|
||||
|
|
||||
![]() Certifications ![]() Cisco ![]() Downloads ![]() IP ![]() PC ![]() Protocols ![]() RemoteAccess ![]() Security ![]() Telecommunications ![]() Tools ![]() Unix ![]() Web |
LAPD Protocol : N-ISDN1. IntroductionISDN stands for "Integrated Services Digital Networks", and it's a ITU-T (formerly CCITT) term for a relatively new telecommunications service package. ISDN is basically the telephone network turned all-digital end to end, using existing switches and wiring (for the most part) upgraded so that the basic "call" is a 64 kbps end-to-end channel. It offered by local telephone companies, but most readily in Australia, Western Europe, Japan, and portions of the USA. In France, ISDN is known as "RNIS".From the point of view of the network, there are three key benefits from the ISDN technology. First, a network configuration based entirely on digital transmission and switching offers the reduced cost, lower power consumption, and easier maintainability that are general characteristics of digital equipment. Second, the higher level of function types, services and user applications on a single network are expected to result in a higher utilization of the network resources, with corresponding increase in revenues. Service integration offers the possibility of integrated network management, maintenance, and billing, leading to important reductions in cost and complexity. A third major benefit to the network lies in its ability to provide a variety of data communications services over a single digital subscriber line. 2. Physical InterfacesAn understanding of the format of interfaces and channel type is critical to any analysis of ISDN because they provide the framework through which the protocols and applications flow. ISDN defines a full network architecture as shown Fig. 1. This architecture separates access functions from actual network functions.![]() Network termination(NT) equipment handles the communications from the network while the terminal equipment(TE) is responsible for the communications from the user. NT1 includes functions equivalent to the OSI's Physical layer. These functions include line termination, Layer 1 line maintenance and performance monitoring, timing, and Layer multiplexing. In contrast, NT2 devices are usually more intelligent than NT1 devices. NT2 devices perform the link layer functions and usually network functions as well. an NT2 devices may be a switch, multiplexer, LAN, PBX, or a terminal controller. NT12 is a single device that has the functionality of an NT1 and NT2. NT12 will handle the physical, link, and network layer protocols. TE includes functions equivalent to Layer 1 and higher. Examples of TE are digital telephones, data terminal equipment, and integrated workstations. TE functions include protocol handling, maintenance, and interfacing. TE1's interface compiles with the ISDN user-network interface(UNI); TE2's does not. TA includes functions equivalent to Layer 1 and higher. It enables a TE2 to be served by an ISDN user network interface. ![]() The S/T interface is intended for use on the two twisted-wire pairs(four-wire twisted pairs)-one to transmit and one to receive- ,allowing full-duplex communication, between the subscriber terminal equipment and the remote PBX terminal. U interface is a full-duplex running over a single pair of twisted wires between the subscriber terminal equipment and the central office switch, or between a network termination 1(ISDN destination NT1) and the central office switch. The conversion from four to two wires (NT1 to LT), needed to maintain consistency with current telephone networks, is done by an echo-canceling algorithm. The range of S and T interface is 3300 feet (1000 m) in a point-to point configuration or up to 500 feet(150 m) in a multidrop passive-bus configuration. The U interface will have a maximum length of 2500 to 6500 m. The T bus is a multipoint bus. It is sometimes called passive bus because there are no repeaters on the line between the NT1 and the devices(TE1). It can be implemented using the same cable and connectors as is 10 base T Ethernet. There may be up to 8 devices on the S/T bus. The bus may be formed with splitters and T connectors- it is bus, not a star. The D channel is used to control the attachment of the one to eight devices to the two B channels. No two devices attach to the same B channel at the same time. 3. Channel Types : BRI and PRIThere are two types of ISDN services, Basic Rate Interface(BRI), operating at 192 kbps, and Primary Rate Interface(PRI), operating at 1.544 Mbps in North America or 2.048 Mbps in Europe. Both services support two common kinds of channel types, the "B" (Bearer) and the "D" (Data).
![]() 4. Data Link Layer Protocol : LAPD4.1 Basic function of LAPD protocolISDN standards are constructed using the Open System Interconnection seven-layer reference model. Layer 2 (data link) protocol for the D channel(called Link Access Procedure-D) is used to convey messages over common D channel. The LAPD and higher layer protocols handle the handshaking(commands and responses), signaling, and control for all of the voice and data calls that are setup through the ISDN D channel. The LAPD protocol evolved from LAPB of the CCITT x.25 protocol in order to serve multiple terminals on a single subscriber loop. LAPD allows multiplexing of layer 2 connections on the same physical connection. Eight users can have simultaneous D channel sessions. Each user is assigned a Logical Channel Number(LCN) and bandwidth is divided accordingly. The objective of LAPD is to provide a secure, error-free connection between two end-points so as to reliably transport Layer 3 messages. LAPD protocol provides framing, sequence control, error detection, and recovery of multiple logical data links on the same D channel. The Layer 2 operation starts with a Layer 3 request to establish a call, which prompts Layer 2 to demand Layer 1 to initiate the start-up procedure. Afterwards Layer 2 initializes itself through the SABME ( Set Asynchronous Balanced Mode Extended) procedure. The SABME is conducted between two peer processes by means of unnumbered frames. Initialization guarantees that the correct sequence numbers are used in processes on both ends. Layer 2 protocol maintain the correct sequence of information due to many different types of error. Firstly, if frames lost more than three consecutive times, the re-establishment of the LAP will be done under the assumption that the connection has failed. Secondly, a timer mechanism and preset values of time-out intervals detect lost frames in the transmit direction. Thirdly, frames received out of sequence denote a lost frame in the receive direction. Finally, frame Check Sequence(FCS) value control and discard frames corrupted by errors due to noise. The LAPD protocol involves two major functions :
4.2 Layer 2 Frame Structure LAPD protocol operations are based on the exchange of Layer 2 frames which consists of several components as shown in Fig.4. The frames contain an integral number of octets that are transmitted in increasing order from top to bottom. Every frame contains at most six fields, opening flag, address, control, information, frame check sequence, and closing flag. Certain frames do not contain information field. The flags consist of one octet each and address and frame check sequence field consist of two octets each. The size of the control field may be one r two octets, depending on the specific type of frame. The information field carries higher layer data and the size of the information field is variable in length with a system dependent. However, the size is restricted to a 260 octets maximum. ![]()
5. Comparison of the Software and Hardware implementation of LAPD protocolDoing the LAPD in software is more costly and less efficient than the hardware based alternative. The software implementation requires a DLC to handle address field recognition, and a microprocessor. The DLC takes care of the bit-level protocol. LAPD's element of procedure is done in software which size is about 12 to 16 kbyte program. When DLC receives data, it performs the address field recognition, check the CRC bits, remove the header, then if the address of the data is matched, interrupts the microprocessor on a character by character. The frequent interruption will reduce the processing time. Using this software intensive approach cannot handle the LAPD protocol at data rates higher than 64 kbit/s, full duplex. On the other hand, in the hardware intensive approach, the microprocessor interruption can be reduced. Two DLCs are used for the hardware implementation. The built in DMA controller and some other hardware perform address recognition. The controller reduce the excessive host overhead caused by interrupts. Eventually, the processor receives the interrupt signals only at the end of each data frame. This allows it to dedicate more processing time to the higher layer protocol.References
This page was created in 0.09076 seconds Comments and Questions
Last modified: October 26 2003. |
|||