Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
9. Define Payload. Ans: It is that part of ATM cell which carries actual user information. It is of 48 octets. 10. What are the important functions of TC sublayer? Ans: Transmission convergence sublayer functions: Header Error Control Cell rate Decoupling Cell Delineation Cell Scrambling Transmission Frame Adaptation 11. What do you understand by Cell Delineation? Ans: Cell Delineation is the mechanism that enables the receiver to recover the cell boundaries. 12. What do you understand by Cell Rate Decoupling? Ans: It is the mechanism to insert idle cells in order to adapt the rate of ATM cells to the payload capacity of the transmission system. 13. What is ATM connection oriented service? Ans: Prior to the exchange of data between two entities an end to end connection is established onto which all data are sent. 14. What is ATM connectionless service? Ans: ALL data are sent via a pre-established ATM virtual connection to a connectionless server which then establishes connections to the destinations. 15. What is ATM network-node/network-to-network interface? Ans: Several types interfaces exist: NNI between ATM nodes of a public network, PNNI between private network nodes, BICI between public networks, AINI to connect any two ATM networks which may employ different internal network protocols. 16. What do understand by BUS? Ans: It is broadcast and unknown server used for LAN emulation which transmits all broadcast/multicast and unknown traffic over the emulated LAN. 17. What is CDV? Ans: A quality of service parameter describing the variations of the cell transfer delays of a single connection. 18. What is CLP? Ans: A bit in the ATM cell header marking those cells which should be discarded prior to other cells in the case of congestion.
19. What is CBR? Ans: An ATM transfer capability with guaranteed cell loss ratio and cell transfer delay 20. What do you understand by Cell Scrambling ? Ans: Cell scrambling is the mechanism whereby the desired patterns in data are changed at the source and the changes reverted back at the destination. 21. What do you understand by Transmission Frame Adaptation? Ans: The cells may be carried on the physical layer either within a frame or just transported over the physical link as a bit sequence. When a framed transport is used, a structure is defined at the physical layer. The cells are mapped onto this structure and carried across the network. This mapping of cells into a framed physical layer structure is called transmission frame adaptation. 22. How can virtual channels/paths be identified? Ans: Virtual channels/paths can be identified by the values in the VCI and VPI fields of an ATM cell header respectively. 23. What is the difference between VP switching and VC switching? Ans: VP switches terminates VP links and therefore have to translate incoming VPIs to the corresponding outgoing VPIs according to the destination of the VP connection. VC switches terminates both VC links and VP links and therefore VPI and VCI translation is performed. As VC switching implies VP switching, in principle a VC switch can also handle mere VP switching. 24. What are the main network performance parameters defined for ATM networks? Ans: Main network performance parameters defined in ATM networks are: Cell Loss Ratio Cell Misinsertion Rate Cell Error Ratio Severely Errored cell block ratio Cell transfer delay 25. What is meant by QOS? Ans: A description/specification of the Quality of an ATM connection using a set of parameters like CLR, CDVT, and CTD bit rate. Different end user applications require ATM connections with different levels of QOS. Several ATM transfer capabilities have been specified each offering a different QOS. 26. What is ATM Data Exchange Interface (DXI)? Ans: The DXI allows a Data Terminal Equipment (DTE) such as router to be connected via Data Circuit Terminating Equipment (DCE) to an ATM Switch.
27. Write functions of ATM layer. Ans: Main functions of ATM Layer are: Cell multiplexing Cell demultiplexing VPI and VCI translation Cell header generation/extraction 28. What is cell multiplexing? Ans: Cells from individual VPs and VCs are multiplexed into one resulting cell stream by the cell multiplexing function. 29. Define any two QOS parameters? Ans: CLR: ratio of lost cells to sent cells CTD: the time needed by a cell from its source to its destination. 30. What do you understand by the term Signalling? Ans: A means of establishing connections on demand by end user equipment or network equipment. Dialing a number for establishing a call is one form of signalling. 31. What planes and layers build up the B-ISDN/ATM PRM? Ans: Layers are: Physical Layer ATM Layer ATM Adaptation Layer Upper Layers Planes are: User Plane Control Plane 32. What is an idle cell? Ans: A cell that is inserted/extracted by the physical layer in order to adapt the cell flow rate at the boundary between the ATM layer and the physical layer to the available payload capacity of the transmission system used. 33. What is the HEC field used for? Ans: HEC field is used for error control. The HEC field contains the checksum calculated over the first four bytes of the cell header using a generator polynomial. 34. What is the PTI field used for? Ans: Three bits of PTI in header are used for the Payload Type Identification. 35. What is the CLP field used for? Ans: CLP field consists of one bit which is used explicitly to indicate the cell loss priority. If the value of the CLP bit is 1 the cell is subject to discard.
36. What are ATM OAM functions? Ans: The operation and maintenance functions are: Performance Monitoring Defect and failure detection System protection Failure and performance information Fault localization 37. Why is there a need for LANE? Ans: (LAN Emulation) The basic operation of LANE is to set up a point to point ATM connection between two LANE end systems instead of broadcasting and filtering data frames. 38. What is CAC? Ans: An algorithm used in ATM switches which checks if enough resources within the switch and/or the network are available for carrying the requested connection without affecting other, already established connections. 39. What is EFCI? Ans: A bit in the ATM cell header which might be set by network elements in case of congestion. End terminals are expected to lower their cell emission rate if this bit is set. 40. What do you mean by Meta-signalling? Ans: ATM uses out of band signalling via specific signalling channels. Unless preestablished, signalling channels are allocated by a Meta-signalling protocol via a predefined Meta signalling virtual channel. 41. What is Policing? Ans: The set of actions taken by the network to delimit the actual cell rate of a connection entering that network to the negotiated cell rate. 42. What is SDH? Ans: Synchronous Digital Hierarchy. This allows the hierarchical mapping of quiet different information streams into a common transmission frame. 43. What is CES? Ans: Circuit emulation service. Transport of a constant bit rate signal e.g. 15/2 Mbits meeting the specified requirements on delay bit error rate etc. , for such signals. 44. What is MPOA? Ans: Multiprotocol over ATM. Based on a set of ATM forum specifications for running a layer 3 protocols over ATM exploiting ATMs quality of service offerings.
45. What is PNNI? Ans: Private network-to-network interface.Based on a set of ATM forum specifications for addressing, signalling and routing within a private network. 46. What is EPD? Ans: Early Packet Discard: In case of congestion ATM switches may discard entire data frames instead of single ATM cells. 47. What is resource management? Ans: All actions taken for sharing network resources like transmission capacity, buffer space etc. among connections. 48. What is ABR? Ans: Available Bit Rate. An ATM transfer capability where the network controls the senders cell emission rate through the use of resource management cells. 49. What do you understand by MIB? Ans: Management Information Base. An abstract description of a specific network element or connection and transmission parameters which can be manipulated and evaluated for network management purposes. 50. What is UPC/NPC? Ans: The set of actions taken by the network to delimit the actual cell rate of a connection entering that network to the negotiated cell rate.
53. Comment how an "AAL0" which refers to a 'null' AAL? Ans: Some folks talk about an "AAL0" which normally refers to a 'null' AAL, i.e. the case where the payload is directly inserted into a cell. This typically requires that the payload can always be fitted into a single cell so that the AAL is not needed for upper layer PDU delineation when the upper layer PDU bridges several cells. 54. How does AAL5 work?
Ans: Here is is a very simplified view of AAL5 and AALs in general. AAL5 is a mechanism for segmentation and reassembly of packets. That is, it is a rulebook which sender and receiver agree upon for taking a long packet and dividing it up into cells. The sender's job is to segment the packet and build the set of cells to be sent. The receiver's job is to verify that the packet has been received intact without errors and to put it back together again. 55. Give the composition for AAL5. Ans: AAL5 (like any other AAL) is composed of a common part (CPCS) and a service specific part (SSCS). The common part is further composed of a convergence sublayer (CS) and a segmentation and reassembly (SAR) sublayer. +--------------------+ | | SSCS +--------------------+ | CS | | ------------------ | CPCS | SAR | +--------------------+ 56. How segmentation is done at SAR? Ans: SAR segments higher a layer PDU into 48 byte chunks that are fed into the ATM layer to generate 53 byte cells (carried on the same VCI). The payload type in the last cell (i.e., wherever the AAL5 trailer is) is marked to indicate that this is the last cell in a packet. (The receiver may assume that the next cell received on that VCI is the beginning of a new packet.) 57. What is the role of CS? Ans: CS provides services such as padding and CRC checking. It takes an SSCS PDU, adds padding if needed, and then adds an 8-byte trailer such that the total length of the resultant PDU is a multiple of 48. The trailer consist of a 2 bytes reserved, 2 bytes of packet length, and 4 bytes of CRC. 58. Give an example of service provided by SSCS. Ans: SSCS is service dependent and may provide services such as assured data transmission based on retransmissions. One example is the SAAL developed for signalling. This consists of the following:
+--------------------+ | SSCF | | ------------------ | SSCS | SSCOP | +--------------------+ | CS | | ------------------ | CPCS | SAR | +--------------------+
59. Which Layer assures data transfer? Ans: SSCOP is a general purpose data transfer layer providing, among other things, assured data transfer. 60. What is SSCF? Ans: ASSCF is a coordination function that maps SSCOP services into those primitives needed specifically for signalling .Different SSCFs may be prescribed for different services using the same SSCOP. 61. What can be the problems during cell transmission? Ans: There are two problems that can happen during transit. First, a cell could be lost. In that case, the receiver can detect the problem either because the length does not correspond with the number of cells received, or because the CRC does not match what is calculated. Second, a bit error can occur within the payload. Since cells do not have any explicit error correction/detection mechanism, this cannot be detected except through the CRC mismatch. It is up to higher layer protocols to deal with lost and corrupted packets. This can be done by using a SSCS which supports assured data transfer, as discussed above.
because it was felt optimal for US networks. The Europeans and Japanese wanted 32 payloads because it was optimal for them. In the end 48 bytes was chosen as a compromise. So 48 bytes payload plus 5 bytes header is 53 bytes total. CCITT chose 48 bytes as a compromise. As far as the header goes, 10% of payload was perceived as an upper bound on the acceptable overhead, so 5 bytes was chosen.
These parameters exist in three forms: actual measured, or estimated declared (by the customer) 66. What are various functions to be considered during traffic shaping? Ans: FUNCTIONS (a) Acceptance Function (b) Policing Function
(c) Charging Function (d) Traffic Shaping Function 67. What is Acceptance Function? Ans: Each switch has the option of accepting a virtual circuit request based on the declared traffic parameters as given by the customer. Acceptance is given if the resulting traffic mix will not cause the switch to not achieve its quality of service goals. The acceptance process is gone through by every switch in a virtual circuit. If a downstream switch refuses to accept a connection, an alternate route might be tried. 68. What is Policing Function? Ans: Given that a switch at the edge of the network has accepted a virtual circuit request, it has to make sure the customer equipment keeps its promises. The policing function in some way estimates the parameters of the incoming traffic and takes some action if they measure traffic exceeding agreed parameters. This action could be to drop the cells, mark them as being low cell-loss priority, etc. 69. What is Charging Function? Ans: The function most ignored by traffic researchers, but perhaps the most important for the success of any service! Basically, this function computes a charge from the estimated and agreed traffic parameters. 70. What is Traffic Shaping Function? Ans: Traffic shaping is something that happens in the customer premise equipment. If the Policing function is the policeman, and the charging function is the judge, then the traffic shaper is the lawyer. The traffic shaper uses information about the policing and charging functions in order to change the traffic characteristics of the customer's stream to get the lowest charge or the smallest cell-loss, etc. For example, an IP router attached to an ATM network might delay some cells slightly in order to reduce the peak rate and rate variance without affecting throughput. An MPEG codec that was operating in a situation where delay wasn't a problem might operate in a CBR mode. 71. What is CLP=0+1 all about? Ans: The cell flow in a connection can be logically split into various cell flows depending on the CLP value of the cell, whether it is 0 or 1. The following are the cell flows:
- CLP=0 cell flow - CLP=1 cell flow - CLP=0+1 cell flow (also called aggregate cell flow)
CLP=0+1 cell flow is for both CLP=0 cells and CLP=1 cells. So logically, a CLP=0 cell travels in 'CLP=0 cell flow' and 'CLP=0+1 cell flow' while a CLP=1 cell travels in 'CLP=1 cell flow' and 'CLP=0+1 cell flow'.
72. How the connection and cell flows can be represented? Ans: The connection and cell flows may be represented as follows: Connection | V ----------------------------------------| CLP=0 Cell Flow | --------------CLP=0+1 Cell Flow --------------| CLP=1 Cell Flow | --------------| --------------------------73. What are the terms to be considered before establishing a connection? Ans: To establish a connection we have to specify Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and Maximum Burst Size (MBS) in forward and backward directions, for each cell flow. So PCR, SCR, etc are not single values to a connection! We must specify these values for the cell flows CLP=0, CLP=1 and CLP=0+1. Usually CLP=0+1 values will be equal to or more than the sum of PCR, etc values of CLP=0 and CLP=1 cell flows.
75. Information about B-ISDN Ans: B-ISUP provides the signalling requirements to support basic bearer services and supplementary services (for Capability Set 1 and Capability Set 2 B-ISDN) for BISDN applications. In the ATM scenario, the introduction of this protocol meets the needs to support the Switched Virtual Connections (SVCs), whereas initial ATM service supported only the Permanent Virtual Connections (PVCs). This protocol is
conceptually the natural evolution of the ISDN User Part (ISUP) in the Broadband field, but many important changes have been introduced: the substitution of the concept of circuit (identified by the CIC) with that of Virtual Path/Virtual Circuit (VP/VC) the substitution of the concept of connection with that of Virtual Path Connection (VPC) a new structure of the protocol, which is now modular and, therefore, open for future enhancements, in terms of Supplementary Services. the possibility to manage point-to-multipoint connections/calls. it can manage both E.164 and AESA addresses.
B-ISUP runs over this protocol stack: SS7 MTP-Level 3 Q.2140 Q.SAAL ATM and contains a specific module, called "Compatibility Process", for managing both unrecognized signalling information and networking issues with an N-ISUP (Narrowband ISUP, i.e. ISUP). 76. Information about B-ICI. Ans: B-ICI stands for Broadband Inter Carrier Interface and is the broad term for the interface and B-ISUP stack as described and documented by ATM Forum. This is a standard interface (based on the ITU-T B-ISUP) which has been chosen by both ITU-T and ATM Forum for interconnecting *public* ATM networks (whereas P-NNI is the standard non-SS7 non-ITU-T based interface for interconnecting *private* ATM networks). This protocol takes many features from ANSI B-ISUP (T1.648.1-4), especially those needed for routing signalling messages through different vendor networks (like the Exit Message and the Carrier Identification Code, Charge Number, Carrier Selection Information, Outgoing Facility Identifier, Originating Line Information parameters).
77. How to establish VPCs by signalling? Ans: ATM Forum UNI 4.0 provides for switched VPs. This is done by:
adding a new bearer class code point in bear Cap IE for "VP service", and adding a new pref/exc code point in connId IE for "exclusive VPCI, no VCI" The ATM Forum also has a Private-NNI SWG. Currently they have worked on a protocol (called PNNI) for distributing link and node state information, and a call setup procedure, to support intra-network routing and switching. Overall, the protocol is designed for source routing, where the first switch in the network has enough information about the topology of the network to determine a route, and then the path information is added to the signalling message (SETUP) and routed along the path. The overall protocol is considerably more complex than this, as its necessary to minimize the view of the topology of a network from the sources point of view (a topological hierarchy is used, among other things), but thats basically the approach. 78. With regard to a carrier ATM network What is an "M4" management interface. Ans: The ATM Forum Management WG defines "management information flows" M1 to M5. A management information flow exchanges information between an ATM management system and a part of a prototypical ATM network. For instance, the M2 interface defines the information flow between a private ATM switch and the local private network management system. The management information flow includes a conceptual view (requirements) and a MIB. Ideally the MIB can be used by SNMP or CMIP. 79. What are various management information flows? Ans: The management information flows relate to the above network: M1 = flow between the private management system and the end ATM device M2 = flow between the private management system and the switches making up the local private ATM net M3 = the flow between the private management system and the public management system M4 = the flow between the switches in the public ATM network and the public management system M5 = the flow between two public management systems
depends on switch internals (what space does it support, are VPI/VCI spaces on all ports fully independent, what is the switch software's policy for value reuse, etc).
82. With respect to the assignment of VPI/VCIs for an ATM Forum 3.1, consider two users A and B which will communicate across a network. Are there really four VPI/VCIs that must be assigned by the call setup process: 1. 2. 3. 4. The VPI/VCI A uses to send to B The VPI/VCI that B will receive from A The VPI/VCI B uses to send to A The VPI/VCI that A will receive from B?
Ans: According to the ATM Forum UNI 3.1 specification, User A will request a VCC via a SETUP message. The Network will either respond with (if there are no problems) a CALL PROCEEDING message or a CONNECT message. In either case, it must respond with a Connection Identifier (VPI/VCI) in the first response to the User (see the section labeled "Connection Identifier Allocation/Selection -Origination in the ATM Forum UNI specification). At the Called User side (B), the Network will allocate a Connection Identifier (VPI/VCI) for the Called user and will be SETUP message sent to the Called User. In both cases (according to UNI 3.0/3.1) the Network allocates the VPI/VCI. Also, the VCC can be bidirectional or unidirectional based on how the VCC was established. The rationale is simple: it is always the "network" side of the UNI that allocates all VCCs for communication on that UNI. It is the master and the "user" is the slave. Hence, the switch always knows which VCCs are available for use at the UNI. The range of valid VCCs is setup using ILMI. 83. Are VP and VC unidirectional? Ans: This has been discussed at some length in the past in this group. Here is one way to look at the situation: each link in the ATM network can be split into two parts, one in each direction. Each directional sub link has the entire range of VCCs (pt-pt links can distinguish between directional data streams). In this context, VCs and VPs can be considered unidirectional. However, one always allocates the same VPI/VCI in both directions for a connection. This may be considered a limitation of the signalling spec or a simplification. 84. Is it necessary to allocate same Bandwidth in both directions?
Ans: Nevertheless, there is no constraint that the same bandwidth must be allocated in both directions. In fact, each direction is an independent traffic stream and has its own traffic parameters and QoS. Some connections may assign the same parameters to both directions if the traffic flows are symmetrical but this is certainly no requirement. Irrespective of all the above, implementation wise, VPs and VCs must be bidirectional and some bandwidth must be allocated in both directions to order to support OAM flows. Maybe this is hidden from a user but it needs to be done just the same. 85. What is VPCI and how does it differ from VPI? Often in SVC context, we see the terminology VPCI used in Connection Identifier IE. How does VPCI differ from VPI? Ans: "The Connection identifier information element is used in signalling messages to identify the corresponding user information flow. The Connection identifier information element contains the Virtual Path Connection Identifier (VPCI) and the Virtual Channel Identifier (VCI). The VPCI is used instead of the Virtual Path Identifier (VPI) since virtual path cross connects may be used in the access and multiple interfaces could be controlled by the signalling virtual channel. Both the user and the network must understand the relationship between the VPCI used in the signalling protocol and the actual VPI used for the user information flow. VPCIs only have significance with regard to a given signalling virtual channel. If the signalling virtual channel only controls a single interface at the user side, the VPI and the VPCI have the same numerical value at the user side.
87. What is Badput? The traffic represented by these "bad" cells may be termed as BADPUT. Correspondingly, the effective throughput, as determined by those cells which are successfully recombined at the receiver, can be termed as GOODPUT. 88. What is early packet drop? Ans: One method of increasing the efficiency of ATM over AAL5 is to drop all remaining cells for a given packet if one of the cells is lost. This functionality is sometimes referred to as "early packet drop." 89. What is Partial/Early Packet Discard (PPD/EPD) Ans: PPD stands for Partial Packet Discard and EPD stands for Early Packet Discard. These two are actually ATM cell discard techniques which maximize "Goodput" by taking advantage of the notion that some types of ATM traffic are made up of large packets that are segmented into a series (or burst) of ATM/AAL5 cells. This notion holds true for classic IP over ATM and for LAN emulation (LANE). 90. PPD/EPD interaction with Traffic Policing? Ans: One action of traffic policing is to CLP=1 mark (TAG) cells which exceed a VCs specific traffic parameters. As these cells traverse an ATM network they will be discarded IF congestion occurs at some place in the network. Implicitly this gives CLP=0 (not TAGed) cells priority in that the CLP=1 cells will be dropped first. It is the result of traffic policing and the operation of CLP tagging that causes cells to be discarded, which can then trigger EPD/PPD. However it is also possible for policing to be doing the right thing and, for example, not tagging any cells, yet still output queues are congested and the need for EPD emerges. 91. How does ATM perform in transporting IP packets? Ans: It is important to consider payload size when estimating IP efficiency. Typical packet size on Internet is between 0 - 512 bytes Almost 70% of TCP datagrams are approximately 40 bytes (TCP ACKs) Almost 80% of UDP datagrams are less than 48 bytes Unfortunately, the transmission efficiency of ATM networks in transporting typical Internet Traffic does not seem all that encouraging. This is primarily because ATM chops a variable size packet into fixed-size 48-bytes cells. Usually the last cell of the packet will be padded with dummy bytes (Cell padding) adding to inefficiency.
The efficiency drops considerably as the payload size nears 48-bytes.The type of Physical link. (SONET/DS3 etc) does not seem to have any effect on the efficiency factor. 92. Give some of the commonly used datagram sizes. Ans: Following table gives an indication of this for some of the commonly used datagram sizes. IP datagram 40 bytes 576 bytes 1500 bytes Efficiency ~ 42% ~ 92% ~ 97%
96. How LANE emulate 802 LANs? Ans: LANE specifies: The address resolution procedures and protocols used to first discover the ATM address that corresponds to a given MAC station address (whether the station is directly ATM-attached, or sitting behind an Ethernet/ATM device) and then to set up a virtual circuit between the end points (or to the Ethernet/ATM device in front of the Ethernet end station). The protocols and procedures to send broadcast and multicast 802 packets over the network, using a LANE server with point-to-point circuits inbound and point-to-multipoint circuits back out to the clients. Same for how to "flood" (bridging term) packets across ATM, through Ethernet/ATM devices to reach Ethernet end stations, even those which have not sent a packet yet (thus making the Ethernet switch aware of them). The packet formats/encapsulations. 97. Can lane work on Token Ring? Ans: LANE also works for Token Ring so substitute Token Ring for Ethernet in the above. LANE also defines how an ATM adapter in a host can present an Ethernet or Token Ring logical interface to the protocol stack above. This enables applications and LAN protocols which were implemented to run above the aforesaid Ethernet or TR LANs to operate without change over an ATM network. 98. How does LANE work? Ans: Here is a brief on how LANE works with ATM:
LANE Client (LEC) Software resides on End System LANE Server (LES) Software resides on the Switch
On boot the ATM adapter registers with the local switch and exchanges management information. Switch provides a prefix to the ATM adapter which in combination with the MAC address of the adapter becomes the ATM address of the adapter. Switch also provides its ATM address. At this point the 2 ATM addresses are known so the LEC establishes a virtual circuit connection (VCC) with the LES. The LEC Registers its ATM/IP/MAC Address with the LES and joins the Emulated LAN. The LES adds the new LEC to the ARP distribution tree. The LEC now queries the LES for the broadcast/Unknown Server (BUS) for multi- cast. LES provides BUS address. LEC establishes VCC with BUS and registers its ATM/IP/MAC Address to multicast distribution tree.
99. What is DXI? Ans: The ATM DXI (Data Exchange Interface)is basically the functional equivalent of the SMDS DXI. Routers will handle frames and packets but not typically fragment them into cells; DSUs will fragment frames into cells as the information is mapped to the digital transmission facility. 100. What is SMDSDXI?
Ans: The DXI, then, provides the standard interface between routers and DSUs without requiring a bunch of proprietary agreements. The SMDS DXI is simple because the router does the frame (SMDS level 3) and the DSU does the cells (SMDS level 2). The ATM DXI is a little more complicated since it has to accommodate AAL3/4 and/or AAL5 (possibly concurrently). 101. Specs on how Frame Relay frames gets mapped to ATM cells.
Ans: There are at least four. One is the mapping defined for Frame Relay/ATM network interworking as defined in Version 1.1 of the ATM Forum's B-ICI spec (network interworking allows Frame Relay end users to communicate with each other over an ATM network). In this case frames are mapped using AAL 5 and the FRSSCS (Frame Relay specific service-specific convergence sublayer). Despite the long-winded name, the essentials of the mapping are quite simple to describe: remove the flags and FCS from a Frame Relay frame, add the AAL-5 CPCS trailer, and segment the result into ATM cells using AAL 5 SAR rules. The spec defines additional details such as the mapping between FECN/BECN/DE in the Frame Relay header and EFCI/CLP bits in the ATM cell headers. 102. How Mapping is done in ATM DXI mode?
Ans: A second mapping is ATM DXI (data exchange interface) mode 1a. This is not strictly a Frame Relay to ATM mapping but rather uses an HDLC frame structure identical to that of Frame Relay frames with a two-byte address field (i.e. a 10-bit DLCI). The HDLC DXI frame address (called DFA in the spec) gets stripped off and the 10 bits of the "DLCI" get mapped in a funny way to the VPI and VCI of the ATM cells. The remainder of the DXI frame gets an AAL 5 CPCS trailer and is chopped up into cells by standard AAL 5 rules. 103. What is ATM/Frame Relay service interworking?
A third mapping is used for ATM/Frame Relay service interworking. This version allows for conversion between the RFC 1490 multiprotocol encapsulation and the RFC 1483 multiprotocol encapsulation. It uses AAL5 with the RFC 1483 encapsulation within the network. It allows a Frame Relay user to communicate with a user of a different service (e.g. SMDS/CBDS) across the ATM network.
104.
What is MPOA?
Ans: The ATM Forum's Multiprotocol Over ATM (MPOA) sub working group is developing an approach to support seamless transport of layer 3 protocols across ATM networks. Layer 3 protocols meaning things like IP and IPX. MPOA, operating at layer 2 and 3, will use the ATM Forum LAN Emulation for its layer 2 forwarding. As such, MPOA can be seen as an evolution beyond LANE. LANE basically connects together a single legacy LAN subnet across ATM. MPOA will take this further by allowing direct ATM connectivity between hosts in different subnets. 105. What is the proposed architecture of ATM connectivity?
Ans: The proposed architecture consists of edge devices and route servers. An edge device (not necessarily user equipment) would forward packets between the LAN and ATM networks, establishing ATM connections when needed, but would not be involved directly in routing. Edge devices would query a Route Server when an unknown host address is encountered. Route Servers would be able to map a host address into the information needed by the edge device to establish a connection across the ATM network. That would be the layer 3 address of the optimal exit point from the ATM network as well as the ATM address of that exit point. Route servers would also be able to forward packets on to the exit point on behalf of the edge device while they are establishing their own ATM virtual circuits. (This last part is LANE.) 106. Info about classical IP over ATM
Ans: RFC1483 defines the encapsulation of IP datagrams (or other protocols) directly in AAL5. Classical IP and ARP over ATM, defined in RFC1577, is targeted towards making IP run over ATM in the most efficient manner utilizing as many of the facilities of ATM as possible. It considers the application of ATM as a direct replacement for the "wires" and local LAN segments connection IP end-stations and routers operating in the "classical" LAN-based paradigm. A comprehensive document, RFC1577 defines the ATMARP protocol for logical IP subnets (LISs). Within an LIS, IP addresses map directly into ATM Forum UNI 3.0 addresses. For communicating out a LIS, an IP router must be used - following the classical IP routing mode. 107. What is a Logical IP Subnet (LIS) and how does it differ from any other subnet? Ans: RFC1577 is the document which defines LIS, but it doesn't make the concept as obvious as one might wish, although the info is in there in section 3.
The short Ans is that Logical IP subnets are identical, in all "protocol" aspects, to conventional LAN etc media subnets. The key aspects that matter in this context are that ATM-attached systems in the same LIS have the same network numbers and subnet masks, just as on an Ethernet or other conventional media. Also, two ATMattached systems not in the same LIS cannot communicate via RFC1577 except through a router, even though they are both attached to the same ATM physical network, with ATM-level connectivity available (PVC or SVC) between them. This second limitation was a significant factor in the creation of RFC1577. The issues of "cut-through routing", or communications between two systems in different IP subnets on a common ATM network (as well as other connection-oriented networks) were found to be complex, and there was a desire to define at least the standard or "Classical" means of running IP over ATM before all those issues were resolved.
Ans: First lets define the three terms, PVC, Soft PVC, and SVC. PVC in the usual meaning is a VC that is not signaled by the end points. Both of the endpoint (user) VC values are manually provisioned. The link-by-link route through the network is also manually provisioned. If any equipment fails, the PVC is down, unless the underlying physical network (SONET, for example) can re-route below ATM. So PVC is a VC which is statically mapped at every point in the ATM network. A failure of any link that PVC crosses results in the failure of the PVC. 109. Define Soft PVC.
A Soft PVC also has manually provisioned endpoint (user) VC values (which as defined above do not change), but the route through the network can be automatically revised if there is a failure. Historically this feature pretty much required a singlevendor network. A vendor may employ signalling (invisibly to the endpoints) within the network, or may just have a workstation somewhere sending proprietary configuration commands when it detects a failure. However, the PNNI 1.0 spec defines a standard way of doing this which does not require a vendor proprietary solution. So a Soft PVC is a VC that is programmed to be present at all times (like a PVC), but does not use static routes to determine its path through the ATM network. Failure of a link causes a Soft PVC to route around the outage and remain available. 110. Define SVC.
A SVC is established by UNI signalling methods. So an SVC is a demand connection initiated by the user. If a switch in the path fails, the SVC is broken and would have to be reconnected.
111.
Summarizing, the difference between a PVC and a Soft PVC is that a Soft PVC will be automatically rerouted if a switch or link in the path fails. From that perspective a Soft PVC is considered more robust that a simple PVC. The difference between a SVC and a Soft PVC is that a SVC is established on an "as needed" basis through user signalling. With a Soft PVC the called party cannot drop the connection. 112. I have not been able to find information about how connections in the ATM layer of ATM are set up. Since ATM is connection oriented the AAL somehow must signal to the ATM layer that it wants to have a connection open to another host. How is this signalling done? Ans: Actually, it's not the AAL layer that originates the request for a connection (although if one were a strict believer in network layering, one might assume so :-). AAL just defines how information of a given type is packaged for transporting over the ATM network. There is a signalling protocol (which, by the way, uses AAL5) which defines a protocol which includes the end stations, plus any relevant ATM switches along the path. There are various entities above AAL that could determine a connection is needed, including the LAN Emulation Client, an IP-ATM end station, a direct video-overATM application, or a human network operator. If the connection is set up via Switched Virtual Circuits (SVC's), then the protocol used is most likely most commonly referenced via the ATM Forum's specs:
today), UNI 3.1 (the update for Q.2931 compatibility, no functional changes) UNI 4.0 (approved in 1996)
If the connection is set up by manual means, then the management interface of your nearby switch is most relevant.
113. Ans:
114. Ans:
What does a point to multipoint SVC call setup trace look like?
115.
Ans: Proxy signalling capability allows a user, called the Proxy Signalling Agent (PSA), to perform signalling for one or more users that do not support Signalling. This enables End Systems that do not understand ATM Signalling to set up signal and set up SVC calls with the help of the Proxy Sig Agent.
PSA uses VPI/VPCI mapping to determine the destination User (that does not support signalling).
VPCI 1 2
UNI interface ID 10 11
VPI 0 0
Referring to the VPI/VPCI table above, if the signaled VPCI is 1, the PSA now understands that the SVC call is destined for UNI interface 10 on VPI=0.
Ans:SONET and SDH are very close, but with just enough differences that they don't really interoperate. Probably the major difference between them is that SONET is based on the STS-1 at 51.84 Mb/s (for efficient carrying of T3 signals), and SDH is based on the STM-1 at 155.52 Mb/s (for efficient carrying of E4 signals). As such, the way payloads are mapped into these respective building blocks differ (which makes sense, given how the European and North American PDHs differ). The following table shows how the US STS and the European STM levels compare:
Ans: CBR (constant bit rate) The CBR service classs is intended for real-time applications, i.e. those requring tightly constrained delay and delay variation, as would be appropriate for voice and video applications. The consistent availability of a fixed quantity of bandwidth is considered appropriate for CBR service. Cells which are delayed beyond the value specified by CTD(cell transfer delay) are assumed to be significantly less value to the application. For CBR, the following ATM attributes are specified:
118.
What is the meaning of VBR? Real time VBR The real time VBR service class is intended for real-time applications, i.e., those requiring tightly constrained delay and delay variation, as would be appropriate for voice and video applications. Sources are expected to transmit at a rate which varies with time. Equivalently the source can be described "bursty". Cells which are delayed beyond the value specified by CTD are assumed to be of significantly less value to the application. Real-time VBR service may support statistical multiplexing of real-time sources, or may provide a consistently guaranteed QoS. For real time VBR, the following ATM attributes are specified:
PCR/CDVT CLR CTD/CDV SCR and BT(sustainable cell rate and burst tolerance)
Non-real time VBR The non-real time VBR service class is intended for non-real time applications which have 'bursty' traffic characteristics and which can be characterized in terms of a GCRA. For those cells which are transferred, it expects a bound on the cell transfer delay. Non-real time VBR service supports statistical multiplexing of connections. For non-real time VBR, the following attributes are supported:
119.
Ans: UBR (unspecified bit rate) The UBR service class is intended for delay-tolerant or non-real-time applications, i.e., those which do not require tightly constrained delay and delay variation, such as traditional computer communications applications. Sources are expected to transmit non-continuous bursts of cells. UBR service supports a high degree of statistical
multiplexing among sources. UBR service includes no notion of a per-VC allocated bandwidth resource. Transport of cells in UBR service is not necessarily guaranteed by mechanisms operating at the cell level. However it is expected that resources will be provisioned for UBR service in such a way as to make it usable for some set of applications. UBR service may be considered as interpretation of the common term "best effort service". For UBR, the following ATM attributes are specified: 120. PCR/CDVT What is the meaning of ABR?
Ans: ABR (available bit rate) Many applications have the ability to reduce their information transfer rate if the network requires them to do so. Likewise, they may wish to increase their information transfer rate if there is extra bandwidth available within the network. There may not be deterministic parameters because the users are willing to live with unreserved bandwidth. To support traffic from such sources in an ATM network will require facilities different from those for Peak Cell Rate of Sustainable Cell Rate traffic. 121. What are different names for similar services classes?
Class A is CBR with accurate timing (e.g. phone calls) Class B is VBR with timing (e.g. pocketsize phone calls) Class C is VBR without accurate timing Class D is connectionless VBR without accurate timing Class X is UBR Class Y is ABR
122. Ans:
How does ATM differ from SMDS? Ans: SMDS is the Switched Multi-megabit Data Service, a service offering interface from Bell core. SMDS provides a datagram service, where a packet has about a 40octet header plus up to 9188 octets of data. The packets themselves may or may not be transported within the network on top of a connection- oriented ATM service. SMDS uses E.164 (ISDN) addresses. Therefore SMDS is a connectionless packet switched *service*, not a cell-relay service.
However, the SMDS Subscriber Network Interface is currently defined to use IEEE 802.6 Distributed Queue Dual Bus (DQDB) access across the SMDS user-network interface. DQDB itself *is* a form of cell relay. The lower layers of SMDS fragment the packets into cells with a 5-octet header and 48-octet payload. The payload itself has a 2-octet header, 44-octets of data, plus a 2-octet trailer. An SMDS cell therefore is nearly identical in form to an AAL3/4 cell. Note that while DQDB is used as the access protocol, either DQDB or AAL3/4 may be used for the switch-to-switch interface.