SlideShare a Scribd company logo
1 of 18
Download to read offline
© Peter R. Egli 2015
1/18
Rev. 3.00
xDSL Technology indigoo.com
Peter R. Egli
INDIGOO.COM
OVERVIEW OF IMPORTANT
DIGITAL SUBSCRIBER LINE TECHNOLOGIES
xDSL
© Peter R. Egli 2015
2/18
Rev. 3.00
xDSL Technology indigoo.com
Contents
1. What is xDSL?
2. xDSL Technology Overview
3. ADSL physical layer
4. ADSL network architecture
5. Protocols used with ADSL
6. Setup of an Internet session
7. L2TP RFC2661
8. PPPoE RFC2516
9. RFC1483
© Peter R. Egli 2015
3/18
Rev. 3.00
xDSL Technology indigoo.com
1. What is xDSL?
• xDSL is a collective term for transmission technologies for the access / local loop / last
mile (sometimes also called ‚first mile‘).
• The traditional access network looks as follows:
• Digital modem (modulation / demodulation) technique is used to put bits onto traditional telephone wire
lines (2 wires, 4 wires).
• The ‚x‘ stands for many different flavors of DSL (different modulation techniques).
• xDSL is on OSI layer 1 (physical medium).
• The different xDSL techniques usually use a specific layer 2 framing protocol (e.g. ADSL is usually used
in CH on layer 1 together with ATM on layer 2).
• xDSL is commercially very attractive since it offers high bandwidth on traditional (already installed)
telephone wire (installation is cheap compared to other technologies like wireless).
• Central office: Termination of access lines / local loop, connection to PSTN (CH: ~900 COs).
Residential / Business
Trunk
line
Public Switched
Telephony Network
National
PSTN
International
PSTN
Upstream (to network)
Downstream (from network)
Twisted pair telephone cable
(CH: average length = 3km)
Trunk line
Central Office (CO)
xy-com
© Peter R. Egli 2015
4/18
Rev. 3.00
xDSL Technology indigoo.com
2. xDSL technology overview (1/2)
Main characteristics:
Name Standard Speed Wires Mode Distance Comment
ADSL (G.dmt) G.992.1
1.5 - 9Mbps DS
16 - 640Kbps US Single pair
Downstream &
upstream 6km Needs splitter
ADSL2+ G.992.5
...24Mbps DS
...3.3Mbps US Single pair
Downstream &
upstream 6km Needs splitter
G.Lite=DSL Lite G.992.2
1Mbps DS
128Kbps US Single pair
Downstream &
upstream 6km
Does not need
splitter
HDSL 1.54Mbps Two pairs Duplex (symmetric) 5km -
HDSL-II G.991.1 1.54Mbps Single pair Duplex (symmetric) 5km -
IDSL I.430 144Kbps Single pair Duplex (symmetric) 6km -
RADSL
1 - 7Mbps
128Kbps - 1.5Mbps Single pair
Downstream &
upstream 6km
Automatically
adapts bit rate
to line
G.SHDSL G.991.2 192Kbps - 2.3Mbps Single pair Duplex (symmetric) 3.3km No POTS/ISDN
VDSL1 G.993.1
13 - 52Mbps
1.5 - 2.3Mbps Single pair
Downstream &
upstream 1.2km No POTS/ISDN
VDSL2 G.993.2
...100Mbps
...50Mbps Single pair
Downstream &
upstream 1.5km No POTS/ISDN
• ADSL Asymmetric Digital Subscriber Line suited for home users
(asymmetric traffic pattern).
• G.SHDSL Symmetrical High Bitrate Digital Subscriber Line is
suited for businesses with higher and symmetric bandwidth demand.
• VDSL Very High Datarate Digitial Subscriber Line is popular for
very high bandwidth over short distances demands (connections
between/within buildings).
© Peter R. Egli 2015
5/18
Rev. 3.00
xDSL Technology indigoo.com
2. xDSL technology overview (2/2)
Speed versus distance:
Distance must be traded off against bandwidth (the higher the bandwidth the lower the range).
10
20
30
40
50
60
70
80
90
100
0 1 2 3 4 5
VDSL2
VDSL1
ADSL2+
G.SHDSL
Mb/s
km
© Peter R. Egli 2015
6/18
Rev. 3.00
xDSL Technology indigoo.com
3. ADSL physical layer (1/3)
ADSL exploits the fact that (today‘s) Internet traffic is largely asymmetric (much higher traffic
downstream = to user, low traffic upstream = from user).
ADSL is made to coexist with POTS or ISDN (G.991.2 Annex A (POTS) and Annex B (ISDN)).
Frequency usage of ADSL:
0-4kHz 1.1MHz20kHz
POTS + ADSL
0-80kHz 1.1MHz120kHz
ISDN + ADSL
POTS‘ + ADSL‘s frequencies are not
overlapping thus there is no problem.
ISDN‘s and ADSL‘s frequencies are overlapping,
thus ADSL and ISDN frequency bands
need to be separated (ADSL with out-of-band
ISDN does not use frequencies in ISDN band).
© Peter R. Egli 2015
7/18
Rev. 3.00
xDSL Technology indigoo.com
3. ADSL physical layer (2/3)
Possible ADSL modulations:
1. CAP Carrierless Amplitude Phase:
Phase modulation coupled with amplitude modulation.
2. DMT Discrete Multitone:
Frequency spectrum from 0 thru 1.1MHz is divided into 256 or 512 sub-bands (channels 0-
5/20 are not used - these frequencies are used for POTS/ISDN).
Each sub-channel uses QAM and offers a different bit capacity (depending on Signal to
Noise Ratio SNR).
Sub-channels 6/21 thru 31 are used for upstream while sub-channels 33 thru 255 are used for
downstream traffic.
© Peter R. Egli 2015
8/18
Rev. 3.00
xDSL Technology indigoo.com
3. ADSL physical layer (3/3)
Separation of upstream (towards network) and downstream (from network)
signals (remember: there are only 2 wires for both directions):
Solution 1: Usage of echo canceller:
0-4kHz 1.1MHz20kHz
POTS + ADSL
Upstream
Downstream
0-4kHz 1.1MHz20kHz
POTS + ADSL
Upstream
Downstream
Upstream and downstream use
overlapping frequency bands, but
the signals are separated with an
echo canceller.
Upstream and downstream use
non-overlapping frequency bands.
Solution 2: Usage of frequency division multiplexing:
© Peter R. Egli 2015
9/18
Rev. 3.00
xDSL Technology indigoo.com
4. ADSL network architecture (1/3)
Subscriber infrastructure „ADSL over POTS“:
A passive filter protects analog devices (mostly analog = POTS phones) from ADSL frequencies.
The DSLAM is a big box with hundreds of ADSL modems (software modems that run on
specialized hardware).
The splitter in the central office separates the voice traffic
(ISDN) and data traffic (ADSL).
Splitter
DSLAM
POTS Plain Old Telephone System
DSLAM Digital Subscriber Line Access Multiplexer = Modem Pool (high number of modems)
UTP Unshielded Twisted Pair
NT Network Termination (ISDN modem)
Voice Switch
ADSL
modem
Filter
(remove HF from ADSL
signal which impairs
POTS signal quality).
POTS
phone
UTP local loop
Internet
Internet
© Peter R. Egli 2015
10/18
Rev. 3.00
xDSL Technology indigoo.com
4. ADSL network architecture (2/3)
Subscriber infrastructure „ADSL over ISDN“:
The splitters (passive device) separate/combine the ISDN and ADSL frequencies.
The DSLAM is a big box with hundreds of ADSL modems (software modems that run on
specialized hardware).
The splitter in the central office separates the voice traffic
(ISDN) and data traffic (ADSL).
ADSL
modem
ISDN
NTISDN
phone
Splitter
Splitter
DSLAM
UTP local loop
POTS Plain Old Telephone System
DSLAM Digital Subscriber Line Access Multiplexer = Modem Pool (high number of modems)
UTP Unshielded Twisted Pair
NT Network Termination (ISDN modem)
Voice Switch
Internet
Internet
© Peter R. Egli 2015
11/18
Rev. 3.00
xDSL Technology indigoo.com
4. ADSL network architecture (3/3)
Provider network infrastructure:
Access Connectivity
Access Provider ISP Internet Service
Provider
AAA Authentication Authorisation Accounting
SAP Service Access Point
ISP Internet Service Provider
LAC L2TP Access Concentrator
BRAS Broadband RAS
STE
Service Termination
Equipment
LNS
L2TP Network
Server
ISP SAP
Authentication
Authorization
Accounting
Telehouse / Colocation
Central Office (CO)
DSLAM
LAC / BRAS
L2TP Access
Concentrator
to PSTN
Central Office (CO)
AAA AAA
L2TP Tunnel
Provider
MPLS/IP
Backbone
End
User
Authentication &
Tunnel attributes
LAC
CH: ~1400 COs CH: ~18 LAC
locations
Internet
© Peter R. Egli 2015
12/18
Rev. 3.00
xDSL Technology indigoo.com
5. Protocols used with ADSL (CH and most other countries)
PPP Point to Point Protocol PPPoE PPP over Ethernet
MPLS Multiprotocol Label Switching PHY Physical Layer
1483 RFC1483 Multiprotocol over ATM Adaptation Layer 5
A PPPoE session provides layer 2 connectivity between ADSL modem and LAC in order to
transport PPP frames. With PPP the Internet provider assigns a dynamic IP address to the ADSL
modem/router.
The L2TP tunnel endpoints use static IP addresses (no dynamic routing due to security).
LAC STE LNS
IP
PPP
PPPoE
MAC
ATM Switch
ADSL PHY
PPP Session
L2TP Tunnel (session)PPPoE Session
ATM PVC
MAC 1483
AAL5
ATM
ADSL
1483
AAL5
ATM
PHY
PPPoE L2TP
UDP
IP
MPLS
PHY
IP
MPLS
IP
MAC
Router
PHY PHY
L2TP
UDP
IP
MAC
IP
PPP
IP
xyz
Router
PHY
DSLAMADSL
modem
PC
© Peter R. Egli 2015
13/18
Rev. 3.00
xDSL Technology indigoo.com
6. Setup of an Internet session (1/2)
A. Tunnel selection with PPPoE service-name:
1. PC or ADSL router starts PPP session
2. PPP session activates PPPoE session (PADI, PADO, PADR, PADS packets, see below)
3. AAA Query + Tunnel endpoint lookup:
The LAC ascertains the L2TP tunnel based on the PPPoE Service-Name tag (service selection).
Example Service-Name tag: „green.ch“.
4. LAC forwards all PPP packets (LCP, CHAP, IPCP, data packets) to the L2TP tunnel ascertained in
step 3 (based on PPPoE Service-Name).
5. The PC or ADSL modem and the LNS bring up the PPP link (LCP phase).
6. The LNS authenticates (AAA) the PC or ADSL modem with CHAP.
7. The LNS assigns an IP address and DNS server to the PC or ADSL modem (IPCP).
8. The PC or ADSL router exchange user data.
© Peter R. Egli 2015
14/18
Rev. 3.00
xDSL Technology indigoo.com
6. Setup of an Internet session (2/2)
B. Tunnel selection with AAA on LAC (done by Swisscom in Switzerland):
1. PC or ADSL router starts PPP session
2. PPP session activates PPPoE session (PADI, PADO, PADR, PADS packets, see below)
3. AAA Query + Tunnel endpoint lookup:
The LAC sends a CHAP Challenge packet upon which the PC or ADSL router sends back
a CHAP Response packet containing the login „user@green.ch“. The domain name of the login
„green.ch“ is then used for the lookup of the tunnel endpoint (through AAA lookup).
4. The LAC makes an AAA query to authorize the user (let him continue). Thus the LAC performs
the AAA on behalf of the ISP. This requires that the ISP has access to the access
provider‘s (Swisscom) AAA database (add/modify/delete users).
5. The LAC and LNS bring up the link (new PPP session between LAC and LNS).
6. Optional: LNS authenticates LAC again (same CHAP secret as above).
7. LAC forwards all PPP packets from the PC or ADSL modem to the L2TP tunnel ascertained in
step 3.
8. The LNS assigns an IP address and DNS server to the PC or ADSL modem (IPCP).
9. The PC or ADSL router exchange user data.
© Peter R. Egli 2015
15/18
Rev. 3.00
xDSL Technology indigoo.com
7. L2TP RFC2661 (1/2)
• L2TP allows to tunnel PPP over any packet switched network.
• L2TP inherited the best of L2F (Layer 2 Framing protocol by Cisco) and PPTP (Point to Point Tunneling
Protocol by Microsoft).
• L2TP (along with other layer 2 tunneling protocols) allows a provider to offer remote access services (RAS)
to customers over existing packet based infrastructure.
• L2TP is run over UDP/IP to make it pass firewalls.
• L2TP is:
a. A control protocol do dynamically setup and teardown connections (tunnels); this control
uses a reliable transport (that uses the Ns and Nr sequence numbers for reliability).
b. Data encapsulation for tunneling user data frames (PPP); the data packet transport is
unreliable, that is makes not use of Ns and Nr sequence numbers.
a. Control protocol
L2TP Tunnel
Control
Packet Transport (UDP/IP, FR, ATM)
L2TP Control Channel
(reliable)
L2TP Control Message
L2TP Data Channel
(unreliable)
L2TP Data Message
PPP Frame
User Data
b. Data encapsulation
© Peter R. Egli 2015
16/18
Rev. 3.00
xDSL Technology indigoo.com
7. L2TP RFC2661 (2/2)
L2TP header fields:
Specifies
tunnel
instance
Specifies session
within tunnel
Type:
0=data message
1=control message
Ns: send sequence number
Nr: receive sequence number
Same sliding window mechanism as in TCP (send window Ws),
but numbers specify message number (starting at 0)
rather than individual bytes.
T L 0 S 0 O P 0 Version Length
Session IDTunnel ID
Ns Nr
Offset Size Offset Pad
Data
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
© Peter R. Egli 2015
17/18
Rev. 3.00
xDSL Technology indigoo.com
8. PPPoE RFC2516
• PPPoE allows to establish connections over Ethernet for PPP sessions into the Internet.
• PPPoE solves 2 main problems:
1. Dynamic IP address assignment without using broadcasts (PPP).
 PPPoE (and thus PPP) is only active if the computer wants to access the Internet.
2. Excessive broadcasts in large bridged networks.
 With PPPoE everything is nicely contained in point to point connections.
• PPPoE is needed as convergence layer when computer does not have its own ATM interface (otherwise it
could do PPPoA which is simply PPP over ATM).
• PPPoE trace (PPPoE session):
C: 1 0.000000 00:30:2b:00:0b:fc -> ff:ff:ff:ff:ff:ff PPPoED Active Discovery Initiation (PADI)
S: 2 0.030894 00:02:16:5e:0e:b7 -> 00:30:2b:00:0b:fc PPPoED Active Discovery Offer (PADO)
C: 3 0.031742 00:30:2b:00:0b:fc -> 00:02:16:5e:0e:b7 PPPoED Active Discovery Request (PADR)
S: 4 0.069048 00:02:16:5e:0e:b7 -> 00:30:2b:00:0b:fc PPPoED Active Discovery Session-confirmation (PADS)
LCP Link Control Protocol (PPP LCP frames encapsulated in PPPoE)
CHAP/PAP (PPP CHAP/PAP frames encapsulated in PPPoE)
NCP Network Control Protocol (PPP NCP frames encapsulated in PPPoE)
... (user PPP frames incapsulated in PPPoE)
C: N 12.34256 00:30:2b:00:0b:fc -> 00:02:16:5e:0e:b7 PPPoED Active Discovery Terminate (PADT)
Creation of
PPPoE
session
Creation of
PPP session
User data
exchange
PPPoE
session
termination
(can be initiated by client or server)
© Peter R. Egli 2015
18/18
Rev. 3.00
xDSL Technology indigoo.com
9. RFC1483 Multiprotocol Encapsulation over ATM Adapation Layer 5
RFC1483 is used for the encapsulation/multiplexing of upper layer protocols (Ethernet, IP)
into ATM.
LLC / SNAP
(protocol muxing)
Router
Ethernet
IPBridge
ATM
(cells)
PHY
AAL5
(frames)
Ethernet
Bridge
LLC / SNAP
(protocol muxing)
Router
Ethernet
IP Bridge
ATM
(cells)
PHY
AAL5
(frames)
Ethernet
Bridge
 VC-muxed:
upper layer
protocols are muxed
via VC (Virtual Channel)
ATM PVCs (Permanent Virtual
Connections)
 LLC/SNAP:
all upper layer protocols
use same ATM PVC; demuxing
done via LLC/SNAP protocol
field

More Related Content

More from Peter R. Egli

Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET PlatformPeter R. Egli
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyPeter R. Egli
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development KitPeter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingPeter R. Egli
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBAPeter R. Egli
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Peter R. Egli
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging ServicePeter R. Egli
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State TransferPeter R. Egli
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented MiddlewarePeter R. Egli
 
Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Peter R. Egli
 
Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Peter R. Egli
 
Remote Method Invocation (RMI)
Remote Method Invocation (RMI)Remote Method Invocation (RMI)
Remote Method Invocation (RMI)Peter R. Egli
 

More from Peter R. Egli (20)

Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET Platform
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development Kit
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Web services
Web servicesWeb services
Web services
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging Service
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State Transfer
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 
Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)
 
Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)
 
Remote Method Invocation (RMI)
Remote Method Invocation (RMI)Remote Method Invocation (RMI)
Remote Method Invocation (RMI)
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Digital Subscriber Line (xDSL)

  • 1. © Peter R. Egli 2015 1/18 Rev. 3.00 xDSL Technology indigoo.com Peter R. Egli INDIGOO.COM OVERVIEW OF IMPORTANT DIGITAL SUBSCRIBER LINE TECHNOLOGIES xDSL
  • 2. © Peter R. Egli 2015 2/18 Rev. 3.00 xDSL Technology indigoo.com Contents 1. What is xDSL? 2. xDSL Technology Overview 3. ADSL physical layer 4. ADSL network architecture 5. Protocols used with ADSL 6. Setup of an Internet session 7. L2TP RFC2661 8. PPPoE RFC2516 9. RFC1483
  • 3. © Peter R. Egli 2015 3/18 Rev. 3.00 xDSL Technology indigoo.com 1. What is xDSL? • xDSL is a collective term for transmission technologies for the access / local loop / last mile (sometimes also called ‚first mile‘). • The traditional access network looks as follows: • Digital modem (modulation / demodulation) technique is used to put bits onto traditional telephone wire lines (2 wires, 4 wires). • The ‚x‘ stands for many different flavors of DSL (different modulation techniques). • xDSL is on OSI layer 1 (physical medium). • The different xDSL techniques usually use a specific layer 2 framing protocol (e.g. ADSL is usually used in CH on layer 1 together with ATM on layer 2). • xDSL is commercially very attractive since it offers high bandwidth on traditional (already installed) telephone wire (installation is cheap compared to other technologies like wireless). • Central office: Termination of access lines / local loop, connection to PSTN (CH: ~900 COs). Residential / Business Trunk line Public Switched Telephony Network National PSTN International PSTN Upstream (to network) Downstream (from network) Twisted pair telephone cable (CH: average length = 3km) Trunk line Central Office (CO) xy-com
  • 4. © Peter R. Egli 2015 4/18 Rev. 3.00 xDSL Technology indigoo.com 2. xDSL technology overview (1/2) Main characteristics: Name Standard Speed Wires Mode Distance Comment ADSL (G.dmt) G.992.1 1.5 - 9Mbps DS 16 - 640Kbps US Single pair Downstream & upstream 6km Needs splitter ADSL2+ G.992.5 ...24Mbps DS ...3.3Mbps US Single pair Downstream & upstream 6km Needs splitter G.Lite=DSL Lite G.992.2 1Mbps DS 128Kbps US Single pair Downstream & upstream 6km Does not need splitter HDSL 1.54Mbps Two pairs Duplex (symmetric) 5km - HDSL-II G.991.1 1.54Mbps Single pair Duplex (symmetric) 5km - IDSL I.430 144Kbps Single pair Duplex (symmetric) 6km - RADSL 1 - 7Mbps 128Kbps - 1.5Mbps Single pair Downstream & upstream 6km Automatically adapts bit rate to line G.SHDSL G.991.2 192Kbps - 2.3Mbps Single pair Duplex (symmetric) 3.3km No POTS/ISDN VDSL1 G.993.1 13 - 52Mbps 1.5 - 2.3Mbps Single pair Downstream & upstream 1.2km No POTS/ISDN VDSL2 G.993.2 ...100Mbps ...50Mbps Single pair Downstream & upstream 1.5km No POTS/ISDN • ADSL Asymmetric Digital Subscriber Line suited for home users (asymmetric traffic pattern). • G.SHDSL Symmetrical High Bitrate Digital Subscriber Line is suited for businesses with higher and symmetric bandwidth demand. • VDSL Very High Datarate Digitial Subscriber Line is popular for very high bandwidth over short distances demands (connections between/within buildings).
  • 5. © Peter R. Egli 2015 5/18 Rev. 3.00 xDSL Technology indigoo.com 2. xDSL technology overview (2/2) Speed versus distance: Distance must be traded off against bandwidth (the higher the bandwidth the lower the range). 10 20 30 40 50 60 70 80 90 100 0 1 2 3 4 5 VDSL2 VDSL1 ADSL2+ G.SHDSL Mb/s km
  • 6. © Peter R. Egli 2015 6/18 Rev. 3.00 xDSL Technology indigoo.com 3. ADSL physical layer (1/3) ADSL exploits the fact that (today‘s) Internet traffic is largely asymmetric (much higher traffic downstream = to user, low traffic upstream = from user). ADSL is made to coexist with POTS or ISDN (G.991.2 Annex A (POTS) and Annex B (ISDN)). Frequency usage of ADSL: 0-4kHz 1.1MHz20kHz POTS + ADSL 0-80kHz 1.1MHz120kHz ISDN + ADSL POTS‘ + ADSL‘s frequencies are not overlapping thus there is no problem. ISDN‘s and ADSL‘s frequencies are overlapping, thus ADSL and ISDN frequency bands need to be separated (ADSL with out-of-band ISDN does not use frequencies in ISDN band).
  • 7. © Peter R. Egli 2015 7/18 Rev. 3.00 xDSL Technology indigoo.com 3. ADSL physical layer (2/3) Possible ADSL modulations: 1. CAP Carrierless Amplitude Phase: Phase modulation coupled with amplitude modulation. 2. DMT Discrete Multitone: Frequency spectrum from 0 thru 1.1MHz is divided into 256 or 512 sub-bands (channels 0- 5/20 are not used - these frequencies are used for POTS/ISDN). Each sub-channel uses QAM and offers a different bit capacity (depending on Signal to Noise Ratio SNR). Sub-channels 6/21 thru 31 are used for upstream while sub-channels 33 thru 255 are used for downstream traffic.
  • 8. © Peter R. Egli 2015 8/18 Rev. 3.00 xDSL Technology indigoo.com 3. ADSL physical layer (3/3) Separation of upstream (towards network) and downstream (from network) signals (remember: there are only 2 wires for both directions): Solution 1: Usage of echo canceller: 0-4kHz 1.1MHz20kHz POTS + ADSL Upstream Downstream 0-4kHz 1.1MHz20kHz POTS + ADSL Upstream Downstream Upstream and downstream use overlapping frequency bands, but the signals are separated with an echo canceller. Upstream and downstream use non-overlapping frequency bands. Solution 2: Usage of frequency division multiplexing:
  • 9. © Peter R. Egli 2015 9/18 Rev. 3.00 xDSL Technology indigoo.com 4. ADSL network architecture (1/3) Subscriber infrastructure „ADSL over POTS“: A passive filter protects analog devices (mostly analog = POTS phones) from ADSL frequencies. The DSLAM is a big box with hundreds of ADSL modems (software modems that run on specialized hardware). The splitter in the central office separates the voice traffic (ISDN) and data traffic (ADSL). Splitter DSLAM POTS Plain Old Telephone System DSLAM Digital Subscriber Line Access Multiplexer = Modem Pool (high number of modems) UTP Unshielded Twisted Pair NT Network Termination (ISDN modem) Voice Switch ADSL modem Filter (remove HF from ADSL signal which impairs POTS signal quality). POTS phone UTP local loop Internet Internet
  • 10. © Peter R. Egli 2015 10/18 Rev. 3.00 xDSL Technology indigoo.com 4. ADSL network architecture (2/3) Subscriber infrastructure „ADSL over ISDN“: The splitters (passive device) separate/combine the ISDN and ADSL frequencies. The DSLAM is a big box with hundreds of ADSL modems (software modems that run on specialized hardware). The splitter in the central office separates the voice traffic (ISDN) and data traffic (ADSL). ADSL modem ISDN NTISDN phone Splitter Splitter DSLAM UTP local loop POTS Plain Old Telephone System DSLAM Digital Subscriber Line Access Multiplexer = Modem Pool (high number of modems) UTP Unshielded Twisted Pair NT Network Termination (ISDN modem) Voice Switch Internet Internet
  • 11. © Peter R. Egli 2015 11/18 Rev. 3.00 xDSL Technology indigoo.com 4. ADSL network architecture (3/3) Provider network infrastructure: Access Connectivity Access Provider ISP Internet Service Provider AAA Authentication Authorisation Accounting SAP Service Access Point ISP Internet Service Provider LAC L2TP Access Concentrator BRAS Broadband RAS STE Service Termination Equipment LNS L2TP Network Server ISP SAP Authentication Authorization Accounting Telehouse / Colocation Central Office (CO) DSLAM LAC / BRAS L2TP Access Concentrator to PSTN Central Office (CO) AAA AAA L2TP Tunnel Provider MPLS/IP Backbone End User Authentication & Tunnel attributes LAC CH: ~1400 COs CH: ~18 LAC locations Internet
  • 12. © Peter R. Egli 2015 12/18 Rev. 3.00 xDSL Technology indigoo.com 5. Protocols used with ADSL (CH and most other countries) PPP Point to Point Protocol PPPoE PPP over Ethernet MPLS Multiprotocol Label Switching PHY Physical Layer 1483 RFC1483 Multiprotocol over ATM Adaptation Layer 5 A PPPoE session provides layer 2 connectivity between ADSL modem and LAC in order to transport PPP frames. With PPP the Internet provider assigns a dynamic IP address to the ADSL modem/router. The L2TP tunnel endpoints use static IP addresses (no dynamic routing due to security). LAC STE LNS IP PPP PPPoE MAC ATM Switch ADSL PHY PPP Session L2TP Tunnel (session)PPPoE Session ATM PVC MAC 1483 AAL5 ATM ADSL 1483 AAL5 ATM PHY PPPoE L2TP UDP IP MPLS PHY IP MPLS IP MAC Router PHY PHY L2TP UDP IP MAC IP PPP IP xyz Router PHY DSLAMADSL modem PC
  • 13. © Peter R. Egli 2015 13/18 Rev. 3.00 xDSL Technology indigoo.com 6. Setup of an Internet session (1/2) A. Tunnel selection with PPPoE service-name: 1. PC or ADSL router starts PPP session 2. PPP session activates PPPoE session (PADI, PADO, PADR, PADS packets, see below) 3. AAA Query + Tunnel endpoint lookup: The LAC ascertains the L2TP tunnel based on the PPPoE Service-Name tag (service selection). Example Service-Name tag: „green.ch“. 4. LAC forwards all PPP packets (LCP, CHAP, IPCP, data packets) to the L2TP tunnel ascertained in step 3 (based on PPPoE Service-Name). 5. The PC or ADSL modem and the LNS bring up the PPP link (LCP phase). 6. The LNS authenticates (AAA) the PC or ADSL modem with CHAP. 7. The LNS assigns an IP address and DNS server to the PC or ADSL modem (IPCP). 8. The PC or ADSL router exchange user data.
  • 14. © Peter R. Egli 2015 14/18 Rev. 3.00 xDSL Technology indigoo.com 6. Setup of an Internet session (2/2) B. Tunnel selection with AAA on LAC (done by Swisscom in Switzerland): 1. PC or ADSL router starts PPP session 2. PPP session activates PPPoE session (PADI, PADO, PADR, PADS packets, see below) 3. AAA Query + Tunnel endpoint lookup: The LAC sends a CHAP Challenge packet upon which the PC or ADSL router sends back a CHAP Response packet containing the login „user@green.ch“. The domain name of the login „green.ch“ is then used for the lookup of the tunnel endpoint (through AAA lookup). 4. The LAC makes an AAA query to authorize the user (let him continue). Thus the LAC performs the AAA on behalf of the ISP. This requires that the ISP has access to the access provider‘s (Swisscom) AAA database (add/modify/delete users). 5. The LAC and LNS bring up the link (new PPP session between LAC and LNS). 6. Optional: LNS authenticates LAC again (same CHAP secret as above). 7. LAC forwards all PPP packets from the PC or ADSL modem to the L2TP tunnel ascertained in step 3. 8. The LNS assigns an IP address and DNS server to the PC or ADSL modem (IPCP). 9. The PC or ADSL router exchange user data.
  • 15. © Peter R. Egli 2015 15/18 Rev. 3.00 xDSL Technology indigoo.com 7. L2TP RFC2661 (1/2) • L2TP allows to tunnel PPP over any packet switched network. • L2TP inherited the best of L2F (Layer 2 Framing protocol by Cisco) and PPTP (Point to Point Tunneling Protocol by Microsoft). • L2TP (along with other layer 2 tunneling protocols) allows a provider to offer remote access services (RAS) to customers over existing packet based infrastructure. • L2TP is run over UDP/IP to make it pass firewalls. • L2TP is: a. A control protocol do dynamically setup and teardown connections (tunnels); this control uses a reliable transport (that uses the Ns and Nr sequence numbers for reliability). b. Data encapsulation for tunneling user data frames (PPP); the data packet transport is unreliable, that is makes not use of Ns and Nr sequence numbers. a. Control protocol L2TP Tunnel Control Packet Transport (UDP/IP, FR, ATM) L2TP Control Channel (reliable) L2TP Control Message L2TP Data Channel (unreliable) L2TP Data Message PPP Frame User Data b. Data encapsulation
  • 16. © Peter R. Egli 2015 16/18 Rev. 3.00 xDSL Technology indigoo.com 7. L2TP RFC2661 (2/2) L2TP header fields: Specifies tunnel instance Specifies session within tunnel Type: 0=data message 1=control message Ns: send sequence number Nr: receive sequence number Same sliding window mechanism as in TCP (send window Ws), but numbers specify message number (starting at 0) rather than individual bytes. T L 0 S 0 O P 0 Version Length Session IDTunnel ID Ns Nr Offset Size Offset Pad Data 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
  • 17. © Peter R. Egli 2015 17/18 Rev. 3.00 xDSL Technology indigoo.com 8. PPPoE RFC2516 • PPPoE allows to establish connections over Ethernet for PPP sessions into the Internet. • PPPoE solves 2 main problems: 1. Dynamic IP address assignment without using broadcasts (PPP).  PPPoE (and thus PPP) is only active if the computer wants to access the Internet. 2. Excessive broadcasts in large bridged networks.  With PPPoE everything is nicely contained in point to point connections. • PPPoE is needed as convergence layer when computer does not have its own ATM interface (otherwise it could do PPPoA which is simply PPP over ATM). • PPPoE trace (PPPoE session): C: 1 0.000000 00:30:2b:00:0b:fc -> ff:ff:ff:ff:ff:ff PPPoED Active Discovery Initiation (PADI) S: 2 0.030894 00:02:16:5e:0e:b7 -> 00:30:2b:00:0b:fc PPPoED Active Discovery Offer (PADO) C: 3 0.031742 00:30:2b:00:0b:fc -> 00:02:16:5e:0e:b7 PPPoED Active Discovery Request (PADR) S: 4 0.069048 00:02:16:5e:0e:b7 -> 00:30:2b:00:0b:fc PPPoED Active Discovery Session-confirmation (PADS) LCP Link Control Protocol (PPP LCP frames encapsulated in PPPoE) CHAP/PAP (PPP CHAP/PAP frames encapsulated in PPPoE) NCP Network Control Protocol (PPP NCP frames encapsulated in PPPoE) ... (user PPP frames incapsulated in PPPoE) C: N 12.34256 00:30:2b:00:0b:fc -> 00:02:16:5e:0e:b7 PPPoED Active Discovery Terminate (PADT) Creation of PPPoE session Creation of PPP session User data exchange PPPoE session termination (can be initiated by client or server)
  • 18. © Peter R. Egli 2015 18/18 Rev. 3.00 xDSL Technology indigoo.com 9. RFC1483 Multiprotocol Encapsulation over ATM Adapation Layer 5 RFC1483 is used for the encapsulation/multiplexing of upper layer protocols (Ethernet, IP) into ATM. LLC / SNAP (protocol muxing) Router Ethernet IPBridge ATM (cells) PHY AAL5 (frames) Ethernet Bridge LLC / SNAP (protocol muxing) Router Ethernet IP Bridge ATM (cells) PHY AAL5 (frames) Ethernet Bridge  VC-muxed: upper layer protocols are muxed via VC (Virtual Channel) ATM PVCs (Permanent Virtual Connections)  LLC/SNAP: all upper layer protocols use same ATM PVC; demuxing done via LLC/SNAP protocol field