You are on page 1of 21

♦ AAL-2—A New ATM Adaptation Layer for

Small Packet Encapsulation and Multiplexing


John H. Baldwin, Behram H. Bharucha, Bharat T. Doshi,
Subrahmanyam Dravida, and Sanjiv Nanda

Asynchronous transfer mode (ATM) networks carry fixed-size cells within the net-
work irrespective of the applications being supported. At the network edge or at the
end equipment, an ATM adaptation layer (AAL) maps the services offered by the
ATM network to the services required by the application. Many trunking applications
that have voice compression and silence suppression require transmission of small
delay-sensitive packets. Existing AALs are very inefficient for this purpose. In this
paper, we discuss a new AAL called the AAL Type 2 (AAL-2), which allows very high
efficiency for carrying small packets. We describe the basic principles and compare
several alternatives with respect to transmission error performance, bandwidth effi-
ciency, and delay/jitter performance. The results show that the AAL-2 adds signifi-
cant value to packet telephony applications over ATM networks. We discuss the
desirability of additional rebundling in the network and the need for a signaling
protocol to communicate changes in native connections (voice calls) within the same
ATM connection. We also describe how the principles of the AAL-2 are being used to
define multiplexing protocols over the Internet and frame-relay networks.

Introduction
Asynchronous transfer mode (ATM) networks ment can fit into an ATM cell and the original packet
carry fixed-size (53-octet) cells within the network can be reassembled from the incoming ATM cells at
irrespective of the applications being carried over the receiver. Thus, the existing AALs allow either col-
ATM. To support applications in native protocol mode, lection of enough information to fit into one ATM cell
a terminal adapter (TA) at the network edge acts as an payload or segmentation of larger native-mode pack-
ATM user and implements an ATM adaptation layer ets into smaller units such that each smaller unit fits
(AAL) to map the services offered by the ATM net- into an ATM cell payload. If native information units
work to those required by the application. In cases in are smaller than an ATM payload, these AALs require
which ATM is terminated at the end-user equipment, partial filling of ATM cells.
the AAL entity is implemented there. Many applications require transmission of small
AAL-11 has been defined for constant bit rate packets across an ATM network involving one or
(CBR) traffic requiring tight delay and jitter control. In more ATM switches in the connection. These applica-
addition, AAL-3/42 and AAL-53 have been defined for tions include private branch exchange (PBX)-to-PBX
bursty data. These AALs allow simple encapsulation of trunking for compressed voice with or without silence
application ‘packets’ if each packet fits into one ATM suppression, ATM backbone for cellular systems and
cell. For larger application packets, the segmentation personal communications services (PCS) wireless
and reassembly layer in AAL-3/4 and AAL-5 allows access, ATM trunking on the public-switched tele-
segmentation of packets at the transmitter so each seg- phone network (PSTN), and ATM backbone connec-

Bell Labs Technical Journal ◆ Spring 1997 111


Panel 1. Abbreviations, Acronyms, and Terms
AAL—asynchronous transfer mode adaptation PH—packet handler
layer PHY—physical (typically used with “layer”)
ADSL—asymmetric digital subscriber line POTS—”plain old telephone service”
ATM—asynchronous transfer mode PPP—point-to-point protocol
BER—bit error rate PRI—primary rate interface
CBR—constant bit rate PSTN—public-switched telephone network
CDMA—code division multiple access PTI—payload type indicator
CES—circuit emulation service RES—reserved
CID—connection identification RPM—radio port multiplexer
CPS—common part sublayer RP—radio port
CRC—cyclical redundancy check SMAAL—small packet multiplexed asynchro-
DCS—digital cross-connect system nous transfer mode adaptation layer
DLCI—data link connection identifier SN—sequence number
DTMF—dual-tone multifrequency signaling SS7—Signaling System 7
HEC—header error check SSCF—service-specific convergence function
IETF—Internet Engineering Task Force SSCS—service-specific convergence sublayer
IP—Internet protocol STF—start field
ITU-T—International Telecommunication Union – STM—synchronous transfer mode
Telecommunication Standardization Sector TA—terminal adapter
LI—length indicator TDM—time division multiplexing
LLC—logical link connection UU—user to user
MAN—metropolitan area network VCC—virtual channel connection
MSC—mobile switching center VCI—virtual circuit identifier
OA&M—operations, administration, and main- vocoder—voice coder
tenance VPC—virtual path connection
OSF—offset field VPI—virtual path identifier
PBX—private branch exchange VP—virtual path
PCS—personal communications services WAN—wide area network
PDC—personal digital cellular

tivity to packet telephony. These applications and oth- the ATM network edge.
ers are described in some detail later. For these applications, partial filling of ATM cells
In applications like the ones mentioned above, when using existing AALs may cause unacceptable
there are two primary reasons to transmit small pack- loss in bandwidth efficiency. This inefficiency is a con-
ets across ATM networks: cern especially when the total traffic demand requires
• When small native packets are generated away relatively low-speed leased lines, which have high cost
from the ATM network—that is, in a digital relative to bit rate. In many cases, the cost penalty may
cellular mobile terminal—and the packet nullify many advantages offered by an ATM backbone.
boundaries need to be recovered at the desti- This necessitates a new AAL for carrying small packets.
nation outside the ATM network. Our initial motivation for designing a new AAL
• When the bit rate of the native application is for small packets was the wireless infrastructure
low and the requirement on the end-to-end application mentioned above. The solution was
delay prohibits accumulation of bits to fill an motivated by the fact that many native mode con-
ATM cell before sending the cell out to its des- nections (for example, cellular voice calls) may
tination. In the latter case, small packets are share two end points of the ATM network. In such
generated even if the packetization is done at a case, the solution uses one ATM connection

112 Bell Labs Technical Journal ◆ Spring 1997


ATM connection (VPC/VCC)
LLN 1 Logical link numbers associated with
logical link connections (voice calls)
LLN N carried in one ATM connection

ATM network

SW SW

AAL-CU SW SW SW AAL-CU

SW

Multiple native packets from multiple logical


link connections in one ATM cell. Possibly partial
ATM packets at the beginning and/or end of ATM cell. ATM cell
header LLN field per packet to identify LLC. Length field
to delineate native packets.

AAL – ATM adaptation layer LLN – Logical link number


ATM – Asynchronous transfer mode SW – ATM switch
CU – Control unit VCC – Virtual channel connection
LLC – Logical link connection VPC – Virtual path connection

Figure 1.
The basic concepts in AAL-2.

between two points to carry packets from multiple tives are the coverage and amount of error protection
native connections. The ATM payloads from succes- and the size of the CID field (equivalently, the number
sive cells of this ATM connection are used as a byte of LLCs to be supported in a single ATM connection).
stream on which packets from different native con- The evaluation resulted in recommendations that are
nections (called logical link connections [LLCs]) are being standardized as the AAL Type 2 (AAL-2).
packed without regard to the cell boundaries. A Figure 1 shows the concepts involved in SMAAL (and
connection identification (CID) field is used in the AAL-2) at a high level.
packet header to identify the LLC to which a packet In ensuing sections of this paper, we first present
belongs. A length indicator (LI) field is used to iden- details about the applications that motivated the need
tify the boundaries of variable-length LLC packets. for the AAL-2. This discussion is followed by a descrip-
These concepts were incorporated in a protocol tion of the basic principles of AAL-2. Because our
called the small packet multiplexed AAL (SMAAL). It motivation was to provide a more efficient protocol for
became apparent that many other trunking applica- carrying small packets over ATM networks, we present
tions would benefit from this protocol. Intensive stan- a comparison of the efficiency and performance of
dards activities in the North American standards body, AAL-2 with AAL-1 and AAL-5, as well as with syn-
T1S1, International Telecommunication Union — chronous transfer mode (STM) and frame relay. These
Telecommunication Standardization Sector (ITU-T), comparisons are followed by a brief explanation of
and in the ATM Forum followed. Many alternative error and loss resilience of the AAL-2.
formats based on concepts in SMAAL were developed When both multiple sources and destinations are
and evaluated. The basic differences in these alterna- involved, it is sometimes desirable to implement a LLC

Bell Labs Technical Journal ◆ Spring 1997 113


PBX PBX
PCM voice PCM voice

Compression, Decompression,
silence suppression, silence insertion,
packetization packet extraction
ATM network
AAL Multiple voice AAL
ATM connections between ATM
PHY a pair of PBXs using PHY
ATM backbone

ATM backbone providing PBX-PBX


connectivity. Figure shows the transport
path from one PBX to another.
VBR voice with packet sizes
smaller than ATM payload.

AAL – ATM adaptation layer PCM – Pulse-code modulation


ATM – Asynchronous transfer mode PHY – Physical layer
PBX – Private branch exchange VBR – Variable bit rate

Figure 2.
PBX-to-PBX connectivity with the ATM backbone.

rebundling function in which AAL-2 is terminated and shows a scenario in which two PBXs are connected
packets for different LLCs are extracted and rebundled over an ATM backbone network.
into new ATM connections for transmission to their With the current circuit-switched backbone using
destinations. We discuss a brief motivation for and STM technology, PBXs are connected using leased
architectural positioning of LLC rebundling servers. lines (typically, one or more T1 or E1 lines). The ATM
The mix of LLCs in ATM connections will change backbone can be used to provide a circuit emulation
as calls are set up and torn down. Moreover, it may be service (CES) at either the T1 or E1 rate or at any
desirable to change the coding rate or signal the start other transmission speed depending on the number of
or end of silence to the receiver. Doing so would 64-kb/s trunks engineered between the two PBXs. In
require a signaling protocol that is transparent to the this situation, the main advantage ATM provides is
ATM connection. The paper concludes with a brief dis- arbitrary sizing of the trunk group. PBXs are not aware
cussion of the requirement on signaling protocols and of the existence of an ATM backbone and treat it like
ongoing standardization activities. an STM backbone. Leased bandwidth that is not used
by the PBX pair is wasted, as it is with the leased lines
Some Application Scenarios available today.
Details of some of the application scenarios moti- An ATM backbone allows further opportunities
vating the AAL-2 are now described. The list is not for efficiency improvement. ATM bandwidth can be
exhaustive, but it represents a few classes of applica- allocated as required for active calls. Voice compres-
tions with similar characteristics. sion and speech activity detection can be used to
PBX-to-PBX Connectivity over an ATM Backbone Network reduce the required bandwidth further. However,
ATM has become a promising infrastructure tech- transport of compressed voice poses challenges for
nology for wide area networks (WANs) interconnect- existing AALs, especially when silence suppression is
ing PBXs and other private local networks. Figure 2 also exercised.

114 Bell Labs Technical Journal ◆ Spring 1997


PSPDN PSPDN
interface Packet interface
Application
processing processing
(PH) servers

Mobility Call
management control

Network Connection
ATM network
management control

RPM RPM RPM

RP RP RP RP RP

Air
interface

ATM connection PSTN – Public-switched telephone network


ATM – Asynchronous transfer mode RP – Radio port (base station)
PH – Protocol handler RPM – Radio port multiplexer
PSPDN – Packet-switched public data network

Figure 3.
ATM infrastructure for wireless cellular systems and PCS access.

With voice compression to 32 kb/s, a packetization infrastructure in cellular systems and PCS. Figure 3
delay of 12 ms is incurred to fill an ATM cell. At 8 illustrates an ATM-based infrastructure having trans-
kb/s, the corresponding packetization delay is 48 ms. port, switching, signaling, and operations, administra-
The latter is prohibitive even with echo cancellation tion, and maintenance (OA&M) functions.4 The air
and the former is unacceptable without echo cancella- interface is left untouched while the connectivity
tion. On the other hand, smaller packetization inter- between the termination point for the air interface
vals will result in smaller packets. A new AAL is (radio port [RP]) and the PSTN is provided over an
required to carry these small packets efficiently. ATM backbone. The ATM backbone itself may consist
A similar situation arises in PSTN trunking. ATM is of ATM multiplexers (RP multiplexers [RPMs]) and
an attractive technology, especially for international ATM switches. For each call, the associated RP
circuits in which expensive bandwidth makes voice becomes one of the two end points of an ATM con-
compression and silence suppression desirable. Delay nection and the home of the AAL. The other end of
consideration results in small packets. this ATM connection is at a packet handler (PH),
ATM Infrastructure for Wireless Cellular Systems and which supports multiple RPs.
PCS Access The packets on the air interface typically are very
ATM is a promising technology for the wired small, and they may vary in size (2 to 36 octets for

Bell Labs Technical Journal ◆ Spring 1997 115


Packet telephony over ATM using AAL-5 Packet telephony, data, video

AAL-5 AAL-5

Copper loop (PSTN) Copper loop


HFC, FTTC, wireless AAL-2 ATM AAL-2 HFC, FTTC, wireless
network

Vocoder/ Vocoder/
transcoder transcoder

AAL – ATM adaptation layer


PSTN ATM – Asynchronous transfer mode PSTN
FTTC – Fiber to the curb
HFC – Hybrid fiber coax
ISDN – Integrated services digital network
Analog or ISDN PSTN – Public-switched telephone network Analog or ISDN
Vocoder – Voice coder

Figure 4.
Voice telephony with ATM backbone—ATM and analog end equipment.

code division multiple access [CDMA]). The packet access providers, many options exist for transporting
boundaries need to be preserved across the ATM net- these packets to their destinations. The Internet access
work. Once again, existing AALs will fill each ATM cell provider implements the IP-to-ATM conversion and
partially and waste a significant fraction of the band- uses an ATM backbone network. For high-quality
width on the ATM connection. Internet telephony, the voice packet size will decrease,
Packet Telephony in Other Places making existing AALs on the ATM backbone unac-
The existence of fast packet switching technologies ceptably inefficient.
like frame relay and ATM coupled with advances in If ATM is extended all the way to the desktop,
voice compression technology have motivated the use voice packets from the end equipment can be car-
of packet telephony in other situations. ried directly over ATM using AAL-5. However, at
Consider desktop telephony using a PC or a work- the gateway to the backbone, existence of multiple
station as the end equipment and the Internet being connections creates an opportunity to terminate
used to bypass the toll part of the PSTN. The connec- AAL-5 and carry voice packets from multiple con-
tion between the end equipment and the Internet nections using a more efficient protocol. Figure 4
access provider may consist of “plain old telephone shows such a scenario.
service” (POTS) modems, hybrid fiber coax (HFC) Even for traditional telephony using analog or
cable modems, integrated services digital network ISDN access, a PSTN-to-ATM gateway creates an
(ISDN) access, asymmetric digital subscriber lines opportunity to compress voice, suppress silence, and
(ADSLs), or wireless links. In the case of a POTS carry the resulting lower and variable bit-rate voice
modem and ISDN access, the typical mode of opera- over the ATM backbone (see Figure 4).
tion consists of voice packets from the end equipment
in Internet protocol (IP) datagrams being encapsulated Design Considerations
in point-to-point protocol (PPP) frames. Examples in the previous section indicate the need
Assuming that IP datagrams are used to carry for a new AAL to carry small native packets efficiently
voice packets from the end equipment to the Internet over an ATM backbone. The basic concepts and

116 Bell Labs Technical Journal ◆ Spring 1997


requirements for this new AAL were described in the are used, then either variable-length packets are gen-
“Introduction.” In this section, we provide more details erated by LLCs or variable packetization delay is
on alternative formats, individual fields, and the status incurred to generate fixed-length packets. In either
of current standards. Most of the discussion and quan- case, the inflexible position-based multiplexing
titative results are provided for the cellular/PCS infra- approach cannot be applied with ease.
structure application because it provided the original The new AAL should support the transfer of
motivation to develop the new AAL. These results variable-size small packets across ATM networks.
apply readily to all the other scenarios described in the The selected approach is to treat the payloads from
preceding section. successive ATM cells from the same ATM connec-
Basic Concepts and Required Features tion as a byte stream in which variable-length LLC
The primary requirement on the new AAL is to packets are multiplexed. The following functions
provide efficient transport of small native packets over must also be implemented:
ATM networks in such a way that allows a very small • Addition of a CID field to each LLC packet, to iden-
transfer delay across the ATM network while still tify the LLC to which the packet belongs.
allowing the receiver to recover the original packets. It • Addition of an LI field to each LLC packet, so that
is assumed that multiple LLCs are required between the end of the packet can be demarcated. This
any pair of gateways or TAs, where conversions LI-based approach to the delineation of packets
between the native mode and ATM occur. was considered better than flag-based delin-
One approach is to use an AAL in which a small eation because flags are vulnerable to errors
but fixed number of octets from each LLC are packed and because the bit stuffing required by flag-
in one ATM connection. For example, three octets based protocols conflicts with the byte-oriented
each from 16 LLCs may be used to pack the 48-byte nature of ATM transport.
payloads of ATM cells from a single ATM connection. • Inclusion of a pointer to identify the remaining
If at least 16 LLCs are active between two TAs, then length of the packet that started in the prior cell and
packing small 3-byte samples each from 16 different overlaps into the current cell when a native packet
LLCs keeps the packetization delay small and still occupies part of two (or more) cell payloads. This is
achieves high bandwidth efficiency. The position of a similar to an LI but refers to the length of the
triplet within the payload of an ATM cell identifies the residual packet in the current cell.
LLC associated with that triplet. This identification • Incorporation of some mechanism to detect cell loss,
method is referred to as position-based multiplexing and because loss of an ATM cell possibly may lead
delineation. In the extreme case, 48 LLCs (with one to misconcatenation of native packets.
byte from each LLC in each ATM cell) may be multi- • Use of some mechanism to detect errors in the cell pay-
plexed in a single ATM connection. The mapping load, because critical address (CID) and delin-
between the position and LLC is established by provi- eation (LI, starting pointer field) information is
sioning or by using an appropriate signaling protocol at now part of the unprotected cell payload.
call set-up time. Many alternatives are consistent with the proto-
While being very efficient, this approach suffers col concepts described above. The main decision
from a complete lack of flexibility. In particular, it is variables are:
effective for constant bit-rate applications in which all • The maximum number of CIDs to be sup-
LLCs have a common rate and a fixed number of LLCs ported in one ATM connection. This, in turn,
is available. However, this is perhaps the only scenario determines the length of the CID field.
in which the method is effective. If different coders are • The maximum length of the native packet.
used by different LLCs, this approach will create signif- This determines the length of the LI field.
icant packing inefficiencies as calls are set up and torn • Self-delineation of packets via the LI field ver-
down. If variable bit-rate coders or silence suppression sus the need for a separate mechanism for

Bell Labs Technical Journal ◆ Spring 1997 117


faster delineation recovery. 16,000. Of course, the ATM header allows two levels
• The need to error-protect the packet payload in of addressing (virtual path identifier [VPI] and virtual
addition to the protection of the packet header. circuit identifier [VCI]). Thus, it is possible to set up
• The best mechanism for providing resiliency to ATM VPCs between AAL-2 end points and to allow
cell losses on a given ATM connection. them to use VCI and CID to create multiple native
Most of the debate in the North American and interna- connections (LLCs). This situation permits multiplex-
tional standards bodies revolved around these decisions. ing with a smaller CID field. As a compromise, a CID
Design Choices and Key Decisions field of 8 bits supporting a maximum of 255 native
Because the primary driver for this new AAL is connections over a single ATM VCC was chosen. With
packet telephony and because error detection is not a 16-bit VCI field, an ATM VPC will be able to support
essential for voice-coding algorithms, it is not neces- up to 255 3 216 connections, certainly adequate for all
sary for AAL-2 to provide error detection for native applications. In this case, ATM traffic policing will need
packet payloads. The purpose of error detection is to to be done at the VPC level.
guarantee that CID, LI, and other critical protocol The LI field refers to the length of the native
header fields are not misinterpreted. Avoidance of packet and is used to delineate the packets. Because
such misinterpretation could be accomplished either AAL-2 was designed for short packets, the length of an
by having a common cyclical redundancy check (CRC) ATM cell was thought to be the upper bound on
on the ATM payload or a header error check (HEC) for length. In that case, a 6-bit LI field allowing specifica-
each packet header. The latter has the advantage of tion of up to 64 octets would suffice. For applications
being able to discard only those packets whose headers involving occasional packets longer than 64 octets, a
are corrupted. The former has the advantage of having MORE function is proposed to indicate an extension
one CRC for multiple packets and potentially higher beyond 64 octets.
bandwidth efficiency while also permitting in-band While the LI field allows self-delineation once a
signaling messages to be carried without additional packet boundary is identified, a cell loss or an error in
error detection. The advantages of packet header error a packet header will result in the loss of packet delin-
detection were determined to outweigh a potential eation. Many approaches to regaining the packet
bandwidth penalty, and a per-packet HEC approach boundaries are possible, including:
was selected for AAL-2. • Using the packet header HEC to hunt for and
The maximum number of LLCs to be supported identify a packet header. The LI field is used to
on a single ATM virtual path connection (VPC) or vir- delineate further the end of the packet and
tual channel connection (VCC) affects the size of the verify that the delineation is achieved. This
CID field. A larger CID field would allow multiplexing process is similar to cell delineation at the ATM
more native connections (LLCs) and would provide layer but with variable-length packets.
bandwidth sharing over more variable bit-rate connec- • Using a pointer field at the beginning of each
tions. Of course, the number of LLCs to be supported ATM cell to specify the beginning of the first
also depends on the ratio of the ATM-connection new packet in the current cell payload.
bandwidth to the bandwidth required by a single • Using the pointer at the beginning of every
native connection. For a single ATM connection occu- m(>1) cells.
pying an entire DS1 (1.544-Mb/s) link with a 4-kb/s The first approach has no additional overhead, but
voice coder (vocoder), the number is in the neighbor- it may take longer to regain packet delineation. In
hood of 400 native connections that can be supported addition, loss of delineation is more frequent. The sec-
(see the results presented in the “Analysis of ond approach incurs additional overhead but guaran-
Bandwidth Efficiency” section later in the paper). tees packet delineation in one cell time. The third
Using a DS3 link, the number of connections that approach adds the overhead only once every m cells,
can be supported increases to the neighborhood of but it may require up to m cells to regain delineation.

118 Bell Labs Technical Journal ◆ Spring 1997


Native (LLC) packets from different LLCs
associated with one ATM connection.

LLC = 1 LLC = 3 LLC = 2 LLC = 3

• LLC packets prefixed by


Packet Packet Packet packet headers
header header header • CID corresponding to LLC
(CID = 1) (CID = 3) (CID = 2) • LI representing packet length
and pointing to end of packet

ATM ATM Cells from one


STF STF ATM connection
header header
Pointer in STF Pointer in STF
points to points to

ATM – Asynchronous transfer mode LLC – Logical link connection


CID – Connection identification STF – Start field
LI – Length indicator

Figure 5.
Small packet multiplexing using the STF and packet header fields.

Because packets received during the time it takes to AAL-2 Common Part Details
regain delineation are discarded, the second approach The ITU-T is close to standardizing this new AAL
is preferred. discussed above. The standard is documented in draft
Given that a loss of cell—if not detected at the Recommendation I.363.2.5 The AAL-2 is partitioned
receiver—can misconcatenate packets, a cell-sequence into two sublayers: the common part sublayer (CPS)
number field is desirable. Finally, like the packet and the service-specific convergence sublayer (SSCS).
header (containing CID, LI, and other fields), the cell The CPS provides the functions of multiplexing
sequence number and pointer also require error detec- variable-length packets from multiple sources into a
tion. A single parity bit provides this error detection. single ATM virtual circuit and relaying these packets to
The combination start field (STF), consisting of the form end-to-end AAL-2 connections. This paper and
pointer, cell sequence number, and parity is placed at the draft standard recommendations as well are essen-
tially concerned only with the common part.
the beginning of every ATM cell payload. The pointer
The SSCS provides an application-specific func-
indicates the first new packet header in the current
tion—a different instance of it being provided to
cell. The HEC in the header of that packet is used to
each AAL-2 user. Some example functions are seg-
verify synchronization. The robustness afforded by this
mentation and reassembly of user flows into packets
HEC and those in subsequent packets allows the use of
suitable for the CPS, forward error control, identify-
a simple parity check in the STF.
ing the voice-coding algorithm, and identifying the
ATM Cells and AAL-2 Fields end of a speech burst. The SSCS can also be null.
Figure 5 shows the placement of the STF and the The ITU-T intends to specify SSCS protocols in
packet header. The STF is present at the beginning of future recommendations.
each ATM cell. The packet header precedes each The packet header and the STF are further
native packet. described below.

Bell Labs Technical Journal ◆ Spring 1997 119


CID LI RES HEC
8 bits 6 bits 5 bits 5 bits STF (octet)

Packet header (3 octets) Offset Sequence


Parity
Field Number
(P)
(OSF) (SN)
CID – Connection identification 1 bit
6 bits 1 bit
HEC – Header error check
LI – Length indicator STF – Start field
RES – Reserved

Figure 6. Figure 7.
Components of the packet header. Components of the STF.

Components of the Packet Header modulo-2 sequence numbering of cells. The one parity
The packet header, which Figure 6 illustrates, (P) bit provides odd parity and covers the STF.
is 3 octets long. The CID field is 8 bits long and Padding
identifies the LLC for the packet. The LI field com- It may be necessary to transmit a partially filled
prises 6 bits and indicates the length of the LLC ATM cell to limit packet emission delay. In such a case,
packet. When the LI points beyond the end of the the remainder of the cell is padded with all zero octets.
current ATM cell, the packet is split between cells. A cell whose payload contains only the STF and
The HEC field comprises 5 bits and provides error 47 padding octets can also be transmitted to meet
detection over the packet header. other needs, such as serving a keep-alive function and
Five bits are either reserved (RES) or assigned to satisfying a traffic contract.
the SSCS riding over the AAL-2 common part. These
bits are not interpreted by the AAL-2 common part Analysis of Bandwidth Efficiency
and are passed transparently from the transmitter’s This section analyzes the bandwidth efficiency,
SSCS to the receiver’s SSCS. The SSCS can use these delay, and jitter associated with AAL-2 multiplexing.
bits for specific SSCS functions or for passing higher While the analysis has been carried out for many of
layer user-to-user communication transparently. the applications discussed earlier, we are presenting
Some reserved bits are subject to further standard- here the results for two specific wireless applications:
ization at the AAL-2 common part. Example functions the IS-95 CDMA rate set 2 vocoder6 and the Japanese
include a MORE bit to indicate that the current packet personal digital cellular (PDC) half-rate vocoder7.
is segmented, as well as bits identifying OA&M, signal- Performance of AAL-2-based transport for these two
ing, or user information. applications is compared with performance when
Components of the Start Field (STF) using frame-relay and STM transport. The analysis in
The STF is one octet in length and occurs at the this section also provides insight into the desired CID
beginning of every ATM cell payload (see Figure 7). field size and into dimensioning ATM virtual connec-
As the figure shows, the offset field (OSF) is 6 bits in tions to take advantage of statistical multiplexing gains
length. It indicates the remaining length of the packet made possible by the AAL-2.
that (possibly) started in the preceding cell from this Traffic and Models
ATM connection and is continuing in the current cell. To determine the bandwidth efficiency and
Thus, the OSF points to the start of the first new packet delay/jitter tradeoffs, specific traffic patterns and
and provides immediate recovery of the packet bound- speech models are used. It is assumed that only voice
ary after an event causing loss of packet delineation. traffic is carried on the ATM connections of interest. In
The 1-bit sequence number (SN) field provides a practice, some in-band signaling and OA&M traffic

120 Bell Labs Technical Journal ◆ Spring 1997


may exist but their overall impact will be slight. Computation of Bandwidth Efficiency
CDMA rate set 2 vocoder. Various levels of cod- Let the voice packet sizes produced by the sources
ing have been defined for the CDMA rate set 2 with a (CDMA rate set 2 or PDC half rate) during the packeti-
vocoder full rate of 13 kb/s. A simplified speech model zation interval, T, be S1 and S2 octets. Let p1 be the
is used here for the studies. Specifically, 50% of the probability of producing a packet of size S1 and p2 be
packets are at the full encoding rate of 14.4 kb/s the probability of producing a packet size S2. A bino-
(active speech, including overhead), while the remain- mial speech model has been assumed but the analysis
ing 50% are at the one-eighth rate of 1.8 kb/s is easily generalized to a multinomial model. Let N be
(silence). The overall average rate is 8.1 kb/s. This the number of voice sources transmitting in an offset
coder produces a measured mean opinion score better group from the mobile to the base station. At the base
than 3.95. Speech is accumulated for 20 ms, encoded, station, the probability distribution of the number of
and transmitted over the air interface as a packet. octets received in an interval of T ms is
PDC half-rate vocoder. The same simplified
{
P K = iS1 + (N − i)S2 = } N
Ci p1i p2N −i .
speech activity model for the PDC half-rate vocoder
produces an average rate of 2 kb/s with a packet pro- The mean number of octets, m, received in an offset
duced every 40 ms at either the full rate (4 kb/s) or group is given by m = Np1S1 + Np2S2. The variance of
complete silence (0 kb/s) with equal probability. This the number of octets, denoted by V, is given by
V = N p1 p2 ( S1 − S 2) . The standard deviation is given
2
vocoder provides an extreme point with a very low bit
rate resulting in maximum bandwidth efficiency. by s = V .
The transport network is assumed to be engi-
Requirements on Delay Variation
neered to meet a packet loss objective of 0.1%
In IS-95 based CDMA technology, voice packets are
while meeting the delay variation objective of either
produced every 20 ms. Because of soft handoff, the
5 ms or 20 ms. Given that the packet loss rate objec-
reception of packets at the mobile must be synchronized
tive on the air interface is 1%, a transport network
perfectly. In addition, because of tight timing require-
objective one order of magnitude better than the air
ments, all base stations must be synchronized using the
interface results in an excellent balance between
Global Positioning System.
performance and efficiency.
It is possible for all the mobiles to transmit packets at
Let b denote the capacity in octets allocated to the
every 20-ms tick. In this case, the delay variation can be
ATM virtual connection that transports the N voice
up to 20 ms depending on the number of active calls.
calls. The capacity, b, is selected so that the maximum
For interactive voice applications, experiments have
delay variation for transmission through the ATM con-
determined that the one-way end-to-end delay must be
nection is less than y (5 or 20) ms—that is, b = cy,
in the range of 100 to 150 ms. Because coding, interleav-
where c is the capacity of the link (T1 or T3) in octets
ing, decoding, and deinterleaving can consume a sub-
per ms after subtracting the per-cell overhead due to
stantial portion of this delay budget, an additional delay
the ATM cell header and the AAL-2 STF. To achieve a
of 20 ms is on the boundary of acceptable performance.
packet loss less than 0.1%, the engineering rule
The transmission of packets from mobiles can be
(assuming a normal distribution for number of octets
staggered such that one set of mobiles transmits at a
produced) is m + 3s = b, which translates to
given time tick, a second set transmits exactly 5 ms later,
x2 + xα – β = 0, where
a third set 10 ms later, and the last set 15 ms later. These
x = N,
are referred to as offset groups. Two cases will be consid-
α = 3 p1p2 (S1 − S2 ) / ( p1S1 + p2S2)
ered—one in which the requirement on the maximum
delay variation is 5 ms (that is, four different offset and
groups) and the second in which the maximum permis- β = b / (p1S1 + p2S2).
sible delay variation is 20 ms (that is, one offset group). Solving the above equations determines the number of

Bell Labs Technical Journal ◆ Spring 1997 121


Table I. Number of voice calls supported for CDMA rate set 2.
Transmission Maximum delay Number of voice calls supported
facility (Mb/s) variation (ms) AAL-2 Frame relay TDM AAL-1/AAL-5
T1 (1.536) 20 123 125 24 72
T1 (1.536) 5 104 108 24 72
T3 (44.7) 20 4,090 3,500 672 2,108
T3 (44.7) 5 3,964 3,024 672 2,108

voice calls that can be carried in a single ATM virtual faces. For STM, each voice call uses a 64-kb/s channel
connection to meet the loss objective of 0.1% and the out of a T1 or T3 interface. For AAL-1/AAL-5, it is
delay variation objective of y ms. assumed that one voice packet is carried per cell.
Results and Discussion At T1 rates, both frame relay and the AAL-2 are
First, consider the CDMA rate set 2, which pro- equally efficient. At T3 rates, it is possible to achieve
duces packets containing 36 octets and 5 octets with greater gains via statistical multiplexing using the
equal probability. The AAL-2 adds an overhead of AAL-2, which frame relay is unable to exploit. The dif-
3 octets to each packet, so S1 = 39 and S2 = 8. The effec- ference in call carrying capacity is as much as 30%
tive ATM cell payload is 47 octets because the first octet between frame relay and the AAL-2 when the overall
is used as the STF in every cell. In the case of frame demand exceeds the frame-relay interface speed (T1).
relay, there is an overhead of 6 octets for each packet. Another interesting point is that the difference in
(The Frame Relay Forum is currently standardizing an call carrying capacity between delay variation objec-
approach similar to the AAL-2 to carry multiple small tives of 20 ms and 5 ms is 18% at T1 speeds, while this
packets within one data link connection identifier difference is less than 4% at T3 speeds. Even if the T3
(DLCI). The efficiency gains from this are not considered rate is divided into four virtual circuits, each having
here). Frame-relay overhead consists of one octet for bandwidth equal to one-fourth that of T3 capacity, the
flag, two octets for the DLCI field, one octet for control, resulting bandwidth is sufficient to attain statistical
and two octets for the frame check sequence. multiplexing gain. Thereafter, the improvement in this
Frame relay, with its variable-size frame, is ideally gain is marginal.
suited for carrying variable-size packets generated by From the call carrying capacity values at T1 and T3
low bit rate voice. The AAL-2 provides a similar capa- speeds, we can see that it is better to carry voice calls
bility over ATM connections. It also allows the use of in ATM connections of larger bandwidth rather than
much higher speed ATM switches and link interfaces, partitioning the available bandwidth into multiple
thus allowing further multiplexing gain. Finally, with CBR virtual connections. Because a CID field of 8 bits
higher speed interfaces, ATM transport and switching limits the number of LLCs for a given ATM VCC to
are much less expensive than the frame-relay counter- fewer than 256, further statistical gain can be achieved
parts. If ATM can achieve bandwidth efficiency com- by implementing higher rate VPCs (for instance, T3 or
parable to that of frame relay, lower switching cost fractional T3 VPCs). Such gain can be realized by using
and the ability to support higher rate interfaces will multiple VBR VCCs within the VPC and then using
favor ATM. the 8-bit CID field to specify individual LLCs. Policing
Table I shows the number of voice calls that can at the VPC level makes both the VCI and CID fields
be transported by the AAL-5, the AAL-2, frame relay, available to the end points for addressing while achiev-
and STM transport as a function of transmission speed ing multiplexing gain corresponding to the VPC speed.
and the maximum allowable delay variation. In the The call carrying capacity of STM transport,
case of frame relay, interfaces are available only at the wherein each voice call is mapped into 64 kb/s PCM
T1 (or E1) rate. Thus, a T3 facility will use 28 T1 inter- voice at the base station, shows the advantages of

122 Bell Labs Technical Journal ◆ Spring 1997


Table II. Number of voice calls supported for PDC half rate.
Transmission Maximum delay Number of voice calls supported
facility (Mb/s) variation (ms) AAL-2 Frame relay TDM AAL-1/AAL-5
T1 (1.536) 20 500 500 24 224
T1 (1.536) 5 420 420 24 176
T3 (44.7) 20 16,680 14,000 672 8,050
T3 (44.7) 5 16,160 11,760 672 7,688

asynchronous transport (frame relay and ATM) over arises from transmission errors and cell losses.
synchronous transport. It is quite apparent that the call In this section, packet delineation and the impact
carrying capacity is increased 500% if such statistical of AAL-2 parameters on the delay in achieving delin-
multiplexing techniques as ATM or frame relay are eation are discussed first. As mentioned earlier, two
used for voice transport. methods of delineation recovery are possible: self-
The bandwidth efficiency achievable using AAL-1 delineation through HEC hunting, and delineation
or AAL-5 is also shown in Table I. The call carrying through the OSF field in the start pointer (STF) of
capacity achieved by the AAL-2 is 1.8 to 2 times that every cell. Because we need both the HEC and LI for
of AAL-5 or AAL-1. normal receiver operation after initial delineation is
Table II shows the call carrying capacity for PDC achieved, an obvious question is whether the over-
half rate. In general, the observations for CDMA calls head of the STF is necessary to accelerate the recovery.
also hold for PDC half-rate calls. However, on facilities Thus, delineation delay without using the STF is stud-
in which the maximum allowable delay variation is ied next. This discussion is followed by an analysis of
5 ms, the additional gain in statistical multiplexing the improvement using the STF.
achievable by the AAL-2 is 28% compared to frame
Self-Delineation
relay. When the maximum delay variation is 20 ms,
On the surface, it appears that AAL-2 could use
the additional gain in statistical multiplexing is 17%.
only the self-delineation provided by the LI and HEC
Note that clever use of VPC, VCC, and CIDs will again
fields. HEC allows hunting to decide potential packet
be needed to achieve the full statistical multiplexing
boundaries. The LI field of the presumed packet
offered by high-speed ATM interfaces.
header is used to delineate the position of the next
As Figure 3 shows, there may be multiplexing at
packet header and HEC. This is similar to the self-
the RPMs to take advantage of higher speed ATM
delineation function provided by the ATM HEC.
interfaces in the case that the individual base stations
However, variable-length packets and the use of the LI
(RPs) do not handle very high traffic. By mapping
both affect the frequency of delineation loss and
multiple ATM VCCs from individual RPs into one VPC
recovery delay.
between the RPM and PH, high bandwidth efficiency
When packet delineation is lost, an octet-by-octet
can be achieved even with low CID size.
search is used to find the first three-octet packet
Robustness Considerations in the Design of header (that is, the location of the first three octets at
the AAL-2 which the HEC passes). The LI values indicated by the
This section analyzes the transmission error perfor- detected packet header are used to find the next
mance seen by AAL-2 users as functions of raw channel packet header. AAL-2 is declared to be in packet delin-
transmission performance and various AAL-2 parame- eation after n such correct packet headers, with n cho-
ters. The analysis also motivates the use of the OSF, SN, sen for a desired level of confidence.
and other packet header fields so that the protocols Delineation recovery. At the ATM layer, cell
facilitate adequate performance for AAL-2 users.8 The delineation is declared when the ATM HEC passes on
basic impairment at the physical (PHY) and ATM layers seven consecutive cells, which corresponds to a confi-

Bell Labs Technical Journal ◆ Spring 1997 123


Table III. Self-delineation performance. lost cells, discarded packets due to bit errors, and dis-
Number Probability of carded packets during delineation recovery.
of packets incorrect delineation Misconcatenation. In the absence of a mecha-
6 10–9 nism to detect cell losses, the self-delineating scheme
7 10–11 always misconcatenates following a cell loss. That is, in
the event of a cell loss, the leading octets of the next
8 10–13
cell are always misconcatenated with the trailing
9 10–15
packet of the previous received cell. Only after this—
10 10–17
when the position of the next expected packet header
is examined and the header CRC fails—is the loss of
dence level of 10–13 to 10–16. Similar confidence in
packet delineation detected. Thus, the probability of
AAL-2 delineation recovery is desirable. Table III
misconcatenation of a packet split between two ATM
shows the number of packet header HECs (CRC-5)
cells is 1 3 pc.
before packet delineation can be declared with a given
confidence level. Delineation Using the Start Field (STF)
To achieve a confidence level comparable to For most telephony applications, the number of
ATM header delineation, the number of packet packets discarded per delineation loss event is exces-
headers that must pass should be set to 9 or higher. sive only if self-delineation is used. This is mainly due
Thus, for every event in which packet delineation is to the recovery period and misconcatenation. The STF,
lost, nine additional packets must be either dis- with the OSF, was designed to enhance recovery per-
carded or buffered. In case of buffering, an addi- formance and, hence, reduce the packet discard ratio.
tional delay must be budgeted for speech and other The STF does consume an extra byte of overhead per
delay-sensitive applications. For voice applications, cell. This overhead buys packet delineation recovery at
buffering of nine packets may be unacceptable. The the next cell.
implications of discarding nine packets depend on Packet discard ratio for delineation recovery
the frequency of occurrence of delineation recov- using the STF. Assuming that an error could occur in
ery, and we discuss this situation below. the STF or in any of the kp packet headers, the packet
Loss of delineation. Loss of packet delineation discard ratio due to bit errors is
occurs under the following two conditions: p (kp + 1) (24kp / 2 + 8) = 176p for kp = 3 packets per
• Any detected bit errors in the three-octet packet cell. When a delineation loss occurs due to a cell loss,
header. The packet header must be discarded so resynchronization is immediate at the receipt of the
further packet delineation is not possible. next cell. Thus, no additional packets are discarded.
• Any cell losses. A single cell loss or burst of cell The packet discard rate due to bit errors is comparable
losses implies that packet delineation is lost. to the self-delineating scheme (that is, 1.8 3 10–4 at
Let p be the probability of a bit error in a packet p = 10–6). However, no additional packets are dis-
header and let pc be the probability of a cell loss. Let kp carded following ATM cell loss(es). Use of the STF pro-
denote the average number of packets per ATM cell. vides improved quality of service by quicker
Then, assuming nine packet headers must match for resynchronization and the avoidance of the loss of a
recovery of delineation, the packet discard ratio can be burst of packets.
approximated by 9 3 (24p + pc / kp). In the calcula- Cell sequence number and parity. Use of the LI
tions below, kp is assumed to be 3. from the packet header of the previous cell and the
On a noisy T1 link (p = 10–6), the packet discard OSF from the current cell allows identification of a
rate due to bit errors is as high as 2 3 10–4. If a VBR or possible cell loss if the two LIs do not match. However,
CBR virtual circuit is used to multiplex voice sources, there is a significant probability that these two indica-
the bandwidth must be determined to obtain a target tors will match. A better way of detecting cell loss is
packet loss rate of 10–4, aggregating the packet losses in needed to reduce both the misconcatenation probabil-

124 Bell Labs Technical Journal ◆ Spring 1997


ity and the complexity of detection. Two fields are pered by the presence of scramblers in underlying
added to the OSF to create the STF. The 1-bit SN pro- transmission systems. Many of these scramblers are
vides a modulo-2 SN and allows immediate detection proprietary and, thus, not generally known. This
of a single cell loss. In addition, a 1-bit P field allows method is not being pursued further.
detection of an odd number of errors in the STF itself. Next, we examine the misconcatenation probabil-
Transmission Performance of the AAL-2 ity. The most likely event for misconcatenation occurs
As mentioned earlier, the overall resilience of when one of the packet headers contains an error and
AAL-2 needs to be evaluated against two primary the CRC does not catch it. Given that the CRC pro-
lower-layer impairments: errors introduced by the vides a minimum Hamming distance of 3, the proba-
transmission facilities, and ATM cell losses. bility of misconcatenation is less than 24C3p3, which is
Performance and resiliency of the AAL-2 to equal to 2 3 10–15 and is, therefore, no cause for con-
physical (PHY)-layer transmission errors. The bit cern. Error in the STF is more likely to remain unde-
error rate (BER) performance of transmission sys- tected, and it would be a major cause for concern if
tems is expected to be better than 10–8 over fiber the STF is the only mechanism to identify the end of
facilities and better than 10–6 for four-wire T1 cop- the packet segment. However, the packet header in
per facilities. The performance measures of interest the preceding cell coupled with the OSF in the current
are packet loss ratio, undetected error rate, and STF provides an even smaller probability (less than
probability of misconcatenation. 2 3 10–15) of undetected error resulting in misconcate-
The packet discard ratio is investigated first. As nation of the last packet of the preceding ATM cell.
mentioned earlier, the numerical results are for the case Finally, consider the residual errors in information
in which each cell contains an average of three packets delivered to AAL-2 users. Because there is no protec-
(kp = 3), and the average packet size is 13 octets. tion over the payload, any errors in any of the packets
When the STF is hit by an odd number of errors remain undetected. For packet telephony, such errors
(detected through parity violation), the sequence are essentially the result of mapping PHY-layer errors
number and the pointer fields cannot be trusted. The to the application layer. Given that retransmissions are
contents of the current cell and any residual packet left not possible due to delay requirements, these applica-
over from the previous cell need to be discarded. tions must rely on the PHY layer to provide adequate
Additionally, any residual packet spilling over to the error performance. Even a BER equal to 10–6 is quite
next cell will be discarded. Thus, any detected acceptable for voice applications. Some data applica-
error in the STF would result in an average of four tions, as well as signaling (which is really a data appli-
packet losses. Furthermore, if any packet headers cation) for telephony, will need to provide error
in the current cell contain errors, then one, two, protection of the AAL-2 payloads at the SSCS.
or three packets need to be discarded depending Resiliency of the AAL-2 to cell losses. First, con-
on the packet header affected by errors. sider the case of random cell losses. Let pc represent the
Accordingly, the packet loss ratio is given by probability of a cell loss. If a single cell is lost, the
(4 3 8 3 p + 24 3 p 3 (1 + 2 + 3)) / 3 = 59p. This sequence number in the next STF discovers the loss,
translates into a loss ratio of 0.6 3 10–4 in the access and misconcatenation is prevented. Furthermore,
network (composed of copper) and 0.6 3 10–6 in the packet loss is limited to the lost cell. Therefore, the
fiber backbone network, and both of these loss rates packet loss ratio due to random single-cell losses is
appear to be acceptable for voice applications. given by kp 3 pc = 3 3 pc.
A single error control field over the entire ATM If two consecutive cells are lost and the pointer
cell capable of providing single-bit error correction was value in the next incoming cell matches the residual
analyzed in detail. This would have improved the dis- length of the packet from an earlier received cell, then
card ratio by three orders of magnitude. However, the misconcatenation occurs. Therefore, the probability of
effectiveness of such a correction mechanism is ham- misconcatenation from a loss of two consecutive ATM

Bell Labs Technical Journal ◆ Spring 1997 125


cells is no more than service (QoS) parameters on ATM virtual con-
p2c / L max , nections on demand;
• Transport of signaling messages arriving in
where Lmax is the maximum allowable length of a
band on a native link. These messages may be
packet. If pc is assumed to be in the range of 10–5 to
located within a native connection (for exam-
10–6 and Lmax is 64, then the probability of misconcate-
ple, dual-tone multifrequency signaling
nation is in the neighborhood of 10–11 and is again no
[DTMF] tones) or the ATM virtual connection
cause for concern.
(for instance, robbed-bit signaling between
Next, consider bursty (more than two) cell losses.
PBXs); and
The bursty cell loss events could be caused by either
• Out-of-band signaling in the native domain
ATM-layer congestion or error bursts in transmission
(for example, primary rate interface [PRI]-
systems. In either case, many consecutive cells are lost.
type signaling).
Given a bursty cell loss event, the sequence number in
Some of these signaling messages are generated in
the STF does not offer much protection. In particular,
the native connections or in a group of native connec-
a loss of an even number of consecutive ATM cells will
tions. Others are needed only between AAL-2 end
make the SN ineffective. The probability of miscon-
points. Among the messages generated in the native
catenation given a bursty loss event is given by
1 / (2 3 Lmax). Thus, given a bursty loss event, a 1-in- mode, some must be transported across the ATM net-
100 chance of misconcatenation exists. The overall work transparently while others must be interpreted at
misconcatenation rate depends on the number of the originating and terminating AAL-2 end points.
bursty losses per unit of time. If an average of 100 Message type, message origin and purpose, and the
bursty loss events occurs per day, an average of one nature of the ATM connections affect the transport of
misconcatenation per day takes place. This miscon- signaling messages across the ATM network.
catenation rate could have been reduced further by For concreteness, consider a scenario in which
including the CID field in the STF, thus identifying the ATM virtual paths (VPs) are established between the
LLC to which the residual segment belongs. However, two end points of interest. These VPs can be set up
that would add another byte of overhead. The decision through the intervening ATM network either by pro-
was to use only the SP, SN, and P fields in the STF. visioning or signaling. At the two end points, VCIs are
used to increase the address space. The resulting VCCs
Signaling Issues may be pre-established or they may be set up using a
AAL-2 creates multiple levels of connections signaling VCC in the VPC. The standard Q.2931 proto-
between two points: ATM virtual connections and the col may be used between the end points for this pur-
AAL-2 LLCs. Signaling protocols are needed to indi- pose. In this case, intermediate ATM switches serve
cate changes in connections at any one of these layers. only as VP switches, and they are not involved in VCI
Many different types of signaling are needed negotiations. Because traffic and QoS parameters are
between end points of AAL-2 connections. These negotiated at the VPC level, these switches need no
include: information on the VCCs. CIDs within a VCC will
• Signaling and negotiations to set up and tear identify individual LLCs. The ATM network needs no
down LLCs within a VCC; information on the CIDs.
• Signaling to indicate changes in LLC parame- In a different situation, each end-to-end ATM
ters—for example, coding rate, flow controls, connection may be a VCC with (VPI or VCI) switching
silence start, and end; at the intermediate ATM switches. In such a case, traf-
• Signaling to set up and tear down ATM vir- fic and QoS negotiations with the ATM network typi-
tual connections on demand as required by cally occur at the VCC level. VCCs may be provisioned
the SSCS; or set up using standard Q.2931 signaling. Once again,
• Signaling to change the traffic and quality-of- LLCs are established and taken down at the two end

126 Bell Labs Technical Journal ◆ Spring 1997


points of a VCC in response to the call set-up request transmission over an ATM connection.
and call termination. Specifically, a connection set-up request arriving
Signaling for LLC Set-Up and Tear-Down in band must be extracted at the originating AAL-2
The AAL-2 LLC is defined to be a point-to-point end point and then mapped into an LLC set-up
connection—for example, between a base station and request. A connection set-up request also must be
the mobile switching center (MSC) for cellular trunk- communicated to the terminating end point separately
ing, or between two PBX’s or two international from voice packets. Of course, extraction, processing,
switches for land-line trunking. The connection is and insertion of this native signaling information is the
defined to be bidirectional, and the same CID is used responsibility of the AAL-2 management plan. This
in both directions for a particular LLC. However, the function is similar to that used by PSTN in which PBXs
traffic and QoS parameters in the two directions may using robbed bit signaling are connected via PSTN. In
be different. The set of CIDs available on an ATM VCC this case, robbed bit signaling messages are extracted
are known to both end points. and translated into Signaling System 7 (SS7) messages.
The negotiation procedures are symmetrical—that Signaling messages for connection set-up and
is, either end of the AAL-2 connection can initiate a tear-down in the native mode may also arrive out of
new LLC or request tear-down of an LLC. A simple band (for instance, when using SS7 or PRI signaling).
negotiation procedure is defined by which the origi- Once again, the messages must be processed at the
nating end point proposes establishment of a new LLC originating AAL-2 end point and mapped into AAL-2
with the employment of a particular CID that is not in signaling messages. A separate ATM VCC or a desig-
use. The other end can either accept or deny the nated LLC may be used for transporting these mes-
request. Bandwidth management and monitoring for sages across the ATM network.
the ATM virtual circuit is assumed to be handled at the Application Signaling
ATM connection management level. No such monitor- While the connection set-up and tear-down mes-
ing is proposed per LLC. However, it is the responsibil- sages originate in the native mode and are mapped
ity of the two end points to guarantee resource into signaling messages between AAL-2 end points,
availability within the ATM connection to support a many other messages are meant for communication
new LLC. Such resource management is assumed to between two ends of a specific LLC application. The
be handled in a service-specific manner. messages may be created in response to equivalent
Signaling needed for LLC set-up and tear-down messages in native networks or they may be generated
between the AAL-2 uses a predefined LLC by the AAL-2 LLC end point for controlling the specific
(with CID = 0). LLC. Examples of such signaling are vocoder rate
Relationship between native mode signaling changes, clock adjust mechanisms, silence start/end
and signaling over the ATM network. In many appli- indicators, and user-to-user in-band signaling (for
cations, existing STM systems use innovative link- example, DTMF). When packetization occurs at the
based in-band signaling to set up and tear down interface between the native network and ATM net-
calls, as well as to exchange other control informa- work, these messages are generated at this interface.
tion. For example, many PBX-to-PBX trunks carry When packetization occurs away from the ATM inter-
signaling by robbing bits from a stream and creating face (for example, at an IP end point or at a mobile
a signaling channel from it. When ATM Circuit terminal), these messages are translations of equiva-
Emulation Service is used to replace STM trunking, lent messages in the native networks.
these in-band messages are transported transpar- Approaches for carrying application signaling
ently so that two end points can interpret them to messages. The first approach to such LLC application-
set up a time slot for a call. New requirements are specific signaling is to carry the messages in the
created, however, when voice processing, packeti- SSCS overhead. Several bits in the AAL-2 header
zation, and silence suppression are used before have been denoted as user-to-user (UU) bits. The

Bell Labs Technical Journal ◆ Spring 1997 127


PSTN

Vocoder PSTN
LLC
server set 1
Vocoder PSTN
set 2
Vocoder
SW set 3

SW SW SW SW

ATM network

RPM1 RPM2

RP1 RP2 RP3 RP4

ATM – Asynchronous transfer mode RPM – Radio port multiplexer


LLC – Logical link connection SW – ATM switch
PSTN - Public-switched telephone network Vocoder – Voice coder
RP – Radio port

Figure 8.
The role of the LLC server in improving bandwidth efficiency.

SSCS is the direct user of the AAL-2 common part associated with the ATM VPC. This will involve signal-
described here. Innovative use of these UU bits to ing from the AAL-2 end point to the ATM network.
simplify or eliminate the need for additional SSCS A simple scenario involves the need to increase or
overhead is up to the SSCS. decrease the overall VPC bandwidth in response to
The second approach is to use specifically defined changing demand. Such dynamic bandwidth manage-
LLC packets with a packet header field indicating that ment allows the ATM network to use noncoincident
the packet is a signaling packet for that LLC (similar to busy periods to increase overall efficiency.
the payload type indicator [PTI] field in the ATM For VPCs, the best way to renegotiate the band-
header denoting OA&M cells). Additional octets from width parameters with the ATM network is to use the
the packet payload can be used for defining the signal- parameter renegotiation procedures defined in stan-
dards. Two possibilities are signaling protocols and
ing type in these signaling packets.
resource management cells in the permanent virtual
The third approach is to set up a separate VCC or a
circuit arena.
separate LLC for carrying application-specific signaling
In a scenario in which the ATM network employs
for all LLCs within that VPC.
VC switching using both the VPI and VCI, both the
Signaling for Changing ATM VPC/VCC Parameters VPC and VCC bandwidth parameters may have to be
Under the assumption that the ATM network uses changed. If VCCs are established using a signaling pro-
only VP switching , adding/deleting VCCs or modify- cedure (for example, Q.2931), then either the signal-
ing VCC parameters does not involve the ATM net- ing VCC or the in-call procedure using resource
work. The AAL-2 end points may use a designated management cells may be employed to modify the
signaling VCC for setting up or tearing down VCCs. bandwidth parameters.
However, there may be a need to change parameters In the simplest case, all LLCs are assumed to be

128 Bell Labs Technical Journal ◆ Spring 1997


Vocoder
ATM network set 3
Vocoder (MAN/WAN)
set 1 Vocoder
SW LLC
set 2
server 2

SW SW SW

LLC
server 3 SW

LLC
server 1

SW SW SW

SW
SW

RPM1 RPM2

RP1 RP2 RP3 RP4

ATM – Asynchronous transfer mode ATM connections carrying LLCs. Possibly


LLC – Logical link connection multiple LLC hops per voice connection.
MAN – Metropolitan area network A voice connection from RP1 to vocoder
set 2 uses three LLC hops.
RP - Radio port
RPM – Radio port multiplexer
SW – ATM switch RP1 to LLC server 1
Vocoder – Voice coder LLC server 1 to LLC server 2
WAN – Wide area network LLC server 2 to vocoder set 2

Figure 9.
A MAN and a WAN ATM network with multiple LLC servers for rebundling.

(statistically) identical, and the capacity of a VCC (or network as discussed above. CID space is then an
VPC) in terms of the number of CIDs that can be allo- upper bound on the number of CIDs that can be used
cated is determined at the time of VP/VC connection per VCC. The VPC or VCC bandwidth changes may be
establishment. AAL-2 end points then allocate and infrequent (for example, every 15 minutes based on
deallocate CIDs using signaling. During light traffic time-of-day traffic statistics) or very dynamic (on-
periods, it is desirable to reduce the overall bandwidth. demand bandwidth management).
Similarly, during heavy traffic periods, it is desirable to
increase the bandwidth of the VPC. These changes in Rebundling (Cross Connections) of LLCs
overall bandwidth involve negotiations with the ATM The AAL-2 efficiently transports short variable-

Bell Labs Technical Journal ◆ Spring 1997 129


length packets over an ATM connection spanning PBXs having wide area ATM connectivity, as well as
many ATM switches. As mentioned earlier, termina- to packet telephony in general. In fact, the situation
tion points of AAL-2 connections may be base stations is similar to that of the traditional core transport
and MSCs in wireless cellular/PCS applications, as well network consisting of different types of digital cross-
as PBXs and voice gateway severs in other packet tele- connect systems (DCSs), line termination units, and
phony applications. fiber routes. DCSs and LTEs act as rebundling
Current standards define point-to-point AAL-2 devices for lower rate circuits over very high capac-
connections (LLCs) over an ATM VPC or VCC. ity fiber routes. Thus, for broader applications of the
Many applications may have connections originat- AAL-2 with multiple end points, LLC servers may
ing at one point and ending at many different desti- be desirable at many places in the network.
nations. In these cases, creating multiple ATM VPCs
or VCCs such that each can serve as a vehicle for a Summary
subset of point-to-point AAL-2 connections may The new AAL-2, designed initially by the authors
lead to a small number of LLCs per ATM connection and enhanced during the standardization process, has
several applications. In particular, it achieves high
and, hence, to a significant loss of efficiency. A few
bandwidth efficiency and low packetization delay
examples are given below.
simultaneously, thus making it ideal for voice and
Figure 8 shows one such example. While an
other low bit-rate interactive applications. While the
ATM switch may handle a large number of base sta-
basic common part of AAL-2 is standardized, signaling
tions (RPs), connections at RPs may use different PSTN
requirements and alternative transport mechanisms
interfaces. Typically, the association between an RP
for signaling messages are the focus of current studies.
and the PSTN interface is dynamic due to mobile
Further work on LLC servers is in progress.
hand-off. At hand-off, the RP changes but the PSTN
Specifically, the locations of LLC servers and routing of
interface remains anchored. Thus, an ATM connection
LLCs using one or more LLC servers as vias are being
between an RP and a vocoder set may not have
worked as a network design problem.
enough LLCs to achieve high multiplexing gain.
Another area being investigated is related to engi-
One solution to this problem is to have two ATM
neering ATM VPC and/or VCC bandwidth given the
connections in the path of an AAL-2 connection—one
call arrival patterns, blocking criteria, coding rates,
between the RP and LLC server and another between
degree of real-time adjustability in coding rates, and
the LLC server and the vocoder set. All LLCs from and
routing strategies now being used.
to a given RP use a common ATM VPC or VCC irre-
The basic principles of the AAL-2 are also applica-
spective of the vocoder set at the other end. Similarly,
ble in non-ATM environments. Both the Frame Relay
all LLCs from and to a given vocoder set use a com-
Forum and the IETF are investigating multiplexing
mon ATM VPC or VCC irrespective of the RP at the
protocols similar to the AAL-2 for carrying low-bit-rate
other end. At the LLC server, LLC packets from an RP
voice over frame-relay and IP networks, respectively.
are extracted and multiplexed into the ATM connec-
tion between the LLC server and the particular Acknowledgment
vocoder set. A similar procedure applies to the packets The authors gratefully acknowledge the contribu-
originating at vocoder sets and destined for RPs. tions of the following Bell Labs colleagues: Hong Jiang,
The second scenario is similar except that a Wassim Matragi, Milo Orsic, Jonathan Rosenberg, and
wide area ATM network replaces the STM-based Anil Sawkar.
PSTN. Vocoders are used at the exit from the ATM References
network to interface with the landline network 1. B-ISDN ATM Adaptation Layer, AAL-1
Specification, ITU-T Recommendation I.36.1,
near the destination. As Figure 9 shows, multiple
Aug. 1996.
intermediate LLC servers may be required in this 2. B-ISDN ATM Adaptation Layer, AAL 3/4
case. This situation clearly applies to a network of Specification, ITU-T Recommendation

130 Bell Labs Technical Journal ◆ Spring 1997


I.363.3/4, Aug. 1996. provision of voice features, and the carriage of multiple
3. B-ISDN ATM Adaptation Layer, AAL-5 compressed voice conversations via a new adaptation
Specification, ITU-T Recommendation I.363.5, protocol. He is a co-holder of a patent on delay-less can-
Aug. 1996. cellation of echoes in the ATM domain. Mr. Bharucha
4. B. T. Doshi and A. S. Sawkar, “An ATM-Based received B.S., M.S., and Ph.D. degrees in electrical engi-
PCS/Cellular Architecture,” in Wireless neering from the University of California at Berkeley.
Information Network: Architecture Resource
Management and Mobile Data, edited by
J. M. Holtzman, Proceedings of the Fifth Winlab BHARAT T. DOSHI is head of the Performance Analysis
Workshop, Kluwer Academic Publishers, Boston, Department at Bell Labs in Holmdel,
Massachusetts, 1996. New Jersey. He is responsible for developing
5. B-ISDN ATM Adaptation Layer Type-2 state-of-the-art analysis and simulation tools,
Specification, ITU-T Draft Recommendation network design and routing algorithms, com-
I.363.2, Nov. 1996. munication protocols and systems architec-
6. “Mobile Station - Base Station Compatibility ture, and systems/network sizing methods. He also
Standard for Wideband Spread Spectrum manages research in frame-relay, ATM, SONET, and wire-
Cellular System,” IS-95 Standard, Revision B less technologies, protocols, networks, and products.
(forthcoming). Mr. Doshi, who has authored more than 90 technical
7. Personal Digital Cellular (PDC) Telecommunications papers and who has 25 patent applications, holds a
Standard, Japanese Research and Development Ph.D. in operations research from Cornell University in
Center for Radio Systems (RCR), RCR Standard Ithaca, New York.
STD-27, Apr. 1991.
8. J. H. Baldwin, B. H. Bharucha, B. T. Doshi,
S. Dravida, and S. Nanda, “AAL-CU: An ATM SUBRAHMANYAM DRAVIDA is a technical manager in
Adaptation Layer for Small Packet the Performance Analysis Department at Bell
Encapsulation,” Proceedings of the 15th Labs in Holmdel, New Jersey. He is currently
International Teletraffic Congress, Washington, working on protocols and architectures for
D.C., June 22-27, 1997. wireless networks, as well as protocols for
cable networks. His responsibilities include
(Manuscript approved June 1997) development of algorithms for the design of ATM, SDH,
and wireless networks. Mr. Dravida has a B.Tech. degree
JOHN H. BALDWIN is a member of technical staff in the in electrical engineering from the Indian Institute of
Wireless Systems Core Technology Depart- Technology in Madras, as well as an M.S.E.E. and a
ment at Bell Labs in Whippany, New Jersey. Ph.D. in electrical engineering from the Rensselaer
He is responsible for next-generation base Polytechnic Institute in Troy, New York.
station transport using ATM technology.
Mr. Baldwin has an associate degree in elec-
trical engineering from Pennsylvania State University in SANJIV NANDA is acting technical manager in the
Beaver, a B.S.E.E. from Fairleigh Dickinson University in Performance Analysis Department at Bell
Teaneck, New Jersey, and an M.E. in electrical engineer- Labs in Holmdel, New Jersey. In this assign-
ing from Cornell University in Ithaca, New York. ment, he is responsible for the design,
modeling, and performance of Lucent
Technologies’ cellular systems. Mr. Nanda
BEHRAM H. BHARUCHA was a distinguished member of has a Ph.D. degree in electrical engineering from the
technical staff at Bell Labs in Holmdel, New Rensselaer Polytechnic Institute in Troy, New York. ◆
Jersey, when this paper was developed. He
worked in the areas of communication
theory, underwater noise modeling and tar-
get detection, digital network planning,
speech quality, frame relay, ISDN, and ATM/B-ISDN. In
the latter three transport technologies, he created fun-
damental concepts, architectures, protocols, and stan-
dards. His contributions in ATM are in the basic concepts
and standards for circuit emulation, including PCM voice,

Bell Labs Technical Journal ◆ Spring 1997 131

You might also like