SlideShare uma empresa Scribd logo
1 de 28
Chapter 26 IP over ATM
CONTENTS ,[object Object],[object Object],[object Object],[object Object],[object Object]
ATM  WANS 26.1
Figure  26-1 An ATM WAN in the Internet
Figure  26-2 ATM layers in routers and switches
End devices such as routers use all  three layers, while switches use  only the bottom two layers.
Figure  26-3 AAL5
The AAL layer used by the  IP protocol is AAL5.
Figure  26-4 ATM layer
Figure  26-5 ATM headers
CARRING A DATAGRAM IN CELLS 26.2
Figure  26-6 Fragmentation
Only the last cell carries  the 8-byte trailer  added to the IP datagram.  Padding can be added only to  the last cell or the last two cells.
The value of the PT field  is 000 in all cells  carrying an IP datagram  fragment except for the last cell;  the value is 001 in the last cell.
Figure  26-7 ATM cells
ROUTING  THE CELLS 26.3
Figure  26-8 Entering-point and exiting-point routers
ATMARP 26.4
Figure  26-9 ARP packet
Figure  26-10 Binding with PVC
The inverse request and  inverse reply messages can bind  the physical address  to an IP address in  a PVC situation.
Figure  26-11 Binding with ATMARP
The request and reply  message can be used  to bind a physical address  to an IP address  in an SVC situation.
Figure  26-12 Building a table
The inverse request and inverse  reply can also be used to  build the server’s mapping table.
LOGICAL  IP SUBNET (LIS) 26.5
Figure  26-13 LIS
LIS allows an ATM network to  be divided into several logical subnets.  To use ATMARP,  we need a separate  server for each subnet.

Mais conteúdo relacionado

Mais procurados

Siemens bss 62
Siemens bss 62Siemens bss 62
Siemens bss 62TasKay
 
Siemens bss 63
Siemens bss 63Siemens bss 63
Siemens bss 63TasKay
 
New industrial networks in cars
New industrial networks in cars New industrial networks in cars
New industrial networks in cars Wissam Kafa
 
CSLA and WTM using GDI Technique
CSLA and WTM using GDI TechniqueCSLA and WTM using GDI Technique
CSLA and WTM using GDI TechniqueNishant Yaduvanshi
 
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...IRJET Journal
 
introduction to DCS System 800x a topology
introduction to DCS System 800x a topology introduction to DCS System 800x a topology
introduction to DCS System 800x a topology Ashvani Shukla
 
Siemens bss 61
Siemens bss 61Siemens bss 61
Siemens bss 61TasKay
 
KA-SAT Connected Fuel Case Study 2016
KA-SAT Connected Fuel Case Study 2016KA-SAT Connected Fuel Case Study 2016
KA-SAT Connected Fuel Case Study 2016Daniel Zadrozny
 
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2Hardik Patel
 
DCS FIELDBUS hse linking device
DCS FIELDBUS   hse linking device DCS FIELDBUS   hse linking device
DCS FIELDBUS hse linking device Ashvani Shukla
 
Siemens bss 64
Siemens bss 64Siemens bss 64
Siemens bss 64TasKay
 
FEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bFEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bTina Mirfakhraie
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adderSai Vara Prasad P
 
Implementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select AdderImplementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select Adderinventionjournals
 
Cmos Arithmetic Circuits
Cmos Arithmetic CircuitsCmos Arithmetic Circuits
Cmos Arithmetic Circuitsankitgoel
 
Function blocks and scheduling
Function blocks and scheduling Function blocks and scheduling
Function blocks and scheduling Ashvani Shukla
 
Design and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select AdderDesign and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select Adderijsrd.com
 

Mais procurados (19)

Siemens bss 62
Siemens bss 62Siemens bss 62
Siemens bss 62
 
Siemens bss 63
Siemens bss 63Siemens bss 63
Siemens bss 63
 
New industrial networks in cars
New industrial networks in cars New industrial networks in cars
New industrial networks in cars
 
Indian railway
Indian railwayIndian railway
Indian railway
 
CSLA and WTM using GDI Technique
CSLA and WTM using GDI TechniqueCSLA and WTM using GDI Technique
CSLA and WTM using GDI Technique
 
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...
IRJET- Implementation and Analysis of Hybridization in Modified Parallel Adde...
 
introduction to DCS System 800x a topology
introduction to DCS System 800x a topology introduction to DCS System 800x a topology
introduction to DCS System 800x a topology
 
Siemens bss 61
Siemens bss 61Siemens bss 61
Siemens bss 61
 
KA-SAT Connected Fuel Case Study 2016
KA-SAT Connected Fuel Case Study 2016KA-SAT Connected Fuel Case Study 2016
KA-SAT Connected Fuel Case Study 2016
 
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2
Gsm based advance security and rtealtime vehicle tracking using gps technolgy 2
 
DCS FIELDBUS hse linking device
DCS FIELDBUS   hse linking device DCS FIELDBUS   hse linking device
DCS FIELDBUS hse linking device
 
Siemens bss 64
Siemens bss 64Siemens bss 64
Siemens bss 64
 
FEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2bFEAS_Poster_2015_WNCS_LCV_v2b
FEAS_Poster_2015_WNCS_LCV_v2b
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adder
 
Implementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select AdderImplementation of Low Power and Area Efficient Carry Select Adder
Implementation of Low Power and Area Efficient Carry Select Adder
 
Cmos Arithmetic Circuits
Cmos Arithmetic CircuitsCmos Arithmetic Circuits
Cmos Arithmetic Circuits
 
ICIECA 2014 Paper 07
ICIECA 2014 Paper 07ICIECA 2014 Paper 07
ICIECA 2014 Paper 07
 
Function blocks and scheduling
Function blocks and scheduling Function blocks and scheduling
Function blocks and scheduling
 
Design and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select AdderDesign and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select Adder
 

Semelhante a Ch26

IP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay ModelIP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay ModelPradnya Saval
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATMAhmar Hashmi
 
Networking ch18 Frame Relay operates only physical and data links layers
Networking ch18 Frame Relay operates only physical and data links layersNetworking ch18 Frame Relay operates only physical and data links layers
Networking ch18 Frame Relay operates only physical and data links layersAhmedAlzubaidi15
 
lecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxlecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxAMITKUMAR938671
 
Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05daniel ayalew
 
A Comparative Analysis on Parameters of Different Adder Topologies
A Comparative Analysis on Parameters of Different Adder TopologiesA Comparative Analysis on Parameters of Different Adder Topologies
A Comparative Analysis on Parameters of Different Adder TopologiesIRJET Journal
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 

Semelhante a Ch26 (20)

Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Ch18
Ch18Ch18
Ch18
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Frame 12
Frame 12Frame 12
Frame 12
 
IP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay ModelIP forwarding architectures and Overlay Model
IP forwarding architectures and Overlay Model
 
Ch18
Ch18Ch18
Ch18
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
M odul1
M odul1M odul1
M odul1
 
Networking ch18 Frame Relay operates only physical and data links layers
Networking ch18 Frame Relay operates only physical and data links layersNetworking ch18 Frame Relay operates only physical and data links layers
Networking ch18 Frame Relay operates only physical and data links layers
 
Ch 18
Ch 18Ch 18
Ch 18
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Ch21
Ch21Ch21
Ch21
 
lecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptxlecture2829atmframerelay-180429142508 (1).pptx
lecture2829atmframerelay-180429142508 (1).pptx
 
Ch03
Ch03Ch03
Ch03
 
Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05
 
Swiching
SwichingSwiching
Swiching
 
ARP and RARP.ppt
ARP and RARP.pptARP and RARP.ppt
ARP and RARP.ppt
 
A Comparative Analysis on Parameters of Different Adder Topologies
A Comparative Analysis on Parameters of Different Adder TopologiesA Comparative Analysis on Parameters of Different Adder Topologies
A Comparative Analysis on Parameters of Different Adder Topologies
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Arp
ArpArp
Arp
 

Mais de tejindershami (20)

Ch30
Ch30Ch30
Ch30
 
Ch29
Ch29Ch29
Ch29
 
Ch28
Ch28Ch28
Ch28
 
Ch27
Ch27Ch27
Ch27
 
Ch25
Ch25Ch25
Ch25
 
Ch24
Ch24Ch24
Ch24
 
Ch23
Ch23Ch23
Ch23
 
Ch22
Ch22Ch22
Ch22
 
Ch21
Ch21Ch21
Ch21
 
Ch20
Ch20Ch20
Ch20
 
Ch19
Ch19Ch19
Ch19
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 

Último

Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Último (20)

Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

Ch26