Telecom Concepts PDF
Telecom Concepts PDF
Telecom Concepts PDF
Handout
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.1 Voice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.2 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.3 Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2 Text Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3 The Core Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.1 Network Structures and Topologies . . . . . . . . . . . . . . 19
3.1.1 Point to Point . . . . . . . . . . . . . . . . . . . . . . . . 20
3.1.2 Star Network . . . . . . . . . . . . . . . . . . . . . . . . 20
3.1.3 Meshed Network . . . . . . . . . . . . . . . . . . . . 21
3.1.4 Ring Network . . . . . . . . . . . . . . . . . . . . . . . 21
3.1.5 Tree Network . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2 Links : Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.2.1 Plesiochronous Digital Hierarchy (PDH) . 28
3.2.2 Synchronous Digital Hierarchy (SDH) . . . 30
3.2.3 Wavelength Division Multiplexing (WDM) 33
3.2.4 Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.2.5 Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.3 Nodes : Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.3.1 Switching Techniques . . . . . . . . . . . . . . . . . 36
3.3.2 Cross Connection (XC), Add Drop Mux
(ADM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.3.3 Circuit Switching . . . . . . . . . . . . . . . . . . . . . 41
3.3.4 Packet Switching . . . . . . . . . . . . . . . . . . . . . 44
3.3.5 Signalling . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4 Access Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.2 Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.3 Analogue Line Access . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.4 ISDN Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.5 Concentrating Remote Users . . . . . . . . . . . . . . . . . . . . 72
4.6 Digital Subscriber Line, ADSL . . . . . . . . . . . . . . . . . . . 73
4.7 Hybrid Fiber Coax (HFC) . . . . . . . . . . . . . . . . . . . . . . . 79
4.8 Fiber in the Loop (FITL) . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.9 Microwave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.10 GSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.10.2 Network Elements . . . . . . . . . . . . . . . . . . . 88
4.10.3 Mobile Data . . . . . . . . . . . . . . . . . . . . . . . . 90
4.10.4 Other Mobile Evolutions . . . . . . . . . . . . . . 93
4.11 GSM 1800 / GSM 1900 . . . . . . . . . . . . . . . . . . . . . . . 94
4.12 DECT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
4.13 Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
4.14 UMTS, Third Generation Mobile . . . . . . . . . . . . . . . . . 98
4.15 Satellite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
4.15.1 Geostationary Earth Orbit (GEO) . . . . . . 99
4.15.2 Low Earth Orbit (LEO) . . . . . . . . . . . . . . . . 100
4.15.3 Satellite Frequencies . . . . . . . . . . . . . . . . . 100
4.15.4 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
4.16 Satellite Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
4.17 Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
5 Customer Premises Equipment . . . . . . . . . . . . . . . . . . . . . . 109
5.1 Phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
5.1.1 Analog Telephone . . . . . . . . . . . . . . . . . . . 109
5.1.2 ADSI/CLASS Telephone . . . . . . . . . . . . . . . 110
5.1.3 ISDN Telephone . . . . . . . . . . . . . . . . . . . . . 111
5.1.4 Facsimile, Fax . . . . . . . . . . . . . . . . . . . . . . . 111
5.1.5 Mobile Phone . . . . . . . . . . . . . . . . . . . . . . . 112
5.2 Pager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.3 Private Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
5.3.1 Virtual Private Network . . . . . . . . . . . . . . . 114
5.4 Computer, Computer Network . . . . . . . . . . . . . . . . . . 114
5.4.1 Analog Modem . . . . . . . . . . . . . . . . . . . . . 114
5.4.2 ISDN Modem . . . . . . . . . . . . . . . . . . . . . . . 115
5.4.3 GSM Modem . . . . . . . . . . . . . . . . . . . . . . . 115
5.4.4 Local Area Network . . . . . . . . . . . . . . . . . . 116
5.5 Personal Digital Assistant . . . . . . . . . . . . . . . . . . . . . . . 119
5.6 Network Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
5.7 Screenphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
5.8 Internet Phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
5.9 Web-TV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
6 Network Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
6.1 Supplementary Services . . . . . . . . . . . . . . . . . . . . . . . . 123
6.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 123
6.1.2 Services Overview . . . . . . . . . . . . . . . . . . . 124
6.1.3 Implementation . . . . . . . . . . . . . . . . . . . . . 126
6.2 Centrex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Figures
Figure 1 Text structure maps on 5 aspects of Telecom Networks . . . . . 14
Figure 2 Point to Point network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Figure 3 Star network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Figure 4 Meshed Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Figure 5 Ring Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Figure 6 Backbone Network : example . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Figure 7 Protection Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Figure 8 Self Healing Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Figure 9 Hierarchical Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Figure 10 Hierarchical Networks : example . . . . . . . . . . . . . . . . . . . . . . . 24
Figure 11 example 1 : the first Internet plan . . . . . . . . . . . . . . . . . . . . . . 25
Figure 12 example 2 : todays complex networks . . . . . . . . . . . . . . . . . . . 25
Figure 13 example 3 : Map with European Fiber links . . . . . . . . . . . . . . 26
Figure 14 Basic E1 structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Figure 15 Multiplexing Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Figure 16 Multiplexing Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Figure 17 Coupling PDH and SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Figure 18 Back to Back versus Add-Drop Multiplexer . . . . . . . . . . . . . . 33
Figure 19 Combining WDM and TDM . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Figure 20 Space Switching : 4*5 space-switch . . . . . . . . . . . . . . . . . . . . 37
Figure 21 Time Switching : 4*4 time-switch . . . . . . . . . . . . . . . . . . . . . . 38
Figure 22 Time Space Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Figure 23 Cascading switching elements . . . . . . . . . . . . . . . . . . . . . . . . . 39
Figure 24 Folded View, Reflection Point . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Figure 25 User Information versus Signalling Information . . . . . . . . . . . 41
Figure 26 Hierarchical Structure of the Telephone Network . . . . . . . . . . 42
Figure 27 Hierarchical Structure of the Telephone Network :
Multi-Carrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Figure 28 ATM Cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Figure 29 STM versus ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Figure 30 IP Packet (IPv4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Figure 31 ATM versus IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Figure 32 IP, ATM and SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Figure 33 Separation of Signalling Network and User Data Network . 56
Figure 34 Modular Structure of CCS #7 . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Figure 35 Network evolution with Access Nodes . . . . . . . . . . . . . . . . . . . 61
Figure 36 Network evolution with Access Nodes : view from the sky . . 61
Figure 37 Access to Several Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Figure 38 MultiService Access Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Figure 39 (Unshielded) Twisted Pair, 4 pairs . . . . . . . . . . . . . . . . . . . . . . . 65
Figure 40 Coaxial Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Figure 41 Optical Fiber (8 fibers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Figure 42 Radio : Microwave Dish and other antenna's . . . . . . . . . . . . 68
Figure 43 Analogue Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Tables
Table 1 Voice versus Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Table 2 Plesiochronous Digital Hierarchy . . . . . . . . . . . . . . . . . . . . . . . 29
Table 3 SDH Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Table 4 SDH Multiplex Signals, STMn . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Table 5 PDH versus SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Table 6 Types of Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Table 7 Routing/Connection Table Contents : . . . . . . . . . . . . . . . . . . . 39
Table 8 STM versus ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Table 9 Types of Access Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Table 10 Active/Passive Optical Networks . . . . . . . . . . . . . . . . . . . . . . . . 83
Table 11 Satellite Frequency Bands, a comparison . . . . . . . . . . . . . . . . 101
Table 12 Analogue versus Digital . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Table 13 Connection Oriented versus Connection-Less . . . . . . . . . . . 174
Preface
The purpose of this Telecom Concepts 2000 course is to introduce
you to the basic principles and techniques used in the Telecom
business. As this area is quite large, the introduction goes wide,
rather than deep : all relevant concepts are explained, principles
are generalized, overviews and comparisons are made. For more
details, the course points you, where-ever possible, to additional
more in-depth information.
As the Telecom business undergoes a rapid evolution, not to say a
revolution, this material needs constant updating. If you'd like to
contribute a comment, suggestion or anything else, you are
welcome to send it to : gete@bec.bel.alcatel.be
1 Introduction
Telecom systems provide a service to their users which is all about
transporting information. In the past there were mainly two
distinct types of information :
voice, also called speech
data
As we are heading towards a multi-media communicating world,
the difference between these two types becomes blurred or no
longer relevant. Therefore this text will no longer categorize all
telecom technologies in either the voice-world or the data-world.
Rather this text will try to describe these technologies or principles
in the order in which you would act if you were to build such a
system or network yourself :
a) the Core Network
b) the Access Network
c) the Terminals
d) the Services
e) the Network Management
However, some basic understanding of the specifics and
differences of voice and data communication is important.
Therefore both are introduced here.
Network Management
Services
Terminal Access Core Network
Network
1.1 Voice
The majority of all telecommunication today uses Digital
techniques, and the dominance of digital is so strong that in this
text we will neglect Analog communication almost completely. (For
an explanation, comparison of analog versus digital, refer to
appendix A)
When communicating voice digitally, the soundwaves in the air
must be digitalized. This is done by Sampling the soundwaves :
measuring their shape, and converting this measurement into
numbers. These numbers are a digital form of the voice signal. At
the receiver, the measurement-values (called samples) are used
to reconstruct the original soundwave.
To be able to reconstruct the voice with sufficient quality, the
number of samples taken (called the Sampling-rate) and the
accuracy of each sample (called the Resolution) must be sufficient.
This is a trade-off, because the more samples, the more digital
numbers needs to be transmitted, and this costs money. As a
good compromise for understandable voice, the telecom
community agreed to take 8000 samples per second, each 8 bits
precise. This will not result into perfect audio-quality, but it is
enough to understand the person on the other side of the line.
As you are converting the soundwaves to digital numbers, you
create a continuous stream of information flow : every second
you generate - transport - terminate 8000*8 = 64000 bits. This
Note From this explanation, it is clear why telephone calls are usually
charged as a function of the duration : each second 64000 bits
need to be handled by the telecom system, the longer the call
lasts, the more total bits need to be handled.
1.2 Data
When computers or machines communicate with each other, they
usually don't send a continuous stream of information. Typically a
computer needs some limited input data, then processes this, and
then responds with a limited amount of result data. Therefore
data communication is using the concept of information packets
: a group of information bits. So one computer sends a packet of
input to the other computer, which processes it, and then returns a
packet with the results.
1.3 Comparison
The two above communication mechanisms are fundamentally
different, and it is important to understand this in order to
understand the future evolution of the telecom industry.
Although this is no strict rule, today the majority of voice is
transported using synchronous circuit switching, whereas the
majority of data uses packet switching. (These terms will be
explained in more detail later) Given this simplification, circuit
switching (voice) and packet switching (data), can be compared as
follows :
Note The aspect of transporting voice or data is called the Service : the
function you deliver to the end-user. The aspect of using circuit
or packet switching to accomplish this is called the Transport Mode
or also Bearer Capability. Strictly speaking transport mode and
service are independent of each other : a service can be realized
using different transport modes, and different services can be
realized using the same transport mode.
2 Text Structure
This text is divided into five chapters, and a set of appendices.
See also Figure 1.
Chapte The chapters cover the most important telecom technologies and
concepts in the following order :
the Core Network : this is the part of the network that
provides information transfer at high speeds over long
distances. It is shared by all users of the network. When
comparing with the roads network, the core network maps
onto the Highways. When thinking about the classical
telephone network, the Core Network is the international
telephone network, whereby all telephone exchanges are
interconnected. The Core Network is also called the
BackBone.
the Access Network : this is the part of the network that
allows the user to get him onto the core network. Compare it
to the roads network where you have smaller access roads
between you and the highways. Highways don't pass next to
each house. Most of the access network is only used by a
limited number of users, some of it is dedicated to just a
single user. When thinking of the classical telephone network,
the Access Network would be your telephone connection from
your home to your local exchange.
the Customer Premises Equipment : this is the equipment
which the end user uses. Simple examples are a telephone, a
mobile phone, a computer with modem, a local network of
computers, etc.
the Network Services : when we have a network (by
installing a core network, access network and terminals) this
network can be used for several different functions. As an
example, when you have the classical telephone network, you
can use it (a.o.) to :
make voice communications between two persons
let the network wake you up, by making a call to you at a
specified time.
So different services can be offered, using the same network
infrastructure. In this chapter the services made available to
the end-user are described. The services or features which
are important for the network provider, are described together
with the description of each of the technologies.
Node Node
Active fibre
Spare fibre
Node
Fiber cut
Node Node
Restoration
Node
Backbone Network
Regional
Network 1
Regional
Network 3
Regional
Network 2
Conclus In real life, a network will almost never be as simple as one of the
above basic topologies, but rather consist out of a combination of
them. However, as a conclusion we can see that all networks
consist of Nodes interconnected with Links.
CH 0 CH 1 CH 15 CH 16 CH 17 CH 31
Third Order
Multiplex
Note From one order to the next order multiplex is not exactly an
integer factor, because the PDH system includes a little of
Overhead information in each step :
Third Order
Multiplex
Second Order
Multiplex
First Order
Multiplex
Basic
Signals
PDH Link
SDH Network 1 SDH Network 2
STM-1 = OC-3
STM-16 = OC-48
PDH SDH
Plesiochronous Synchronous
Different Hierarchies One Higher order Hierarchy
Fixed Hierarchy Flexible Hierarchy
Limited management features Extended management features
Stuffing Bits -> complicated Very limited bit-stuffing ->
multiplexing simpler
No pointers to frame-bound Pointers to frame-boundary
ary -> back-to-back multi -> Add-Drop multiplexing
plexers
Alcatel
Product
& http://www.alcatel.com/products
Lin search in categories SDH", Sonet", Backbone Service
Provider"
Alcatel
Product
& WDM Products : http://www.alcatel.com/products
Lin ITU-T Standards : G.692
Flash animation explaining DWDM
http://www.alcatel.com/telecom/snd/keytech/wdm/index.htm
The bandwidth carried by a WDM signal is the product of the
number of lambdas and the bandwidth of each lambda signal. As
such, the WDM signal can increase its capactity in two ways :
increasing the number of lambdas, and increasing the bitrate of
each member-signal. This results in an even faster increase of
bandwidth capacity. In the next figure, each a*b bps refers to a
lambdas, each at b bps.
Fiber
Capacity
[Gbps]
1 2.5 Gbps
565 Mbps
3.2.4 Media
Different media can be used for the high-speed
interconnection-links :
Fiber
Coaxial Cable
Radio
Laser-light
The most common deployed medium today is fiber, more precisely
glass-fiber, because of its relative low cost, resistance to
interference and huge bandwidth capacity. Fiber technology is
rapidly evolving. Fibers with smaller losses, smaller dispersion,
better handling, etc. are being developed.
Under certain circumstances, other media may be preferred :
Radio : with radio, the bandwidth is more limited (eg. STM1
or 155 Mbps) but you don't have to route kilometers of fiber :
just raise a tower, for example every 50 km.
when you want very rapid deployment (days),
want to have a network for only a limited time
when the terrain is very hostile (mountains, rivers, etc)
when the terrain is not free accessible (roads, buildings,
land-owners)
Coax : Coaxial Cable has also less bandwidth potential than
fiber, but can be deployed for :
short distances, 100m or less
at the border of the network, lower bandwidths could be
required, yielding coax as economically preferred.
Laser : a beam of Laser-light can be focused over long
distances, through the air. It can be used for interconnection
over short distances only, but can be deployed as fast as
radio. Furthermore Laser is not susceptible to interference,
but requires line-of-sight.
These media are described in more detail in chapter 4.2.
3.2.5 Repeaters
When signals are sent over fibers or coax for long distances, the
signals attenuate and must be re-amplified. This function is
called a repeater. Nothing happens to the flow of information,
and to the network topology the repeaters are not important.
With today's fibers, a distances-span of a few hundred kilometers
can be realized without repeaters. For long haul links, the
repeaters are needed and form a part of the network
infrastructure cost.
Space
Switching In Space switching, a number of physically distributed inputs are
connected to a number of physically distributed outputs by the
means of Switches. (hence the origin of the name 'switching').
When there are m inputs and n outputs, you need m*n switches.
Typically each user has an input and an output, and then m=n
and equals the number of users. To make a bidirectional
connection, usually two switches need to be closed.
Space Switch
Space switches are limited by the physical density of the input and
output ports.
Switching
Time Time switching occurs in the dimension of time : the individual
users are all on the same physical medium, but multiplexed in
time. Typically the Time Division Multiplex (TDM) structure consists
of a number of channels, occurring in a cyclic pattern. In many
telecom systems this pattern repeats at 8000 times per second.
When doing time switching, information received on one
particular time-slot or channel is sent out on another time-slot
/ channel.
Time
Switch
In Out
In CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4
Out CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4
Time
Space
Switching Both mechanisms described above are usually combined in order
to maximize the density in both physical and frequency domain.
As an example, the A1000 S12 switch element uses 16*16 Space
switching, combined with 32 channels TDM signals in order to
build a 512*512 channels switch element.
Any time-slot/channel (of 32) from any port (of 16) can be
switched to any other time-slot/port.
In Out
PORT CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4 PORT
1 1
Time-Space
PORT
Switch PORT
CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4
2 2
PORT CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4 PORT
3 3
PORT CH 1 CH 2 CH 3 CH 4 CH 1 CH 2 CH 3 CH 4 PORT
4 4
Switching
Stages Even with a combination of Space- and Time-switching, a single
switching element cannot handle all ports from a large exchange.
The solution to this is to interconnect several switching elements in
a cascade. These are called Switching Stages. In figure 23, it is
shown how a 4*4 switching element can be made, using four 2*2
switch elements. In order to set up a connection from input to
output, a connection in 2 switch elements must be made. For
even bigger capacities, the concept can be applied recursively, the
'new' 4*4 element can be combined to form (eg.) a 16*16
element. As such by increasing the number of stages, an arbitrary
large switch can be built, of course at the cost of more and more
'basic' switch elements.
2*2 2*2
Switch Switch
Element Element
2*2 2*2
Switch Switch
Element Element
Poin Because in most systems Inputs and Outputs are paired, the
Reflection
system is represented symmetrical in a so-called Folded view.
The folding line of such a folded system is called the Reflection
Point : information travels into the switch up to the reflection point,
and then travels back out to the destination output.
4*4
Switch
Element
4*4
Switch
4*4 Element
Switch
Element
4*4
Switch
Element
4*4
Reflection Point
Switch
4*4 Element
Switch
Element
International
International
Gateway
Tandem
Transit - Toll
Local
Note In the US, the names Transit, toll and Tandem are used in a less
strict and interexchangeable way.
Tandem
InterExchange
Carrier
Local
Connection
Oriented Some packet switches still need the user to set up a connection
using signalling, so that the packet switches in the network know
how to send the packet to the destination. They are called
Connection Oriented Packet Switches. Before sending the first real
packet of information, the user must first send some signalling
packets to set up a connection, then send his user payload and
afterwards release the connection.
Pack
ets Frame There exist different terms to name the information packets :
versus
Cells, eg. ATM Cells
Frames, eg. Frame Relay
Packets, eg. IP Packets, X.25 Packet
These names reflect a difference in how much processing is
needed to handle the packet in the packet switch, versus how
much is done in the end terminals :
Cells : only require a minimum of processing in the nodes.
Cells also have fixed lengths.
Frames : medium processing in the nodes
Packets : intensive processing in the nodes : error correction,
retransmission, flow control, resequencing...
In the early days of computer communication, the links had poor
quality, and the end terminals were very expensive (main frame
computers), in which case Packet switching was the best solution.
today, the network is of much better quality, and the end terminals
are cheaper (PCs), so Cell switching achieves the same results,
while being simpler, cheaper and faster.
X.25
X.25 is the name of an International Telecommunication
Union (ITU) standard describing a packet switching system.
The X.25 system offers :
Error-Free delivery of data packets to the destination
Delivery of data packets without loss.
In-sequence delivery of data packets.
Flow-Control Procedures
Bit-rates up to 64 Kbit/sec.
Packets up to 4096 bytes, however, typical packets will be 128
bytes. (each network specifies the maximum supported packet
length)
The packet switching protocol is connection-oriented.
X-25 is a mature technology. The X.25-related protocols are
among the most used packet protocols and offer worldwide
interconnectivity.
Chargi The provider of a network requires that you pay for the usage of
his network infrastructure. This is called Charging. For different
types of networks, there are different ways of charging developed.
For example, for the telephone network, you will have to pay as a
function of :
duration of the call
distance between originator and receiver
However for packet switched networks, this is not the best way to
charge : because of the 'packet' nature of the information, you
may be connected for several hours, only exchanging packets
Note In fact, the X-25 protocol describes the interface between the user
and the network, the so-called User-to-Network Interface
(UNI). In addition, the X.75 protocol has been defined for
communication on the Network-to-Network Interface (NNI).
Frame Relay
As the quality of the network improved, it became a burden to do
all the error checking, retransmitting, etc. in each node, as there
was hardly any error in the network. A first simplification led to
Frame Relay (FR). In fact, no more processing is performed
anymore, on the packet level, which explains the name Frame
Relay.
Frame Relay was originally designed in1981 as a NB ISDN packet
mode bearer service, but the main driving force was the demand
for the interconnection of Local Area Networks. Although the
functionality of the FR network, and consequently its services, is
more limited than in a packet switching network, this is more than
compensated for by the higher bit rates.
The most important aspect of the reduced functionality of FR is the
lack of error correction. Error detection is performed and
erroneous frames are discarded, with the result that not all the
information is delivered to the destination.
Thus, what the FR network offers is :
In-sequence delivery of data frames.
Higher Throughput
Lower Delay
bit rates of 45 Mbps (US) or 2 Mbps (Europe).
The Frame Relay protocol is connection-oriented.
5 Bytes 48 Bytes
HEC
CLP
VCI
VPI
PTI
Header User Payload
Figure 28 ATM Cell
Idle cells
Weaknes Despite the strengths of ATM technology, today it is not yet very
widespread, and is is seriously threatened by a competing
technology : IP. The limited success of ATM is probably due to
several factors, (technical and non-technical) but here are some
of the difficulties with ATM :
Connection Oriented nature makes it quite complex for the
terminal : he has to talk a complex signalling language
dialogue to setup a connection.
ATM switching itself is quite simple, but additional functions
on top of that are quite complex : resource management,
operations and mainenance, adaptation layers, flow
control,...
Figure 29 shows a comparison between ATM and 'traditional'
circuit switching or Synchronous Transfer Mode (STM).
STM ATM
Reservation of Physical chan Reservation of Virtual channels
nels
Fixed number of channels Variable number of channels
Fixed bitrate of channels Variable bitrate of channels
Large granularity of bitrates Small granularity of bitrates
Resources are permanently re Resources only used if some
served, even if nothing is trans thing is really transmitted
mitted
Overhead 1/27 (STM-1) Overhead 5/53 (ATM Cell)
Alcatel
Product
& http://www.alcatel.com/products
Lin
IP
IP means Internet Protocol. IP is very popular because many
popular applications use it : email, WWW-browser, ftp,
Newsgroups.
IP is a form of connection-less packet switching. IP packets are
variable in size. An IPv4 (version 4) header is 20 bytes, the IPv4
payload can vary between 0 and 65535 bytes. Typical packet
sizes are 576 or 1500 bytes.
Note today, IP version 4 is the most common used IP. However, a future
version of the IP protocol is being standardized, the so-called
IPv6, or 128-bit IP : An IPv6 (version 6) header is 40 bytes, the
IPv6 payload can vary between 0 and 65535 bytes.
ATM versus IP
ATM and IP are to some extent overlapping (and as such
competing) technologies, as well as complementary. A lot of
research is going on which technology is the best answer to our
current and future needs.
ATM and IP originate from a different Business : ATM from
Telecom, IP from computer networks. Both these businesses have
their own history, legacy and practices.
IP is currently very successful, and extremely fast-growing. There
is a lot of support for it, thanks to the (relatively) simple and
proven protocol stack. 20 years of legacy do not seem to burden
new innovations, and the Internet Engineering Task Force (IETF)
standardization body seems to work decent, steadily and
efficiently.
ATM has been developed as a Broadband Multimedia technology
from scratch. This way it is not at all compromised by backward
compatibility to legacy systems. On the other hand, the
complexity (and cost) of many aspects of this new technology were
under-estimated : policing, call acceptance control, OAM, ...
Slow Take-Up
High cost of
Ownership
Applications
1. 2. 3. 4.
IP
ATM
SDH
Conclus Today, telecom observers estimate that the future could be 80% IP
and 20% ATM. Most applications will use the IP protocol. Inside
the network, traffic can be optimized by using (a subset of) ATM :
semi-permanent connections between subnetworks and routers.
3.3.5 Signalling
Signalling can be categorized in two types : Signalling inside the
network, and signalling between the user and the network.
The signalling between user equipment and the network is called
User to Network Interface (UNI) signalling. The signalling inside
the network, i.e. between 2 exchanges is called the Network to
Network Interface (NNI) signalling. Different protocols are
defined because of a number of reasons :
Different addressing identification for channels, because of
higher degree of multiplexing for the NNI.
NNI signalling is protected, versus UNI is not protected.
NNI signalling is multi-service, versus UNI is single-service.
Historical reasons
The older signalling systems can only communicate a limited
number of events, states and digits. The newer signalling systems
are very flexible, because they use messages (packets of
information) between the network elements.
A sequence of these messages is called a Scenario. See appendix
L for a simple, typical call setup/release scenario.
Signalling Network
Application Layers
Intelligent
Mobile Network (MRVT)
Application Application (SRVT)
Part (MAP) Part (INAP)
B-ISDN Telephone ISDN User Base OSI
User Part User Part Part (ISUP) Station
(B-ISUP) (TUP) Subsystem
Application
Part Transaction Capabilities
(BSSAP) ApplicationPart (TCAP)
Transport Layers
Message Par The Message Transfer Part (MTP) is capable of sending messages
Transfer
over the network. Error Correction and Flow Control functions are
provided to ensure reliable information transfer.
MTPRouti MTP Routing Verification Test (MRVT): procedures to test that data
Tes in the MTP routing tables is consistent.
Verificati
Routi SCCP Routing Verification Test (SRVT): various procedures to verify
SCCP
Tes the routing functions performed by the SCCP.
Verificati
On top of the SCCP connection oriented an OSI stack can run.
Typically this is required for Operations and Maintenance and in
the TMN (Telecommunications Management Network).
Application The Mobile Application Part (MAP) is used to exchange call state
Mobile
Par information not only between Mobile Switching Centers (MSC), but
also between a Mobile Switching Center and its associated Visitor
Location Register and Home Location Register.
Base Subsystem The Base Station Subsystem Application Part (BSSAP) is used for
Station
Par signalling between the Base Station Subsystem and the Mobile
Applicatio
Switching Center.
4 Access Networks
4.1 Objectives
the
Last
Mile Access networks are to solve the so-called Problem of the Last
Mile". The Access network must bridge the distance between the
user (at home, at work, on the move, etc.) and the core network.
The main difference between core network and access network is
that the access part of the network, is used only for a single (or
small number of) subscriber, where the core network is shared by
thousands of subscribers. This makes the Access Network much
more cost-sensitive. It is for example still too expensive to bring
optical fiber to all homes directly.
Note Other names for Access Network are : subscriber loop, local loop,
subscriber line.
User
Density An important factor when dimensioning an access network, is the
physical distribution of the users in space. Density can be high,
low, users can be clustered or evenly spread. Following is a list of
'design-parameters' for deploying an access network :
operator's existing infrastructure,
service(s) to be provided,
traffic requirements,
estimated growth and new services,
user density,
user clustering,
accessibility of the terrain,
Network
Structure The Access Node is an additional network element in the network
hierarchy. (see Figure 35) On the other hand, network builders
want to simplify the networks, to reduce the operation cost. The
Access Node can achieve this because it reduces the number of
Local exchanges. This results in a trend where networks evolve
from a large number of small locals, to a small number of large
locals, using access nodes to collect the users. An Access Node is
smaller and simpler than an Exchange. It requires less
maintenance.
to Transit Level
100 Local
10 Local
Exchanges,
Exchanges,
2.000
20.000
subscribers
Subscribers
Access
Nodes
Users
Figure 35 Network evolution with Access Nodes
10 5
10
5
20
20 5
20
3
5
10
Transit Level
Voice Network
Provider 1 Voice Network Data Network
Provider 2 Provider 1
Access
Nodes
Users
Figure 37 Access to Several Networks
Local
Loop
Unbundling One step further in the liberalization process, is to give new
service providers, (high-speed internet providers) direct access to
the subscribers local loop. This is referred to as unbundling of the
local loop.
Multise Further, a unique Access Node can provide all the services from
the different networks to the different users at their offices and at
their homes. This is the multiservice aspect. Integration of a
flexible mix of NB and BB services on a single platform : POTS,
ISDN, Data, Leased Lines, BB.
TV
Mixed subscriber
Business
subscriber
Telephony Access
Network : Residential
subscriber
Star,
Ring,
MultiService
Internet Tree,
Access Node
Mixed
Other...
Alcatel
Product
& http://www.alcatel.com/products. Search in 'Competitive Access
Lin Providers'
4.2 Media
In the access networks, a multitude of different media are used.
On one hand because there is existing infrastructure from the
past, on the other hand because new services install additional
new media. Most access networks use a Combination of :
twisted pair
coaxial cable
optical glass-fiber and plastic fiber
radio
The Combination of media results from the fact that the two
segments are very different, and thus optimized differently :
the part between the user and the Access Node, also called
the Tail.
the part between the Access Node and the Core Network.
Pai Twisted pair is the oldest and cheapest medium. Originally used
Twisted
for telephone lines, it was reused for data-networks, and XDSL
technologies create an extra life-cycle for Twisted Pair. The pair is
twisted, in order to reduce the interference with the environment.
Usually more than one pair is combined into a single cable : from
2 to hundreds of pairs. Twisted pair comes in an Unshielded and
Shielded variant. For the latter, the whole bunch of pairs, (or each
pair individually) is additionally shielded from interference with a
metal cover. Th unshielded variant is called Unshielded Twisted
Pair (UTP), sometimes with an additional number indicating the
type of wire used. Example UTP-5 is a common type of twisted
pair wire used for local area networks.
The advantage of Twisted Pair is that it is cheap, and most of all,
that it is already installed to all of our houses. Re-using the
existing Twisted Pair infrastructure, as XDSL does, avoids the cost
of routing new media to the subscriber.
Typical throughputs of twisted pair are in the range 100 kbps
(ISDN) to 100 Mbps (Ethernet).
Coaxial
Cable Coaxial Cable (nicknamed Coax) is a single wire, protected from
interference and signal loss by a metal cover. This allows higher
frequency signals to be transported compared to twisted pair.
Coax is more expensive than Twisted pair, but allows more
bandwidth as well. As with Twisted Pair, many Coax is already
installed, and can be re-used, avoiding installation costs. For
example the Cable-TV network, brings a Coax to most of the
homes in cities.
Typical throughputs of coaxial cable are in the range 10 Mbps
(Ethernet) to 1 Gbps (digital TV broadcast).
Optical
Fiber Optical fiber has many advantages as a signal carrier (for that
reason it is widely deployed in core networks) :
very high bandwidth capability. (Terabits/s or more)
resistant to interference, noise, crosstalk, etc.
it is made from cheap materials (sand), although the handling
is more expensive.
Fiber is also an interesting medium for the network builder
because its bandwidth is currently only limited by the Terminations.
This means that a given Fiber carries today (eg.) 2.5 Gbps,
because the Laser-transmitter, and receiver-diode are limited to
this speed. The Fiber actually allows much more than 2.5 Gbps.
As soon as better transmitters/receivers are developed, the
Note The D channel of Basic Rate Access and Primary Rate Access are
different in bandwidth (16 resp. 64 kbps). This bandwidth is
somewhat proportional to the amount of user channels (B) that
have to be controlled, and is found to be sufficient in both access
types.
Analogue Line
Analog
Telephone
Local
Exchange
S-Bus
ISDN Digital
Telephone(s)
U Interface
ISDN
NT
Local
Exchange
ISDN Fax
Analog Terminal
Telephone Adapter
Local
Exchange
ISDN
Private Local
Exchange Exchange
ISDN
Features Using ISDN as Access has the following advantages :
Multi-Service : voice, data, fax, ...
On/Dynamic With the above features, ISDN can be well employed as an Access
Always
ISD for voice and data. In the so-called Always-On / Dynamic
ISDN (AOD ISDN) the user is connected fulltime using only the 16
Kbps D-channel. This is sufficient for low-bitrate data-services,
such as email, chat, etc. When you need more bandwidth (for a
data-transfer, or for a voice call) one or more B-channels are
opened. Using the fast signalling possibilities of the D-channels,
this can happen very fast. This is an efficient way of using the
ISDN network, and with the right charging strategy could become
an interesting way to provide internet access.
Alcatel
Product
& http://www.alcatel.com/products search in ISDN
Lin ISDN : http://www.alumni.caltech.edu/~dank/isdn/
V5. More and more, operators demand standard products with open
interfaces One of the most successful products of this open
standard type is the V5.x access node. There are two types :
V5.1 : multiplexed non-concentrated. 30 subscribers on a 2
Mbps access.
V5.2 : concentrated, multiplexed : typically 200 subscribers
on a 2 Mbps access.
POT ADSL
S
ban
d
Upstream Downstream
800 kbps 8 Mbps
Frequency
[Hz]
POTS sub-bands
Quality, Throughput [bps]
band
Frequency
[Hz]
Computer Internet
Router
ADSL ADSL
Modem Modem
(NT) (LT)
Telephone Network
(PSTN)
Telephone Local
Exchange
Adaptive
ADSL A future evolution will be Adaptive ADSL. In the current system,
the capabilities of the twisted pair are measured once, before
taking the ADSL-line into service. This is called Automatic Rate
Adaptive at Startup. Should the capacity of the line change
drastically after it is put into service, the ADSL Modem will restart
and then adapt to the new line conditions. This will result in a 15
seconds outage.
Further improvement is possible, when these measurements are
done continuously, resulting in the maximum capacity of the line
at that time to be made available. This is called Automatic Rate
Adaptive at On-Line. An additional complexity is that is requires
applications aware of flow-control : the applications must adapt
to the bandwidth which is available.
Todays ADSL modems are Rate Adaptive at Startup, not yet Rate
Adaptive On-Line. However, each time the modem starts up, he
reserves a small amount of spare capacity. This margin can be
used to adapt to small changes in the line conditions. This
technique is called Bit Swapping.
ADSL
onISDN First generations ADSL provide a large bandwidth on top of a
standard Analog Line Access. New developments have extended
this to ADSL on ISDN Basic Rate Access.
ADSL on ISDN Access is very similar to ADSL on analog lines.
However, since IDSN uses more bandwidth for the Telephony, less
bandwidth is available for the ADSL-part. This results in a 15%
lower throughput for the ADSL data.
ADSL
Lite The throughput of ADSL is directly determined by the 'quality' of
the twisted pair. For this reason, ADSL positions the Splitter and
ADSL NT where your telephone line enters your house. This
however required then that you build two networks in your house :
a telephone network (POTS) and a data-network (for example,
Ethernet). sometimes it would be convenient to have just the
telephone network, and tap the ADSL data at any position where
you have a telephone. This is possible with ADSL Lite : the Splitter
and ADSL NT are placed at the telephone plug, not where the line
enters your house. One drawback however, is that the
data-capacity of the ADSL Lite is substantially lower, 1 Mbps or
lower.
ADSL Lite will be available in Distributed Splitter technology, and
even Splitter-less technology
Bandwidth
15 Mbps VDSL
6 Mbps ADSL
HDSL
2 Mbps
500 m 5.6 Km 10 Km
ADSL
Access
Node The ADSL system covers the physical layer. But on top of this, a
protocol stack is needed, as the one described in Figure 32. The
Alcatel solution transports the application information over the
ADSL using ATM-cells. Because most (PC) applications connect
to an IP protocol stack, there is IP on ATM.
Applications
IP
ATM
Coupling this ADSL access to the core network is done at the ATM
level. This ATM-network is then coupled to the Internet or other
core networks. As long as communications stay on the
ATM-based part of the core network, very-high speed and high
quality is guaranteed. Through time this ATM-part can grow
gradually.
ATM
ATM Core
Network
ADSL ADSL
Client Modem Modem Server
(NT) (LT)
Server
Alcatel
Product
& http://www.alcatel.com/products Search on ADLS
Lin The ADSL Forum : http://www.adsl.com/
http://www.xdsl.com/services/analyses/trox/
Coax Cell
Downstream
Set top Box return
Cable Telephony
Supervision
f [MHz]
5 8 10 17 26
Digital Video
Data, eg. Internet
Cable Telephony
FM Radio
Services
Upstream
Alcatel
Product
& http://www.alcatel.com/products Search in HFC
Lin
FTTC
FTTB
FTTH
Advantages Disadvantages
Active More flexible in Band Expensive optical compo
Optical width management nents in splitter
Network
Passive Splitter is simple, passive More complex security :
Optical 'device' all information is Broad
Network casted to all users
Upstream access uses a
shared medium : requires
access mechanism
Developments
New Passive optical networks serving up to 2000 connected users over
a range up to 100 km are currently being studied. They are
referred to as SUPERPONs.
4.9 Microwave
In some areas, the cost of burying cable or fiber is very high. This
due to environmental factors (mountains, rivers, ...) or legal (land
is owned by competitors, etc.) In such case, wireless access can
provide an economical alternative.
PointPoin To bridge the distance between the backbone network and the
to
cluster of users, a point to point microwave link can be used.
They could be PDH, or STM-1 SDH, or also sub-rate SDH.
Sub-rate SDH is a new development for SDH standards with
lower bitrates, but also at lower costs. They can provide
economical solutions to the 'problem of the last mile'. Examples
are STM-0 (1 VC3, 34 Mbps), sSTM-2n (1 or more VC2, 6
Mbps), sSTM1k (1 or more VC12/VC11, 2 Mbps).
Hub
Hub
Hub
Wired
vs. Tai The last part of the access can be either wired or wireless . In
Wireless
case users are sufficiently dense clustered, the Tail can be twisted
pair, coax, ADSL, etc. In case of sparse user distribution, and/or
problems to deploy wires, the tail can also be a radio technology,
eg. GSM or DECT, or an older analog mobile standard.
An example of 'Point to Point Microwave' with 'Wireless Tail' is the
implementation for GSM base-stations along the French
Autoroutes : due to the (mostly) deserted area, the base-stations
4.10 GSM
4.10.1 Introduction
Today's most popular standard for Mobile Access is Global System
for Mobile Communications (GSM) (during its development,
however, the abbreviation GSM meant 'Groupe Speciale Mobile')
A mobile network with public access is called the Public Lands
Mobile Network (PLMN). This is in contrast to private mobile
networks, used by Police, Transportation companies, etc.
Cellu GSM is a Cellular system : this means that the whole area to be
covered, is subdivided into a number of cells. Each cell has
installed an antenna and services a certain (limited) number of
users. The smaller the cells, the lower the power needed to
transmit signals through the air. This is important for portable
mbile communication. Also, the smaller the cell, the higher the
user density, so typically cells in the city center are smaller than
cells in a rural area. For GSM the cell size radius varies from
300m to 35 km.
The cells are typically represented as hexagonal, but this is only
because hexagons are simple shapes that connect nice together to
cover a certain area. In real life, the cell boundary is determined
by the area where the antenna signal from the cell equals that of
the adjacent cells. Due to the actual terrain conditions, cells may
have quite irregular shapes.
Users can walk around freely from one cell to another. Even when
not communicating, the GSM set stays in contact with the
Base-station, and constantly looks for the nearest (strongest
signal) base-station. As such also the network knows where the
user currently is.
Handov Users can walk around freely from one cell to another, during a
communication. This requires the system to Hand Over the call
with all its resources from one cell to the other. This feature is
called Handover. Handover is sometimes also called seamless
handover, stressing the fact that calls will not be interrupted when
moving from cell to cell. Today mobile networks do not allow
International Handover : moving between cells from different
networks
Roamin When you move from a cell owned by one network provider to a
cell owned by another provider, this is called Roaming. It is then
necessary that these providers have a mutual Roaming Agreement.
One of the aspects of the agreement is how the charging/billing
between both providers will be settled.
In the past, most roaming was International Roaming, ie. from a
network in one country, to another network in another country.
Recently however, also National Roaming has been deployed :
roaming between networks in the same country. This can
particularly useful for new operators : they can focus on providing
network capacity in high density areas (cities, highways), and still
offer full national coverage to their customers, through a roaming
agreement with an existing operator.
Specific
Multiplex : combination of Frequency- and
Time-multiplexing.
Frequency band : 890 - 915 MHz Uplink, 935 - 960 MHz
Downlink
Carrier spacing : 200 kHz (a 'Carrier' the main radio-signal
which is modulated. Here is refers to a part of the 25 MHz
band.)
Number of carriers : 124. uplink and downlink channel are
in bands 45 MHz apart.
Timeslots : 8 timeslots
User speech is encoded as 13 kbps (rather than 64 kbps),
using more advanced compression techniques. Using 13
kbps instead of 64 kbps, allows more simultaneous calls
through the same frequency band.
When using GSM for data connections, the bitrate is 9.6 kbps
or 12 kbps.
Frequency
[MHz]
960 Downstream Band
935
Upstream Band
915
Frame
890
Time
Timeslots : 8 124 sub-bands, each 200 KHz
wide
Figure 59 GSM Frequency/TDM Structure
Frequency
Planning If all cells would use all possible frequencies at the same time, this
would lead to interference problems at the boundaries of the cells.
In order to avoid this, it is not allowed to use the same frequency
in adjacent cells. So when deploying a GSM network, some
Frequency Planning must be done. This is sometimes also called
Frequency Re-Use, a little misleading because it actually means
frequencies cannot be re-used in adjacent cells. In cells far
enough apart, frequencies can be the same, since the signal from
the far away cell is sufficiently attenuated, not to cause
interference problems.
When network providers work in parallel in the same area, they
must divide the available frequencies among each other. For
example in Belgium, both mobile network providers Proximus and
Mobistar each are assigned 60 of the 124 frequency sub-bands.
Note It is a european law, that the 900 MHz GSM must be assigned to
at least 2 independent operators.
Base
Transce The Base Transceiver Station (BTS) contains the antenna's,
Stat transmitters and receivers. Its coverage area defines the cell.
Base
Station
Controller Base Station Controller (BSC)controls a group of Base Transceiver
Stations for power control, handover, etc.
Transco The Transcoder (TC) building block adapts the bitrates between
the Base Station and then Network Subsystem :
13 kbps - 64 kbps for voice
rate adaptation for data : 12 kbps - 64 kbps
Home
Location The Home Location Register (HLR) contains information about
Regis subscribers which 'home' is in this part of the network.
Visitors
Location The Visitors Location Register (VLR) holds information relating to
Regis subscribers visiting this part of the network.
This way the subscribers profile information is stored in two parts :
one part is always stored in the 'home' part of the network : the
network where you are subscribed to a provider. The other part is
stored moves along the network as you move around, and is
stored in the Visitors Location Register of the visited network.
Equipment
Identity The Equipment Identity Register (EIR) stores information about
Regis mobile stations in use and can bar calls from a mobile station if it
is stolen, not type-approved or has faults that can disturb the
network.
to Transit Level
Network Subsystem
Authentication Centre
Equipment Identity
Mobile Switching Register
Centre
Home Location Register
Transcoder
Alcatel
Products
and GSM Products : http://www.alcatel.com/products Search on GSM
Lin http://www.proximus.be
http://www.mobistar.be/nl/M/network.html
http://www.gsmworld.com/gsminfo/gsminfo.htm
Short
Message
Service This system allows to send small text-based messages between
mobile telephones. It is possible to connect the system to ther
networks, using a Gateway, for example to send messages from
the Internet to mobile telephones. The service is explained in
more detail in section 6.5. Figure 61 shows the additional
network elements needed.
Alcatel
Products
and GSM Products : http://www.alcatel.com/products Search on GSM
Lin some websites allow you to send SMS from the web-page to
a mobile user : http://www.netbel.be/site/uk/sms/index.asp
Note the Short Message Service - Centre often has also a connection
to the Voice Mail System, so that a mobile user can be informed of
a received voice mail, via an SMS message.
to Transit Level
Network Subsystem
IP Network
Short Message System
Centre (SMS-C)
Wireless
Access The purpose of the Wireless Access Protocol is to provide access
Proto from mobile phones to data networks, mainly the Internet. WAP
requires some additional network elements (see figure 62) as well
as some extra software in the mobile phone, the so-called WAP
protocol stack.
to Transit Level
Network Subsystem other
Internet
Services
Mobile Switching
Centre
Internet
WAP Gateway
WAP Service
General
Pack
Radio
et General Packet Radio System. Once the Mobile user has a
Syst Gateway to the Internet, he can start using more and more
services. This will soon reveal the bandwidth bottleneck that SMS
and circuit switched connections have. A solution to this is
General Packet Radio System : it adds to the Mobile network, a
packet switched data-communication. A GPRS-aware mobile
phone, allows to combine up to 8 timeslots (see figure 59) of each
maximum 22.8 kbps to provide a maximum of approx. 160 kbps.
Alcatel
Product
& http://www.alcatel.com/products Search on GPRS
Lin http://www.gprsworld.com
http://www.ericsson.se/gprs
to Transit Level
Network Subsystem
Mobile Switching
Centre
Mobile Finally the third generation mobile system will bring broadband
Universal
Telecommunic mobile access, as well as a whole architecture focused on services.
Syst More info on UMTS can be found in section 4.14, however, the
standards are not yet completely finalized, and different vendors
Note In the early days of its design, the GSM1800/1900 system was
also known as DCS 1800 / DCS 1900 : Digital Cellular
System (DCS), and also as PCN 1900
Alcatel
Product
& GSM Products : http://www.alcatel.com/products
Lin CDMA Products : http://www.alcatel.com/products
http://www.be.orange.net/kpn.html
http://www.uk.orange.net/index.html
http://www.proximus.be
http://www.mobistar.be
4.12 DECT
The Digital Enhanced Cordless Telecommunication (DECT) system
specifies a wireless access system for local environments to access
wide area network services, such as the PSTN, ISDN and mobile
networks. It consists of a communication protocol and an air
interface standard.
Typical applications are:
Private Exchanges with wireless handsets,
Residential systems,
Wireless Local Area Networks,
wireless access to public telecom networks, also called
Cordless Telephone Mobility (CTM)
Features of DECT systems are :
Specific
Multiplex : combination of Frequency- and
Time-multiplexing.
Frequency band : 1880 - 1900 MHz
Carrier spacing : 1.728 MHz
Number of carriers : 10
Timeslots : 24 timeslots, each timeslot unidirectional,
Frequency
[MHz] Base Station Transmits Terminal Station Transmits
Downstream Link Upstream Link
1900
Frame
1880
Time
Timeslots : 2 * 12 Sub-band :
1.728 MHz wide
Figure 64 DECT Frequency/TDM Structure
4.13 Bluetooth
Bluetooth is the codename for a technology specification for small
form factor, low-cost, short range radio links between mobile
PCs, mobile phones and other portable devices. The Bluetooth
Special Interest Group is an industry group consisting of leaders in
the telecommunications and computing industries that are driving
development of the technology and bringing it to market.
4.15 Satellite
The main problem that remains with the above mobile networks,
is the coverage : only at places with sufficient (potential) users it is
economically worthwhile to place base stations. Unpopulated
areas like desert, forests, at sea, etc. will not be covered.
Using satellites, a network can be built that really covers the whole
earth.
4.15.4 Systems
Below four concrete systems are briefly described. The past years,
many plans for global satellite systems have been proposed.
However, the first of these 'satellite constellation' systems, Irirdium,
has brought the telecom world back to reality due to its many
startup problems :
a number of technical problems with the voice quality,
satellite telephony seems to be too expensive, Iridium is not
realizing the forecasted number of subscribers
the market for satellite telephony is becoming smaller due to
the faster growth of Public Lands Mobile Networks : the areas
not covered by GSM (and similar) systems is smaller than
expected.
For two of these systems, Alcatel participates : SkyBridge and
GlobalStar.
Internet
PSTN
Dial-up
orPermane your computer or computer-network is full-time connected.
This is the case for universities, medium to large companies,
government organizations, etc.. This is also called
Always-On".
Network
Structure In general, the Internet Access network, consists of the following
parts (see Figure 72) :
a public access network : this can be the PSTN, your
Cable-TV, GSM, ADSL, LMDS, etc... This is provided by a
Telecom provider, Cable-TV provider, etc.
a Point of Presence (POP) : this is the other end of the
connection over the public access network. For example, you
call via the modem of your computer, over the PSTN to a
modem in the Point of Presence. The part behind the POP is
normally invisible to the end user.
an access provider network. Usually there is no straight
connection from the Point of Presence to the Internet
Backbone : the provider will combine several POPs via a
provider network, and connect them to the backbone via one
or more internet Service providers.
the provider offering the Point of Presence and the
(intermediate) access provider network, is called an Internet
Access Provider (IAP).
The internet access provider network is connected to the
internet backbone through an Internet Service Provider (ISP).
This consists of 3 elements :
an (intermediate) internet service provider network,
a number of servers providing Internet Services, such as
email, newsgroups, web-pages, ...
a gateway : a device coupling the internet service
provider network to the Backbone. The gateway typically
provides router functions, together with other functions,
eg. a firewall.
client
Point of
GateWay Presence
(POP)
Internet Service
Provider Services
5.1 Phone
and the faster the pages can be sent. Following are common
types :
Group III : speeds up to 9600 bits per second, resulting in 10
o 15 seconds per page throughput.
Group IV : uses an ISDN B-channel : 64 kbps, and less than
5 seconds per page.
When you have the three building blocks for a fax (scanner,
printer, modem) you are able to perform the functions of Printer,
Scanner ,Copier, Modem and Fax. Recently such 5 in 1 office
machines have been introduced on the market.
Note Using mobile phones while driving a car is dangerous, even when
using a handsfree set : because the drivers concentration is not
100% dedicated to driving, studies show that the risk of accidents
increases by a factor 4. In some countries, using mobile phones
while driving a car is forbidden.
Dual
Band As explained in chapter 4.10 and 4.11, GSM networks use
different frequency bands : 900 MHz, 1800 MHz, and 1900 MHz.
When travelling with your (eg.) 1800 MHz band GSM to a country
that has only 900 MHz mobile networks, your phone will not
work. This clearly limits your mobility. Therefore Dual Band or
Dual
Mode One step further than Dual Band is Dual Mode. This is a phone
combining different technologies, for example DECT and GSM :
when you are in your office, within the coverage of your DECT
private mobile network, the phone uses the private network. when
you are out of the office, (out of the coverage of the private
network) the phone switches to GSM, using the public network.
Another example is GSM / Satellite : when leaving the coverage of
the GSM network, you can fall back on the worldwide coverage of
a satellite network, being more expensive however.
Dual Mode phones are even more complex than dual band, and
will probably only be used for specific applications, not as a
general consumer product.
Alcatel
Produc http://www.alcatel.com/consumer/mobilephone/index.htm
5.2 Pager
Pagers are small compact devices that can receive messages sent
using radio-transmission. Originally pagers are simplex : only
receiving information, but newer generations provide duplex
Alcatel
Produc Small PABX : Alcatel 2740, Alcatel 2750
Large PABX for Business, Hotel, Hospital : Alcatel 4400
company network from his car. One of the features of the third
generation mobile network is to improve data-communication,
therefore it will provide much larger bandwidths, eg. 2 Mbps.
Token
Ring The Token Ring network was developed to overcome the problem
of jammed networks. On the network, a token is circulating.
Only the computer who currently holds the token is allowed to
transmit, this way clearly avoiding any collision. A computer that
doesn't want to transmit, passes the token to its neighbor.
Hub The concept of a Bus and a Ring are useful as topologies, (logical
structures), but as a physical layout they have disadvantages :
whenever a computer has to be added to the network, the bus or
ring has to be opened, resulting in a temporary unavailability of
the network. In computer network terms, the network would be
down. A more practical way to operate a network is using a Hub.
This device allows computers to be physically connected as a star
network, while logically they are still a bus or ring.
Bus
Hub
Figure 76 Ethernet LAN without / with a Hub
Ring Hub
Lan
Switch The term LAN Switch refers to a router in which most functions
are implemented in hardware.
Thin
Servers This term refers to devices which are mostly pre-configured, and
ready-to-use from the box. Rapid installation time and simple
configuration (low cost of ownership in general) are the main
advantage of these devices. Many of these devices are
self-learning, self-healing, etc. Typical functions are
Web-servers, Routers, Firewalls, etc..
5.7 Screenphone
The screenphone is a mix between a telephone and a
WEB-browser. This concept is somehow also an evolution of the
ADSI or CLASS services. Marketing studies show that many
people find a telephone very familiar, but are uncomfortable with
a personal computer. The screenphone integrates a simple
computer into a telephone.
It can be used for normal phone-calls, but also has a modem, a
(retractable) keyboard and a display, which allows it to connect to
WEB-servers, and be used as a browser. This will facilitate
on-line services such as :
home-banking,
booking for theater, film, etc.
checking stocks
etc.
The screenphone also has a smart-card reader, so it can be used
for on-line shopping : after selecting an article you can pay by
inserting your electronic money smartcard, and the article will be
sent to you.
5.9 Web-TV
Web-TV is a device that integrates an Internet Browser with a
television. This way it combines the best of both :
high downstream bandwidth of the TV : high quality pictures
interactivity of the Internet
Web-TV places an additional box between your Cable-TV,
Internet Access and TV. This box is (usually) set on top of your TV,
and therefore called Set-Top Box.
6 Network Services
This chapter describes what you can do with a network, rather
than how it is structured. As a simple example, once you have
the telephone network, you can make phone-calls, but you can
also use the same infrastructure to implement a Wake-Up Call.
All the things the network can do for you are called Services.
6.1.1 Introduction
The first type of services are called Supplementary Services. They
are additional features on top of the Basic Call : a simple
two-party duplex voice connection.
Since the basic call for digital telephony is over 15 years old, it is
very mature, and as such most competition (between
manufacturers, as well as between network/service providers) is
now in the area of supplementary services.
As an example, Belgacom (Belgian incumbent operator) offers you
the 'Comfort Services' package, a packet of 5 supplementary
services at the cost of 85 BEF/month. Similarly Telenet (Belgian
second operator) offers you the possibility to pick service by
service.
http://www.belgacom.be/catalog/en/services/additionalservices/thecomfortservic
es/default.htm
http://www.telenet.be/thuis/thuis6.htm (NL)
Way over 100 supplementary services have been defined, and it is
not the intention to describe the complete list here. However they
Charging Services
Services to improve the visibility of the subscriber on the charges
related to calls and/or services.
Home meter
Advice of Charge at Begin
Advice of Charge During Call
Advice of Charge at End (AOC-E)
Restriction Services
These services restrict users to certain telephony services.
Incoming Calls Barred (ICB)
Outgoing Calls Barred (OCB)
Do Not Disturb
Multi-Party Services
These services permit telephone calls among three or more
persons.
Three Party Call (3PTY)
Conference Call (CONF)
Meet-me Conference (MM-CONF)
6.1.3 Implementation
The supplementary services mentioned above only have the scope
of the local exchange. (see also 6.3 to contrast this to Intelligent
Network). As such the supplementary services realized in this way
are also called Embedded supplementary services. They are
completely implemented in each individual local exchange, and
as such the implementation is not standardized, except for the
signalling which is controlling the services.
6.2 Centrex
For small companies the investment in a private exchange is not
always justified. In this case the public exchange can emulate a
private exchange. A group of users of the public exchange are
treated specially : they have (on top of their public number) a
private numbering plan, with which they can make 'company
internal' calls.
It is possible to extend the Centrex function over several
exchanges. This is called Wide-Area Centrex and is usually
realized using the Intelligent Networks mechanism.
Local
Exchange
public :240 56 56
public :240 56 00
Figure 80 Centrex
6.3.1 Introduction
The above Supplementary Services have a scope only for the Local
Exchange of the involved subscriber : different exchanges in the
network do not have to work together to realize these services.
There is however another group of services for which the scope is
the Whole Network : for these services, more, or all exchanges in
the network need to cooperate to realize the services. These
services are called Intelligent Network Services, and the networks
that have them are called Intelligent Networks (IN). In the US they
are called Advanced Intelligent Network (AIN) services.
Services and switching functions have historically been integrated
very closely together in the telephone exchange (see the above
Supplementary Services). This situation changes with the
introduction of Intelligent Networks where the intelligence, (the
logic needed to implement a certain service) is completely
separated from the switching.
Personal Mobility
Personal mobility services make it possible that calls are routed to
any fixed or mobile point in the network, so that the subscriber
can be reached by telephone at any time or place.
Personalized Services
Premium Rate (kiosk service): Caller pays for extra
information (e.g. the weather forecast) that a certain company
offers. The profits of the call are split between the operator
and the company that offers this information.
Centralised database services
Screening
Customised presentation features
Internet Services
Browse and Talk
Pay per Surf
6.3.3 Implementation
Because the exchanges (or Network Elements (NE)) in the network
can be from different manufacturers, Intelligent Networks are
structured according to ITU standards.
Other Network
Intelligent Network
Service Creation
Environment (SCE) Service Control Point (SCP)
Service
Service Core Network Switching
Switching Point (SSP)
Point (SSP)
Service Intelligent
Switching Peripheral (IP)
Point (SSP)
Core Network
to Users
Figure 81 Intelligent Network Structure
Service Poin The Service Switching Point (SSP) is an enhanced digital telephone
Switching
exchange. It contains the normal call handling and call control
software like any other exchange, but it additionally also provides
an interface with a central controller called the Service Control
Point using a CCS #7 signalling link. The SSP is the access point
in the telephone network for IN services. When a service call is
initiated, the SSP recognizes it as such and activates the SCP.
Inside the SSP we will find some extra code that enables us to
interact with the Service Control Point, but this extra code will be
service independent.
The SSP is operated by the network operator of the telephone
network.
speech synthesis
An Intelligent Peripheral can be implemented as a standalone unit
or integrated within an Service Switching Point.
Service Poin The Service Control Point (SCP) is the network element where the
Control
'service intelligence' is located :
Service code, in the form of Service Logic Programs (SLP)
Service Database Access
Service related Data
Service Management
Together with the switch (the SSP) it will be involved in the
real-time handling of the call. When activated by the SSP, the
Service Control Point takes over the Control functions : the SCP will
be the master, the SSP the slave.
The Service Control Point can have several supplementary services
installed. A particular service is always controlled by a single SCP.
For security reasons, however, services can be replicated over 2 or
more SCP's.
The SCP is implemented on a computer. This can be an Alcatel
machine (A8300 series in release 1.X) or another vendor's
machine. (Compaq DEC Alpha Server or SUN in release 2.X)
Management The Service Management Point (SMP) is the function from which
Service
Poin you Manage the network :
gather alarms, statistics and call tickets
monitor the network via specific Graphical User
Interfaces (GUI)
contain the reference database
it is the machine from which you install new services on the
different SCP's
keep the data consistent in the different SCP's that have
replicated services
collecting charging to be sent to an external Billing Centre
The user interface to the SMP typically uses a client-server
approach : a Web Browser or a proprietary protocol.
The SMP is not involved in the real-time call handling.
You will have one SMP in your network and this will be a computer
such as a Compaq DEC Alpha Server or SUN.
SSP
SCP
- Interface This interface carries all the messages between the SSP and the
SCP during execution of a service call :
This interface is based on the No.7 Common Channel
Signalling protocol using MTP, SCCP, TCAP and INAP. (see
chapter 3.3.5)
This interface is a standard to ensure that SSP's and SCP's
from different vendors can interwork
The messages on this interface control the real-time flow of
the call
Extra Still companies want also the be present on the World Wide Web
(so called Web-exposure) and provide a second site, this time on
the public internet, where they provide their public information.
Certain companies use the Internet extensively as customer
communication channel, and on their Extranets you can buy
online, or follow-up the processing of your service.
http://www.dell.com
http://www.amazon.com
Analog
orISDN your computer uses a Modem to send its information over
telephone lines,
you make a telephone connection with your Internet Access
Provider, usually this is a local call, if your Internet Access
Provider has a Point of Presence (the place you make a
phonecall to) in your area.
at your Access Provider there is a second modem (often part
of a so-called Modem Pool), connected to a Router which is
permanently connected to the Internet.
This kind of Access is also called Dial-Up, because you make a
phonecall to connect you to the Internet. Typically you have to pay
a fixed monthly fee to the Internet Access Provider (for using his
equipment : modems, routers, ...). Sometimes there is a fixed part,
and a connection-time dependent part. On top of all this you
still have to pay a phonecall to your Telephone Network Provider.
He sees your Dial-Up connection just as any phonecall. In some
countries, there are special telephone tariffs towards Internet
Access Providers. In some countries local calls are for free or at
fixed charge anyway.
Internet
Router
Modem
Analog
Computer Modem
Telephone Network (PSTN)
Local
Exchange
ISDN NT
Computer
ADSL
or
Cable As a possible solution to all these drawbacks, a user can access
the internet with ADSL or Cable. The resulting bandwidths are
Mbps instead of kbps. Also the Data-connection is in parallel
with the telephone (and other) services, so there is no problem in
being On-Line 24/24 - 7/7.
Computer Internet
Router
ADSL ADSL
Modem Modem
(NT) (LT)
Telephone Network
(PSTN)
Telephone Local
Exchange
TV
Cable-TV Network
Computer
Router
Cable Cable
Modem Modem
Internet
Note Access Networks that provide the user Mbps instead of kbps, do
not make the whole Internet a hundred times faster: In the
Download direction, there is a fast channel, but the Upload
direction, and the Server Response Time are still the same.
6.4.2 FireWall
The fact that the Internet is not owned by a single organization is
one of its succes factors. However, a disadvantage resulting from
this is the difficulty to make it a secure network. Companies
connecting their computer networks to the Internet are a target to
hackers from all over the world.
Intranet Internet
FireWall
Figure 85 FireWall
Proxy Server
FireWall
Client
Server Server
MultiMedia MultiMedia
Computer Computer
Internet
Internet
Short
Message
System The Short Message System (SMS) provides a mechanism for
transmitting 'short' messages to and from wireless handsets. The
service makes use of a Short Message Service Center (SMSC)
which acts as a Store and Forward system for the messages. A few
key properties of SMS are :
up to 160 characters, or 140 bytes
guaranteed delivery to the destination
out-of-band transfer
duplex
For the operator / network provider, the SMS has the following
advantages :
Increased call completion
Easy mechanism for simplifying services such as Advice of
Charge, Directory services, ...
Possibility to provide value-added information such as
notifications, stock-info, etc..
Typical end-user applications are :
Notification services : notification upon receipt of voice
mail, fax, email in your mailbox. Reminders for appointments
and events.
E-mail interworking : send and receive email from your
mobile set.
Information services : (see below)
weather reports
traffic information
entertainment information
financial information : stock quotes, exchange rates,
banking, brokerage
directory services
Information
Services A mobile phone-user cannot take the yellow pages directory with
him. As an answer to this, the Information Services have been set
up :
You dial a simple number, give the name of the product or service
you want to find, and mention the region where you want it. Then
a large database is queried searching for the information you
need.
Additional features :
the service may be for free, actually sponsored by the
companies/services in the database.
the information can be sent to you in a message to your Short
Message System (SMS)
http://www.proximus.be/en/services/scoot.htm
7 Network Management
7.1 Introduction
Building a network is one thing, but a network is a complex
system, almost a 'living' system, and as such requires continuous
management :
Extension
Reconfiguration
Performance Measurements
Fault Isolation
...
This is the task of the Network Management (NM) System. Today
there are 2 main standards for network management :
Telecom Management Network (TMN) : a set of standards
developed in the traditional telecom business. (Voice
communication).
Simple Network Management Protocol (SNMP) : a set of
standards developed in the data-communication business.
(Data communication, Internet).
transmission systems,
switching systems,
multiplexers,
signalling terminals,
file servers
When managed, such equipment is generally referred to as
Network Elements (NEs).
Operation System (OS) (not operating systems !) which are
the Managing and controlling elements in the network.
The usage of standards has to ensure that all equipment from any
manufacturer can be controlled by a network management system
from any other manufacturer.
Data Network
Network Elements
Architecture
Layered To deal with the complexity of the telecommunications
management, the management functionality may be considered
to be partitioned into logical layers.
Element Management Layer : Manages each network
element on an individual or group basis and supports an
abstraction of the functions provided by the Network Element
Layer. It has one or more element OSF and/or MFs that are
individual responsible for some subset of network element
functions.
Network Management Layer : has the responsibility of the
management of a network as supported by the Element
Management Layer
The control and co-ordination of the network view of all
network elements within its scope or domain,
The provision, cessation or modification of network
capabilities for the support of service to customers,
The maintenance of network capabilities,
Maintaining statistical, log and other data about the
network and interact with the service manager layer on
performance, usage, availability, etc.
Standard
Interfaces Some standard interfaces are :
The Q3 interface
The Qx interface
The F interface
The X Interface
GETRESPONSE
GETRESPONSE
GETNEXT
GETNEXT
TRAP
GET
TRAP
GET
SET
SET
SNMP Manager SNMP Manager
UDP UDP
IP IP
Link Link
Abbreviations
3PTY Three Party Call
AA Abbreviated Address
ADSI Analog Display Services Interface
ADSL Asymmetrical Digital Subscriber Line
AIN Advanced Intelligent Network
AM Amplitude Modulation
AMPS Advanced Mobile Phone System
AOC-E Advice of Charge at End
AOD ISDN Always-On / Dynamic ISDN
APS Automatic Protection Switching
ARCU Alcatel Remote Concentrator Unit
ASSS Analog Subscriber Signalling System
ATM Asynchronous Transfer Mode
AUC Authentication Center
B-ISDN Broadband Integrated Services Digital Network
B-ISUP B-ISDN User Part
B-ISUP Broadband ISDN User Part
BER Bit Error Ratio
BRA Basic Rate Access
BRI Basic Rate Interface
BSC Base Station Controller
BSS Base Station Subsystem
BSSAP Base Station Subsystem Application Part
BTS Base Transceiver Station
CALIP Called Line Identification Presentation
CALIR Called Line Identification Restriction
CAS Channel Associated Signalling
CATV Cable Television Network
CCBS Call Completion on Busy Subscriber
CCS #7 Common Channel Signalling System #7
CDM Code Division Multiplexing
NM Network Management
NMS Network Management Station
NNI Network to Network Interface
NS Network Subsystem
NT Network Termination
OCB Outgoing Calls Barred
OS Operation System
PABX Private Branch Exchange
PCS Personal Communication System
PDA Personal Digital Assistant
PDH Plesiochronous Digital Hierarchy
PLMN Public Lands Mobile Network
PM Phase Modulation
POF Plastic Optical Fiber
PON Passive Optical Networks
POP Point of Presence
POTS Plain Old Telephony Service
PRA Primary Rate Access
PRI Primary Rate Interface
PSTN Public Switched Telephone Network
QAM Quadrature Amplitude Modulation
QoS Quality of Service
RFC Request For Comment
RSVP Resource Reservation Protocol
RTSU Remote Terminal Subscriber Unit
SCCP Signalling Connection Control Part
SCE Service Creation Environment
SCP Service Control Point
SDH Synchronous Digital Hierarchy
SFH Slow Frequency Hopping
SIM Subscriber Identity Module
SLP Service Logic Programs
SMI Structure of Management Information
Glossary
In case a term cannot be found here, you can consult good online
Telecom Glossary and Abbreviations-lists at :
http://www.its.bldrdoc.gov/fs-1037/
Wireless
3G Third-Generation Wireless system : The 3G Wireless is a
broadband mobile communications system evolving from
second-generation digital cellular wireless communication
systems, to facilitate data and video applications.
AAL ATM Adaptation Layer : A layer above the ATM Layer, providing
additional functions to the payload inside the ATM cell. four AALs
are standardized : AAL1, AAL2, AAL3/4, AAL5.
Access
Node A piece of equipment, grouping a number of telecom users, and
providing them access to one or more core networks.
ADSL Asymmetric Digital Subscriber Line : is a new method of
transmitting digital data at high bit-rates (multi-mega-bit per
second) over the existing installed twisted-pairs of the access
network.
AMI Alternate Mark Inversion. A line-coding technique which
represents '1'-bits by pulses ('marks') and '0'-bits by zero
signal. Pulses can be positive or negative, and are alternated,
such that there are an equal amount of positive and negative
pulses. In order to signal special conditions, explicit violations of
this alternating can be used.
AMPS Advanced Mobile Phone Standard : AMPS is an analogue
mobile system standard, which has a very large installed base in
US.
Analogue
signal A type of signal that encodes data transmitted over wire or
through the air, and is commonly represented as an oscillating
wave. An analog signal can take any value in a range, and
changes smoothly between values. An analog signal can
transmit analog or digital data. For example, a radio station
sends analog music data using analog systems, while a modem
transmits digital data using analog signals.
ATM Asynchronous Transfer Mode : the technology used for
broadband communication services and is now accepted by ITU
as the technology for B-ISDN. ATM is also accepted as the
technology to interconnect computers over ATM LANs.
ATM
Forum A standardization organization, formed by Computer and
Communications companies to standardize ATM networks.
AUC Authentication Center : It provides authentication and
encryption parameters that verify the user's identity and ensure
the confidentiality of each call. The AUC protects network
operators from different types of fraud found in today's cellular
world.
Signals...
Smoke Let's clarify this with a first example : imagine you want to
transport information using shapes (a little like the smoke signals
that the Indians used). When you do this in an analog way, any
possible shape you can imagine (infinite number) is allowed.
When you do this in a digital way, only a limited number (finite) is
allowed, eg. circles, triangles and squares. When you transmit
your information (= your shape) it will be distorted by its
environment. Just like the wind distorts the smoke signals made by
the Indians.
Now the problem of the receiver. In an analog system, the
receiver cannot distinguish which part of the shape belongs to the
original sent shape, and which part is due to distortion. This is
because any shape was allowed. In the digital system, you know
that only a select set of shapes is allowed, so even if the received
shape is a little distorted, you can select the shape with the best
match. This way you can remove the distortion, and reconstruct a
perfect signal.
Conclusion : Digital Transmission can correct errors.
Note The digital receiver can only reconstruct the perfect signal, if the
distortion is not too much : it has to match received distorted
signals with the originals, and only if the distortion is limited, the
matching will be correct. The more the distortion, the more the
receiver will 'guess' the wrong original shape, resulting in an error
as well.
Electronics
Digital Digital electronics are so successful, because they transmit
information, with only two possible signal values :
On : represented by (eg.) 5 V voltage
Off : represented by (eg.) 0 V voltage
Even if the signal is distorted, eg. the 5V is attenuated to 4V, the
receiver can easily guess whether it was On or Off, by choosing
the closest matching value.
Delta
Modulation When sampling and converting to digital, it is sometimes more
efficient to indicate only the changes from step to step, rather than
the whole signal value.
CDMA CDMA allows to transmit different signals at the same time, in the
same frequency band. Each information stream is encoded with a
key, called chip-sequence. This encoding converts each single
bit, into a group of bits, eg. 64 or 128 bits.
At the receiver side, the information is decoded using a matching
key. all keys are chosen such that when decoding with the
matching key, results in the original signal, but when decoding
with the wrong key results into a zero signal.
When all users send their information, encoded with their own
keys, these signals are added. When decoding this sum of
signals, al the components encoded with other keys yield zero,
and only the component with the matching key comes out.
An analogy for CDMA is a group of people in a room, talking at
the same time in a different language. Again by filtering (and
understanding !) a particular language, you can listen to a certain
conversation.
Codin Coding techniques can encode the signal you want to send, the
so-called Baseband Signal by using more complicated pulses,
such that the DC component is zero, and that clock can always be
recovered. A more modern way to do coding is Scrambling : bits
are 'mixed up' by a scrambler into a seemingly chaotic sequence,
and then de-scrambled at the receiver.
90
00111
10010 10101 10001 00100 00101
180 0
270
Figure 91 32 QAM : Quadrature Amplitude Modulation
Analo Imagine that a trip is made from here to the beach. The army
would do this the connection-oriented way : they first send a Jeep
with explorers, finding a route to the beach, and setting up driving
instructions (special arrows) on each cross-road (= the switches).
Then the bulk of the army drives to the beach, not thinking about
which route, just following the arrows set up by the explorers. As
a result they all follow the same route (as a convoy) and also
arrive in sequence.
when a group of families want to do the same trip, they could go
there the connection-less way : they agree upon a destination
address (and deadline for arrival) and then each drive individually
to the beach. Each of them makes driving decisions on their own,
they may follow different routes and they may also arrive out of
sequence. some may arrive too late, because they are stuck in a
traffic jam.
Connection-Oriented Connectionless
All packets follow the same Packets need not follow the
path same path : multi-path
Sequence of packets is pre No sequence-integrity : pack
served ets can arrive out of sequence
Setup and Release of a connec no setup or release : all routing
tion required before resp. after possibilities defined at system
the actual information transfer configuration or system startup.
Intermediate nodes are not Each node Interprets full des
concerned about final destina tination address.
tion, only execute their small
part of the connection.
Faster, simpler routing More complex routing
Appendix I Standards
Telecom systems reach worldwide, and good compatibility
between different systems is an economical must. This
compatibility is organized through Standardization : certain
organizations who define and publish standards according to
which all systems must comply.
Several organizations, called standardization bodies, exist. The
most important ones will be briefly introduced in this appendix.
Alcatel has a WEB-site collecting the on-line access to most
standards :
Note Two very popular (and therefor) important protocol stacks are the
OSI-stack, and the TCP/IP-stack. The details of these lead too
far for this introductory text. You can refer to Computer Networks,
Tanenbaum, for more details.
SETUP Set-up
Calling SETUP ACKNOWLEDGE Network Called
Party Party
INFORMATION
CALL PROCEEDING
SETUP
CALL PROCEEDING
ALERTING
ALERTING CONNECT
CONNECT
CONNECT ACKNOWLEDGE
CONNECT ACKNOWLEDGE
DISCONNECT Release
DISCONNECT
RELEASE
RELEASE
RELEASE COMPLETE
RELEASE COMPLETE
audio FM Radio
InfraRed
ultrasonic TV light
AM Radio UltraViolet
GSM
GSM1800
DECT
MicroWave
10 100 1K 10K 100K 1M 10M 100M 1G 10G 100G 1T 10T 100T Frequency [Hz]
Appendix N MultiMedia
MultiMedia is a buzzword, and because it is being used in so
many contexts, it gets a vague or fuzzy meaning. One very limited
definition of MultiMedia, is :
Information consisting of different media, such as text, graphics,
audio, video.
In this appendix we want to give a view on what is MultiMedia
from a Telecom Business perspective.
Some 20 years ago there were clearly distinct businesses for :
Telecom : telephone networks. Important companies were (not
exhaustive) Siemens, Bell ITT, Lucent, ...
Consumer : TVs, Household appliances, etc.... Important
companies were Philips, Sony, NEC, ...
Computer : Mainframe computers. Important companies
were IBM, DEC, HP, ...
In the last 20 years, each of these business areas has expanded,
developing new technologies and products :
Telecom : ISDN, Mobile, Internet...
Consumer : Walkman, CD, video, Camcorder, ...
Computer : Personal Computers, Local Area Networks,
HardDisks, ...
As a result, these businesses start to overlap, and the overlap area
itself is a new business area with an interesting combination of
Telecom, Computer and Consumer features.
Some examples are :
Telecom
&Computer Computers with built in (voice) modems,
Computers able to do video-conferencing,
Network Computers,
Mobile Phone Organizers (One Touch Com, Nokia
Communicator)
Email
Computer
&Consumer CD-ROM, -Recordable, -Rewritable
Digital Versatile Disc (DVD)
Telecom
Consumer
& Prepaid Card for Mobile Phone, sold in supermarket
DECT Private Exchange
Telecom,
Compute
& Web Touch
Consum Worldwide databases, such as CDDB
Web-TV
MP3 player : a device playing Motion Picture Expert
Group (MPEG) layer 3 (mp3) encoded audio. Music in this
format can be downloaded from providers on the Internet.
In this view, MultiMedia is :
A new business area, combining technologies from Telecom,
Computer and Consumer industries.
The challenge will be to survive as a player in this new area, amid
a competition which is not only Telecom, but also Computer and
Consumer companies.
Othe The list of resources on the Web is endless, but lots of interesting
material is grouped at :
http://www.data.com/tutorials/
http://www.gbmarks.com/ref.htm
http://china.si.umich.edu/telecom/telecom-info.html