ATM Signalling: Protocols and Practice / Edition 1

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $2.98
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (11) from $2.98   
  • New (6) from $62.28   
  • Used (5) from $2.98   


This hands-on book focuses on the practical aspects of ATM signalling that network engineers and designers will need to know now and in the foreseeable future. It covers the basic call control functions as well as Internet Protocol over ATM, LAN emulation, multiprotocol over ATM, and much more. Case studies are also included to demonstrate this technology in action.

Asynchronous transfer mode (ATM) is the most sophisticated telecommunications technique available for simultaneous transmission of sound, data, and images across broadband integrated services digital networks (B-ISDN). Signalling in ATM networks includes standards governed by different standardization bodies.

Read More Show Less

Product Details

  • ISBN-13: 9780471623823
  • Publisher: Wiley
  • Publication date: 3/28/2001
  • Edition number: 1
  • Pages: 270
  • Product dimensions: 6.85 (w) x 9.78 (h) x 0.80 (d)

Read an Excerpt

Chapter 1: Introduction

During the last few years the use of asynchronous Transfer Mode (aTM) networks has increased dramatically. Both public and private network providers use aTM which integrates conventional line-switched networks, such as Narrowband ISDN (N-ISDN), and conventional data networks, such as Ethernet. aTM is based on the standards of the International Telecommunication Union (ITU) and the aTM Forum.

In aTM networks the information is transmitted between communicating entities using fired-size packets, referred to as the aTM cells. an aTM cell has a length of 53 octets, consisting of a 5-octet header and a 48-octet payload field. Therefore, all data transmitted from a source must be se-mented into cells of this size. Then these cells can be transported as a stream by the aTM network. If different streams need to he transported, the associated cells can be multiplexed inside the aTM network. This process increases the network utilisation and is essential to achieve an economically working network. Connection-oriented networks like aTM substantially differ from con connections networks like Internet Protocol lip) in the need for control protocols. In connectionless networks all information that is needed to act the information from the source to the destination is contained in every datagram. In connection-oriented networks a connection must be established before data can be transmitted. This is done by means of control protocols. Naturally. in connection-oriented networks it is easier to support quality of' servicemuch more information can he exchanged in the connection establishment phase between the network and the user (in pure Con connectionless networksone would need to carry this information in every datagram) and network resources can be verified and reserved in the establishment phase. The network can optimise the route and lit it to the needs of the user.

The philosophy and architecture of the aTM control plane stems from the telephone network. Many of the concepts and much of the terminology are adapted to a broadband em ironment (in aTM speak narrowhand means the telephone network. broadband means asynchronous Transfer Mode (aTM)). In contrast to IP. aTM was first standardised and then implementation begun. all this together has led to a quite complicated architecture.

The aTM protocol architecture is usually described as a cube consisting of planes (Figure I . I ). aTM networks distinguish between the data, control and management planes. The data plane defines the protocol layers that are used to process user data, whereas the control plane defines the stack of protocols that are used to establish. tear-down and modify user and control connections. The management planes are used to manage the layers of the user and control plane (layer management) and the planes as a whole (plane management). In this book .ve focus on the control plane protocols used in private aTM networks. We expect the reader to he familiar with the general concepts of aTM: cells, virtual channels 1.1 Organisation of the Book This hook describes the most impoi-talit protocols of the aTM control plane that are used in private aTM network. In Chapter 3 we start with the User-Network Interface (UNI) protocol, w hick is the central protocol to establish connections in an aTM network. Chapter 5 analyses the layer below the UNI-the Signalling aTM adaptation Layer (SaaL). This lave provides transport ,,ci-% ices to the UNI. aTM is asymmetric in the sense that the protocols at the boundary of tile network (the UNI) are different ti-ont the protocols inside the network. Chapter 6 concentrates on tile routing and connection control protocols inside the network Private Network Node Interlace (PNNI). UNI links need to he managed. This is the task of the Integrated Local Management Interface (ILMI) which is discussed in detail in Chapter 7. a couple 1 protocols use the services of the aTM control protocol a» to to provide other network services. The most popular of these protocols. Classical IP over a'I'M (CLIP) and I-aN Emulation over aTM (LaNE.), are described in Chapter S. Two appendices help the reader to find the way through the labyrinth of ITU-T standards (appendix a) and to find source code for tracing `l tools and protocol software as well as to find standard documents (appendix I3).

1.2 Systems used for Experiments

In this book we show the results of several experiments with aTM systems. The experiments were performed in the aTM laboratory of GMD Fokus. In our experiments we used up to lour different aTM switches. The names of these switches are foreplay, forelle...

Read More Show Less

Table of Contents


Overview of ATM Signalling.
UNI: User-Network Interface.
ATM Addresses.
SAAL: Signalling ATM Adaptation Layer.
PNNI: Private Network Node Interface.
ILMI: Integrated Local Management Interface.
Protocols on Top of ATM Signalling.
Appendix A: ITU-T Standards.
Appendix B: Source Code Availability.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)