generate a significant portion of the total traffic. Examples of such applications are broadcast video-conferencing, multiparty telephony and work group applications. The ability to support multicast traffic is therefore a basic functionality that needs to be implemented in ATM switches. Mechanisms have to be provided in the switches to replicate cells arriving at an incoming multicast virtual connection (VC) and deliver them to multiple outgoing legs of that connection. 4.REQUIREMENTS FOR ATM MULTICAST 
ATM imposes specific requirements [11] that must be considered for the design of the multicast services. The short, fixed length of the ATM cell requires an adaptation layer at the end points to transfer complete message and guarantee that cells from different sources are not interleaved by intermediate switches. The overhead of call setup and tear-down for the connection based ATM protocol require an efficient mechanism for adding and removing users to a multicast group. The limited size of the VPI/VCI field prevents the use of source-based routing, as used by the existing IP multicast routing programs A B C D 
Timing 
Bit rate 
Mode 
Table 1. Multicast Application Characteristics gives an indication of the requirements of those application types that would require multicasting protocols. Connection oriented protocols can incur a high overhead when setting up and destroying links, therefore connectionless links are preferable. Some applications that require multicasting such as audio would prefer a constant bit rate where as video is less susceptible to the jitters. This is due to a human’s high sensitivity to audio jitters. It can then be taken from the Fig.[1] that class D services are along the lines needed to implement multicast on an ATM network. More advanced details could be studied in [15-22]. 5.MULTICASTING SCHEMES FOR SHARED MEMORY SWITCH Various ways of supporting multicast operation with shared- memory architecture can be categorized under two different classes : 
 Replication-at-Receiving (RAR) or copying Network scheme.  Replication-at-Sending (RAS) A brief description of each of the multicast classes is given below. 5.1 RAR schemes In RAR scheme, a multicast cell arriving at the switch and destined to m destinations is first copied m times Fig.[1]. A copy of the cell is linked to each output queue to which the multicast cell is destined. All copies are stored in the buffer then each copy is served independently. The RAR scheme has been used in several existing shared memory switches because it is relatively simple to implement [3]. In fact, once a cell has been replicated each copy of the cell can be treated in the same way as a unicast cell. Consequently, both the control and the structure of the linked lists are basically the same as those used in a unicast switch. 
MWMR Multicast Scheme Fig.[1] Shared Memory : Multicasting with copying n/w 
5.2 RAS scheme In RAS scheme the multicast cell is not replicated before storage in shared buffer, only single instance of cell is stored in the buffer. Cell is replicated at the output port. This is shown in Fig.[2]. 
Real Time 
None 
Real Time 
None 
Real Time 
None 
Real Time 
None 
Constant 
Variable 
Constant 
Variable 
Connection Oriented 
Connectionless
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
30 
Fig. [2] SWSR Multicast Support employing a Fanout bus 5.3 Multiple Write Multiple Read (MWMR) This is a straightforward solution to providing multicast support. The MWMR scheme applies to all those multicast schemes where an incoming multicast cell is replicated first, and then its multiple copies are used to write into and read out of the shared memory space for switching purpose. A multicast cell is replicated for all its multicast connections and switched to a predestined group of output ports with the help of a point–to- point routing network before being written to the shared memory space. From a shared memory point of view, a multicast cell is replicated into multiple copies and stored in shared memory (multiple write); then multiple copies are eventually read out of the shared memory (multiple read) for their respective output port. Advantages of MWMR scheme: In the MWMR scheme, multicast cells after replication are treated the same as the unicast cells. This scheme is a fair scheme in the sense that copies of a multicast cell destined to a loaded output are more likely to be dropped and an idle output port would always get its cell if the copies are present in the memory. Disadvantages of MWMR: The biggest disadvantage of this approach is that for an effective load, the number of replicated cells input to the shared memory switch could be of O(N2). As in the worst case, N cells might get replicated to at most N2 cells and only at most N cells could be transmitted in a given switch cycle. This would result in storing O(N2) cells in each switch cycle, and for a finite memory space it would result in an considerable cell loss for a given effective load. Furthermore replication of multicast cells would require O(N2) ATM cells to be written to the shared memory space in a given switch cycle. This scheme obviously becomes limited by the memory cycle time as the degree of fanout increases in a large shared memory based ATM switching system. 5.4 Single Write Single Read (SWSR) 
In this scheme, multicast cells form a separate logical queue within the shared memory space. A dedicated multicast output port is used to serve multicast cells in a first-in-first-out (FIFO) fashion every cycle. In a given In a given write cycle, upto N multicast cells or some combination of unicast and multicast cells can be written to the shared memory for switching purposes. During a given read cycle, upto N unicast cells and one multicast can be read out of the shared memory. If a multicast cell is read out of the shared memory, it is routed to the high-speed bus for its replication and transmission to its fanout destinations. Advantages of SWSR: Since no replication of a multicast cell takes place before its storage, it is an efficient scheme in terms of memory space. Since no multiple memory accesses are performed for the same information, it is an efficient scheme in terms of the memory access time. In this scheme, sequential read operations are not involved in reading the fanouts of a multicast cell; hence, it is well suited for high-performance shared memory ATM architectures. Disadvantages of SWSR: Some additional hardware, such as a fanout bus and an additional buffer or mask at the output ports, is used to perform reading the fanout of a multicast cell within a fixed switching time slot. Use of additional hardware is the only disadvantage of this scheme. SWSR with Output Buffer (SWSR-OB ) Under this scheme, additional buffers are employed at the output Fig.[3]. The amount of buffer used at the output will depend on the percentage of incoming multicast traffic, the degree average fanouts, and the degree of cell loss rate tolerated by the system. Use of dedicated buffers at the output could also result in excessive cell loss under a bursty traffic consisting of a mix of unicast and multicast cell bursts. SWSR with Output Mask (SWSR-OM) This scheme uses a mask called the output mask (OM) to drop additional ATM cells at the output and retain them in the shared memory Fig [4]. In the case of multiple arrivals (i.e. arrival of a unicast cell and a multicast fanout) and depending on the switching priority used, unicast cells or multicast cells are dropped by the output mask (OM) at the output. This scheme prevents loss of cells at the output ports by retaining the cells (those dropped by the output mask) in the shared memory space and outputting them in the successive switch cycles. 
Multicast Cell Enable Block
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
31 
Fig. [3] Shared Memory : Multicasting With Additional Buffer Figure 4: shared Memory Multicasting with Output Mask 
6. CONCLUSIONS Shared memory ATM switches have gained significant importance in handling bursty traffic in ATM networks because of their superior performance characteristics in terms of cell loss and throughput for a given memory space. A shared-memory ATM switch provides sharing of memory space among its switch ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM switches under condition of identical memory size. REFERENCES [1] Joan Garcia-Haro and Andrzej Jajszczyk “ATM Shared Memory Switching Architectures”, IEEE Network, July/August 1994, pp 18-26. [2] Abhijit K. Choudhury, Ellen L. Hahne “Dynamic Queue Length Thresholds for Shared Memory Packet Switches”, IEEE Network, Vol-6, April 1998 , pp 130-140. 
[3] Sanjeev Kumar and Dharma P. Agrawal, “On Multicast Support for Shared Memory Based ATM Switch Architecture”, IEEE Network, January/February 1996, pp 34-39. 
[4] Yuhui Shi, Russell Ebarhart and Yaobin Chen, “Implementation of Evolutionary Fuzzy Systems”, IEEE Network, Vol-7, April 1999, pp 109-118. [5] Abdelnaser Adas, “Traffic Models in Broadband Networks”, IEEE Communications Magazine, July 1997, pp 82-89. [6] Jaime Jungok Bae and Tatsuya Suda, IEEE Network, Vol- 79, February 1998, pp 170-173. [7] Mohan Lal, Anil K. Sarje and Vivek Kumar Bhugra, “Performance Analysis of Leaky Bucket Schemes Against A Fuzzy Based Approach”, University of Roorkee. [8] J.Y. Le Boudec, “The Asynchronous Transfer Mode: A Tutorial”, Computer Networks and ISDN Systems, Vol-24, 1992, pp. 279-309.
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
32 
[9] Thomas D. Ndousse, “Fuzzy Neural Control of Voice Cells In ATM Networks”, IEEE Journal on selected areas in communications, December 1994, pp. 1488-1494. [10] S. Kumar and D. P. Agrawal, “A Shared Buffer Direct Access ATM Switch Architecture for Broadband Networks”, Proc. IEEE Conference, 1994 pp. 101-105. [11] Lee Goldberg, “ATM Switching: A Brief Introduction”, Electronic Design, December 1994, pp. 87-103. [12] H. Kitamura, “A Study on Shared Buffer type ATM Switch”, Electronics and Communications in Japan, Part-1, Vol- 73, November 1990, pp. 58-64. [13] Andrew S. Tanenbaum, “Computer Networks”, Third Edition, Prentice-Hall of India, New Delhi, 1997. [14] Yedidyah Langsam, Mosche J. Augenstein and Aaron M. Tenembaum, “Data Structures using C and C++”, Second Edition, Prentice-Hall of India, New Delhi, 2000. 
[15] Cui, J., Xiong, N. : “A novel and efficient source-path discovery and maintenance method for application layer multicast,” Journal of Computers and Electrical Engineering, Vol. 39, Issue 1, Pages 67-75, January 2013 
[16] Xuan, Y., Lea, C.T. : “Network-coding multicast networks with QoS guarantees,” IEEE/ACM Transactions on Networking (TON), Vol. 19, Issue 1, pp. 265-274, February 2011 [17] Holopainen, V., Kantola, R., Taira, T., Lamminen O. : “Automatic link numbering and source routed multicast,” 4th international conference on Autonomous infrastructure, management and security, pp. 123-134, 2010 
[18] Zhang, C. : “Optical multicast provisioning with differentiated leaf availability guarantee in WDM networks,” Journal of Photonic Network Communications, Vol. 21, Issue 1, pp. 21-27, February 2011 
[19] Molnar, M.: “On the Optimal Tree-Based Explicit Multicast Routing,” Second International Conference on Communication Theory, Reliability, and Quality of Service, pp. 91-96, 2009 
[20] Garofalakis, J., Stergiou, E.: “Mechanisms and analysis for supporting multicast traffic by using multilayer multistage interconnection networks,” International Journal of Network Management, Vol. 21, Issue 2, 2011 
[21] Singh, A.P., Potey, S.M., Barbhuiya, Nandi, F.A., S. : “A Scalable and Secure Key Distribution Mechanism for Multicast Networks,” Proceedings of International Conference on Advances in Computing and Communications, pp. 211-214, 2012 [22] Sierra, J.E., Caro, L.F., Marzo, J.L., Fabregat, R., Solano, F., Donoso,Y. : “Impact of the number of SAB on architectures that support unicast & multicast traffic in WDM networks,” International Journal of Communication Networks and Distributed Systems , Vol. 4, Issue 1, 2010

More Related Content

What's hot

V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
KARTHIKEYAN V
 
Gsm rf interview questions
Gsm rf interview questionsGsm rf interview questions
Gsm rf interview questions
radira03
 
Gsm inteview question
Gsm inteview questionGsm inteview question
Gsm inteview question
Naeem Ullah
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
Partha Bhunia
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
santosh kumar
 
Fp3410401046
Fp3410401046Fp3410401046
Fp3410401046
IJERA Editor
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
Meenakshi Devi
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
KGunasekaran1
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Unit 2
Unit 2Unit 2
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
aniston0108
 
Asynchronous Transfer Mode Project
Asynchronous Transfer Mode ProjectAsynchronous Transfer Mode Project
Asynchronous Transfer Mode Project
Ubraj Khadka
 
Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G
ruikarsachin
 
Atm
AtmAtm
Multiplexing
MultiplexingMultiplexing
Multiplexing
prateek237
 

What's hot (19)

V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
Gsm rf interview questions
Gsm rf interview questionsGsm rf interview questions
Gsm rf interview questions
 
Gsm inteview question
Gsm inteview questionGsm inteview question
Gsm inteview question
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Fp3410401046
Fp3410401046Fp3410401046
Fp3410401046
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Mc unit 2-jwfiles
Mc unit 2-jwfilesMc unit 2-jwfiles
Mc unit 2-jwfiles
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Unit 2
Unit 2Unit 2
Unit 2
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Asynchronous Transfer Mode Project
Asynchronous Transfer Mode ProjectAsynchronous Transfer Mode Project
Asynchronous Transfer Mode Project
 
Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G Module 4 Mobile comm GSM 3 G 4 G
Module 4 Mobile comm GSM 3 G 4 G
 
Atm
AtmAtm
Atm
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Similar to Switching and multicast schemes in asynchronous transfer mode networks

ATM.pdf
ATM.pdfATM.pdf
ATM.pdf
Jayaprasanna4
 
M Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
M Sc Tns 2823134 Assignment 1 Atm Switching AbidafsarM Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
M Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
Abid Afsar Khan Malang Falsafi
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
Tushar Ranjan
 
ATM Network
ATM NetworkATM Network
ATM Network
sangusajjan
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
Nishant Munjal
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
Shamima Akther
 
Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
Solar Energy Industries Association
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
MH Shihab
 
Doc 20191126-wa0106
Doc 20191126-wa0106Doc 20191126-wa0106
Doc 20191126-wa0106
university of Gujrat, pakistan
 
MadgeOne
MadgeOneMadgeOne
MadgeOne
Ronald Bartels
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
Nirmal Thaliyil
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Editor Jacotech
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
sheikhparvez4
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
IRJET Journal
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Editor Jacotech
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
IOSR Journals
 
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEPERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
IJCNCJournal
 
L010326978
L010326978L010326978
L010326978
IOSR Journals
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
IJERA Editor
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
Ali Usman
 

Similar to Switching and multicast schemes in asynchronous transfer mode networks (20)

ATM.pdf
ATM.pdfATM.pdf
ATM.pdf
 
M Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
M Sc Tns 2823134 Assignment 1 Atm Switching AbidafsarM Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
M Sc Tns 2823134 Assignment 1 Atm Switching Abidafsar
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
ATM Network
ATM NetworkATM Network
ATM Network
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
 
Doc 20191126-wa0106
Doc 20191126-wa0106Doc 20191126-wa0106
Doc 20191126-wa0106
 
MadgeOne
MadgeOneMadgeOne
MadgeOne
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEPERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
 
L010326978
L010326978L010326978
L010326978
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 

More from Editor Jacotech

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Editor Jacotech
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
Editor Jacotech
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
Editor Jacotech
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
Editor Jacotech
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
Editor Jacotech
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
Editor Jacotech
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Editor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
Editor Jacotech
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
Editor Jacotech
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
Editor Jacotech
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
Editor Jacotech
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
Editor Jacotech
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
Editor Jacotech
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
Editor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
Editor Jacotech
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
Editor Jacotech
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
Editor Jacotech
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
Editor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
Editor Jacotech
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
Editor Jacotech
 

More from Editor Jacotech (20)

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 

Switching and multicast schemes in asynchronous transfer mode networks

  • 1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 28 Switching and Multicast Schemes in Asynchronous Transfer Mode Networks By Dr. Brijesh Kr. Gupta, Mr. Roop Ranjan Prof. & Head , Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306 Asst. Prof., Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306 ABSTRACT The purpose of this paper is to provide an overview of the ATM switching technology and to describe various multicast schemes in ATM Networks. One of the most promising solutions of ATM switches is based on the shared-memory principle. A shared- memory ATM switch provides sharing of memory space among its switches ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM under conditions of identical memory size. We studied various multicast schemes, which are presented in this paper. Key Words: ATM Switch, buffer allocation, multicasting, queue length threshold, shared memory switch. 1. INTRODUCTION The telecommunications industry is rapidly becoming a high bandwidth and high speed network environment due to fast growing market demands for multimedia applications. New multimedia based applications (such as data, voice, video and image) require greater bandwidth with capability of handling multiservice traffic on the same network. One technology known as asynchronous transfer mode (ATM) was developed and is continually being further enhanced to meet this demand. ATM is a high speed, packet switching network technology capable of supporting many classes of traffic. It incorporates the advantage of fiber optic techniques to transport a wide range of traffic types such as voice, video, image and various data traffic. ATM is a standard being developed by 2 major organizations: the ATM Forum and the ITU-T. The ATM standards define guidelines needed to support cell-based voice, data, video, and multimedia communication in a public network under Broadband ISDN. Although ATM standards are very well defined, there is one area that is not included the overall standard. It is the area of ATM switching. By default, ATM switch vendors use a wide variety of techniques to build their switches based on their own research and development efforts. Therefore, this paper will provide the reader with ATM basics overview in addition to a general description of the major components of an ATM switch and various switch design techniques being implemented by ATM switch vendors. 2. ATM SWITCHING FUNCTIONS As described earlier in previous sections, user traffic information is routed through the network via virtual paths or channels. Therefore, one key function of an ATM switch is its ability to buffer cells and quickly relay them without cell loss. However, ATM switches not only relay cells but must also perform control and management functions in order to support both asynchronous and synchronous traffic as well as connectionless and connection-oriented traffic. An ATM switch contains a set of input and output ports, which are utilized to interconnect to users, other switches, and other network elements. It also has interfaces to exchange control and management information with special purpose networks (i.e., network management systems). According to ATM standards, the switching function of ATM switches are categorized into 3 planes based on the Broadband ISDN model: User plane (U-plane),Control plane (C-plane), and Management plane (M-plane).The User plane relay user information cells from input ports to appropriate output ports by processing cell headers. It is useful to note that in the User plane, cell payloads are carried transparently through the network. Therefore, this cell relay function can be divided into 3 major blocks: the input module at the input port, the cell switch matrix that performs the routing function, and the output modules at the output ports. The Control plane deals with call establishment and release of virtual path/virtual channel connections. Information in control cells payload is not transparent to the network because it contains signaling information required for setting-up connections. The Management plane provides management functions to ensure correct and efficient network operation. The management function can further be divided as follows:  Fault management  Performance management  Configuration management  Security management  Accounting management  Traffic management 3. MULTICASTING SCHEMES 3.1 UNICASTING AND BROADCASTING Unicasting means sending a message from a single source to a single destination. Whereas in broadcasting a message is sent to all the destinations like in the television, the signals are broadcasted to all the destinations through the satellites. 3.2 Multicasting Multicast can be simply defined as the ability to send one message to one or more in a single operation. This is different than using replicated unicast which sends messages from one node to a group of nodes by sending to each node individually. This will incur one operation for each destination node and is non-atomic. A 1:N multicast allows one source to reach N
  • 2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 29 destinations. An M:N multicast allows M sources to reach N destinations. 3.3 Why Multicasting ? Many envisioned applications in asynchronous transfer mode (ATM) networks are multicast in nature and are expected to generate a significant portion of the total traffic. Examples of such applications are broadcast video-conferencing, multiparty telephony and work group applications. The ability to support multicast traffic is therefore a basic functionality that needs to be implemented in ATM switches. Mechanisms have to be provided in the switches to replicate cells arriving at an incoming multicast virtual connection (VC) and deliver them to multiple outgoing legs of that connection. 4.REQUIREMENTS FOR ATM MULTICAST ATM imposes specific requirements [11] that must be considered for the design of the multicast services. The short, fixed length of the ATM cell requires an adaptation layer at the end points to transfer complete message and guarantee that cells from different sources are not interleaved by intermediate switches. The overhead of call setup and tear-down for the connection based ATM protocol require an efficient mechanism for adding and removing users to a multicast group. The limited size of the VPI/VCI field prevents the use of source-based routing, as used by the existing IP multicast routing programs A B C D Timing Bit rate Mode Table 1. Multicast Application Characteristics gives an indication of the requirements of those application types that would require multicasting protocols. Connection oriented protocols can incur a high overhead when setting up and destroying links, therefore connectionless links are preferable. Some applications that require multicasting such as audio would prefer a constant bit rate where as video is less susceptible to the jitters. This is due to a human’s high sensitivity to audio jitters. It can then be taken from the Fig.[1] that class D services are along the lines needed to implement multicast on an ATM network. More advanced details could be studied in [15-22]. 5.MULTICASTING SCHEMES FOR SHARED MEMORY SWITCH Various ways of supporting multicast operation with shared- memory architecture can be categorized under two different classes :  Replication-at-Receiving (RAR) or copying Network scheme.  Replication-at-Sending (RAS) A brief description of each of the multicast classes is given below. 5.1 RAR schemes In RAR scheme, a multicast cell arriving at the switch and destined to m destinations is first copied m times Fig.[1]. A copy of the cell is linked to each output queue to which the multicast cell is destined. All copies are stored in the buffer then each copy is served independently. The RAR scheme has been used in several existing shared memory switches because it is relatively simple to implement [3]. In fact, once a cell has been replicated each copy of the cell can be treated in the same way as a unicast cell. Consequently, both the control and the structure of the linked lists are basically the same as those used in a unicast switch. MWMR Multicast Scheme Fig.[1] Shared Memory : Multicasting with copying n/w 5.2 RAS scheme In RAS scheme the multicast cell is not replicated before storage in shared buffer, only single instance of cell is stored in the buffer. Cell is replicated at the output port. This is shown in Fig.[2]. Real Time None Real Time None Real Time None Real Time None Constant Variable Constant Variable Connection Oriented Connectionless
  • 3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 30 Fig. [2] SWSR Multicast Support employing a Fanout bus 5.3 Multiple Write Multiple Read (MWMR) This is a straightforward solution to providing multicast support. The MWMR scheme applies to all those multicast schemes where an incoming multicast cell is replicated first, and then its multiple copies are used to write into and read out of the shared memory space for switching purpose. A multicast cell is replicated for all its multicast connections and switched to a predestined group of output ports with the help of a point–to- point routing network before being written to the shared memory space. From a shared memory point of view, a multicast cell is replicated into multiple copies and stored in shared memory (multiple write); then multiple copies are eventually read out of the shared memory (multiple read) for their respective output port. Advantages of MWMR scheme: In the MWMR scheme, multicast cells after replication are treated the same as the unicast cells. This scheme is a fair scheme in the sense that copies of a multicast cell destined to a loaded output are more likely to be dropped and an idle output port would always get its cell if the copies are present in the memory. Disadvantages of MWMR: The biggest disadvantage of this approach is that for an effective load, the number of replicated cells input to the shared memory switch could be of O(N2). As in the worst case, N cells might get replicated to at most N2 cells and only at most N cells could be transmitted in a given switch cycle. This would result in storing O(N2) cells in each switch cycle, and for a finite memory space it would result in an considerable cell loss for a given effective load. Furthermore replication of multicast cells would require O(N2) ATM cells to be written to the shared memory space in a given switch cycle. This scheme obviously becomes limited by the memory cycle time as the degree of fanout increases in a large shared memory based ATM switching system. 5.4 Single Write Single Read (SWSR) In this scheme, multicast cells form a separate logical queue within the shared memory space. A dedicated multicast output port is used to serve multicast cells in a first-in-first-out (FIFO) fashion every cycle. In a given In a given write cycle, upto N multicast cells or some combination of unicast and multicast cells can be written to the shared memory for switching purposes. During a given read cycle, upto N unicast cells and one multicast can be read out of the shared memory. If a multicast cell is read out of the shared memory, it is routed to the high-speed bus for its replication and transmission to its fanout destinations. Advantages of SWSR: Since no replication of a multicast cell takes place before its storage, it is an efficient scheme in terms of memory space. Since no multiple memory accesses are performed for the same information, it is an efficient scheme in terms of the memory access time. In this scheme, sequential read operations are not involved in reading the fanouts of a multicast cell; hence, it is well suited for high-performance shared memory ATM architectures. Disadvantages of SWSR: Some additional hardware, such as a fanout bus and an additional buffer or mask at the output ports, is used to perform reading the fanout of a multicast cell within a fixed switching time slot. Use of additional hardware is the only disadvantage of this scheme. SWSR with Output Buffer (SWSR-OB ) Under this scheme, additional buffers are employed at the output Fig.[3]. The amount of buffer used at the output will depend on the percentage of incoming multicast traffic, the degree average fanouts, and the degree of cell loss rate tolerated by the system. Use of dedicated buffers at the output could also result in excessive cell loss under a bursty traffic consisting of a mix of unicast and multicast cell bursts. SWSR with Output Mask (SWSR-OM) This scheme uses a mask called the output mask (OM) to drop additional ATM cells at the output and retain them in the shared memory Fig [4]. In the case of multiple arrivals (i.e. arrival of a unicast cell and a multicast fanout) and depending on the switching priority used, unicast cells or multicast cells are dropped by the output mask (OM) at the output. This scheme prevents loss of cells at the output ports by retaining the cells (those dropped by the output mask) in the shared memory space and outputting them in the successive switch cycles. Multicast Cell Enable Block
  • 4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 31 Fig. [3] Shared Memory : Multicasting With Additional Buffer Figure 4: shared Memory Multicasting with Output Mask 6. CONCLUSIONS Shared memory ATM switches have gained significant importance in handling bursty traffic in ATM networks because of their superior performance characteristics in terms of cell loss and throughput for a given memory space. A shared-memory ATM switch provides sharing of memory space among its switch ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM switches under condition of identical memory size. REFERENCES [1] Joan Garcia-Haro and Andrzej Jajszczyk “ATM Shared Memory Switching Architectures”, IEEE Network, July/August 1994, pp 18-26. [2] Abhijit K. Choudhury, Ellen L. Hahne “Dynamic Queue Length Thresholds for Shared Memory Packet Switches”, IEEE Network, Vol-6, April 1998 , pp 130-140. [3] Sanjeev Kumar and Dharma P. Agrawal, “On Multicast Support for Shared Memory Based ATM Switch Architecture”, IEEE Network, January/February 1996, pp 34-39. [4] Yuhui Shi, Russell Ebarhart and Yaobin Chen, “Implementation of Evolutionary Fuzzy Systems”, IEEE Network, Vol-7, April 1999, pp 109-118. [5] Abdelnaser Adas, “Traffic Models in Broadband Networks”, IEEE Communications Magazine, July 1997, pp 82-89. [6] Jaime Jungok Bae and Tatsuya Suda, IEEE Network, Vol- 79, February 1998, pp 170-173. [7] Mohan Lal, Anil K. Sarje and Vivek Kumar Bhugra, “Performance Analysis of Leaky Bucket Schemes Against A Fuzzy Based Approach”, University of Roorkee. [8] J.Y. Le Boudec, “The Asynchronous Transfer Mode: A Tutorial”, Computer Networks and ISDN Systems, Vol-24, 1992, pp. 279-309.
  • 5. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 32 [9] Thomas D. Ndousse, “Fuzzy Neural Control of Voice Cells In ATM Networks”, IEEE Journal on selected areas in communications, December 1994, pp. 1488-1494. [10] S. Kumar and D. P. Agrawal, “A Shared Buffer Direct Access ATM Switch Architecture for Broadband Networks”, Proc. IEEE Conference, 1994 pp. 101-105. [11] Lee Goldberg, “ATM Switching: A Brief Introduction”, Electronic Design, December 1994, pp. 87-103. [12] H. Kitamura, “A Study on Shared Buffer type ATM Switch”, Electronics and Communications in Japan, Part-1, Vol- 73, November 1990, pp. 58-64. [13] Andrew S. Tanenbaum, “Computer Networks”, Third Edition, Prentice-Hall of India, New Delhi, 1997. [14] Yedidyah Langsam, Mosche J. Augenstein and Aaron M. Tenembaum, “Data Structures using C and C++”, Second Edition, Prentice-Hall of India, New Delhi, 2000. [15] Cui, J., Xiong, N. : “A novel and efficient source-path discovery and maintenance method for application layer multicast,” Journal of Computers and Electrical Engineering, Vol. 39, Issue 1, Pages 67-75, January 2013 [16] Xuan, Y., Lea, C.T. : “Network-coding multicast networks with QoS guarantees,” IEEE/ACM Transactions on Networking (TON), Vol. 19, Issue 1, pp. 265-274, February 2011 [17] Holopainen, V., Kantola, R., Taira, T., Lamminen O. : “Automatic link numbering and source routed multicast,” 4th international conference on Autonomous infrastructure, management and security, pp. 123-134, 2010 [18] Zhang, C. : “Optical multicast provisioning with differentiated leaf availability guarantee in WDM networks,” Journal of Photonic Network Communications, Vol. 21, Issue 1, pp. 21-27, February 2011 [19] Molnar, M.: “On the Optimal Tree-Based Explicit Multicast Routing,” Second International Conference on Communication Theory, Reliability, and Quality of Service, pp. 91-96, 2009 [20] Garofalakis, J., Stergiou, E.: “Mechanisms and analysis for supporting multicast traffic by using multilayer multistage interconnection networks,” International Journal of Network Management, Vol. 21, Issue 2, 2011 [21] Singh, A.P., Potey, S.M., Barbhuiya, Nandi, F.A., S. : “A Scalable and Secure Key Distribution Mechanism for Multicast Networks,” Proceedings of International Conference on Advances in Computing and Communications, pp. 211-214, 2012 [22] Sierra, J.E., Caro, L.F., Marzo, J.L., Fabregat, R., Solano, F., Donoso,Y. : “Impact of the number of SAB on architectures that support unicast & multicast traffic in WDM networks,” International Journal of Communication Networks and Distributed Systems , Vol. 4, Issue 1, 2010