Professional Documents
Culture Documents
CN 12
CN 12
12- A)
14.43 Architecture
TM is a cell-switched nefwork. The user access devices, called the endpoints,
connected throug a user-to-network interface (UND to the switches inside
network. 1 he switches are connected through network-to-network interfaces
(NNIS). Figure 14.45 shows an example of an ATM network.
UNI NNE
NNI UNI
witch
EDOpotnt
Endpoints
Switch
upots
Virtual Connection
Connection between two endpoints is accomplished through transmision paths, virtual
paths, and virtual circuits. A transmission path (TP) is the physical connection (wire,
cable, satellite, and so on) between an endpoint and a switch or between two switches.
nink of two switches as two cities. A ransmissiOn path is the set of all highways that
directly connect the two Cities
A transmission
path is divided
into several virtual paths. A virtual path (VP)
pro-
VIdes
connection
a
of or a set
connections
between two switehes. Think of a virtual
path
asa
highway that connects two cities. Each highway is a virtual path; the set of all high-
ways is the transmission
path.
ell nerworks are based on virtual circuits (VCS). All cells belonging to a sin-
C message follow the same virtual circuit and remain in their original order until
ney reach their destination. Think of a virtual circuit as thhe Tanes ot a highway (Vir-
tual
path). Figure 14.44 shows the relationship between a transmission path (a
physi-
nection), virtual paths (a combination of virtual circuits that are bundled
c r because parts of their paths are the same), and virtual circuits that logically
onnect twO points.
ldentifiers
hrtual circuit network, to route data from one endpoint to another, the virtual con-
ions
to be identified. For created a hierar-
this purpose, the designers ot AlM
idedentifier with two levels: a virtual-path identitier (VP) and a virtual-circuit
( V C H . The VP1 defines the specific VP, and the VCt defines a particular VC
436 PART H1 DATA-LUNK LAYER
VPEV
P VC
VC
inside the
VP. The VPI is the same for all Virtual
connections that
cally) into one VP are bundled (
The lengths of the VPls for
UNIs and NNIs are
dog
8 bits, whereas in an
NNI, the VPlis 12 bits. ditterent.
In a UNI, the VPI
interfaces (16 bits). We therefore he iength of the vclis
the
24 bits in a
can say
UNI and by 28 bits in an NNI that a virtual connection is same in het
(see identified
Figure 14.45). byb
igure 1445 irtual connection
identifiers in UNIs and NNs
bits 6 bit
12hits 6 bits
24 bits
VPl and VCl 28 bits
in a UNI
VPl and VCt in
an NN
The whole idea
behind
hierarchical routing. Most ofdividing a virtual
circuit identifier into
VPIs. The switches at the switches in a
typical ATM network two parts is to al
the boundaries
the
endpoint devices, use both VPls and of the
network, those that are routed sii
Cells
VCIs. interact directly wie
The basic data unit in an ATM
S
bytes network is called a cell.
than 48 allocated
to the header A cell is
bytes). Most of the header is bytes carrying the payloadonly 53 bytes long
and 48
tual (user
occupied by the VPI and VCI thatdata may
connectaon
a switch through
to another which a cell should travel from an define tp
switch. Figure 14.46 shows
the cell endpoint to a switch of t
structure.
Figure 14.46 An ATM cell
Header
ay load
VIVCID
Sbyies 8 Dy
$3 bytes
CHAPTER 14 OTHER WIRED NETWORKS 427
Swilcaung
ATM uses switches to route the cell irom a source endpoint to the destination endpoint.
A switch routes the cell using both the VPls and the VCls. The routing requires the
whole identifier. Figure 14.47 shows how a PVC switch routes the cell. A cell with a
VPI of 155 and vtot o armves at switch interface (port) 1. The switch checks its
switching table, which stores SIx pieces of information per row: arrival interface num-
ber, incoming VP, ncoming VCI, corresponding outgoinginterface number, the new
VPIL and the new VC. The switch finds the entry with interface 1, VPI 153, and
VCI67 and discovers that the combination corresponds to output interface 3. VPI 140,
and VCI 92. It changes the VPI and VCI in the header to 140 and 92, respectively, and
sends the cell out through interface 3
Output
Interface VP Vet Interface VPI
VCI
140
VPI VCT
153 67
VCI
40 92
ATM Layers
ne AIM standard defines three layers. They are, from top to bottom, the application
plation layer, the ATM layer, and the physical layer (see Figure 14.48),. The end-
n t s use all
three layers while the switches use only the two bottom layers
43
PRr 1 nATALINK LAYER
AALI
AAL2 ANLA ANLS
AAL. Ayt
TM layer
hy sical fayer
ATM
ysica Bysieal
LAL LA
The application adaptation layer (AAL) was
designed to
two ATM conce enable
Fist, AtM must accept any ype of payload, both data
data frame can come from an
frames and streams of bits A
upper-layer protocol that creates a clearly defined frame
to be sent to a carrier network such AIM, A good example is
as
c
CHAPTER 14 OTHER WIRED NETWORKS 429
SAK
48 byes
48 bytes 48 byfes
H H
548 bytes S48 bytes A8 bytes
CS trailer
[0U TCPI CRC 0U :Channel identifier
PCommon part identifer
CROE ngith
CRC: ErO detector
ATM Layer
The ATM layer provides routing. traffic management, switching, and multiplexing
services. It processes outgoing traffic by accepting 48-byte segments from the AAL
sublayers and transtorming them into 53-byte cells by the addition ofa 5-byte header.
Physical Layer
Like Ethernet and wireless LANS, ATM cells be carried
can
by any physical-layer
camiet:
Books