Labels and label switching, Computer Networking

Assignment Help:

An ATM network is created from interconnected ATM switches. The attachment ports or points can be connected to computers or other ATM switches. As cells reach at an ATM switch, their VPI/VCI is changed using a forwarding table that produced the new VPI/VCI for the next leg of the cell's trip.

The forwarding table is necessarily indexed by the incoming cell's VPI/VCI and the message yield the new VPI/VCI.

LABEL REWRITING:

The placement of the incoming cell's VPI/VCI with a probably distinct VPI/VCI is called rewriting.

ATM is thus known a label switching or label rewriting system. Thus two devices with a connection through an ATM network will likely have distinct VPI/VCI numbers for every end of the connection as given in the figure below.

 

2496_label rewritting.png

 

 

2327_label rewritting1.png

 

EXAMPLE:

 As an example, in the diagram we see that the sending computer S needs a VPI/VCI of 3 and transmits a cell.

 Switch A accepts the cell and looks up 3, then rewrites the VPI/VCI as 4, and transmits the cell out of its port 2.

 Switch B accepts the cell and looks up 4 then rewrites the VPI/VCI as 1 and transmits the cell at its port 2.

 Switch C accepts the cell and looks up 1 then rewrites the VPI/VCI as 6 and transmits the cell out of its port 2.

 The receiver computer R accepts the cell with a VPI/VCI of 6, which is the number it is using for the connection. Forwarding tables in every switch must be coordinated to describe meaningful 'paths' through the network.


Related Discussions:- Labels and label switching

Inductor, #clasification of inductor

#clasification of inductor

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Why is the authentication and key agreement of 3gpp weak, Question 1: a...

Question 1: a) How is the four-way exchange employed for mutual authentication in WPA/RSN? b) Elaborate on how inquiry attacks and traffic monitoring attacks can be u

How is computer networks used in sales and marketing, Q. How is computer ne...

Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

Receive window - transport layer, Receive Window This  field  defin...

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

What is star topology, Star Topology   Devoted point-to-point links to...

Star Topology   Devoted point-to-point links to central controller (hub)   Controller acts like exchange   Advantages - Less expensive - Robustness   Disadv

Nfs, what is this ?

what is this ?

Explain any three most important gsm identifiers, Question 1 A) Explain br...

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

Show the process of mail delivery, Q. Show the process of Mail Delivery? ...

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd