ATM
Cells
The
asynchronous transfer mode makes use of fixed-size cells, which consist of a 5-
octet
header and a 48-octet information field. There are several advantages to the
use
of small, fixed-size cells. First, their use may reduce queuing delay for a
highpriority
cell,
as it waits less if it arrives slightly behind a lower-priority cell that has
gained
access to a resource (e.g., the transmitter). Secondly, it appears that
fixedsize
cells
can be switched more efficiently, which is important for the very high data
rates
of ATM. With fixed-size cells, it is easier to implement the switching
mechanism
in
hardware.
Header
Format
Figure
11.4a shows the header format at the user-network interface. Figure 11.4b
shows
the cell header format internal to the network, where the generic flow control
field,
which performs local functions, is not retained. Instead, the virtual path
identifier
field is expanded from 8 to 12 bits; this allows support for an expanded
number
of VPCs internal to the network, to include those supporting subscribers
and
those required for network management.
The
generic flow control ,field does not appear
in the cell header internal to the
network,
but only at the user-network interface. Hence, it can be used for control
of
cell flow only at the local user-network interface. The details of its
application are
for
further study. The field could be used to assist the customer in controlling
the
flow
of traffic for different qualities of service. One candidate for the use of
this
field
is a multiple-priority level indicator to control the flow of information in a
service-
dependent
manner. In any case, the GFC mechanism is used to alleviate shortterm
overload
conditions in the network.
The
virtual path identifier (VPI) constitutes a routing field for the
network. It
is
8 bits at
the
user-network interface and 12 bits at the network-network interface,
allowing
for more virtual paths to be supported within the network. The virtual
indicates
user information-that is, information from the next higher layer. In this
case,
the second bit indicates whether congestion has been experienced; the third
bit,
known as the ATM-user-to-ATM-user (AAU) indication bit is a one-bit field
that
can be used to convey information between end users. A value of 1 in the first
bit
indicates that this cell carries network management or maintenance information.
This
indication allows the insertion of network-management cells into a user's VCC
without
impacting the user's data, thereby providing in-band control information.
The
cell-loss priority (CLP) is used to provide guidance to the network in
the
event
of congestion. A value of 0 indicates a cell of relatively higher priority,
which
should
be discarded only when no other alternative is available. A value of 1 indicates
that
this cell is subject to discard within the network. The user might employ
this
field so that extra information may be inserted into the network, with a CLP of
1,
and delivered to the destination if the network is not congested. The network
may
set
this field to 1
for
any data cell that is in violation of an agreement concerning
traffic
parameters between the user and the network. In this case, the switch that
does
the setting realizes that the cell exceeds the agreed traffic parameters but
that
the
switch is capable of handling the cell. At a later point in the network, if
congestion
is
encountered, this cell has been marked for discard in preference to cells that
fall
within agreed traffic limits.
Header
Error Control
Each
ATM cell includes an 8-bit header error control field (HEC) that is calculated
based
on the remaining 32 bits of the header. The polynomial used to generate the
code
is X^8
+ x^2+ X + 1. In most existing
protocols that include an error control
field,
such as HDLC and LAPF, the data that serve as input to the error code
calculation
are,
in general, much longer than the size of the resulting error code; this
allows
for error detection. In the case of ATM, the input to the calculation is only
32
bits, compared to 8 bits for the code. The fact that the input is relatively
short
allows
the code to be used not only for error detection but, in some cases, for actual
error
correction; this is because there is sufficient redundancy in the code to
recover
from
certain error patterns.
Figure
11.5 depicts the operation of the HEC algorithm at the receiver. At
initialization,
the
receiver's error-correction algorithm is in the default mode for single-
bit
error correction. As each cell is received, the HEC calculation and comparison
is
performed. As long as no errors are detected, the receiver remains in
error-correction
mode.
When an error is detected, the receiver will correct the error if it is a
single-bit
error or it will detect that a multi-bit error has occurred. In either case,
the
receiver
now moves to detection mode. In this mode, no attempt is made to correct
errors.
The reason for this change is a recognition that a noise burst or other event
might
cause a sequence of errors, a condition for which the HEC is insufficient for
error
correction. The receiver remains in detection mode as long as errored cells are
received.
When a header is examined and found not to be in error, the receiver
switches
back to correction mode. The flowchart of Figure 11.6 shows the consequence
of
errors in the cell header.
The
error-protection function provides both recovery from single-bit header
errors,
and a low probability of the delivery of cells with errored headers under
bursty
error conditions. The error characteristics of fiber-based transmission sys-
tems
appear to be a mix of single-bit errors and relatively large burst errors. For
some
transmission systems, the error-correction capability, which is more
timeconsuming,
might
not be invoked.
Figure
11.7, based on one in ITU-T 1.432, indicates how random bit errors
impact
the probability of occurrence of discarded cells and valid cells with errored
headers,
when HEC is employed.
Transmission of ATM Cells
The
ITU-T Recommendations for broadband ISDN provide some detail on the
data
rate and synchronization techniques for ATM cell transmission across the
user-network
interface. The approach taken for broadband ISDN is also used in
many
other ATM networks.
The
BISDN specifies that ATM cells are to be transmitted at a rate of 155.52
Mbps
or 622.08 Mbps. As with ISDN, we need to specify the transmission structure
that
will be used to carry this payload. For 622.08 Mbps, the matter has been left
for
further
study. For the 155.52-Mbps interface, two approaches are defined in 1.413:
a
cell-based physical layer and an SDH-based physical layer. We examine each of
these
approaches in turn.
Cell-Based Physical Layer
For
the cell-based physical layer, no framing is imposed. The interface structure
consists
of a continuous stream of 53-octet cells. Because there is no external frame
imposed
on the cell-based approach, some form of synchronization is needed.
Synchronization
is
achieved on the basis of the header error control (HEC) field in the
cell
header. The procedure is as follows (Figure 11.8):
1. In the HUNT state, a cell delineation
algorithm is performed bit by bit to
determine
if the HEC coding law is observed (i.e., match between received
HEC
and calculated HEC). Once a match is achieved, it is assumed that one
header
has been found, and the method enters the PRESYNC state.
2.
In the PRESYNC state, a cell structure is now assumed. The cell delineation
algorithm
is performed cell by cell until the encoding law has been confirmed
consecutively
6 times.
3.
In
the SYNC state, the HEC is used for error detection and correction (see
Figure
11.5). Cell delineation is assumed to be lost if the HEC coding law is
recognized
as incorrect a
times
consecutively.
The
values of a and 6 are design parameters. Greater values of 6 result in
longer
delays in establishing synchronization but in greater robustness against false
delineation.
Greater values of a
result
in longer delays in recognizing a misalignment
but
in greater robustness against false misalignment. Figures 11.9 and 11.10
show
the impact of random bit errors on cell delineation performance for various
values
of a and 6. The first figure shows the average amount of time that the
receiver
will maintain synchronization in the face of errors, with a as a
parameter.
The
second figure shows the average amount of time to acquire synchronization as
a
function of error rate, with 6 as a parameter.
The
advantage of using a cell-based transmission scheme is the simplified
interface
that results when both transmission- and transfer-mode functions are
based
on a common structure.
No comments:
Post a Comment
silahkan membaca dan berkomentar