Misplaced Pages

Internet Stream Protocol

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

The Internet Stream Protocol ( ST ) is a family of experimental protocols first defined in Internet Experiment Note IEN-119 in 1979, and later substantially revised in RFC 1190 (ST-II) and RFC 1819 (ST2+). The protocol uses the version number 5 in the version field of the Internet Protocol header, but was never known as IPv5. The successor to IPv4 was thus named IPv6 to eliminate any possible confusion about the actual protocol in use.

#3996

61-785: The Internet Stream Protocol family was never introduced for public use, but many of the concepts available in ST are similar to later Asynchronous Transfer Mode protocols and can be found in Multiprotocol Label Switching (MPLS). They also presaged voice over IP . ST arose as the transport protocol of the Network Voice Protocol , a pioneering computer network protocol for transporting human speech over packetized communications networks, first implemented in December 1973 by Internet researcher Danny Cohen of

122-608: A 5-byte header and a 48-byte payload. ATM defines two different cell formats: user–network interface (UNI) and network–network interface (NNI). Most ATM links use UNI cell format. Diagram of a UNI ATM cell Payload and padding if necessary (48 bytes) Diagram of an NNI ATM cell Payload and padding if necessary (48 bytes) ATM uses the PT field to designate various special kinds of cells for operations, administration and management (OAM) purposes, and to delineate packet boundaries in some ATM adaptation layers (AAL). If

183-435: A cell-by-cell basis, but this is sub-optimal for encapsulated packet traffic as discarding a single cell will invalidate a packet's worth of cells. As a result, schemes such as partial packet discard (PPD) and early packet discard (EPD) have been developed to discard a whole packet's cells. This reduces the number of useless cells in the network, saving bandwidth for full packets. EPD and PPD work with AAL5 connections as they use

244-598: A dual leaky bucket controller to a PCR and CDVT and an SCR and maximum burst size (MBS). The MBS will normally be the packet ( SAR - SDU ) size for the VBR VC in cells. If the traffic on a virtual circuit exceeds its traffic contract, as determined by the GCRA, the network can either drop the cells or set the Cell Loss Priority (CLP) bit, allowing the cells to be dropped at a congestion point. Basic policing works on

305-440: A fixed length (53 octets ) called cells . This differs from approaches such as Internet Protocol (IP) (OSI layer 3) or Ethernet (also layer 2) that use variable-sized packets or frames. ATM uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the data exchange begins. These virtual circuits may be either permanent (dedicated connections that are usually preconfigured by

366-594: A fixed-size 32-bit address in the final version of IPv4 . This remains the dominant internetworking protocol in use in the Internet Layer ; the number 4 identifies the protocol version, carried in every IP datagram. IPv4 is defined in RFC   791 (1981). Version number 5 was used by the Internet Stream Protocol , an experimental streaming protocol that was not adopted. The successor to IPv4

427-436: A low-jitter network interface. Cells were introduced to provide short queuing delays while continuing to support datagram traffic. ATM broke up all data packets and voice streams into 48-byte pieces, adding a 5-byte routing header to each one so that they could be reassembled later. Being 1/30th the size reduced cell contention jitter by the same factor of 30. The choice of 48 bytes was political rather than technical. When

488-425: A proposed route through a network in order to satisfy the service requirements of a VC or VP. Another key ATM concept involves the traffic contract . When an ATM circuit is set up each switch on the circuit is informed of the traffic class of the connection. ATM traffic contracts form part of the mechanism by which quality of service (QoS) is ensured. There are four basic types (and several variants) which each have

549-452: A set of parameters describing the connection. VBR has real-time and non-real-time variants, and serves for bursty traffic. Non-real-time is sometimes abbreviated to vbr-nrt. Most traffic classes also introduce the concept of cell-delay variation tolerance (CDVT), which defines the clumping of cells in time. To maintain network performance, networks may apply traffic policing to virtual circuits to limit them to their traffic contracts at

610-412: A useful ability to carry multiple logical circuits on a single physical or virtual medium, although other techniques exist, such as Multi-link PPP , Ethernet VLANs , VxLAN , MPLS , and multi-protocol support over SONET . An ATM network must establish a connection before two parties can send cells to each other. This is called a virtual circuit (VC). It can be a permanent virtual circuit (PVC), which

671-579: Is IPv6 . IPv6 was a result of several years of experimentation and dialog during which various protocol models were proposed, such as TP/IX ( RFC   1475 ), PIP ( RFC   1621 ) and TUBA (TCP and UDP with Bigger Addresses, RFC   1347 ). Its most prominent difference from version 4 is the size of the addresses. While IPv4 uses 32 bits for addressing, yielding c. 4.3 billion ( 4.3 × 10 ) addresses, IPv6 uses 128-bit addresses providing c. 3.4 × 10 addresses. Although adoption of IPv6 has been slow, as of January 2023 , most countries in

SECTION 10

#1732776198004

732-413: Is Internet Protocol version 6 (IPv6), which has been in increasing deployment on the public Internet since around 2006. The Internet Protocol is responsible for addressing host interfaces , encapsulating data into datagrams (including fragmentation and reassembly ) and routing datagrams from a source host interface to a destination host interface across one or more IP networks. For these purposes,

793-448: Is a connectionless protocol , in contrast to connection-oriented communication . Various fault conditions may occur, such as data corruption , packet loss and duplication. Because routing is dynamic, meaning every packet is treated independently, and because the network maintains no state based on the path of prior packets, different packets may be routed to the same destination via different paths, resulting in out-of-order delivery to

854-928: Is a telecommunications standard defined by the American National Standards Institute and International Telecommunication Union Telecommunication Standardization Sector (ITU-T, formerly CCITT) for digital transmission of multiple types of traffic. ATM was developed to meet the needs of the Broadband Integrated Services Digital Network as defined in the late 1980s, and designed to integrate telecommunication networks. It can handle both traditional high-throughput data traffic and real-time , low-latency content such as telephony (voice) and video. ATM provides functionality that uses features of circuit switching and packet switching networks by using asynchronous time-division multiplexing . ATM

915-612: Is an example of a protocol that adjusts its segment size to be smaller than the MTU. The User Datagram Protocol (UDP) and ICMP disregard MTU size, thereby forcing IP to fragment oversized datagrams. During the design phase of the ARPANET and the early Internet, the security aspects and needs of a public, international network could not be adequately anticipated. Consequently, many Internet protocols exhibited vulnerabilities highlighted by network attacks and later security assessments. In 2008,

976-402: Is created administratively on the end points, or a switched virtual circuit (SVC), which is created as needed by the communicating parties. SVC creation is managed by signaling , in which the requesting party indicates the address of the receiving party, the type of service requested, and whatever traffic parameters may be applicable to the selected service. Call admission is then performed by

1037-538: Is dynamic in terms of the availability of links and nodes. No central monitoring or performance measurement facility exists that tracks or maintains the state of the network. For the benefit of reducing network complexity , the intelligence in the network is located in the end nodes . As a consequence of this design, the Internet Protocol only provides best-effort delivery and its service is characterized as unreliable . In network architectural parlance, it

1098-495: Is error-free. A routing node discards packets that fail a header checksum test. Although the Internet Control Message Protocol (ICMP) provides notification of errors, a routing node is not required to notify either end node of errors. IPv6, by contrast, operates without header checksums, since current link layer technology is assumed to provide sufficient error detection. The dynamic nature of

1159-551: Is going to dominate". However, in 2005 the ATM Forum , which had been the trade organization promoting the technology, merged with groups promoting other technologies, and eventually became the Broadband Forum . Wireless ATM, or mobile ATM, consists of an ATM core network with a wireless access network. ATM cells are transmitted from base stations to mobile terminals. Mobility functions are performed at an ATM switch in

1220-508: Is in use for a given cell is not encoded in the cell. Instead, it is negotiated by or configured at the endpoints on a per-virtual-connection basis. Following the initial design of ATM, networks have become much faster. A 1500 byte (12000-bit) full-size Ethernet frame takes only 1.2 μs to transmit on a 10 Gbit/s network, reducing the motivation for small cells to reduce jitter due to contention. The increased link speeds by themselves do not eliminate jitter due to queuing. ATM provides

1281-650: The CCITT (now ITU-T) was standardizing ATM, parties from the United States wanted a 64-byte payload because this was felt to be a good compromise between larger payloads optimized for data transmission and shorter payloads optimized for real-time applications like voice. Parties from Europe wanted 32-byte payloads because the small size (4 ms of voice data) would avoid the need for echo cancellation on domestic voice calls. The United States, due to its larger size, already had echo cancellers widely deployed. Most of

SECTION 20

#1732776198004

1342-499: The Information Sciences Institute (ISI) as part of ARPA 's Network Secure Communications (NSC) project. First specified in 1979, ST was envisioned as a connection-oriented complement to IPv4 , operating on the same level, but using a different header format from that used for IP datagrams. According to IEN-119, its concepts were formulated by Danny Cohen, Estil Hoversten, and James W. Forgie. The protocol

1403-518: The Internet . IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers . For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. IP was the connectionless datagram service in

1464-528: The Private Network-to-Network Interface (PNNI) protocol to share topology information between switches and select a route through a network. PNNI is a link-state routing protocol like OSPF and IS-IS . PNNI also includes a very powerful route summarization mechanism to allow construction of very large networks, as well as a call admission control (CAC) algorithm which determines the availability of sufficient bandwidth on

1525-493: The most significant bit (MSB) of the PT field is 0, this is a user data cell, and the other two bits are used to indicate network congestion and as a general-purpose header bit available for ATM adaptation layers. If the MSB is 1, this is a management cell, and the other two bits indicate the type: network management segment, network management end-to-end, resource management, and reserved for future use. Several ATM link protocols use

1586-532: The public switched telephone network and in the Integrated Services Digital Network (ISDN) but has largely been superseded in favor of next-generation networks based on IP technology. Wireless and mobile ATM never established a significant foothold. To minimize queuing delay and packet delay variation (PDV), all ATM cells are the same small size. Reduction of PDV is particularly important when carrying voice traffic, because

1647-422: The 1990s. However, even by the end of the decade, the better price–performance ratio of Internet Protocol -based products was competing with ATM technology for integrating real-time and bursty network traffic. Companies such as FORE Systems focused on ATM products, while other large vendors such as Cisco Systems provided ATM as an option. After the burst of the dot-com bubble , some still predicted that "ATM

1708-582: The European parties eventually came around to the arguments made by the Americans, but France and a few others held out for a shorter cell length. 48 bytes was chosen as a compromise, despite having all the disadvantages of both proposals and the additional inconvenience of not being a power of two in size. 5-byte headers were chosen because it was thought that 10% of the payload was the maximum price to pay for routing information. An ATM cell consists of

1769-505: The GFC field for a local flow control and sub-multiplexing system between users. This was intended to allow several terminals to share a single network connection in the same way that two ISDN phones can share a single basic rate ISDN connection. All four GFC bits must be zero by default. The NNI cell format replicates the UNI format almost exactly, except that the 4-bit GFC field is re-allocated to

1830-510: The HEC field to drive a CRC-based framing algorithm, which allows locating the ATM cells with no overhead beyond what is otherwise needed for header protection. The 8-bit CRC is used to correct single-bit header errors and detect multi-bit header errors. When multi-bit header errors are detected, the current and subsequent cells are dropped until a cell with no header errors is found. A UNI cell reserves

1891-443: The Internet Protocol defines the format of packets and provides an addressing system. Each datagram has two components: a header and a payload . The IP header includes a source IP address, a destination IP address, and other metadata needed to route and deliver the datagram. The payload is the data that is transported. This method of nesting the data payload in a packet with a header is called encapsulation. IP addressing entails

Internet Stream Protocol - Misplaced Pages Continue

1952-480: The Internet and the diversity of its components provide no guarantee that any particular path is actually capable of, or suitable for, performing the data transmission requested. One of the technical constraints is the size of data packets possible on a given link. Facilities exist to examine the maximum transmission unit (MTU) size of the local link and Path MTU Discovery can be used for the entire intended path to

2013-547: The US, and 2 to 34 Mbit/s in Europe. At 155 Mbit/s, a typical full-length 1,500 byte Ethernet frame would take 77.42  μs to transmit. On a lower-speed 1.544 Mbit/s T1 line , the same packet would take up to 7.8 milliseconds. A queuing delay induced by several such data packets might exceed the figure of 7.8 ms several times over. This was considered unacceptable for speech traffic. The design of ATM aimed for

2074-743: The VCI is similar to that of the data link connection identifier (DLCI) in Frame Relay and the logical channel number and logical channel group number in X.25 . Another advantage of the use of virtual circuits comes with the ability to use them as a multiplexing layer, allowing different services (such as voice, Frame Relay, IP). The VPI is useful for reducing the switching table of some virtual circuits which have common paths. ATM can build virtual circuits and virtual paths either statically or dynamically. Static circuits (permanent virtual circuits or PVCs) or paths (permanent virtual paths or PVPs) require that

2135-550: The VPI field, extending the VPI to 12 bits. Thus, a single NNI ATM interconnection is capable of addressing almost 2 VPs of up to almost 2 VCs each. ATM supports different types of services via AALs. Standardized AALs include AAL1, AAL2, and AAL5, and the rarely used AAL3 and AAL4. AAL1 is used for constant bit rate (CBR) services and circuit emulation. Synchronization is also maintained at AAL1. AAL2 through AAL4 are used for variable bitrate (VBR) services, and AAL5 for data. Which AAL

2196-407: The VPI, is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. The length of the VPI varies according to whether the cell is sent on a user-network interface (at the edge of the network), or if it is sent on a network-network interface (inside the network). As these cells traverse an ATM network, switching takes place by changing

2257-521: The VPI/VCI values (label swapping). Although the VPI/VCI values are not necessarily consistent from one end of the connection to the other, the concept of a circuit is consistent (unlike IP, where any given packet could get to its destination by a different route than the others). ATM switches use the VPI/VCI fields to identify the virtual channel link (VCL) of the next network that a cell needs to transit on its way to its final destination. The function of

2318-463: The assignment of IP addresses and associated parameters to host interfaces. The address space is divided into subnets , involving the designation of network prefixes. IP routing is performed by all hosts, as well as routers , whose main function is to transport packets across network boundaries. Routers communicate with one another via specially designed routing protocols , either interior gateway protocols or exterior gateway protocols , as needed for

2379-435: The circuit (the service contract ) and the two endpoints. ATM networks create and remove switched virtual circuits (SVCs) on demand when requested by an end station . One application for SVCs is to carry individual telephone calls when a network of telephone switches are interconnected using ATM. SVCs were also used in attempts to replace local area networks with ATM. Most ATM networks supporting SPVPs, SPVCs, and SVCs use

2440-409: The circuit is composed of a series of segments, one for each pair of interfaces through which it passes. PVPs and PVCs, though conceptually simple, require significant effort in large networks. They also do not support the re-routing of service in the event of a failure. Dynamically built PVPs (soft PVPs or SPVPs) and PVCs (soft PVCs or SPVCs), in contrast, are built by specifying the characteristics of

2501-454: The conversion of digitized voice into an analog audio signal is an inherently real-time process. The decoder needs an evenly spaced stream of data items. At the time of the design of ATM, 155 Mbit/s synchronous digital hierarchy with 135 Mbit/s payload was considered a fast optical network link, and many plesiochronous digital hierarchy links in the digital network were considerably slower, ranging from 1.544 to 45 Mbit/s in

Internet Stream Protocol - Misplaced Pages Continue

2562-459: The core network, known as a crossover switch , which is similar to the mobile switching center of GSM networks. The advantage of wireless ATM is its high bandwidth and high-speed handoffs done at layer 2. In the early 1990s, Bell Labs and NEC research labs worked actively in this field. Andy Hopper from the University of Cambridge Computer Laboratory also worked in this area. There

2623-411: The destination. The IPv4 internetworking layer automatically fragments a datagram into smaller units for transmission when the link MTU is exceeded. IP provides re-ordering of fragments received out of order. An IPv6 network does not perform fragmentation in network elements, but requires end hosts and higher-layer protocols to avoid exceeding the path MTU. The Transmission Control Protocol (TCP)

2684-413: The end of packet marker: the ATM user-to-ATM user (AUU) indication bit in the payload-type field of the header, which is set in the last cell of a SAR-SDU. Traffic shaping usually takes place in the network interface controller (NIC) in user equipment, and attempts to ensure that the cell flow on a VC will meet its traffic contract, i.e. cells will not be dropped or reduced in priority at the UNI. Since

2745-506: The entry points to the network, i.e. the user–network interfaces (UNIs) and network-to-network interfaces (NNIs) using usage/network parameter control (UPC and NPC). The reference model given by the ITU-T and ATM Forum for UPC and NPC is the generic cell rate algorithm (GCRA), which is a version of the leaky bucket algorithm . CBR traffic will normally be policed to a PCR and CDVT alone, whereas VBR traffic will normally be policed using

2806-410: The evolution of the Internet Protocol into the modern version of IPv4: IP versions 1 to 3 were experimental versions, designed between 1973 and 1978. Versions 2 and 3 supported variable-length addresses ranging between 1 and 16 octets (between 8 and 128 bits). An early draft of version 4 supported variable-length addresses of up to 256 octets (up to 2048 bits) but this was later abandoned in favor of

2867-415: The network to confirm that the requested resources are available and that a route exists for the connection. ATM operates as a channel-based transport layer, using VCs. This is encompassed in the concept of the virtual paths (VP) and virtual channels. Every ATM cell has an 8- or 12-bit virtual path identifier (VPI) and 16-bit virtual channel identifier (VCI) pair defined in its header. The VCI, together with

2928-489: The networks and creating the Internet: Commercialization, privatization, broader access leads to the modern Internet: Examples of Internet services: The Internet Protocol ( IP ) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking , and essentially establishes

2989-504: The original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP . The first major version of IP, Internet Protocol version 4 (IPv4), is the dominant protocol of the Internet. Its successor

3050-415: The receiver. All fault conditions in the network must be detected and compensated by the participating end nodes. The upper layer protocols of the Internet protocol suite are responsible for resolving reliability issues. For example, a host may buffer network data to ensure correct ordering before the data is delivered to an application. IPv4 provides safeguards to ensure that the header of an IP packet

3111-474: The reference model given for traffic policing in the network is the GCRA, this algorithm is normally used for shaping as well, and single and dual leaky bucket implementations may be used as appropriate. The ATM network reference model approximately maps to the three lowest layers of the OSI reference model . It specifies the following layers: ATM became popular with telephone companies and many computer makers in

SECTION 50

#1732776198004

3172-457: The service provider), or switched (set up on a per-call basis using signaling and disconnected when the call is terminated). The ATM network reference model approximately maps to the three lowest layers of the OSI model: physical layer , data link layer, and network layer . ATM is a core protocol used in the synchronous optical networking and synchronous digital hierarchy (SONET/SDH) backbone of

3233-671: The topology of the network. [REDACTED] [REDACTED] [REDACTED] [REDACTED] There are four principal addressing methods in the Internet Protocol: In May 1974, the Institute of Electrical and Electronics Engineers (IEEE) published a paper entitled "A Protocol for Packet Network Intercommunication". The paper's authors, Vint Cerf and Bob Kahn , described an internetworking protocol for sharing resources using packet switching among network nodes . A central control component of this model

3294-498: The world show significant adoption of IPv6, with over 41% of Google's traffic being carried over IPv6 connections. The assignment of the new protocol as IPv6 was uncertain until due diligence assured that IPv6 had not been used previously. Other Internet Layer protocols have been assigned version numbers, such as 7 ( IP/TX ), 8 and 9 ( historic ). Notably, on April 1, 1994, the IETF published an April Fools' Day RfC about IPv9. IPv9

3355-434: Was a wireless ATM forum formed to standardize the technology behind wireless ATM networks. The forum was supported by several telecommunication companies, including NEC, Fujitsu and AT&T . Mobile ATM aimed to provide high-speed multimedia communications technology, capable of delivering broadband mobile communications beyond that of GSM and WLANs. Internet Protocol Early research and development: Merging

3416-585: Was also used in an alternate proposed address space expansion called TUBA. A 2004 Chinese proposal for an IPv9 protocol appears to be unrelated to all of these, and is not endorsed by the IETF. The design of the Internet protocol suite adheres to the end-to-end principle , a concept adapted from the CYCLADES project. Under the end-to-end principle, the network infrastructure is considered inherently unreliable at any single network element or transmission medium and

3477-544: Was drafted by the IETF ST2 Working group and published in 1995 as RFC 1819. ST2 distinguishes its own packets with an Internet Protocol version number 5, although it was never known as IPv5. ST uses the same IP address structure and the same link layer protocol number (ethertype 0x800) as IP. In datagram mode, ST packets could be encapsulated with IP headers using protocol number 5. Asynchronous Transfer Mode Asynchronous Transfer Mode ( ATM )

3538-618: Was implemented in the Terrestrial Wideband Network and its successor, the Defense Simulation Internet , where it was used extensively for distributed simulations and videoconferencing. This version later formed the core technology for transporting voice calls and other realtime streams within Canada's Iris Digital Communications System . The final version of ST2, which was also known as ST2+,

3599-465: Was notable for introducing the concepts of packetized voice (as used by voice over IP), a talkspurt (a continuous segment of speech between silent intervals), and specified delay and drop-rate requirements for packet services. It was implemented in the Voice Funnel . Its second version, known variously as ST-II or ST2, was drafted by Claudio Topolcic and others in 1987 and specified in 1990. It

3660-494: Was seen in the 1990s as a competitor to Ethernet and networks carrying IP traffic as, unlike Ethernet, it was faster and designed with quality-of-service in mind, but it fell out of favor once Ethernet reached speeds of 1 gigabits per second. In the Open Systems Interconnection (OSI) reference model data link layer (layer 2), the basic transfer units are called frames . In ATM these frames are of

3721-712: Was the Transmission Control Program that incorporated both connection-oriented links and datagram services between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol and User Datagram Protocol at the transport layer and the Internet Protocol at the internet layer . The model became known as the Department of Defense (DoD) Internet Model and Internet protocol suite , and informally as TCP/IP . The following Internet Experiment Note (IEN) documents describe

SECTION 60

#1732776198004
#3996