Labels and label switching, Computer Networking

An ATM network is created from interconnected ATM switches. The attachment ports or points can be connected to computers or other ATM switches. As cells reach at an ATM switch, their VPI/VCI is changed using a forwarding table that produced the new VPI/VCI for the next leg of the cell's trip.

The forwarding table is necessarily indexed by the incoming cell's VPI/VCI and the message yield the new VPI/VCI.

LABEL REWRITING:

The placement of the incoming cell's VPI/VCI with a probably distinct VPI/VCI is called rewriting.

ATM is thus known a label switching or label rewriting system. Thus two devices with a connection through an ATM network will likely have distinct VPI/VCI numbers for every end of the connection as given in the figure below.

 

2496_label rewritting.png

 

 

2327_label rewritting1.png

 

EXAMPLE:

 As an example, in the diagram we see that the sending computer S needs a VPI/VCI of 3 and transmits a cell.

 Switch A accepts the cell and looks up 3, then rewrites the VPI/VCI as 4, and transmits the cell out of its port 2.

 Switch B accepts the cell and looks up 4 then rewrites the VPI/VCI as 1 and transmits the cell at its port 2.

 Switch C accepts the cell and looks up 1 then rewrites the VPI/VCI as 6 and transmits the cell out of its port 2.

 The receiver computer R accepts the cell with a VPI/VCI of 6, which is the number it is using for the connection. Forwarding tables in every switch must be coordinated to describe meaningful 'paths' through the network.

Posted Date: 7/31/2012 7:24:18 AM | Location : United States







Related Discussions:- Labels and label switching, Assignment Help, Ask Question on Labels and label switching, Get Answer, Expert's Help, Labels and label switching Discussions

Write discussion on Labels and label switching
Your posts are moderated
Related Questions
what is inheritance in computer systems special permissions?

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

You should develop a system consisting of an application acting as a broker and several agents that need to communicate between them. The agents can only communicate in pairs (i.e.

Question 1 Brief the Fourth generation network. List its advantages and disadvantages Question 2 Explain the steps involved in component identification and call establishm

Q. Explain about Congestion control? Congestion control Open-loop congestion control - prevent congestion before it happens retransmission policy - Ret

Speed Up:- Speed up is the ratio of the time required to implement a given program using a definite algorithm on a machine with one processor (i.e. T (1) (where n=1)) to the ti

How many ways are there to execute VPN architecture?

Q. Illustrate Error Detection-Simple Parity Check? Error Detection-Simple Parity Check A redundant bit called as Parity Bit? is added to every data unit. Even Pa

Introduction An algorithm is defined as a series of computational steps required to accomplish an exact task. The algorithm works for a given input and will terminate in a well

#question.what can we do with a spider when it red?.