B-ISDN Reference Model
#1

ATM makes B-ISDN a reality. The Integrated services Digital Network (ISDN) evolved during the 80's. It carried a basic channel that could operate at 64kbps (B-channel) and combinations of this and others (D-channels) formed the basis of communication on the network. In the new B-ISDN world, this is supposed to supply data, voice and other communication services over a common network with a wide range of data speeds. To understand a lot of the terminology in ATM-land, it is necessary to understand the B-ISDN Reference Model. Just as the ISO seven-layer model defines the layers for network software, this model defines layers for the ATM network.
The header is broken up into the following fields.

" Generic Flow Control (GFC)
" Virtual Channel Identifier (VCI)
" Virtual Path Identifier (VPI)
" Payload type (PT)
" Cell Loss Priority (CLP)
" Header Error Control (HEC)

Network - to - Network interface

It is necessary for the switches to know how to send the calls along. There are several techniques that could be adopted, but the most useful one for the 1P users is called Private Network-to Network Interface (PNNI)The PNNI is an interface between switches used to distribute information about the state and structure of the network to establish circuit to ensure that reasonable bandwidth and Qos contract can be established and to provide for some network management functions." Convergence Sublayer:
The function provided at this layer differ depending on the service provided. It provides bit error correction and may use explicit time stamps to transfer timing information.

Segmentation and reassembly sublayer:

At this layer the convergence sublayer-protocol data unit is segmented and a header added. The header contains 3 fields
Sequence Number used to detect cell insertion and cell loss.
Sequence Number protection used to correct and detect errors that occur in the sequence number. Convergence sublayer indication used to indicate the presence of the convergence sublayer function
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppt of osi reference model, b isdn protocol model ppt, ieee reference citation, advantages of b isdn, reference model isdn, chemistrt model of 9 claas, model of civilengieering,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DATA SECURITY An Information-Theoretic Model for Steganography full report seminar class 1 1,702 03-02-2012, 10:33 AM
Last Post: seminar addict
  3D Model Searching summer project pal 2 2,207 28-01-2012, 10:00 AM
Last Post: seminar addict
  Relational Model & Algebra smart paper boy 0 954 27-07-2011, 10:02 AM
Last Post: smart paper boy
  BLING: A New Sketch Based 3D Model Search Engine. seminar class 0 1,534 11-04-2011, 10:34 AM
Last Post: seminar class
  Literature Review on “ A Secure Key Management Model For Wireless Mesh Networks seminar class 0 2,025 03-03-2011, 03:01 PM
Last Post: seminar class
  Task Construction for Model-Based Design of Embedded Control Software seminar class 0 888 28-02-2011, 02:52 PM
Last Post: seminar class
Star Modems and ISDN Computer Science Clay 1 2,611 23-02-2011, 11:53 AM
Last Post: seminar class
  A Stronger Model of Dynamic Programming Algorithms seminar class 0 993 14-02-2011, 11:48 AM
Last Post: seminar class
  TRUST-BASED MODEL FOR PRIVACY CONTROL IN CONTEXT-AWARE SYSTEMS seminar class 0 1,371 14-02-2011, 09:52 AM
Last Post: seminar class
  The Java Memory Model and Simulator ppt. seminar surveyer 0 1,780 27-01-2011, 03:02 PM
Last Post: seminar surveyer

Forum Jump: