Labels and label switching, Computer Networking

Assignment Help:

An ATM network is created from interconnected ATM switches. The attachment ports or points can be connected to computers or other ATM switches. As cells reach at an ATM switch, their VPI/VCI is changed using a forwarding table that produced the new VPI/VCI for the next leg of the cell's trip.

The forwarding table is necessarily indexed by the incoming cell's VPI/VCI and the message yield the new VPI/VCI.

LABEL REWRITING:

The placement of the incoming cell's VPI/VCI with a probably distinct VPI/VCI is called rewriting.

ATM is thus known a label switching or label rewriting system. Thus two devices with a connection through an ATM network will likely have distinct VPI/VCI numbers for every end of the connection as given in the figure below.

 

2496_label rewritting.png

 

 

2327_label rewritting1.png

 

EXAMPLE:

 As an example, in the diagram we see that the sending computer S needs a VPI/VCI of 3 and transmits a cell.

 Switch A accepts the cell and looks up 3, then rewrites the VPI/VCI as 4, and transmits the cell out of its port 2.

 Switch B accepts the cell and looks up 4 then rewrites the VPI/VCI as 1 and transmits the cell at its port 2.

 Switch C accepts the cell and looks up 1 then rewrites the VPI/VCI as 6 and transmits the cell out of its port 2.

 The receiver computer R accepts the cell with a VPI/VCI of 6, which is the number it is using for the connection. Forwarding tables in every switch must be coordinated to describe meaningful 'paths' through the network.


Related Discussions:- Labels and label switching

Layer of security, Other than performance  issues, there could be security ...

Other than performance  issues, there could be security reasons for using something like xinetd.  Make simple design in which a new version of xinetd gives a layer of security.

Explain the anonymous ftp, What is anonymous FTP? Anonymous FTP is a wa...

What is anonymous FTP? Anonymous FTP is a way of granting user access to files in public servers. Users that are permitted access to data in these servers do not require identi

Illustrate about the working of socks protocol, Illustrate about the workin...

Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Determine sonet devices, Sonet Devices STS Mux or DMux either multiplex...

Sonet Devices STS Mux or DMux either multiplexes signals from multiple sources into an STS or demultiplexes an STS into different destination signals. Regenerator is a repea

What is quantum computing, In quantum computing, we use the method of qubit...

In quantum computing, we use the method of qubits, superposition and coherence. A normal bit can be in only two states - 0 and 1. But a qubit it can be in 0, 1, or in the superposi

Process of skype is a web-based service, Skype is a web-based service which...

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Explain the working of ISDN, Explain the working of ISDN Stands for ...

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd