Chapter 18 Virtual-Circuit Networks: Frame Relay, ATM, MPLS, and VPNs 18.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 18-1 FRAME RELAY Frame Relay is a virtual-circuit wide-area network that was designed in response to demands for a new type of WAN in the late 1980s and early 1990s. Topics discussed in this section: Architecture Frame Relay Layers Extended Address FRADs VOFR LMI 18.2 Frame Relay What is so great about frame relay? 1. X.25, its predecessor, had a max. data rate of 64 kbps 2. X.25 has extensive flow and error control 3. X.25 doesn’t fit well into TCP/IP protocol stack (remember the packet layer in X.25?) 4. Frame relay can handle bandwidth on demand using SVCs 5. Frame relay can transfer data up to 45 Mbps 6. Frame relay is a layer two protocol 7. Frame relay is reasonably priced and allows 9000 byte payloads 18.3 Figure 18.1 Frame Relay network 18.4 Note VCIs in Frame Relay are called DLCIs. 18.5 Figure 18.2 Frame Relay layers Only two layers in frame relay. Actually, only data link defined. 18.6 Figure 18.3 Frame Relay frame Looks like HDLC, except no Control field (no flow and error control). Flag is 01111110. FCS is CRC. DLCI is 10-bit data link connection identifier C/R bit tells if this is a command or a response. Not used. EA bit tells if this is an extended address FECN - informs destination that congestion is occurring (more later) BECN - informs source that congestion is occurring DE - discard eligible bit (oh-oh) 18.7 Figure 18.4 Three address formats 18.8 Figure 18.5 FRAD Voice over Frame Relay (VoFR) possible too! 18.9 Frame Relay (continued) Frame Relay (continued) Permanent virtual circuit (PVC) – connection between two endpoints Created by the provider of the frame relay service The user uses a high-speed telephone line to connect its company to a port, which is the entryway to the frame relay network The high-speed line, the port, and the PVC should all be chosen to support a desired transmission speed Frame Relay (continued) Frame Relay Setup Consider a company that has four office locations and currently has six leased lines interconnecting the four locations To install frame relay, the company would ask for six PVCs in place of the six leased lines The company would also need four highspeed telephone lines and four ports connecting the four locations to the frame relay cloud Frame Relay Setup (continued) Frame Relay Setup (continued) Committed Information Rate (CIR) The user and frame relay service would agree upon a committed information rate (CIR) The CIR states that if the customer stays within a specified data rate (standard rate plus a burst rate) the frame relay provider will guarantee delivery of 99.99% of the frames The burst rate cannot be exceeded for longer than 2 seconds Committed Information Rate (CIR) (continued) Example – if a company agrees to a CIR of 512 kbps with a burst rate of 256 kbps, the company must stay at or below 512 kbps, with an occasional burst up to 768 kbps, as long as the burst does not last longer than 2 seconds If the company maintains their end of the agreement, the carrier will provide something like 99.99% throughput and a network delay of no longer than 20 ms If the customer exceeds its CIR, and the network becomes congested, the customer’s frames may be discarded Frame Relay vs. the Internet Frame relay has many advantages over the Internet, including guaranteed throughput and minimum delay, and better security Internet has the advantage of being practically everywhere, cheaper, and simpler to create connections (no PVCs necessary) And Internet tunnels (VPNs) are attractive 18-2 ATM Asynchronous Transfer Mode (ATM) is the cell relay protocol designed by the ATM Forum and adopted by the ITU-T. Topics discussed in this section: Design Goals Problems Architecture Switching ATM Layers 18.19 Figure 18.6 Multiplexing using different frame sizes 18.20 Note A cell network uses the cell as the basic unit of data exchange. A cell is defined as a small, fixed-size block of information. 18.21 Figure 18.7 Multiplexing using cells Cleaner. Fixed buffer sizes, uniform time spent on each cell. 18.22 Figure 18.8 ATM multiplexing Notice that ATM tries to not waste cell space 18.23 Figure 18.9 Architecture of an ATM network UNI - user network interface NNI - network network interface 18.24 Figure 18.10 TP, VPs, and VCs VC - virtual channel VP - virtual path TP - transmission path 18.25 Figure 18.11 Example of VPs and VCs 18.26 Note Note that a virtual connection is defined by a pair of numbers: the VPI and the VCI. 18.27 Figure 18.12 Connection identifiers 18.28 Figure 18.13 Virtual connection identifiers in UNIs and NNIs 18.29 Figure 18.15 Routing with a switch 18.30 Protocol Architecture 18.31 Figure 18.16 ATM layers 18.32 Figure 18.17 ATM layers in endpoint devices and switches 18.33 Protocol Architecture User plane Control plane Provides for user information transfer along with flow control and error control Performs call and connection control functions Management plane Plane management Layer management 18.34 Management functions related to system as a whole; make sure the various planes coordinate their activities properly Provides operations, administration, and maintenance (OAM) services thru info packets that switches exchange to keep system running effectively Figure 18.14 An ATM cell 18.35 Figure 18.18 ATM layer 18.36 Figure 18.19 ATM headers 18.37 Header Format Generic flow control 18.38 Used at user to network interface Controls flow of data from user device into the ATM network only Essentially two classes of connections – controlled and uncontrolled Controlled – network provides info to user regarding how many cells it can send – like a credit mechanism for flow control Uncontrolled – network simply enables or disables sending of cells – like X-ON/X-OFF flow control Header Format Virtual path identifier Virtual channel identifier A 16-bit channel ID. Together, VPI and VCI identify a logical connection Payload type 18.39 An 8-bit (UNI) or 12-bit (NNI) path ID Various types of user info or network management info For example: leftmost bit identifies payload as user data or admin info; second bit indicates whether cell has passed thru any congested switches; third bit might be used to indicate last cell in a sequence of cells Header Format Cell loss priority Header error control 18.40 CLP bit indicates a cell’s priority level If congestion occurs, ATM has option of deleting cells to relieve congestion. Cells with CLP = 1 go first. See the following slides Header Error Control Provides for error checking on the header only Payload is unprotected. Is this a good idea? 18.41 Fiber optic used – so low error rates Some other layer can error detect the payload Does it really make sense to error detect real-time traffic? ATM needs the speed! Uses x8 + x2 + x + 1 checksum Allows some error correction (single-bit errors, which AT&T says happens 99.5% of time) HEC Operation at Receiver (from the Stallings book) As long as no errors are detected, receiver remains in Correction Mode. When an error is detected, receiver will correct the error if it is a single bit or will detect that a multi-bit error has occurred. In either case, the receiver now moves to Detection Mode (because there may be a burst of errors, a condition for which the HEC is insufficient for error correction). 18.42 Header Error Control HEC can also be used for providing synchronization 18.43 Apply error-checking method using 40 consecutive bits. If it does not generate a result consistent with the last 8 bits, shift one bit and try again. Repeat above step until a consistent result is found. Could it be a coincidence? Try it three more times. All four succeed? You are in sync. ATM Service Categories An ATM network can support many types of traffic: Real time Non-real time 18.44 Constant bit rate (CBR) Real time variable bit rate (rt-VBR) Non-real time variable bit rate (nrt-VBR) Available bit rate (ABR) Unspecified bit rate (UBR) CBR Fixed data rate continuously available Tight upper bound on delay Can support uncompressed audio and video 18.45 Video conferencing Interactive audio A/V distribution and retrieval Tightly controlled by Peak Cell Rate (PCR), Cell Transfer Delay (CTD), and Cell Delay Variation (CDV) $$$$ rt-VBR Time sensitive application 18.46 Tightly constrained delay and delay variation rt-VBR applications transmit at a rate that varies with time Examples include bursty voice and video Can statistically multiplex connections Parameters include Peak Cell Rate, Sustainable Cell Rate, and Maximum Burst Size $$$ nrt-VBR 18.47 Non-real time VBR Intended for bursty traffic with no tight constraints on delay and delay variation Examples include airline reservations, banking transactions Parameters include Peak Cell Rate, Sustainable Cell Rate, Maximum Burst Size, Cell Loss Ratio, Cell Transfer Delay $$$ ABR 18.48 Application specifies Peak Cell Rate (PCR) and Minimum Cell Rate (MCR) Resources allocated to give at least MCR Spare capacity shared among all ABR sources Examples include LAN interconnection and basic critical data transfer systems such as banking, defense information (flying standby) $$ UBR 18.49 For application that can tolerate some cell loss or variable delays (non-critical apps) Cells forwarded on FIFO basis Do not specify traffic related service guarantees Examples include text/data/image transfer, messaging, remote terminals Best effort service (wear your parachute) $ ATM Bit Rate Services 18.50 ATM Adaptation Layer Essentially the “translation layer” between ATM layer and other layers, such as PCM and IP PCM (voice) IP 18.51 Assemble bits into cells Re-assemble into constant flow Map IP packets onto ATM cells Fragment IP packets Use LAPF over ATM to retain all IP infrastructure AAL Protocols 18.52 Adaptation Layer Services 18.53 Handle transmission errors Segmentation and re-assembly To enable larger blocks of data to be carried in the information field of ATM cells Handle lost and misinserted cells (cells routed the wrong way) Perform flow control and timing control Supported Application types 18.54 Four AAL protocols defined: AAL 1: CBR traffic, e.g. circuit emulation (T-1 over ATM), voice over ATM, real-time video AAL 2: rt-VBR traffic, e.g. MPEG voice and video AAL 3/4: nrt-VBR traffic, e.g. general data service (not really used by anyone) AAL 5 (successor to AAL 3/4): e.g. nrt-VBR: voice on demand; nrt-VBR: frame relay, ATM; UBR: IP over ATM AAL 1 18.55 AAL 1 is the interface between a realtime uncompressed byte stream and ATM Got to be fast! No convergence sublayer, only SAR sublayer AAL 1 takes 46 or 47 bytes of data and puts a one or two byte header on front AAL 1 continued AAL 1 header consists of following: 18.56 One bit pointer – tells whether this is a one byte header or a two byte header. If second byte is included, this byte tells where the data starts within the payload (in case the payload does not contain a full 46 bytes of data) Three-bit sequence number – used to tell if a cell is lost or mis-inserted (which may be too late anyway for real-time) Four bits of error checking on preceding 3-bit sequence number (yikes!) Figure 18.20 AAL1 18.57 AAL 2 18.58 AAL 2 format is used for compressed data (MPEG voice and video), so ATM needs to indicate where each frame of compressed data ends and begins Figure 18.21 AAL2 18.59 AAL 3/4 18.60 AAL 3/4 format originally designed to support connection-oriented (3) and connectionless (4) data services. As ATM evolved, they discovered that the fundamental issues of the two protocols were the same. AAL 3/4 mostly replaced with AAL5. Figure 18.22 AAL3/4 18.61 AAL 5 18.62 AAL 5 packets can be very large – up to 65,535 byte payload AAL 5 not designed for real-time traffic SAR sublayer takes the potentially large convergence sublayer packets and breaks them into 48 byte chunks, ready for the ATM layer SAR sublayer also adds a 32-bit CRC at the end of the packet, which is applied to the entire packet (see next slide for example) Figure 18.23 AAL5 18.63 In Summary Frame relay ATM 18.64 Up to 45 Mbps but usually slower Local and long distance Cloud computing Being replaced by IP and MPLS Fast! Different classes of service! Small cells A Transition Use of Frame Relay is dropping off quickly ATM is starting to die off too(?) What is replacing these protocols? MPLS VPN 65 Multiprotocol Label Switching An additional layer “added to” IP layer Could say it operates at layer 2.5 between the IP layer and the data link layer Used to move Internet packets more quickly through routers Works like a Zip code 66 Multiprotocol Label Switching By using the MPLS label, the router does not have to “dig in” so deep to retrieve IP address The 20-bit Label field is the key identifier that connects this packet with a particular flow of packets 67 Multiprotocol Label Switching Four fields in an MPLS header: Label (as we saw on previous slide) 3-bit Traffic Class for QoS and congestion notification 1-bit bottom of stack identifier 8-bit TTL field 68 Multiprotocol Label Switching 69 Multiprotocol Label Switching When a packet with no MPLS header arrives at a Label Edge Router (LER), the LER creates a label with appropriate address – the address chosen can be based upon more than just an IP address (QoS too!) Routers that simply route based on MPLS label number are called Label Switch Routers (LSR) 70 VPN (Virtual Private Network) Many types of VPNs Trusted VPNs use non-cryptographic tunneling protocols over a single-provider network, such as MPLS, L2TP (layer 2 tunneling protocol), and Microsoft’s PPTP (point to point tunneling protocol) Secure VPNs use cryptographic tunneling protocols, such as IPsec, Microsoft’s SSTP (secure sockets tunneling protocol), and Cisco VPN and their DTLS 71 VPN (Virtual Private Network) For example, IPsec provides encrypted transmission of packets over the IP layer (similar to SSL-Secure Sockets Layer and SSH - Secure SHell at the transport layer) Applies a header (Authentication Header) directly on top of the IP layer 72 In Conclusion There are a number of ways to provide a “tunnel” through a network Virtual LANs Frame relay ATM MPLS VPN 73