Está en la página 1de 6

CSE884 - ATM

Assignment-3
AJAY MALIK

7450070025
PART-A:

Q1. What is VC temporal connectivity? Could a VC be connected?


a) Permanently? b) Dynamically on a per-call basis?
Ans: - virtual connection, is a connection oriented communication service that is delivered by
means of packet mode communication. After a connection or virtual circuit is established
between two nodes or application processes, a virtual circuit protocol allows higher level
protocols to avoid dealing with the division of data into segments, packets, or frames.

However, circuit switching provides constant bit rate and latency, while these may vary in a
virtual circuit service because of reasons such as:

For VC temporal connectivity a real time systems are used. In this the temporal connectivity for
each VC to be established while not jeopardizing the QoS guarantees to other existing VCs and
To reduce the call blocking probability for future VCs by using the minimum possible resources.
We impose a deterministic guarantee that every message generated at the source node be
delivered to the destination node in a time period no longer than the relative deadline. It means
that the route traverses a minimum number of VPs among all possible routes that have sufficient
resources to fulfill the end-to-end temporal QoS requirement of the VG to be established. To
ensure that sufficient bandwidth is available over all the VPs along the selected route, we
incorporate in our proposed scheme a priority assignment method to calculate the worst-case
delay which messages of a VC will experience on a VP along which the VC is routed

Q2. Why is there 3-way Handshaking in establishment of a point-to-point SVC in ATM


while call release involves 2-way Handshaking?
Ans:-
In point –to-point SVC 3 way Handshaking is involved whereas in call release 2way
Handshaking is involved the contrast this difference is attributed that 3 way handshaking is
required for proper negotiation and since the traffic parameter warrants proper negotiation,
which makes the 3way call justified. Moreover for call release the case is different for two
reasons. First ,releasing a call requires no negotiation and hence the ,2way handshake is
optimal .Second ,it is mandatory on the part of an end system to clear a call a call on receiving
the a call –clearing the message and there will be few options available to ATM end system than
to accept a release request and clear the call.

Q3. How a party is added and dropped in a Point-to-Multipoint connection?


Ans: - For adding a party in point-to-multipoint connection ADD-PARTY command is used. To
add, the root which fixes the parameters and the first party sends an ADD-PARTY message
towards the N-UNI. The N-UNI subsequently forwards this ADD-PARTY message to the leaf.
Unlike the set=up message ,the ADD party message is converted by the N-UNI at the leaf-aide
into a SET-UP message before point-point multipoint call even if it cannot support some of the
Q.2971 procedures.
The leaf further responds to this message by sending the CALL PROCEDING, ALERTING and
CONNECT message in order. However both the, ALERTING and CONNECT message are sent
back. In response to COONECT message .the N-UNI sends a CONNECT ACKNOWLEDGE
message to acknowledge the successful addition of the leaf in this point to multipoint connection.
The N-UNI at the root side converts the ALERTING into PARTY ALERTING and CONNECT
into ADD PARTY ACKNOWLEDGE before forwarding it to root.
For dropping a party in point-to-multipoint, it sends a DROP PARTY message towards the leaf
concerned. The N-UNI, on receiving this responds back with a DROP PARTY
ACCKNOWLEDGEMENT message after freeing up its resources for that leaf. The N-UNI also
forwards the DROP PARTY message to the leaf and where it is converted into RELEASE
message and forwards it to the leaf. Leaf responds with a RELAESE COMPLETE MESSAGE
and frees its resources for the connection.

PART-B:

Q4. Discuss the meanings of IDI and of the DSP if AFI =(39,47 or 45)
Ans:- The Authority and Format Identifier (AFI), that identifies the type of addressing scheme
that is used, The IDI(Initial Domain identifier.), which describes the address allocation and
issuing authority and the Domain-Specific Part (DSP), which contains routing information It is a
portion of an NSAP or NSAP-format ATM address that specifies the address allocation and the
administration authority. The IDI identifies the controlling the assignment of the Domain
Specific Part (DSP).
The AFI here specifies the format applicable, Thus the DCC format has AFI=0 X 39, ICD format
has AFI= 0 X 47, E.164 format has AFI= 0 X 45

Q5. What are the three functions with the help of which Routing is accomplished? Discuss
Address summarization.
Ans: - Currently there are three types of ATM routing protocols available which makes routing
accomplish.

1. Proprietary Protocols. Here switch manufacturers supply custom software (e.g. Fore Systems
SPANS). Multivendor interoperability is not possible.
2. Interim Inters witch Signalling Protocol IISP. Each switch maintains a static next-hop routing
table. Network personnel must update these tables, but supplier support is not widespread.
3. Private NNI (PNNI) protocol from the ATM Forum. ATM Forum PNNI v1.0 Its goals
include complete routing support for dynamic environments, support for all Qos and CoS and
multivendor interoperability. It is a very complex, dynamic self-learning protocol that is loosely
based on IETF's OSPF routing protocol. Supplier support is gradually increasing but this calls for
substantial processing power, available on the newest switches. It is not generally available as an
upgrade to existing switches.

Q6. What are various Security management functions done in OSI Management
framework?
Ans:- Security management is one of the key functional areas in open systems network
management. Two key aspects of security management are managing user security services and
providing security to network management systems. These are examined in turn to give the
reader an overview of the state-of-the-art in security management. The ISO OSI Reference
Model is used as a basis to present the security threats, security services and mechanisms which
have to be managed. Telecommunications management networks are used as an example of
management applications which both provide management and require the provision of security
and security management services.
SNMP is a tool (protocol) that allows for remote and local management of items on the
network including servers, workstations, routers, switches and other managed devices.
Comprised of agents and managers
• Agent - process running on each managed node collecting information about the device it
is running on.
• Manager - process running on a management workstation that requests information about
devices on the network.

También podría gustarte