Anda di halaman 1dari 106

General Telecom

Introduction to ATM

Handout

770 00905 0341 VHBE Ed. 02

Status Change Note

Released

Short Title ATM All rights reserved. Passing on and copying of this document, use and communication of its contents not permitted without written authorization from Alcatel.

2 / 106

770 00905 0341 VHBE Ed. 02

Contents

Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Why a B-ISDN ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 The N-ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 The N-ISDN is Narrow . . . . . . . . . . . . . . 1.1.2 The N-ISDN is Half-Integrated . . . . . . . 1.1.3 The N-ISDN is 64 Kbit/sec - Based . . . Market Pull & Technology Push . . . . . . . . . . . . . . . . . . Requirements for the B-ISDN . . . . . . . . . . . . . . . . . . . Evolution of Transfer Modes . . . . . . . . . . . . . . . . . . . . 2.1.1 Evolution from Circuit Switching . . . . . . . 2.1.2 Evolution from Packet Switching . . . . . . . . The Asynchronous Aspect . . . . . . . . . . . . . . . . . . . . . . No Link-by-link Error Control . . . . . . . . . . . . . . . . . Connection Oriented . . . . . . . . . . . . . . . . . . . . . . . . . . Small, Fixed Header and Information Field Sizes . . . Transparent Delivery of Information . . . . . . . . . . . . . . The Header Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . GFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VPI / VCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PTI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.1 Header Error Protection . . . . . . . . . . . . . . . 4.6.2 Cell delineation . . . . . . . . . . . . . . . . . . . . . The Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.1 The Physical Layer . . . . . . . . . . . . . . . . . . . 5.2.2 The ATM Layer . . . . . . . . . . . . . . . . . . . . . . 5.2.3 The AAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . The User Plane and the Control Plane . . . . . . . . . . . . 9 11 12 12 12 14 16 18 21 22 23 26 29 30 33 34 35 37 39 40 41 42 46 47 48 48 50 53 54 54 55 56 57 59 61

1.2 1.3 2 2.1

Exploration of Possible Transfer Modes . . . . . . . . . . . . . . .

Basic Characteristics of ATM . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 3.2 3.3 3.4 3.5

The ATM Cell Header . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 4.2 4.3 4.4 4.5 4.6

The B-ISDN Protocol Reference Model . . . . . . . . . . . . . . . 5.1 5.2

5.3 6

Call Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

770 00905 0341 VHBE Ed. 02

3 / 106

Contents

6.1 6.2 7 7.1

Multi-Connection Calls . . . . . . . . . . . . . . . . . . . . . . . . Point-to-Multipoint Calls . . . . . . . . . . . . . . . . . . . . . . ATM Traffic Control Functions . . . . . . . . . . . . . . . . . . . 7.1.1 CAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.1.2 UPC / NPC . . . . . . . . . . . . . . . . . . . . . . . . . 7.1.3 ABR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protocol Stacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.1 DSS2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.2 B-ISUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDH versus SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ATM Mapping in PDH . . . . . . . . . . . . . . . . . . . . . . . . . 9.2.1 Mapping into Lower Order Frames . . . . . 9.2.2 Mapping into E3 Frames . . . . . . . . . . . . . . ATM Mapping in SDH . . . . . . . . . . . . . . . . . . . . . . . . . IMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

62 63 65 66 66 69 72 75 76 78 78 79 81 82 88 88 89 91 93 97 101 103 105

ATM Traffic Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

B-ISDN Signalling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.1 8.2

ATM Mapping in SDH and PDH . . . . . . . . . . . . . . . . . . . . . . 9.1 9.2 9.3 9.4

Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix A References . . . . . . . . . . . . . . . . . . . . . . . . . Request for Your Comments . . . . . . . . . . . . . . . . . . . . . . . . .

4 / 106

770 00905 0341 VHBE Ed. 02

Contents

Figures
Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 Figure 30 Figure 31 Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Integrated Access of the N-ISDN . . . . . . . . . . . . . . . . . . . . . . Non-Integrated Core Network of the N-ISDN . . . . . . . . . . The B-ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Technology Push and Market Pull. . . . . . . . . . . . . . . . . . . . . . . A B-ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Spectrum of Transfer Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . Circuit Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Packet Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Packets and Frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Processing Functionalities on different layers. . . . . . . . . . . . . ATM Cell Stream . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Different Transport Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . STM versus ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Packets transmitted without Link-by-Link Error Control . . . Packets transmitted with Link-by-Link Error Control . . . . . . CO & CL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . An ATM Cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The UNI and NNI Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . The ATM Cell Header . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VPI & VCIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A VP Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A VP / VC Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Local Significance of VPI / VCI . . . . . . . . . . . . . . . . . . . . . . . . . The PTI bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The CLP bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The HEC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Cell Delineation Algorithm . . . . . . . . . . . . . . . . . . . . . . . . The B-ISDN Protocol Reference Model . . . . . . . . . . . . . . . . . Different Physical Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Different AALs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The AAL-5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Control Plane and User Plane for a Switch . . . . . . . . . . . . . . . A Unidirectional Point-to-Multipoint Connection . . . . . . . . CAC functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Traffic Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UPC and NPC Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ideal UPC / NPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conforming and non-conforming Cells . . . . . . . . . . . . . . . . The GCRA (T, t ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Feedback Loop of RM cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . Feedback Loop of RM cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . Signalling Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protocol Stack for DSS2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protocol Stack for B-ISUP using an ATM network . . . . . . . . . , 12 13 14 17 19 22 24 26 27 28 30 31 32 33 33 34 36 40 40 42 43 44 45 46 47 49 51 54 56 57 58 59 63 66 67 69 70 70 71 72 74 76 78 79

770 00905 0341 VHBE Ed. 02

5 / 106

Contents

Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50 Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58

Protocol Stack for B-ISUP reusing NB links . . . . . . . . . . . . . . , PDH and SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PCM Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Back to Back Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add/Drop Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ring Shaped SDH Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDH versus SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mapping of ATM Cells into E1 . . . . . . . . . . . . . . . . . . . . . . . . . E3 frame for ATM Cells. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mapping of ATM Cells into E3 . . . . . . . . . . . . . . . . . . . . . . . . . STM-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mapping of ATM Cells into a VC-4 . . . . . . . . . . . . . . . . . . . . Inverse muxing, cell by cel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . IMA Frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

80 82 83 84 85 85 87 88 89 90 91 92 94 95

6 / 106

770 00905 0341 VHBE Ed. 02

Contents

Tables
Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10 Table 11 Advantages of CO & CL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advantages Fixed or Variable Cells . . . . . . . . . . . . . . . . . . . . . Advantages of Small and Large ATM Cells . . . . . . . . . . . . . . . Proposals for ATM Payload and Header Lengths . . . . . . . . . . ATM Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ABR Binary Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Signalling Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDH Multiplexing Hierarchies . . . . . . . . . . . . . . . . . . . . . . . . . . SDH Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The SDH Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDH versus SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 35 35 36 55 73 76 83 86 86 87

770 00905 0341 VHBE Ed. 02

7 / 106

Contents

8 / 106

770 00905 0341 VHBE Ed. 02

Preface

Preface
This document is to be used during an ATM overview training.

770 00905 0341 VHBE Ed. 02

9 / 106

Preface

10 / 106

770 00905 0341 VHBE Ed. 02

1 Why a B-ISDN ?

1 Why a B-ISDN ?
This chapter describes why and how the concept of a new network, called a Broadband Integrated Services Digital Network (B-ISDN), came into existence. Essentially, there are 3 critiques one can give regarding the current Narrowband ISDN network. These will be examined and will lead to a set of requirements for the B-ISDN. Finally, this chapter describes the terms of technology push" and market pull".

770 00905 0341 VHBE Ed. 02

11 / 106

1 Why a B-ISDN ?

1.1
1.1.1

The N-ISDN
The N-ISDN is Narrow
In the N-ISDN, the order of magnitude of bitrates is about a few Kbit/sec. In the B-ISDN, the order of magnitude of bitrates is about a few Mbit/sec.

1.1.2

The N-ISDN is Half-Integrated


The N-ISDN does not handle the needs of all telecommunication users (wish to communicate voice, data, video, ...) in an uniform way.

User Perspective

On one hand, the user perceives the network as providing services in a uniform (i.e. an integrated) manner.

Integrated Services Access

Figure 1

Integrated Access of the N-ISDN

Network Perspective

On the other hand, once inside the network, things are different. Dedicated networks handle different kinds of data..Examples of such dedicated networks are :
"

A Packet Switching Network : to support interactive data traffic in a cost-effective way. This network processes data messages in a packetised form. A Frame Relay Network : high speed data network, which interconnects local area data networks. Neither the telephone- nor the packet switching network can offer the same speed of processing. A Video Conference Network : offers video conferencing facilities on a national or international level. A Cable Television Network : supports television and radio distribution functions.

"

"

"

12 / 106

770 00905 0341 VHBE Ed. 02

1 Why a B-ISDN ?

PSTN

Data

Internet

Figure 2

Non-Integrated Core Network of the N-ISDN

Half-Integration

This evolution leads to a multitude of networks, each capable to support a limited number of functions. This approach has the following disadvantages :
"

Expensive for the operator :


D D D D

separate installation planning OAM evolution.

"

Interworking problems :
D D

Gateways Conversion of Protocols

"

Inefficient Solution :
D

Separate networks must each be dimensioned for the worst case.

Multi-Service Network

To avoid these disadvantages, the idea emerged to create a single, high capacity network, which is able to flexibly support all types of services (voice, data, video). Services required by the present and by the future users; consequently, this new network also has to be future safe.

770 00905 0341 VHBE Ed. 02

13 / 106

1 Why a B-ISDN ?

At the same time it also simplifies the user access. As a result, this universal network leads to substantial cost savings and to a better infrastructure for all users. The name given to this network is Integrated Broadband Communication Network (IBCN) or B-ISDN.

B-ISDN

Figure 3

The B-ISDN

1.1.3

The N-ISDN is 64 Kbit/sec - Based


Telephony
The design of the networks, in the early days of telecommunications, was intended to provide only 1 service :the Plain Old Telephone Service (PSTN). This voice service still remains a very important service in the future. To transmit and switch this voice service, the ideal bitrate to do this was perceived to be 64 Kbit/sec, which directly comes from the physical properties of the human voice. This can be demonstrated very easily :
" " " "

Voice Frequencies are 300 to 3400 Hz. Double sampling (Nyquest) : 8000 Hz. Each sample is 1 byte long = 8 bits. 8 bits * 8000 /sec = 64 Kbit/sec

For this reason, as well transmission technology and equipment and switching equipment are generally designed to transfer 64Kbit/sec.. However, nowadays, new services come up. For example :
"

Modern communication is not limited anymore to communication between human beings. Computers have to communicate with each other too. They send data information over networks.

14 / 106

770 00905 0341 VHBE Ed. 02

1 Why a B-ISDN ?

"

Video-telephony is a voice and video service. Users experience it as a telephone service, but with the additional possibility to be able to see the other communicating party. The video conference service offers the opportunity to people to take part on meetings without having to travel to meet each other. This service can offer serious cost savings for the participants. The Video On Demand (VOD) service offers an easy and comfortable way to watch video movies. It is an alternative to video rental shops. Television broadcast quality can be improved through the usage of digital technology. At the same time a new type of television is being developed, High Definition Television (HDTV) Multimedia services comprise any combination of voice, data and video services.

"

"

"

"

These new services do not at all require a rate of 64 Kbit/sec. Therefore, we can distinguish 2 basic problems.

Granularity Problem Variable Bitrate Problem

Not all intermediate values of bitrates can be reached. What must you allocate for a variable bandwidth source ?
" "

The highest bitrate ? Then you over-allocate. The average bitrate ? Then you risk quality reduction.

770 00905 0341 VHBE Ed. 02

15 / 106

1 Why a B-ISDN ?

1.2

Market Pull & Technology Push


To come to a new B-ISDN network, two question arise.
" "

Can we do it ? Do users want it ?

Technology Push

This (r)evolutionary process can be approached from the side of the technology. The development of the technology can offer new, until now unimaginable possibilities to the users. So, technological developments open new horizons, stimulating the definition of new services. This is referred to as the "technology push ". In recent years, large progress was achieved both in the field of electronics and in the field of optical technology. Among the technological achievements the following can be mentioned:
"

Semi-conductor technology: CMOS technology allows to construct high complexity, high speed systems on a very small chip surface. Optical technology: advances in optical transmission offer higher speed and lower costs. Three parameters of the transmission are constantly being enhanced: the bit rate, the distance, and the quality. Video coding algorithms: the advances made in the video coding algorithms allow the more efficient distribution of the bandwidth among different simultaneous applications. Less bandwidth is required per user while ensuring the same quality of picture. ...

"

"

"

Market Pull

Nevertheless, even if new technology makes new things possible, users and in this case must be willing to invest money, in other words, is there a demand from the market. This is referred to as the "market pull ". It means that there is a need for a B-ISDN, because of the changing and more demanding user requirements.

16 / 106

770 00905 0341 VHBE Ed. 02

1 Why a B-ISDN ?

Market Pull Technology Push

B-ISDN

Actual Situation Figure 4 Technology Push and Market Pull. The market pull can only become strong enough because of the rise of a certain Killer Application". Possible candidates for this were (or are ) :
" "

Video on Demand (VOD) Internet

770 00905 0341 VHBE Ed. 02

17 / 106

1 Why a B-ISDN ?

1.3

Requirements for the B-ISDN


The next list summarises the main characteristics of the BISDN network :
" "

Service independent network. Interactive and Distributive services are transported over the network: Both interactive, point-to-point services like telephone calls, as well as distributive services like multicasting are handled. High Bitrate, Broadband network: The network has a large capacity, it offers its services to many users and many applications. Typical bitrates of the network are 155 Mbit/s, 622 Mbit/s, or even more. The network is capable to offer bandwidth usage on demand. It is suitable to carry information for Fixed Bit Rate services (of any bitrate) and for Variable Bit Rate services. Future Safe network: The network has to be able to adapt itself to changes in technology and user requirements. In the future new services can arise, which are unknown today. These services will all have to be treated by that same network. Exchanges Transmission links Access networks

"

"

"

The B-ISDN network will consist of :


" " "

ATM

To realise such a B-ISDN network a new technology is necessary, which describes how the information has to be treated in that network. This technogly is Asynchronous Transfer Mode (ATM) and it requires a new type of switches, called ATM switches. Usually, the interconnections of the exchanges are realised by a digital transmission system, which is called Synchronous Digital Hierarchy (SDH)

SDH

18 / 106

770 00905 0341 VHBE Ed. 02

1 Why a B-ISDN ?

LAN

SDH Links

Access Network ATM Switch ATM Switch

Figure 5

A B-ISDN

This document is about ATM, SDH, PDH and their relationship. These technologies are a means to provide a new, multi-service, high-bandwidth, future-safe network.

770 00905 0341 VHBE Ed. 02

19 / 106

1 Why a B-ISDN ?

20 / 106

770 00905 0341 VHBE Ed. 02

2 Exploration of Possible Transfer Modes

2 Exploration of Possible Transfer Modes


Given the requirements for a B-ISDN, found in the previous chapter, this chapter describes the search for a suitable transfer method to support such a B-ISDN. It will be found that ATM meets all the requirements.

770 00905 0341 VHBE Ed. 02

21 / 106

2 Exploration of Possible Transfer Modes

2.1

Evolution of Transfer Modes


The term "transfer mode" refers to a technique used in a telecommunication network for transmission, multiplexing and switching. ATM is the transfer mode chosen for the B-ISDN. Many other transfer modes exist, but none of them entirely fulfils the requirements put forward by the B-ISDN. This chapter describes the evolution which led to the definition of ATM. For this purpose, it is useful to take a look first at the existing transfer modes. The aim is to see whether they can be improved, or changed to fulfil the B-ISDN needs. Roughly, the existing transfer modes can be divided in 2 groups :
" "

Circuit Switching Packet Switching

In what follows, the possible paths starting from these transfer modes are examined. Figure 6 shows a proposal for a spectrum" of the different transfer modes.
Unflexible and Easy Make Flexible Flexible and Complex Simplify

Circuit Switching Multirate

Fast Circuit Switching

Frame Relaying

Packet Switching Frame Switching

ATM

Figure 6

Spectrum of Transfer Modes

22 / 106

770 00905 0341 VHBE Ed. 02

2 Exploration of Possible Transfer Modes

2.1.1

Evolution from Circuit Switching


The transfer mode used in the telephone network is circuit switching, also called Synchronous Transfer Mode (STM). The voice information of multiple sources is combined on 1 line using the technique of Time Division Multiplexing (TDM). The transmission frame, which lasts for 125 sec, is divided into a number of time slots. Each user (telephone call) is assigned to one timeslot for the duration of the communication, so there is a one-to-one relationship between a user and a timeslot. This means that each user occupies a fixed bandwidth (64Kbit/s). The obvious disadvantages are :
" "

Granularity Problem Variable Bitrate Problem

When the multiplexed information stream enters the telephone exchange, a circuit switch switches every timeslot to a certain destination. The incoming information is identified by the incoming physical link and timeslot number, the outgoing information is identified by the outgoing physical link and timeslot number. This is shown on figure 7. The circuit switch takes his routing decisions depending upon a routing table. The entries in this table can be filled in, because of
" "

Signalling Operator Input

770 00905 0341 VHBE Ed. 02

23 / 106

2 Exploration of Possible Transfer Modes

Incoming links
4 3 2 1 4

Outgoing links
3 2 1

I1 I2 In time

O1 O2 Om time

Routing Table

Incoming link

Timeslot

Outgoing link

Timeslot

Connection

I1 I1 I1 I2

1 2 4 4

O1 O2 Om O2

2 1 2 4

Figure 7

Circuit Switching With the transfer mode of circuit switching as starting point, we can try to increase its flexibility.

Multirate Switching

One improvement is create a timeslot structure, existing of timeslots of different sizes. In this way the network is able to support a small set of different bitrates. However, we are still faced with the already mentioned problems :
" "

Granularity Problem Variable Bitrate Problem

Further, creating a timeslot structure of different sizes of timeslots has the additional problem of inefficiency.

24 / 106

770 00905 0341 VHBE Ed. 02

2 Exploration of Possible Transfer Modes

Fast Circuit Switching

A second improvement is the technique of fast circuit switching. In this transfer mode, a user can request as many timeslots, as it instantaneously needs, but this amount does not need to stay fixed for the complete duration of the connection. Therefore, the user will have to use fast signalling to allocate or deallocate timeslots has he needs them. This solutions seems to meet all the requirements for a B-ISDN, but is has one crucial disadvantage :
"

Complexity

770 00905 0341 VHBE Ed. 02

25 / 106

2 Exploration of Possible Transfer Modes

2.1.2

Evolution from Packet Switching


In packet switching, the user information is transmitted inside variable length data packets. These data packets are transmitted whenever there is free capacity available in the network, which can be on any moment of time. Therefore, different information can not be identified anymore with respect to a particular timeslot. To handle this, all packets have to carry a header field, identifying them, and whose main purpose is to provide information for the routing of the packet. The average bitrate of a connection can be modified by sending more packets or packets with a larger contents.

Incoming links B A I1 I2 C In O1 O2 Om E

Outgoing links D

time

time

Routing Table Incoming link Incoming Header A B C Outgoing link Outgoing Header E F D

I1 I1 In

O2 Om O1

Figure 8

Packet Switching When data packets arrive in a switch, error control is performed. To correct an erroneous data packet, retransmission of this information is necessary. Meanwhile the right sequence of the data packets that belong to the same communication also has to be maintained. This means, that a high amount of processing is

26 / 106

770 00905 0341 VHBE Ed. 02

2 Exploration of Possible Transfer Modes

required for every packet, and this in every switch within the network. This complexity results in delays and thus in a low throughput capability of the packet switching network. If we examine this complexity more closely, we see that a lot of processing is done on different layers, i.e.
"

On the layers 2, exchanging frames, the functionalities of flow control and error control are performed.

"

On the layers 3, exchanging packets, the functionality of flow control is performed.

This is shown in figures 9 and 10.


Sequence Numbers

Flag

Address

Info

CRC

Packet

Frame Figure 9 Packets and Frames

770 00905 0341 VHBE Ed. 02

27 / 106

2 Exploration of Possible Transfer Modes

Layer 3

Flow Control

Layer 3

Layer 2

Flow Control / Error Con trol

Layer 2

Layer 1 Figure 10

Layer 1

Processing Functionalities on different layers.

To improve this transfer mode, some functionality can be abandoned.


"

The first improvement is to omit flow control on layer 3 This technique is called frame switching The second improvement is to omit flow control on layer 2 This technique is called frame relaying The final improvement is to omit error control on layer 2 This technique comes close to ATM

"

"

Currently, it is not anymore a problem to omit all this functionality in the network, because the quality of the networks increases

Conclusion

The moral of this story is that ATM combines the best of both circuit switching and packet switching, i.e. it combines
" "

Simplicity of Circuit Switching Flexibility of Packet Switching

28 / 106

770 00905 0341 VHBE Ed. 02

3 Basic Characteristics of ATM

3 Basic Characteristics of ATM


This chapter describes ATM's basis characteristics, i.e. : G G G G G The Asynchronous aspect. No link-by-link error control. ATM is connection-oriented. Cells with small, fixed size fields. Transparent delivery of information.

770 00905 0341 VHBE Ed. 02

29 / 106

3 Basic Characteristics of ATM

3.1

The Asynchronous Aspect


The ATM network provides a stream of cells, which corresponds to a bitrate of, typically, 155 or 622 Mbit/s. Each user is allowed, within this available capacity, to "fill"in these cells. Filling in these cells means releasing information into the network.
Empty Cells

Continuous Cell Stream

cell

time

User (connection) 1 User (connection) 2 User (connection) 3

Figure 11

ATM Cell Stream

Asynchronous

Let us be precise about the exact meaning of the term Asynchronous" in ATM :
"

Is ATM asynchronous on bit level ?


D

No No Yes

"

Is ATM asynchronous on cell level ?


D

"

Is ATM asynchronous on connection level ?


D

30 / 106

770 00905 0341 VHBE Ed. 02

3 Basic Characteristics of ATM

Analogy

Figure 12 depicts an analogy, in which firemen have 2 options to transport water.

Figure 12

Different Transport Strategies

Comparison STM versus ATM

Figure 13 gives a comparison between circuit switching (or Synchronous Transfer Mode (STM)) and ATM.

770 00905 0341 VHBE Ed. 02

31 / 106

3 Basic Characteristics of ATM

Synchronous Transfer Mode

Asynchronous Transfer Mode

Channel 1 Channel 2

.. . Channel n - Reservation of Physical Channels - Fixed number of channels. - Fixed bitrate of channels. - Low granularity of bitrates. - Physical resources are permanently reserved, even if nothing is transmitted. Figure 13 STM versus ATM

- Reservation of Virtual Channels - Variable number of channels. - Variable bitrates of channels. - High granularity of bitrates. - Physical resources are not used, if nothing is transmitted.

Disadvantages of ATM

Despite all these advantages, ATM has the following disadvantages.


" "

Overhead Complexity

32 / 106

770 00905 0341 VHBE Ed. 02

3 Basic Characteristics of ATM

3.2

No Link-by-link Error Control


Consider a connection of 3 hops. Suppose an error occurs in the transmission, after the first hop. Calculate the number of transmitted packets, with and without error control.

Figure 14

Packets transmitted without Link-by-Link Error Control

Figure 15

Packets transmitted with Link-by-Link Error Control

In general, the effect of omitting link-by-link error control is traffic increase. The higher the Bit Error Rate (BER) of the link, the higher this effect will be. Therefore, for ATM to be a suitable transfer mode, the BER of the links must be lower than 10-5. Note that, even if we omit link-by-link error control, this does not mean that no error control can be done anymore. An application can still implement end-to-end error control. The point is that the network will not be responsible for this anymore, in other words, the payload information is completely transparent to the network.

770 00905 0341 VHBE Ed. 02

33 / 106

3 Basic Characteristics of ATM

3.3

Connection Oriented
A general can instruct an army convoy to get to a destination in different ways :
" "

Connection Oriented (CO) Connectionless (CL)

B
Figure 16 CO & CL Of course, both methods offer advantages : Table 1 Advantages of CO & CL Advantages of CL No Setup Time Easy Reaction to Failures Load Distribution

Advantages of CO Sequence Preservation Service Garantuee Faster Routing Reduced Header

34 / 106

770 00905 0341 VHBE Ed. 02

3 Basic Characteristics of ATM

3.4

Small, Fixed Header and Information Field Sizes


In defining the ATM cell length and contents, some choices had to be made. The first choice was between :
"

Variable Cell Size Fixed Cell Size

"

Table 2

Advantages Fixed or Variable Cells Advantages of Variable Cell Length No Half-Empty Cells

Advantages of Fixed Cell Length Easy for Buffers, Memory, Processing Delay

The second choice was between :


"

Small Cells Large Cells

"

Table 3

Advantages of Small and Large ATM Cells Advantages of Large Cell Length Efficiency

Advantages of Small Cell Lenght Small Delay Higher Granularity

These choices led to 2 proposals : a European proposal and an American Proposal.

770 00905 0341 VHBE Ed. 02

35 / 106

3 Basic Characteristics of ATM

Table 4

Proposals for ATM Payload and Header Lengths Payload Length Header Length 6 4 5

USA Proposal European Proposal ITU-T Decision

64 32 48

Thus, all ATM cells consists of 53 bytes, 5 bytes of header and 48 bytes of payload.

Payload

Header

48 Bytes

5 Bytes

Figure 17

An ATM Cell

36 / 106

770 00905 0341 VHBE Ed. 02

3 Basic Characteristics of ATM

3.5

Transparent Delivery of Information


The B-ISDN is multi-service. It does not consider the contents of ATM cells, in other words, the information of ATM cells is not examined inside the network.

770 00905 0341 VHBE Ed. 02

37 / 106

3 Basic Characteristics of ATM

38 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

4 The ATM Cell Header


This chapter describes the format and functionality of the 5 bytes in the ATM cell header. These 5 bytes contain following fields : G G G G G GFC VPI / VCI PTI CLP HEC

The meaning and use of all these fields will be discussed.

770 00905 0341 VHBE Ed. 02

39 / 106

4 The ATM Cell Header

4.1

The Header Layout


UNI & NNI
Two different interfaces exist, i.e., the User-to-Network Interface (UNI) and the Network-to-Network Interface (NNI), as is shown in figure 18.
ATM Switch ATM Switch

UNI

NNI

Figure 18

The UNI and NNI Interface

Header Formats

For these 2 interfaces, 2 different cell header formats are defined,

as is shown in figure . The difference between both formats is only in the first 4 bits.
UNI
8 7 6 5 4 3 2 1 1 2 8 7 6 5

NNI
4 3 2 1

GFC VPI VCI

VPI

VPI

VCI PTI HEC CLP

PTI HEC

CLP

4 5

Figure 19

The ATM Cell Header

Thef following parameters are contained in these headers :


" " " " " "

Generic Flow Control (GFC) Virtual Path Identifier (VPI) Virtual Cell Identifier (VCI) Payload Type Identifier (PTI) Cell Loss Priority (CLP) Header Error Control (HEC)

40 / 106

770 00905 0341 VHBE Ed. 02

UNI

4 The ATM Cell Header

4.2

GFC
The GFC mechanism assists in the control of the flow of traffic from ATM connections . More specifically, the GFC mechanism is used to control traffic flow in order to alleviate short-term overload conditions that may occur. GFC is only available at the user-to-network interface. Any end user-to-end user flow control requires additional network facilities.

770 00905 0341 VHBE Ed. 02

41 / 106

4 The ATM Cell Header

4.3

VPI / VCI
2 levels
In the ATM network, every virtual connections is identified by the fields VPI and VCI. These fields provide a 2-level identification. AnTwo types of identifiers are defined:
" "

Virtual Paths Virtual Channels

VC VC VC

VP

VP

VC VC VC

VC VC VC

VP

Physical Medium

VP

VC VC VC

VC VC VC

VP

VP

VC VC VC

Figure 20

VPI & VCIs To work with this 2-level identification, offers some advantages :
"

Easy Global Referring (VP Switching) It is very common to do this. (cfr. Street + Number, First Name + Last Name)

"

"

42 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

VP Switch

A switch that only examines the VPI field is called a VP switch. It does not interpret nor change the value of the VCI. It performs routing, based upon the VPI only and VPI translation.

Incoming links
VCI 23 VCI 45

Outgoing links VPI 3 O1 O2


VCI 67

VPI 1

VCI 67

VPI 2 Om time

VPI 4
VCI 23 VCI 45

time

Routing table VPI in VPI out

VPI 1 VPI 2

VPI 4 VPI 3

Figure 21

A VP Switch

770 00905 0341 VHBE Ed. 02

43 / 106

4 The ATM Cell Header

VP / VC Switch

A switch that examines both the VPI and the VCI fields is called a VP / VC switch. It performs routing, based upon the VPI and the VCI, and does VPI / VCI translation. It is said a VP / VC switch terminates VPs.

Incoming links
VCI 23 VCI 45

Outgoing links VPI 3 O1 O2


VCI 67

VPI 1

VPI 2 Om
VCI 67

VPI 4
VCI 23 VCI 45

time Routing table

time

VPI in

VCI in

VPI out

VCI out

VPI 1 VPI 1 VPI 2

VCI 23 VCI 45 VCI 67

VPI 3 VPI 4 VPI 4

VCI 67 VCI 23 VCI 45

Figure 22

A VP / VC Switch

44 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

Local Significance

In the ATM network, virtual connections are established between the communicating users. Each virtual connection is identified by a number, which has only local, link-by-link significance in the virtual connection. Explicitely, the VPI / VCI field does not designate an end address. Compared with circuit switching, it is more like a timeslot identifier". Thus, the VPI / VCI field of an ATM cell will be modified as it traverses several ATM switches.

VPI / VCI = 5 /33

VPI / VCI = 10 / 305

VPI / VCI = 8 /56

VPI / VCI = 5 /33

Figure 23

Local Significance of VPI / VCI Which VPI / VCI will be used on which link, will be agreed upon by the exchanges during the setup of the ATM connection. This way of working has the following advantage :
"

Local Administration of VPI / VCI values.

770 00905 0341 VHBE Ed. 02

45 / 106

4 The ATM Cell Header

4.4

PTI
This parameter identifies more or less the type of the payload". The 3 bits all have a different meaning.

PTI

0 1

User Cell OAM Cell 0 1

0 1 No Congestion Congestion

Normal Cell Last Cell

Figure 24

The PTI bits

46 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

4.5

CLP
The CLP bit labels an ATM cell with a certain priority, as shown in figure 25.

CLP

X
0 High Priority 1 Low Priority Figure 25 The CLP bit This priority can be important in case of congestion Therefore, the .Cell Loss Ratio (CLR) will be different for these different priorities : CLR1 > > CLR0 A cell priority can be assigned :
" "

on a per cell basis on a connection basis

The CLP value can be modified by the network, if a user's cell rate exceeds the negotiated cell rate. (For this purpose, the network executes a control function on the cell rate of every connection.) Changing the CLP =0 to CLP =1, is called cell tagging.

770 00905 0341 VHBE Ed. 02

47 / 106

4 The ATM Cell Header

4.6

HEC
The HEC field has a double function :
" "

Header Error Protection Cell Delineation

4.6.1

Header Error Protection


As already mentioned, error control is not a function of the network as far as the ATM cell payload is concerned. However, error protection is performed for the cell header.

Error Multiplication

Why ? In the payload,1 bit error remains 1 bit error when the cell is switched further. It does not lead to more bit errors. On the other hand, 1 bit error in the header field can lead to multiple bit errors, when the cell is routed incorrectly. More precisely, a bit error in the VP/VC field can lead to cell loss and cell misinsertion. Such a case of a 1 bit error, finally leading to many bit errors is called error multiplication. Therefore, the header is protected with a Cyclic Redundancy Check (CRC), which is transmitted in the HEC field. This HEC field is checked at every ATM switch. The sending side calculates the HEC value : the polynomial generated by the first four bytes of the header is multiplied by 8 and then divided by x8 + x2 +x +1. The remainder of this division is transmitted in the HEC parameter field. At the receiving side, this HEC value is recalculated to check for errors. The HEC code is capable
"

to correct a single bit error to detect multiple bit errors In the normal (default) mode :
D D

"

HEC Algorithm

The receiver operates in a dual state mode, as shown in figure 26.


"

If a single bit error is detected, the error is corrected, and the state at the receiver switches to detection mode state. If a multiple bit error is detected the cell is discarded and the state at the receiver switches to detection mode state.

48 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

"

In the detection mode :


D D

All cells with a detected header error are discarded and the receiver remains in the detection state mode. If a cell with a correct header is detected the receiver switches to the correction mode state.
Multiple bit error detected (cell discarded)

No error detected

Error detected (cell discarded)

No error detected

Single bit error detected ( header corrected ) C : Correction Mode D : Detection Mode

Figure 26

The HEC Algorithm

The reason for this dual kind of operation is the following : Trying to correct too many errors, introduces even more errors.Statistics show that most errors are either single bit errors or either lengthy burst errors.Thus, in case of 2 consecutive errored cell headers, chances are that it is a lengthy burst error and trying to correct is pointless.

770 00905 0341 VHBE Ed. 02

49 / 106

4 The ATM Cell Header

4.6.2

Cell delineation
Cell delineation enables the receiver to recover the cell boundaries. To obtain this cell delineation, the correlation between the first four bytes of the cell header and the HEC value is examined. Figure 27 shows the cell delineation algorithm.
"

In the Synch state, it is assumed that the system is synchronised to the cell boundaries.
D

The Synch state is left (loss of cell delineation), when a number ( )of consecutive cells with incorrect HEC calculation result is found.

"

In the Hunt state, the delineation process checks bit by bit for the correctness of the HEC for the assumed header fields.
D D

If the calculation yields a correct result the receiver switches to the Presync state. If the calculation yields an incorrect result, the receiver remains in this state.

"

In the Presync state it is assumed that a correct cell delineation was found.
D

However, the calculation is continued for a further number ( ) of consecutive cells. If all consecutive cell headers yield correct, the Synch state is entered. If an incorrect HEC is found the receiver returns to the Hunt state.

50 / 106

770 00905 0341 VHBE Ed. 02

4 The ATM Cell Header

shifting bit by bit

H
consecutive incorrect HEC correct HEC incorrect HEC

P S

consecutive correct HEC S : Synchronous State H : Hunting State P : Presync State

Figure 27 for : 7 for : 6

The Cell Delineation Algorithm

ITU-T suggest as suitable values to use


" "

Exercise

As an exercise, you can calculate the probability for an ATM connection to get out of sync, because of 7 accidental errored headers. Suppose the BER = 10-5 What is the average time for this happening on an 155 Mbit/sec link ? P (1 wrong bit) = 10-5 P (1 correct bit) = 1 - 10-5 P (1 correct header) = (1 - 10-5)40 P (1 wrong header) = 1 - (1 - 10-5 ) 40 P (7 wrong headers) = (1 - (1 - 10-5 ) 40 ) 7

770 00905 0341 VHBE Ed. 02

51 / 106

4 The ATM Cell Header

52 / 106

770 00905 0341 VHBE Ed. 02

5 The B-ISDN Protocol Reference Model

5 The B-ISDN Protocol Reference Model


This chapter describes the Protocol Reference Model for the B-ISDN, as it is defined by ITU-T.

770 00905 0341 VHBE Ed. 02

53 / 106

5 The B-ISDN Protocol Reference Model

5.1

The Model
The B-ISDN Protocol Reference Model (BISDN PRM) is depicted as a cube and consists of 3 planes :
" " "

The User Plane for the transfer of User Data The Control Plane for the transfer of Signalling Messages The Management Plane

Each plane has specific functions; consequently they are separated from each other. Management plane Control plane
Higher layers

User plane
Higher layers

ATM Adaptation Layer (AAL)

ATM Layer

Physical Layer

Figure 28

The B-ISDN Protocol Reference Model

5.2

The Layers
The user plane and the control plane are organised into three layers :
" " "

the AAL Layer the ATM Layer the Physical Layer

Table 5 summarises the functionality of each layer.

54 / 106

770 00905 0341 VHBE Ed. 02

5 The B-ISDN Protocol Reference Model

Table 5 Functions

ATM Layers Main Layer ATM Adaptation Lay er (AAL) ATM Layer Sublayer Convergence Sublay er (CS) SAR

Convergence Segmentation and Reassembly (SAR) Generic Flow Control Cell Header Generation and Extraction Cell VPI / VCI Translation Cell Multiplexing / Demultiplexing Cell Rate Decoupling Header Error Control Cell Delineation Transmission Frame Alignment Transmission Frame Generation/Recovery Bit Timing Physical Medium

Physical Layer

Transmission Conver gence (TC)

Physical Medium (PM)

5.2.1

The Physical Layer


The physical layer performs functions on bit level, on transmission level and delineation functions.

PM

The PM performs functions, which are dependent on a physical medium, such as bit alignment and the generation of waveforms suitable for the medium. It is responsible for the correct transmission and reception of bits on the appropriate physical medium. This medium can be
" " "

optical electrical wireless

At the lowest level, the functions of the PM are medium dependent, but this sublayer also does bit timing reconstruction at the receiver side. Because of this, the transmitter side is responsible for the insertion of the required bit timing information and line coding.

770 00905 0341 VHBE Ed. 02

55 / 106

5 The B-ISDN Protocol Reference Model

TC

The TC sublayer is responsible for all functions related to cell transmission. Its working depends on the used transmission system which carries the ATM cells. Examples of transmission systems are Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH). Many different types of physical layer can be used to transport ATM cells, as shown in figure 29.

ATM

Cell Based Figure 29

SDH

PDH

ADSL

...

Different Physical Layers

Further, the TC sublayer is also responsible for the generation of the Header Error Control (HEC) syndrome of each cell at the transmitter, and its verification at the receiver. This allows cell delineation and detection of cell header errors. Finally, the TC performs cell rate decoupling. This function is used to adapt the useful information rate to the available payload of the transmission system. This decoupling of rates can be established by means of insertion of empty cells.

5.2.2

The ATM Layer


The ATM layer is independent from the used physical medium and transmission system. It deals with the ATM cell header and performs the functions of:
"

Cell multiplexing/demultiplexing. Cells from individual connections are multiplexed into one cell stream on the physical layer at the transmitter side. Cells are demultiplexed to individual cell streams at the receiving side.

"

VPI/VCI translation. The ATM layer translates incoming VPI/VCIs into appropriate outgoing VPI/VCIs when a cell passes through an ATM switch or cross-connect.

56 / 106

770 00905 0341 VHBE Ed. 02

5 The B-ISDN Protocol Reference Model

"

Cell header generation/extraction. The ATM layer at the transmitter side adds a header to the cell payload field received from the ATM Adaptation Layer. At the receiver side the cell header is extracted, and removed. The cell payload field is passed on to the ATM Adaptation layer.

"

Generic Flow Control at the UNI. The ATM layer controls the traffic flow at the UNI to control overload conditions that can occur in the network.

5.2.3

The AAL
The AAL performs the adaptation of higher layer protocols to the fixed size ATM cells and it enhances the services provided by the ATM layer to the requirements of the higher layers. The AAL is service dependent and also foresees error detection and correction, time/clock recovery, etc.

AAL 1

AAL 2

AAL 3/4

AAL 5

...

ATM
Figure 30 Different AALs

For the moment, the AAL-5 is of much importance, it is used to transport :


" "

IP Packets Signalling Messages

AAL-5 supports data services. Its functionality is simplified to support high speed data transfer in an efficient way. It assumes that the layers above AAL perform error recovery, retransmission and sequence numbering. Consequently it does not provide this functionality. As a result, the overhead information is minimal. AAL-5 is also referred to as .Simple and Efficient Adaptation Layer (SEAL)

770 00905 0341 VHBE Ed. 02

57 / 106

5 The B-ISDN Protocol Reference Model

The SAR sublayer segments the information into 48 octets which will be transported inside ATM cells. The cell transporting the final part can be identified via the PTI3 bit =1. However, before this segmenting is done, some additional fields are added to the information
Information Padding
(0...47 octets)

Trailer
(8 octets)

User to User Info

CPI
0000 0000

Length
(of the information)

CRC

CPI : Common Part Identifier CRC : Cyclic Redundancy Check

Figure 31

The AAL-5

58 / 106

770 00905 0341 VHBE Ed. 02

5 The B-ISDN Protocol Reference Model

5.3

The User Plane and the Control Plane


As already mentioned, ATM cells in the user plane carry user data. Whereas, ATM cells in the control plane carry control data = signalling messages.

User Plane

As far as the user plane is concerned, ATM switches are not interested in the ATM cell payload, i.e. the information is transported transparently Thus, for ATM switches and for user information, the AAL is not important. Of course, it is important for the end-user equipment.

Control Plane

However, for the control plane it is different. This control information (signalling messages) has to be examined by every ATM switch. The AAL used, also called the Signalling ATM Adaptation Layer (SAAL) is AAL5. ATM cells belonging to the user plane and the control plane have to be discerned. An ATM cell of the control plane, carrying signalling information, can be distinguished because VCI = 5. Control Plane
Higher layers

User Plane

SAAL
VCI = 5 VCI > 32

Figure 32

Control Plane and User Plane for a Switch

770 00905 0341 VHBE Ed. 02

59 / 106

5 The B-ISDN Protocol Reference Model

60 / 106

770 00905 0341 VHBE Ed. 02

6 Call Configurations

6 Call Configurations
This chapter describes 2 call configurations, specific for ATM, i.e. : G G Multi-connection Calls Point-to-Multipoint Connections

770 00905 0341 VHBE Ed. 02

61 / 106

6 Call Configurations

6.1

Multi-Connection Calls
In B-ISDN, a clear separation exists between the concepts :
" "

Call Connection

A call is setup by a signalling dialogue. However, signalling messages are designed in a way that multiple connections can be requested simultaneously. These multiple connections could serve to transport multiple service-components of a call, such as :
" " " "

Video Audio in language 1 Audio in language 2 Data

For this purpose, the used identification of virtual connections is specifically useful, more precisely : Different service components can be multiplexed on the same VP .

62 / 106

770 00905 0341 VHBE Ed. 02

6 Call Configurations

6.2

Point-to-Multipoint Calls
Figure 33 shows an example of a point-to-multipoint call, in which a number of receivers (the TV-sets) receive the images from a sender (the camera). Note that all leafs will receive the same image at any time. The leafs can not send information back to the sender, nor can they send information to each other. Thus, such a point-to-multipoint connection is always unidirectional. The source of a point-to-multipoint is called the "root" of the connection, while the destination sides are called the "leafs".

Leaf 1

Leaf 2

Root

Leaf 3 Leaf 4

Figure 33

A Unidirectional Point-to-Multipoint Connection

Setup

The point-to-multipoint connection is setup by first requesting the establishment of a connection between the root and one leaf. After this setup has progressed, additional leaves can be added to the connection by add party requests from the root. These parties can be added "in parallel", i.e the root does not need to wait for a response related to one add party request before issuing the next one. Exchanges providing point-to-multipoint connections need a replication function. For efficiency, the replication should be performed as close to the leafs as possible.

Replication

770 00905 0341 VHBE Ed. 02

63 / 106

6 Call Configurations

64 / 106

770 00905 0341 VHBE Ed. 02

7 ATM Traffic Control

7 ATM Traffic Control


This chapter describes traffic and congestion control for ATM. Two traffic control functions are very important : G G CAC UPC / NPC

The ABR transfer capability is discussed in more detail.

770 00905 0341 VHBE Ed. 02

65 / 106

7 ATM Traffic Control

7.1

ATM Traffic Control Functions


Use
The primary role of traffic and congestion control parameters and procedures is to protect the network and the user in order to achieve network performance objectives. The following are important traffic control functions :
" "

Connection Admission Control (CAC) Usage Parameter Control (UPC) / Network Parameter Control (NPC). This functionality is often referred to as Policing.

7.1.1

CAC
Use
CAC is defined as the set of actions taken by the network at the call establishment phase in order to establish whether a connection can be accepted or rejected. Moreover, if a new connection is accepted, the Quality of Service (QoS) of existing connections should be maintained. Inputs and outputs are shown in figure 34. Inputs
Existing Connections Connection Characteris tics Buffer Sizes Output Link Rate

Outputs

CAC

Yes No

Figure 34

CAC functionality

The used CAC algorithm is not standardized Therefore, it will be an area of competition for the operators. Indeed, a better CAC can represent more money, because of a better utilization of bandwidth.

66 / 106

770 00905 0341 VHBE Ed. 02

7 ATM Traffic Control

Traffic Descriptors

The basis for the CAC must be some kind of description of the traffic the user is intending to send. This description will use traffic parameters. Examples are :
" " " "

Peak Cell Rate (PCR) Sustainable Cell Rate (SCR) Intrinsic Burst Tolerance (IBT) Minimum Cell Rate (MCR)

The meaning of these traffic parameters is shown in figure 35. IBT

PCR

SCR

Figure 35

Traffic Parameters

More traffic parameters may be defined in the future. However, it is important that every parameter is :
"

Simple and understandable in an unambiguous way to the user terminal and to the network. Useful for CAC algorithms Enforceable by the UPC / NPC.

" "

770 00905 0341 VHBE Ed. 02

67 / 106

7 ATM Traffic Control

ATM Transfer Capabilities

A set of traffic control functions, based upon a well-defined set of traffic parameters is called an ATM Transfer Capability (ATC). From the operator's perspective, an ATC may provide gain through statistical multiplexing. On the other hand, a user can have a preference for an ATC because of pricing.

DBR

The basic (and default) ATC is the Deterministic Bitrate (DBR). If a user requests a DBR connection, he needs to specify (via signalling procedures) :
"

PCR

DBR is intented to be used to meet the requirements of constant bitrate traffic.. It provides a static amount of bandwidth that is continuously available during the connection lifetime. Thus the source can emit cells at the PCR at any time and for any durations and the QoS commitments still pertain. It provides QoS with respect to CLR and Cell Transfer Delay (CDT).

SBR

A second ATC is .Statistical Bitrate (SBR). If a user requests an SBR connection, he needs to specify (via signalling procedures) :
" " "

PCR SCR IBT

SBR is intented to be used to meet the requirements of variable bitrate. It can be used if the source can describe in greater detail than just the PCR, the cell flow that it will emit. SBR provides QoS with respect to CLR and optionally to CDT.

Other ATC's

Other ATC's are


" " " "

Available Bitrate (ABR) ATM Block Transfer (ABT) Unspecified Bitrate (UBR) Guaranteed Framerate (GFR)

68 / 106

770 00905 0341 VHBE Ed. 02

7 ATM Traffic Control

7.1.2

UPC / NPC
Use
UPC / NPC is the set of actions taken by the network to monitor and control that the traffic contract is respected in terms of traffic offered and validity of the ATM connection, at the user acces and the network access, respectively. The main purpose is to protect network resources from malicious as well as unintentional misbehaviour wich can affect the QoS of other connections. The policing function should be located as close as possible to the source of the traffic, because detection of excessive traffick must be done as early as possible. However, it should not be located in the subscriber terminal, because of the user can not be trusted. The location of UPC / NPC is shown in figure 36.

Where

UPC

NPC

Figure 36

UPC and NPC Locations

Actions

The policing function classifies every ATM cell of a connection as :


" "

Conforming Non-conforming

This happens in a standardized way. The policing function takes no actions on conforming cells. On the other hand, actions upon non-conforming cells (which are operator specific ) may be :
" " "

Discarding Rescheduling Tagging

The policing function also classifies every connections as :


" "

Compliant Not-compliant

770 00905 0341 VHBE Ed. 02

69 / 106

7 ATM Traffic Control

When a connection contains too many non-conforming cell, she is determined to be non-compliant. The point at which this happens is also not standardized. For a non-compliant connection UPC / NPC may initiate connection release.

Ideal UPC / NPC

The ideal UPC / NPC function (and discarding non-conforming cells) will only admit the contracted PCR. Thus it would look as in figure 37.
Output Traffic

PCR

Input Traffic

Figure 37

Ideal UPC / NPC

The GCRA

To classify each cell as conforming or not, a real time standardized algorithm has to be performed, with as input some statistical (long-term) description of the traffic. This standardized algorithm is called the Generic Cell Rate Algorithm (GCRA). It classifies the cells as shown in figure 38, using the inter-arrival times.
Last Conforming Cell

TAT -

TAT

Non - Conforming

Conforming

Figure 38

Conforming and non-conforming Cells

Starting from the last conforming cell, the expected time of the next cell can be calculated. This is the Theoretical Arrival Time (TAT). For instance, for a DBR connection, the expected interval T between cells would be : T = 1 / PCR

70 / 106

770 00905 0341 VHBE Ed. 02

7 ATM Traffic Control

Cells arriving too early" can then be classified as non-conforming. However, a certain tolerance is granted, i.e. cell arriving before TAT but still within the interval [TAT - , TAT] are still considered to be conforming. is called the Cell Delay Variation Tolerance (CDVT). Cells, sent in a conforming way, may exhibit some Cell Delay Variation (CDV) because of a number of reasons,. like
" " "

Cell Multiplexing Insertion of OAM Cells Access to a slotted medium.

The GCRA (T, ) is shown in figure 39. Arrival of a cell at time ta

Non-conforming cell

Yes

ta < TAT -

No

Conforming cell

TAT = max (ta ,TAT) + T Figure 39 The GCRA (T, )

Policing for SBR

For SBR connections, things become more complicated. There we need to run 2 GCRA algorithms in parallel : GCRA ( 1/PCR, ) AND GCRA ( 1/SCR, IBT)

770 00905 0341 VHBE Ed. 02

71 / 106

7 ATM Traffic Control

7.1.3

ABR
Use
ABR is a transfer capability, intended to support sources which have the ability to adapt their transfer rate. Thus, ABR is intended for the transfer of data. An ABR source is allowed to send at a certain bitrate, consisting of
" "

Fixed Part Elastic Part

QoS

The ABR transfer capability provides


" "

no garanty upon cell delay. a very strong garanty upon cell loss.

Feedback Loop

The size of the variable bandwidth has to be conveyed to the ABR source, which has to obey. For this purpose, a double feed-back loop is setup, consisting of Resource Management (RM) cells. These RM cells can be considered to be transport vehicles for the ATM switches to communicate their feedback information.
" " " "

RM cells are generated by the source RM cells are looped back by the destination RM cells are in-band. RM cells are in the forward or backward direction.

= =

RM Cells User Cells

Figure 40

Feedback Loop of RM cells

Options for the Feedback Loop

The feedback loop of the RM cells can be :


"

End-to-end

72 / 106

770 00905 0341 VHBE Ed. 02

7 ATM Traffic Control

"

Link-by-link

In the case of a link-by-link feedback loop, ATM exchanges have to behave as a Virtual Source (VS) and a Virtual Destination (VD). The use of VS/VD has the following advantage
"

An operator can have a full control of the loop in his own network

Options for the Direction of the Feedback

An ATM switch can write his feedback into an RM cell, either :


" " "

in the forward direction in the backward direction in both directions

Either of these options has certain advantages and/or disadvantages :


" "

Backward : Faster Feedback Forward : Other switches can use the feedback.

Options for the Nature of the Feedback

The feedback an ATM switch writes into an RM cell can be, either :
" "

Binary Explicit

Binary feedback is indicated by the values of only 2 bits, being Congestion Indication (CI) and No Increase (NI). The following are the rules for binary feedback. Table 6 CI 0 0 1 1 NI 0 1 0 1 ABR Binary Feedback Action ACR = ACRold + AIF * PCR ACR = ACRold ACR = ACRold - RDF * ACRold

770 00905 0341 VHBE Ed. 02

73 / 106

7 ATM Traffic Control

Because of these rules, traffic increase is slow but a traffic decrease is fast. The advantage of this is better network protection Feedback, written in RM cells may not overrule the feedback of a previous node, unless the new feedback is more demanding, i.e. restricts the source to an even lower bandwidth. This is shown in figure 41.

90 20 60

90 20 20

90 50 80

90 50 50

= RM cell, carrying explicit feedback

Figure 41

Feedback Loop of RM cells

Policing

Also the traffic of ABR sources has to be policed, because now the allowed traffic rate is variable, also the parameters, to be used by the GCRA will be variable. We call this new algorithm the DGCRA = Dynamic GCRA It takes into account the minimum (2) and maximum delay (3) for the feedback to take effect.

Fairness

In distributing traffic over all ABR connections, ATM switches have to stick to the concept of fairness, i.e. no particular source may be privileged. Fairness algorithms are not standardized. Several possibilities are :
" " "

Total Bandwidth / N Total Bandwidth * MCRi / MCRi Total Bandwidth * ( PCRi - MCRi ) / (PCRi -MCRi)

74 / 106

770 00905 0341 VHBE Ed. 02

8 B-ISDN Signalling

8 B-ISDN Signalling
This chapter describes very briefly the signalling protocols and their stacks used in a B-ISDN

770 00905 0341 VHBE Ed. 02

75 / 106

8 B-ISDN Signalling

8.1

Classification
Topological Classification
Regarding a network topology, 3 signalling interfaces exist :
" " "

UNI = User-to-Network interface NNI = Network-to-Network interface ANI = Access Network to Network interface

This is shown in figure 42. NNI

UNI

Access Network

ANI

Figure 42

Signalling Interfaces

The following signalling systems are used at these interfaces. Table 7 UNI DSS1 DSS2 Signalling Systems NNI ISUP (CCS #7) B-ISUP (CCS #7) ANI V5 VB5

ATM User-Network Traffic Contract

In STM, a user can not, but use only his allocated piece of bandwidth, i.e., the channel(s) allocated to him. This channel is agreed upon at connection setup, and is communicated by means of the existing N-ISDN protocols. Also in B-ISDN, an agreement must be made between the user and the network. This agreement is called the User-Network Traffic Contract". Unlike N-ISDN, much more traffic aspects must be agreed upon. The amount, speed, burstiness and other traffic aspects of the user information (which will be transmitted) must be communicated by the B-ISDN protocols. This aspect increases the required capability of the B-ISDN signalling procedures. Indeed, a traffic contract must be

76 / 106

770 00905 0341 VHBE Ed. 02

8 B-ISDN Signalling

communicated or even negotiated. The following are possible parameters describing the characteristics of an ATM connection :
" " " " " "

ATM Traffic Descriptor OAM Traffic Descriptor Quality of Service Parameters Type of AAL Communication Configuration etc.

770 00905 0341 VHBE Ed. 02

77 / 106

8 B-ISDN Signalling

8.2
8.2.1

Protocol Stacks
DSS2
Above the ATM layer, which provides transport of ATM cells without any processing like error control, there is an Signalling ATM Adaptation Layer (SAAL). This SAAL layer is further divided into :
" "

DSS2 Protocol Stack

an ATM Adaptation Layer 5 (AAL-5) Common Part the Service Specific Connection Oriented Protocol (SSCOP) layer the Service Specific Coordination Function (SSCF) layer

"

The highest layer in DSS2 is described in Q.2931, which is the BB version of NB Q.931, also called DSS2 Layer 3. It describes all messages and procedures for point-to-point connections. It can be extended by Q.2961 (for additional parameters and procedures) and by Q.2971 (which describes the procedures for point-to-multipoint call control). The protocol stack for DSS2 is shown in figure 43. Q.2931/61/71. Q.2130 Q.2110 I.363.5 I.361 I.432 Figure 43
SSCF SSCOP AAL5 ATM Layer Physical Layer

Messages and Parameters Filter Error Correction


SAAL

Error Detection

Protocol Stack for DSS2

78 / 106

770 00905 0341 VHBE Ed. 02

8 B-ISDN Signalling

8.2.2

B-ISUP
At the NNI, either the ATM network or, as a national option, the existing CCS #7 network can be used for signalling information transfer.

Option 1

The first option is shown in figure 44.


Q.2761-Q.2764 B-ISUP MTP-3 SSCF SSCOP AAL5 ATM Layer Physical Layer

Messages and Parameters Addressing and Network Management Filter Error Correction Error Detection
SAAL

Q.704. Q.2140 Q.2110 I.363.5 I.361 I.432 Figure 44

Protocol Stack for B-ISUP using an ATM network ,

Note that a lot of layers are the same as the ones for the DSS1 stack. Only the 3 highest layers differ.

Option 2

However, as an intermediate solution, an operator can decide to use his existing CCS #7 network, to provide for the B-ISDN signalling. This means he will reuse his narrowband links, which follow the classical CCS #7 protocol stack. Only B-ISUP will now replace the narrowband ISUP The stack for this option is shown in . figure 45.

770 00905 0341 VHBE Ed. 02

79 / 106

8 B-ISDN Signalling

Q.2761-Q.2764

B-ISUP MTP-3 MTP-2 MTP-1

Messages and Parameters Addressing and Network Management Error Detection and Correction

Q.704. Q.703 Q.702 Figure 45

Protocol Stack for B-ISUP reusing NB links ,

80 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

9 ATM Mapping in SDH and PDH


This document describes the mapping of ATM cells in the 2 major transmission techniques : PDH and SDH. It also describes briefly a newer inverse multiplexing technique, called Inverse Multiplexing for ATM (IMA).

770 00905 0341 VHBE Ed. 02

81 / 106

9 ATM Mapping in SDH and PDH

9.1

PDH versus SDH


Transmission provides the capacity needed to transport information rapidly over the network. It transports data in a cheap way over long distances, with little errors and high bitrates. Two mayor transmission systems exist :
" "

Plesiochronous Digital Hierarchy (PDH) Synchronous Digital Hierarchy (SDH)

Both are digital transmission systems, multiplexing multiple information streams into higher order hierarchies. The difference between them lies in how the different network nodes are synchronized.
Plesiochronous Network Elements use as a clock :

PDH

Synchronous Transmission

Their own clock


Fully Synchronous Network Elements use as a clock :

SDH

Figure 46

A Master Clock PDH and SDH

PDH

In PDH, every network uses its own clock, which will never be completely the same as any other clock. Thus, network elements work almost synchronous or Plesiochronous". Therefore, when multiplexing different lower order streams together, stuffing bits" have to be inserted. These stuffing bits provide the flexibility needed. They can contain information from a source, or they can be empty, i.e. not containing any user information. In this way, small clock differences ("50 ppm) can be handled. The basic European frame (called an E1) contains 32 channels of 64 Kbit/sec. It is shown in figure 47.

82 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

15 16 17

31 0

Synchronization

Signalling Information

1 frame = 125 sec 8 bits = 64 Kbit/sec 125 sec 32 * 64 Kbit/sec = 2,048 Mbit/sec

Bitrate of 1 channel = Bitrate of the link Figure 47 =

PCM Structure

The European way is to multiplex 4 lower order bitstreams into 1 higher order bitstream. However, because of historical reasons, a different PDH hierarchy was defined in North-American (and yet another different one in Japan). The European and the North-American multiplexing hierarchies are shown in table 8. Table 8 PDH Multiplexing Hierarchies European First Order Third Order Fourth Order Note E1 E3 E4 2, 048 8, 448
Mbit/s Mbit/s Mbit/s Mbit/s

North American T1 T2 T3 T4 1, 544 6, 312


Mbit/s Mbit/s Mbit/s Mbit/s

Second Order E2

34, 368

44, 736

138, 264

139, 264

The bitrate of the higher order is always more than n times the lower bitrate. This is because some overhead is introduced, like stuffing bits and frame alignment patterns A big disadvantage of PDH is the impossiblity to reach, for example, a particular E1 out of an E4. The inverse demultiplexing way has to be performed completely for this. This is called back-to-back multiplexing.

770 00905 0341 VHBE Ed. 02

83 / 106

9 ATM Mapping in SDH and PDH

140 Mbit/s

140 Mbit/s

2 Mbit/s 140 34 34 Mbit/s 34 2 2 Mbit/s 2 Mbit/s 2 Mbit/s

2 Mbit/s 2 Mbit/ s 34 Mbit/s 2 34 2 Mbit/ s 2 Mbit/ s 34 Mbit/ s 140 34

34 Mbit/s

34 Mbit/s

34 Mbit/ s 34 Mbit/ s

34 Mbit/s

64 x 2 Mbit/s

Figure 48

Back to Back Multiplexing A lot of equipment is needed for this procedure, a cascade of multiplexers/demultiplexers has to be installed in the network node. Therefore, PDH has a number of disadvantages :
"

expensive, because tailor-made installation is required in each network node. lots of processing increases the probability of faults and failures.

"

SDH

To overcome these problems, in the SDH network, the network elements are fully synchronised to a master clock. This permits a more appropriate way to remove and add lower order signals from and into a higher order signal. It is now possible to directly drop/add lower order signals, without having to demultiplex/multiplex through the whole hierarchy. This is called add / drop multiplexing.

84 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

140 Mbit/s signal

140 Mbit/s signal

ADD/DROP multiplexer

Drop

e.g. : 2 Mbit/s

Add

Figure 49

Add/Drop Multiplexing

Because of this feature, SDH networks will typically be ring shaped. The ring carries information destined for different nodes. This lower order information is removed form the high order signal in that specific Add/Drop Multiplexer (ADM).
140 Mbit/s ADM

ADM

ADM

ADM

Figure 50

Ring Shaped SDH Network

Further, for the new SDH network, only 1 common higher order signal is defined, which is used worldwide. This new higher order signal is compatible with the existing PDH tributaries. This means, that it has to be able to carry lower order signals of the different PDH systems. This is shown in table 9.

770 00905 0341 VHBE Ed. 02

85 / 106

9 ATM Mapping in SDH and PDH

Table 9

SDH Containers Bitrate 1544 Mbps 2048 Mbps 8 Mbps 34 Mbps 140 Mbps

SDH Containers VC11 VC12 VC2 VC3 VC4

The existing PDHs only define bit rates up to 140 Mbit/s. Modern optical systems can offer higher bit rates. So, in the SDH new levels of multiplexing hierarchies are defined for these high bit rates. This is shown in table 10. Table 10 The SDH Hierarchy Bitrate 155.52 Mbps 622.08 Mbps 2.488 Gbps 10 Gbps 40 Gbps

Multiplex order STM-1 STM-4 STM-16 STM-64 STM-256 Note

The bitrate of the higher order is always exactly 4 times the lower bitrate. This is because no overhead is introduced. To conclude, we summarize the properties of the PDH and SDH systems in figure 51 and table 11.

86 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

PDH

SDH

Stuffing Bits

Figure 51 Table 11

PDH versus SDH PDH versus SDH PDH SDH Synchronous Flexible Hierarchy Very limited bit-stuffing Pointers to frame-boundaries Add-Drop multiplexing One Higher order Hierarchy Extended management features

Plesiochronous Fixed Hierarchy Stuffing Bits No pointers to frame-bound aries Back-to-back multiplexers Different Hierarchies Limited management features

770 00905 0341 VHBE Ed. 02

87 / 106

9 ATM Mapping in SDH and PDH

9.2

ATM Mapping in PDH


ATM cells can be mapped into the PDH transmission system. The mapping is defined for all types of frames in the hierarchy. The mapping is done in such a way, that the ATM cell's byte boundaries are aligned with the frame's byte boundaries. Idle cells are inserted if the offered rate of the source is not sufficient to fully load the frame capacity. To prevent the ATM cell payload to accidentally contain the frame alignment or ATM cell delineation information stream, the payload part of the ATM cell is scrambled. This also protects the network and the users against malicious users. The standards recommend a self-synchronising scrambler of generating polynomial x43+1. To find the ATM cell boundary (cell delineation) the HEC parameter is used, which is part of the ATM cell header.

9.2.1

Mapping into Lower Order Frames


The basic frame format is the E1 format. Figure 52 shows the mapping of ATM cells in an E1. A cell can be mapped into bits 9 to 128 and bits 137 to 256, which correspond to timeslots 1 to 15 and timeslots 17 to 31 of the frame.
timeslot 0 Header timeslot 16

Header Header

Header 8 * 32 = 256 bits

ATM cell mapping field

ATM cell mapping field

Figure 52

Mapping of ATM Cells into E1

88 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

9.2.2

Mapping into E3 Frames


The basic frame format of an E3, containing 4 E2's is different from the format when it contains ATM cells. In that case, it contains 7 bytes of overhead and 530 bytes of payload per 125 sec.. This frame structure is shown in figure 53.
FA1 FA2 EM TR 9 bytes MA NR GC

59 bytes

Figure 53

E3 frame for ATM Cells.

The 7 bytes of overhead have the following meaning :


" " "

FA1 / FA2 : Frame Alignment Signal EM : Error Monitoring. TR : Trail Trace. It identifies the trail between transmitter and receiver. MA : Maintenance and Adaptation byte.
D D D D D

"

bit 1: FERF bit 2: FEBE bit 3 to 5 : payload type (010 for ATM cells) bit 6 to 7 : payload dependent (for example: TU multiframe indicator) bit 8: timing marker, refers to the timing source primary reference clock relationship

" "

NR : Network Operator byte. GC : General purpose Communications channel for data/voice.

Figure 54 shows the ATM cells in a 34 368 kbit/s frame. The ATM cells are mapped into the 530 payload bytes of the frame.

770 00905 0341 VHBE Ed. 02

89 / 106

9 ATM Mapping in SDH and PDH

Header Header Header Header 9 bytes Header Header Header Header 59 bytes Header Header Header

Figure 54

Mapping of ATM Cells into E3

90 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

9.3

ATM Mapping in SDH


The name of the basic SDH transmission frame is Synchronous Transport Module (STM), and it is referred to as STM-1, shown in figure
270 bytes 1 1 9 10

270

Overhead

PAYLOAD

9 rows

125 sec

Figure 55

STM-1

The characteristics of the STM-1 frame are :


" " "

Content : 9 x 270 bytes = 2430 bytes Period : 125 sec; Bitrate : 155,520 Mbit/sec 2430 * 8 bits in every 125 sec Payload capacity : 150,336 Mbit/sec 2349 * 8 bits in every 125 sec

"

The payload area of the STM-1 contains Virtual Containesr (VC) of different sizes : VC11, VC12, VC2, VC3, VC4. ATM cells are mapped into these VCs. Any type of VC can carry ATM cells. The mapping is performed in such a way, that the ATM cell's byte boundaries are aligned with the VCs byte boundaries Idle cells are inserted if the offered rate of the source is not sufficient to fully load the SDH capacity. Thus, the actual transmitted cellstream has a rate that is synchronous with the SDH Container in which it is transported, although the information rate is defined by the ATM source. To prevent the ATM cell payload to accidentally contain the SDH frame alignment or ATM cell delineation information stream, the

770 00905 0341 VHBE Ed. 02

91 / 106

9 ATM Mapping in SDH and PDH

payload part of the ATM cell is scrambled. This also protects the SDH network and the users against malicious users Because a container's capacity is not an integer multiple of the cell size, a cell can go across a container's boundary. To find the ATM cell boundary (cell delineation) the Header Error Control (HEC) parameter is used, which is part of the contents of the ATM cell header. Mapping of ATM cells is done mainly into a VC-4. Figure 56 shows an example.
POH
J1 B3 C2 G1 F2 H4 Z3 Z4 Z5 260 261 ATM cell

VC-4

Figure 56

Mapping of ATM Cells into a VC-4

In the Path Overhead (POH) of the VC-4, 2 bytes are important, for the mapping of ATM cells.
"

C2 : indicates that the VC-4 contains ATM cells H4 : pointer to the beginning of the first cells

"

Besides the H4 byte, also another cell delineation mechanism may be used , the HEC algorithm A VC-4 has a payload with a size of 9 x 260 = 2340 bytes. Thus, it can contain 44 complete ATM cells. The last cell will not be complete, only 8 bytes are in one payload, while it continues in the next VC-4.

92 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

9.4

IMA
Why IMA
Often ATM's biggest challenge is cited to be competition in the Local Area Network (LAN) area, coming from fast Ethernet and Gigabit Ethernet. But ATM faces a problem on the Wide Area Network (WAN) as well. Not at the core of public networks, but at their edges. Only few companies can afford E3, T3 or STM-1 pipes to link their offices. Inverse multiplexing lets companies who can not afford large and expensive lines, to treat several smaller lines as one single logical connection. The fact that a number of smaller lines are used should be transparent to the application and to the rest of the network, cell order and format is retained. An inverse multiplexer takes traffic from a relatively high-bandwidth connection (say, a campus ATM backbone running at 155 Mbit/sec) and spreads it accross multiple lower speed WAN circuits. This offers several advantages :
"

Rather than paying for 45 or 155 Mbit/sec WAN capacity, net managers can now deploy exactly as much WAN bandwidth as they need, by gradually employing more E1 or T1s. This allows for a cost-effective migration. Maybe even more important, applications can use the bandwidth more effectively, since idle capacity on one line can be combined with unused capacity on another. For example, 5 connections of 1,2 Mbit/sec.
D D

"

Without IMA, each connection has to be mapped to its own T1, for a total of 5 T1 links. With IMA, the total needed capacity of 6 Mbit/sec can be spread over only 4 T1 links.

Round-robin on Cell Basis

IMA spread the ATM traffic over multiple links, called an IAM group. In the transmit direction, the cell stream is distributed on a cell basis, across the multiple links. At the receiving side, the receiving IMA recombines the cells from each link, recreating the original ATM cell stream. The ATM cells are spread in a cyclical fashion over the links (i.e. cyclic round-robin). This is shown in figure 57.

770 00905 0341 VHBE Ed. 02

93 / 106

9 ATM Mapping in SDH and PDH

Figure 57

Inverse muxing, cell by cel.

IMA Objectives

Some of the IMA objectives are :


"

Provide for the provisioning of bandwidth in physical link increments (e.g. E1 increments). Provide transparent transport of the ATM layer and higher layer signals (including the preservation of cell order, control of cell delay variation, etc..) Use a cell based multiplexing technique Detect and reject lines with greater delay than the provisioned maximum differential delay tolerance. Add/delete links while maintaining the IMA group in service. Support of all ATCs.

"

" "

" "

IMA Group

The IMA interface, called an IMA group, consists out of a number of N transmission links, each operating at the same link cell rate. Each link in the IMA group is identified by a unique Link Identifier (LID) between 0 and 31. The ATM cells shall be distributed over these N links, in cyclic round robin fashion, using an ascending order based on the assigned LIDs. The unit of control in IMA is called an IMA frame. An IMA frame consists out of a number M consecutive cells, on each link. The transmission of IMA frames must be aligned on all links within an IMA group, as is shown in figure 58. Every IMA frame contains a newly defined type of OAM cell, called an IMA Control Protocol (ICP) cell. An ICP cell indicates its relative offset position with respect to the beginning of an IMA frame. Differential link delay can cause the reception to be misaligned in time. The receiving IMA equipment can recover this IMA frame alignment by means of these ICP cells. Thus, cell sequence and cell delay can be preserved.

IMA Frame

94 / 106

770 00905 0341 VHBE Ed. 02

9 ATM Mapping in SDH and PDH

Figure 58

IMA Frames

770 00905 0341 VHBE Ed. 02

95 / 106

9 ATM Mapping in SDH and PDH

96 / 106

770 00905 0341 VHBE Ed. 02

Abbreviations

Abbreviations
AAL AAL-5 ABR ABT ADM ATC ATM B-ISDN BER CAC CDT CDV CDVT CI CL CLP CLR CO CRC CS DBR GCRA GFC GFR HDTV HEC IBCN IBT ICP IMA LAN ATM Adaptation Layer ATM Adaptation Layer 5 Available Bitrate ATM Block Transfer Add/Drop Multiplexer ATM Transfer Capability Asynchronous Transfer Mode Broadband Integrated Services Digital Network Bit Error Rate Connection Admission Control Cell Transfer Delay Cell Delay Variation Cell Delay Variation Tolerance Congestion Indication Connectionless Cell Loss Priority Cell Loss Ratio Connection Oriented Cyclic Redundancy Check Convergence Sublayer Deterministic Bitrate Generic Cell Rate Algorithm Generic Flow Control Guaranteed Framerate High Definition Television Header Error Control Integrated Broadband Communication Network Intrinsic Burst Tolerance IMA Control Protocol Inverse Multiplexing for ATM Local Area Network

770 00905 0341 VHBE Ed. 02

97 / 106

Abbreviations

LID MCR NI NNI NPC PCR PDH PM POH PSTN PTI QoS RM SAAL SAR SBR SCR SDH SEAL SSCF SSCOP STM STM TAT TC TDM UBR UNI UPC VC VCI VD VOD

Link Identifier Minimum Cell Rate No Increase Network-to-Network Interface Network Parameter Control Peak Cell Rate Plesiochronous Digital Hierarchy Physical Medium Path Overhead Plain Old Telephone Service Payload Type Identifier Quality of Service Resource Management Signalling ATM Adaptation Layer Segmentation and Reassembly Statistical Bitrate Sustainable Cell Rate Synchronous Digital Hierarchy Simple and Efficient Adaptation Layer Service Specific Coordination Function Service Specific Connection Oriented Protocol Synchronous Transfer Mode Synchronous Transport Module Theoretical Arrival Time Transmission Convergence Time Division Multiplexing Unspecified Bitrate User-to-Network Interface Usage Parameter Control Virtual Containesr Virtual Cell Identifier Virtual Destination Video On Demand

98 / 106

770 00905 0341 VHBE Ed. 02

Abbreviations

VOD VPI VS WAN

Video on Demand Virtual Path Identifier Virtual Source Wide Area Network

770 00905 0341 VHBE Ed. 02

99 / 106

Abbreviations

100 / 106

770 00905 0341 VHBE Ed. 02

Glossary

Glossary

770 00905 0341 VHBE Ed. 02

101 / 106

Glossary

102 / 106

770 00905 0341 VHBE Ed. 02

Appendix A References

Appendix A

References
1. I.113 :Vocabulary of Terms for Broadband Aspects of ISDN. 2. I.121 :Broadband Aspects of ISDN 3. I.432 : B-ISDN user-network interface - physical layer specification 4. I.150 : B-ISDN ATM Functional Characteristics 5. I.211 : B-ISDN Service Aspects. 6. I.321 : B-ISDN Protocol Reference Model and Applications. 7. I.327 : B-ISDN Network Functional Architecture. 8. I.361 : B-ISDN ATM Layer Specification. 9. I.362 : B-ISDN ATM Adaptation Layer (AAL) Functional Description. 10. I.363 : B-ISDN ATM Adaptation Layer (AAL) Specification. 11. I.371 : Traffic and Congestion Control in B-ISDN. 12. G.701 : Vocabulary of digital transmission and multiplexing, and PCM terms. 13. G.702 : Digital hierarchy bit rates. 14. G.703 :Physical/electrical characteristics of hierarchical digital interfaces. 15. G.704 : Synchronous frame structures used at primary and secondary hierarchical levels. 16. G.732 : Characteristics of primary PCM multiplex equipment operating at 2 048 kbit/s. 17. G.742 : Second order digital multiplex equipment operating at 8 448 kbit/s and using positive justification 18. G.751 : Digital multiplex equipments operating at the third order bitrate of 34 368 kbit/s and the fourth order bitrate of 139 264 kbit/ and using positive justification. 19. G.804 : ATM cell mapping into plesiochronous digital hierarchy (PDH). 20. G.832 : Transport of SDH elements on PDH networks: frame and multiplexing structures. 21. G.707 : Synchronous digital hierarchy bit rates. 22. G.708 : Network node interface for the synchronous digital hierarchy. 23. G.709 : Synchronous multiplexing structure.

770 00905 0341 VHBE Ed. 02

103 / 106

Appendix A

References

104 / 106

770 00905 0341 VHBE Ed. 02

Request for Your Comments

Request for Your Comments


Alcatel welcomes your views on the usefulness of this document. Your comments will be of great value in helping us improve our documentation. Please return your comments to:

Alcatel Customer Documentation Center Department VS/EO Lorenzstr. 10 D70435 Stuttgart

Fax E Mail

+49/711/821-4 75 23 J.Schwarz@alcatel.de

Important!

This is not a fault report! In case of documentation errors, the officially agreed fault reporting mechanism has to be used, in addition.

For Alcatel internal use only!

Document Title

Introduction to ATM 770 00905 0341 VHBE Ed. 02


(1) Ease of use Clarity Completeness Accuracy Organization Appearance Examples Illustrations Overall satisfaction [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] (2) [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] (3) [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] (4) [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] (5) [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ]

Document Identification

1.

Please rate the effectiveness of hi document i the f ll i this d in h following areas. areas Please mark ` ' Pl k `x': ( 1 ) - Excellent ll ( 2 ) - Good ( 3 ) - Fair ( 4 ) - Poor ( 5 ) - Not applicable

On the next page you will find additional questions.

770 00905 0341 VHBE Ed. 02

105 / 106

Request for Your Comments

Document Identification

770 00905 0341 VHBE Ed. 02

2.

In your opinion, how could we improve this document? Please mark `x' and provide details for the suggested improvement . [ ] [ ] [ ] [ ] [ ] [ ] Add more illustrations Add more examples Add more detail Make it shorter Make it less technical Improve ...
Details/Comments: (Use separate sheet, if necessary.)

3.

What is this document's best feature? Feel free to write any additional comments as well.
(Use separate sheet, if necessary.)

4.

If we may contact you to clarify your comments, please complete the following: Name Company Address Phone E Mail Fax Date

5.

Please return your comments to Alcatel TELECOM. (For address see first page of this questionnaire.) Thanks in advance for your assistance.

106 / 106

770 00905 0341 VHBE Ed. 02

Anda mungkin juga menyukai