SlideShare una empresa de Scribd logo
1 de 91
 Network layer is responsible for source to destination
delivery of the packets.
 The network layer must know the topology of the subnet
and choose appropriate paths through it.
 When source and destination are in different networks,
the network layer (IP) must deal with these differences.
 If two system are connected to the same link, there is
usually no need for a network layer.
H3 H3Data Data
From Transport layer
From data link layer
To Transport layer
To data link layer
WAN
LAN
LAN
LAN
LAN
F1
F1
F3
F2
F1
F2
F2
There is no provision in the data link(or physical layer) to make the
routing decision as the frame does not carry any routing information. To
solve the problem of delivery through several link, the network layer was
designed. The network layer is responsible for host to host delivery and for
routing the packets through routers and switches.
LOGICAL ADDRESSING
 Logical addressing are necessary for universal
communication that are independent of underlying physical
network.
 The logical address in the Internet is a 32 bit address
ROUTING
 When independent network or link are connected to create
internetwork or a large network, the connecting devices(router
or switch) routes the packet to their final destination.
Physical
layer
Data link
layer
Physical
layer
Data link
layer
End
system
a
Network
layer
Physical
layer
Data link
layer
Physical
layer
Data link
layer
Transport
layer
Transport
layer
Messages Messages
Segments
End
system
b
Network
service
Network
service
Network
layer
Network
layer
Network
layer
Routing table
IP packet and
routing
information
To data link layer
Data from another
protocol
Processing
Network layer
The network layer at the source is responsible for creating a packet from
data coming from another protocol such as transport layer protocol. It is
responsible for checking its routing table to find the routing information.
NETWORK LAYER AT THE SOURCE
Source
Routing table
IP packet and
routing
information
To data link layer
Processing
Network layer
From data link
layer
Router
The network layer at the switch or router is responsible for routing the
packet. When a packet arrives, the router or switch consults its routing
table and find the interface from which the packet must be send. After
some changes in the header with the routing information is passed to the
data link layer again.
NETWORK LAYER AT THE SWITCH
IP packet
Fromdata link layer
Data to another
protocol
Processing
Network layer
The network layer at the destination is responsible for address verification,
it make sure that the destination address on the packet is the same as the
address of the host.
NETWORK LAYER AT THE DESTINATION
Destination
At the network layer, TCP/IP supports the Internetworking
Protocol i.e. IP with four supporting protocol: ARP, RARP, ICMP,
and IGMP.
LOGICAL ADDRESSING
 Transmission mechanism used by the TCP/IP protocol.
 It is unreliable and connectionless protocol.
 It does not provide error checking or tracking.
 IP transport data in packets called datagram.
 IP does not keep track of the routes and has no facility of
reordering datagram.
ADDRESS RESOLUTION PROTOCOL
 Used to associate a logical address with a physical address.
 ARP is used to find the physical address of the node when its
internet address is known.
REVERSE ADDRESS RESOLUTION PROTOCOL
 Its allows a host to discover its Internet address when its
knows only its physical address.
 It is used when a computer is connected to a network for the
first time.
INTERNET CONTROL MESSAGE PROTOCOL
 ICMP is used by hosts or gateways to send notification of
datagram problems back to the sender.
 Its send query and error reporting messages.
INTERNET GROUP MESSAGE PROTOCOL
 IGMP is used to facilitate the simultaneous transmission of a
message to a group of recipients.
 The internet at the network layer is a packet switched
network.
 Packet switching uses either the virtual circuit approach or
the datagram approach.
 The internet is chosen the datagram approach to switching
in the network layer.
 It uses the universal address defined in the network layer to
route packets from the source to the destination.
DATAGRAM
 Packets in the IPv4 layer are called datagram.
 A datagram is a variable-length packet consisting of two
parts : header and data.
 The header is 20 to 60 bytes in length and contains
information essential to routing and delivery.
1. VERSION(VER) : This 4-bit field defines the version of the
IPv4 protocol. This field tells the IPv4 software running in
the processing machine that the datagram has the format
of version 4.
2. HEADER LENGTH(HLEN) :This 4 bit field defines the total
length of the datagram header in 4 byte word. This field is
needed because the length of the header is variable. When
there are no option the header length is 20 bytes and value
of this field is 5. When the option field is at its max. size the
value is 15.
3. SERVICES : This is a 8 bit field previously called service type
is now called differentiated service.
 SERVICE TYPE : In this interpretation the first 3 bit are
called the precedence bits and the next 4 bits are called type
of service(TOS) bits
Precedence TOS Bits
D T R C
D : Minimize delay, T: Maximize Throughput
R: Maximize reliability, C: Minimize Cost
1. PRECEDENCE : This is a 3 bit field ranging from 0(000 in
binary) to 7(111 in binary). The precedence defines the
priority of the datagram in issue such as congestion. If a
router is congested then the lower precedence datagram
are discarded.
TOS BITS Description
0000 Normal(default)
0001 Minimize Cost
0010 Maximize Reliability
0100 Maximize Throughput
1000 Minimize delay
 DIFFERENTIATED SERVICES : In this interpretation the first 6
bits make up the code point subfield and the last 2 bits are not
used. It can be used in two different ways:
a) When the 3 rightmost bits are 0’s, the 3 leftmost bits are
interpreted the same as the precedence bits in the service type
interpretation. In other word it is compatible with the old
interpretation.
b) When the three rightmost bits are not all 0’s , the 6 bits define 64
services based on the priority assignment by the internet or local
authorities.
Category Code point Assigning authority
1 XXXXX0 Internet
2 XXXX11 Local
3 XXXX01 Temporary or
experimental
The first category contain 32 services type, the second and
third contain 16 services types
4. TOTAL LENTH : This is a 16 bit field that defines the total
length (header plus data) of the IPv4 datagram in bytes. To find the
length of the data coming from the upper layer from the total length.
Length of data= Total length – Header length
Encapsulation of a small datagram in an Ethernet frame
One of the reason why “total length” field is required.
Protocol field and encapsulated data
5. PROTOCOL : This 8 bit field defines the higher level
protocol that uses the services of the Ipv4 layer. An IPv4
datagram can encapsulated data from several higher level
protocol such as TCP, UDP, ICMP, and IGMP. This specifies the
final destination protocol to which the IPv4 datagram is
delivered.
6. CHECKSUM
• IPv4 checksum use the 1’s compliment method.
• Checksum only computes for IP header, not data
• Upper layer has checksum for data portion
• Header always changes in each router
• Header is chunked to 16-bit sections for computing
7. OPTION
• Option as the name implies, are not required for a
datagram.
• They can be used for network testing and debugging.
• Option process is required for IPv4 software.
7. OPTION(contd..)
Record route
End of option
No operation
Multiple byte
Single byte
Option
Time Stamp
Loose source route
Strict source route
Taxonomy of option in IPv4
NO OPERATION : A no operation is a 1 byte option used as a filler between
option
END OF OPTION: An end of option is a 1 byte option used for padding at the
end of the option field. It however can only be used as the past location.
RECORD ROUTE: An record route is used to record the internet router that
handle the datagram. It can list up to nine router
7. OPTION(contd..)
STRICT SOURCE ROUTE: A strict route option is used by the source to
predetermine a route for the datagram as its travel through the internet.
LOOSE SOURCE ROUTE : A loose source route option is similar to the
strict source route, but it is less rigid. Each router in the list must be visited , but
the datagram can visit other router as well.
TIMESTAMP: A timestamp option is used to record the time of datagram
processing by a router. The time is expressed in million seconds from midnight
 Datagram can travel through different network.
 Each router decapsulates the IPv4 datagram from the frame it
receives, and then encapsulate it in another protocol.
 The format and size of the received and sent frame depends on the
protocol used by the physical through which the frame has just traveled
 Dividing the datagram which make it possible to pass through the
other physical network is called fragmentation.
 For example, if a router connects a LAN or WAN, its receives a frame
in the LAN format and sends a frame in the WAN format.
Application may request a specific type of service
Protocol TOS bits Description
ICMP 0000 normal
BOOTP 0000 normal
NNTP 0001 Minimize cost
IGP 0010 Maximize reliability
SNMP 0010 Maximize reliability
TELNET 1000 Minimize delay
FTP(data) 0100 Maximize
throughput
FTP(control) 1000 Minimize delay
TFTP 1000 Minimize delay
SMTP(command) 1000 Minimize delay
SMTP(data) 0100 Maximize
throughput
DNS(UDP query) 1000 Minimize delay
DNS(TCP query) 0000 normal
DNS(zone) 0100 Maximize
throughput
MAXIMUM TRANSFER UNIT
 Each data link layer protocol has its own frame format in most
protocol.
 When a datagram is encapsulated in a frame, the total size of
the datagram must be less than its maximum size which is
defined by the restriction imposed by the hardware and
software used in the network
 To make the IPv4 protocol independent of the physical network, the
designers to make the maximum length of the IPv4 datagram equal to
65,535 bytes.
MTU’s FOR SOME NETWORKS
 When a datagram is fragmented, each fragment has its own
header with most of the field repeated, but with some changed.
 A fragmented datagram may itself be fragmented if it
encounter a network with an even smaller MTU
 The reassembly of the datagram is done by the destination
host because each fragment becomes an independent
datagram.
 The host or router that fragments a datagram must change the
values of three fields : flags, fragmentation offset, total length. The
rest of the field must be copied.
7. IDENTIFICATION
This is a 16 bit field that identifies a datagram originating from the
source host.
 The combination of the identification and source IPv4 address must
uniquely define a datagram as it leaves the source host.
 When a datagram is fragmented, the value in the identification
field is copied to all the fragment.
 The identification number helps the destination in reassembling the
datagram
8. FLAG
This is 3 bit field. The first bit is reversed. The second bit is called the
donot fragment bit.
 If its value is 1, the machine must not fragment the datagram.
 If its value is 0, the datagram can be fragmented if necessary.
 The third bit is called the “more fragment bit”
9. FLAG(contd..)
 If its value is 1, it means the datagram is not the last fragment, there
are more fragment after this one.
 If its value is 0, it means this is the last or only fragment.
10.FRAGMENTATION OFFSET
 This is a 13 bit field that shows the relative position of this fragment
with respect to the whole datagram.
 It is the offset of the data in the original datagram measured in units
of 8 bytes.
Fragmentation Example
IPv6 PACKET FORMAT
 Each packet is composed of a mandatory base header followed
by the payload.
 The payload consist of two parts: optional extension header and
data from an upper layer.
 The base header occupies 40 bytes , whereas the extension
header and data from the upper layer contains up to 65,535 byte of
information
FORMAT OF IPv6 DATAGRAM
FORMAT OF IPv6
DATAGRAM(contd..)
 VERSION: This 4 bit field defines the version number of the IP. For IPv6, the
value is 6.
 PRIORITY: The 4 bit priority field defines the priority of the packet with
respect to the traffic congestion.
 FLOW LABEL: The flow label is a 3 byte(24 bit) field that is designed to
provide special handling for the particular flow of the data.
 PAYLOAD LENGTH: The 2 byte payload length field defines the length of
the IP datagram excluding in the base header.
 NEXT HEADER: The next header is an 8 bit field defining the header that
follows the base header in the datagram. The next header is either one of the
optional extension header used by the IP or header of an encapsulated packet such
as UDP or TDP.
 HOP LIMIT: This HOP limit is a 8 bit field that serves the same purpose as the
TTL field in the Ipv4.
 SOURCE ADDRESS: The source address field is a 16 byte Internet address
that identifies the original source of the datagram.
 DESTINATION ADDRESS: The destination address is a 16 byte Internet
address that usually identifies the final destination of the datagram
Value for higher level protocol
VIRTUAL CIRCUIT NETWORK
 Virtual circuit network is a cross between a circuit switched network
and a datagram network.
 As in a circuit switch network there is a setup and a tear down phase in
addition to the data-transfer phase.
 The resources can be allocated during the setup phase as in a circuit
switched network or on a demand as in a datagram network.
 As in a circuit switched network, all packets follow the same path
established during the connection.
 A virtual circuit is normally implemented in a data link layer.
VIRTUAL CIRCUIT APPROACH IN
A WAN
• FRAME RELAY : A frame relay is a relatively high-
speed protocol that can provide some service not
available in other WAN technologies such as DSL,
cable TV, and T lines.
• ATM : ATM, as a high speed protocol, can be the
superhighway of communication when it deploys
physical layer carriers such as SONET.
 Frame Relay is a virtual circuit wide –area network that was designed in
response to demands for a new type of WAN in the late 1980s and early 1990s.
 Frame Relay operates at a higher speed(1.544 Mbps & recently 44.376 Mbps)
 Frame Relay operates in just the physical and data link layer. This means it can
be easily used as a backbone network to provide services to protocol that
already have a network layer protocol such as the internet.
 Frame relay allows bursty data.
 Frame Relay allows a frame size of 9000 bytes, which can accommodate all
local area network frame sizes.
 Frame Relay is less expensive than other traditional WANs.
 Frame Relay has error detection at the data link layer only. There is no floe
control or error control.
WHY USE FRAME RELAY?
 Prior to Frame Relay, some organization were using a virtual-circuit
switching network called X.25 that perform switching at the network layer.
 X.25 has a low 64-kbps data rate. By the 1990s, there was a need for
higher data rate WANs.
 X.25 has extensive flow and error control at both the data link layer and
the network layer.
 Originally X.25 was designed for private use, not for the Internet.
 X.25 has its own network layer. This means that the user’s data are
encapsulated in the network layer packets of X.25. This doubles the
overhead.
 Disappointed with X.25, some organization started their own private
WAN by leasing T-1 or T-2 lines from public service providers. This
approach has some drawback which are as:
 If an organization has n branches spread over an area , it needs n(n-1)/2 T-
1 or T-3 lines. The organization pays for all these lines although it may use
the lines only 10 percent of the time. This can be very costly.
The service provided by T-1 and T-3 lines assumes that the user has fixed
rate data all the time. So this type of service is not suitable for the many users
today that need to send bursty data
CONTD…..
FRAME RELAY ARCHITECTURE
• FR provides permanent virtual circuits and
switched virtual circuits.
• The FR WAN is used as one link in the global
Internet.
Switch Table matches an
incoming port-DLCI
combination with an outgoing
port-DLCI combination.
A virtual circuit in Frame Relay is identified by a number called a “DATA
LINK CONNECTION IDENTIFIER(DLCI)”
PERMANENT VS. SWITCHED
VIRTUAL CIRCUITS
 In PVC the connection setup is very simple. The corresponding table
entry is recorded for all switches by the administrator (remotely and
electronically). An outgoing DLCI is given to the source, and an
incoming DLCI is given to the destination.
 PVCs have 2 drawbacks:
 Costly…pay for connection all the time
 A connection is created from one source to one single destination. If
a source needs connections with several destinations, it needs a
PVC for each connection.
 SVC creates a temporary, short connection that exists only when the
data are being transferred between source and destination. SVC
requires establishing and terminating phases (Chapter 8).
FRAME RELAY LAYER
Data link
Simplified core function
of data link layer
Physical
ANSI Standard
“Frame Relay operates only at the physical layer and data link layer”
PHYSICAL LAYER :
No specific protocol is defined for the physical layer in Frame Relay.
Instead, it is left to the implementer to use whatever is available.
Frame relay supports any of the protocol recognized by ANSI
FRAME RELAY LAYER(contd.)
DATA LINK LAYER :
At the data link layer, Frame Relay uses a simple protocol that does
not support flow or error control. It has only an error detection
mechanism
FRAME RELAY AND IP
The TCP/IP protocol suite has become a widely accepted standard for
network communications.
IP, the Internet Protocol, is the component of the TCP/IP suite that is
responsible for routing data to its destination. IP operates at layer 3, the
network layer
 Frame relay is very well-suited to carrying IP datagram traffic, which typically
is bursty in nature.
 Frame relay and IP are a well-matched team—they work well together to
make efficient use of wide area bandwidth.
IP
NETWORK LAYER
FRAME RELAY
DATA LINK LAYER
PHYSICAL LAYER
IP and frame relay
layering
USING FRAME RELAY IN AN IP
NETWORK
 A frame relay circuit can simply be used as a replacement for a point-to-
point leased line in an IP network.
“Replacing a leased line with a frame relay circuit”
VIRTUAL IP SUBNET
 Multiple IP routers can be connected into a frame relay
configuration that behaves like a virtual LAN—or in IP terminology,
a virtual IP subnet.
 An IP subnet is a set of systems (usually located on a LAN) that
have some special characteristics:
a. Their IP addresses start with the same network and subnet
numbers.
b. Any system can communicate directly with any other system in
the subnet. Data will not flow through an intermediate router
VIRTUAL IP SUBNET(contd.)
 This is a fully meshed set of connections—that is, each system has
direct connections to the other systems and hence can communicate
directly with the other systems.
FRAME RELAY FRAME
 ADDRESS (DLCI) FIELD: 10-bit DLCI field represents the address of the frame
and corresponds to a PVC.The first 6 bits of the first byte makes up the first part of
the DLCI. The second part of the DLCI uses the first 4 bits of the second byte.
These are the parts of the 10 bits DLCI defined by the Standard.
 COMMAND/RESPONSE(C/R) : The command/response(C/R) bit is provided to
allow upper layer to identify a frame as either a command or a response. It is not
used by the frame relay protocol.
FRAME RELAY FRAME(contd.)
 EXTENDED ADDRESS(EA) : The extended address (EA) bit indicates whether
the current byte is the final byte of the address. An EA of 0 means that another
address byte is to follow. An EA of 1 means that the current byte is the final one.
 FORWARD EXPLICIT CONGESTION NOTIFICATION(FECN) : The FECN bit can
be set by any switch to indicate that traffic is congested. This bit inform the
destination that congestion has occurred.
 BACKWARD EXPLICIT CONGESTION NOTIFICATION(BECN) : The BECN bit is
set (in frame that travel in the other direction) to indicate a congestion problem in
the network. This bit inform the sender that congestion has occurred.
 DISCARD ELIGIBILITY(DE) : The discard eligibility bit indicates the priority level
of the frame. In emergency situation, switches may have to discard frames to
relieve bottleneck and keep the network from collapsing due to overload.
THREE ADDRESS FORMAT
(EXTENDED ADDRESS)
FRAME RELAY
ASSEMBLER/DISASSEMBLER(FRAD)
To handle frames arriving from other protocol, frame relay uses a device called
a Frame Relay assembler/dissasembler(FRAD).
A FRAD assembles and disassembles frame coming from other protocol to
allow to be carried by Frame Relay frames.
A FRAD can be implemented as a separate device or as part of a switch.
VOICE OVER FRAME RELAY(VOFR)
 VOFR is offered by the Frame Relay Network that sends voice through the
network.
 Voice is digitized using PCM and then compressed. The result is sent as data
frames over the network.
 VOFR allows the inexpensive sending of voice over long distances.
 The quality of voice is not as good as voice over a circuit switched network
such as the telephone network
PRO’S AND CONS OF FRAME RELAY
PRO’S :
 In many scenario's involving long haul, high speed connections, it is cheaper
than dedicated lines.
 There is a cheap solution to incorporate redundancy in the network.
 Less hardware is needed to for the same amount of connections
CONS :
There may be jams; no guaranteed bandwidth.
 In a point-to-point scenario it is not economically feasible.
 In short haul, it is not economically feasible.
ASYNCHRONOUS TRANSFER
MODE(ATM)
 Asynchronous Transfer Mode, a network technology based on
transferring data in cells or packets of a fixed size.
 ATM was developed to meet the need of the “Broadband Integrated
service digital network” as defined in the late 1980’s and designed to unify
telecommunication and computer network.
 Asynchronous transfer mode(ATM) is the cell relay protocol designed by
the ATM Forum and adopted by the ITU-T.
 The cell used with ATM is relatively small compared to units used with
older technologies.
 The small, constant cell size allows ATM equipment to transmit video,
audio, and computer data over the same network, and assure that no
single type of data hogs the line.
DESIGN GOALS
 A technology is needed for the transmission system to optimize the use of high-
data rate transmission media.
 The system must interface with existing system and provide wide area
interconnectivity between them without lowering their effectiveness or requiring
their replacement.
 The design must be implemented inexpensively so that cost would not be a
barrier to adoption.
 The new system must be able to work with and support the existing
telecommunications hierarchies.
 The new system must be connection oriented to ensure accurate and
predictable delivery.
PROBLEM WITH THE EXISTING
SYSTEM
FRAME NETWORK :
 Before ATM, data communication at the data link layer had been based on
frame switching and frame network.
 Different protocol uses frames of varying size.
 As the network become more complex, the information in the header
become more extensive and this result in larger header.
 Due to large header some protocol have enlarge the size of the data unit
to make use header more efficient by sending more data with same size
header.
 If there is not much more information to transmit, much of the field goes
unused.
MULTIPLEXING USING DIFFERENT FRAME SIZES
 If line 1’s frame X arrives at the multiplexer even a moment earlier than line 2’s
frames, the multiplexer puts frame X onto the new path first.
 The multiplexer will first process the arrived frame X before considering the frame
of line 2’s.
 Therefore frame A must wait for the entire X bit stream to move into place before
it can follow.
 The sheer size of X creates an unfair delay for frame A.
MIXED FRAME NETWORK :
CELL NETWORK :
 Many of the problems associated with frame internetworking are solved by
adopting a concept called cell networking.
 A cell is a small data unit of fixed size.
 In a cell network , all data which are to be transmitted are loaded into the
identical cells that are transmitted with complete predictability and uniformity.
 When a frames of different sizes and formats reaches the cell network from a
tributary network, they are split into the multiple small data unit of equal length and
are loaded into cells.
MULTIPLEXING USING CELLS
CELL NETWORK(contd.) :
 Here the Frame X has been divided into three cells: X,Y and Z. Only the first
cell from line 1 gets put on the link before the first cell from line 2.
 The high speed of the links coupled with the small size of the cells mean that,
despite interleaving, cells from each line arrive at their respective destination in
an continuous stream.
 A cell network can handle real transmission such as phone call.
ATM MULTIPLEXING
 ATM use asynchronous time division multiplexing- that is why it is called
Asynchronous Transfer Mode- to multiplex cells coming from different channels.
 It uses a fixed size slot(size of a cell).
 ATM multiplexer fill a slot with a cell from any input channel that has a cell, the slot
is empty if none of the channels has cell to send.
 At the first tick of the clock, channel 2 has no cell, so the multiplexer fills the slot
with a cell from the third channel.
 When all the cells from all the channels are multiplexed, the output slots are
empty..
ARCHITECTURE OF AN ATM
NETWORK
 ATM is a cell switched network.
 The user access device is called the end-points, are connected through a
“user-to-network interface(UNI)” to the switches inside the network.
 The switches are connected through “network-to-network interface(NNIs)”
VIRTUAL CONNECTION
Connection between two endpoints is accomplished through
transmission paths(TPs), virtual paths, and virtual circuits(VCs)
TRANSMISSION PATH(TP) : A transmission path (TP) is the physical
connection wire(wire, cable etc) between an endpoints and a switch.
Think of two switches as two cities. A transmission path is the set of all
highways that directly connect the two cities.
VIRTUAL PATHS(VP) : A virtual Paths (VP) provides a connection or a set of
connection between two switches. A highway between two cities is a virtual
path.
VIRTUAL CIRCUITS(VCs) : Cell network are based on virtual circuits(VCs) .
All cells belonging to a single message follow the same virtual circuit and remain
in their original order until they reach their destination. Think of a virtual circuits
as a lane of a highway
Fig. : Example of VPs and VCs
VIRTUAL CONNECTION IDENTIFIER
 In virtual circuit network, to route data from one end-point to another, the
virtual connection need to be identified.
 The designer of the ATM creates a hierarchal with two level : Virtual path
identifier(VPI) and Virtual circuit identifier(VCI)
VIRTUAL CONNECTION IDENTIFIER
IN UNIs AND NNIs
 In a UNI, the VPI is 8 bits whereas in an NNI, the VPI is 12 bits. The length of
the VCI is the same in both interface(16 bits).
 The whole idea behind dividing a virtual circuit identifier into two parts is to allow
hierarchal routing.
 Most of the switches in a typical ATM network are routed using VPIs.
 The switches at the boundary of the network, those that interact directly with the
endpoints use both VPIs and VCIs
ATM CELL
 The basic data unit in an ATM network is called a cell.
 A cell is only 53 bytes long with 5 bytes allocated to the header and 48 bytes
carrying the payload(user data may be less than 48 bytes).
CONNECTION IN ATM
ATM uses two type of connection : PVC and SVC
PVC : A permanent virtual circuit connection is established between two
endpoints by the network provider. The VPI and VCI are defined for the
permanent connection and the values are entered for the table of each switch.
SVC :
 In a switched virtual circuit connection, each time an end points wants to make
a connection with another endpoints, a new virtual circuit must be established.
 ATM cannot do the job by itself, but needs the network layer addresses and the
services of another protocol such as IP.
ROUTING WITH A SWITCH
 ATM uses switches to route the cell from a source endpoint to the destination
endpoints.
 A switch routes the cell using both the VPIs and the VCIs
 The switch checks it switching table which stores six pieces of information per
row: arrival interface number, incoming VPI & VCI, corresponding output ports,
Outgoing VPI & VCI.
ATM LAYER
PHYSICAL LAYER :
Like ethernet and wireless LANs, ATM cells can be carried by
any physical layer carrier.
PHYSICAL LAYER(contd..):
 SONET: The design of ATM was based on SONET.
 SONET is preferred for two reasons.
 First, the high rate of SONET’s carrier reflects the design
and philosophy of ATM.
 Second, In SONET the boundaries of cells can be clearly
defined.
ATM LAYER:
 The ATM layer provides routing, traffic management,
switching, and multiplexing service.
 It process outgoing traffic by accepting 48 byte segments
from AAL sub layer and transforming into 53- byte cells by the
addition of a 5 byte header
ATM LAYER(contd..):
ATM HEADER
ATM HEADER(contd..)
 ATM uses two format for this header, one for user-to-network
interface(UNI) cells and another for network to network interface(NNI)
cells
 Generic flow control(GFC): The 4 bit GFC field provides floe
control at the UNI level. In the NNI header, these bits are added to
the VPI. The longer VPI allows more virtual path to be defined at the
NNI level.
 Virtual path identifier(VPI): The VPI is an 8 bit field in a UNI cells
and a 12 bit field in an NNI cells.
 Payload type(PT): In the 3 bit PT field, the first bit defines the
payload as user data or managerial. The interpretation of the last 2
bits depend on the first bit.
 Cell loss priority(CLP): The 1 bit CLP field is provided for
congestion control.
 Header error correction(HEC): The HEC is a code computed for
the first 4 bytes header
APPLICATION ADAPTION LAYER:
 The application adaption layer (AAL) was designed to enable two
ATM concept.
 ATM must accept any type of payload, both data frames and
streams of bits.
 To accept continuous bits streams and break them into chunks to
be encapsulated into a cells at the ATM layer , it uses two sub layer.
 The payload must be segmented into 48- bytes segment carried by
the cells. At the destination these segment need to be reassembled
to recreate the original payload. The AAL defines a sub layer called
“segmentation and reassemble(SAR)” sub layer to do so.
 Before data are segmented by SAR, they must be prepared to
guarantee the integrity of the data. This is done by the sub layer
called convergence sub layer(CS)
APPLICATION ADAPTION LAYER(contd..) :
 ATM defines four versions of AAL : AAL1, AAL2, AAL3/4, AAL5
AAL1:
 AAL1 supports application that transfer information at constant bit
rates such as video and voice.
 It allows ATM to connect existing digital telephone networks such as
voice channels and T- channels.
AAL1(contd..):
 The CS sub layer divides the bit stream into 47 bytes segment and passes
them to SAR sub layer.
 The SAR sub layer adds 1 byte of header and passes the 48 byte segment
to the ATM layer. The Header has two field:
Sequence number(SN) : This 4 bit field defines a sequence number to
order the bits.
 Sequence number protection(SNP): The second 4 bit field protects the
first field. The first 3 bit automatically corrects the SN field. The last bit is a
parity bit that detects error over all 8 bits.
AAL2:
 Originally AAL2 was intended to support a variable data rate bit stream
but it has been redesigned.
 It is now used for low-bit-rate traffic and short – frame traffic such as
audio(compressed or uncompressed ) , video, fax.
 A good example of AAL2 uses is in mobile telephony.
AAL2(contd):
The CS layer overhead consists of five layer
 Channel identifier(CID) : The 8 bit field defines the channel of the short
packet.
 Length indicator(LI): The 6 bit LI field indicates how much of the final
packet is data.
AAL2(contd..):
 User-to-user indicator(UUI): The UUI field can be used by end to end users.
 Header error control(HEC): The last 5 bits is used to correct errors in the
header
AAL3/4:
AAL3/4I(contd..):
 Common part identifier(CPI): The CPI defines how the subsequent field are
to be interpreted.
 Begin Tag(Btag): The value of this field is repeated in each cell to identify all
the cells belonging to the same packet.
 Buffer allocation size(BA size): The 2 byte BA field tells the receiver what size
buffer is needed for the coming data.
 Alignment(AL): The 1 byte AL field is included to make the rest of the trailer 4
byte long.
 Ending tag(Etag): The 1 byte ET field serves as an ending flag. Its value is the
same as that of the beginning tag.
Length (L): The 2 byte L field indicates the length of the data unit.
The CS layer header and trailer consist of six field:
The SAR header and trailer consist of five fields:
 Segment Type (ST): The 2 bit ST identifier specifies the position of the segment
in the message: beginning(0), middle(01), or end(10).
 Sequence Number(SN): This field is the same as defined previously.
 Multiplexing Identifier(MID): The 10 Bit MID field identifies cells coming from
different data flows and multiplexed on the same virtual connection.,
 CRC: The last 10 bit of the trailer is a CRC for the entire data unit.
AAL5:
The four trailer fields in the CS layer are:
 User – to user(UU): This field is used by end users.
Common part identifier(CPI): This defines how the subsequent fields are to
be interpreted.
Length(L): The 2 byte L fields indicates the length of the original data.
CRC: The last 4 byte is for error control on the entire data unit
ATM LANS
 The ATM technology can be adapted to local area network called ATM
LANs.
 The high data rate of technology (155 to 622 Mbps) has attracted the
attention of designer who are looking for greater and greater speed of
LAN.
 ATM technology supports different type of connection between two
end user. Its support permanent and temporary connection.
 ATM technology supports multimedia communication with a wide
variety of bandwidth for different application.
 An ATM LAN can be easily expanded in an organization
ATM LANs ARCHITECTURE
PURE ATM ARCHITECTURE
 In a pure ATM LAN, an ATM switch is used to connect stations in the LAN.
 Stations can exchange data at one of two standard rates of ATM technology(155
and 652 Mbps)
 Station uses a virtual path identifier (VPI) and a virtual circuit identifier (VCI)
instead of a source and a destination address.
LEGACY ATM ARCHITECTURE
 In a legacy ATM LAN, stations on the same LAN can exchange data at the rate and
format of traditional LANs.
 The advantage here is that output from several LAN can be multiplexed together
to create a high data rate input to the ATM switch.
MIXED ARCHITECTURE
 In a mixed architecture LAN, it allows the gradual migration of legacy LANs onto
ATM LANs by adding more and more directly connected stations to the switch.
 The station is one specific LAN can exchange data using the format and data rate
of that particular LAN.
 The stations directly connected to the ATM switch can use an ATM frame to
exchange data
LAN Emulation(LANE)
 Connectionless versus connection-oriented :
 Traditional LANs are connectionless protocols . A station sends data packets to
another station whenever the packets are ready. There is no connection
establishment or connection termination phase.
 ATM is a connection oriented protocol . A station that wishes to send cells to
another station must first establish a connection and after all the cells are sent ,
connection is terminated.
 Physical addresses versus virtual-circuit identifiers:
 A connectionless protocol defines the route of a packet through source and
destination addresses.
 A connection-oriented protocol defines the route of a cell through virtual
connection identifiers(VPIs and VCIs).
 Multicasting and broadcasting delivery :
 Traditional LANs can cast both multicast and broadcast packets. A station can
send packets to a group of stations or to all stations.
 In ATM network , there is no easy way to multicasts or broadcast , although point-
to-multipoint connections are available.
 Interoperability : In a mixed architecture, a station connected to a legacy LAN
must be able to communicate with a station directly connected to an ATM switch.
Client/Server Model
LEC
BUS
LES
LECS
ATM LAN
 LAN Emulation Client
 All ATM stations have LAN emulation client(LEC) software installed on the
three ATM protocols.
The upper-layer protocols are unaware of the existence of the ATM technology.
These protocols send their request to LEC for a LAN service such as
connectionless delivery using MAC unicast , multicast, or broadcast addresses.
The LEC just interprets the request and passes the result on to the servers.
 LAN Emulation Configuration Server
 The LAN emulation configuration server(LECS) is used for the initial connection
between the client and LANE. This server is always waiting to receive the initial
contact.
 It has a well-know ATM address that is known to every client in the system.
 Broadcast/Unknown Server
 Multicasting and broadcasting require the use of another server called the
Broadcast/Unknown server(BUS).
 If a station needs to send a frame to a group of stations or to every station, the
frame first goes to the BUS. The server has permanent virtual connection to every
station.
 The server creates copies of the received frame and sends a copy to a group of
stations or to all stations, simulating a multicasting or broadcasting process.
 The server can also deliver a unicast frame by sending frame to every station. In
this case , the address is unknown and it is sometimes more efficient than getting
the connection identifier from the LES.
Computer Network - Network Layer

Más contenido relacionado

La actualidad más candente

Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)Vivek Kumar
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 

La actualidad más candente (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
HDLC
HDLCHDLC
HDLC
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Network software
Network softwareNetwork software
Network software
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Routing
RoutingRouting
Routing
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 

Destacado

The Network Layer
The Network LayerThe Network Layer
The Network Layeradil raja
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmfarimoin
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATMMadhumita Tamhane
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Destacado (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Network design
Network designNetwork design
Network design
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Ip address
Ip addressIp address
Ip address
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 
Who Is Youth ?
Who Is Youth ?Who Is Youth ?
Who Is Youth ?
 

Similar a Computer Network - Network Layer

Similar a Computer Network - Network Layer (20)

IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
networking IPv4.pdf
networking IPv4.pdfnetworking IPv4.pdf
networking IPv4.pdf
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx474-22-DatagramForwarding.pptx
474-22-DatagramForwarding.pptx
 
Ip protocol
Ip protocolIp protocol
Ip protocol
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
 
C. N. II Lec.4.pdf h
C. N. II Lec.4.pdf                      hC. N. II Lec.4.pdf                      h
C. N. II Lec.4.pdf h
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 

Más de Manoj Kumar

Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation Manoj Kumar
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and GopherManoj Kumar
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopologyManoj Kumar
 
Caste a vote online
Caste a vote onlineCaste a vote online
Caste a vote onlineManoj Kumar
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Some Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologySome Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologyManoj Kumar
 

Más de Manoj Kumar (8)

Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation Artificial Intelligence : A Presentation
Artificial Intelligence : A Presentation
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopology
 
Caste a vote online
Caste a vote onlineCaste a vote online
Caste a vote online
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Some Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented MethodologySome Basic Concepts of Object Oriented Methodology
Some Basic Concepts of Object Oriented Methodology
 

Último

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Último (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Computer Network - Network Layer

  • 1.
  • 2.  Network layer is responsible for source to destination delivery of the packets.  The network layer must know the topology of the subnet and choose appropriate paths through it.  When source and destination are in different networks, the network layer (IP) must deal with these differences.  If two system are connected to the same link, there is usually no need for a network layer.
  • 3. H3 H3Data Data From Transport layer From data link layer To Transport layer To data link layer
  • 4. WAN LAN LAN LAN LAN F1 F1 F3 F2 F1 F2 F2 There is no provision in the data link(or physical layer) to make the routing decision as the frame does not carry any routing information. To solve the problem of delivery through several link, the network layer was designed. The network layer is responsible for host to host delivery and for routing the packets through routers and switches.
  • 5. LOGICAL ADDRESSING  Logical addressing are necessary for universal communication that are independent of underlying physical network.  The logical address in the Internet is a 32 bit address ROUTING  When independent network or link are connected to create internetwork or a large network, the connecting devices(router or switch) routes the packet to their final destination.
  • 6. Physical layer Data link layer Physical layer Data link layer End system a Network layer Physical layer Data link layer Physical layer Data link layer Transport layer Transport layer Messages Messages Segments End system b Network service Network service Network layer Network layer Network layer
  • 7. Routing table IP packet and routing information To data link layer Data from another protocol Processing Network layer The network layer at the source is responsible for creating a packet from data coming from another protocol such as transport layer protocol. It is responsible for checking its routing table to find the routing information. NETWORK LAYER AT THE SOURCE Source
  • 8. Routing table IP packet and routing information To data link layer Processing Network layer From data link layer Router The network layer at the switch or router is responsible for routing the packet. When a packet arrives, the router or switch consults its routing table and find the interface from which the packet must be send. After some changes in the header with the routing information is passed to the data link layer again. NETWORK LAYER AT THE SWITCH
  • 9. IP packet Fromdata link layer Data to another protocol Processing Network layer The network layer at the destination is responsible for address verification, it make sure that the destination address on the packet is the same as the address of the host. NETWORK LAYER AT THE DESTINATION Destination
  • 10. At the network layer, TCP/IP supports the Internetworking Protocol i.e. IP with four supporting protocol: ARP, RARP, ICMP, and IGMP. LOGICAL ADDRESSING  Transmission mechanism used by the TCP/IP protocol.  It is unreliable and connectionless protocol.  It does not provide error checking or tracking.  IP transport data in packets called datagram.  IP does not keep track of the routes and has no facility of reordering datagram. ADDRESS RESOLUTION PROTOCOL  Used to associate a logical address with a physical address.  ARP is used to find the physical address of the node when its internet address is known.
  • 11. REVERSE ADDRESS RESOLUTION PROTOCOL  Its allows a host to discover its Internet address when its knows only its physical address.  It is used when a computer is connected to a network for the first time. INTERNET CONTROL MESSAGE PROTOCOL  ICMP is used by hosts or gateways to send notification of datagram problems back to the sender.  Its send query and error reporting messages. INTERNET GROUP MESSAGE PROTOCOL  IGMP is used to facilitate the simultaneous transmission of a message to a group of recipients.
  • 12.  The internet at the network layer is a packet switched network.  Packet switching uses either the virtual circuit approach or the datagram approach.  The internet is chosen the datagram approach to switching in the network layer.  It uses the universal address defined in the network layer to route packets from the source to the destination.
  • 13. DATAGRAM  Packets in the IPv4 layer are called datagram.  A datagram is a variable-length packet consisting of two parts : header and data.  The header is 20 to 60 bytes in length and contains information essential to routing and delivery.
  • 14.
  • 15. 1. VERSION(VER) : This 4-bit field defines the version of the IPv4 protocol. This field tells the IPv4 software running in the processing machine that the datagram has the format of version 4. 2. HEADER LENGTH(HLEN) :This 4 bit field defines the total length of the datagram header in 4 byte word. This field is needed because the length of the header is variable. When there are no option the header length is 20 bytes and value of this field is 5. When the option field is at its max. size the value is 15.
  • 16. 3. SERVICES : This is a 8 bit field previously called service type is now called differentiated service.  SERVICE TYPE : In this interpretation the first 3 bit are called the precedence bits and the next 4 bits are called type of service(TOS) bits Precedence TOS Bits D T R C D : Minimize delay, T: Maximize Throughput R: Maximize reliability, C: Minimize Cost 1. PRECEDENCE : This is a 3 bit field ranging from 0(000 in binary) to 7(111 in binary). The precedence defines the priority of the datagram in issue such as congestion. If a router is congested then the lower precedence datagram are discarded.
  • 17. TOS BITS Description 0000 Normal(default) 0001 Minimize Cost 0010 Maximize Reliability 0100 Maximize Throughput 1000 Minimize delay
  • 18.  DIFFERENTIATED SERVICES : In this interpretation the first 6 bits make up the code point subfield and the last 2 bits are not used. It can be used in two different ways: a) When the 3 rightmost bits are 0’s, the 3 leftmost bits are interpreted the same as the precedence bits in the service type interpretation. In other word it is compatible with the old interpretation. b) When the three rightmost bits are not all 0’s , the 6 bits define 64 services based on the priority assignment by the internet or local authorities. Category Code point Assigning authority 1 XXXXX0 Internet 2 XXXX11 Local 3 XXXX01 Temporary or experimental The first category contain 32 services type, the second and third contain 16 services types
  • 19. 4. TOTAL LENTH : This is a 16 bit field that defines the total length (header plus data) of the IPv4 datagram in bytes. To find the length of the data coming from the upper layer from the total length. Length of data= Total length – Header length Encapsulation of a small datagram in an Ethernet frame One of the reason why “total length” field is required.
  • 20. Protocol field and encapsulated data 5. PROTOCOL : This 8 bit field defines the higher level protocol that uses the services of the Ipv4 layer. An IPv4 datagram can encapsulated data from several higher level protocol such as TCP, UDP, ICMP, and IGMP. This specifies the final destination protocol to which the IPv4 datagram is delivered.
  • 21. 6. CHECKSUM • IPv4 checksum use the 1’s compliment method. • Checksum only computes for IP header, not data • Upper layer has checksum for data portion • Header always changes in each router • Header is chunked to 16-bit sections for computing 7. OPTION • Option as the name implies, are not required for a datagram. • They can be used for network testing and debugging. • Option process is required for IPv4 software.
  • 22. 7. OPTION(contd..) Record route End of option No operation Multiple byte Single byte Option Time Stamp Loose source route Strict source route Taxonomy of option in IPv4 NO OPERATION : A no operation is a 1 byte option used as a filler between option END OF OPTION: An end of option is a 1 byte option used for padding at the end of the option field. It however can only be used as the past location. RECORD ROUTE: An record route is used to record the internet router that handle the datagram. It can list up to nine router
  • 23. 7. OPTION(contd..) STRICT SOURCE ROUTE: A strict route option is used by the source to predetermine a route for the datagram as its travel through the internet. LOOSE SOURCE ROUTE : A loose source route option is similar to the strict source route, but it is less rigid. Each router in the list must be visited , but the datagram can visit other router as well. TIMESTAMP: A timestamp option is used to record the time of datagram processing by a router. The time is expressed in million seconds from midnight
  • 24.  Datagram can travel through different network.  Each router decapsulates the IPv4 datagram from the frame it receives, and then encapsulate it in another protocol.  The format and size of the received and sent frame depends on the protocol used by the physical through which the frame has just traveled  Dividing the datagram which make it possible to pass through the other physical network is called fragmentation.  For example, if a router connects a LAN or WAN, its receives a frame in the LAN format and sends a frame in the WAN format.
  • 25. Application may request a specific type of service Protocol TOS bits Description ICMP 0000 normal BOOTP 0000 normal NNTP 0001 Minimize cost IGP 0010 Maximize reliability SNMP 0010 Maximize reliability TELNET 1000 Minimize delay FTP(data) 0100 Maximize throughput FTP(control) 1000 Minimize delay TFTP 1000 Minimize delay SMTP(command) 1000 Minimize delay SMTP(data) 0100 Maximize throughput DNS(UDP query) 1000 Minimize delay DNS(TCP query) 0000 normal DNS(zone) 0100 Maximize throughput
  • 26. MAXIMUM TRANSFER UNIT  Each data link layer protocol has its own frame format in most protocol.  When a datagram is encapsulated in a frame, the total size of the datagram must be less than its maximum size which is defined by the restriction imposed by the hardware and software used in the network  To make the IPv4 protocol independent of the physical network, the designers to make the maximum length of the IPv4 datagram equal to 65,535 bytes.
  • 27. MTU’s FOR SOME NETWORKS
  • 28.  When a datagram is fragmented, each fragment has its own header with most of the field repeated, but with some changed.  A fragmented datagram may itself be fragmented if it encounter a network with an even smaller MTU  The reassembly of the datagram is done by the destination host because each fragment becomes an independent datagram.  The host or router that fragments a datagram must change the values of three fields : flags, fragmentation offset, total length. The rest of the field must be copied.
  • 29. 7. IDENTIFICATION This is a 16 bit field that identifies a datagram originating from the source host.  The combination of the identification and source IPv4 address must uniquely define a datagram as it leaves the source host.  When a datagram is fragmented, the value in the identification field is copied to all the fragment.  The identification number helps the destination in reassembling the datagram 8. FLAG This is 3 bit field. The first bit is reversed. The second bit is called the donot fragment bit.  If its value is 1, the machine must not fragment the datagram.  If its value is 0, the datagram can be fragmented if necessary.  The third bit is called the “more fragment bit”
  • 30. 9. FLAG(contd..)  If its value is 1, it means the datagram is not the last fragment, there are more fragment after this one.  If its value is 0, it means this is the last or only fragment. 10.FRAGMENTATION OFFSET  This is a 13 bit field that shows the relative position of this fragment with respect to the whole datagram.  It is the offset of the data in the original datagram measured in units of 8 bytes. Fragmentation Example
  • 31. IPv6 PACKET FORMAT  Each packet is composed of a mandatory base header followed by the payload.  The payload consist of two parts: optional extension header and data from an upper layer.  The base header occupies 40 bytes , whereas the extension header and data from the upper layer contains up to 65,535 byte of information
  • 32. FORMAT OF IPv6 DATAGRAM
  • 33. FORMAT OF IPv6 DATAGRAM(contd..)  VERSION: This 4 bit field defines the version number of the IP. For IPv6, the value is 6.  PRIORITY: The 4 bit priority field defines the priority of the packet with respect to the traffic congestion.  FLOW LABEL: The flow label is a 3 byte(24 bit) field that is designed to provide special handling for the particular flow of the data.  PAYLOAD LENGTH: The 2 byte payload length field defines the length of the IP datagram excluding in the base header.  NEXT HEADER: The next header is an 8 bit field defining the header that follows the base header in the datagram. The next header is either one of the optional extension header used by the IP or header of an encapsulated packet such as UDP or TDP.  HOP LIMIT: This HOP limit is a 8 bit field that serves the same purpose as the TTL field in the Ipv4.  SOURCE ADDRESS: The source address field is a 16 byte Internet address that identifies the original source of the datagram.  DESTINATION ADDRESS: The destination address is a 16 byte Internet address that usually identifies the final destination of the datagram
  • 34. Value for higher level protocol
  • 35.
  • 36. VIRTUAL CIRCUIT NETWORK  Virtual circuit network is a cross between a circuit switched network and a datagram network.  As in a circuit switch network there is a setup and a tear down phase in addition to the data-transfer phase.  The resources can be allocated during the setup phase as in a circuit switched network or on a demand as in a datagram network.  As in a circuit switched network, all packets follow the same path established during the connection.  A virtual circuit is normally implemented in a data link layer.
  • 37. VIRTUAL CIRCUIT APPROACH IN A WAN • FRAME RELAY : A frame relay is a relatively high- speed protocol that can provide some service not available in other WAN technologies such as DSL, cable TV, and T lines. • ATM : ATM, as a high speed protocol, can be the superhighway of communication when it deploys physical layer carriers such as SONET.
  • 38.  Frame Relay is a virtual circuit wide –area network that was designed in response to demands for a new type of WAN in the late 1980s and early 1990s.  Frame Relay operates at a higher speed(1.544 Mbps & recently 44.376 Mbps)  Frame Relay operates in just the physical and data link layer. This means it can be easily used as a backbone network to provide services to protocol that already have a network layer protocol such as the internet.  Frame relay allows bursty data.  Frame Relay allows a frame size of 9000 bytes, which can accommodate all local area network frame sizes.  Frame Relay is less expensive than other traditional WANs.  Frame Relay has error detection at the data link layer only. There is no floe control or error control.
  • 39. WHY USE FRAME RELAY?  Prior to Frame Relay, some organization were using a virtual-circuit switching network called X.25 that perform switching at the network layer.  X.25 has a low 64-kbps data rate. By the 1990s, there was a need for higher data rate WANs.  X.25 has extensive flow and error control at both the data link layer and the network layer.  Originally X.25 was designed for private use, not for the Internet.  X.25 has its own network layer. This means that the user’s data are encapsulated in the network layer packets of X.25. This doubles the overhead.  Disappointed with X.25, some organization started their own private WAN by leasing T-1 or T-2 lines from public service providers. This approach has some drawback which are as:
  • 40.  If an organization has n branches spread over an area , it needs n(n-1)/2 T- 1 or T-3 lines. The organization pays for all these lines although it may use the lines only 10 percent of the time. This can be very costly. The service provided by T-1 and T-3 lines assumes that the user has fixed rate data all the time. So this type of service is not suitable for the many users today that need to send bursty data CONTD…..
  • 41. FRAME RELAY ARCHITECTURE • FR provides permanent virtual circuits and switched virtual circuits. • The FR WAN is used as one link in the global Internet. Switch Table matches an incoming port-DLCI combination with an outgoing port-DLCI combination. A virtual circuit in Frame Relay is identified by a number called a “DATA LINK CONNECTION IDENTIFIER(DLCI)”
  • 42. PERMANENT VS. SWITCHED VIRTUAL CIRCUITS  In PVC the connection setup is very simple. The corresponding table entry is recorded for all switches by the administrator (remotely and electronically). An outgoing DLCI is given to the source, and an incoming DLCI is given to the destination.  PVCs have 2 drawbacks:  Costly…pay for connection all the time  A connection is created from one source to one single destination. If a source needs connections with several destinations, it needs a PVC for each connection.  SVC creates a temporary, short connection that exists only when the data are being transferred between source and destination. SVC requires establishing and terminating phases (Chapter 8).
  • 43. FRAME RELAY LAYER Data link Simplified core function of data link layer Physical ANSI Standard “Frame Relay operates only at the physical layer and data link layer” PHYSICAL LAYER : No specific protocol is defined for the physical layer in Frame Relay. Instead, it is left to the implementer to use whatever is available. Frame relay supports any of the protocol recognized by ANSI
  • 44. FRAME RELAY LAYER(contd.) DATA LINK LAYER : At the data link layer, Frame Relay uses a simple protocol that does not support flow or error control. It has only an error detection mechanism
  • 45. FRAME RELAY AND IP The TCP/IP protocol suite has become a widely accepted standard for network communications. IP, the Internet Protocol, is the component of the TCP/IP suite that is responsible for routing data to its destination. IP operates at layer 3, the network layer  Frame relay is very well-suited to carrying IP datagram traffic, which typically is bursty in nature.  Frame relay and IP are a well-matched team—they work well together to make efficient use of wide area bandwidth. IP NETWORK LAYER FRAME RELAY DATA LINK LAYER PHYSICAL LAYER IP and frame relay layering
  • 46. USING FRAME RELAY IN AN IP NETWORK  A frame relay circuit can simply be used as a replacement for a point-to- point leased line in an IP network. “Replacing a leased line with a frame relay circuit”
  • 47. VIRTUAL IP SUBNET  Multiple IP routers can be connected into a frame relay configuration that behaves like a virtual LAN—or in IP terminology, a virtual IP subnet.  An IP subnet is a set of systems (usually located on a LAN) that have some special characteristics: a. Their IP addresses start with the same network and subnet numbers. b. Any system can communicate directly with any other system in the subnet. Data will not flow through an intermediate router
  • 48. VIRTUAL IP SUBNET(contd.)  This is a fully meshed set of connections—that is, each system has direct connections to the other systems and hence can communicate directly with the other systems.
  • 49. FRAME RELAY FRAME  ADDRESS (DLCI) FIELD: 10-bit DLCI field represents the address of the frame and corresponds to a PVC.The first 6 bits of the first byte makes up the first part of the DLCI. The second part of the DLCI uses the first 4 bits of the second byte. These are the parts of the 10 bits DLCI defined by the Standard.  COMMAND/RESPONSE(C/R) : The command/response(C/R) bit is provided to allow upper layer to identify a frame as either a command or a response. It is not used by the frame relay protocol.
  • 50. FRAME RELAY FRAME(contd.)  EXTENDED ADDRESS(EA) : The extended address (EA) bit indicates whether the current byte is the final byte of the address. An EA of 0 means that another address byte is to follow. An EA of 1 means that the current byte is the final one.  FORWARD EXPLICIT CONGESTION NOTIFICATION(FECN) : The FECN bit can be set by any switch to indicate that traffic is congested. This bit inform the destination that congestion has occurred.  BACKWARD EXPLICIT CONGESTION NOTIFICATION(BECN) : The BECN bit is set (in frame that travel in the other direction) to indicate a congestion problem in the network. This bit inform the sender that congestion has occurred.  DISCARD ELIGIBILITY(DE) : The discard eligibility bit indicates the priority level of the frame. In emergency situation, switches may have to discard frames to relieve bottleneck and keep the network from collapsing due to overload.
  • 52. FRAME RELAY ASSEMBLER/DISASSEMBLER(FRAD) To handle frames arriving from other protocol, frame relay uses a device called a Frame Relay assembler/dissasembler(FRAD). A FRAD assembles and disassembles frame coming from other protocol to allow to be carried by Frame Relay frames. A FRAD can be implemented as a separate device or as part of a switch.
  • 53. VOICE OVER FRAME RELAY(VOFR)  VOFR is offered by the Frame Relay Network that sends voice through the network.  Voice is digitized using PCM and then compressed. The result is sent as data frames over the network.  VOFR allows the inexpensive sending of voice over long distances.  The quality of voice is not as good as voice over a circuit switched network such as the telephone network
  • 54. PRO’S AND CONS OF FRAME RELAY PRO’S :  In many scenario's involving long haul, high speed connections, it is cheaper than dedicated lines.  There is a cheap solution to incorporate redundancy in the network.  Less hardware is needed to for the same amount of connections CONS : There may be jams; no guaranteed bandwidth.  In a point-to-point scenario it is not economically feasible.  In short haul, it is not economically feasible.
  • 55. ASYNCHRONOUS TRANSFER MODE(ATM)  Asynchronous Transfer Mode, a network technology based on transferring data in cells or packets of a fixed size.  ATM was developed to meet the need of the “Broadband Integrated service digital network” as defined in the late 1980’s and designed to unify telecommunication and computer network.  Asynchronous transfer mode(ATM) is the cell relay protocol designed by the ATM Forum and adopted by the ITU-T.  The cell used with ATM is relatively small compared to units used with older technologies.  The small, constant cell size allows ATM equipment to transmit video, audio, and computer data over the same network, and assure that no single type of data hogs the line.
  • 56. DESIGN GOALS  A technology is needed for the transmission system to optimize the use of high- data rate transmission media.  The system must interface with existing system and provide wide area interconnectivity between them without lowering their effectiveness or requiring their replacement.  The design must be implemented inexpensively so that cost would not be a barrier to adoption.  The new system must be able to work with and support the existing telecommunications hierarchies.  The new system must be connection oriented to ensure accurate and predictable delivery.
  • 57. PROBLEM WITH THE EXISTING SYSTEM FRAME NETWORK :  Before ATM, data communication at the data link layer had been based on frame switching and frame network.  Different protocol uses frames of varying size.  As the network become more complex, the information in the header become more extensive and this result in larger header.  Due to large header some protocol have enlarge the size of the data unit to make use header more efficient by sending more data with same size header.  If there is not much more information to transmit, much of the field goes unused.
  • 58. MULTIPLEXING USING DIFFERENT FRAME SIZES  If line 1’s frame X arrives at the multiplexer even a moment earlier than line 2’s frames, the multiplexer puts frame X onto the new path first.  The multiplexer will first process the arrived frame X before considering the frame of line 2’s.  Therefore frame A must wait for the entire X bit stream to move into place before it can follow.  The sheer size of X creates an unfair delay for frame A. MIXED FRAME NETWORK :
  • 59. CELL NETWORK :  Many of the problems associated with frame internetworking are solved by adopting a concept called cell networking.  A cell is a small data unit of fixed size.  In a cell network , all data which are to be transmitted are loaded into the identical cells that are transmitted with complete predictability and uniformity.  When a frames of different sizes and formats reaches the cell network from a tributary network, they are split into the multiple small data unit of equal length and are loaded into cells.
  • 60. MULTIPLEXING USING CELLS CELL NETWORK(contd.) :  Here the Frame X has been divided into three cells: X,Y and Z. Only the first cell from line 1 gets put on the link before the first cell from line 2.  The high speed of the links coupled with the small size of the cells mean that, despite interleaving, cells from each line arrive at their respective destination in an continuous stream.  A cell network can handle real transmission such as phone call.
  • 61. ATM MULTIPLEXING  ATM use asynchronous time division multiplexing- that is why it is called Asynchronous Transfer Mode- to multiplex cells coming from different channels.  It uses a fixed size slot(size of a cell).  ATM multiplexer fill a slot with a cell from any input channel that has a cell, the slot is empty if none of the channels has cell to send.  At the first tick of the clock, channel 2 has no cell, so the multiplexer fills the slot with a cell from the third channel.  When all the cells from all the channels are multiplexed, the output slots are empty..
  • 62. ARCHITECTURE OF AN ATM NETWORK  ATM is a cell switched network.  The user access device is called the end-points, are connected through a “user-to-network interface(UNI)” to the switches inside the network.  The switches are connected through “network-to-network interface(NNIs)”
  • 63. VIRTUAL CONNECTION Connection between two endpoints is accomplished through transmission paths(TPs), virtual paths, and virtual circuits(VCs) TRANSMISSION PATH(TP) : A transmission path (TP) is the physical connection wire(wire, cable etc) between an endpoints and a switch. Think of two switches as two cities. A transmission path is the set of all highways that directly connect the two cities.
  • 64. VIRTUAL PATHS(VP) : A virtual Paths (VP) provides a connection or a set of connection between two switches. A highway between two cities is a virtual path. VIRTUAL CIRCUITS(VCs) : Cell network are based on virtual circuits(VCs) . All cells belonging to a single message follow the same virtual circuit and remain in their original order until they reach their destination. Think of a virtual circuits as a lane of a highway Fig. : Example of VPs and VCs
  • 65. VIRTUAL CONNECTION IDENTIFIER  In virtual circuit network, to route data from one end-point to another, the virtual connection need to be identified.  The designer of the ATM creates a hierarchal with two level : Virtual path identifier(VPI) and Virtual circuit identifier(VCI)
  • 66. VIRTUAL CONNECTION IDENTIFIER IN UNIs AND NNIs  In a UNI, the VPI is 8 bits whereas in an NNI, the VPI is 12 bits. The length of the VCI is the same in both interface(16 bits).  The whole idea behind dividing a virtual circuit identifier into two parts is to allow hierarchal routing.  Most of the switches in a typical ATM network are routed using VPIs.  The switches at the boundary of the network, those that interact directly with the endpoints use both VPIs and VCIs
  • 67. ATM CELL  The basic data unit in an ATM network is called a cell.  A cell is only 53 bytes long with 5 bytes allocated to the header and 48 bytes carrying the payload(user data may be less than 48 bytes).
  • 68. CONNECTION IN ATM ATM uses two type of connection : PVC and SVC PVC : A permanent virtual circuit connection is established between two endpoints by the network provider. The VPI and VCI are defined for the permanent connection and the values are entered for the table of each switch. SVC :  In a switched virtual circuit connection, each time an end points wants to make a connection with another endpoints, a new virtual circuit must be established.  ATM cannot do the job by itself, but needs the network layer addresses and the services of another protocol such as IP.
  • 69. ROUTING WITH A SWITCH  ATM uses switches to route the cell from a source endpoint to the destination endpoints.  A switch routes the cell using both the VPIs and the VCIs  The switch checks it switching table which stores six pieces of information per row: arrival interface number, incoming VPI & VCI, corresponding output ports, Outgoing VPI & VCI.
  • 70. ATM LAYER PHYSICAL LAYER : Like ethernet and wireless LANs, ATM cells can be carried by any physical layer carrier.
  • 71. PHYSICAL LAYER(contd..):  SONET: The design of ATM was based on SONET.  SONET is preferred for two reasons.  First, the high rate of SONET’s carrier reflects the design and philosophy of ATM.  Second, In SONET the boundaries of cells can be clearly defined. ATM LAYER:  The ATM layer provides routing, traffic management, switching, and multiplexing service.  It process outgoing traffic by accepting 48 byte segments from AAL sub layer and transforming into 53- byte cells by the addition of a 5 byte header
  • 74. ATM HEADER(contd..)  ATM uses two format for this header, one for user-to-network interface(UNI) cells and another for network to network interface(NNI) cells  Generic flow control(GFC): The 4 bit GFC field provides floe control at the UNI level. In the NNI header, these bits are added to the VPI. The longer VPI allows more virtual path to be defined at the NNI level.  Virtual path identifier(VPI): The VPI is an 8 bit field in a UNI cells and a 12 bit field in an NNI cells.  Payload type(PT): In the 3 bit PT field, the first bit defines the payload as user data or managerial. The interpretation of the last 2 bits depend on the first bit.  Cell loss priority(CLP): The 1 bit CLP field is provided for congestion control.  Header error correction(HEC): The HEC is a code computed for the first 4 bytes header
  • 75. APPLICATION ADAPTION LAYER:  The application adaption layer (AAL) was designed to enable two ATM concept.  ATM must accept any type of payload, both data frames and streams of bits.  To accept continuous bits streams and break them into chunks to be encapsulated into a cells at the ATM layer , it uses two sub layer.  The payload must be segmented into 48- bytes segment carried by the cells. At the destination these segment need to be reassembled to recreate the original payload. The AAL defines a sub layer called “segmentation and reassemble(SAR)” sub layer to do so.  Before data are segmented by SAR, they must be prepared to guarantee the integrity of the data. This is done by the sub layer called convergence sub layer(CS)
  • 76. APPLICATION ADAPTION LAYER(contd..) :  ATM defines four versions of AAL : AAL1, AAL2, AAL3/4, AAL5 AAL1:  AAL1 supports application that transfer information at constant bit rates such as video and voice.  It allows ATM to connect existing digital telephone networks such as voice channels and T- channels.
  • 77. AAL1(contd..):  The CS sub layer divides the bit stream into 47 bytes segment and passes them to SAR sub layer.  The SAR sub layer adds 1 byte of header and passes the 48 byte segment to the ATM layer. The Header has two field: Sequence number(SN) : This 4 bit field defines a sequence number to order the bits.  Sequence number protection(SNP): The second 4 bit field protects the first field. The first 3 bit automatically corrects the SN field. The last bit is a parity bit that detects error over all 8 bits. AAL2:  Originally AAL2 was intended to support a variable data rate bit stream but it has been redesigned.  It is now used for low-bit-rate traffic and short – frame traffic such as audio(compressed or uncompressed ) , video, fax.  A good example of AAL2 uses is in mobile telephony.
  • 78. AAL2(contd): The CS layer overhead consists of five layer  Channel identifier(CID) : The 8 bit field defines the channel of the short packet.  Length indicator(LI): The 6 bit LI field indicates how much of the final packet is data.
  • 79. AAL2(contd..):  User-to-user indicator(UUI): The UUI field can be used by end to end users.  Header error control(HEC): The last 5 bits is used to correct errors in the header AAL3/4:
  • 80. AAL3/4I(contd..):  Common part identifier(CPI): The CPI defines how the subsequent field are to be interpreted.  Begin Tag(Btag): The value of this field is repeated in each cell to identify all the cells belonging to the same packet.  Buffer allocation size(BA size): The 2 byte BA field tells the receiver what size buffer is needed for the coming data.  Alignment(AL): The 1 byte AL field is included to make the rest of the trailer 4 byte long.  Ending tag(Etag): The 1 byte ET field serves as an ending flag. Its value is the same as that of the beginning tag. Length (L): The 2 byte L field indicates the length of the data unit. The CS layer header and trailer consist of six field: The SAR header and trailer consist of five fields:  Segment Type (ST): The 2 bit ST identifier specifies the position of the segment in the message: beginning(0), middle(01), or end(10).  Sequence Number(SN): This field is the same as defined previously.  Multiplexing Identifier(MID): The 10 Bit MID field identifies cells coming from different data flows and multiplexed on the same virtual connection.,  CRC: The last 10 bit of the trailer is a CRC for the entire data unit.
  • 81. AAL5: The four trailer fields in the CS layer are:  User – to user(UU): This field is used by end users. Common part identifier(CPI): This defines how the subsequent fields are to be interpreted. Length(L): The 2 byte L fields indicates the length of the original data. CRC: The last 4 byte is for error control on the entire data unit
  • 82. ATM LANS  The ATM technology can be adapted to local area network called ATM LANs.  The high data rate of technology (155 to 622 Mbps) has attracted the attention of designer who are looking for greater and greater speed of LAN.  ATM technology supports different type of connection between two end user. Its support permanent and temporary connection.  ATM technology supports multimedia communication with a wide variety of bandwidth for different application.  An ATM LAN can be easily expanded in an organization
  • 84. PURE ATM ARCHITECTURE  In a pure ATM LAN, an ATM switch is used to connect stations in the LAN.  Stations can exchange data at one of two standard rates of ATM technology(155 and 652 Mbps)  Station uses a virtual path identifier (VPI) and a virtual circuit identifier (VCI) instead of a source and a destination address.
  • 85. LEGACY ATM ARCHITECTURE  In a legacy ATM LAN, stations on the same LAN can exchange data at the rate and format of traditional LANs.  The advantage here is that output from several LAN can be multiplexed together to create a high data rate input to the ATM switch.
  • 86. MIXED ARCHITECTURE  In a mixed architecture LAN, it allows the gradual migration of legacy LANs onto ATM LANs by adding more and more directly connected stations to the switch.  The station is one specific LAN can exchange data using the format and data rate of that particular LAN.  The stations directly connected to the ATM switch can use an ATM frame to exchange data
  • 87. LAN Emulation(LANE)  Connectionless versus connection-oriented :  Traditional LANs are connectionless protocols . A station sends data packets to another station whenever the packets are ready. There is no connection establishment or connection termination phase.  ATM is a connection oriented protocol . A station that wishes to send cells to another station must first establish a connection and after all the cells are sent , connection is terminated.  Physical addresses versus virtual-circuit identifiers:  A connectionless protocol defines the route of a packet through source and destination addresses.  A connection-oriented protocol defines the route of a cell through virtual connection identifiers(VPIs and VCIs).  Multicasting and broadcasting delivery :  Traditional LANs can cast both multicast and broadcast packets. A station can send packets to a group of stations or to all stations.  In ATM network , there is no easy way to multicasts or broadcast , although point- to-multipoint connections are available.  Interoperability : In a mixed architecture, a station connected to a legacy LAN must be able to communicate with a station directly connected to an ATM switch.
  • 89.  LAN Emulation Client  All ATM stations have LAN emulation client(LEC) software installed on the three ATM protocols. The upper-layer protocols are unaware of the existence of the ATM technology. These protocols send their request to LEC for a LAN service such as connectionless delivery using MAC unicast , multicast, or broadcast addresses. The LEC just interprets the request and passes the result on to the servers.  LAN Emulation Configuration Server  The LAN emulation configuration server(LECS) is used for the initial connection between the client and LANE. This server is always waiting to receive the initial contact.  It has a well-know ATM address that is known to every client in the system.
  • 90.  Broadcast/Unknown Server  Multicasting and broadcasting require the use of another server called the Broadcast/Unknown server(BUS).  If a station needs to send a frame to a group of stations or to every station, the frame first goes to the BUS. The server has permanent virtual connection to every station.  The server creates copies of the received frame and sends a copy to a group of stations or to all stations, simulating a multicasting or broadcasting process.  The server can also deliver a unicast frame by sending frame to every station. In this case , the address is unknown and it is sometimes more efficient than getting the connection identifier from the LES.