Professional Documents
Culture Documents
Chapter 2
OBJECTIVES:
Upon completion of this chapter the student will be able to:
Intentionally Blank
Table of Contents
Topic Page
ATM......................................................................................................81
ATM HISTORY............................................................................................................. 81
ATM BASICS ............................................................................................................... 81
VC (VIRTUAL CHANNEL) PLANNING........................................................................ 91
VPI, VCI ADDRESSING AND PLANNING .................................................................. 92
VC PLANNING............................................................................................................. 94
PVC RECOMMENDED CONFIGURATION ................................................................ 96
ATM NODE ADDRESSING ......................................................................................... 97
BACKGROUND
At the International Standards Organization (ISO) planning
meeting in Sydney 1977, a sub-committee was formed for the
main purpose of examining the problem of integrating different
computer systems. The result was the creation of the Open
Systems Interconnection (OSI) model, which stresses open
systems development in which several manufacturers can
integrate their products as opposed to closed systems where
manufacturers’ products are not compatible with each other.
(The word system can for example refer to computers,
exchanges or data networks.)
OSI MODEL
The OSI model abstractly describes the structure for
communication between computer systems. It consists of seven
hierarchical layers, where each layer provides services for the
next layer above. The advantage of this well structured model is
that a protocol within one layer can be replaced without
affecting the other layers. Another advantage is that the
implementation of the functions within one layer is optional for
each supplier.
ANALOGY
This section describes a simple analogy for making this model
easy to understand. Suppose that manager A wants to send a
classified message to manager B who is working in a different
company. See Figure 2-1.
COMMUNICATION PROCESS
Each layer has its own specific functions and provides specific
services to the layers above. The functions within each layer as
well as the interfaces between the layers are defined. The
implementation of a function is however optional. For example,
the cipher code in the analogy can be exchanged without
affecting the other layers.
DESCRIPTION OF LAYERS
Application Layer
The application layer provides services for support of the user’s
application. It is responsible for selecting lower layer services
and synchronizes the actions of the destination application with
its own. Examples of application layer functions are file
transfer, message handling and operation and maintenance.
Presentation Layer
The presentation layer defines how data is represented, that is,
the syntax. The presentation layer transforms the syntax used in
the application into the common syntax needed for
communication between applications. The presentation layer
contains data compression, for example.
Session Layer
The session layer establishes connections between presentation
layers in different systems. It also controls connection,
synchronization and disconnection of the dialogue. For instance,
it allows the presentation layer to determine checkpoints from
which re-transmission starts if the data transmission has been
interrupted.
Transport Layer
The transport layer acts as the transport interface for upper
layers. It guarantees that the bearer services have the quality
required by the application in question. Examples of functions
are error correction and detection (end–to–end), and flow
control. The transport layer optimizes the data communication
by multiplexing or splitting up data streams before they reach
the network.
Network Layer
The network layer isolates the upper layers from routing and
switching functions in the network. The functions within the
network layer establish, maintain and release connections
between the nodes in the network, and handle addressing and
routing of messages.
Physical Layer
The physical layer provides mechanical, electrical, functional
and procedural resources for transmission of bits between
different nodes. The layer contains functions for converting data
into signals compatible with the transmission medium.
Application A
Presentation Perfect
Session System
Transport To
Network Nicely
Physical Packets
TRANSMISSION MEDIA
Different media can be used for the physical layer in the Core
Network. The main options are:
• Optical fiber
• Metal cable
• Radio link
Most backbones will use optical fiber since it has the largest
capacity, but all choices have their own advantages and
disadvantages. It is also possible to have a mix of different
media, using the most suitable choice in separate parts of the
network.
OPTICAL FIBER
Optical fiber offers high capacity, low attenuation and is
insensitive to electromagnetic disturbances. The two
wavelengths mainly used in optical fiber systems are 1310 nm
and 1550 nm as the fiber attenuation is minimal at these two
wavelengths.
Optical fibers are usually divided into multi and single mode
fibers.
• Expensive
• Long implementation time
• Can be destroyed by mistake when digging
Aerial optical fiber:
WDM
Wavelength Division Multiplexing (WDM) can be used for
optical communication. Different data streams are multiplexed
on the same fiber using different colors of light (wavelengths).
WDM works just like Frequency Division Multiplexing but the
frequencies in the case of WDM is much higher. Using WDM
means that the fibers get much higher capacity
METAL CABLE
Relatively short repeater distances characterize metal cable
systems. Two common cable types are twisted pair cable and
coaxial cable. The factor limiting the repeater distance in twisted
pair cable systems is interference between PCM signals,
whereas in coaxial systems it is the attenuation of the signal.
• G.703
• Very cheap
• Reliable and simple technique
• Long implementation time
• Medium capacity
RADIO LINK
Radio link is the name for a microwave radio connection
between two points. Radio links are typically available for 2, 4,
8, 16, 34, 140 and 155 (SDH) Mbit/s capacities. Radio links is
mostly used in the access part of the network but the radio links
on STM1 level might be suitable for the Core Network also.
270 x 9 (bytes per frame) x 8 (bits per byte) x 8000 (frames per
second) = 155.520 Mbit/s
Performance monitoring
Local orderwire
Framing
Performance monitoring
Line maintenance
Signal label
Path status
Path trace
SDH EQUIPMENT
An SDH network is built up of a number of network elements
interconnected by optical fiber cable. These network elements
include:
• , and the signal level in the fiber drops too low. The
regenerator clocks itself off the received signal and replaces
RNC
MSC DXC
DXC
RNC
Network Configurations
CHAIN
BUS CONFIGURATION
CONFIGURATION
POINT TO POINT CONFIGURATION
STAR CONFIGURATION
Applications of SDH
Think of SDH as being at layer 1 of the OSI model, that is, it is
the basic building block for the core networks.
SDH PROTECTION
Protection is one of the key requirements in transporting
customer traffic, On the SDH level; Ericsson has the following
protection mechanisms available:
• 1+1 SNC-P
• OS restoration.
To look at some of these in more detail:
Protection
Working
Here the signal is duplicated and sent over two line interfaces.
The node at the receiving end will decipher both signals and
choose the best. The disadvantage of this is double amount of
fibers and line interface is needed. The advantages of MSP
protection is that it is easy to handle from an administrative
point of view, and it is efficient for traffic. It can also be
regarded as equipment protection.
Working
NE NE
Standby
MS-Section
MS-Section
MS-Section
ATM
ATM HISTORY
ATM can be traced back to the early 1980s when operators were
investigating the use of Broadband ISDN for the transport of
voice and data.
ITU-T
The CCITT, as it was known then, received a proposal from
British Telecom, France Telecom, Deutsche Telecom and
AT&T for a new transport mechanism, which was studied over
the next four years.
ATM FORUM
It became clear to a number of companies that ATM could
equally well be applied to the LAN environment. The ITU-T
was seen as an unsuitable vehicle for the development of ATM
technology. Thus, in 1991 the ATM Forum was formed. Nortel,
Sprint, Adaptive/NET and Cisco were involved in the formation
of the ATM Forum. Today over 1,000 interested companies and
organizations are involved in the implementation of ATM.
ATM BASICS
ATM can be considered a connection-oriented way of
transporting different service classes of information, in fixed
length packages.
Segmentation:
Addressing:
Multiplexing:
TRAFFIC DESCRIPTORS
For the transmission of voice and data in the network a set of
characteristics must be defined to specify the requirements on
the network for that type of traffic. This combination of
characteristics is referred to as a traffic descriptor.
CBR
VBR-RT
The ATM Forum has defined Variable Bit Rate Real Time
(VBR-RT) to support variable bit rate connection oriented
traffic where end-to-end synchronization is required. ITU-T
specifies this type of traffic as Class B performance. This
service is intended for compressed video and voice.
VBR-NRT
ABR
UBR
UBR+
GFR
ATM has its own protocol stack in order to take care of different
types of services. It consists of the following three layers:
AAL5 can also be used to transport variable bit rate traffic. The
utilization of AAL5 is limited however due to the absence of
delay parameters.
ATM cell payload. Figure 2-17, shows the format of the AAL2
header.
5 5 6 8 8
User Information
8 bytes
32 16 8 8
CRC L CPI UU
Virtual Paths
Virtual Channels
The VCI value is represented by16 bits in both UNI and NNI
signaling giving 65,536 possible simultaneous channels per
path. Figure 2-20, illustrates the VPI and VCI values in the cell
header.
Cross connecting
Switching
PVC Topology
In order to exchange signaling or data between two ATM nodes
an ATM Permanent Virtual Channel (PVC) between these
nodes has to be set up. These PVCs are defined according to
required signaling and data channels and the logical network
topology of the ATM network.
ATM end-to-end
PVC PVC
VP Topology
For each PVC, channels are put together and a certain VPI value
is assigned to them. At this stage a separation as to the
functionality of single channels or logical interfaces can be
expressed in different VPI values.
VC Topology
This process consists of the assignment of VCIs to every
signaling or data channel
VCI 39 VCI 39
VPI 57 VPI 68
VCI 40 VCI44
Physical Interfaces
I=1
VP =1 SGSN W
I
VPI=1 VC
VCI=1 VPI=1
VCI=2 VCI=1
SGSN W VCI=3 ATM
VP GGSN
I
VC =1
I=1
SGSN W
As the bandwidth settings for the VCL that makes up the VCC
can be different, care must be taken when setting up the entire
path. This is important as improper bandwidth settings at any of
the nodes along the whole VCC might cause a bottleneck and
thus ATM will be lost.
VC PLANNING
In WCDMA Systems R2 (Ericsson CN2.0), only PVC
functionality is available for the ATM interfaces. Soft
Permanent Virtual Connection (SPVC) functionality in the
backbone network can be implemented using certain Ericsson
ATM products. SVC functionality requires NNI/UNI signaling
to be supported throughout the ATM network. As this signaling
is not supported in the GSN, MGW, AXE and RNC nodes, SVC
cannot be deployed. This implies that the routes using the ATM
interfaces will be manually configured PVCs. In the GSN nodes,
each G(x) (Gn/Gp, Gi, Gom) interface will require separate
interface boards and thus different VP. Within each G(x)
interface board, different VCs can exist for different destination
connection points.
If in the case of a ATM link failure (that is, one of the solid lines
in the figure is down), the entire PVC will be out of service and
traffic disruption will occur if a hot second, physically different
PVC does not exist.
1 8 bytes 4 6 1
AFI – One byte of authority and format identifier. The AFI field
identifies the type of address.
Transit
AAL2
switch
MGW MGW
Q.AAL2 AAL2 Q.AAL2
AAL2 AAL2
ATM ATM
ATM
AAL2
transport view
Transit AAL2
switch
Hierarchical AAL2 transport network
• STM based
• STM/ATM
• All IP network
ATM BACKBONE
UTRAN
Media ISDN/PSTN
BS User Data Plane
Media AAL2 Gateway
RNC
GatewaySGSN GGSN
BS
Internet
Intranets
IP/AAL5
ATM
SDH
IP BACKBONE
BSS
UTRAN
ISDN/PSTN
BS Media
RNC
Media SGSN
Gateway Gateway
BS
Internet
User Data Plane GGSN Intranets
IP/PPP
SDH
User data flows, packet mode
User data flows, circuit mode
Router
• Security
Call Cases
In Figure 2-29 and Figure 2-30, the call cases for an originating
WCDMA Systems call are illustrated:
• ATM Transport
• IP Transport
MSC TSC
Server Server
Q.BICC
SGW
RANAP N-ISUP
External
WCDMA RAN
(ATM based) GCP GCP Networks
(TDM based)
Q.AAL2
Q.AAL2 Q.AAL2
ATM VCC CIC
AAL2
ATM VCC ATM VCC
Switch TRA
AAL2
MGW
Switch ATM Transport
Signalling
User Plane
Connectivity Layer
MSC TSC
Server Server
Q.BICC
SGW SGW
RANAP N-ISUP
External
WCDMA RAN Iu
(ATM based) GCP GCP GCP Networks
(TDM based)
Q.AAL2
CR-LDP CR-LDP
ATM VCC CIC
LSP LSR LSP
H.245 TRA
MGW & MGW &
LER IP Transport LER
Signalling
User Plane
Connectivity Layer
MPLS PRINCIPLES
• When the packet arrives at the next node, the label attached
to it is read and used as a reference into a label database. A
new label is obtained from this database. This new label
• The new label is switched with the old label (hence the name
Multiprotocol Label Switching) and the packet is forwarded
with the new label attached.
MPLS IMPLEMENTATION
There are a number of possible types of MPLS implementation:
LS R LS R
LDP
LD P IP R outer
M odu le
IP R outer
M odu le LD P
ingress egress
3 6 6 8
MPLS ADVANTAGES
Simplified Forwarding
Label swapping allows packet forwarding to be considerably
simplified. This means that it is easier to build a high-speed
router using MPLS technology.
Service Differentiation
Since a packet is assigned to an FEC when it enters the network,
the ingress router may use any information it has about the
packet to determine the assignment, even if that information
cannot be gleaned from the network layer header. For example,
packets arriving on different physical router ports may be
assigned to different FECs. In contrast, conventional forwarding
Multiple Services
MPLS control components can coexist with traditional ATM
control components, thus supporting all existing ATM
applications.
MPLS SCALABILITY
Previously available methods for interconnecting routers in an
IP over ATM environment make use of one of the following:
• Traffic Engineering
• Protection Switching
• Basic Security
SIGNALING
CR-LDP (Label Distribution Protocol) or RSVP (Resource
ReSerVation Protocol) may be used to set up and release MPLS
LSPs with the appropriate characteristics according to the type
of traffic they carry.
Conversational
class
MGW MGW/
LSR GGSN
MP
LER s ig LS LER
LS sig LSR PSTN/ISDN
LSR MP