Computer Network - Network Layer

91

Transcript of Computer Network - Network Layer

Page 1: Computer Network - Network Layer
Page 2: Computer Network - Network Layer

Network layer is responsible for source to destination delivery of the packets. The network layer must know the topology of the subnet and choose appropriate paths through it.When source and destination are in different networks,the network layer (IP) must deal with these differences. If two system are connected to the same link, there is usually no need for a network layer.

Page 3: Computer Network - Network Layer

H3 H3Data Data

From Transport layer

From data link layer

To Transport layer

To data link layer

Page 4: Computer Network - Network Layer

WAN

LAN

LAN

LAN

LAN

F1

F1

F3

F2

F1

F2

F2

There is no provision in the data link(or physical layer) to make the

routing decision as the frame does not carry any routing information. To

solve the problem of delivery through several link, the network layer was

designed. The network layer is responsible for host to host delivery and for

routing the packets through routers and switches.

Page 5: Computer Network - Network Layer

LOGICAL ADDRESSING

Logical addressing are necessary for universalcommunication that are independent of underlying physicalnetwork. The logical address in the Internet is a 32 bit address

ROUTING

When independent network or link are connected to createinternetwork or a large network, the connecting devices(routeror switch) routes the packet to their final destination.

Page 6: Computer Network - Network Layer

Physicallayer

Data linklayer

Physicallayer

Data linklayer

End

system

a

Network

layer

Physicallayer

Data linklayer

Physicallayer

Data linklayer

Transportlayer

Transportlayer

Messages Messages

Segments

End

system

b

Network

serviceNetwork

service

Network

layer

Networklayer

Network

layer

Page 7: Computer Network - Network Layer

Routing table

IP packet and

routing

information

To data link layer

Data from another

protocol

Processing

Network layer

The network layer at the source is responsible for creating a packet from

data coming from another protocol such as transport layer protocol. It is

responsible for checking its routing table to find the routing information.

NETWORK LAYER AT THE SOURCE

Source

Page 8: Computer Network - Network Layer

Routing table

IP packet and

routing

information

To data link layer

Processing

Network layer

From data link

layer

Router

The network layer at the switch or router is responsible for routing the

packet. When a packet arrives, the router or switch consults its routing

table and find the interface from which the packet must be send. After

some changes in the header with the routing information is passed to the

data link layer again.

NETWORK LAYER AT THE SWITCH

Page 9: Computer Network - Network Layer

IP packet

Fromdata link layer

Data to another

protocol

Processing

Network layer

The network layer at the destination is responsible for address verification,

it make sure that the destination address on the packet is the same as the

address of the host.

NETWORK LAYER AT THE DESTINATION

Destination

Page 10: Computer Network - Network Layer

At the network layer, TCP/IP supports the InternetworkingProtocol i.e. IP with four supporting protocol: ARP, RARP, ICMP,and IGMP.LOGICAL ADDRESSING

Transmission mechanism used by the TCP/IP protocol. It is unreliable and connectionless protocol. It does not provide error checking or tracking. IP transport data in packets called datagram. IP does not keep track of the routes and has no facility ofreordering datagram.

ADDRESS RESOLUTION PROTOCOL

Used to associate a logical address with a physical address. ARP is used to find the physical address of the node when itsinternet address is known.

Page 11: Computer Network - Network Layer

REVERSE ADDRESS RESOLUTION PROTOCOL

Its allows a host to discover its Internet address when itsknows only its physical address. It is used when a computer is connected to a network for thefirst time.

INTERNET CONTROL MESSAGE PROTOCOL

ICMP is used by hosts or gateways to send notification ofdatagram problems back to the sender. Its send query and error reporting messages.

INTERNET GROUP MESSAGE PROTOCOL

IGMP is used to facilitate the simultaneous transmission of amessage to a group of recipients.

Page 12: Computer Network - Network Layer

The internet at the network layer is a packet switchednetwork. Packet switching uses either the virtual circuit approach orthe datagram approach. The internet is chosen the datagram approach to switchingin the network layer. It uses the universal address defined in the network layer toroute packets from the source to the destination.

Page 13: Computer Network - Network Layer

DATAGRAM

Packets in the IPv4 layer are called datagram.

A datagram is a variable-length packet consisting of two

parts : header and data.

The header is 20 to 60 bytes in length and contains

information essential to routing and delivery.

Page 14: Computer Network - Network Layer
Page 15: Computer Network - Network Layer

1. VERSION(VER) : This 4-bit field defines the version of theIPv4 protocol. This field tells the IPv4 software running inthe processing machine that the datagram has the formatof version 4.

2. HEADER LENGTH(HLEN) :This 4 bit field defines the totallength of the datagram header in 4 byte word. This field isneeded because the length of the header is variable. Whenthere are no option the header length is 20 bytes and valueof this field is 5. When the option field is at its max. size thevalue is 15.

Page 16: Computer Network - Network Layer

3. SERVICES : This is a 8 bit field previously called service typeis now called differentiated service.

SERVICE TYPE : In this interpretation the first 3 bit are

called the precedence bits and the next 4 bits are called type

of service(TOS) bits

Precedence TOS Bits

D T R C

D : Minimize delay, T: Maximize Throughput

R: Maximize reliability, C: Minimize Cost

1. PRECEDENCE : This is a 3 bit field ranging from 0(000 in

binary) to 7(111 in binary). The precedence defines the

priority of the datagram in issue such as congestion. If a

router is congested then the lower precedence datagram

are discarded.

Page 17: Computer Network - Network Layer

TOS BITS Description

0000 Normal(default)

0001 Minimize Cost

0010 Maximize Reliability

0100 Maximize Throughput

1000 Minimize delay

Page 18: Computer Network - Network Layer

DIFFERENTIATED SERVICES : In this interpretation the first 6

bits make up the code point subfield and the last 2 bits are not

used. It can be used in two different ways:

a) When the 3 rightmost bits are 0’s, the 3 leftmost bits are

interpreted the same as the precedence bits in the service type

interpretation. In other word it is compatible with the old

interpretation.

b) When the three rightmost bits are not all 0’s , the 6 bits define 64

services based on the priority assignment by the internet or local

authorities.

Category Code point Assigning authority

1 XXXXX0 Internet

2 XXXX11 Local

3 XXXX01 Temporary or

experimental

The first category contain 32 services type, the second and

third contain 16 services types

Page 19: Computer Network - Network Layer

4. TOTAL LENTH : This is a 16 bit field that defines the total

length (header plus data) of the IPv4 datagram in bytes. To find thelength of the data coming from the upper layer from the total length.

Length of data= Total length – Header length

Encapsulation of a small datagram in an Ethernet frame

One of the reason why “total length” field is required.

Page 20: Computer Network - Network Layer

Protocol field and encapsulated data

5. PROTOCOL : This 8 bit field defines the higher level

protocol that uses the services of the Ipv4 layer. An IPv4

datagram can encapsulated data from several higher level

protocol such as TCP, UDP, ICMP, and IGMP. This specifies the

final destination protocol to which the IPv4 datagram isdelivered.

Page 21: Computer Network - Network Layer

6. CHECKSUM

• IPv4 checksum use the 1’s compliment method.

• Checksum only computes for IP header, not data

• Upper layer has checksum for data portion

• Header always changes in each router

• Header is chunked to 16-bit sections for computing

7. OPTION

• Option as the name implies, are not required for a

datagram.

• They can be used for network testing and debugging.

• Option process is required for IPv4 software.

Page 22: Computer Network - Network Layer

7. OPTION(contd..)

Record route

End of option

No operation

Multiple byte

Single byte

Option

Time Stamp

Loose source route

Strict source route

Taxonomy of option in IPv4

NO OPERATION : A no operation is a 1 byte option used as a filler between option

END OF OPTION: An end of option is a 1 byte option used for padding at the end of the option field. It however can only be used as the past location.

RECORD ROUTE: An record route is used to record the internet router that handle the datagram. It can list up to nine router

Page 23: Computer Network - Network Layer

7. OPTION(contd..)

STRICT SOURCE ROUTE: A strict route option is used by the source to predetermine a route for the datagram as its travel through the internet.

LOOSE SOURCE ROUTE : A loose source route option is similar to the strict source route, but it is less rigid. Each router in the list must be visited , but the datagram can visit other router as well.

TIMESTAMP: A timestamp option is used to record the time of datagram processing by a router. The time is expressed in million seconds from midnight

Page 24: Computer Network - Network Layer

Datagram can travel through different network.

Each router decapsulates the IPv4 datagram from the frame it

receives, and then encapsulate it in another protocol.

The format and size of the received and sent frame depends on the

protocol used by the physical through which the frame has just traveled

Dividing the datagram which make it possible to pass through the

other physical network is called fragmentation.

For example, if a router connects a LAN or WAN, its receives a frame

in the LAN format and sends a frame in the WAN format.

Page 25: Computer Network - Network Layer

Application may request a specific type of service

Protocol TOS bits Description

ICMP 0000 normal

BOOTP 0000 normal

NNTP 0001 Minimize cost

IGP 0010 Maximize reliability

SNMP 0010 Maximize reliability

TELNET 1000 Minimize delay

FTP(data) 0100 Maximize

throughput

FTP(control) 1000 Minimize delay

TFTP 1000 Minimize delay

SMTP(command) 1000 Minimize delay

SMTP(data) 0100 Maximize

throughput

DNS(UDP query) 1000 Minimize delay

DNS(TCP query) 0000 normal

DNS(zone) 0100 Maximize

throughput

Page 26: Computer Network - Network Layer

MAXIMUM TRANSFER UNIT

Each data link layer protocol has its own frame format in most

protocol.

When a datagram is encapsulated in a frame, the total size of

the datagram must be less than its maximum size which is

defined by the restriction imposed by the hardware andsoftware used in the network

To make the IPv4 protocol independent of the physical network, the

designers to make the maximum length of the IPv4 datagram equal to

65,535 bytes.

Page 27: Computer Network - Network Layer

MTU’s FOR SOME NETWORKS

Page 28: Computer Network - Network Layer

When a datagram is fragmented, each fragment has its own

header with most of the field repeated, but with some changed.

A fragmented datagram may itself be fragmented if it

encounter a network with an even smaller MTU

The reassembly of the datagram is done by the destination

host because each fragment becomes an independent

datagram.

The host or router that fragments a datagram must change the

values of three fields : flags, fragmentation offset, total length. The

rest of the field must be copied.

Page 29: Computer Network - Network Layer

7. IDENTIFICATION

This is a 16 bit field that identifies a datagram originating from the

source host.

The combination of the identification and source IPv4 address must

uniquely define a datagram as it leaves the source host.

When a datagram is fragmented, the value in the identification

field is copied to all the fragment.

The identification number helps the destination in reassembling the

datagram

8. FLAG

This is 3 bit field. The first bit is reversed. The second bit is called the

donot fragment bit.

If its value is 1, the machine must not fragment the datagram.

If its value is 0, the datagram can be fragmented if necessary.

The third bit is called the “more fragment bit”

Page 30: Computer Network - Network Layer

9. FLAG(contd..)

If its value is 1, it means the datagram is not the last fragment, there

are more fragment after this one.

If its value is 0, it means this is the last or only fragment.

10.FRAGMENTATION OFFSET

This is a 13 bit field that shows the relative position of this fragment

with respect to the whole datagram.

It is the offset of the data in the original datagram measured in units

of 8 bytes.

Fragmentation Example

Page 31: Computer Network - Network Layer

IPv6 PACKET FORMAT

Each packet is composed of a mandatory base header followed

by the payload.

The payload consist of two parts: optional extension header and

data from an upper layer.

The base header occupies 40 bytes , whereas the extension

header and data from the upper layer contains up to 65,535 byte of

information

Page 32: Computer Network - Network Layer

FORMAT OF IPv6 DATAGRAM

Page 33: Computer Network - Network Layer

FORMAT OF IPv6

DATAGRAM(contd..)

VERSION: This 4 bit field defines the version number of the IP. For IPv6, the value is 6. PRIORITY: The 4 bit priority field defines the priority of the packet with respect to the traffic congestion. FLOW LABEL: The flow label is a 3 byte(24 bit) field that is designed to provide special handling for the particular flow of the data. PAYLOAD LENGTH: The 2 byte payload length field defines the length of the IP datagram excluding in the base header.NEXT HEADER: The next header is an 8 bit field defining the header that follows the base header in the datagram. The next header is either one of the optional extension header used by the IP or header of an encapsulated packet such as UDP or TDP.HOP LIMIT: This HOP limit is a 8 bit field that serves the same purpose as the TTL field in the Ipv4. SOURCE ADDRESS: The source address field is a 16 byte Internet address that identifies the original source of the datagram.DESTINATION ADDRESS: The destination address is a 16 byte Internet address that usually identifies the final destination of the datagram

Page 34: Computer Network - Network Layer

Value for higher level protocol

Page 35: Computer Network - Network Layer
Page 36: Computer Network - Network Layer

VIRTUAL CIRCUIT NETWORK

Virtual circuit network is a cross between a circuit switched network

and a datagram network.

As in a circuit switch network there is a setup and a tear down phase in

addition to the data-transfer phase.

The resources can be allocated during the setup phase as in a circuit

switched network or on a demand as in a datagram network.

As in a circuit switched network, all packets follow the same path

established during the connection.

A virtual circuit is normally implemented in a data link layer.

Page 37: Computer Network - Network Layer

VIRTUAL CIRCUIT APPROACH IN

A WAN

• FRAME RELAY : A frame relay is a relatively high-

speed protocol that can provide some service not

available in other WAN technologies such as DSL,

cable TV, and T lines.

• ATM : ATM, as a high speed protocol, can be the

superhighway of communication when it deploys

physical layer carriers such as SONET.

Page 38: Computer Network - Network Layer

Frame Relay is a virtual circuit wide –area network that was designed in

response to demands for a new type of WAN in the late 1980s and early 1990s.

Frame Relay operates at a higher speed(1.544 Mbps & recently 44.376 Mbps)

Frame Relay operates in just the physical and data link layer. This means it can

be easily used as a backbone network to provide services to protocol that

already have a network layer protocol such as the internet.

Frame relay allows bursty data.

Frame Relay allows a frame size of 9000 bytes, which can accommodate all

local area network frame sizes.

Frame Relay is less expensive than other traditional WANs.

Frame Relay has error detection at the data link layer only. There is no floe

control or error control.

Page 39: Computer Network - Network Layer

WHY USE FRAME RELAY?

Prior to Frame Relay, some organization were using a virtual-circuit

switching network called X.25 that perform switching at the network layer.

X.25 has a low 64-kbps data rate. By the 1990s, there was a need for

higher data rate WANs.

X.25 has extensive flow and error control at both the data link layer and

the network layer.

Originally X.25 was designed for private use, not for the Internet.

X.25 has its own network layer. This means that the user’s data are

encapsulated in the network layer packets of X.25. This doubles the

overhead.

Disappointed with X.25, some organization started their own private

WAN by leasing T-1 or T-2 lines from public service providers. This

approach has some drawback which are as:

Page 40: Computer Network - Network Layer

If an organization has n branches spread over an area , it needs n(n-1)/2 T-

1 or T-3 lines. The organization pays for all these lines although it may use

the lines only 10 percent of the time. This can be very costly.

The service provided by T-1 and T-3 lines assumes that the user has fixed

rate data all the time. So this type of service is not suitable for the many users

today that need to send bursty data

CONTD…..

Page 41: Computer Network - Network Layer

FRAME RELAY ARCHITECTURE

• FR provides permanent virtual circuits and

switched virtual circuits.

• The FR WAN is used as one link in the global

Internet.

Switch Table matches anincoming port-DLCIcombination with an outgoingport-DLCI combination.

A virtual circuit in Frame Relay is identified by a number called a “DATA

LINK CONNECTION IDENTIFIER(DLCI)”

Page 42: Computer Network - Network Layer

PERMANENT VS. SWITCHED

VIRTUAL CIRCUITS

In PVC the connection setup is very simple. The corresponding table

entry is recorded for all switches by the administrator (remotely and

electronically). An outgoing DLCI is given to the source, and an

incoming DLCI is given to the destination.

PVCs have 2 drawbacks:

Costly…pay for connection all the time

A connection is created from one source to one single destination. If

a source needs connections with several destinations, it needs a

PVC for each connection.

SVC creates a temporary, short connection that exists only when the

data are being transferred between source and destination. SVC

requires establishing and terminating phases (Chapter 8).

Page 43: Computer Network - Network Layer

FRAME RELAY LAYER

Data link

Simplified core function

of data link layer

Physical

ANSI Standard

“Frame Relay operates only at the physical layer and data link layer”

PHYSICAL LAYER :

No specific protocol is defined for the physical layer in Frame Relay.

Instead, it is left to the implementer to use whatever is available.

Frame relay supports any of the protocol recognized by ANSI

Page 44: Computer Network - Network Layer

FRAME RELAY LAYER(contd.)

DATA LINK LAYER :

At the data link layer, Frame Relay uses a simple protocol that does

not support flow or error control. It has only an error detection

mechanism

Page 45: Computer Network - Network Layer

FRAME RELAY AND IP

The TCP/IP protocol suite has become a widely accepted standard for

network communications.

IP, the Internet Protocol, is the component of the TCP/IP suite that is

responsible for routing data to its destination. IP operates at layer 3, the

network layer

Frame relay is very well-suited to carrying IP datagram traffic, which typically

is bursty in nature.

Frame relay and IP are a well-matched team—they work well together to

make efficient use of wide area bandwidth.

IP

NETWORK LAYER

FRAME RELAY

DATA LINK LAYER

PHYSICAL LAYER

IP and frame relay

layering

Page 46: Computer Network - Network Layer

USING FRAME RELAY IN AN IP

NETWORK

A frame relay circuit can simply be used as a replacement for a point-to-

point leased line in an IP network.

“Replacing a leased line with a frame relay circuit”

Page 47: Computer Network - Network Layer

VIRTUAL IP SUBNET

Multiple IP routers can be connected into a frame relay

configuration that behaves like a virtual LAN—or in IP terminology,

a virtual IP subnet.

An IP subnet is a set of systems (usually located on a LAN) that

have some special characteristics:

a. Their IP addresses start with the same network and subnet

numbers.

b. Any system can communicate directly with any other system in

the subnet. Data will not flow through an intermediate router

Page 48: Computer Network - Network Layer

VIRTUAL IP SUBNET(contd.)

This is a fully meshed set of connections—that is, each system has

direct connections to the other systems and hence can communicate

directly with the other systems.

Page 49: Computer Network - Network Layer

FRAME RELAY FRAME

ADDRESS (DLCI) FIELD: 10-bit DLCI field represents the address of the frame

and corresponds to a PVC.The first 6 bits of the first byte makes up the first part of

the DLCI. The second part of the DLCI uses the first 4 bits of the second byte.

These are the parts of the 10 bits DLCI defined by the Standard.

COMMAND/RESPONSE(C/R) : The command/response(C/R) bit is provided to

allow upper layer to identify a frame as either a command or a response. It is not

used by the frame relay protocol.

Page 50: Computer Network - Network Layer

FRAME RELAY FRAME(contd.)

EXTENDED ADDRESS(EA) : The extended address (EA) bit indicates whether

the current byte is the final byte of the address. An EA of 0 means that another

address byte is to follow. An EA of 1 means that the current byte is the final one.

FORWARD EXPLICIT CONGESTION NOTIFICATION(FECN) : The FECN bit can

be set by any switch to indicate that traffic is congested. This bit inform the

destination that congestion has occurred.

BACKWARD EXPLICIT CONGESTION NOTIFICATION(BECN) : The BECN bit is

set (in frame that travel in the other direction) to indicate a congestion problem in

the network. This bit inform the sender that congestion has occurred.

DISCARD ELIGIBILITY(DE) : The discard eligibility bit indicates the priority level

of the frame. In emergency situation, switches may have to discard frames to

relieve bottleneck and keep the network from collapsing due to overload.

Page 51: Computer Network - Network Layer

THREE ADDRESS FORMAT

(EXTENDED ADDRESS)

Page 52: Computer Network - Network Layer

FRAME RELAY

ASSEMBLER/DISASSEMBLER(FRAD)

To handle frames arriving from other protocol, frame relay uses a device called

a Frame Relay assembler/dissasembler(FRAD).

A FRAD assembles and disassembles frame coming from other protocol to

allow to be carried by Frame Relay frames.

A FRAD can be implemented as a separate device or as part of a switch.

Page 53: Computer Network - Network Layer

VOICE OVER FRAME RELAY(VOFR)

VOFR is offered by the Frame Relay Network that sends voice through the

network.

Voice is digitized using PCM and then compressed. The result is sent as data

frames over the network.

VOFR allows the inexpensive sending of voice over long distances.

The quality of voice is not as good as voice over a circuit switched network

such as the telephone network

Page 54: Computer Network - Network Layer

PRO’S AND CONS OF FRAME RELAY

PRO’S :

In many scenario's involving long haul, high speed connections, it is cheaper

than dedicated lines.

There is a cheap solution to incorporate redundancy in the network.

Less hardware is needed to for the same amount of connections

CONS :

There may be jams; no guaranteed bandwidth.

In a point-to-point scenario it is not economically feasible.

In short haul, it is not economically feasible.

Page 55: Computer Network - Network Layer

ASYNCHRONOUS TRANSFER

MODE(ATM)

Asynchronous Transfer Mode, a network technology based on

transferring data in cells or packets of a fixed size.

ATM was developed to meet the need of the “Broadband Integrated

service digital network” as defined in the late 1980’s and designed to unify

telecommunication and computer network.

Asynchronous transfer mode(ATM) is the cell relay protocol designed by

the ATM Forum and adopted by the ITU-T.

The cell used with ATM is relatively small compared to units used with

older technologies.

The small, constant cell size allows ATM equipment to transmit video,

audio, and computer data over the same network, and assure that no

single type of data hogs the line.

Page 56: Computer Network - Network Layer

DESIGN GOALS

A technology is needed for the transmission system to optimize the use of high-

data rate transmission media.

The system must interface with existing system and provide wide area

interconnectivity between them without lowering their effectiveness or requiring

their replacement.

The design must be implemented inexpensively so that cost would not be a

barrier to adoption.

The new system must be able to work with and support the existing

telecommunications hierarchies.

The new system must be connection oriented to ensure accurate and

predictable delivery.

Page 57: Computer Network - Network Layer

PROBLEM WITH THE EXISTING

SYSTEM

FRAME NETWORK :

Before ATM, data communication at the data link layer had been based on

frame switching and frame network.

Different protocol uses frames of varying size.

As the network become more complex, the information in the header

become more extensive and this result in larger header.

Due to large header some protocol have enlarge the size of the data unit

to make use header more efficient by sending more data with same size

header.

If there is not much more information to transmit, much of the field goes

unused.

Page 58: Computer Network - Network Layer

MULTIPLEXING USING DIFFERENT FRAME SIZES

If line 1’s frame X arrives at the multiplexer even a moment earlier than line 2’s

frames, the multiplexer puts frame X onto the new path first.

The multiplexer will first process the arrived frame X before considering the frame

of line 2’s.

Therefore frame A must wait for the entire X bit stream to move into place before

it can follow.

The sheer size of X creates an unfair delay for frame A.

MIXED FRAME NETWORK :

Page 59: Computer Network - Network Layer

CELL NETWORK :

Many of the problems associated with frame internetworking are solved by

adopting a concept called cell networking.

A cell is a small data unit of fixed size.

In a cell network , all data which are to be transmitted are loaded into the

identical cells that are transmitted with complete predictability and uniformity.

When a frames of different sizes and formats reaches the cell network from a

tributary network, they are split into the multiple small data unit of equal length and

are loaded into cells.

Page 60: Computer Network - Network Layer

MULTIPLEXING USING CELLS

CELL NETWORK(contd.) :

Here the Frame X has been divided into three cells: X,Y and Z. Only the first

cell from line 1 gets put on the link before the first cell from line 2.

The high speed of the links coupled with the small size of the cells mean that,

despite interleaving, cells from each line arrive at their respective destination in

an continuous stream.

A cell network can handle real transmission such as phone call.

Page 61: Computer Network - Network Layer

ATM MULTIPLEXING

ATM use asynchronous time division multiplexing- that is why it is called

Asynchronous Transfer Mode- to multiplex cells coming from different channels.

It uses a fixed size slot(size of a cell).

ATM multiplexer fill a slot with a cell from any input channel that has a cell, the slot

is empty if none of the channels has cell to send.

At the first tick of the clock, channel 2 has no cell, so the multiplexer fills the slot

with a cell from the third channel.

When all the cells from all the channels are multiplexed, the output slots are

empty..

Page 62: Computer Network - Network Layer

ARCHITECTURE OF AN ATM

NETWORK

ATM is a cell switched network.

The user access device is called the end-points, are connected through a

“user-to-network interface(UNI)” to the switches inside the network.

The switches are connected through “network-to-network interface(NNIs)”

Page 63: Computer Network - Network Layer

VIRTUAL CONNECTION

Connection between two endpoints is accomplished through

transmission paths(TPs), virtual paths, and virtual circuits(VCs)

TRANSMISSION PATH(TP) : A transmission path (TP) is the physical

connection wire(wire, cable etc) between an endpoints and a switch.

Think of two switches as two cities. A transmission path is the set of all

highways that directly connect the two cities.

Page 64: Computer Network - Network Layer

VIRTUAL PATHS(VP) : A virtual Paths (VP) provides a connection or a set of

connection between two switches. A highway between two cities is a virtual

path.

VIRTUAL CIRCUITS(VCs) : Cell network are based on virtual circuits(VCs) .

All cells belonging to a single message follow the same virtual circuit and remain

in their original order until they reach their destination. Think of a virtual circuits

as a lane of a highway

Fig. : Example of VPs and VCs

Page 65: Computer Network - Network Layer

VIRTUAL CONNECTION IDENTIFIER

In virtual circuit network, to route data from one end-point to another, the

virtual connection need to be identified.

The designer of the ATM creates a hierarchal with two level : Virtual path

identifier(VPI) and Virtual circuit identifier(VCI)

Page 66: Computer Network - Network Layer

VIRTUAL CONNECTION IDENTIFIER

IN UNIs AND NNIs

In a UNI, the VPI is 8 bits whereas in an NNI, the VPI is 12 bits. The length of

the VCI is the same in both interface(16 bits).

The whole idea behind dividing a virtual circuit identifier into two parts is to allow

hierarchal routing.

Most of the switches in a typical ATM network are routed using VPIs.

The switches at the boundary of the network, those that interact directly with the

endpoints use both VPIs and VCIs

Page 67: Computer Network - Network Layer

ATM CELL

The basic data unit in an ATM network is called a cell.

A cell is only 53 bytes long with 5 bytes allocated to the header and 48 bytes

carrying the payload(user data may be less than 48 bytes).

Page 68: Computer Network - Network Layer

CONNECTION IN ATM

ATM uses two type of connection : PVC and SVC

PVC : A permanent virtual circuit connection is established between two

endpoints by the network provider. The VPI and VCI are defined for the

permanent connection and the values are entered for the table of each switch.

SVC :

In a switched virtual circuit connection, each time an end points wants to make

a connection with another endpoints, a new virtual circuit must be established.

ATM cannot do the job by itself, but needs the network layer addresses and the

services of another protocol such as IP.

Page 69: Computer Network - Network Layer

ROUTING WITH A SWITCH

ATM uses switches to route the cell from a source endpoint to the destination

endpoints.

A switch routes the cell using both the VPIs and the VCIs

The switch checks it switching table which stores six pieces of information per

row: arrival interface number, incoming VPI & VCI, corresponding output ports,

Outgoing VPI & VCI.

Page 70: Computer Network - Network Layer

ATM LAYER

PHYSICAL LAYER :

Like ethernet and wireless LANs, ATM cells can be carried by

any physical layer carrier.

Page 71: Computer Network - Network Layer

PHYSICAL LAYER(contd..):

SONET: The design of ATM was based on SONET.

SONET is preferred for two reasons.

First, the high rate of SONET’s carrier reflects the design

and philosophy of ATM.

Second, In SONET the boundaries of cells can be clearly

defined.

ATM LAYER:

The ATM layer provides routing, traffic management,

switching, and multiplexing service.

It process outgoing traffic by accepting 48 byte segments

from AAL sub layer and transforming into 53- byte cells by the

addition of a 5 byte header

Page 72: Computer Network - Network Layer

ATM LAYER(contd..):

Page 73: Computer Network - Network Layer

ATM HEADER

Page 74: Computer Network - Network Layer

ATM HEADER(contd..)

ATM uses two format for this header, one for user-to-network

interface(UNI) cells and another for network to network interface(NNI)

cells

Generic flow control(GFC): The 4 bit GFC field provides floe

control at the UNI level. In the NNI header, these bits are added to

the VPI. The longer VPI allows more virtual path to be defined at the

NNI level.

Virtual path identifier(VPI): The VPI is an 8 bit field in a UNI cells

and a 12 bit field in an NNI cells.

Payload type(PT): In the 3 bit PT field, the first bit defines the

payload as user data or managerial. The interpretation of the last 2

bits depend on the first bit.

Cell loss priority(CLP): The 1 bit CLP field is provided for

congestion control.

Header error correction(HEC): The HEC is a code computed for

the first 4 bytes header

Page 75: Computer Network - Network Layer

APPLICATION ADAPTION LAYER:

The application adaption layer (AAL) was designed to enable two

ATM concept.

ATM must accept any type of payload, both data frames and

streams of bits.

To accept continuous bits streams and break them into chunks to

be encapsulated into a cells at the ATM layer , it uses two sub layer.

The payload must be segmented into 48- bytes segment carried by

the cells. At the destination these segment need to be reassembled

to recreate the original payload. The AAL defines a sub layer called

“segmentation and reassemble(SAR)” sub layer to do so.

Before data are segmented by SAR, they must be prepared to

guarantee the integrity of the data. This is done by the sub layer

called convergence sub layer(CS)

Page 76: Computer Network - Network Layer

APPLICATION ADAPTION LAYER(contd..) :

ATM defines four versions of AAL : AAL1, AAL2, AAL3/4, AAL5

AAL1:

AAL1 supports application that transfer information at constant bit rates such as video and voice. It allows ATM to connect existing digital telephone networks such as voice channels and T- channels.

Page 77: Computer Network - Network Layer

AAL1(contd..):

The CS sub layer divides the bit stream into 47 bytes segment and passes them to SAR sub layer. The SAR sub layer adds 1 byte of header and passes the 48 byte segment to the ATM layer. The Header has two field:

Sequence number(SN) : This 4 bit field defines a sequence number to order the bits. Sequence number protection(SNP): The second 4 bit field protects the first field. The first 3 bit automatically corrects the SN field. The last bit is a parity bit that detects error over all 8 bits.

AAL2:

Originally AAL2 was intended to support a variable data rate bit stream but it has been redesigned. It is now used for low-bit-rate traffic and short – frame traffic such as audio(compressed or uncompressed ) , video, fax. A good example of AAL2 uses is in mobile telephony.

Page 78: Computer Network - Network Layer

AAL2(contd):

The CS layer overhead consists of five layer

Channel identifier(CID) : The 8 bit field defines the channel of the short packet.

Length indicator(LI): The 6 bit LI field indicates how much of the final packet is data.

Page 79: Computer Network - Network Layer

AAL2(contd..):

User-to-user indicator(UUI): The UUI field can be used by end to end users.

Header error control(HEC): The last 5 bits is used to correct errors in the

header

AAL3/4:

Page 80: Computer Network - Network Layer

AAL3/4I(contd..):

Common part identifier(CPI): The CPI defines how the subsequent field are to be interpreted. Begin Tag(Btag): The value of this field is repeated in each cell to identify all the cells belonging to the same packet. Buffer allocation size(BA size): The 2 byte BA field tells the receiver what size buffer is needed for the coming data. Alignment(AL): The 1 byte AL field is included to make the rest of the trailer 4 byte long. Ending tag(Etag): The 1 byte ET field serves as an ending flag. Its value is the same as that of the beginning tag.Length (L): The 2 byte L field indicates the length of the data unit.

The CS layer header and trailer consist of six field:

The SAR header and trailer consist of five fields:

Segment Type (ST): The 2 bit ST identifier specifies the position of the segment in the message: beginning(0), middle(01), or end(10). Sequence Number(SN): This field is the same as defined previously. Multiplexing Identifier(MID): The 10 Bit MID field identifies cells coming from different data flows and multiplexed on the same virtual connection.,CRC: The last 10 bit of the trailer is a CRC for the entire data unit.

Page 81: Computer Network - Network Layer

AAL5:

The four trailer fields in the CS layer are: User – to user(UU): This field is used by end users.Common part identifier(CPI): This defines how the subsequent fields are to be interpreted.Length(L): The 2 byte L fields indicates the length of the original data.CRC: The last 4 byte is for error control on the entire data unit

Page 82: Computer Network - Network Layer

ATM LANS

The ATM technology can be adapted to local area network called ATM

LANs.

The high data rate of technology (155 to 622 Mbps) has attracted the

attention of designer who are looking for greater and greater speed of

LAN.

ATM technology supports different type of connection between two

end user. Its support permanent and temporary connection.

ATM technology supports multimedia communication with a wide

variety of bandwidth for different application.

An ATM LAN can be easily expanded in an organization

Page 83: Computer Network - Network Layer

ATM LANs ARCHITECTURE

Page 84: Computer Network - Network Layer

PURE ATM ARCHITECTURE

In a pure ATM LAN, an ATM switch is used to connect stations in the LAN. Stations can exchange data at one of two standard rates of ATM technology(155 and 652 Mbps) Station uses a virtual path identifier (VPI) and a virtual circuit identifier (VCI) instead of a source and a destination address.

Page 85: Computer Network - Network Layer

LEGACY ATM ARCHITECTURE

In a legacy ATM LAN, stations on the same LAN can exchange data at the rate and format of traditional LANs. The advantage here is that output from several LAN can be multiplexed together to create a high data rate input to the ATM switch.

Page 86: Computer Network - Network Layer

MIXED ARCHITECTURE

In a mixed architecture LAN, it allows the gradual migration of legacy LANs onto ATM LANs by adding more and more directly connected stations to the switch. The station is one specific LAN can exchange data using the format and data rate of that particular LAN. The stations directly connected to the ATM switch can use an ATM frame to exchange data

Page 87: Computer Network - Network Layer

LAN Emulation(LANE)

Connectionless versus connection-oriented : Traditional LANs are connectionless protocols . A station sends data packets to another station whenever the packets are ready. There is no connection establishment or connection termination phase. ATM is a connection oriented protocol . A station that wishes to send cells to another station must first establish a connection and after all the cells are sent , connection is terminated.

Physical addresses versus virtual-circuit identifiers: A connectionless protocol defines the route of a packet through source and destination addresses. A connection-oriented protocol defines the route of a cell through virtual connection identifiers(VPIs and VCIs).

Multicasting and broadcasting delivery : Traditional LANs can cast both multicast and broadcast packets. A station can send packets to a group of stations or to all stations. In ATM network , there is no easy way to multicasts or broadcast , although point-to-multipoint connections are available.

Interoperability : In a mixed architecture, a station connected to a legacy LAN must be able to communicate with a station directly connected to an ATM switch.

Page 88: Computer Network - Network Layer

Client/Server Model

LEC

BUS

LES

LECS

ATM LAN

Page 89: Computer Network - Network Layer

LAN Emulation Client

All ATM stations have LAN emulation client(LEC) software installed on the

three ATM protocols.

The upper-layer protocols are unaware of the existence of the ATM technology.

These protocols send their request to LEC for a LAN service such as

connectionless delivery using MAC unicast , multicast, or broadcast addresses.

The LEC just interprets the request and passes the result on to the servers.

LAN Emulation Configuration Server

The LAN emulation configuration server(LECS) is used for the initial connection

between the client and LANE. This server is always waiting to receive the initial

contact.

It has a well-know ATM address that is known to every client in the system.

Page 90: Computer Network - Network Layer

Broadcast/Unknown Server

Multicasting and broadcasting require the use of another server called the

Broadcast/Unknown server(BUS).

If a station needs to send a frame to a group of stations or to every station, the

frame first goes to the BUS. The server has permanent virtual connection to every

station.

The server creates copies of the received frame and sends a copy to a group of

stations or to all stations, simulating a multicasting or broadcasting process.

The server can also deliver a unicast frame by sending frame to every station. In

this case , the address is unknown and it is sometimes more efficient than getting

the connection identifier from the LES.

Page 91: Computer Network - Network Layer