Professional Documents
Culture Documents
- 89 -
Intentionally Blank
- 90 -
CONTENT
CONTENT .......................................................................................................91
ATM..................................................................................................................92
THE DESIGN OF THE ATM CELL....................................................................92
THE PRINCIPLE OF ATM SWITCHING ...........................................................93
CLASSIFICATION OF SERVICES....................................................................94
ATM ADAPTATION LAYER (AAL)....................................................................96
ATM NETWORK INTERFACES......................................................................101
SIGNALING ..................................................................................................103
WCDMA RAN SIGNALING INTERFACES& PROTOCOL STACKS .............103
IP.....................................................................................................................107
INTRODUCTION .............................................................................................107
CLASSLESS INTER DOMAIN ROUTING (CIDR)..........................................122
- 91 -
ATM
THE DESIGN OF THE ATM CELL
The cornerstone of ATM is the cell. The information flow, with
different and varying bit rates, is uniformly organised into cells
which consist of a cell header of five octets and a user part of 48
octets; 53 octets in all. ATM is a packet mode technique, but the
delay in the network can be kept to a minimum because the cells
have a fixed length. See Figure 5 -1.
Address
Payload
Header
48 bytes
5 bytes
The cell header is divided into different fields. The most important
field is the address field, which consists of a logical channel
number (the Virtual Path Identifier (VPI) and the Virtual Channel
Identifier (VCI)). The address field identifies the circuit and
provides a unique link address between two network nodes. See
the figure below.
- 92 -
Payload
Header Error
Control (HEC)
Cell Payload
loss type
VCI
prio. id.
Virtual Channel
Identifier (VCI)
Header
VCI
VPI
Virtual Path
Identifier (VPI)
- 93 -
CLASSIFICATION OF SERVICES
The ITU-T has standardised a protocol reference model, which
shows similarities with the OSI model. The three lowest layers in
the protocol reference model are as follows:
Class A:
Synchronous
Constant
bitrate
ex. Telephony
Class B:
Synchronous
Variable bitrate
Compression
ex
Videoconference
Class C:
Data services
Connecion
Oriented
ex. X.25, FR
Class D:
Data services
Connecion
Less
ex. IPnetworks
Cell header
Class A
Class B
Class C
Class D
5 octets
(e.g voice)
(e.g video)
AAL-1-5
AAL-1
AAL-2
AAL-3/4
AAL-5
AAL-3/4
AAL-5
Isochronous services
Remaining
information
fields
44-47 octets
Constant
bit rate
Asynchronous services
Connection-oriented transfer
Connectionless transfer
- 94 -
- 95 -
AAL 1
AAL 1 provides circuit-switched connections with constant bit rate
and minimal delay. In other words, AAL 1 supports class A
services (voice and video traffic). Since voice traffic is error
tolerant, no CRC (Cyclic Redundancy Checksum) error control is
required. However, what is important in the case of voice
transmission is that cells are received in the exact sequence in
which they were sent, and that they arrive at a constant rate. AAL1
implements sequence number generation and checking.
User information, delivered to AAL 1 at a constant bit rate, is
placed in a Segmentation and Reassemble Protocol Data Unit
(SAR-PDU) that is made up of 48 octets. The information is
subdivided into packets containing 47 octets and a one-octet SAR
header. The packets are then forwarded to the ATM layer, where
they will fill out the cells information field. See figure below.
Header, 5 bytes
SNP
SN
SN, Sequence Number, 3 bits are used
to detect loss of cells
SNP, Sequence Number Protection
Figure 5 - 4: AAL1 Segmentation And Reassembly Sublayer Protocol Data Unit (SAR PDU)
- 96 -
AAL 2
An ATM Adaptation Layer is present in an ATM system to enable
users of the ATM service to adapt the service to their specific
needs. The purpose of AAL 2 is the realization of isochronous
connections with variable bit rate and minimal delay. In other
words, AAL 2 supports class B services.
More than one AAL type 2, user information stream, can be
supported on a single ATM VC connection. AAL2 is used for voice
and data traffic in the UMTS network.
Only point-to-point bi-directional AAL2 connections are supported.
The supported type of connection is on-demand (switched). AAL2
connection points must be reserved before the connection is
established.
The interworking between a user and the ATM Adaptation Layer
type 2 (AAL2) service, consists the following functions:
- 97 -
Payload
HEC UUI
Payload
Payload
Header, 5 bytes
LI
CID
STF
STF, Start Field
- 98 -
AAL 5
AAL 5 was specified when AAL 3/4 had been found to be too
complex for certain services. One disadvantage of the AAL 3/4
protocol is its relatively large overhead, resulting in low efficiency.
For this reason, designers developed AAL 5, which is less
complex, but provides more reliable bit-error checking. Its
simplicity and efficiency have led to AAL 5 being named the
Simple and Efficient Adaptation Layer (SEAL).
User Information
8 bytes
Payload (1-65535 bytes)
32
16
CRC
CPI UU
UU, User-to-user indicator
CPI, Common Part Indicator
L, Length
CRC, Cyclic Redundancy Check
Padding
AAL 5 is used for Frame Relay LAN emulation and signaling (See
figure 5-6 above). It is limited to the handling of message modes
without the use of any retransmission mechanisms. AAL 5 defines
a CS-PDU (Convergence Sublayer Protocol Data Unit), which
communicates with the SAR function. Like AAL 3/4, the CS-PDU
information field can consist of a maximum of 65,532 octets. The
CS-PDU has a trailer of eight octets (including information for error
detection and error handling) is filled by the padding (PAD) field
with up to 47 octets so that a multiple of 48 is achieved.
AAL2U
The AAL2U format is used within a Cello node. Each AAL2
connection is handled as a separate internal connection according
to the AAL2U format. The AAL2U format contains only one AAL2
packet within each ATM cell. See figure below.
- 99 -
AAL2
Payload
Payload
Payload
Header, 5 bytes
AAL 2U
Payload
Payload
Payload
- 100 -
NNI
ATM
NT1
Private UNI
UNI
Public UNI
ATM
NT2
Other Operator
- 101 -
Ch n
16
VCI
Header, 5 bytes
VPI GFC
GFC, Generic Flow Control
VPI, Virtual Path Identifier
VCI, Virtual Channel Identifier
PTI, Payload Type Identifier
CLP, Cell Loss Priority
HEC, Header Error Control
Ch n
Header, 5 bytes
16
12
VCI
VPI
VPI, Virtual Path Identifier
VCI, Virtual Channel Identifier
PTI, Payload Type Identifier
CLP, Cell Loss Priority
HEC, Header Error Control
- 102 -
SIGNALING
In a WCDMA RAN network, call-control related signaling protocols
(for example NBAP) are completely separated from those used for
bearer control (Q2630.1). The WCDMA RAN signaling interfaces
and protocol stacks are described in this section.
- 103 -
Uu
Iub
Core Network
Packet Domain
RNC
Iup
Iur
Iub
RNC
MGW
Iuc
Core Network
Circuit Swiched
PSTN/ISDN
Domain
Protocol Stacks
Figure 5-12 shows the protocol stacks for all three Iu interfaces.
The call control protocols, RANAP and RNSAP, use SCCP layer
functions to transfer signaling protocol data units. The SCCP layer
complements MTP3-b, which offers signaling link layer
functionality (see bellow for details).
The bearer control protocol, QAAL2 (also called Q 2630.1), is used
with MTP3-b in the same way.
However, in the case of the Iub interface, QAAL2 (and NBAP) will
use a single UNI-SAAL signaling link, established between an
RBS and an RNC, as the data link layer.
- 104 -
On the other hand, in the Iu and Iur interfaces, Cello uses NNISAAL to permanently establish signaling links as the transport
system for the signaling data units. NNI-SAAL is based on a
common part of an AAL5 common part and contains a service
specific part for the signaling. On the physical layer this will be
PDH or SDH.
RANAP
Control Plane
Access Link
Bearer Control
(Iu&Iur)
Control Plane
Access Link
Bearer Control
(Iub)
Control plane
radio application
Signaling (Iub)
RNSAP
SCCP
Q.2630.1
Q.2630.1
NBAP
MTP3b
UNI-SAAL
NNI-SAAL
AAL5
ATM/L1
MTP 3b Layer
The MTP level 3 broadband serves as a transport system, which
provides reliable transfer of connectionless signaling messages
between communicating nodes in a telecommunications
environment.
- 105 -
SCCP
The Signaling Connection Control Part (SCCP) provides additional
functions to the MTP-3b layer, to cater for:
Q.2630.1 (QAAL2)
This is the network connection control signaling used to set-up and
release network-wide AAL2 connections. It is based upon the
recommendation of the ITU-T Q2630.1.
- 106 -
IP
INTRODUCTION
TCP/IP was initially designed to meet the data communication
needs of the U.S. Department of Defense (DOD).
In the late 1960s, the Advanced Research Projects Agency
(ARPA, now called DARPA) of the U.S. Department of Defense
began a partnership with U.S. universities and the corporate
research community to design open, standard protocols and build
multi-vendor networks.
The result was ARPANET, the first packet switching network. The
first experimental four-node version of ARPANET went into
operation in 1969. These four nodes at three different sites were
connected together via 56 Kbit/s circuits, using the Network
Control Protocol (NCP). The experiment was a success, and the
trial network ultimately evolved into a useful operational network,
the "ARPA Internet".
In 1974, the design for a new set of core protocols, for the
ARPANET was proposed in a paper by Vinton G. Cerf and Robert
E. Kahn. The official name for the set of protocols was TCP/IP
Internet Protocol Suite, commonly referred to as TCP/IP, which is
taken from the name of the network layer protocol (Internet
protocol [IP]) and one of the transport layer protocols
(Transmission Control Protocol [TCP]).
TCP/IP is a set of network standards specifying how computers
should communicate and contain a set of conventions for
interconnecting networks and routing traffic. The initial
specification went through four early versions, culminating in
version 4 in 1979.
- 107 -
- 108 -
APPLICATION
PRESENTATION
SESSION
TRANSPORT
NETWORK
DATA LINK
PHYSICAL
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is not a
single protocol; it refers to a family or suite of protocols. The suite
consists of a four-layer model.
- 109 -
Internet Layer
The Internet Layer is equivalent to the Network Layer in the OSI
model. It is responsible for network addressing. The main
protocols in this layer are as follows:
Internet Protocol (IP), Address Resolution Protocol (ARP),
Reverse Address Resolution Protocol (RARP), Internet Control
Message Protocol (ICMP), and Internet Group Management
Protocol (IGMP).
- 110 -
APPLICATION
PRESENTATION
SESSION
TRANSPORT
APPLICATION
(FTP, TELNET, SNMP,
DNS, SMTP )
TRANSPORT
(TCP or UDP)
ICMP, IGMP
NETWORK
INTERNET PROTOCOL
(IP) ARP, RARP
DATA LINK
NETWORK INTERFACE
PHYSICAL
- 111 -
Network 1
Network 2
Network-ID:160.57.0.0
Network-ID: 197.5.99.0
Host ID
.2.10
20
Host ID
Host ID
PC 1
PC 4
IP Address
160.52.2.10
PC 3
IP Address
160.52.2.11
IP Address
197.5.99.20
PC 2
PC 6
IP Address
160.52.2.12
IP Address
197.5.99.22
PC 5
IP Address
197.5.99.21
The IP address
Every network interface on a TCP/IP device is identified by a
globally unique IP address. Host devices, for example, PCs,
typically have a single IP address. Routers typically have two or
more IP addresses, depending on the number of interfaces they
have. Each IP address is 32 bits long and is composed of four 8bit fields called octets. The address is normally represented in
dotted decimal notation by grouping the four octets and
representing each one in decimal form. Each octet represents a
decimal number in the range 0-255.
For example, 11000001 10100000 00000001 00000101, is known
as 193.160.1.5.
Each IP address consists of a Network ID and a Host ID. The
Network ID identifies the systems that are located on the same
network. The Network ID must be unique to the internetwork. The
Host ID identifies a TCP/IP network device (or host) within a
network. The address for each host must be unique to the Network
ID. In the example above, the PC is connected to network
193.160.1.0 and has a unique Host ID of .5.
- 112 -
193.160.1.0
193.160.1.1
193.160.2.0
193.160.2.1
193.160.1.5
193.160.2.83
Binary Format
11000001 10100000 00000001 00000101
Dotted Decimal Notation
193.160.1.5
Figure 5 -16: The Format of an IP-Address
- 113 -
Binary Value
1
27
26
25
24
23
22
21
20
64
32
16
If all bits are set to 1 then the decimal value is 255, that is,
1+2+4+8+16+32+64+128=255
- 114 -
- 115 -
CLASS A
NET ID
HOST ID
10
NET ID
CLASS C
HOST ID
110
Classes
Network-ID
A
B
C
1 to 126
128 to 191
192 to 223
Network -ID
Host-ID
w
w.x
w.x.y
x.y.z
y.z
z
Subnet Mask
A subnet mask is a 32-bit address that is used to do the following:
- 116 -
- 117 -
1 AND 1 = 1
1 AND 0 = 0
0 AND 0 = 0
0 AND 1 = 0
IP Address
160.30.20.10
Subnet Mask
255.255.255.0
Result
160.30.20.0
IP Address
160.30.20.100
Subnet Mask
255.255.255.0
Result
160.30.20.0
Subnetting
Subnetting was initially introduced to overcome some of the
problems that parts of the Internet were beginning to experience:
- 118 -
- 119 -
Routing Advertisement
PRIVATE
NETWORK
160.30.0.0/16
160.30.0.0/24
160.30.1.0/24
160.30.2.0/24
.
.
160.30.254.0/24
160.30.255.0/24
INTERNET
A subnetting example
In the example shown in the Figure 5 -22, a small company has
been assigned the IP address space 200.200.200.0/24.
Without subnetting, up to a maximum of 254 hosts can share this
network. In this configuration, if one device sends out an IP
broadcast (for example, DHCP Discover message) then every
device on the network receives the broadcast.
To improve performance, the network administrator may reduce
the number of devices that receive the broadcast by splitting the
network into smaller subnets separated by a router.
In the example, the network has been split into four smaller
subnets with a maximum of 62 hosts on each subnet.
- 120 -
Network Address
200.200.200.0
Subnet Mask
255.255.255.0
Allocated IP address
space 200.200.200.0/24
200.200.200.64
200.200.200.128
200.200.200.192
- 121 -
200.200.200.0 /26
(max. of 62 hosts)
200.200.200.64 /26
(max. of 62 hosts)
200.200.200.128 /28 (max. of 14 hosts)
200.200.200.144 /28
200.200.200.160 /28
200.200.200.176 /28
200.200.200.0
200.200.200.192 /28 (max. of 14 hosts)
200.200.200.208 /28
200.200.200.224 /28
200.200.200.240 /28
- 122 -
Finally the ISP is able to inject the 256 /24s in its allocation into the
Internet with a single advertisement - 200.25.0.0/16.
- 123 -
The INTERNET
200.25.0.0/16
ISP
200.25.16.0/20
200.25.16.0/21
200.25.16.0/24
200.25.17.0/24
200.25.18.0/24
200.25.19.0/24
200.25.20.0/24
200.25.21.0/24
200.25.22.0/24
200.25.23.0/24
200.25.28.0/23
200.25.24.0/22
200.25.24.0/24
200.25.25.0/24
200.25.26.0/24
200.25.27.0/24
Company A
200.25.30.0/23
200.25.28.0/24
200.25.29.0/24
200.25.30.0/24
200.25.31.0/24
Company C
Company D
- 124 -
Referring to the table, we can see that a /15 allocation can also be
specified using the traditional dotted-decimal mask notation of
255.254.0.0. Also a /15 allocation contains a bit-wise contiguous
block of 131,070 IP addresses, which can be interpreted in a
clasful way as two class B networks or 512 class B networks.
CIDR
Prefix-length
/1
128.0.0.0
# Individual
Addresses
2048 M
# Classful
Networks
128 A
/2
192.0.0.0
1024 M
64 A
/3
224.0.0.0
512 M
32 A
/4
240.0.0.0
256 M
16 A
/5
248.0.0.0
128 M
8A
/6
252.0.0.0
64 M
4A
/7
254.0.0.0
32 M
2A
/8
255.0.0.0
16 M
1 A or 256 Bs
/9
255.128.0.0
8M
128 B
/10
255.192.0.0
4M
64 B
/11
255.224.0.0
2M
32 B
/12
255.240.0.0
1M
16 B
/13
255.248.0.0
524,286
8B
/14
255.252.0.0
262,142
4B
/15
255.254.0.0
131,070
2B
/16
255.255.0.0
65,534
1 B or 256 Cs
Subnet Mask
- 125 -
- 126 -
CIDR
Prefix-length
Subnet Mask
# Individual
Addresses
# Classful
Networks
/17
255.255.128.0
32,766
128 Cs
/18
255.255.192.0
16,382
64 Cs
/19
255.255.224.0
8,190
32 Cs
/20
255.255.240.0
4,094
16 Cs
/21
255.255.248.0
2,046
8 Cs
/22
255.255.252.0
1,022
4 Cs
/23
255.255.254.0
510
2 Cs
/24
255.255.255.0
254
1C
/25
255.255.255.128
126
1/2 C
/26
255.255.255.192
62
1/4 C
/27
255.255.255.224
30
1/8 C
/28
255.255.255.240
14
1/16 C
/29
255.255.255.248
1/32 C
/30
255.255.255.252
1/64 C
Subnet ID Tables
The Subnet ID table shows the most common Subnet IDs. Take,
as an example, an allocation of the address block 160.30.0.0/16
by the IANA. Assume that we require large subnets with
approximately 1500 devices per subnet. We first consult the
variable length subnet table to decide on the subnet mask. The
mask of 255.255.248.0 is suitable as it gives subnets each
containing 2046 devices. Then by consulting the subnet ID table
we can see that the different subnet IDs for this mask are:
160.30.0.0, 160.30.8.0, 160.30.16.0, 160.30.24.0
and so on until 160.30.240.0, 160.30.248.0.
- 127 -
No. of Bits
in Mask
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Subnet Mask
255.255.0.0
255.255.128.0
255.255.192.0
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
Subnet IDs
0
0, 128
0, 64, 128, 192
0,32,64,96,128,160,192,224
0,16,32,48,64,80,96,112,128,144,160,176,192,208,224,240
0,8,16,24,32,40,48,56,64.,216,224,232,240,248
3rd
Octet
0,4,8,12,16,20,24,28,32,.236,240,244,248,252
0,2,4,6,8,10,12,14,16,18,.246,248,250,252,254
0,1,2,3,4,5,6,7,8,9,10,11,.251,252,253,254,255
0, 128
0, 64, 128, 192
4th
0,32,64,96,128,160,192,224
0,16,32,48,64,80,96,112,128,144,160,176,192,208,224,240
Octet
0,8,16,24,32,40,48,56,64.,216,224,232,240,248
0,4,8,12,16,20,24,28,32,.236,240,244,248,252
- 128 -