Professional Documents
Culture Documents
ARCHITECTURES
TRAN CONG HUNG , M.Sc
Deputy Head of Faculty of Information Technology II
Post & Telecommunication Institute of Technology of Viet Nam
Email : conghung@yahoo.com
Abstract – The most important of Network Management • Administration involves the set of activities involved
Architectures in ATM can brief definition of each element of with designing the network, processing orders, assigning
Operations, Administration, Maintenance, and Provisioning addresses, tracking usage, and accounting.
(OAM&P)
• Maintenance involves the inevitable circumstances that
OAM&P PHILOSOPHY arise when everything does not work as planned, or it is
A brief definition of each element of Operations, necessary to diagnose what went wrong and repair it.
Administration, Maintenance, and Provisioning (OAM&P) • Provisioning involves installing equipment, setting
and how they interrelate is described below and depicted in parameters, verifying that the service is operational, and
the flow diagram of Figure 1 also deinstallation.
Agent Agent
Public Public
Private Agent Agent ATM
Agent ATM Agent
ATM UNI
UNI
UNI
ATM End Private ATM Public ATM ATM End
System Network Network System
VC Link VC Link
ATM
F5
Layer
Virtual Path Connection (VPC)
VP Link VP Link
F4
Transmission Path
Physical
Layer F3
Digital Section (Line)
F2
Regenerator Section
F1
OAM CELL FORMATS Table 1 summarizes the OAM type and function type fields in
the OAM cells from Figure 4. The three OAM types are fault
management, performance management, and activation /
Figure 4 shows the ATM OAM cell format : There are Virtual deactivation. Each OAM type has further function types with
Path (VP) flows (F4) and Virtual Channel (VC) flows (F5) codepoints as identified in Table 1. For the fault management
between connection endpoints that are defined as end – to – OAM type there are Alarm Indication Signal (AIS), Remote
end OAM flows. There are also F4 and F5 OAM flows that Defect Indication (RDI) (also called Far End Reporting
occur across one or more interconnected VC or VP links that Failure (FERF), and continuity check function types. For the
are called segment OAM Flows. VP flows (F4) utilize performance management OAM type there are forward
different VCI to identify whether the flow in either end – to monitoring and backward reporting types, or a third type that
end (VCI = 3) or segment (VCI = 4). Recall that the first 16 is a combination of these two, called monitoring and
VCIs are reserved for future tandardization. For a VC flow reporting. The third OAM type defines activation and
(F5), a specific VCI cannot be used because all VCIs are deactivation of the other OAM types. Currently, there are
available to users in the service. Therefore, the Payload Type activation and deactivation function types for performance
(PT) differentiates between the end – to – end (PT=100) and management and the continuity check.
Segment (PT=101) flows in a VCC.
G C G C
F VPI VCI PT L HEC OAM Function Function specific Reserved CRC -10 F VPI VCI PT L HEC OAM Function Function specific Reserved CRC-10
C P Type Type Fields C P Type Type Fields
5 bytes 4 bits 4 bits 45 bytes 6 bits 10 bits 5 bytes 4 bits 4 bits 45 bytes 6 bits 10 bits
Same as Same as
F4 (VPC) OAM Cell Format F5 (VCC) OAM Cell Format
User Cell User Cell
VCI=3 (Segment) PT=100 (Segment)
VCI=4 (End to end) PT=101 (End to end)
Ä Source ID is a field provided so that theloopback The continuity check can detect failures that AIS cannot,
source can be identified in the cell. This can be used by nodes such as an erroneous VP aross-connect change, as illustrated
to extract OAM cells that they have inserted for extraction in Figure 9 .Part (a) shows an VP connection traversing three
after they have loopback to the source. VP cross-connect nodes with VPI mappings shown in the
figure carrying only Continuity Check (CC) cell traffic. In
part (b) an erroneous cross-connect is made at node 2,
Loopback Correlation Loopback Source Unused interrupting the flow of CC cells. In part (c) node 3 detects
Indication Tag Location ID ID this continuity failure and generates a VP-RDI/FERF OAM
1 byte 9 bytes 12 bytes 12 bytes 16 bytes
cell in the opposite (upstream) direction.
N Working N
N+1 Protection
b)Bi-directional Ring 2
1 3
Initial Route
Restored Route
Restored
Initial Route
Route
4 6
5
REFERENCES
[1] David E. MC DySan and Darren L. Spohn , "ATM theory and
Figure 10 (C) illustrates a partial mesh network. In the Application", McGraw-Hill series on Computer Communication,
example, traffic between nodes 3 and 4 initially follows the International Editions 1995, Printed in Taiwan.
route shown by the solid line. A failure between nodes 1 and [2] Othmar Kyas, "ATM Networks", International Thomson Computer Press,
2 impacts the node 3 to 4 traffic on its current route. This can ITP An International,Thomson Publishing, First printed 1995, Reprinted
1995,Printed in the UK by the Alden Press, Oxford.
be detected in a centralized, distributed, or hybrid network [3] Document on Internet :
management system to find a new route shown by he dashed http://www.tmo.hp.com/tmo/pia/VXIbus/PIAProd/datasheets/English/HPQ0
line in the example. Longer distance networks tend to have SS1.html
the type of lattice structure shown in the example and tend to + Test & Measurement , Product Information HEWLETT PACKARD
[4]Dr.Kon MIYAKE, “Standardization ^ Technology on B-ISDN & ATM
use this type of restoration . In the example of Figure 10(c), Network”, Nippon Telegraph and Telephone Corporation(NTT), Technical
1:2 redundancy is provided for some routes. Seminar on ITU-T Standardization(Tss-96) Nov,1996.