Asynchronous Transfer Mode Switching Nathan J. Muller

Size: px
Start display at page:

Download "52-10-10 Asynchronous Transfer Mode Switching Nathan J. Muller"

Transcription

1 Asynchronous Transfer Mode Switching Nathan J. Muller Payoff Ultimately, the integration of ATM switching and routing will support large-scale multimedia internetworks. Increased bandwidth, low latency, and increased network availability are just a few of the advantages that make ATM the switching method of choice for many data communications managers. Introduction ATM switching, also known as cell relay, is a general-purpose method for switching voice, data, image and video traffic. Asynchronous Transfer Mode is designed to operate at rates of up to 155M b/s and beyond. Such speeds are achievable, in large part, because the data is switched at the packet level 53-byte cells rather than at the bit or byte level, thus minimizing internodal processing requirements. Advantages of ATM The benefits of Asynchronous Transfer Mode, or ATM, include increased bandwidth, low latency, and increased network availability through the automatic and guaranteed assignment of network bandwidth, otherwise known as Quality Of Service. quality of service supports isochronous traffic such as voice and video, as well as real-time data traffic for online, interactive applications. ATM is expected to become the fabric of choice for LAN backbones. Its unbounded bandwidth offers a scalable foundation for growing internetworks. ATM is a compelling solution for both WAN and campuswide backbone networks because, unlike LANs, there also is no practical limit on the geographical distance of ATM links. While ATM is currently limited to data transmission over Permanent Virtual Circuit, the long range goal of ATM is to support a multitude of services - data, voice, image, and video - from a single platform. When completed, ATM standards will promote intercarrier and intervendor interoperability. Simplified management is another key feature of ATM. With router-based internetworks becoming ever larger, performing moves, adds, and changes, in addition to keeping track of an endless list of MAC addresses, has become a real management burden. ATM offers a simplified way of managing large networks while maintaining scalability. Generally, users are not looking at ATM with the idea of replacing their existing LAN infrastructure and investment. It is currently too expensive to install ATM to every desktop today except on a selective basis, such as engineering workgroups running data-intensive applications. Currently, ATM applications are for campus area networks that integrate voice, data, video, and LAN traffic over a common backbone. For those who merely want to interconnect their token ring and Ethernet LANs between different sites, then frame relay, T1, Switched Multimegabit Data Service, and existing data circuits are generally quite effective. ATM Protocol Model The capabilities of the Asynchronous Transfer Mode and ATM adaptation layers are quite innovative. The ATM layer is responsible for routing cells along the virtual path established

2 during call setup and for performing general cell routing, cell multiplexing/demultiplexing, and header error control. These functions are similar to the ones performed in frame relay transport, except that in Frame relay the cell called a frame may vary in size according to the application. The ATM adaptation layer (see Exhibit 1) performs the transition between the message format used by the upper layers of the communications module and the fixedlength cell format used by theatm layer. In addition, the Asynchronous Transfer Mode adaptation layer is responsible for error detection and correction and flow control. Protocol Model Cell Structure Each ATM cell consists of a 5-byte header field and a 48-byte information field (see Exhibit 2). The cell header contains the information needed to route the information field through the ATM network. The header supports five functions: Generic flow control, which enables Customer Premises Equipment to control the flow of traffic for different grades of service. Virtual channel identifier, which identifies a particular connection. For a given connection, the value of thevirtual Channel Identifier may change as the cell traverses the network. Virtual path identifier, which consists of a bundle of virtual channels that are carried end-to-end between terminations on the same physical facility. Payload type, which indicates whether the cell contains user information or network information. The payload of the network information cell does not form part of the users' information transfer, but could provide an out-of-band control message. Cell loss priority, which gives guidance to the networks regarding cells that may be discarded in congestion situations. Header error control, which prevents errors in thevirtual channel identifier from causing cells to be misrouted. ATM Cell Structure Unlike traditional X.25 networks, where the switches operate in store-and-forward fashion to read the address information and implement functions such as error correction, ATM switches use virtual channel identifier to route a cell through the ATM network to its destination. All cells enter the switching matrix in synchrony. In the event that two packets converge at the same output line, one of them is buffered. It is through buffer and queue management (discussed in a subsequent section) that the cells are properly ordered for ATM-level processing.

3

4

5 Cell Switching Cell switching through ATM is accomplished as follows: An application initiates the communications process by sending a connection request message to the transport layer through the presentation and session layer. The connection request message is transformed into cells via the ATM and Asynchronous Transfer Mode adaptation layers, and forwarded to the signaling system 7 (SS7) network. The message is routed through the network to define the path and call parameters that will be used during the transfer of data. When the connection is established, data is transferred between the applications at each end of the circuit. During data transfer, the ATM switches in the network route cells from incoming to outgoing input/output (I/O) ports using the cell virtual path/virtual circuit identifier and Routing Information established during call setup. Like Frame relay, ATM minimizes the amount of processing performed by the network, thus allowing a very high information transfer rate. Congestion Control In an ATM-based network, congestion can occur on any of three levels: The connection level, where congestion can prevent the establishment of a new call. The packet level, where congestion can cause the delay or loss of protocol data. The ATM level, where congestion can cause the delay or loss of cells. New connections must be admitted to the network in a manner that protects the network performance of all existing connections. New connections must be withheld from congested portions of the network. At the ATM level, cells are ordered for processing by ATM concentrators and ATM switches. Action must be taken to prevent an excessive cell flow on any given connection and to help portions of the network recover from excessive cell flows. When establishing new connections, various performance issues come into play at both the connection level and the ATM level. For example, at the connection level, the usage of high-bandwidth services must not consume available resources to the point that lower-bandwidth services experience an abnormal increase in blocked calls. At the ATM level, a new connection should only be admitted to the network if sufficient network resources are available to support that connection. Call Setup An important advantage of ATM is its flexibility in supporting different types of services. A broad range of services, characterized by different traffic behaviors, may share the same ATM network, where packets of fixed-length (cells) belonging to different calls are multiplexed together for transport.

6 To meet quality-of-service requirements, resources should be allocated among three control levels: Network control level, where virtual channel identifier routing, connection management, and recovery are controlled. Call control level, where call acceptance and overload control are handled. Cell control level, where policing and buffer management are controlled. Together, these functions ensure that cell losses and delays do not exceed a tolerable level for all users. During the call setup phase, the ATM network must decide whether to accept the new call. This depends largely on the availability of bandwidth to support the connection. The amount of bandwidth that should be allocated to the new call is based on various statistical properties and the number of calls already in progress. Three routing considerations come into play in the assignment of bandwidth to new calls: network routing of the virtual channel identifier, path selection inside the switching fabric realized on a per-call basis, and semipermanent virtual connection and virtual path routing performed long term under network management control. Once a connection has been accepted, the cell stream is monitored to ensure that the user has not exceeded the values established in the call setup phase. If these values are exceeded, corrective action is taken through a process known as policing, which is carried out by the policing unit of the local ATM node. This enforcement mechanism is applied at the point of origin before the multiplexing of all traffic. An ATM layer overload occurs when the parameters characterizing the cells' arrival process exceed the maximum values that guarantee the required Quality Of Service. The overload condition has two primary causes. The load on the ATM layer could increase over the maximum allowable value if the traffic offered by one or more virtual connections exceeds the parameters declared in the setup phase. Or, if each virtual call generates traffic according to the declared parameters, too many connections could have been accepted. Policing functions mainly discard or mark the cells. This reduces the probability that an overload will occur due to a virtual call exceeding the declared values. Marking refers to the tagging of violations in the cell's header. That way, when node congestion occurs and cells must be dropped, the marked cells are the first to be discarded. If that does not relieve the congestion, unmarked cells can be dropped. The transient overload generated by the statistical multiplexing of several connections is monitored by the allocation mechanism. If the policing and allocation functions work properly, no frequent overload situation will occur. Even considering resource faults and rerouting of existing virtual connections, the call acceptance function should be able to reallocate virtual calls on the available resources. Bandwidth Allocation A set of parameters that characterizes traffic is used for resource management. Proper operation of the ATM network depends on these traffic characterizations; they are as applicable to the policing function as they are to bandwidth allocation. However, the wide range of bit rate, the statistical profile of the information flow, and the variety of connection configurations can complicate traffic characterizations. In the virtual call setup phase, the first thing the ATM network does is decide whether or not to accept the call. The decision depends on the availability of a path with

7 enough free bandwidth to support the new connection. The connection process identifies a rule for allocating bandwidth for each new call. The simplest rule is to reserve the peak bit rates, regardless of the offered traffic's burstiness. However, if the presence of bursty traffic is high, network resources will not be optimally exploited. Resource Utilization The three main approaches to high resource exploitation under ATM are: statistical multiplexing, the introduction of different bearer services, and the dynamic shaping of the incoming information flow at the multiplexers. Statistical Multiplexing. In statistical multiplexing, the call acceptance mechanism first determines the amount of bandwidth to be reserved for the new connection. The amount of bandwidth depends not only on the characteristics of the traffic, but on the traffic already being carried on the network. Consequently, multiplexing will vary with the number and the characteristics of the other calls active on the various links. For each call, a bandwidth less than the peak bit rate is allocated. Statistical multiplexing can be done in two ways. With full multiplexing, a complete multiplexing of calls is applied. Although the maximum gain is obtained, some drawbacks occur because of the complexity of the real-time procedures and the possibility of adding a new service class. With limited multiplexing, homogeneous services are grouped into classes and statistical multiplexing is used inside each class. This method offers a compromise between efficiency and complexity. When statistical multiplexing is used, it is better to allocate a bandwidth less than the peak bit rates. In this case, when buffers are full, a loss of cells is unavoidable, so that an accurate cell acceptance rule is mandatory to keep the frequency of cell losses small, as permitted by quality-of-service requirements. Once a connection has been accepted, the originating switch must be monitored to ensure that it does not exceed the traffic values declared in the call setup phase. Multiple Bearer Service Definition. Under this resource management scheme, services with different quality-of-service requirements are integrated in the ATM network. Bearer services with different quality-ofservice requirements, in terms of cell delay and cell loss, can be handled in distinct bearer classes. This means that the network can be divided into several virtual subnetworks that guarantee different levels of performance. If cells are handled in the same way, the most stringent values can be used as quality-of-service requirements for modeling purposes. The use of priorities allows a greater efficiency to be achieved, since low priority can be assigned to cells that can tolerate a higher loss probability. Priorities give preference to certain virtual call types and guarantee that specific cells in a call containing essential information are not lost. Shaping. The other way to enhance performance is to shape the users' information stream by using buffers that hold the instantaneous bursts of cells and release them at a lower speed. The result is a smoother stream that is more easily handled at the network level. The trade-off,

8 however, is higher transmission delays. The delay may be too high for real-time services, making shaping appropriate only for high bit-rate data traffic. Alternative Congestion Controls No single approach to congestion control can be sufficient. Fortunately, ATM offers several approaches to enforce the usage of network resources by an admitted connection. Admission Control. The purpose of admission control is to establish fair blocking procedures and to ensure that the resources available to each admitted connection are sufficient to meet performance objectives in terms of lost cell ratio, cell transfer delay, and cell delay variation. Cells offered to the network in excess of a variable-bit-rate connection's admission parameters can be immediately discarded. Alternatively, cells can be admitted if network resources are available and the procedures are in place for operating with marked or tagged cells. Buffer and Queue Management Buffer and queue management ensures the proper ordering of cells for ATM-level processing. The ordering of cells for processing at ATM concentrators and Asynchronous Transfer Mode switches is a key factor in determining network efficiency, especially when various mixes of constant- and variable-bit-rate services are involved. At such a concentrator or switch, incoming cells may be processed on a first-come-first-served basis, or according to multiple levels of priority to differentiate the processing order of various cells. Multilevel priorities may be used to differentiate between connections carrying different types of service based on the performance objectives of those services. Generally, multilevel priorities also result in more efficient statistical multiplexing. Traffic Enforcement. Traffic enforcement monitors a connection's resource usage for compliance with limits and acts on violations of those limits. Reactive Controls Even with effective procedures for call admission, buffer and queue management, and traffic enforcement, localized congestion may sometimes occur in a heavily loaded Asynchronous Transfer Mode network. Reactive controls are used to relieve congestion once it occurs. For example, the statistical nature of variable-bit-rate traffic could produce temporary overloads at some internal network buffers. If this happens, certain additional congestion control procedures can be called upon to help the affected portion of a broadband network recover from its congested state. The alternatives for such reactive controls include refusing to accept new connections based on such measures as equipment utilization, buffer fill, alternate routing, and flow control techniques similar to those used in packet-switched networks. Customer Premises Equipment Nationwide Asynchronous Transfer Mode-based network services are already available from AT&T, MFS Datanet, Sprint, and WilTel, as well as regionally from such carriers as

9 US West and Pacific Bell. Other carriers have announced plans to offer ATM services. Like any other type of service, there must be Customer Premises Equipment to provide the necessary network connectivity. ATM customer premises equipment includes routers, hubs, multiplexers, and switches. Router-Based ATM Networks Most router vendors initially provided ATM connectivity through external Asynchronous Transfer Mode Digital Service Unit operating at the DS3 speed of 45M b/s. The digital service units (DSU) complies with the ATM Forum's Data exchange Interface specification, which allows the equipment to interface with standards-compliant ATM switches in public or private network. The device segments data packets into fixed-length cells of 53 bytes, including overhead, before sending them out over the ATM network. At the other end, a similar device reassembles the cells into data packets. The next step for router vendors is to offer an integrated ATM interface that allows users to network their routers through fiber optic private lines or ATM switches at speeds of up to 155M b/s. Eventually, backbone routers will have the internal capability to switch multimedia traffic, providing the option of carrying both variable-length packets and fixedlength cells simultaneously over separate data paths. Several router vendors are implementing ATM migration strategies. Hub-Based ATM Networks Several hub vendors offer ATM connectivity options. One option is an Asynchronous Transfer Mode hub capable of supporting WAN connections at 45M b/s or 155M b/s. Such products will eventually scale to higher rates of up to 2.4G b/s. Another option offered by hub vendors is a plug-in module that allows the hub to connect to other hubs or switches by means of a private, point-to-point ATM backbone. A variation on this connectivity solution uses a plug-in ATM router module that allows hubs to be connected over a public, switched ATM backbone. Eventually, hub vendors want to provide end-toend ATM switching from desktop to desktop. Multiplexer-Based ATM Networks Sensing that the market for private networks is slowing down, traditional vendors of T1/T3 multiplexers plan to offer migration paths to ATM. Access links to ATM are provided at speeds as low as 9.6K b/s. Most solutions entail plug-in ATM modules for the multiplexers that will provide access to public Asynchronous Transfer Mode services and allow them to interoperate with high-end enterprise ATM switches and hubs. With the addition of the ATM modules, users will be able to take advantage of a mix of carrier services, including frame relay and Integrated Services Digital Network, already supported by many multiplexers, as well as ATM. Thus, users can choose the most economical service based on tariff and application needs. By 1996, ATM carrier services and broadband private lines will become more widely available and such multiplexers will take on the role of enterprise network switches, providing wide-area transport for all network applications.

10 Switch-Based ATM Networks The first ATM products were adapter cards that connected workstations over private pointto-point links. Next came ATM switches, which were used to link workstations over localarea or campus networks, delivering as much as 140M b/s to each computer. Today's ATM switches can be used to create an enterprisewideatm network. Up to 64 switches can be interconnected over the wide area using DS3 or OC-3 links to form a distributed matrix. Workstations can communicate with other workstations on different switches. Some vendors intend to offer ATM adapter cards for standard bus-based systems, servers, and workstations, thereby enabling users to leverage new applications off their existing network infrastructures. Smaller, premises communications switches for workgroups, departments, and backbones are another group of offerings users can expect. The workgroup ATM switch will be targeted for small office or workgroup environments where communication costs impede new applications deployment. ATM technology used in this context can be an effective multiplexing technology for integrating voice, data, and legacy applications. The departmental switch provides a larger capacity, more flexibleatm premises environment when it makes sense to upgrade. It offers connectivity options to the desktop, servers, workgroup hubs, and backbone links. The backbone switch aggregates Asynchronous Transfer Mode traffic in a campus environment. It also provides bandwidth and network management capabilities to optimize the use of WAN services. Implementation Considerations For Asynchronous Transfer Mode to be universally successful, communications protocols and applications must be optimized to adapt to this new network paradigm. For example, the dominant LAN technologies in use today rely on the Internet Protocol (IP) and the Internet Packet Exchange (IPX)protocol. Both are connectionless and thus not well suited to the connection-oriented environment of Asynchronous Transfer Mode switching. In fact, all major networking protocols and applications programming interfaces, including the Transmission Control Protocol/Internet Protocol (TCP/IP)and IBM's advanced peer-topeer network (APPN), will have to be modified to run on the emerging Asynchronous Transfer Mode networks. Companies such as IBM Corp. and Novell are researching ways for users to migrate their existing applications environments over to anatm networking infrastructure. The ATM Forum is currently developing an ATM API specification to support native ATM applications that fully utilize the switching scheme's ability to prioritize time-sensitive data and handle multimedia applications. The ATM Forum is also working on a LAN emulation specification that defines how Media Access Control addresses will be mapped to ATM addresses. This will make discovery more efficient and limit broadcasts by such protocols as Internetwork Packet exchange. The goal of LAN emulation is to shield the user from ATM, allowing the construction of networks that integrate existing LAN adapter cards and the new ATM switches. The functionality of first-generation ATM switches is limited in other ways as well. Current Asynchronous Transfer Mode switches lack adequate congestion management capabilities. The buffers are too small and they discard data when the network becomes too congested. Asynchronous Transfer Mode switches should be able to choose traffic to be discarded, based on user-defined criteria.

11 Another area that must be addressed to ensure the success of ATM is the availability of Switched Virtual Circuit (SVCs). Most switches currently used to provision ATM service only support Permanent Virtual Circuit (PVCs). This means that users must configurepermanent virtual circuits to establish fully meshed networks and reconfigure them to add sites or implement network restoral configurations. Configuring the permanent virtual circuits instead of allowing traffic to be addressed dynamically through switched connections can be an arduous task. The full potential of ATM can only be realized with switched virtual circuits. Conclusion Many data communications managers are uncertain about which network technology offers the most cost-effective solution. Available choices include frame relay, Switched Multimegabit Data Service, and Asynchronous Transfer Mode. Some users hold the mistaken view that the three technologies are mutually exclusive. Frame relay andswitched Multimegabit Data Service will eventually function as access interfaces to ATM backbone networks. Frame relay is al ready widely implemented in hardware and services and has proven cost-effective for certain applications. Moreover, efforts are under way to ensure that frame relay, switched multimegabit data services (SMDS), andatm interoperate. The switched multimegabit data services (SMDS) Interest Group, the Frame relay Forum, and the ATM Forum are cooperating in the development of interoperability specifications. When implemented by vendors and services providers, these specifications will provide a high degree of network configuration flexibility. Frame relay links will be able to provide access to bothswitched multimegabit data services (SMDS) and ATM, for example, while traffic on one regional switched multimegabit data services (SMDS) network can be transported over nationwide Asynchronous Transfer Mode backbone links to an switched multimegabit data services (SMDS) network in another region. This flexibility allows users to take advantage of the most appropriate technology without having to replace existing Customer Premises Equipment. Author Biography Nathan J. Muller Nathan J. Muller is an independent consultant in Huntsville AL, specializing in advanced technology marketing and education. He has more than 22 years of industry experience and has written extensively on many aspects of computers and communications. He is the author of eight books and more than 500 technical articles. He has held numerous technical and marketing positions with such companies as Control Data Corp.,Planning Research Corp., Cable & Wireless Communications, ITT Telecom, and General DataComm, Inc. He holds an MA in social and organizational behavior from George Washington University.

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Switch Fabric Implementation Using Shared Memory

Switch Fabric Implementation Using Shared Memory Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Introduction to WAN Technologies

Introduction to WAN Technologies CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

52-20-02 Inverse Multiplexing ATM, Bit by Bit Robin D. Langdon

52-20-02 Inverse Multiplexing ATM, Bit by Bit Robin D. Langdon 52-20-02 Inverse Multiplexing ATM, Bit by Bit Robin D. Langdon Payoff In the time division multiplexing (TDM) environment, there are many applications that require greater than T1/E1 bandwidth, but where

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode CHAPTER 15 Asynchronous Transfer Mode Background Asynchronous Transfer Mode (ATM) technology is based on the efforts of the International Telecommunication Union Telecommunication Standardization Sector

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Network Technologies

Network Technologies Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

An ATM WAN/LAN Gateway Architecture

An ATM WAN/LAN Gateway Architecture An ATM WAN/LAN Gateway Architecture Gary J. Minden, Joseph B. Evans, David W. Petr, Victor S. Frost Telecommunications & Information Sciences Laboratory Department of Electrical & Computer Engineering

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

TAA: Introduction to Wide Area Networks online course specification

TAA: Introduction to Wide Area Networks online course specification Illuminating Technology Course aim: TAA: Introduction to Wide Area Networks online course specification To explain the principles of operation, capabilities and features of various types of wide area network

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

Module 4. Switched Communication Networks. Version 2 CSE IIT, Kharagpur

Module 4. Switched Communication Networks. Version 2 CSE IIT, Kharagpur Module 4 Switched Communication Networks Lesson 6 Asynchronous Transfer Mode Switching (ATM) Specific Instructional Objectives On completion on this lesson, the student will be able to: State the need

More information

As a preview for further reading, the following reference has been provided from the pages of the book below:

As a preview for further reading, the following reference has been provided from the pages of the book below: FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below: Title: Desktop Encyclopedia of Voice and Data Networking Author: Nathan J.

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions

Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions 1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are

More information

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN) Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

More information

Transparent LAN Services Offer Visible Benefits

Transparent LAN Services Offer Visible Benefits Transparent LAN Services Offer Visible Benefits Introduction Over the past few years, several trends have developed that have resulted in the need for better ways to manage wide area networks. The first

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Introduction to WAN Technologies

Introduction to WAN Technologies CHAPTER 3 Introduction to WAN Technologies This chapter introduces the various protocols and technologies used in wide- area network (WAN) environments. Topics summarized here include point-to-point links,

More information

Lecture Computer Networks

Lecture Computer Networks Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

The Network Layer Functions: Congestion Control

The Network Layer Functions: Congestion Control The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff 51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff A standard monitoring algorithm for two traffic types--constant bit rate (e.g., voice) and variable bit rate (e.g., compressed video)--can

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

TABLE OF CONTENTS LIST OF FIGURES

TABLE OF CONTENTS LIST OF FIGURES TABLE OF CONTENTS TABLE OF CONTENTS...4-495 4.7 VIDEO NETWORKING...4-497 4.7.1 Current Network Overview...4-497 4.7.2 Proposed Video Network...4-497 LIST OF FIGURES Figure 4.7.2.2.3-1 Video Implementation

More information

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s The fast path to increased bandwidth for carriers, service providers, and enterprises Printed in the USA.

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

SDH and WDM: a look at the physical layer

SDH and WDM: a look at the physical layer SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and

More information

Optimizing Networks for NASPI

Optimizing Networks for NASPI Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks

More information

White Paper Abstract Disclaimer

White Paper Abstract Disclaimer White Paper Synopsis of the Data Streaming Logical Specification (Phase I) Based on: RapidIO Specification Part X: Data Streaming Logical Specification Rev. 1.2, 08/2004 Abstract The Data Streaming specification

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

52-20-05 The Virtues of Narrowband ATM Daniel A. Kosek James P. Cavanagh

52-20-05 The Virtues of Narrowband ATM Daniel A. Kosek James P. Cavanagh Previous screen 52-20-05 The Virtues of Narrowband ATM Daniel A. Kosek James P. Cavanagh Payoff When deciding on a transport technology, network administrators should consider the enhanced network performance

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

SDH and WDM A look at the physical layer

SDH and WDM A look at the physical layer SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

1. Public Switched Telephone Networks vs. Internet Protocol Networks

1. Public Switched Telephone Networks vs. Internet Protocol Networks Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

The Evolution of Ethernet

The Evolution of Ethernet June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Computer Networks III

Computer Networks III Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router

More information

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai. Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Multi-protocol Label Switching

Multi-protocol Label Switching An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

ATM. Asynchronous Transfer Mode. Networks: ATM 1

ATM. Asynchronous Transfer Mode. Networks: ATM 1 ATM Asynchronous Transfer Mode Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

CS 5516 Computer Architecture Networks

CS 5516 Computer Architecture Networks Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Building integrated services intranets

Building integrated services intranets Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4

More information

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Introduction The GIG and its component networks, including the DISN, form the state-of-the-art network foundation for DoD communications.

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to: www.freescale.com

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to: www.freescale.com Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR nc. 2 What is ATM? o Protocol that applies primarily to layer 2 of the OSI protocol stack: Application Presentation Session Transport Network

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information