BSNL Handout Summar Training
BSNL Handout Summar Training
BSNL Handout Summar Training
CHAPTER
1
2
CONTENTS
PAGE
23
PCM PRINCIPLES
40
DIGITAL SWITCHING
60
SIGNALLING IN TELECOMMUNICATION
73
106
125
SDH
133
DWDM
145
10
MOBILE COMMUNICATION
160
11
CDMA TECHNOLOGY
194
12
INTRODUCTION TO BROADBAND
213
13
INTELLIGENT NETWORK
248
1
Dept of. EEE
Chapter-1
OVERVIEW OF TELECOMMUNICATION NETWORKS-I
a telecommunication device that is used to transmit and receive electronically or digitally
encoded speech between two or more people conversing. It is one of the most
common household appliances in the world today. Most telephones operate through
transmission of electric signals over a complex telephone network which allows almost
any phone user to communicate with almost any other user.
Telecommunication networks carry information signals among entities, which are
geographically far apart. An entity may be a computer or human being, a facsimile
machine, a teleprinter, a data terminal and so on. The entities are involved in the process
of information transfer that may be in the form of a telephone conversation (telephony) or
a file transfer between two computers or message transfer between two terminals etc.
With the rapidly growing traffic and untargeted growth of cyberspace,
telecommunication becomes a fabric of our life. The future challenges are enormous as
we anticipate rapid growth items of new services and number of users. What comes with
the challenge is a genuine need for more advanced methodology supporting analysis and
design of telecommunication architectures. Telecommunication has evaluated and growth
at an explosive rate in recent years and will undoubtedly continue to do so.
The communication switching system enables the universal connectivity. The
universal connectivity is realized when any entity in one part of the world can
communicate with any other entity in another part of the world. In many ways
telecommunication will acts as a substitute for the increasingly expensive physical
transportation.
The telecommunication links and switching were mainly designed for voice
communication. With the appropriate attachments/equipments, they can be used to
transmit data. A modern society
Introduction
may be distributed among the switching devices rather than residing centrally.
Microprocessors on integrated circuit chips are a popular form of distributed stored
program control.
Switching fabrics
Space and time division are the two basic techniques used in establishing
connections. When an individual conductor path is established through a switch for the
duration of a call, the system is known as space division. When the transmitted speech
signals are sampled and the samples multiplexed in time so that high-speed electronic
devices may be used simultaneously by several calls, the switch is known as time
division.
In the early stages of development in telecommunication, manual switching
methods were deployed. But later on to overcome the limitations of manual switching;
automatic exchanges, having Electro-mechanical components, were developed. Strowger
exchange, the first automatic exchange having direct control feature, appeared in 1892 in
La Porte (Indiana). Though it improved upon the performance of a manual exchange it
still had a number of disadvantages, viz., a large number of mechanical parts, limited
availability, inflexibility, bulky in size etc. As a result of further research and
development, Crossbar exchanges,having an indirect control system, appeared in 1926 in
Sweden.
The Crossbar exchange improved upon many short- comings of the Strowger
system. However, much more improvement was expected and the revolutionary change
in field of electronics provided it. A large number of moving parts in Register, marker,
Translator, etc., were replaced en-block by a single computer. This made the exchange
smaller in size, volume and weight, faster and reliable, highly flexible, noise-free, easily
manageable with no preventive maintenance etc.
Network Architecture.
When electronic devices were introduced in the switching systems, a new concept
of switching evolved as a consequence of their extremely high operating speed compared
to their former counter-parts, i.e., the Electro-mechanical systems, where relays, the logic
elements in the electromechanical systems, have to operate and release several times
which is roughly equal to the duration of telephone signals to maintain required accuracy.
Research on electronic switching started soon after the Second World War, but
commercial fully electronic exchange began to emerge only about 30 years later.
However, electronic techniques proved economic for common control systems much
earlier. In electromechanical exchanges, common control systems mainly used switches
and relays, which were originally designed for use in switching networks. In common
controls, they are operated frequently and so wear out earlier. In contrast, the life of an
electronic device is almost independent of its frequency of operation. This gave a
motivation for developing electronic common controls and resulted in electronic
Dept of. EEE
replacements for registers, markers, translators etc. having much greater reliability than
their electromechanical predecessors.
In electromechanical switching, the various functions of the exchange are
achieved by the operation and release of relays and switch (rotary or crossbar) contacts,
under the direction of a Control Sub-System. These contracts are hard - wired in a
predetermined way. The exchange dependent data, such as subscribers class of service,
translation and routing, combination signaling characteristics are achieved by hard-ware
and logic, by a of relay sets, grouping of same type of lines, strapping on Main or
Intermediate Distribution Frame or translation fields, etc. When the data is to be
modified, for introduction of a new service, or change in services already available to a
subscriber, the hardware change ranging from inconvenient to near impossible, are
involved.
In an SPC exchange, a processor similar to a general-purpose computer is used to
control the functions of the exchange. All the control functions, represented by a series of
various instructions, are stored in the memory. Therefore the processor memories hold all
exchange dependent data. such as subscriber date, translation tables, routing and charging
information and call records. For each call processing step. e.g. for taking a decision
according to class of service, the stored data is referred to, Hence, this concept of
switching. The memories are modifiable and the control program can always be rewritten
if the behavior or the use of system is to be modified. This imparts and enormous
flexibility in overall working of the exchange.
Digital computers have the capability of handling many tens of thousands of
instructions every second, Hence, in addition to controlling the switching functions the
same processor can handle other functions also. The immediate effect of holding both the
control programme and the exchange data, in easily alterable memories, is that the
administration can become much more responsive to subscriber requirements. both in
terms of introducing new services and modifying general services, or in responding to the
demands of individual subscriber. For example, to restore service on payment of an
overdue bill or to permit change from a dial instrument to a multi frequency sender,
simply the appropriate entries in the subscriber data-file are to be amended. This can be
done by typing- in simple instructions from a teletypewriter or visual display unit. The
ability of the administration to respond rapidly and effectively to subscriber requirements
is likely to become increasingly important in the future.
The modifications and changes in services which were previously impossible be
achieved very simply in SPC exchange, by modifying the stored data suitably. In some
cases, the subscribers can also be given the facility to modify their own data entries for
supplementary services, such as on-demand call transfer, short code (abbreviated)
dialing, etc.
The use of a central processor also makes possible the connection of local and
remote terminals to carry out man-machine dialogue with each exchange. Thus, the
maintenance and administrative operations of all the SPC exchanges in a network can be
Dept of. EEE
performed from a single centralized place. The processor sends the information on the
performance of the network, such as, traffic flow, billing information, faults, to the
centre, which carries out remedial measures with the help of commands. Similarly, other
modifications in services can also be carried out from the remote centre. This allows a
better control on the overall performance of the network.
As the processor is capable of performing operations at a very high speed, it has
got sufficient time to run routine test programmes to detect faults, automatically. Hence,
there is no need to carry out time consuming manual routine tests.
In an SPC exchange, all control equipment can be replaced by a single processor.
The processor must therefore be quite powerful, typically it must process hundreds of
calls per second, in addition to performing other administrative and maintenance tasks.
However, totally centralized control has drawbacks. The software for such a central
processor will be voluminous, complex, and difficult to develop reliably. Moreover, it is
not a good arrangement from the point of view of system security, as the entire system
will collapse with the failure of the processor. These difficulties can be overcome by
decentralizing the control. Some routine functions such as scanning, signal distributing,
marking, which are independent of call processing, can be delegated to auxiliary or
peripheral processors.
Stored program control (SPC) has become the principal type of control for all types
of new switching systems throughout the world, including private branch exchanges, data
and Telex systems. Two types of data are stored in the memories of electronic switching
systems. One type is the data associated with the progress of the call, such as the dialed
address of the called line.
Another type, known as the translation data, contains infrequently changing information,
such as the type of service subscribed to by the calling line and the information required
for routing calls to called numbers. These translation data, like the program, are stored in
a memory, which is easily read but protected to avoid accidental erasure. This
information may be readily changed, however, to meet service needs. The flexibility of a
stored program also aids in the administration and maintenance of the service so that
system faults may be located quickly.
SPC exchanges can offer a wider range of facilities than earlier systems. In
addition, the facilities provided to an individual customer can be readily altered by
changing the customers class-of-service data stored in memory. Moreover, since the
processors stored data can be altered electronically,some of these facilities can be
controlled by customers. Examples include:1. Call barring (outgoing or incoming): The customer can prevent unauthorized
calls being made and can prevent incoming calls when wishing to be left in peace.
2. Call waiting: The Call waiting service notifies the already busy subscriber of a
third party calling him.
3. Alarm calls: The exchange can be instructed to call the customer at a pre-arranged
time (e.g. morning alarm).
Dept of. EEE
4. Call Forwarding: The subscriber having such a feature can enable the incoming
calls coming to his telephone to be transferred to another number during his
absence.
5. Conference calls: Subscriber can set up connections to more than one subscriber
and conduct telephone conferences under the provision of this facility.
6. Dynamic Barring Facility: Subscriber having STD/ISD facilities can dynamically
lock such features in their telephone to avoid misuse. Registering and dialing a
secret code will extend such such a facility.
7. Abbreviated Dialing: Most subscribers very often call only limited group of
telephone numbers. By dialing only prefix digit followed by two selection digits,
subscribers can call up to 100 predetermined subscribers connected to any
automatic exchange. This shortens the process of dialing all the digits.
8. Malicious call Identification: Malicious call identification is done immediately
and the information is obtained in the print out form either automatically or by
dialing an identification code.
9. Do Not Disturb: This facility enables the subscriber to free himself from attending
his incoming calls. Using this facility the calls coming to the subscriber can be
routed to an operator position or to an answering machine. The operator position
or the machine can inform the calling subscriber that the called subscriber is
temporarily inaccessible. Today SPC is a standard feature in all the electronic
exchanges.
Subs interface
Digital Switch
Trunks interface
Other
exchanges
CONTROL
PROCESSOR
Other auxiliary inter faces
Such as,
(a) Tone generator
(b) Frequency receives
(c) Conference call facility
(d) CCS# 7 Protocol
Manager
(e) V 5.2 access manager
Operation &
Maintenance
Figure-2
The next evolutionary step was to move the PCM codec from the
exchange end of the customers line to the customers end. This provides digital
transmission over the customers line, which can have a number of advantages. Consider
data transmission. If there is an analog customers line, a modem must be added and data
can only be transmitted at relatively slow speeds. If the line is digital, data can be
transmitted by removing the codec (instead of adding a modem). Moreover, data can be
transmitted at 64 kbit/s instead of at, say, 2.4 kbit/s. Indeed, any form of digital signal
can be transmitted whose rate does not exceed 64 kbit/s.
10
10
11
11
Trunk lines can contain thousands of simultaneous calls that have been combined
using time-division multiplexing. These thousands of calls are carried from one central
office to another where they can be connected to a de-multiplexing device and switched
through digital access cross connecting switches to reach the proper exchange and local
phone number.
TR
09
TR
TR
TR
CI
CT
S
L
TR
CID
CIA
CTI
12
12
CI
What is Trunking?
In telecommunications systems, trunking is the aggregation of multiple user circuits into
a single channel. The aggregation is achieved using some form of multiplexing. Trunking
theory was developed by Agner Krarup Erlang, Erlang based his studies of the statistical
nature of the arrival and the length of calls. The Erlang B formula allows for the
calculation of the number of circuits required in a trunk based on the Grade of Service
and the amount of traffic in Erlangs the trunk needs cater for.
Definition
In order to provide connectivity between all users on the network one solution is to build
a full mesh network between all endpoints. A full mesh solution is however impractical, a
far better approach is to provide a pool of resources that end points can make use of in
order to connect to foreign exchanges. The diagram below illustrates the where in a
telecommunication network trunks are used.
A Modern Telephone Network Indicating where trunks are used. SLC - Subscriber
line concentrator
13
13
LE
Local Exchange
TDM TAX II
Level II Tax
TDM TAX I
Level I Tax
14
14
Call routing
Routing in the PSTN is the process used to route telephone calls across the public
switched telephone network. This process is the same whether the call is made between
two phones in the same locality, or across two different continents.
15
15
alternative routes to any given destination, and the exchange can select dynamically
between these in the event of link failure or congestion.
The routing tables are generated centrally based on the known topology of the network,
the numbering plan, and analysis of traffic data. These are then downloaded to each
exchange in the telephone operators network. Because of the hierarchical nature of the
numbering plan, and its geographical basis, most calls can be routed based only on their
prefix using these routing tables.
Some calls however cannot be routed on the basis of prefix alone, for example nongeographical numbers, such as toll-free or freephone calling. In these cases the Intelligent
Network is used to route the call instead of using the pre-computed routing tables.
In determining routing plans, special attention is paid for example to ensure that two
routes do not mutually overflow to each other, otherwise congestion will cause a
destination to be completely blocked.
According to Braess' paradox, the addition of a new, shorter, and lower cost route can
lead to an increase overall congestion[. The network planner must take this into account
when designing routing paths.
One approach to routing involves the use of Dynamic Alternative Routing (DAR). DAR
makes use of the distributed nature of a telecommunications network and its inherent
randomness to dynamically determine optimal routing paths. This method generates a
distributed, random, parallel computing platform that minimises congestion across the
network, and is able to adapt to take changing traffic patterns and demands into account.
Routing can be loosely described as the process of getting from here to there. Routing
may be discussed in the context of telephone networks or computer networks. In
telephone networks, routing is facilitated by switches in the network, whereby in
computer networks routing is performed by routers in the network.
Definition: Routing in telephone networks
Routing in the context of telephone networks is the selection of a specific circiut group,
for a given call or traffic stream, at an exchange in the network . "The objective of
routing is to establish a successful connection between any two exchangesin the network"
. By selecting routes that meet the constraints set by the user traffic and the network,
routing determines which network resources (circuit group) should be used to transport
which user traffic.
Different networks employ different routing techniques, but all communication networks
share a basic routing functionality based on three core routing functions
Assembling and distributing information on the state of the network and user traffic that
is used to generate and select routes.
16
16
Generating and selecting feasible and optimal routes based on network and user traffic
state information.
Forwarding user traffic along the selected routes.
The public switched telephone network (PSTN) architecture is made up of a hierarchy of
exchanges (e.g local and regoinal exchanges) with each level of the hierarchy performing
different functions . Two adjacent exchanges in the network may be connected by several
direct routes consisting of one or more circuits .
In circuit-switched networks, such as the PSTN, switching and transmission resources are
dedicated to a call along the path from source to destination for the complete duration of
the call. Routing decisions are imperative in facilitating this process as they determine the
most efficient links to use to connect users for a call . Routing in the PSTN is done using
a hop-by-hop approach . When a user wants to make a call, they dial the destination
number to which the call should be routed. This destination number is made up of a
prefix (area code or national destination network), which identifies the geographical
location of the called party, and a unique number (the subscriber number) linked to the
prefix that identifies the exact destination to which the call should be routed The end
exchange to which the calling party is connected (the originating exchange) uses the area
code to identify the outgoing circuit group connecting to the first choice adjacent
exchange en-route This circuit group is called the first choice route and is obtained using
a routing table at the originating switch . The function of the switch at the originating end
exchange is to connect the switch input port to which the calling user is connected to a
free outgoing circuit group in the first choice group . If all the circuits along the first
choice route are fully occupied, the switch then attempts to use an alternative route circuit
group to route the call to the destination exchange . The originating exchange then
forwards the address to the adjacent exchange (first choice or alternate route), and the
procedure is repeated at the adjacent exchange in order to reach the destination end
exchange to which the called party is connected . When the address reaches the
destination exchange, it only needs to process the last part of the address to identify the
switch input port that the called party is connected .
Routing directs forwarding . Forwarding of traffic can be done using connection-oriented
or connectionless approaches . In connection-oriented forwrding, forwarding instructions
are installed in all the switches along a designated route before the route can be used to
transport traffic . Traffic forwarded using the connectionless approach carries its own
forwarding information either as precise routing commands for each switch along a route
or as hints that may be autonomously interpreted by any switch in the network .
In PSTN, forwarding of traffic is based on the connection-oriented approach. Call routing
is achieved using pre-computed routing tables, containing all the possible pre-defined
routes for a connection, at each switch .The pre-defined routes specified in the routing
table include information of a direct route (or routes) to be used under normal traffic and
network conditions (e.g no link failure or network congestion) as well as alternative
routes that should be used in the event that all circuits along the direct route are fully
occupied . An alternative route may be an indirect route consisting of several circuit
groups connecting two exchanges via other exchanges . The following example illustrates
the use of an alternative route to connect two exchanges in the event of the direct route
being congetsed.
17
17
Connection and Control which carries out connections and processing of calls,
Operation and Maintenance which is responsible for all functions needed by the
network operating authority.
Each functional unit is equipped with softwares which are appropriate for handling the
functions for which it is responsible.
Synchronization and Time Base Station STS
Time base (BT)
The BT ensures times distribution for LR and PCM to provide the synchronization, and
also for working out the exchange clock.Time distribution is tripled.
Time generation can be either autonomous or slaved to an external rhythm with a view to
synchronise the system with the network
Auxiliary Equipment Control Station SMA
Auxiliary equipment manager (ETA)
The ETA Supports:
-
CCS7 protocol handler (PUPE) and CCS7 controller (PC): CCITT No. 7 protocol
processing
For connection of 64 kbit/s signaling channels, semi- permanent connections are
established via the connection matrix, to the PUPE which processes the CCITT No. 7
protocol.
More precisely, the PUPE function carries out the following:
-
PUPE defence,
Various observation tasks which are not directly linked to CCITT No. 7.
18
18
CCITT N 7
SIGNALLING
NETWORK
SUBCRIBER
CONNECTION
ACCESS
AND
SUBSYSTE
M
CONTROL
TELEPHONE
NETWORK
DATA
NETWORK
NT
VALUE ADDED
NETWORK
OCB 283
OP E R AT I O N
AND
MAINTENANCE
PABX
19
19
OPERATION AND
MAINTENANCE
NETWORK
an unidirectional connection between any incoming channel and any out going
channel. There can be as many simultaneous connections as there are outgoing
channels. It should be remembered that a connection consists of allocating the
information contained within an incoming channel to an outgoing channel,
2)
3)
The MCX is controlled by the COM function (matrix switch controller) to ensure the:
-
set up and breakdown of the connections by access to the matrix command memory.
This access is used to write at the output T.S. address the incoming T.S. address
defense of the connections. Security of the connections in order to assure a good data
switching.
satellite
matrix link),
PCM),
PCM).
20
20
The call handler takes the decisions necessary for processing of communications in terms
of the signaling received, after consultation of the subscriber and analysis database
manager (TR) if necessary. The call handler processes new calls and handling-up
operations, releases equipment, commands switching on and switching off etc.
In addition, the call handler is responsible for different management tasks (control of tests
of circuits, sundry observations).
Operation and maintenance function (OM) SMM
The functions of the operation and maintenance subsystem are carried out by the
operation and maintenance software OM).
The operating authority accesses all hardware and software equipment of the Alcatel
1000 E10 system via computer terminals belonging to the operation and maintenance
subsystem: consoles, magnetic media, intelligent terminal. These functions can be
grouped into 2 categories:
-
loading of softwares and of data for connection and command and for the
subscriber digital access units,
temporary backup of detailed billing information,
centralisation of alarm data coming from connection and control stations, via
alarm rings,
Finally, the operation and maintenance subsystem permits two-way communication with
operation and maintenance networks, at regional or national level (TMN).
CSN - digital satellite center
The digital satellite center [CSN center satellite numerique) is a subscriber connection
unit on which both analogue and digital subscribers can be connected.
Its design and composition enable the CSN to fit into an existing network and can be
connected to time-based systems using the CCITT N 7 type of semaphore signalling.
The CSN is a connection unit designed to adapt to a variety of geographical situation: it
can be either local [CSNL] or distant [CSND] with respect to the connecting switch.
21
21
CS
SMX
SMT
( 1 TO 28) X 2
Circuits and
announcemen
t machine
SMA
( 2 TO 37)
1 TO 4 MAS
SMC
2 TO 14
SMM
1x2
CSN
SMC :
SMA :
SMT :
SMX :
SMM :
Maintenance Station
STS
22
22
STS
1x3
Chapter-2
Overview of Telecommunications Networks II
Institutional mechanism and role
Introduction: All industries operate in a specific environment which keeps changing and
the firms in the business need to understand it to dynamically adjust their actions for best
results.
Like minded firms get together to form associations in order to protect their common
interests. Other stake holders also develop a system to take care of their issues.
Governments also need to intervene for ensuring fair competition and the best value for
money for its citizens. This handouts gives exposure on the Telecom Environment in
India and also dwells on the role of international bodies in standardizing and promoting
Telecom Growth in the world.
Institutional Framework: It is defined as the systems of formal laws, regulations, and
procedures, and informal conventions, customs, and norms, that broaden, mold, and
restrain socio-economic activity and behaviour. In India, The Indian telegraph act of 1885
amended from time to time governs the telecommunications sector. Under this act, the
government is in-charge of policymaking and was responsible for provisioning of
services till the opening of telecom sector to private participation. The country has been
divided into units called Circles, Metro Districts, Secondary Switching Areas (SSA),
Long Distance Charging Area (LDCA)
services
wing and created Bharat Sanchar Nigam Limited. Further changes in the
regulatory system took place with the TRAI Act of 2000 that aimed at restoring
functional clarity and improving regulatory quality and a separate disputes settlement
body was set up called Telecom Disputes Settlement and Appellate Tribunal (TDSAT) to
fairly adjudicate any dispute between licensor and licensee, between service provider,
between service provider and a group of consumers. In October 2003, Unified Access
Service Licenses regime for
basic and cellular services was introduced. This regime enabled services providers to
offer fixed and mobile services under one license. Since then, Indian telecom has seen
unprecedented customer growth crossing 600 million connections. India is the fourth
largest telecom market in Asia after China, Japan and South Korea. The Indian telecom
network is the eighth largest in the world and the second largest among emerging
economies. A brief on telecom echo system and various key elements in institutional
framework is given below:
Department of Telecommunications: In India, DoT is the nodal agency for taking care
of telecom sector on behalf of government. Its basic functions are:
Policy Formulation
Review of performance
Licensing
Wireless spectrum management
Administrative monitoring of PSUs
Research & Development
Standardization/Validation of Equipment
International Relations
Main wings within DoT:
Telecom Engineering Center (TEC)
USO Fund
Wireless Planning & Coordination Wing (WPC)
Telecom Enforcement, Resource and Monitoring (TERM) Cell
Telecom Centers of Excellence (TCOE)
Public Sector Units
Bharat Sanchar Nigam Limited(BSNL) Indian
Telephone Industries Limited (ITI) Mahanagar
Telephone Nigam Limited(MTNL)
Telecommunications Consultants India Limited(TCIL)
R & D Unit
Center for development of Telematics (C-DoT)
The other key governmental institutional units are TRAI & TDSAT. Important units are
briefed below:
Telecom Engineering Center (TEC): It is a technical body representing the interest of
Department of Telecom, Government of India. Its main functions are:
Specification of common standards with regard to Telecom networkequipment, services
and interoperability.
Generic Requirements (GRs), Interface Requirements (IRs)
Issuing Interface Approvals and Service Approvals
Formulation of Standards and Fundamental Technical Plans
Interact with multilateral agencies like APT, ETSI and ITU etc. for standardisation
Develop expertise to imbibe the latest technologies and results of R&D Provide
technical support to DOT and technical advice to TRAI & TDSAT Coordinate
with C-DOT on the technological developments in the Telecom Sector
on major frequency
Telecommunications sector has been astounding, particularly in the last decade. This
growth has been catalysed by telecommunications sector liberalization and reforms.
Some of the areas needing immediate attention to consolidate and maintain the growth
are:
Capacity building for industry talent pool
Continuous adaptation of the regulatory environment to facilitate induction/
adoptation of high potential new technologies and business models
Bridging of high rural - urban teledensity/digital divide
Faster deployment of broadband infrastructure across the country
Centres of Excellence have been created to work on (i) enhancing talent pool,
(ii)technological innovation, (iii) secure information infrastructure and (iv) bridging of
digital divide. These COEs are also expected to cater to requirements of South Asia as
regional leaders. The main sponsor (one of the telecom operators), the academic institute
where the Centers are located and the tentative field of excellence are enumerated in the
table below:
Field of Excellence in Telecom
Associated Institute
Sponsor
IIT, Kharagpur
Vodafone Essar
IIT ,Delhi
Bharti Airtel
IIT, Kanpur
BSNL
IIM, Ahmedabad
IDEA Cellular
IIT, Chennai
Reliance
IISc, Bangalore
Aircel
IIT Mumbai
Tata Telecom
WPC, Chennai
Govt with
Industry
consortium
Telecom Regulatory Authority of India (TRAI): TRAI was established under TRAI
Act 1997 enacted on 28.03.1997. The act was amended in 2000. Its Organization setup
consists of One Chairperson, Two full-time members & Two part-time members. Its
primary role is to deals with regulatory aspects in Telecom Sector & Broadcasting and
Cable services.
TRAI has two types of functions as mentioned below:
Mandatory Functions
Tariff policies
Interconnection policies
Quality of Service
Ensure implementation of terms and conditions of license
Recommendatory Functions
New license policies
Spectrum policies
Opening of sector
www.trai.gov.in
Telecom Dispute Settlement Appellate Tribunal (TDSAT): TDSAT was established in
year 2000 by an amendment in TRAI act by transferring the functions of dispute handling
to new entity i.e. TDSAT. The organization setup consists of one Chairperson & two fulltime members. Its functions are:
Adjudicate any dispute between
licensor and licensee
two or more licensees
group of consumers
Hear & dispose off appeal against any direction, decision or order of the Authority
under TRAI Act www.tdsat.nic.in
Key International Standardization Bodies for Telecom sector:
ITU is the leading United Nations agency for information and communication technology
issues, and the global focal point for governments and the private sector in developing
networks and services. For nearly 145 years, ITU has coordinated the shared global use
of the radio spectrum, promoted international cooperation in assigning satellite orbits,
Management,
Mobile
Communications,
Multimedia,
29
29
The
European
Telecommunications
Standards
Institute
(ETSI)
produces
30
30
development of low capacity (128 port) Rural automatic Exchange (RAX) which enabled
provisioning of telephone in even the smallest village. This was specially designed to suit
Indian environment, capable of withstanding natural temperature and dusty conditions.
Prominent Licenses provided by DoT:
Access Service (CMTS & Unified Access Service): The Country is divided into 23
Service Areas consisting of 19 Telecom Circle Service Areas and 4 Metro Service Areas
for providing Cellular Mobile Telephone Service (CMTS). Consequent upon
announcement of guidelines for Unified Access (Basic& Cellular) Services licenses on
11.11.2003, some of the CMTS operators have been permitted to migrate from CMTS
License to Unified Access Service License (UASL). No new CMTS and Basic service
licenses are being awarded after issuing the guidelines for Unified access Service
Licence(UASL). As on 31st March 2008, 39 CMTS and 240 UASL licenses operated.
o 3G & BWA (Broadband Wireless Access): Department of Telecom started the auction
process for sale of spectrum for 3G and BWA (WiMax) in April 2010 for 22 services
areas in the country. BSNL & MTNL have already been given spectrum for 3G and
BWAand they need to pay the highest bid amount as per auction results. BSNL & MTNL
both are providing 3G services. BSNL has rolled out its BWA service by using WiMax
technology.
Mobile Number Portability (MNP) Service: Licenses have been awarded to two
perators to provide MNP in India. DoT is ensuring the readiness of all mobile operators
and expects to start this service any time after June 2010.
Infrastructure Provider: There are two categories IP-I and IP-II. For IP-I the applicant
company is required to be registered only. No license is issued for IP-I. Companies
registered as IP-I can provide assets such as Dark Fibre, Right of Way, Duct space and
Tower. This was opened to private sector with effect from 13.08.2000. An IP-II license
can lease / rent out /sell end to end bandwidth i.e. digital transmission capacity capable to
carry a message. This was opened to private sector with effect from 13.08.2000. Issuance
of IP-II Licence has been discontinued w.e.f. 14.12.05
INMARSAT : INMARSAT (International Maritime Satellite Organisation) operates a
constellation of geo-stationary satellites designed to extend phone, fax and data
communications all over the world. Videsh Sanchar Nigam Ltd (VSNL) is permitted
to provide Inmarsat services in India under their International Long Distance(ILD)
31
32
32
VPN: Internet Service Providers (ISPs) can provide Virtual Private Network (VPN)
Services. VPN shall be configured as Closed User Group(CUG) only and shall carry only
the traffic meant for the internal use of CUG and no third party traffic shall be carried on
the VPN. VPN shall not have any connectivity with PSTN / ISDN / PLMN except when
the VPN has been set up using Internet access dial-up facility to the ISP node. Outward
dialing facility from ISP node is not permitted.
VSAT & Satellite Communication: There are two types of CUG VSAT licenses : (i)
Commercial CUG VSAT license and (ii) Captive CUG VSAT license. The commercial
VSAT service provider can offer the service on commercial basis to the subscribers by
setting up a number of Closed User Groups (CUGs) whereas in the captive VSAT
service only one CUG can be set up for the captive use of the licensee. The scope of the
service is to provide data connectivity between various sites scattered within territorial
boundary of India via INSAT Satellite System using Very Small Aperture
Terminals (VSATs). However, these sites should form part of a Closed User Group
(CUG). PSTN connectivity is not permitted.
Radio Paging: The bids for the Radio Paging Service in 27 cities were invited in 1992,
the licenses were signed in 1994 and the service was commissioned in 1995. There was
a provision for a fixed license fee for first 3 years and review of the license fee
afterwards.The license was for 10 years and in 2004 Govt offered a extended 10 years
license with certain license fee waivers but with the wide spread use of mobile phones,
this service has lost its utility.
PMRTS: Public Mobile Radio Trunking service allows city wide connectivity through
wireless means. This service is widely used by Radio Taxi operators and companies
whose workforce is on the move and there is need to locate the present position of
employee for best results. PSTN connectivity is permitted.
INSAT MSS: INSAT Mobile Satellite System Reporting Service (INSAT MSS
Reporting Service) is a one way satellite based messaging service available through
INSAT. The basic nature of this service is to provide a reporting channel via satellite to
the group of people, who by virtue of their nature of work are operating from remote
locations without any telecom facilities and need to send short textual message or short
data occasionally to a central station.
Voice Mail/ Audiotex/ UMS (Unified Messaging Service): Initially a seprate license
Dept of. EEE
33
33
was issued for these services. For Unified Messaging Service, transport of Voice Mail
Messages to other locations and subsequent retrieval by the subscriber must be on a
nonreal time basis. For providing UMS under the licence, in addition to the licence for
Voice Mail/Audiotex/UMS, the licensee must also have an ISP licence. The ISP licence
as well as Voice Mail/Audiotex/ UMS licence should be for the areas proposed to be
covered by UMS service. Since start of NTP-99, all access provider i.e. CMTS, UASL,
Fixed service providers are also allowed to provide these services as Value Added
Service (VAS) under their license conditions.
Telemarketing: Companies intending to operate as Telemarketes need to obtain this
license from DoT. Other Service Provider (including BPO): As per New Telecom Policy
(NTP) 1999, Other Service Providers (OSP), such as tele-banking, tele-medicine, teletrading, ecommerce, Network Operation Centers and Vehicle Tracking Systems etc are
allowed to operate by using infrastructure provided by various access providers for nontelecom services.
Telecom Operators: Interested companies obtain license for various services to get
authorization to provide licensed telecom services in India. While hundreds of license
holders exists in India for various services, major operators are BSNL, Bharti (Airtel),
Vodafone, Reliance, Aircel, Idea and Tata etc. There is a stiff competition in the market
and operators struggle to provide innovative services earlier than others, at rates lower
than rivals, continuously find ways to extend better customer care and improve profit
margins by managing costs. A typical diagram depicting various macro level activities
performed by a telecom service provider is given below:
34
34
35
35
36
36
interacts on policy and regulatory issues with various Government bodies such as the
Department of Telecommunications, Telecom Regulatory Authority of India, apex
industry organizations like ASSOCHAM, Confederation of Indian Industry (CII) and
Federation of Indian Chambers of Commerce & Industry (FICCI), technical institutions,
financial analysts and other institutions of world repute. The Association formulates
expert opinion on industry issues and submits whenever necessary, recommendations to
the concerned authorities. www.auspi.in
TEMA Established in 1990, Telecom Equipment Manufacturers Association of
India
(TEMA) is recognized by the Government of India as the National Apex body to
represent telecom Technology Providers, Global and Indian, Private and Government
owned companies. TEMA has membership of more than 150 member companies
covering almost 80 per cent of Indian Telecom Equipment Manufacturing. Services
offered to TEMA members include, interaction with Government, Policy makers,
interaction with various National Confederations of Industries, overseas Delegations,
Exhibition Organizers, Market Development Assistance Authorities, Tender Information,
Excise and Customs Departments, Telecom Engineering Center for product specifications
etc. Our members are exporting a variety of Telecom Equipments to South America,
Middle-East, Africa, SAARC, CIS andSouth East Asian Countries. TEMA also has an
Export Promotion Forum set up by theMinistry of Commerce, Government of India to
promote Export of Telecom Equipments and Services. The Forum also make various
recommendations to the Government for making necessary changes in various policies
and procedures for promotion of Exports and Services.
Key Industry/ Trade Associations influencing the Telecom Market
The Confederation of Indian Industry (CII) works to create and sustain an environment
conducive to the growth of industry in India, partnering industry and government alike
through advisory and consultative processes.CII is a non-government, not-for-profit,
industry led and industry managed organisation, playing a proactive role in India's
development process. Founded over 115 years ago, it is India's premier business
association, with a direct membership of over 7800 organisations from the private as well
as public sectors, including SMEs and MNCs, and an indirect membership of over 90,000
companies from around 396 national and regional sectoral associations. With 64 offices
Dept of. EEE
37
37
international
organizations
to
promote
bilateral
economic
issues.
ASSOCHAM is represented on all national and local bodies and is, thus, able to proactively convey industry viewpoints, as also communicate and debate issues relating to
public-private partnerships for economic development. www.assocham.org
FICCI: Established in 1927, FICCI is the largest and oldest apex business organisation in
India. FICCI plays a leading role in policy debates that are at the forefront of social,
economic and political change. Its publications are widely read for their in-depth research
and policy prescriptions. FICCI works closely with the government on policy issues,
enhancing efficiency, competitiveness and expanding business opportunities for industry
through a range of specialised services and global linkages. It also provides a platform for
sector specific consensus building and networking. www.ficci.com
Job opportunities in Telecom Sector
Government sector: Every year UPSC conducts Indian Engineering Services exam for
recruitment to fill up vacancies notified by various departments such as Broadcasting,
Military Engineering Service, Indian Telecom Service, Indian Railways, Wireless
Planningetc. Numbers of vacancies vary year to year.
Entry level engineers with Telecom Operators: All operators recruit thousands on fresh
engineers every year owing to the high growth in telecom market. BSNL recruits of the
order of thousand fresh graduates every year at Junior Telecom Officer level.
Sales Engineers: Many Telecom solutions are very sophisticated and technical. Such
sales need to be handled by telecom engineers.
38
38
Manufacturing Sector: Most of the MNCs have set up factories in India for
manufacturing telecom network equipment as well as Customer premises equipment.
There is enough job potential with these firms.
Support jobs in Non-Telecom sector: In todays scenario, all industries use many
telecom facilities for faster and efficient communication. All such activities require
maintenance professionals. Even in medical sector, growing use of telemedicine has
created a new marketfor telecom professionals.
Research & Development: Many MNCs have outsourced R & D in telecom to Indian
firms.
For example Nokia has outsourced its product design to M/s TCS. All such deals create
jobopportunities for telecom engineers.
IT sector: The core of BPO sector is the telecom network. IT sectors generates huge
telecomjobs.
Education sector: Government of Indias mission mode project on Education such as
Sarva shiksha Abhiyan, connecting all libraries in India, providing broadband to all
schools etc. requires telecom professionals to install and manage this huge network.
National E-Governance Project: The ambitions plan of India to network each nook &
corner of the country and provide a citizen centric, single window service counter
requires creation of vast telecom network across the country. Each State is implementing
State Wide Area Network (SWAN). All such projects create demand for telecom
professionals.
Research executives with Consultancy Firms: Telecom growth impacts a countrys
economy.
Many consultancy firms thrive on generating reports on business models, future potential
andextending guidance to existing and new entrants in telecom market. There is a
significant need for telecom professionals with such firms also.
Pay range: Entry level engineer can get a starting annual package ranging from 2-4 lakh
depending on the nature of job & employer firm.
39
39
Chapter-3
PCM PRINCIPLES
INTRODUCTION
A long distance or local telephone conversation between two persons could be provided
by using a pair of open wire lines or underground cable as early as early as mid of 19th
century. However, due to fast industrial
development
and
an
increased
telephone
awareness, demand for trunk and local traffic went on increasing at a rapid rate. To cater
to the increased demand of traffic between two stations or between two subscribers at the
same station we resorted to the use of an increased number of pairs on either the open
wire alignment, or in underground cable. This could solve the problem for some time
only as there is a limit to the number of open wire pairs that can be installed on one
alignment
due
to
headway
consideration
and
maintenance
problems. Similarly increasing the number of open wire pairs that can be installed on one
alignment due to headway consideration and maintenance problems. Similarly increasing
the number of pairs to the underground
cable
is
uneconomical
and
leads
to
maintenance problems.
It, therefore, became imperative to think of new technical innovations
which could
exploit the available bandwidth of transmission media such as open wire lines or
underground cables to provide more number of circuits on one pair. The technique used
to provide a number of circuits using a single transmission link is called Multiplexing.
MULTIPLEXING TECHNIQUES
There are basically two types of multiplexing techniques
i.
ii
40
40
in substantial saving of bandwidth mid also permits the use of low power amplifiers.
Please refer Fig. 1.
time
division
multiplexing
involves
nothing
more
than
sharing
41
41
a number of channels can be staggered in time as opposed to transmitting all the channel
at the same time as in EDM systems. This staggering of channels in time sequence for
transmission over a common medium is called Time Division Multiplexing (TDM).
Filtering
Sampling
42
42
Quantisation
Encoding
Line Coding
FILTERING
Filters are used to limit the speech signal to the frequency band 300-3400 Hz.
SAMPLING
It is the most basic requirement for TDM. Suppose we have an analogue signal Fig. 3 (b),
which is applied across a resistor R through a switch S as shown in Fig. 3 (a) . Whenever
switch S is closed, an output appears across R. The rate at which S is closed is called the
sampling frequency because during the make periods of S, the samples of the analogue
modulating signal appear across R. Fig. 3(d) is a stream of samples of the input signal
which appear across R. The amplitude of the sample is depend upon the amplitude of the
input signal at the instant of sampling. The duration of these sampled pulses is equal to
the duration for which the switch S is closed. Minimum number of samples are to be sent
for any band limited signal to get a good approximation of the original analogue signal
and the same is defined by the sampling Theorem.
43
43
Sampling Theorem
A complex signal such as human speech has a wide
range of frequency
components with the amplitude of the signal being different at different frequencies. To
put it in a different way, a complex signal will have certain amplitudes for all frequency
components of which the signal is made. Let us say that these frequency components
occupy a certain bandwidth B. If a signal does not have any value beyond this bandwidth
B, then it is said to be band limited. The extent of B is determined by the highest
frequency components of the signal.
Sampling Theorem States
"If a band limited signal is sampled at regular intervals of time and at a rate equal to or
more than twice the highest signal frequency in the band, then the sample contains all the
information of the original signal." Mathematically, if fH is the highest frequency in the
signal to be sampled then the sampling frequency Fs needs to be greater than 2 fH.
i.e. Fs>2fH
Let us say our voice signals are band limited to 4 KHz and let sampling
frequency be 8 KHz.
Time period of sampling Ts =
1 sec
8000
or Ts = 125 micro seconds
If we have just one channel, then this can be sampled every 125 microseconds and
the resultant samples will represent the original signal. But, if we are to sample N
channels one by one at the rate specified by the sampling theorem, then the time available
for sampling each channel would be equal to Ts/N microseconds.
Fig. .4 shows how a number of channels can be sampled and combined.
The channel gates (a, b ... n) correspond to the switch S in Fig. 3. These gates are opened
by a series of pulses called "Clock pulses". These are called gates because, when closed
these actually connect the channels to the transmission medium during the clock period
and isolate them during the OFF periods of the clock pulses. The clock pulses are
staggered so that only one pair of gates is open at any given instant and, therefore, only
one channel is connected to the transmission medium. The time intervals during which
the common transmission medium is allocated to a particular channel is called the Time
Slot for that channel. The width of.this time slot will depend, as stated above, upon the
number of channels to be combined and the clock pulse frequency i.e. the sampling
frequency.
44
44
44
for
signalling
of
all
the
30
chls,
and
one
time
slot
for
are
proportional
to
the
amplitudes
of
the
45
45
45
individual
channels
at
i
FIG 5 : PAM OUTPUT SIGNALS
The original signal for each channel can be recovered at the receive end by
applying gate pulses at appropriate instants and passing the signals through low pass
filters. (Refer Fig. 6)
46
46
47
47
101, Similarly codes are assigned for other samples also. Here the quantizing intervals
are of the same size. This is called Linear Quantizing.
signal.
To
indicate whether a sample is negative with reference to zero or is positive with reference
zero, an extradigitisadded to the binary code. This extra digit is called the "sign bit". In
Fig.8. positive values have a sign bit of '1' and negative values have sign
bit of'0'.
48
48
49
49
Binary Code
Amplitude Range
(mid value)
0-10 mv
5 mv
1000
10-20mv
15mv
1001
20-30 mv
25 mv
1010
30-40 mv
35 mv
1011
40-50 mv
45 mv
1100
12
In linear quantization, equal step means equal degree of error for all input
amplitudes. In other words, the signal to noise ratio for weaker signals will be poorer.
To reduce error, we, therefore, need to reduce step size or in other words,
increase th,e number of steps in the given amplitude range. This would
increase
the transmission
bandwidth
however,
the number of quantum steps and fm is the highest signal frequency. But as we knows
from speech statistics that the probability of occurrence of a small amplitude is much
greater than large one, it seems appropriate to provide more quantum levels (V = low
value) in the small amplitude region and only a few (V = high value) in the region of
higher amplitudes. In this case, provided the total number of specified levels remains
Dept of. EEE
50
unchanged, no increase in transmission bandwidth will be required. This will also try to
bring about uniformity in signal to noise ratio at all levels of input signal. This type of
quantization is called non-uniform quantization.
In practice, non-uniform quantization is achieved using segmented quantization
(also called companding). This is shown in Fig. 9 (a). In fact, there are equal number of
segments for both positive and negative excursions. In order to specify the location of a
sample value it is necessary to know the following :
1.
2.
3.
As seen in Fig. 9 (b), the first two segment in each polarity are collinear, (i.e. the slope is
the same in the central region) they are considered as one segment. Thus the total number
of segment appear to be 13. However, for purpose of analysis all the 16 segments will be
taken into account.
ENCODING
Conversion of quantised analogue levels to binary signal is called encoding. To
represent 256 steps, 8 level code is required. The eight bit code is also called an eight bit
"word".
ABC
Polarity bit 1
for + ve 'O' for - ve.
WXYZ
Segment Code
Linear encoding
in the segment
The first bit gives the sign of the voltage to be coded. Next 3 bits gives the segment
number. There are 8 segments for the positive voltages and 8 for negative voltages. Last
4 bits give the position in the segment. Each segment contains 16 positions.
Referring to Fig. 9(b), voltage Vc will be encoded as 1 111 0101.
It is symmetrical about the origins. Zero level corresponds to zero voltage to be encoded.
It is logarithmatic function approximated by 13 straight segments numbered 0 to 7 in
positive direction and 'O' to 7 in the negative direction. However 4 segments 0, 1, 0, 1
lying between levels + vm/64 -vm/64 being colinear are taken as one segment.
The voltage to be encoded corresponding to 2 ends of successive segments are in the
ratio of 2. That is vm, vm/2, vm/4, vm/8, vm/16, vm/32, vm/64, vm/128 (vm being the
maximum voltage).
There are 128 quantification levels in the positive part of the curve and 128 in the
negative part of the curve.
In a PCM system the channels are sampled one by one by applying the sampling
pulsqs to the sampling gates. Refer Fig. 10. The gates open only when a pulse is applied
to them and pass the analogue signals through them for the duration for which the gates
remain open. Since only one gate will be activated at a given instant, a common encoding
circuit is used for all channels. Here the samples are quantized and encoded. The encoded
samples of all the channels and signals etc are combined in the digital combiner and
transmitted.
53
The reverse process is carried out at the receiving end to retreive the original
analogue signals. The digital combiner combines the encoded samples in the form of
"frames". The digital separator decombines the incoming digital streams into individual
frames. These frames are decoded to give the PAM (Pulse Amplitude Modulated)
samples. The samples corresponding to individual channels are separated by operating
the receive sample gates in the same sequence i.e. in synchronism with the transmit
sample gates.
54
CONCEPT OF FRAME
In Fig. 10, the sampling pulse has a repetition rate of Ts sees and a pulse width of
"St". When a sampling pulse arrives, the sampling gate remains opened during the time
"St" and remains closed till the next pulse arrives. It means that a channel is activated for
the duration "St". This duration, which is the width of the sampling puse, is called the
"time slot" for a given channel.
Since Ts is much larger as compared to St. a number of channels can be sampled
each for a duration of St within the time Ts. With reference to Fig. 10, the first sample of
the first channel is taken by pulse 'a', encoded and is passed on the combiner. Then the
first sample of the second channel is taken by pulse 'b' which is also encoded and passed
on to the combiner, Likewise the remaining channels are also sampled sequentially and
are encoded before being fed to the combiner. After the first sample of the Nth channel is
taken and processed, the second sample of the first channel is taken, this process is
repeated for all channels. One full set of samples for all channel taken within the duration
Ts is called a "frame". Thus the set of all first samples of all channels is one frame; the
set of all second samples is another frame and so on.
As already said in para 5.3.5, Ts in a 30 channel PCM system is 125
microseconds and the signalling information of all the channels is transmitted through a
separate time slot. To maintain synchronization between
the
synchronization
data
ends,
55
Information for providing synchronization between trans and receive ends is passed
through a separate time slot. Usually the slot Ts 0 caries the synchronizsation signals.
This slot is also called Frame alignment word (FAW).
The signalling informatiori is transmitted through time slot Ts 16.
Ts 1 to Ts 15 are utilized for voltage signal of channels 1 to 15 respectively.
Ts 17 to Ts 31 are utilized for voltage signal of channels 16 to 30 respectively.
SYNCHRONIZATION
The output of a PCM terminal will be a continuous stream of bits. At the
receiving end, the receiver has to receive the incoming stream of bits and discriminate
between frames and separate channels from these. That is, the receiver has to recognise
the start of each frame correctly. This operation is called frame alignment or
Synchronization and is achieved by inserting a fixed digital pattern called a "Frame
Alignment Word (FAW)" into the transmitted bit stream at regular intervals. The receiver
looks for FAW and once it is detected, it knows that in next time slot, information for
channel one will be there and so on.
The digits or bits of FAW occupy seven out of eight bits of Ts 0 in the following
pattern.
Bit position of Ts 0
FAW digit value
B1
X
B2
0
B3
1
B4
1
B5
0
B6
1
B7
B8
The bit position B1 can be either '1' or '0'. However, when the PCM system is to
be linked to an international network, the B1 position is fixed at '1'.
The FAW is transmitted in the Ts O of every alternate frame.
Frame which do not contain the FAW, are used for transmitting supervisory and
alarm signals.
To distinguish the Ts 0 of frame carrying supervisory/alarm signals from those carrying
the FAW, the B2 bit position of the former are fixed at T. The FAW and alarm signals are
transmitted alternatively as shown in Table - 2.
56
TABLE-2
Frame
Remark
Numbers
B1
B2
B3
B4
B5
B6
B7
B8
FO
FAW
F1
ALARM
F2
FAW
F3 etc
ALARM
In frames 1, 3, 5, etc, the bits B3, B4, B5 denote various types of alarms. For example, in
B3 position, if Y = 1, it indicate Frame synchronisation alarm. If Y = 1 in B4, it indicates
high error density alarm. When there is no alarm condition, bits B3 B4 B5 are set 0. An
urgent alarm is indicated by transmitting "all ones". The code word for an urgent alarm
would be of the form.
X
111
SIGNALLING IN PCM SYSTEMS
1111
time
slot
16
of each
frame
carries
the
signalling
data
For
carrying
synchronization data for all frames, one additional frame is used. Thus a group of
57
CHAPTER - 4
DIGITAL SWITCHING
Introduction
A Digital switching system, in general, is one in which signals are switched in
digital form. These signals may represent speech or data. The digital signals of several
speech samples are time multiplexed on a common media before being switched through
the system.
To connect any two subscribers, it is necessary to interconnect the time-slots of the two
speech samples which may be on same or different PCM highways. The digitalised
speech samples are switched in two modes, viz., Time Switching and Space Switching.
This Time Division Multiplex Digital Switching System is popularly known as Digital
Switching System.
In this handout, general principles of time and space switching are discussed. A
practical digital switch, comprising of both time and space stages, is also explained.
Time and Space Switching
Generally, a digital switching system several time division
multiplexed (PCM) samples. These PCM samples are conveyed on PCM highways (the
common path over which many channels can pass with separation achieved by time
division.). Switching of calls in this environment , requires placing digital samples from
one time-slot of a PCM multiplex in the same or different time-slot of another PAM
multiplex.
For example, PCM samples appearing in TS6 of I/C PCM HWY1 are transferred to TS18
of O/G PCM HWY2, via the digital switch, as shown in Fig1.
60
60
The interconnection of time-slots, i.e., switching of digital signals can be achieved using
two different modes of operation. These modes are: I. Space Switching
ii. Time switching
Usually, a combination of both the modes is used.
In the space-switching mode, corresponding time-slots of I/C and O/G PCM
highways are interconnected. A sample, in a given time-slot, TSi of an I/C HWY, say
HWY1, is switched to same time-slot, TSi of an O/G HWY, SAY HWY2. Obviously
there is no delay in switching of the sample from one highway to another highway since
the sample transfer takes place in the same time-slot of the PCM frame.
Time Switching, on the other hand, involves the interconnection of different timeslots on the incoming and outgoing highways by re-assigning the channel sequence. For
example, a time-slot TSx of an I/C Highway can be connected to a different time-slot.,
TSy, of the outgoing highway. In other words, a time switch is, basically, a time-slot
changer.
Digital Space Switching
Principle
The Digital Space Switch consists of several input highways, X1, X2,...Xn and
several output highways, Y1, Y2,.............Ym, inter connected by a crosspoint matrix of
n rows and m columns. The individual crosspoint consists of electronic AND gates. The
operation of an appropriate crosspoint connects any channel, a , of I/C PCM highway to
the same channel, a, of O/G PCM highway, during each appropriate time-slot which
occurs once per frame as shown in Fig 2. During other time-slots, the same crosspoint
may be used to connect other channels. This crosspoint matrix works as a normal space
divided matrix with full availability between incoming and outgoing highways during
each time-slot.
Each crosspoint column, associated with one O/G highway, is assigned a column
of control memory. The control memory has as many words as there are time-slot per
frame in the PCM signal. In practice, this number could range from 32 to 1024. Each
crosspoint in the column is assigned a binary address, so that only one crosspoint per
column is closed during each time-slot. The binary addresses are stored in the control
memory, in the order of time-slots. The word size of the control memory is x bits, so that
2x = n, where n is the number of cross points in each column .
A new word is read from the control memory during each time-slot, in a
cyclic order. Each word is read during its corresponding time-slot, i.e.,Word 0
(corresponding to TS0), followed by word 1 (corresponding to TS1) and so on.
The word contents are contained on the vertical address lines for the duration of
the time-slot. Thus, the cross point corresponding to the address, is operated
during a particular time-slot. This cross point operates every time the particular
time-slot appears at the inlet in successive frames. normally, a call may last for
around a million frames.
As the next time-slot follows, the control memory is also advanced by one
step, so that during each new time-slot new corresponding words are read from
the various control memory columns. This results in operation of a completely
different set of cross points being activated in different columns. Depending upon
the number of time-slots in one frame, this time division action increases the
utilisation of cross point 32 to 1024 times compared with that of conventional
space-divided switch matrix.
Illustration
Consider the transfer of a sample arriving in TS7 of I/C HWY X1 to O/G
HWY Y3. Since this is a space switch, there will be no reordering of time i.e., the
sample will be transferred without any time delay, via the appropriate cross point.
In other words, the objective is to connect TS7 of HWY X1 and TS7 of HWY Y3.
The
central
control
(CC)
selects
the
control
memory
column
carried on the input line during this period. Therefore, bit rate on individual
output wires, is reduced to 1/8th of input bit rate=2048/8=256Kb/s
Due to reduced bit rate in parallel mode, the cross point is required to be
operated only for 1/8th of the time required for serial working. It can, thus, be
shared by eight times more channels, i.e., 32 x 8 = 256 channels, in the same
frame.
However, since the eight bits of one TS are carried on eight wires, each
cross point have eight switches to interconnect eight input wires to eight output
wires. Each cross point (all the eight switches) will remain operated now for the
duration of one bit only, i.e., only for 488 ns (1/8th of the TS period of 3.9 s)
location, the CC writes the input time-slot number, viz.,4, in binary. These
contents give the read address for the speech memory, i.e., it indicates the speech
memory locations from which the sample is to be read out, during read cycle.
When the time-slot TS6 arrives, the control memory location 6 is read. Its
content addresses the location 4 of the speech memory in the read mode and
sample is read on to the O/G PCM.
ii.
It may be noticed that the writing in the speech memory is sequential and
independent of the control memory, while reading is controlled by the control
memory, i.e., there is a sequential writing but controlled reading.
Input associated control
Here, the samples of I/C PCM are written in a controlled way, i.e., in
the order specified by control memory, and read sequentially.
Each location of control memory is rigidly associated with the corresponding
TS of I/C PCM and contains the address of TS of O/G PCM to be connected to.
The previous example with the same connection objective of connecting TS4
of I/C PCM to TS6 of O/G PCM may be considered for its restoration. The
location 4 of the control memory is associated with incoming PCM TS4. Hence, it
should contain the address of the location where the contents of TS4 of I/C PCM
are to be written in speech memory. A CC writes the number of the destination
TS, viz., 6 in this case, in location 4 of the control memory. The contents of TS4
are therefore, written in location of speech memory, as shown in fig5.
The contents of speech memory are read in the O/G PCM in a sequential
way, i.e., location 1 is read during TS1, location 2 is read during TS2, and so on.
In this case, the contents of location 6 will appear in the output PCM at TS6. Thus
the input PCM TS4 is switched to output PCM TS6. In this switch, there is
sequential reading but controlled writing.
time-slot. The three switching steps for transfer of speech sample of the calling
party to the called party are as under:
Step 1 Input Time Stage (IT) TS4 HWY0 to TSx HWY0
Step 2 Space stage (S)Tsx HWY0 to Tsx HWY3
Step 3 Output Time Stage (OT)Tsx HWY3 to TS6 HWY3
As the message can be conveyed only in one direction through this
path, another independent path, to carry the massage in the other direction is also
established by the CC, to complete the connection. Assuming the internal timeslots to be TS10 and TS11, the connection may be established as shown in fig 6.
FIG 6 T S T SWITCH
Let us now consider the detailed switching procedure making some more
assumptions for the sake of simplicity. Though practical time switches can handle
256 time-slots in parallel mode, let us assume serial working and that there are
only 32 time-slots in each PCM. Accordingly, the speech and control memories in
time switches and control memory columns in space switch, will contain 32
locations each.
To establish the connection, the CC searches for free internal timeslots. Let us assume that the first available time-slots are TS10 and TS11, as
before. To reduce the complexity of control, the first time stage is designed as
output-controlled switch, whereas the second time stage is input-controlled.
70
70
is stored in
control address sent by CM-IT-0. In the space switch, during this internal TS10,
the cross point 0 in column 3 is enabled, as per the control address sent by column
3 of CM-S, thus, transferring the sample to HWY3. The second time stage is input
controlled and hence, the sample, arriving in TS10, is stored in location 6 of SMOT-3, as per the address sent by the CM-OT-3. This sample is finally, readout
during TS6 of the next frame, thus, achieving the connection objective.
Similarly, the speech samples in the other direction, i.e., from the called
party to the calling party, are transferred using internal TS11. As soon as the call
is over, the CC erases the contents in memory locations 10 and 11 of all the
concerned switches, to stop further transfer of message. These locations and timeslots are, then, avialable to handle next call.
Switching Network Configuration of some Modern Switches
E10B
- T-S-T
EWSD
- T-S-S-S-T
AXE10
- T-S-T
CDOT(MBM)
- T-S-T
5ESS
- T-S-T
OCB 283
-T
72
72
CHAPTER 5
SIGNALLING IN TELECOMMUNICATION
1
Introduction
A telecommunication network establishes and realizes temporary connections, in
accordance with the instructions and information received from subscriber lines and inter
exchange trunks, in form of various signals.
automatic exchanges and is still growing further at a very fast pace, after the advent of
SPC electronic exchanges.
The interchange of signaling information can be illustrated with the help of a typical call
connection sequence. The circled number in Fig. 1 correspond to the steps listed below
i.
ii.
The exchange sends dial-tone to the calling subscriber to indicate to him to start
dialing.
iii.
The called number is transmitted to the exchange, when the calling subscriber
dials the number.
iv.
v.
vi.
The called subscriber indicates acceptance of the incoming call by lifting the
handset
vii.
The exchange recognizing the acceptance terminates the ringing current and the
ring-back tone, and establishes a connection between the calling and called
subscribers.
viii.
The connection is released when either subscriber replaces the handset.When the
called subscriber is in a different exchange, the
following
inter-exchange
trunk. signal functions are also involved, before the call can be set up.
ix
The originating exchange seizes an idle inter exchange trunk, connected to a digit
register at the terminating exchange.
x.
The originating exchange sends the digit. The steps iv to viii are then performed
to set up the call.
Types of Signalling
Subscriber Line signalling
Calling Subscriber Line Signaling
In automatic exchanges the power is fed over the subscribers loop by the centralized
battery at the exchange. Normally, it is 48 V. The power is fed irrespective of the
state of the subscriber, viz., idle, busy or talking.
Call request
When the subscriber is idle, the line impedance is high. The line impedance falls, as soon
as, the subscriber lifts the hand-set, resulting in increase of line current. This is
detected as a new call signal and the exchange after connecting an appropriate
equipment to receive the address information sends back dial-tone signal to the
subscriber.
Address signal
After the receipt of the dial tone signal, the subscriber proceeds to send the address digits.
The digits may be transmitted either by decade dialing or by multifrequency
pushbutton dialling.
1. Decadic Dialling
The address digits may be transmitted as a sequence of interruption of the DC loop by a
rotary dial or a decadic push-button key pad. The number of interruption (breaks)
indicate the digit, exept0, for which there are 10 interruptions. The rate of such
interruptions is 10 per second and the make/break ration is 1:2. There has to be a
inter-digital pause of a few hundred milliseconds to enable the exchange to
74
74
distinguish between consecutive digits. This method is, therefore, relatively slow
and signals cannot be transmitted during the speech phase.
2. Multifrequency Push-button Dialling
This method overcomes the constraints of the decadic dialling. It uses two sets of four
voice frequencies. pressing a button (key), generates a signal comprising of two
frequencies. one from each group. Hence, it is also called Dual-Tone Multifrequency (DTMF) dialling. The signal is transmitted as long as the key is kept
pressed. This provides 16 different combinations. As there are only 10 digits, at
present the highest frequency, viz., 1633 Hz, is not used and only 7 frequencies
are used, as shown in Fig.2.
By this method, the dialling time is reduced and almost 10 digits can be
transmitted per second. As frequencies used lie in the speech band, information
may be transmitted during the speech phase also, and hence, DTMF telephones
can be used as access teminals to a variety of systems, such as computers with
voice output. The tones have been so selected as to minimize harmonic
interference and probability of simulation by human voice.
HIGH FREQUENCY GROUP
1209 Hz
1336 Hz
097 Hz
ABC
2
DEF
3
GHI
4
JKL
5
MNO
6
PRS
7
TUV
8
WXY
9
170 Hz
662 Hz
OPER
0
75
75
the
called
otherwise
inaccessible.
3.
provision
exists,
to
Ring back, tone and ringing current are always transmitted from the called subscriber
local exchange and busy tone and recorded announcements, if any, by the equipment as
close to the calling subscriber as possible to avoid unnecessary busying of equipment and
trunks.
Answer Back Signal
As soon as the called subscriber lifts the handset, after ringing, a battery reversal signal
is transmitted on the line of the calling subscriber. This may be used to operate special
equipment attached to the calling subscriber, e.g., short-circuiting the transmitter of a
CCB, till a proper coin is inserted in the coin-slot.
Release signal
When the calling subscriber releases i.e., goes on hook, the line impedance goes high.
The exchange recognizing this signal, releases all equipment involved in the call. This
signal is normally of more than 500 milliseconds duration.
Permanent Line (PG) Signal
Permanent line or permanent glow (PG) signal is sent to the calling subscriber if he fails
to release the call even after the called subscriber has gone on-hook and the call is
released after a time delay. The PG signal may also be sent, in case the subscriber takes
too long to dial. It is normally busy tone.
Called subscriber line signals.
Ring Signal
On receipt of a call to the subscriber whose line is free, the terminating exchange sends
the ringing current to the called telephone. This is typically 25 or 50Hz with suitable
interruptions. Ring-back tone is also fed back to the calling subscriber by the terminating
exchange.
Answer Signal
When the called subscriber, lifts the hand-set on receipt of ring, the line impedance goes
low. This is detected by the exchange which cuts off the ringing current and ring-back
tone.
Release Signal
If after the speech phase, the called subscriber goes on hook before the calling subscriber,
the state of line impedance going high from a low value, is detected. The exchange sends
a permanent line signal to the calling subscriber and releases the call after a time delay, if
the calling subscriber fails to clear in the meantime.
Register Recall Signal
With the use of DTMF telephones, it is possible to enhance the services, e.g., by dialing
another number while holding on to the call
subscriber. The signal to recall the dialling phase during the talking phase, is called
Register Recall Signal. It consists of interruption of the calling subscribers loop for
duration less than the release signal. it may be of 200 to 320 milliseconds duration.
Inter-exchange Signaling
Inter-exchange signaling can be transmitted over each individual inter exchange
trunk. The signals may be transmitted using the same frequency band as for speech
signals (inband signaling), or using the frequencies outside this band (out-of-band
signaling). The signaling may be
i. Pulsed
The signal is transmitted in pulses. Change from idle condition to one of active states for
a particular duration characterizes the signal, e.g., address information
ii. Continuous
The signal consists of transition from one condition to another, a steady state condition
does not characterizes any
signal.
iii. Compelled
It is similar to the pulsed mode but the transmission is not of fixed duration but condones
till acknowledgement of the receiving unit is received back at the sending unit. It is a
highly reliable mode of signal transmission of complex signals.
Line signals
DC Signaling
The simplest cheapest, and most reliable system of signaling on
trunks, was DC signaling, also known as metallic loop signaling, exactly the same
as used between the subscriber and exchange, i.e.,
i.
subscriber.
ii.
Forward
On
Backward
On
Seizure(off hook)
off
on
on
off/on
Answer(off hook)
off
off
off
on
on
off
FORWARD
BACKWARD
For in band signaling the tone frequency is chosen to be 2600Hz. or 2400 Hz. As
the frequency lies within the speech band, simulation of tone-on condition
indicating end-of call signal by the speech, has to be guarded against, for premature disconnection.
Out-of- Band signaling overcomes the problem of tone on condition imitation by
the speech by selecting a tone frequency of 3825 Hz which is beyond the speech
band. However, this adds up to the hard-ware costs.
5.3.1.3 E & M Signals
E & M lead signaling may be used for signaling on per-trunk basis. An additional
pair of circuit, reserved for signaling is employed. One wire is dedicated to the
forward signals ((M-Wire for transmit or mouth) which corresponds to receive or
R-lead of the destination exchange, and the other wire dedicated to the backward
signals (E-wire for receive or ear) which corresponds transmit or send wire or SLead of the destination exchange. The signaling states are shown in table2.
TABLE 2. E & M SIGNALING STATES
State
Outgoing Exchange
Incoming Exchange
M- lead
M- lead
Idle(On hook)
Earth
FORWARD
Battery
E-lead
Open
Open
Elead
Earth
Open
Earth
Earth
Battery/Earth
Open
seizure(off hook)
Release(On hook)
Earth
Earth/open
BACKWARD
Answer(off hook)
battery
Earth
Battery
Earth
Clear Back
battery
Open
Earth
earth
(On hook)
Blocking
Earth
Earth
Battery
Open
forward
signal
outgoing register
incomming
register
time
2-and-2only
signal recognition
acknowledgement
backward
signal and request for
next signal
time
signal cessation
signal cessation
recognition
recognition
compelled signal
sequence
next forward
signal
acknowledgement
backward signal
Sending
End-to-end signaling
80
80
The signaling is always between the ends of the connection, as the call progresses.
Considering a three exchanges,
A-B-C,
between A-B, then between A-C after the B-C connection is established.
ii.
Link-By-Link signaling
The signaling is always confined to individual links. Hence, initially the signaling
is between A-B, then between B-C after the B-C connection is established.
Generally supervisory (or line) and subscriber signaling is necessarily on link-bylink basis. Address component may be signalled either by end-to-end or link-bylink depending upon the network configuration.
R2 Signalling
CCITT standardized the R2 signaling system to be used on national and
international routes. However, the Indian environment requires lesser number of
signals and hence, a slightly modified version is being used.
There is a provision for having 15 combinations using two out of six frequencies
viz., 1380, 1500, 1620, 1740, 1860 and 1980 Hz, for forward signals and another
15 combination using two out of six frequencies viz., 1140,1020, 900, 780, 660
and 540 Hz, for backward signals. In India, the higher frequency in the forward
group i.e., 1980 Hz, and the lower frequency in the backward group, i.e., 540 hz,
are not used. Thus, there are 10 possible combinations in both the directions. The
weight codes for the combinations used are indicated in Table 3 and the
significance of each signal is indicated in Table 4 and 5.
1380
1500
1620
1740
1860
Backward
1140
1020
900
780
660
f0
f1
f2
f3
f4
Index
Weight Code
1
2
3
4
5
6
7
1+2
0+4
1+4
2+4
0+7
Digit3
Digit4
Digit5
Digit6
Digit7
8
9
10
1+7
2+7
4+7
Digit8
Digit9
Digit0
Signal
Signal
No.
1
Weight
Code
0+1
2
3
0+2
1+2
0+4
5
6
1+4
2+4
7
0+7
Send last but 1 digit
8
1+7
Send last but 2 digit
9
2+7
Send last but 3 digit
10
4+7
Spare
Note : Signals A2, and A7 to A9 are used in Tandem working only.
It can be seen from the tables that
Group II
Ordinary subscriber
Subscriber
with
priority Test / Mtce,
equipment
Spare
STD Barred
Spare
CCB
Changed Number to
Operator
Closed Number
Closed Number
Spare
Group B
Called line free with out
metering
Changed number
Called line busy
Local congestion
Number unobtainable
called line fee, with
metering
Route congestion
Spare
Route Breakdown
Malicious call blocking
1. Forward signals are used for sending the address information of the called
subscriber, and category and address, information of the calling subscriber.
2. Backward signals are used for demanding address information and
callers
exception and semi-compelled scheme may only be used due to long propagation
time.
Register signals may be transmitted on end-to-end basis. It is a self checking
system. Each signal is acknowledgement appropriately at the other end after the
receiver checks the presence of only 2 and only 2 out of 5 proper frequencies.
An example of CSMF signaling between two exchanges may be illustrated
by considering a typical case. The various signals interchanged after seizure of the
circuit using DC signaling are
1.
2.
4.
5.
digit.
6.
7.
On receipt of last digit, the terminating exchange carries out group and line
selection and then sends A3, indicating switching over to group B signals.
8.
category again.
9.
In response to B6, the originating exchanges switches through the speech path and
released and appropriate tone is fed to the calling subscriber by the originating
exchange.
3
Digital Signalling
All, the systems discussed so far, basically, are on per line or per trunk basis, as
the signals are carried on the same line or trunk. With the emergence of PCM
systems, it was possible to segregate the signaling from the speech channel.
Inter exchange signalling can be transmitted over a channel directly associated
with the speech channel, channel-associated signalling (CAS) ,
or
over a
Bit Value
Backward.
Forward
af
Idle
Seizure
Seizure acknowledge
Answer
Clear Forward
Clear Back
1
0
0
0
1
0
bf
0
0
0
0
0
0
ab
1
1
1
0
0/1
1
bb
0
0
1
1
1
1
Introduction
Communication
networks
generally
connect
two
subscriber
terminating
equipment units together via several line sections and switches for message
exchange (e.g. speech, data, text or images). Control information has to be
transferred between the exchanges for call control and for the use of facilities. In
analog communication networks, channel-associated signaling systems have so far
been used to carry the control information. Fault free operation is guaranteed with
the channel-associated signaling systems in analog communication networks, but
the systems
do not
meet
requirements
in
digital,
processor-controlled
- radio relay
- satellite (up to 2 satellite links)
use of the transfer rate of 64 Kbit/s typical in digital networks.
used also for lower bit rates and for analog signalling links if necessary.
automatic supervision and control of the signalling network.
2.
2.1
Signalling Network
A distinction is made between signalling points (SP) and signalling transfer points
(STP).
The SPs are the sources (originating points) and the sinks (destination points) of
signalling traffic. In a communication network these are primarily the exchanges.
The STPs switch signalling messages received to another STP or to a SP on the
basis of the destination address. No call processing of the signalling messages
Signalling Modes
Two different signalling modes can be used in the signalling networks for CCS7,
viz. associated mode and quasi-associated mode.
In the associated mode of signalling, the signalling link is routed together with
the circuit group belonging to the link. In other words, the signalling link is
directly connected to SPs which are also the terminal points of the circuit group
(See Fig.2). This mode of signalling is recommended when the capacity of the
traffic relation between the SPs A and B is heavily utilized.
(b) Signalling data links, e.g. 64 kbit/s digital or 4.8 kbit/s analog
(c) Safety requirements
- load sharing between signalling links
- diverting the signalling traffic to alternative routes in event of faults.
- error correction
(d) Adjacent traffic relations
The signalling functions in CCS7 are distributed among the following parts :
- message transfer part (MTP)
- function specific user parts (UP)
The MTP represents a user-neutral means of transport for messages between the
users. The term user is applied here for all functional units which use the transport
capability of the MTP.
Each user part encompasses the functions, protocols and coding for the signalling
via CCS7 for a specific user type (e.g. telephone service, data service, ISDN). In
this way, the user parts control the set-up and release of circuit connections, the
processing of facilities as well as administration and maintenance functions for the
circuits.
The functions of the MTP and the UP of CCS7 are divided into 4 levels. Levels to
3 are allotted to the MTP while the UPs form level 4 .
The message transfer part (MTP) is used in CCS7 by all user parts (UPs) as a
transport system for message exchange. Messages to be transferred from one UP
to another are given to the MTP (See Fig.5). The MTP ensures that the messages
reach the addressed UP in the correct order without information loss, duplication
or sequence alteration and without any bit errors.
4.
Functional Levels
Level 2 (Signalling Link) defines the functions and procedures for a correct
exchange of user messages via a signalling link. The following functions must be
carried out at level 2 :
- delimitation of the signal units by flags.
- elimination of superfluous flags.
- error detection using check bits.
- error correction by re-transmitting signal units.
- error rate monitoring on the signalling data link.
90
90
signalling links. A distinction is made between the two following functional areas
:
- message handling, i.e. directing the messages to the desired signalling line, or to
the correct UP.
- signalling network management, i.e. control of the message traffic, for example,
by means of changeover of signalling links if a fault is detected and changeback to
normal operation after the fault is corrected.
The various functions of level 3 operate with one another, with functions of other
levels and with corresponding functions of other signalling of other SPs.
5.
Backward Indicator Bit (BIB) : (1 bit) The BIB is needed during general
error correction. With this bit, faulty SUs are requested to be retransmitted for
error correction.
5.5
Forward Indicator Bit (FIB) : (1 bit) The FIB is needed during general
error correction. It indicates whether a SU is being sent for the first time or
whether it is being retransmitted.
5.7
the three SUs. It gives the number of octets between the check-bit (CK) field and
the LI field. The LI field contains different values according to the type of SU; it
is 0 for FISU, 1 or 2 for LISU and is greater than 2 for MSU.
The maximum value in the length indicator fields is 63 even if the signalling
information field (SIF) contains more than 63 octets.
92
92
5.8
Check bits (CK) : (16 bits) The CKs are formed on the transmission side
from the contents of the SU and are added to the SUs as redundancy. On the receive side,
the MTP can determine with the CKs whether the SU was transferred without any errors.
The SUs acknowledged as either positive or faulty on the basis of the check.
5.9 Fields specific to MSUs :
5.9.1 Service Information Octet (SIO) : (8 bits) It contains the Service
Indicator (SI, 4 bits) and Subservice field (SSF, 4 bits) whose last 2 bits are Network
Indicator (NI).
An SI is assigned to each user of the MTP. It informs the MTP which UP has sent
the message and which UP is to receive it. Four SI bits can define 16 UPs (3-SCCP, 4TUP, 5-ISUP, 6-DATAUP, 8-MTP test, etc.). The NI indicates whether the traffic is
international (00,01) or national (10,11). In CCS7 a SP can belong to both national and
international network at the same time. So SSF field indicate where the SP belongs.
5.9.2
actual user message. The user message also includes the address (routing label, 40 bits)
of the destination to which the message is to be transferred. The maximum length of the
user message is 62 octets for national and 272 octets for international networks (one octet
= 8 bits). The format and coding of the user message are separately defined for each UP.
5.10 Fields Specific to LSSUs
5.10.1 Status Field (SF) : (1 to 2 octets) It contains status indications for the
alignment of the transmit and receive directions. It has 1 or 2 octets, out of which only 3
bits of first octet are defined by CCITT, indicating out (000), normal (001), Emergency
(010) alignments, out-of-service (011), Local processor outage (100) status, etc.
5.10.2 Addressing of the SUs (in SIF)
A code is assigned to each SP in the signalling network according to a numbering
plan. The MTP uses the code for message routing. The destination of a SU is specified in
a routing label. The routing label is a component of every user message and is transported
in the SIF. The routing label in a MSU consists of the following (See Fig. 7).
93
93
5.10.3 Destination Point Code (DPC) : (14 bits) identifies the SP to which this
message is to be transferred.
5.10.4 Originating Point Code (OPC) : (14 bits) specifies the SP from which
the message originates.
The coding of OPC and DPC is pure binary and using 14 bits linear encoding, it is
possible to identify 16,384 exchanges. The number of exchanges in DOT network having
CCS7 capability are expected to be within this limit.
5.10.5 Signalling Link Selection (SLS) field : (4 bits) The contents of the SLS field
determine the signaling route (identifying a particular signalling link within s link set or
link sets) along which the message is to be transmitted. In this way, the SLS field is used
for load sharing on the signalling links between two SPs.
The SIO contains additional address information. Using the SI, the destination
MTP identifies the UP for which the message is intended. The NI, for example, enables a
message to be identified as being for national or international traffic.
LSSUs and FISUs require no routing label as they are only exchanged between
level 2 of adjacent MTPs.
The message sent from a user to the MTP for transmission contains : the user
information, the routing label, the SI, the NI and a LI. The processing of a user message
to be transmitted in the MTP begins in level 3 (See Fig.8).
The MTP is responsible for (a) transmitting, (b) receiving SUs, (c) for correcting
transmission errors, (d) for the signalling network management, and (e) for the alignment.
Its functions are spread over the functional levels 1, 2 and 3.
5.11
The message routing (level 3) determines the signalling link on which the
user message is to be transmitted. To do this, it analyzes the DPC and the SLS field in the
routing label of the user message, and then transfers the message to the appropriate
signalling link (level 2).
5.12
The transmission control (level 2) assigns the next FSN and the FIB to
the user message. In addition, it includes the BSN and the BIB as an acknowledgement
for the last received MSU. The transmission control simultaneously enters the part of the
MSU formed so far in the transmission and retransmission buffers. All MSUs to be
transmitted are stored in the retransmission buffer until their fault-free reception is
acknowledged by the receive side. Only then are they deleted.
5.13
The check bit and flag generator (level 2) generates CKs for
safeguarding against transmission errors for the MUS and sets the flag for separating the
SUs. In order that any section of code identical to the flag (01111110) occurring by
chance is not mistaken for the flag, the user messages are monitored before the flag is
94
94
added to see if five consecutive ones (1) appear in the message. A zero (0) is
automatically inserted after five consecutive 1s. On the receive side, the zero following
the five 1s is then automatically removed and the user message thereby regains its
original coding.
The check-bit and flag generator transfers a complete MSU to level 1. In level 1,
the MUS is sent on the signalling data link.
The bit stream along a signalling data link is received in level 1 and transferred to
level 2. Flag detection (level 2) examines the received bit stream for flags. The bit
sequence between two flags corresponds to one SU. The alignment detection (level 2)
monitors the synchronism of transmit and receive sides with the bit pattern of the flags.
95
95
Using the CKs transmitted, error detection (level 2) checks whether the SU was
correctly received. A fault-free SU is transferred to the receive control, while a
faulty SU is discarded. The reception of a faulty SU is reported to error rate
monitoring, in order to keep a continuous check on the error rate on the receive
side of the signalling link. If a specified error rate is exceeded, this is reported to
the signalling link status control by error rate monitoring. The signalling link status
control then takes the signalling link out of service and sends a report to level 3.
5.14
the expected FSN and the expected FIB. If this is the case and if it is a MSU, the
receive control transfers the user message to level 3 and causes the reception of
the MSU to be positively acknowledged. If the FSN of the transferred MSU does
not agree with that expected, the receive control detects a transmission error and
causes this and all subsequent MSU to be retransmitted (see subheading
"Correction of Transmission Errors").
5.15
96
96
signalling links. It receives the messages concerning the alignment and status of
the individual signalling links, or concerning operating irregularities and effects
any changes in status which may be necessary. In addition, the signalling link
management controls the putting into service of signalling links, including initial
alignment and automatic realignment of signalling links after failures or alignment
losses due to persistent faults. If necessary, the signalling link management
transfers messages to the signalling traffic management or receives instructions
from there.
(b)
signalling traffic from faulty signalling links or routes to fault-free signalling links
or routes. It also controls the load distribution on the signalling links and routes.
To achieve this, it can initiate the following actions :
- changeover; on failure of a signalling link the signalling traffic management
switches the signalling traffic from the failed signalling link to a fault-free
signalling link.
- changeback; when signalling link becomes available again after a fault has been
corrected, the signalling traffic management reverse the effect of the changeover.
- rerouting; when SP can no longer be reached on a normal route, the signalling
traffic management diverts the signalling traffic to a predefined alternative route.
When overloading occurs, the signalling traffic management sends messages to
the users in its own SP in order that they reduce the load. The management also
informs the adjacent SPs of the overloading in its own SP and requests them to
also reduce the load.
The signalling traffic management accomplishes its functions by
- receiving messages from the signalling link and signalling route management.
97
97
98
98
7.
MTP users
7.1.
Use of CCS7 for telephone call control signalling requires (i) application of TUP
functions, in combination with (ii) application of an appropriate set of MTP
functions. The TUP is one of level 4 users in CCS7. It is specified with the aim of
providing the same features for telephone signalling as other telephone signalling
systems. It exchanges signalling messages through MTP. Signalling messages
contain information relating to call set up and conditions of speech path. The TUP
message consists of SIF and a SIO. These signalling information are generated by
the TUP of the originating exchange. The label is 40 bits long, comprises DPC,
OPC and CIC. CIC indicates one of the speech circuit connecting the destination
and originating points. Level 3 identifies the user to which a message belongs by
SIO, which comprises a SI and SSF. For TUP SI value is 4. The SSF distinguishes
the signalling message is for national or international network.
7.2 Integrated Services Digital Network User Part
The ISDN-UP covers the signalling functions for the control of calls, for the
processing of services and facilities and for the administration of circuits in ISDN.
The ISDN-UP has interface to the MTP and the SCCP for the transport of MSUs.
The ISDN-UP can use SCCP functions for end-to-end signalling.
CCITT SIGNALLING SYSTEM NO. 7 :
INTEGRATED SERVICES DIGITAL NETWORK USER PART
7.2.1
The integrated services digital network user part (ISUP) is the protocol which
provides the signalling functions required by CCITT No. 7 signalling to support
basic bearer services and supplementary services for voice and non-voice
applications in an Integrated Services Digital Network (ISDN).
The ISUP is suited for application in dedicated telephone and circuit-switched
data networks and in analogue and moved analogue/digital networks. In particular,
the ISUP meets the requirements defined by the CCITT for world-wide
International semiautomatic and automatic telephone and circuit-switched data
traffic.
The ISUP can be used for national and international applications. The signalling
procedures, information elements and message type specified are for both
applications. Coding space has been reserved to allow national administrations
and recognized private operating agencies to introduce network specific signalling
messages and elements of information within the protocol structure.
99
99
The ISUP makes use of the services provided by the messages transfer part (MTP)
(1) and, in some cases, by the signalling connection control part (SCCP0 of
CCITT No.7 signalling for the transfer of information between ISDN user parts.
7.2.2
The ISUP protocol supports the basic bearer service; that is the establishment,
supervision and release of 64 kbit/s circuit-switched network connections between
customer line exchange terminations.
In addition to the basic bearer service the ISUP is expected to support (in the 1988
Recommendations) the following supplementary services :
Calling line identification (presentation and restriction).
Call forwarding,
Closed user group,
Direct dialling-in, and
User-to-user signalling.
Signaling Connection Control Part
Introduction: The SCCP function is covered in ITU-T recommendations Q.711 to
Q.714 and Q.716. The signalling connection control part provides additional functions to
message transfer part for transfer of circuit related and non-circuit related signalling
information and other type of information between exchanges and other specialized
centrals in telecommunications network via SS#7 networks. The overall objective of
SSCP is to provide means for:
A transfer capability for signalling data units with or without the use of logical signalling
connections.
A logical signalling connection between two SCCP users with the SS#7 network.
Enhanced addressing capabilities.
The following figure illustrates the SCCP position in the SS#7 hierarchy:
100
1001
The functions of SCCP are used for handling transactions required by TCAP and
also for transfer of circuit related and call related signalling information for ISDN
UP with or without set up of end-to-end logical signalling connections.
The SCCP relies on the MTP to route the signalling information from one node to
another node. For this, it interacts with the user parts and with the MTP.
Primitives are used to convey information between the levels. Primitives are
nothing but set of commands and their respective responses associated with the
services requested of the SCCP.
SCCP and OSI model
The SCCP enhances the services of MTP to provide the functional equivalent of
Network layer (i.e. layer #3 of OSI model). The MTP and the SCCP together is
also referred to as Network Service Part (NSP).
SCCP Addressing
The addressing capability of MTP is limited to delivering the message to a node
(identified by Network indicator and DPC) and to distribute it to a user using four
bit service indicator (octet SIO ). SCCP supplements this capability by providing
an addressing capability that uses DPC + SSN .The SSN is a local addressing
information used by SCCP to identify each of the SCCP users at a node.
SCCP provides enhanced addressing capability to MTP to enable it to address
messages with Global Title (GT). A Global Title is an address that does not
explicitly contain information usable for routing by MTP.
SC
CP
Addressin
g
101
1011
connectionless services are all that is used in todays networks. Classes 2 and 3 are
used for connection-oriented services, for example by ISDNUP and, even though
well-defined, are not used in todays network.
The SCCP is divided into four functional units:
SCCP routing control (SCRC).
SCCP connectionless control (SCLC).
SCCP connection-oriented control.
SCCP management control (SCMG).
104
1041
ASE1
TC-primitives
TCAP-A
Component
TCAP messages
ASE2
TC primitives
TCAP-B
N-primitives
N-primitive
SCCP-A
SCCP-B
MTP-primitives
MTP-primitives
MTP-A
MTP-B
MSUs
105
1051
CHAPTER - 6
telegraph invented by French inventor Claude Chappe. In 1880, Alexander Graham Bell
patented an optical telephone system, which he called the Photophone. However, his
earlier invention, the telephone, was more practical and took tangible shape.
By 1964, a critical and theoretical specification was identified by Dr. Charles K.
Kao for long-range communication devices, the 10 or 20 dB of light loss per kilometer
standard. Dr. Kao also illustrated the need for a purer form of glass to help reduce light
loss. By 1970 Corning Glass invented fiber-optic wire or "optical waveguide fibers"
which was capable of carrying 65,000 times more information than copper wire, through
which information carried by a pattern of light waves could be decoded at a destination
even a thousand miles away. Corning Glass developed an SMF with loss of 17 dB/km at
633 nm by doping titanium into the fiber core. By June of 1972, multimode germaniumdoped fiber had developed with a loss of 4 dB per kilometer and much greater strength
than titanium-doped fiber. Prof. Kao was awarded half of the 2009 Nobel Prize in Physics
for "groundbreaking achievements concerning the transmission of light in fibers for
optical communication". In April 1977, General Telephone and Electronics tested and
deployed the world's first live telephone traffic through a fiber-optic system running at 6
Mbps, in Long Beach, California. They were soon followed by Bell in May 1977, with an
optical telephone communication system installed in the downtown Chicago area,
covering a distance of 1.5 miles (2.4 kilometers). Each optical-fiber pair carried the
equivalent of 672 voice channels and was equivalent to a DS3 circuit. Today more than
80 percent of the world's long-distance voice and data traffic is carried over optical-fiber
cables.
2.0
Fiber-Optic Applications
FIBRE OPTICS: The use and demand for optical fiber has grown tremendously
between central office switches at local levels, and sometimes as far as the neighborhood
or individual home (fiber to the home [FTTH]).
Optical fiber is also used extensively for transmission of data. Multinational firms
need secure, reliable systems to transfer data and financial information between buildings
to the desktop terminals or computers and to transfer data around the world. Cable
television companies also use fiber for delivery of digital video and data services. The
high bandwidth provided by fiber makes it the perfect choice for transmitting broadband
signals, such as high-definition television (HDTV) telecasts. Intelligent transportation
systems, such as smart highways with intelligent traffic lights, automated tollbooths, and
changeable message signs, also use fiber-optic-based telemetry systems.
Another important application for optical fiber is the biomedical industry. Fiber-optic
systems are used in most modern telemedicine devices for transmission of digital
diagnostic images. Other applications for optical fiber include space, military,
automotive, and the industrial sector.
3.0
4.0
(2)
Signals. (3)
(4)
Signals. (5)
-
Repeater spacing increases along with operating speeds because low loss
fibres are used at high data rates.
Fig. 1
5.0
Principle of Operation - Theory
Total Internal Reflection - The Reflection that Occurs when a Ligh Ray Travelling in One
Material Hits a Different Material and Reflects Back into the Original Material without
any Loss of Light.
Fig. 2
Speed of light is actually the velocity of electromagnetic energy in vacuum such as space.
Light travels at slower velocities in other materials such as glass. Light travelling from one
material to another changes speed, which results in light changing its direction of
travel. This deflection of light is called Refraction.
The amount that a ray of light passing from a lower refractive index to a higher one is bent
towards the normal. But light going from a higher index to a lower one refracting
away from the normal, as shown in the figures.
Angle of incidence
2
Light is bent
away from
normal
n1
n1
n2
n2
Angle of
reflectio
n
n1
2
n2
Fig. 3
As the angle of incidence increases, the angle of refraction approaches 90o to the normal.
The angle of incidence that yields an angle of refraction of 90o is the critical angle. If the
angle of incidence increases amore than the critical angle, the light is totally reflected back
into the first material so that it does not enter the second material. The angle of
incidence and reflection are equal and it is called Total Internal Reflection.
6.0
The optical fibre has two concentric layers called the core and the cladding. The inner
core is the light carrying part. The surrounding cladding provides the difference refractive
index that allows total internal reflection of light through the core. The index of the
cladding is less than 1%, lower than that of the core. Typical values for example are a core
refractive index of 1.47 and a cladding index of 1.46. Fibre manufacturers control this
difference to obtain desired optical fibre characteristics. Most fibres have an additional
coating around the cladding. This buffer coating is a shock absorber and has no optical
properties affecting the propagation of light within the fibre. Figure shows the idea of
light travelling through a fibre. Light injected into the fibre and striking core to cladding
interface at grater than the critical angle, reflects back into core, since the angle of
incidence and reflection are equal, the reflected light will again be reflected. The light
will continue zigzagging down the length of the fibre. Light striking the interface at less
than the critical angle passes into the cladding, where it is lost over distance. The cladding
is usually inefficient as a light carrier, and light in the cladding becomes attenuated fairly.
Propagation of light through fibre is governed by the indices of the core and cladding by
Snell's law.
Such total internal reflection forms the basis of light propagation through a optical
fibre. This analysis consider only meridional rays- those that pass through the fibre
axis each time, they are reflected. Other rays called Skew rays travel down the fibre
without passing
through the axis. The path of a skew ray is typically helical wrapping around and
around the central axis. Fortunately skew rays are ignored in most fibre optics analysis.
The specific characteristics of light propagation through a fibre depends on many factors,
including
-
Jacket
Cladding
Core
Cladding (n
2)
Cladding
Core (n2)
Jacket
Light at less than
critical angle is
absorbed in
jacket
Angle of Angle of
incidence reflection
Light is propagated by
total internal reflection
7.0
Geometry of Fiber
A hair-thin fiber consist of two concentric layers of high-purity silica glass the
core and the cladding, which are enclosed by a protective sheath as shown in Fig. 5. Light
rays modulated into digital pulses with a laser or a light-emitting diode moves along the
core without penetrating the cladding.
1101
101
development of new lasers and diodes, may one day allow commercial fiber-optic
networks to carry trillions of bits of data per second.
The diameters of the core and cladding are as follows.
125 8
Core ( m)
Cladding ( m)
125
50
125
62.5
125
100
140
125 62.5
125 50
125 100
Core
Cladding
Typical Core and Cladding Diameters
Fibre sizes are usually expressed by first giving the core size followed by the cladding
size. Thus 50/125 means a core diameter of 50 m and a cladding diameter of 125 m.
8.0
FIBRE TYPES
The refractive Index profile describes the relation between the indices of the core
and cladding. Two main relationship exists :
(I)
Step Index
(II)
Graded Index
The step index fibre has a core with uniform index throughout. The profile shows a sharp
step at the junction of the core and cladding. In contrast, the graded index has a
non- uniform core. The Index is highest at the center and gradually decreases until it
matches with that of the cladding. There is no sharp break in indices between the core and
the cladding.
By this classification there are three types of fibres :
(I)
fibre)
(II)
fibre) (III)
Fibre)
8.1
diameter. As a result, some of the light rays that make up the digital pulse may travel a
direct route, whereas others zigzag as they bounce off the cladding. These alternative
pathways cause the different groupings of light rays, referred to as modes, to arrive
separately at a receiving point. The pulse, an aggregate of different modes, begins to
spread out, losing its well-defined shape. The need to leave spacing between pulses to
prevent overlapping limits bandwidth that is, the amount of information that can be sent.
Consequently, this type of fiber is best suited for transmission over short distances, in an
endoscope, for instance.
refractive index diminishes gradually from the center axis out toward the cladding. The
higher refractive index at the center makes the light rays moving down the axis advance
more slowly than those near the cladding.
SINGLE-MODE FIBER has a narrow core (eight microns or less), and the
index of refraction between the core and the cladding changes less than it does
for multimode fibers. Light thus travels parallel to the axis, creating little pulse
dispersion. Telephone and cable television networks install millions of kilometers
of this fiber every year.
9.0
Wavelength.
(II)
Frequency.
(III)
Window.
(IV)
Attenuation.
(V)
Dispersion.
(VI)
Bandwidth.
9.1
WAVELENGTH
It is a characterstic of light that is emitted from the light source and is measures in
nanometers (nm). In the visible spectrum, wavelength can be described as the colour of
the light.
For example, Red Light has longer wavelength than Blue Light, Typical wavelength for
fibre use are 850nm, 1300nm and 1550nm all of which are invisible.
9.2
FREQUENCY
It is number of pulse per second emitted from a light source. Frequency is measured in
units of hertz (Hz). In terms of optical pulse 1Hz = 1 pulse/ sec.
9.3
WINDOW
A narrow window is defined as the range of wavelengths at which a fibre best
operates. Typical windows are given below :
9.4
Window
Operational Wavelength
800nm - 900nm
850nm
1250nm - 1350nm
1300nm
1500nm - 1600nm
1550nm
ATTENUATION
Attenuation is defined as the loss of optical power over a set distance, a fibre with lower
attenuation will allow more power to reach a receiver than fibre with higher attenuation.
Attenuation may be categorized as intrinsic or extrinsic.
9.4.1
INTRINSIC ATTENUATION
It is loss due to inherent or within the fibre. Intrinsic attenuation may occur as
Absorption - Natural Impurities in the glass absorb light energy.
Light
Ray
Scattering - Light Rays Travelling in the Core Reflect from small Imperfections
L ig ht
R ay
Fig. 10 Scattering
9.4.2
EXTRINSIC ATTENUATION
Macrobending - The fibre is sharply bent so that the light travelling down
the fibre cannot make the turn & is lost in the cladding.
BANDWIDTH
It is defined as the amount of information that a system can carry such that each pulse of
light is distinguishable by the receiver.
System bandwidth is measured in MHz or GHz. In general, when we say that a system
has bandwidth of 20 MHz, means that 20 million pulses of light per second will travel
down the fibre and each will be distinguishable by the receiver.
9.6
NUMBERICAL APERTURE
Numerical aperture (NA) is the "light - gathering ability" of a fibre. Light injected into
the fibre at angles greater than the critical angle will be propagated. The material NA
relates to the refractive indices of the core and cladding.
NA = n12 - n22
where n1 and n2 are refractive indices of core and cladding respectively.
NA is unitless dimension. We can also define as the angles at which rays will be
propagated by the fibre. These angles form a cone called the acceptance cone, which
gives the maximum angle of light acceptance. The acceptance cone is related to the NA
NA
where
sin
is the half angle of acceptance
The NA of a fibre is important because it gives an indication of how the fibre accepts and
propagates light. A fibre with a large NA accepts light well, a fibre with a low NA
requires highly directional light.
In general, fibres with a high bandwidth have a lower NA. They thus allow fewer modes
means less dispersion and hence greater bandwidth. A large NA promotes more modal
dispersion, since more paths for the rays are provided NA, although it can be defined for
a single mode fibre, is essentially meaningless as a practical characteristic. NA in a
DISPERSION
Dispersion is the spreading of light pulse as its travels down the length of an optical fibre
as shown in figure 13. Dispersion limits the bandwidth or information carrying capacity
of a fibre. The bit-rates must be low enough to ensure that pulses are farther apart and
therefore the greater dispersion can be tolerated.
There are three main types of dispersion in a fibre (I)
Modal Dispersion
(II)
Material dispersion
(III)
Waveguide dispersion
Fig. 13 Dispersion
9.8
A bandwidth of 400 MHz -km means that a 400 MHz-signal can be transmitted for 1 km.
It means that the product of frequency and the length must be 400 or less. We can send a
lower frequency for a longer distance, i.e. 200 MHz for 2 km or 100 MHz for 4 km.
Multimode fibres are specified by the bandwidth-length product or simply bandwidth.
Single mode fibres on the other hand are specified by dispersion, expressed in ps/km/nm.
In other words for any given single mode fibre dispersion is most affected by the source's
spectral width. The wider the source spectral width, the greater the dispersion.
Conversion of dispersion to bandwidth can be approximated roughly by the following
equation.
0.187
BW
Disp
SW
So the spectral width of the source has a significant effect on the performance of a single
mode fibre.
9.9
OPTICAL WINDOWS :
Attenuation of fibre for optical power varies with the wavelengths of light. Windows are
low-loss regions, where fiber carry light with little attenuation. The first generation of
optical fibre operated in the first window around 820 to 850 nm. The second window is
the zero-dispersion region of 1300 nm and the third window is the 1550 nm region as
shown in figure 14.
environmental loading. Buffer tubes are stranded around a dielectric or steel central
member, which serves as an anti-buckling element.
The cable core, typically uses aramid yarn, as the primary tensile strength
member. The outer polyethylene jacket is extruded over the core. If armoring is required,
a corrugated steel tape is formed around a single jacketed cable with an additional jacket
extruded over the armor.
Loose-tube cables typically are used for outside-plant installation in aerial, duct
and direct-buried applications.
Here are some common fiber cables types are given below:
10.2. 1 Distribution Cable
Distribution Cable (compact building cable) packages individual 900 m buffered
fiber reducing size and cost. The connectors may be installed directly on the 900 m
buffered fiber at the breakout box location.
removed leaving the inner cable suitable for any indoor/outdoor use. (Temperature rating
-40C to +85C)
Optical Fibre
(II)
Buffer
(III)
Strength member
(IV)
Jacket
Function
Material
Buffer
Facilitate Stranding
Central Member
Temperature Stability
Steel, Fibreglass
Anti-Buckling
Primary Strength
Member
Cable Jacket
Tensile Strength
Contain and Protect
Cable Core
Abrasion Resistance
Cable Filling
Prevent Moisture
Water Blocking
Compound
Compound
Armoring
11.0
Rodent Protection
Crush Resistance
Steel Tape
Cables come reeled in various length, typically 1 to 2 km, although lengths of 5 or 6 kms
are available for single mode fibres. Long lengths are desirables for long distance
applications, since cable must be spliced end to end over the run. Each splice introduce
additional loss into the system. Long cable lengths mean fewer splices and less loss.
12.1
1.
2.
Mechanical splicing.
3.
Fusion splicing.
Mechanical Splicing
This technique is mainly used for temporary splicing in case of emergency
repairing. This method is also convenient to connect measuring instruments to bare fibres
for taking various measurements.
The mechanical splices consist of 4 basic components :
(i)
(ii)
A retainer
(iii)
(iv)
A protective housing
A very good mechanical splice for M.M. fibres can have an optical performance
as good as fusion spliced fibre or glue spliced. But in case of single mode fibre, this type
of splice cannot have stability of loss.
12.3
Fusion Splicing
The fusion splicing technique is the most popular technique used for achieving
very low splice losses. The fusion can be achieved either through electrical arc or through
gas flame.
The process involves cutting of the fibres and fixing them in micropositioners on
the fusion splicing machine. The fibres are then aligned either manually or automatically
core aligning (in case of S.M. fibre) process. Afterwards the operation that takes place
involve withdrawal of the fibres to a specified distance, preheating of the fibre ends
through electric arc and bringing together of the fibre ends in a position and splicing
through high temperature fusion.
If proper care taken and splicing is done strictly as per schedule, then the splicing
loss can be minimized as low as 0.01 dB/joint. After fusion splicing, the splicing joint
should be provided with a proper protector to have following protections:
(a)
Mechanical protection
(b)
Sometimes the two types of protection are combined. Coating with Epoxy resins
protects against moisture and also provides mechanical strength at the joint.
Nowadays, the heat shrinkable tubes are most widely used, which are fixed on
the joints by the fusion tools.
The fusion splicing technique is the most popular technique used for achieving
very low splice losses. The introduction of single mode optical fibre for use in long haul
network brought with it fibre construction and cable design different from those of
multimode fibres.
The splicing machines imported by BSNL begins to the core profile alignment
system, the main functions of which are :
(1)
(2)
(3)
(4)
The two fibres ends to be spliced are cleaved and then clamped in accurately
machined veegrooves. When the optimum alignment is achieved, the fibres are fused
under the microprocessor contorl, the machine then measures the radial and angular off
sets of the fibres and uses these figures to calculate a splice loss. The operation of the
machine observes the alignment and fusion processes on a video screens showing
horizontal and vertical projection of the fibres and then decides the quality of the splice.
The splice loss indicated by the splicing machine should not be taken as a final
value as it is only an estimated loss and so after every splicing is over, the splice loss
measurement is to be taken by an OTDR (Optical Time Domain Reflectometer). The
manual part of the splicing is cleaning and cleaving the fibres. For cleaning the fibres,
Dichlorine Methyl or Acetone or Alcohol is used to remove primary coating.
With the special fibre cleaver or cutter, the cleaned fibre is cut. The cut has to be
so precise that it produces an end angle of less than 0.5 degree on a prepared fibre. If the
cut is bad, the splicing loss will increase or machine will not accept for splicing. The
shape of the cut can be monitored on the video screen, some of the defect noted while
cleaving are listed below :
(i)
Broken ends.
(ii)
Ripped ends.
(iii)
Slanting cuts.
(iv)
Unclean ends.
It is also desirable to limit the average splice loss to be less than 0.1 dB.
CHAPTER - 7
INTRODUCTION
With the introduction of PCM technology in the 1960s, communications networks were
gradually converted to digital technology over the next few years. To cope with the
demand for ever higher bit rates, a multiplex hierarchy called the plesiochronous digital
hierarchy (PDH) evolved. The bit rates start with the basic multiplex rate of 2 Mbit/s with
further stages of 8, 34 and 140 Mbit/s. In North America and Japan, the primary rate is
1.5 Mbit/s. Hierarchy stages of 6 and 44 Mbit/s developed from this. Because of these
very different developments, gateways between one network and another were very
difficult and expensive to realize. PCM allows multiple use of a single line by means of
digital time-domain multiplexing. The analog telephone signal is sampled at a bandwidth
of 3.1 kHz, quantized and encoded and then transmitted at a bit rate of 64 kbit/s.
transmission rate of 2048 kbit/s results when 30 such coded channels are collected
together into a frame along with the necessary signaling information. This so-called
primary rate is used throughout the world. Only the USA, Canada and Japan use a
primary rate of 1544 kbit/s, formed by combining 24 channels instead of 30. The growing
demand for more bandwidth meant that more stages of multiplexing were needed
throughout the world. A practically synchronous (or, to give it its proper name:
plesiochronous) digital hierarchy is the result. Slight differences in timing signals mean
that justification or stuffing is necessary when forming the multiplexed signals. Inserting
or dropping an individual 64 kbit/s channel to or from a higher digital hierarchy requires
a considerable amount of complex multiplexer equipment.
Traditionally, digital transmission systems and hierarchies have been based on
multiplexing signals which are plesiochronous (running at almost the same speed). Also,
various parts of the world use different hierarchies which lead to problems of
international interworking; for example, between those countries using 1.544 Mbit/s
systems (U.S.A. and Japan) and those using the 2.048 Mbit/s system. To recover a 64
kbit/s channel from a 140 Mbit/s PDH signal, its necessary to demultiplex the signal all
the way down to the 2 Mbit/s level before the location of the 64 kbit/s channel can be
identified. PDH requires steps (140-34, 34-8, 8-2 demultiplex; 2-8, 8-34, 34-140
multiplex) to drop out or add an individual speech or data channel (see Figure 1).
SDH is an ITU-T standard for a high capacity telecom network. SDH is a synchronous
digital transport system, aim to provide a simple, economical and flexible telecom
infrastructure. The basis of Synchronous Digital Hierarchy (SDH) is synchronous
multiplexing - data from multiple tributary sources is byte interleaved.
SDH brings the following advantages to network providers:
1.1
Compared with the older PDH system, it is much easier to extract and insert low-bit rate
channels from or into the high-speed bit streams in SDH. It is no longer necessary to
demultiplex and then remultiplex the plesiochronous structure.
1.3
With SDH, network providers can react quickly and easily to the requirements of their
customers. For example, leased lines can be switched in a matter of minutes. The network
provider can use standardized network elements that can be controlled and monitored
from a central location by means of a telecommunications network management (TMN)
system.
1.4
Reliability
Modern SDH networks include various automatic back-up and repair mechanisms to
cope with system faults. Failure of a link or a network element does not lead to failure of
the entire network which could be a financial disaster for the network provider. These
back-up circuits are also monitored by a management system.
1.5
Future-proof platform for new services
Right now, SDH is the ideal platform for services ranging from POTS, ISDN and mobile
radio through to data communications (LAN, WAN, etc.), and it is able to handle the
very latest services, such as video on demand and digital video broadcasting via ATM
that are gradually becoming established.
1.6
Interconnection
SDH makes it much easier to set up gateways between different network providers and to
SONET systems. The SDH interfaces are globally standardized, making it possible to
combine network elements from different manufacturers into a network. The result is a
reduction in equipment costs as compared with PDH.
2.0
Network Elements of SDH
Figure 2 is a schematic diagram of a SDH ring structure with various tributaries. The
mixture of different applications is typical of the data transported by SDH. Synchronous
networks must be able to transmit plesiochronous signals and at the same time be capable
of handling future services such as ATM.
Current SDH networks are basically made up from four different types of network
element. The topology (i.e. ring or mesh structure) is governed by the requirements of the
network provider.
2.1
Regenerators
Regenerators as the name implies, have the job of regenerating the clock and amplitude
relationships of the incoming data signals that have been attenuated and distorted by
dispersion. They derive their clock signals from the incoming data stream. Messages are
received by extracting various 64 kbit/s channels (e.g. service channels E1, F1) in the
RSOH (regenerator section overhead). Messages can also be output using these channels.
2.2
Terminal Multiplexer
Add/drop Multiplexers(ADM)
Add/drop multiplexers (ADM) Plesiochronous and lower bit rate synchronous signals can
be extracted from or inserted into high speed SDH bit streams by means of ADMs. This
feature makes it possible to set up ring structures, which have the advantage that
automatic back-up path switching is possible using elements in the ring in the event of a
fault.
2.4
Digital Cross-connect
128
1281
Digital cross-connects (DXC) This network element has the widest range of functions. It
allows mapping of PDH tributary signals into virtual containers as well as switching of
various containers up to and including VC-4.
2.5
3.0
SDH Rates
SDH is a transport hierarchy based on multiples of 155.52 Mbit/s. The basic unit of SDH
is STM-1. Different SDH rates are given below:
STM-1 = 155.52 Mbit/s
STM-4 = 622.08 Mbit/s
STM-16 = 2588.32 Mbit/s
STM-64 = 9953.28 Mbit/s
Each rate is an exact multiple of the lower rate therefore the hierarchy is synchronous.
4.0
Back-up network switching- Automatic protection switching (APS)
Modern society is virtually completely dependent on communications technology. Trying
to imagine a modern office without any connection to telephone or data networks is like
trying to work out how a laundry can operate without water. Network failures, whether
due to human error or faulty technology, can be very expensive for users and network
providers alike. As a result, the subject of so-called fall-back mechanisms is currently one
of the most talked about in the SDH world. A wide range of standardized mechanisms is
incorporated into synchronous networks in order to compensate for failures in network
elements.
Two basic types of protection architecture are distinguished in APS. One is the linear
protection mechanism used for point-to-point connections. The other basic form is the socalled ring protection mechanism which can take on many different forms. Both
mechanisms use spare circuits or components to provide the back-up path. Switching is
controlled by the overhead bytes K1 and K2.
4.1
Linear protection
The simplest form of back-up is the so-called 1 + 1 APS. Here, each working line is
protected by one protection line. If a defect occurs, the protection agent in the network
elements at both ends switch the circuit over to the protection line. The switchover is
129
1291
triggered by a defect such as LOS. Switching at the far end is initiated by the return of an
acknowledgment in the backward channel. 1+1 architecture includes 100% redundancy,
as there is a spare line for each working line. Economic considerations have led to the
preferential use of 1:N architecture, particularly for long-distance paths. In this case,
several working lines are protected by a single back-up line. If switching is necessary, the
two ends of the affected path are switched over to the back-up line. The 1+1 and 1:N
protection mechanisms are standardized in ITU-T Recommendation G.783. The reserve
circuits can be used for lower-priority traffic, which is simply interrupted if the circuit is
needed to replace a failed working line.
Ring protection
The greater the communications bandwidth carried by optical fibers, the greater the cost
advantages of ring structures as compared with linear structures. A ring is the simplest
and most cost-effective way of linking a number of network elements. Various protection
mechanisms are available for this type of network architecture, only some of which have
been standardized in ITU-T Recommendation G.841. A basic distinction must be made
between ring structures with unidirectional and bi-directional connections.
4.2.1 Unidirectional rings
Figure 4 shows the basic principle of APS for unidirectional rings. Let us assume that
there is an interruption in the circuit between the network elements A and B. Direction y
is unaffected by this fault. An alternative path must, however, be found for direction x.
130
1301
Bi-directional rings
In this network structure, connections between network elements are bi-directional. This
is indicated in figure 5 by the absence of arrows when compared with figure 5. The
overall capacity of the network can be split up for several paths each with one bidirectional working line, while for unidirectional rings, an entire virtual ring is required
for each path. If a fault occurs between neighboring elements A and B, network element
B triggers protection switching and controls network element A by means of the K1 and
K2 bytes in the SOH.
Even greater protection is provided by bi-directional rings with 4 fibers. Each pair of
fibers transports working and protection channels. This results in 1:1 protection, i.e. 100
% redundancy. This improved protection is coupled with relatively high costs.
131
1311
132
CHAPTER - 8
SDH
INTRODUCTION
Synchronous digital hierarchy (SDH) is an ITU-T universal standard that defines
acommon and reliable architecture for transporting telecommunications services ona
worldwide scale. Synchronous optical network (SONET) is today a subset ofSDH,
promoted by American National Standards Institute (ANSI) and used in theU.S., Canada,
Taiwan, and Korea.From now on we will use the acronym SDH to refer to the generic
ITU-T standardthat includes also SONET.
TH E EM ERGEN CE OF S DH/S ONE T NE TWOR
KS
During the 1980s, progress in optical technologies and microprocessors
offered new challenges to telecommunications in terms of bandwidth and data processing
.At that time, plesiochronous hierarchies (T-carrier and PDH) dominated transport
systems, but a series of limitations and the necessity to introduce new transmission
technologies moved to develop a new architecture .Antitrust legislation was the final
factor that hastened the development of SONET.It was applied to the telecommunications
business and forced the giant, Bell,to be split up into small companies, the regional Bell
operating companies(RBOCs). SONET, developed at Bellcore labs in 1984, grew out of
the need to interconnect RBOCs using standardized optical interfaces. Telecom
liberalization was confirmed around the world during the 90s, and this has inevitably led
to global competition and interoperation. In 1988, the Comit Consultatif
InternationalTlgraphique Et Tlphonique CCITT (now ITU) proposed creating
broadband-ISDN (B-ISDN) to simultaneously transport data, voice, video, and
multimedia over common transmission infrastructures. Asynchronous transfer mode
(ATM) was selected for the switching layer, and SDH for transport at the physical layer.
Li mitation s of Pl e sioc hronou s N etw
orks
Plesiochronous networks have the following limitations:
Their management, supervision, and maintenance capabilities are limited, as there are
no overhead bytes to support these functions. One example of this is that if a resource
fails, there is no standard function whereby the network can be reconfigured.
Access to 64-Kbps digital channels from higher PDH hierarchical signals requires full
demultiplexing, because the use of bit-oriented procedures removes any trace of the
channels.
In PDH it was not possible to create higher bit rates directly; one could do so only after
following all the steps and hierarchies (see Figure 1).
Plesiochronous ANSI and European Telecommunications Standard Institute (ETSI)
hierarchies were not compatible.
There were no standards defined for rates over 45 Mbps in T-carrier, and over 140
Mbps in PDH.
Different manufacturers of plesiochronous equipment could not always be
interconnected, because they implemented additional management channels or
proprietary bit rates.
133
1331
Figure 1.1 SDH and SONET allow for direct multiplexing and demultiplexing.
These limitations meant that it was necessary to design a new transmission architecture to
increase the flexibility, functionality, reliability, and interoperability of networks.
The SDH /S ONE T C hall
enge
What had to be decided first was how to provide smooth migration from legacy
installations. Hence a basic frame period of 125 s was selected, the same of E1 and 1
frames, in order to guarantee compatibility with existing services such as plain old
telephone service (POTS), integrated services digital network (ISDN), frame relay (FRL)
or any n x 64 Kbps . Note that a byte constantly carried on a 125-s frame period defines
a 64-Kbps channel.
Some of the remarkable features of SDH compared with its predecessors are:
Synchronous versus plesiochronous Plesiochronous means almost synchronous. This in
its turn means that nodes try to do work in the same frequency, but in fact they do not,
because each PDH island use its own clock. In synchronous networks, all digital
transitions should occur simultaneously, and all the nodes must be fed with the same
master clock . There may, however, be a phase difference between the transitions of the
two signals but this must lie within standardized limits.
Bytes versus bits
In SDH and SONET, such basic operations as multiplexing, mapping, or alignment are
byte oriented, to keep transported elements identified throughout the wholetransmission
path
Direct access
The main difference between SDH and its predecessors is in synchronization and
byte-oriented operations. Synchronization enables us to insert and extract tributaries
directly at any point and at any bit rate, without delay or extra hardware. For this reason,
PDH/T-carrier must completely demultiplex signals of various megabits per second, to
access any embedded channel of n x 64 Kbps.
Full management
In SDH and SONET, payload and overheads are always accessible, and there is no need
to demultiplex the signal. This drastically improves operation, administration, and
maintenance (OA&M) functions, which are essential to enable centralized management
independently of the bit rate. SDH and SONET also provide embedded mechanisms to
protect the network against link or node failures, to monitor network performance, and to
manage network events.
times faster at 155.53 Mbps, in order to allocate the full European hierarchy. SDH and
SONET terminology have some differences, in referring to the same concepts, bytes, and
structures. Nevertheless, beyond the names, the functionality is equivalent
Internetworking is always possible because the evolution of both technologies has been
the same with the new hierarchies up to 40 Gbps and to the last standards like link
capacity adjustment scheme (LCAS). The objective is to guarantee universal
connectivity.
SDH/SONET Layers
In plesiochronous networks, interactions are simple and direct. In synchronous
networks they are more sophisticated, so responsibilities have been divided among
several layers that communicate with their counterparts by making use of specific
overheads, formats, and protocols. This architecture is equivalent to the layered open
system interconnection (OSI) model to define and design communication networks
Figure 1.2 SDH standards define a layered client/server model that can be divided into
up to four layers in order to manage transmission services.
Path layers
Path layers are the route to transport clients information across the synchronous
network from its source to its destination, where the multiplexers interface with client
equipment At this layer clients information is mapped/ demapped into a frame and path
overhead is added. There are two specialized path layers
1.
Lower-order path (LP), or virtual tributary path (VT Path) in SONET, to transport
lower-rate services. Associated overhead is lower-order path overhead (LO-POH) or
virtual tributary path overhead (VT-POH) in SONET.
2.
Higher-order path (HP), synchronous transport signal path (STS Path) in
SONET, to transport higher-rate services or a combination of lower-rate services.
Associated overhead is higher-order path overhead HO-POH or synchronous transport
signal path overhead (STS-POH) in SONET.
Some of the path layer functions are routing, performance monitoring, anomalies
and defect management, security and protection, as well as specific path OAM functions
support.
higher-order path signal, or when the higher-order path layer signals are adapted into a
multiplex section.
Overhead addition: This procedure is to attach information bytes to a data signal for
The basic transport frame in SONET is synchronous transport signal (STS-1), while in
SDH it is synchronous transmission module (STM-1) STS-1 is a 3 x 9 byte structure
transmitted at 52 Mbps, which is equivalent to STM-0.
STM-1 is a 9 x 9 byte structure transmitted at 155 Mbps, which is equivalent to optical
carrier 3 (OC-3) and electrical STS-3. Both have the same structure that is based on three
types of information blocks:
1. Overhead blocks: These blocks contain information that is used to manage quality,
anomalies, defects, data communication channels, service channels, and so on. There are
two types of overhead blocks, RSOH (managed by the regenerator section layer) and
MSOH (managed by the multiplex section layer).
2. Payload blocks or virtual containers (VCs): They contain a combination of client
signals and overhead blocks. VC does not have a fixed position in the frame, but it floats
in the frame to accommodate clock mismatches.
3. Pointers: They track the VC position, pointing to its first byte, while moving inside the
frame
Containers as transport interfaces
Containers (C-n) are used to map client bit streams. Adaptation procedures have been
defined to suit most telecom transport requirements. These include PDH, metropolitan
area network (MAN), asynchronous transfer mode (ATM), high-level data link control
(HDLC), internet protocol (IP), and Ethernet streams. Placing signals inside a container
requires a stuffing function to match the client stream with the container capacity. The
justification function is necessary for asynchronous mappings, to adapt clock differences
and fluctuations.
Virtual containers or virtual tributaries
Virtual containers (VC-n) or virtual tributaries (VTs) in SONET, support end-to-end path
layer connections; that is, between the point where the client stream is inserted into the
network and the point where it is delivered. Nobody is allowed to modify the VC
contents across the entire path. VCs consist of a C-n payload and a path overhead (POH).
Fields are organized into a block structure that repeats every 125 or 500 s. Containers
hold client data, and the POH provides information to guarantee end-to-end data
integrity.
There are two types of VCs:
The lower-order VC, such as VC-11, VC-12, VC-2, and VC-31. These consist of a
small container (C-11, C-12, C-2, and C-3), plus a 4-byte POH attached to the container
(9 bytes for VC-3).
The higher-order VC, such as VC-3 or VC-4. These consist of either a big container (C-
3, C-4) or an assembly of tributary unit groups (TUG-2, TUG-3). In both cases, a 9-byte
POH is attached.
Tributary units and tributary unit groups A tributary unit is a structure for adaptation
between the lower-order and higher-order path layer.
A TUG is an SDH signal made up of byte-interleaved multiplexing of one or more TUs.
In other cases, lower-order TUGs are multiplexed to form a higher-order TUG (for
instance, seven multiplexed TUG-2s form one TUG-3), and in other cases, a TUG is
formed by a single TU (for instance, a single TU-3 is enough to form a TUG-3). TUGs
occupy fixed positions in higher-order VCs.
2.4.1.4 Administrative unit
An administrative unit (AU-n) provides adaptation between the higher-order path layer
and the multiplex section layer. It consists of an HO-VC payload and an AU pointer
indicating the payload offset.
Multiplexing Map
A multiplexing map is a road map that shows how to transport and multiplex a number of
services in STM/OC frames The client tributary (PDH, T-carrier, ATM, IP, Ethernet,
etc.) needs to be mapped into a C-n container, and a POH added to form a VC-n, or a VT
for SONET.
The VC/VT is aligned with a pointer to match the transport signal rate. Pointers
together with VCs form TUs or AUs.
A multiplexing process is the next step, whereby TUG-n and AUG-n groups are
created.
When it comes to TUGs, they are multiplexed again to fill up a VC, synchronous
payload envelope (SPE) in SONET, and a new alignment operation is performed.
Finally, an administrative unit group (AUG) is placed into the STM/OC transport frame.
NE TWOR K E LE M EN TS AN D TOP
OLOGY
Network Elements
SDH systems make use of a limited number of network elements (NEs) within which all
the installations are fitted
Regenerators (REGs) or section terminating equipments (STEs): Every signal sent
through any transmission medium (optical, electrical or radio-electrical) experiences
attenuation, distortion, and noise. Regenerators supervise the re ceived data and restore
the signals physical characteristics, including shape and synchronization. They also
140
1401
manage the monitoring and maintenance functions of the regenerator section (RS) or
section in
141
1411
Line terminal multiplexers (LTMUX) or path terminal equipment (PTE): they are
common in line and access topologies. Their function is to insert and extract data in
synchronous frames .
Add and drop multiplexers (ADMs) can insert or extract data directly into or from the
traffic that is passing across them, without demultiplexing/multiplexing the frame. Direct
access to the contents of the frame is a key feature of SDH, as it enables us to turn any
point of the network into a service node, just by installing an ADM.
between separate networks. The switched traffic can be either SDH streams or selected
tributaries. Although it is not common, DXCs can also insert and drop tributaries in
transport frames.
142
1421
Network Topology
Synchronous multiplexers provide great flexibility for building topologies, which is why
point-to-point, linear, ring, hub, meshed, and mixed topologies are all possible:
Linear point-to-multipoint: this topology follows the basic point-to-point structure, but
now includes ADM multiplexers performing add and drop functions at intermediate
points.
Ring: this topology closes itself to cover a specific area, with ADM multiplexers
installed at any point. It is flexible and scalable, which makes it very suit able for wide
143
1431
area and metropolitan networks. Rings are frequently used to build fault-tolerant
architectures.
Hub or star: this topology concentrates traffic at a central point, to make topology
changes easier. A hub can join several networks with different topologies.
144
1441
144
CHAPTER - 9
INTRODUCTION
The revolution in high bandwidth applications and the explosive growth of the Internet,
however, have created capacity demands that exceed traditional TDM limits. To meet
growing demands for bandwidth, a technology called Dense Wavelength Division
Multiplexing (DWDM) has been developed that multiplies the capacity of a single fiber.
DWDM systems being deployed today can increase a single fibers capacity sixteen fold,
to a throughput of 40 Gb/s. The emergence of DWDM is one of the most recent and
important phenomena in the development of fiber optic transmission technology. Dense
wavelength-division multiplexing (DWDM) revolutionized transmission technology by
increasing the capacity signal of embedded fiber. One of the major issues in the
networking industry today is tremendous demand for more and more bandwidth. Before
the introduction of optical networks, the reduced availability of fibers became a big
problem for the network providers. However, with the development of optical networks
and the use of Dense Wavelength Division Multiplexing (DWDM) technology, a new
and probably, a very crucial milestone is being reached in network evolution. The
existing SONET/SDH network architecture is best suited for voice traffic rather than
todays high-speed data traffic. To upgrade the system to handle this kind of traffic is
very expensive and hence the need for the development of an intelligent all-optical
network. Such a network will bring intelligence and scalability to the optical domain by
combining the intelligence and functional capability of SONET/SDH, the tremendous
bandwidth of DWDM and innovative networking software to spawn a variety of optical
transport, switching and management related products.
In traditional optical fiber networks, information is transmitted through optical fiber by a
single light beam. In a wavelength division multiplexing (WDM) network, the vast
optical bandwidth of a fiber (approximately 30 THz corresponding to the low-loss region
in a single-mode optical fiber) is carved up into wavelength channels, each of which
carries a data stream individually. The multiple channels of information (each having a
different carrier wavelength) are transmitted simultaneously over a single fiber. The
reason why this can be done is that optical beams with different wavelengths propagate
without interfering with one another. When the number of wavelength channels is above
20 in a WDM system, it is generally referred to as Dense WDM or DWDM.
DWDM technology can be applied to different areas in the telecommunication networks,
which includes the backbone networks, the residential access networks, and also the
Local Area Networks (LANs). Among these three areas, developments in the DWDMbased backbone network are leading the way, followed by the DWDM-based LANs. The
development on DWDM-based residential access networks seems to be lagging behind at
the current time.
[Type text]
2.0
Early WDM began in the late 1980s using the two widely spaced wavelengths in the
1310 nm and 1550 nm (or 850 nm and 1310 nm) regions, sometimes called wideband
WDM.
The early 1990s saw a second generation of WDM, sometimes called
narrowband WDM, in which two to eight channels were used. These channels were now
spaced at an interval of about 400 GHz in the 1550-nm window. By the mid-1990s, dense
WDM (DWDM) systems were emerging with 16 to 40 channels and spacing from 100 to
200 GHz. By the late 1990s DWDM systems had evolved to the point where they were
capable of 64 to 160 parallel channels, densely packed at 50 or even 25 GHz intervals.
As fig. 1 shows, the progression of the technology can be seen as an increase in the
number of wavelengths accompanied by a decrease in the spacing of the wavelengths.
Along with increased density of wavelengths, systems also advanced in their flexibility of
configuration, through add-drop functions, and management capabilities.
VARIETIES of WDM
Early WDM systems transported two or four wavelengths that were widely spaced.
WDM and the follow-on technologies of CWDM and DWDM have evolved well
beyond this early limitation.
3.1
WDM
Traditional, passive WDM systems are wide-spread with 2, 4, 8, 12, and 16 channel
counts being the normal deployments. This technique usually has a distance limitation of
less than 100 km.
3.2
CWDM
Today, coarse WDM (CWDM) typically uses 20-nm spacing (3000 GHz) of up to 18
channels. The CWDM Recommendation ITU-T G.694.2 provides a grid of wavelengths
for target distances up to about 50 km on single mode fibers as specified in ITU-T
[Type text]
3.3
DWDM
Dense WDM common spacing may be 200, 100, 50, or 25 GHz with channel count
reaching up to 128 or more channels at distances of several thousand kilometers with
amplification and regeneration along such a route.
4.0
DWDM stands for Dense Wavelength Division Multiplexing, an optical technology used
to increase Band width over existing fiber optic backbones. Dense wavelength division
multiplexing systems allow many discrete transports channels by combining and
transmitting multiple signals simultaneously at different wavelengths on the same fiber.
In effect, one fiber is transformed into multiple virtual fibers. So, if you were to multiplex
32 STM-16 signals into one fiber, you would increase the carrying capacity of that fiber
from 2.5 Gb/s to 80 Gb/s. Currently, because of DWDM, single fibers have been able to
transmit data at speeds up to 400Gb/s.
A key advantage to DWDM is that it's protocol and bit rate-independent. DWDM-based
networks can transmit data in SDH, IP, ATM and Ethernet etc. Therefore, DWDM-based
networks can carry different types of traffic at different speeds over an optical channel.
DWDM is a core technology in an optical transport network. Dense WDM common
spacing may be 200, 100, 50, or 25 GHz with channel count reaching up to 128 or more
channels at distances of several thousand kilometers with amplification and regeneration
along such a route.
4.0
TRANSMISSION WINDOWS
Today, usually the second transmission window (around 1300 nm) and the third
and fourth transmission windows from 1530 to 1565 nm (also called conventional band)
and from 1565 to 1620 nm (also called Long Band) are used. Technological reasons limit
DWDM applications at the moment to the third and fourth window.
The losses caused by the physical effects on the signal due by the type of
materials used to produce fibres limit the usable wavelengths to between 1280 nm and
1650 nm. Within this usable range the techniques used to produce the fibres can cause
particular wavelengths to have more loss so we avoid the use of these wavelengths as
well.
5.0
Figure 3 shows an optical network using DWDM techniques that consists of five main
components:
1. Transmitter (transmit transponder):
- Changes electrical bits to optical pulses
- Is frequency specific
- Uses a narrowband laser to generate the optical pulse
2. Multiplexer/ demultiplexer:
- Combines/separates discrete wavelengths
3. Amplifier:
- Pre-amplifier boosts signal pulses at the receive side
- Post-amplifier boosts signal pulses at the transmit side (post amplifier) and on the
receive side (preamplifier)
- In line amplifiers (ILA) are placed at different distances from the source to provide
recovery of the signal before it is degraded by loss.
- EDFA (Eribium Doped Fiber Amplifier) is the most popular amplifier.
4. Optical fiber (media):
- Transmission media to carry optical pulses
- Many different kinds of fiber are used
5. Receiver (receive transponder)
- Changes optical pulses back to electrical bits
- Uses wideband laser to provide the optical pulse
[Type text]
5.1
6.0
BENEFITS of DWDM
Less costly in the long run because increased fiber capacity is automatically
available; don't have to upgrade all the time.
Fibers Supporting DWDM
For transmitting the DWDM signal, the conventional single mode optical fibers i.e. ITU
G 652 compliant, are not completely suitable. Due to availability of Optical Amplifier
working in 1550 nm region, the operating wavelengths are chosen in the C band i.e. from
1530 to 1565 nm. The ITU G 652 fiber has very high dispersion in 1550 nm region,
which limits the distance between repeater stations severely.
ITU G 652 fiber with the high dispersion at 1550 nm, typically 18 ps/nm-km. Although,
it is possible to compensate the dispersion by using dispersion compensating fibers
(DCF), these DCF adds to additional optical loss.
Conversely, in case of ITU G 653 fibers with zero dispersion at 1550 nm, the
nonlinearities such as Four Wave Mixing (FWM) plays dominant role, rendering the fiber
unsuitable for long distance transmission. A fiber that has small but non-zero amount of
dispersion can minimize the non-linearity effects. The ITU G 655 compliant, Non Zero
Dispersion Fibers (NZDF) has dispersion which is carefully chosen to be small enough to
enable high speed transmission over long distances, but large enough to suppress FWM.
With the proper use and placement of Optical Amplifiers, it is possible to have the
repeater less link.
In summary, a future-proof fiber optic network should have combination of ITU G 652
and G 655 fibers. The number of each type of fiber in a cable is generally chosen based
on the type of network. The complete fiber optic network can be defined in broader
manner in two parts:
(a) High capacity, long haul Backbone network or Transport network and (b) High
Speed, Local Access network. The Backbone network connects the major cities of the
networks and carries high bit rate signals so the G 655 fibers should be deployed in
backbone. The Local Access network is used for carrying the data up to the customer
[Type text]
premises. Due to smaller spacing between the stations / customer premises equipment,
the standard single mode fibers (ITU G 652) can be deployed.
7.0
OPTICAL NE TYPES
Optical Multiplexer/Demultiplexer
Multiplexing and Demultiplexing of different wavelength signals.
(b)
Optical Amplifiers
Transponders
Regenerators
(f)
Optical cross-connects
To cater for the huge amount of data expected in an optical network even
the cross-connects have to work on a purely optical level.
The simplest application of the DWDM technology in backbone networks is the point-topoint link. Figure 4 shows the architecture of the networks using 4 network
switching/routing nodes as an example. In this architecture, the electronic nodes can be
SONET/SDH switches, Internet routers, ATM switches, or any other type network nodes.
The DWDM node consists of typically a pair of wavelength multiplexer / demultiplexer
(lightwave grating devices) and a pair of optical-electrical/ electrical-optical convertors.
Each wavelength channel is used to transmit one stream of data individually. The
DWDM wavelength multiplexer combines all of the lightwave channels into one light
150
1501
beam and pumps it into one single fiber. The combined light of multiple wavelengths is
separated by the demultiplexer at the receiving end. The signals carried by each
wavelength channel are then converted back to the electrical domain through the O/E
convertors (photodetectors). In this way, one wavelength channel can be equivalent to a
traditional fiber in which one lightbeam is used to carry information. It is worth noting
that the wavelength channels in one fiber can be used for both directions or two fibers are
used with each for one direction.
The advantage of the point-to-point DWDM links is that it increases the bandwidth by
creating multiple channels with low costs. The limitation of this approach, however, is
that the bandwidth of each wavelength channel may not be fully utilized due to the speed
of the electrical devices, which is referred to as the well-known electro-optic bottleneck.
Also, the use of the wavelength channels may not be optimal due to the fact that the
meshes formed by the wavelength channel are all identical, which can be seen in Figure
4.
Electronic
TDM Node
DWDM
Node
DWDM
DWDM
Node
Node
DWDM
Node
Electronic
TDM Node
DWDM
Node
DWDM Channels
DWDM
DWDM
Node
Electronic
TDM Node
DWDM
Node
Node
Node
DWDM
DWDM
Node
Electronic
TDM Node
Node
Figure 5 depicts the second type of DWDM application in backbone networks, in which
wavelength routers are used to configure or reconfigure the network topology within the
optical domain and the TDM (Time Domain Multiplexing) network nodes are used to
perform multiplexing and switching in the electrical domain. This combined optical and
electrical network architecture can be applied in SONET/SDH in which the electrical
TDM network nodes would be SONET switches, or in the Internet in which the electrical
TDM network nodes would be the Internet routers. The architecture can also be used in
an ATM network where the electrical TDM network nodes would be ATM switches.
The advantage of this combined architecture in comparison with the simple DWDM
point-to-point links is that it can optimize the use of DWDM wavelength channels by
151
1511
h
tg r n
t
leu
eo
av
R
W
Wavelength
Router
Optical Domain
Wavelength
Router
Wavelength
Router
Electronic
TDM Node
Wavelength
Router
Electronic
TDM Node
W
R va
oe
u
l
e
r gehtnt
Electronic
TDM Node
Electronic
TDM Node
8.3
8.3.1
Circuit switching can be achieved by using wavelength switches (also called wavelength
routers). Figure 6 shows the architecture of the network, in which wavelength switches
are used to establish connections between the two communicators. This is quite the same
as the old PSTN (Public Switched Telephone Network) system where the crossbar types
of electrical switches are used to establish the circuit for the two users. The wavelength
switches for this type of networks can switch among the wavelength channels of multiple
fiber input and output ports. A wavelength router may have the additional capacity of
changing the wavelength of the signal between routers resulting in high utilization of
wavelength channels. In the case of a wavelength router without wavelength conversion,
the two users involved in the communication are connected by one signal wavelength
across all of switches in the light path. However, with the wavelength conversions, the
two sides of the communication can be connected by different wavelengths in different
fiber links between switches.
To Users
Users
h
tg r n
t
e
lu
e oa v
R
W
Optical Domain
W
R va
o eW
R
u
va
e
o
elhtnt
r ge
u
l
e
r gehtnt
Wavelength
Router
To
Wavelength
Router
Wavelength
Router
To
Users
Wavelength
Router
To Users
Demultiplexer
w1
w2
Multiplexer
Wavelength
Switch
Switch
w1
w2
w3
w4
Incoming
Fibers
w3
w4
Wavelength
Switch
Outgoing
Fibers
Wavelength
Switch
Wavelength
Switch
As it has been mentioned above, the wavelength routing all-optical network has the
problem of low efficiency in utilizing the bandwidth of wavelength channels with each
having the capacity of hundreds of Gigabits per second. Although the combined
wavelength routing and electronic time domain multiplexing can increase the bandwidth
utilization to some degree, it introduces the O/E conversions that may restrict the speed
and cause packet delays. Therefore, it is natural to implement optical TDM in future
optical networks, which eliminates the O/E conversions resulting in a transparent highspeed all-optical network. Replacing the electrical TDM nodes in the DWDM with
electrical TDM architecture (Figure 5) by optical TDM nodes, we obtain a DWDM
wavelength routing with optical TDM architecture, as shown in Figure 8. As we have
seen that the electrical TDM/switching nodes in Figure 5 can be of any kind, such as
SONET/SDH switches, Internet routers, and ATM switches. This indicates that the alloptical TDM nodes in the all-optical architecture can be optical SONET/SDH switches,
or all-optical ATM switches, or all-optical Internet routers. Different types of all-optical
TDM/switch nodes can also be in one network, provided the protocol conversions are
implemented.
To Users
Optical
TDM
Node
Users
Optical
TDM
Node
h
tg r n
t
e
lu
e oa v
R
W
Optical
Domain
W
a
R vW
oe
R va
o
ru
e gel nt
u gelh
tnt
re
t
h
Wavelength
Router
To
Wavelength
Router
Wavelength
Router
To
Optical
TDM
Node
Users
Wavelength
Router
Optical
TDM
Node
To Users
Optical
TDM
Switch
Optical
TDM
Switch
Users
l
ich ci
ta
tM
Optical Domain
pDT w
S
O
Optical
TDM
Switch
To Users
O
S
w
D tT p i
i cl
t c a
M
h
Optical
TDM
Switch
To
To
Users
9.0
An overriding belief existed even in the early 1970's that optical fiber would one day
make its way into the subscriber loop and be used to connect individual homes. Research
on the fiber based residential access network architecture and protocols have since then
become one of the major areas in the telecommunication arena. The ATM (Asynchronous
Transfer Mode) based B-ISDN (Broadband Integrated Services Digital Network)
architecture had been once believed to be the leading candidate for realizing the fiber-tothe-home access network. However, with the technological development of the DWDM,
broadband residential access fiber network has taken another turn, which leads to a
DWDM-based fiber optical network to deliver both narrowband and broadband services.
This section provides an overview of the network architectures that have been developed
for the residential access networks based on the DWDM technology. DWDM-based
access optical networks can be classified into two categories, passive DWDM access
networks and active DWDM networks. The term of active DWDM network here refers as
to the DWDM network in which the TDM (time domain multiplexing) is applied in the
wavelength channels. These two types of access network architecture are discussed in the
following subsections.
9.1
DWDM passive optical networks (PON) use the wavelength channels to connect the
users with the central office. Each service uses one wavelength channel. The early PON
was developed for narrowband services, such as the PON architecture developed by
British Telecom. However, recent PONs are for both broadband and narrowband
services. A passive subscriber loop is attractive because it uses no active devices outside
the central office (CO), except at the customer premises. Several architectures of passive
optical networks have been proposed for WDM or DWDM, which include the single-star,
the tree, the doublestar, and the star-bus. Figure 10 shows the single-star architecture in
which each household has a dedicated fiber to the central office (CO).
CO
CO
W1...Wn
W 1...W n
W1...Wn
W1...Wn
Splitter
Splitter
W1...Wn
W 1...W n
Splitter
Splitter
CP
CP
Splitter
Splitter
Figure 12 depicts the double-star PON architecture. This architecture provides more
flexibility in comparison with the star-bus architecture. It can be considered as the frontrunner among the possible architectures of PON for residential access applications.
DWDM
DWDM
CO
CO
W1...Wn
W1...Wn
W1...Wn
W1...W n
DWDM
DWDM
W1...Wn
W 1...W n
DWDM
DWDM
DWDM
DWDM
CP
CP
In the passive DWDM access networks, each wavelength channel is used to provide one
service at a given time regardless of the channel capacity and bandwidth requirement of
the service. With the increasing bandwidth capacity of DWDM technology, the
bandwidth of one signal channel becomes high enough to carry several or many services
even in the access environment. This leads to the thinking of applying TDM in each
individual DWDM wavelength channel, resulting in the active DWDM access optical
network in which TDM is used within each channel to provide integrated services. The
Asynchronous Transfer Mode (ATM) has been proposed as the TDM protocol in the
active DWDM access networks. With the ATM coming into the picture, the original BISDN (Broadband Integrated Services Digital Network) protocols are again surfacing in
the access network arena. But this time, only one wavelength channel replaces the whole
optical fiber in the system. The network topologies for the passive DWDM access
network discussed in the previous subsection can also be used for the active DWDM
access network. Although an active DWDM access network provides high utilization of
the wavelength channels and in return reduces the fiber costs, it adds additional costs
because of the ATM devices in the system from CO to user premises. It also increases the
complexity of system management and maintenance, which leads to high operating costs.
Another twist in this hard-to-decide matter is the birth of the very high channel-count
DWDM, in which thousands of wavelength channels are created and transmitted with one
fiber. This may make the active DWDM access network architecture lose its potential
advantages, and make the passive high channel-count DWDM PON become the leader in
the race of access network architectures.
10.
Conclusion
The DWDM point-to-point technology has already played an important role in the
backbone networks and it will continue to be installed for existing and new fiber links.
However, for the all-optical DWDM network to become viable, we may have to wait till
the optical processing power becomes available. This may create a time gap between the
DWDM point-to-point applications and the all-optical DWDM transparent networks. In
the access network case, it is still not clear whether the passive or the active is the leader.
Although the cost barrier has been weakened through replacing the fiber by DWDM
channels in the active access network architecture, the TDM devices in the system may
still be too high at the present time. On the other hand, the fiber cost (along with the costs
of the passive devices) in the passive architecture is probably still not cheap enough to
make it ahead of the active architecture. However, the very high channel-count DWDM
may change the landscape of the access network world, and it may become even cheaper
than the combined costs of twisted pair copper and coaxial cables.
Assignment
Qu.1
What is DWDM?
Qu.2
Qu.3
Qu.4
Qu.5
CHAPTER -10
MOBILE COMMUNICATION
1. Principle of Mobile Communication
Introduction
In Telecom network conventionally each user is connected to the Telephone exchange
individually. This dedicated pair starts from MDF, where it is connected to the
appropriate Equipment point and ends at the customer premises Telephone. (With
flexibility at cabinet/pillar/ distribution points DPs)
t
FDMA Analogy
It may be easier to visualize FDMA by imagining a cocktail party where two people wish
to converse with each other. Then everyone in the room must be silent except for the
speaker. The speaker may talk as long as they wish, and when they finish someone else
may start speaking, but again only one at a time. New speakers must wait (or find another
party) for the current speaker to finish before starting. Everyone in the room can hear and
understand the speaker, unless they are too far away or the speaker's voice is too soft. If
the intended listener is close enough, the speaker may decide to whisper. Conversely, if
161
1611
the listener is too far away, the speaker may have to shout. Since no one else should be
talking, this presents no problem. If someone talks out of turn, the listener will probably
be confused and not be able to understand either speaker.
Features Of Frequency Division Multiple Access (FDMA)
No Precise coordination in time domain is necessary in FDMA System.
It is well suited for narrow band analog systems.
Guard spacing between channels causes wastage of frequency resource.
Otherwise good modulation techniques are to be employed to avoid such
guard spacing.
The transmission is simultaneous and continuous and hence duplexers are
needed. Continuous transmission leads to shortening of battery life.
Time Division Multiple Access (TDMA)
TDMA is a more efficient, but more complicated way of using FDMA channels.
In a TDMA system each channel is split up into time segments, and a transmitter is given
exclusive use of one or more channels only during a particular time period. A
conversation, then, takes place during the time slots to which each transmitter (base and
mobile) is assigned. TDMA requires a master time reference to synchronize all
transmitters and receivers.
TDMA Analogy
In TDMA, everyone in the room agrees to watch a clock on the wall, and speak
only during a particular time. Each person wishing to talk is given a set period of time,
and each person listening must know what that time period will be. For example,
everyone may agree on time slots with duration of ten seconds. Speaker number one may
talk for ten seconds starting from the top of the minute. The listener who wishes to hear
this speaker must also be made aware of the schedule, and be ready to listen at the top of
the minute. Speaker number two may speak only from ten seconds after the minute until
twenty seconds after. As with FDMA, only one person at a time may speak, but each
speaker's time is now limited and many persons may take their turn. If someone in the
room cannot see the clock, they will not be able to speak and will have great difficulty
understanding the speakers.
Features of TDMA
There can be only one carrier in the medium at any time, if a simple TDMA
scheme is followed.
Transmission is in bursts and hence is well suited for digital communication.
Since the transmission is in bursts, Battery life is extended.
Transmission rate is very high compared to analog FDMA systems.
Precise synchronization is necessary.
162
1621
Cellular Concepts:
Even though multiple access techniques allowed multiple users to share the medium
simultaneously, due to constraints in providing resources, an amount of blocking will
exist. The amount of blocking is called Grade Of Services(GOS). Based on GOS and
resource availability (no. of carriers/no. of timeslots/both) the traffic handling capacity of
the system is calculated. If this total traffic is divided by traffic per subscriber, we get
number of subscribers supported by the system. For these purposes Erlang B table
(Blocking calls cleared) is useful particularly in FDMA-TDMA.
Why Cellular?
Assuming 30mE traffic per subscriber, sub density of 30 per sq.km, and GOS 1%
Radius
Area (KM2)
Subs
Total Traffic
RF Channels
3.14
100
3.0E
28.03
900
27E
38
10
3.14
10000 300E
360
Providing 360 RF channels for 10,000 subscribers in an area of 314 sq.km on a single
base station is not feasible and if still either the area of coverage or sub density increases,
the system cannot function at all for want of bandwidth.
Hence the solution is dividing the service area into small units, called cell, with base
stations radiating with low power, and limited number of carriers required as per traffic.
The same carriers are again reused at a different cell, which is geographically separated.
(Frequency Reuse)
In case of CDMA it appears that there is no limitation for simultaneous calls but
practically there is a limit to CDMA capacity. And it is essentially the amount of
interference a CDMA receiver can tolerate. As more and more units transmit, the amount
of noise a receiver sees goes up, since all signals not using the receiver's specific PN code
appear as noise. At some point there is so much noise that the receiver can no longer hear
163
1631
the transmitter. Boosting the transmitter power won't help overall, since it increases the
noise for all the other receivers, who would in turn tell their transmitters to boost power,
and the situation remains. In a nutshell, if a unit near a base station is transmitting with
too much power, signals from units far from the base station will be lost in the noise.
Hence cellular concept is applicable even in the case of CDMA where code used
for identification of cell/sector is reused.
Advantages of Cellular Principle
Base stations can transmit at low power compared to a single high power transmitter.
It requires less RF bandwidth to cover a given area. Frequency reuse gives good spectrum
efficiency. (FDMA-TDMA)
Disadvantage of cellular principle
Reuse introduces interference.
Established calls should be handed over to next cell to avoid dropping of calls when the
customer is in mobility.
Mobile Environment
BTS is connected to Mobile or Fixed Wireless Terminal by air Interface. This
connectivity differs from our earlier UHF/Microwave which is purely Line of Sight
(LOS) system. In mobile communication due to the mobility of the user from the BTS
LOS to BTS may exist or may not exist. The radio wave is subject to attenuation,
reflection, Doppler shift and interference from other transmitter. These effects cause loss
of signal strength and distortion which will impact the quality of voice or data. To cope
with the harsh conditions, any mobile technology makes use of an efficient and protective
signal processing. Proper cellular design must ensure that sufficient radio coverage is
provided in the area.
Types of signal strength variations
The signal strength variation for mobile is due to different types of signal strength fading.
There are two types of signal strength variations
Macroscopic Variations Due to the terrain contour between BTS and MS. The
fading effect is caused by shadowing and diffraction (bending) of radio waves.
Microscopic variations. Due to multipath, Short-term or Rayleigh fading. As the
MS moves, radio waves from many different paths will be received.
Macroscopic Variations
Macroscopic Variations can be modeled as the addition of two components that
make up the path loss between mobile and base station. The first component is the
deterministic component (L) that adds loss to the signal strength as the distance(R)
increases between base and mobile. This component can be written as
L=1/Rn
Where n = typically 4.
The other macroscopic component is a Log normal random variable which takes into
account the effects of shadow fading caused by variations in terrain and other
obstructions in the radio path.
Local mean value of path loss=deterministic component +log normal random variable
Microscopic Variations
Microscopic Variations or Rayleigh Fading occur as the mobile moves over short
distances compared to the distance between mobile and base. These short term variations
are caused by signal scattering in the vicinity of the mobile unit e.g. by hill, building or
164
1641
traffic. The result is that not one but many different paths are followed between
transmitter and receiver (Multipath Propagation). The reflected wave will be altered in
both phase and amplitude. The signal may effectively disappear if the reflected wave is
180 degree out of phase with the direct path signal. The partial out of phase relationships
among multiple received signal produce smaller reduction in received signal strength.
1.Coding
Coding includes:
Speech coding,
Convolutional coding or Forward Error Correction coding
Interleaving
Speech Coding
Human speech is band limited between 300Hz to 3400Hz and undergoes Frequency
Modulation in analog systems. In digital fixed PSTN systems band limited speech is
sampled at the rate of 8 KHz and each sampled is encoded into 8 bits leading to 64Kbps
(PCM A-Law of encoding).Digital cellular radio cannot handle the high bit rate used for
PSTN systems. Smart techniques for signal analysis and processing have been developed
for reduction of the bit rate
Different mobile communication systems use different bit rates for voice encoding. The
following table gives a glimpse.
No.
Technology
Bit rate per voice
Voice coding
chl
technique
1
GSM
13Kbps
RPE-LTP
2
CDMA IS95A
9.6Kbps/14.4 Kbps
QCELP/EVRC
3
Cor-DECT
32Kbps
ADPCM
RPE-LTP: Regular Pulse Excited Long Term Prediction
QCELP: Qualcomm Code Excited Linear Prediction
EVRC:
Enhanced Variable Rate Coding
ADPCM: Adaptive Differential Pulse Code Modulation
Forward Error Correction Coding:
Sometimes this process is called Convolutional Coding or Channel Coding. The
purpose of this process is to build redundancy in the signal so that even if error occurs,
the receiver will be able to recover the lost information. Several methods are available for
this purpose and each mobile system uses its own choice.
Interleaving:
Interleaving is a simple, but powerful, method of reducing the effects of burst errors and
recovering bits when burst errors occur. The symbols (output of Forward Error
165
1651
Correction Coder) from each group are interleaved in a pattern that the receiver knows.
The interleaver is located at the BTS and in the phone.
An illustrative example is shown below.
2. Diversity Techniques:
To cope up with the mobile environment Diversity techniques are employed .This
can be Space Diversity, Polarisation Diversity, Frequency Diversity and Time Diversity.
Space and Polarisation Diversity:
It is implemented in the BTS by deploying two antennas, one for
Transmitting and receiving, the other for only receiving. Both antennas should be kept
with minimal separation (10 times wave length). Space Diversity can be combined with
Polarisation Diversity by making the Diversity antenna in an opposite polarization. In
modern times the same antenna with dual polarized elements are available so that with
single antenna, at least polarisation diversity can be achieved. Space Diversity can be
implemented only when sufficient space is available in the tower for mounting the
antennas.
Frequency Diversity:
Signal degradation can be averted by changing the present frequency to another in
case of narrow band systems. This avoids frequency selective fading. In a narrow band
system like GSM this is achieved by slowly hopping the frequency of transmission of
BTS in a predetermined manner.
In case of a wide band system like CDMA signal occupies a large bandwidth and
frequency diversity is inherently achieved.
Time Diversity:
In all the mobile communication systems by employing interleaving time
diversity is automatically achieved.
166
1661
3. Adaptive Equalisation:
The transmitter trains the receiver to adapt to the air environment by sending a
known sequence along with the data. Corrections as applied to the known sequence are
applied to the data to retrieve it error free. This is used in GSM.
4. Rake Receiver:
The rake receiver is multiple receivers in one. There is a rake receiver at both the mobile
and BTS. It turns what is a problem in other technologies into an advantage for CDMA.
Signals sent over the air can take multi-paths resulting in degradation of signal. The rake
receiver identifies the three strongest multi-path signals and combines them to produce
one very strong signal. The rake receiver therefore uses multipath to reduce the power the
transmitter must send.
Conclusion:
Wireless means convenience. However to achieve this certain precautionary
measures are taken to overcome the bandwidth scarcity, multipath problems, etc., There
are multiple access techniques to share the bandwidth amongst several users.
Cell Concepts
Frequency scarcity problem
Consider a city where one lakh mobile subscribers need to be served. Considering
that a single RF loop requires a frequency spectrum of 50KHz, total 1,00,000*50KHz =
5GHz of RF bandwidth would be needed to serve these subscribers if an individual
dedicated RF loop is needed for every subscriber. Obviously such a huge bandwidth is
not available that too for a limited number of subscribers in a city. This clearly shows that
an acute problem of frequency scarcity is going to dictate the design and implementation
of a mobile radio system.
167
1671
In order to handle this problem one of the obvious measures is not to allot a
dedicated RF channel to an individual subscriber. Rather a group of a few common RF
channels would be available to a relatively large number of subscribers so that RF
channel is allocated only when a mobile user wants to make the call.
Even if we consider the number of RF channel required to serve, for example, a
city of 10Km radius with a subscriber density of 30 subs/ Sq.Km, the RF resource
requirement for 1% grade of service with 30mE traffic per mobile subscriber depicted in
the following table.
City Radius (Km)
Area (Sq.Km)
No. of Subs
RF Chls reqd.
3.14
100
28.3
900
38
10
314
10,000
@ 360
25
960
60,000
@2000
Clearly this is not practical to allot 360 radio channels (360*50KHz = 18 MHz)
for only 10,000 subscribers of this single city alone.
hence frequency reuse is a must to cover the total service area with a limited
available rf resources
hence the need for a cellular principle
What is a Cell?
Given Freq.
Resource
1 2 3 4 5 6 7
These seven sets of different frequency (a cluster size N of seven) can be reused after
certain distance as shown in figure 3.
Given Freq.
Resource
1 2 3 4 5 6 7
Given Freq.
Resource
1 2 3 4 5 6 7
Frequency Reuse Pattern N = 7
Fig 3
Co-Channel Interference
Co-Channel Interference in a multi-cell environment
169
1691
D
R
Co-channel interference is
a function of Q
Q=D/R
D
R
Higher Q
Lower Q
Co-Channel Interference
Q = D / R = 3N
N= Cluster Size
R= Size (Radius of Cell)
D= Distance between two Co-Chl Cells
170
1701
Q = D/R
Higher Q
Less Interference
1.73
Higher N
3.00
3.46
Less RF freq/cell
4.58
5.20
12
6.00
Lower Q
Higher Interference
Increased System Handling Capacity
Sectorisation of cells
One way of reducing the level of interference is use directional antenna at base
stations, with each antenna illuminating a sector of the cell, and with a separate channel
set allocated to each sector. There are two commonly used methods of Sectorisation
either using three 120 sector or 60 sector, both of which reduces the number of prime
interference sources.
f3
f3
1
3
1
f1
2
f2
Omni Directional
f1
2
f2
Fig 6.
The three sector case is generally used with a seven cell pattern, giving an over all
requirement for 21 channel sets as shown in fig 7 & 8.
171
Single location
Fig 8
Frequency assignment in cells
Concept of frequency assignment
The cell layout (4-Cell, 3-Sectored) is shown in fig 9.
3A
1A
4A
1C
1B
2A
4B
4C
3C
4A
2B
3C
3B
1C
4A
3C
2A
4B
2C
3A
1B
2B
2B
4C
4A
2C
3A
4B
4C
1B
4B
4C
1A
3B
2A
1C
2C
3A
1A
3B
3C
Fig 9
Frequency Assignment
1A 1, 13, 25, 37, 49, 61, 73, 85, 97, 109, 121
2A 2, 14, 26, 38, 50, 62, 74, 86, 98, 110, 122
1B 5, 17, 29, 41, 53, 65, 77, 89, 101, 113
1C 9, 21, 33, 45, 57, 69, 81, 93
172
1721
1A
1B
3B
1C
BTS
BSC
B2
C2
D2
A3
B3
C3
D3
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
A1
A2
A3
D1
B1
D2
D3
B2
B3
C1
C2
C3
Fig 10
Trunking Efficiency
Cells in City / Sub-urban areas.
Start Up Cells with Larger Diameter
Mature cells with Smaller Diameters
Cells in city center Smaller
Diameters
Cells in Sub-urban areas Larger
Diameters
Fig capa
11
Number of access channel and system
city
GoS
5
10
20
33
50
56
99
100
0.5%
1.0%
2%
1.13
3.96
11.1
21.5
36.0
41.2
80.0
80.9
1.36
4.46
12.0
22.9
37.9
43.3
84.1
85.0
1.66
5.08
13.2
24.6
40.3
45.9
87.0
88.0
TRUNKING EFFICIENCY
Sr.No
Erlang Capacity
5
10
20
50
100
1.66
5.08
13.2
40.3
88.0
16
50
132
403
880
1
2
3
4
5
G
O
S
2%
TRUNKING EFFICIENCY
The Number Of Users Served In A Cell Are Directly Proportional To The Access
Channels Allocated In A Cell
More The Number Of Access Channels In A Cell Further Increase In The
System Handling Capacity
TRUNKING EFFICIENCY
10
50 Subs
10
50 Subs
20
132 Subs
It is better to have a single cell than to split into two with half the number of
access channels
Capacity Considerations
Radio frequency carrier and its allotment to traffic and control.
TDMA time slots (BP0 to BP7) in one radio frequency carrier are allotted for
traffic and control channels. Normally BP0 only for control channel.
Traffic channel (TCH) is used to carry speech and data. These are dedicated
channels.
Common channels are be used by both idle mode and dedicated mode mobiles.
Capacity Considerations.
Capacity consideration with one RF carrier per cell in a site is shown below.
1
2
1
1
With 2% GoS
2.94 E
1
8
2.94 E/25mE=120
Subs
8 Access Channels
1 Signaling
7 - Voice
Capacity consideration with more than one RF carrier per cell in a site is shown below
120 Subs/Sector 3 = 360 Subscribers
1
1
4
1
8 Access Channels
1 Signaling
7 - Voice
1203 = 360 Subs
12
4
32 Access
Channels
3 Signaling
8403 = 2520 Subs
12
12
96 Access
Channels
9 Signaling
32003 = 9600 Subs
Fixed telephones, using wired access network, are meant to be used at a particular
location only. We can have telephones at our office/business and our residence. The fixed
telephones are linked to a place but the modern day life style demands that we should
have telephone facility while on move also. Mobile communication facilitates telephonic
conversation in a fast moving vehicle. This means that phones moves along with a person
thereby moving telephone is linked to a person and not to a place. In this words our reach
becomes broader and world shrinks into a Global village.
Mobile communication objectives
The important objectives of the mobile communication are
Any time Anywhere communication
Mobility & Roaming
High capacity & subs. density
Efficient use of radio spectrum
Seamless Network Architecture
Low cost
Innovative Services
Standard Interfaces
Introduction to GSM
The Global System for Mobile Communications (GSM) is a digital cellular
commununication system. It was developed in order to create a common European
mobile telephone standard but it has been rapidly accepted world wide.
Mobile communication Generations
1G
2G
3G
GSM ARCHITCTURE
A GSM network basically consists of four main subsystems: Mobile station &
The SIM, The Base Station Subsystem, The Network and Switching Subsystem and the
Operation and Support Subsystem.
GSM Network Structure
Every telephone network needs a well-designed structure in order to route
incoming calls to the correct exchange and finally to the called subscriber. In a mobile
network, this structure is of great importance because of the mobility of all its subscribers
.In the GSM system, the network is divided into the following partitioned areas.
GSM service area
PLMN service area
MSC service area
Location area
Cells
The GSM service area is the total area served by the combination of all member
countries where a mobile can be serviced.
The next level is the PLMN service area. A Public Land Mobile Network
(PLMN) is the area served by one network operator. There can be several within a
country, based on its size. All incoming calls for a GSM/PLMN network will be routed to
a gateway MSC (Mobile switching center). A gateway MSC works as an incoming transit
exchange for the GSM/PLMN.
The next division level is that of the LAs (Location Area) within a MSC/VLR
combination. There are several LAs within one MSc/VLR combination.
Mobile Station (MS)A Mobile Station consists of two main elements: The mobile terminal(handset)
and the SIM (Subscriber Identity Module).
The SIM is a smart card that identifies the terminal. By inserting the SIM card
into the terminal, the user can have access to all the subscribed services. Without the SIM
card ,the terminal is not operational.
The SIM card is protected by a four digit Personal Identification Number(PIN).In
order to identify a subscriber to the system, the SIM card contains some parameters of the
user such as its International Mobile Subscriber Identity (IMSI).
The Base Station Subsystem (BSS)
The BSS connects the Mobile Station and the Network and Switching Subsystem
(NSS).It is in charge of transmission and reception. The BSS can be divided into two
parts:The Base Transceiver Station (BTS) and The Base Station Controller (BSC).
The BTS corresponds to the Transceivers and the Antennas used in each cell of
the network. A BTS is usually placed in the centre of a cell. Its transmitting power
defines the size of a cell. Each BTS has normally between one and sixteen transceivers
depending on the density of users in the cell.
The BSC controls a group of BTS and manages their radio resources. A BSC is
principally in charge of handovers, frequency hopping, exchange functions and control of
the radio frequency power levels of the BTSs.
180
1801
services to which they have access. The location of the subscriber corresponds to the SS7
address of the Visitor Location Register (VLR) associated to the terminal.
Visitor Location Register (VLR)
The VLR is collocated with an MSC. The VLR contains information obtained
from subscribers HLR in order to provide the subscribed services to visiting users. When
a subscriber enters the covering area of a new MSC, the VLR associated to this MSC will
request information about the new subscriber to its corresponding HLR. The VLR will
then have enough information in order to assure the subscribed services without needing
to ask the HLR each time a communication is established.
The Authentication Center (AuC)
The AuC register is used for security purposes. It provides the parameters needed
for authentication and encryption functions. These parameters help to verify the users
identity.
The Equipment Identity Register (EIR)
The EIR is a register containing information about the mobile equipments
Particularly it contains a list of all valid mobile terminals. A terminal is identified by its
International Mobile Equipment Identity (IMEI). The EIR allows then to forbid calls
from stolen or unauthorized terminals.
There are three classes of ME that are stored in the database, and each group has
different characteristics.
White List White List:- contains those IMEIs that are known to have been assigned
to
Black List :- contains IMEIs of mobiles that have been reported stolen.
Grey List:- contains IMEIs of mobiles that have problems (for example, faulty
software, wrong make of the equipment). This list contains all MEs with faults not
important enough for barring.
The Operation and Support Subsystem (OSS)
The OSS is connected to the different components of the NSS and to the BSC, in
order to control and monitor the GSM system. It is also in charge of controlling the traffic
load of the BSS.
The OMC provides alarm-handling functions to report and log alarms generated
by the other network entities. The maintenance personnel at the OMC can define that
181
1811
criticality of the alarm. Maintenance covers both technical and administrative actions to
maintain and correct the system operation, or to restore normal operations after a
breakdown, in the shortest possible time.
The fault management functions of the OMC allow network devices to be
manually or automatically removed from or restored to service. The status of network
devices can be checked, and tests and diagnostics on various devices can be invoked. For
example, diagnostics may be initiated remotely by the OMC.
Call Processing, SMS and VMS
In this we discuss the call processing aspect and look into specifics case of a mobile
originated (MO) call and a mobile terminated (MT) call. We also look into short message
(SMS) and voice mail service (VMS) as implemented IMPCS pilot project.
RF channel overview: - RF channel play important role in call processing case. These are
basically three types of RF control channel.
Broadcast control channel : The broadcast channels are points to multi-point channel,
which are defined only for down-link direction (BTS to mobile station). They are divided
into:
BCCH (Broad cast control channel:- BCCH acts as a beacon. It informs the mobile
about system configuration parameters (e.g. LAI, CELLIDENTY, NEIGHBOURING
cell identify). Using this information MS choose the best cell to attach to.
BCCH is always transmitted on full power and it is never frequency hopped.
FCCHC frequency correction channel. MS must tune to FCCH to listen to BCCH.
FCCH transmits a constant frequency shift of the radio carrier that is used by the MS for
frequency correction.
SCH (synchronization channel). . SCH is used to synchronize the MS in time .SCH
carries TDMA frame number and BSIC (Base Station Identity Code)
PCH (Paging Channel): - PCH is used in down-link direction for sending paging
message to MS whenever there is incoming call.
RACH (Random Access Channel ) :-RACH is used by the MS to request allocation of a
specific dedicated control channel (SDCCH) either in response to a paging message or
for call origination /registration from the MS. this is an up-link channel and operate in
point to point mode.
AGCH (Access Grant Channel ):- AGCH is a logical control channel which is used to
allocated a specific dedicated control channel (SDCCH) to MS when MS request for a
channel over RACH. AGCH is used in downlink direction.
182
1821
3.Dedicated Control Channel : Dedicated control channel are full duplex, point to
point channel. They are used for signalling between the BTS and certain MS. They are
divided into: SACCH (Slow Associated Control Channel): the SACCH is a duplex channel, which is
always allocated to TCH or SDCCH. The SACCH is used for
Radio link supervision measurements.
Power control.
Timing advance information.
In 26 frame traffic multi-frame 13th frame (frame no .12) is used for
SACCH.SACCH is used only for non-urgent procedures.
FACCH (Fast Associated Control Channel). FACCH is requested in case the
requirement of signaling is urgent and signaling requirement can not be met by SACCH.
This is the case when hand-over is required during conversation phase. During the call
FACCH data is transmitted over allocated TCH instead of traffic data. This is marked by
a flag known as stealing flag.
SDCCH (Stand Alone Dedicated Control Channel)- The SDCCH is a duplex, point to
point channel which is used for signaling in higher layer. It carries all the signaling
between BTS & MS when no TCH is allocated to MS. The SDCCH is used for service
request, location updates, subscriber authentication, ciphering. equipment validation and
assignment of a TCH.
Mobile originated (MO) call: - There are four distinct phase of a mobile originated call-Setup phase.
-Ringing phase.
-Conversation phase.
-Release phase.
Out of these phases the setup phase is the most important phase and includes
authentication of the subscriber,
mobile equipment, validation of subscriber data at VLR for requests service and
assignment of a voice channel on A-interface by MSC. Whenever MS wants to initiate on
outgoing call or want to send an SMS it requests for a channel to BSS over RACH. On
receiving request from MS, BSS assigns a stand-alone dedicated control channel
(SDCCH) to MS over access grant channel (AGCH). Once a SDCCH has been allocated
to MS all the call set up information flow takes place over SDCCH.
183
1831
184
1841
mobile subscriber is found to be free (idle), paging is initiated for terminating mobile
subscriber. MSC uses the LAI provided by the VLR to determine which BSSs should
page the MS. MSC transmit a message to each of these BSS requesting that a page be
performed. Included in the message is the TMSI of the MS. Each of the BSSs broadcasts
the TMSI of the mobile in a page message on paging channel (PCH).
When MS detects its TMSI broadcast on the paging channel , it responds with a
channel request message over Random Access Channel (RACH). Once BSS receives a
channel
request
message
it
allocates
stand
alone
Dedicated
Control
ringing tone to the calling party and sends a network alerting via GMSC to the PSTN.
Prior to this the calling party heard silence.
At this point in the call, MS is alerting the called party by generating on audible
tone. One of the three events can occur-calling party hangs-up, mobile subscriber answers
the phone, or the MSC times out waiting for the mobile subscriber to the answer the call.
Since radio traffic channel is a valuable resource, GSM does not allow a MS to ring
forever.
In the present scenario we have assumed that the mobile subscriber answers the
phone. The MS in response to this action stops alerting and sends a connect message to
the MSC. MSC removes the audible tone to the PSTN and connects the PSTN trunk to
BSS trunk (terrestrial channel) and sends a connect message via GMSC to the PSTN. The
caller and the called party now have a complete talk path. This event typically marks the
beginning of the call for billing purposes. MSC sends a connect acknowledge message to
the MS.
The release triggered by the land user is done in similar way as the release
triggered by mobile user. MSC receives a release message from the network to terminate
end-to-end connection. PSTN stops billing the calling landline subscriber. MSC sends a
disconnect message towards the MS and MS responds by a Release message. MSC
release the connection to the PSTN and acknowledges by sending a Release Complete
message to PSTN. Now the voice trunk between MSC and BSS is cleared, traffic channel
(TCH) is released and the resources are completely released.
The mobile-to-mobile call scenario is a combination of phases encountered in
mobile originated (MO) and mobile terminated (MT) call.
Short Message Service (SMS)
SMS is a simple bearer service and acts as a bi-directional alphanumeric paging
service, which allows value added service provision as well as management services
provision such as advice of charge. A short message can carry at most 160 characters (it
can be less depending upon the type of characters and their coding scheme). The SMS
could be either in broadcast mode (via CBCH channel) or in a point-to-point mode (via
either SDCCH channel if mobile is in idle state, or SACCH if the mobile is in dedicated
mode).
SMS allows to provide many values added service to individual/ corporate
clients. Individuals may be interested in messaging (transmitting messages in compact
way) or leisure services (weather forecast, road traffic, restaurant booking, movies, TV
187
1871
addressed by a mobile using a E.164 number of the numbering plan of the PLMN. SMSC
is capable of following functionalitys:
-Transmission of short message towards a mobile, retaining the responsibility of the
message until reception of acknowledgement or expiration of the validity period.
-Reception of the short messages from MS and transmission of acknowledgement to the
PLMN.
-Transferring messages received from Internet to mobile.
The second entity involved by the SMS is the SME (short message entity),
which is responsible for producing or receiving a short message. The SME can be
connected to the SMSC via a data network such as X.25 or IP.
A short message is characterized by its parameters the most significant are the validity
period, the service center time stamp which indicates the SM arrival time at the SC, etc.
In IMPCS (pilot project), the SMS architecture has been implemented by CDoT. The hardware architecture of SMSC is similar to HLR and is located on same
physical platform. It services as an inter-working and relaying function of the message
transfer between two MS. The service provided are(i) Mobile Originated short message- Enables MS to send an SMS ( up-to 140
bytes) to another MS via SMSC.
(ii)Mobile terminated short message- Enables delivery of an SMS to a particular
MS.
(iii)Operator initiated SMS- This facility enables fixed network subscriber to send
an SMS to a mobile subscriber through an operator at SMSC.
(iv)SMS Newsletter Service- A group of mobile subscriber can subscribe to SMSC
for receiving periodic news regarding sports, weather, traffic etc. The subscription
is done through on operator at SMSC. The operator feeds the news segments,
which are transferred, to the subscriber periodically.
Voice Mail System (VMS)
VMS offers function of call answering device in the system. It provides
personal voice mailbox to the subscribers. VMS redirects/forwards voice calls of a
temporarily in accessible subscriber (busy or no reply) to a personal mailbox of the
188
1881
subscriber connected to the MSC. Whenever a call is redirected to VMS, it first greets the
caller with a personalised greeting message and prompts the caller to leave the message
in the mailbox. Later on the called party (mobile subscriber) can access the VMS from
PLMN/PSTN phone by means of access code.
VMS interfaces with MSC on E1 lines using R2 MF/CCS#7 signaling
protocol. In IMPCS network the VMS consists of Pentium PC equipped with Dialogic
card loaded with Windows NT 4.0. Dialogic card provides telephony network interface,
voice recording, compression and play. The disk capacity requirement of the PC is totally
application dependent. For 10,000 subscribers, if each subscriber stores 10 minutes of
voice data then disk storage for subscriber voice information is around 20 GB.
General Packet Radio Service (GPRS)
General Packet Radio Service (GPRS) is a mobile data service available to users of GSM
mobile phon. It is often described as "2.5G", that is, a technology between the second
(2G) and third (3G) generations of mobile telephony. It provides moderate speed data
transfer, by using unused TDMA channels in the GSM network. Originally there was
some thought to extend GPRS to cover other standards, but instead those networks are
being converted to use the GSM standard, so that is the only kind of network where
GPRS is in use. GPRS is integrated into GSM standards releases starting with Release 97
and onwards. First it was standardised by ETSI but now that effort has been handed onto
the 3GPP.
GPRS is different from the older Circuit Switched Data (or CSD) connection included in
GSM standards releases before Release 97 (from 1997, the year the standard was feature
frozen). In CSD, a data connection establishes a circuit, and reserves the full bandwidth
of that circuit during the lifetime of the connection. GPRS is packet-switched which
means that multiple users share the same transmission channel, only transmitting when
they have data to send. This means that the total available bandwidth can be immediately
dedicated to those users who are actually sending at any given moment, providing higher
utilization where users only send or receive data intermittently. Web browsing, receiving
e-mails as they arrive and instant messaging are examples of uses that require intermittent
data transfers, which benefit from sharing the available bandwidth.
Usually, GPRS data are billed per kilobytes of information transceived while circuitswitched data connections are billed per second. The latter is to reflect the fact that even
during times when no data are being transferred, the bandwidth is unavailable to other
potential users.
GPRS originally supported (in theory) IP, PPP and X.25 connections. The latter has been
typically used for applications like wireless payment terminals although it has been
removed as a requirement from the standard. X.25 can still be supported over PPP, or
189
1891
even over IP, but doing this requires either a router to do encapsulation or intelligence
built into the end terminal.
0G
0.5G
1G
2G
2.5G
2.75G
3G
3.5G
3.75
4G
points for the duration of a call. No other phone can use this circuit during the call,
regardless of whether any data is being transmitted or not.
The GPRS standard is delivered in a very elegant manner - with network operators
needing only to add a couple of new infrastructure nodes and making a software upgrade
to some existing GSM network elements.
Theoretical maximum speeds of up to 171.2 kilobits per second (kbps) are achievable
with GPRS using all eight timeslots at the same time. This is about three times as fast as
the data transmission speeds possible over today's fixed telecommunications networks
and ten times as fast as current Circuit Switched Data services on GSM networks. By
allowing information to be transmitted more quickly, immediately and efficiently across
the mobile network, GPRS may well be a relatively less costly mobile data service
compared to SMS and Circuit Switched Data.
IMMEDIA
CY
BETTER
GPRS facilitates several new applications that have not previously been available over
GSM networks due to the limitations in speed of Circuit Switched Data (9.6 kbps) and
message length of the Short Message Service (160 characters). GPRS will fully enable
191
1911
the Internet applications you are used to on your desktop from web browsing to chat over
the mobile network. Other new applications for GPRS, profiled later, include file transfer
192
1921
and home automation- the ability to remotely access and control in-house appliances and
machines.
SERVICE
ACCESS
194
1941
CHAPTER - 11
CDMA TECHNOLOGY
Access Network:
Access network, the network between local exchange and subscriber, in the
Telecom Network accounts for a major portion of resources both in terms of capital and
manpower. So far, the subscriber loop has remained in the domain of the copper cable
providing cost effective solution in past. Quick deployment of subscriber loop, coverage
of inaccessible and remote locations coupled with modern technology have led to the
emergence of new Access Technologies. The various technological options available are
as follows :
1.
Multi Access Radio Relay
2.
Wireless In Local Loop
3.
Fibre In the Local Loop
Wireless in Local Loop (WILL)
Fixed Wireless telephony in the subscriber access network also known as Wireless in
Local Loop (WLL) is one of the hottest emerging market segments in global
telecommunications today. WLL is generally used as the last mile solution to deliver
basic phone service expeditiously where none has existed before. Flexibility and
expediency are becoming the key driving factors behind the deployment of WILL.
WLL shall facilitate cordless telephony for residential as well as commercial complexes
where people are highly mobile. It is also used in remote areas where it is uneconomical
to lay cables and for rapid development of telephone services. The technology employed
shall depend upon various radio access techniques, like FDMA, TDMA and CDMA.
Different technologies have been developed by the different countries like CT2 from
France, PHS from Japan, DECT from Europe and DAMPS & CDMA from USA. Let us
discuss CDMA technology in WLL application as it has a potential ability to tolerate a
fair amount of interference as compared to other conventional radios. This leads to a
considerable advantage from a system point of view.
195
1951
= W log 2 (1+S/N)
Where C
= channel capacity
S/N
It is clear that even if we improve S/N to a great extent the advantage that we are
expected to get in terms of channel capacity will not be proportionally increased. But
instead if we increase the bandwidth (W), we can achieve more channel capacity even at
a lower S/N. That forms the basis of CDMA approach, wherein increased channel
capacity is obtained by increasing both W & S/N. The S/N can be increased by devising
proper power control methods.
Vocoder and variable data rates:
As the telephone quality speech is band limited to 4 Khz when it is digitized with PCM
its bit rate rises to 64Kb/s vocoding compress it to a lower bit rate to reduce bandwidth.
The transmitting vocoder takes voice samples and generates an encoded speech/packet
for transmission to the receiving vocoder. The receiving vocoder decodes the received
speech packet into voice samples. One of the important feature of the variable rate
vocoder is the use of adaptive threshold to determine the required data rate. Vocoders are
variable rate vocoders. By operating the vocoder at half rate on some of the frames the
capacity of the system can be enhanced without noticeable degradation in the quality of
the speech. This phenomenon helps to absorb the occasional heavy requirement of traffic
197
1971
apart from suppression of background noise. Thus the capacity advantage makes spread
spectrum an ideal choice for use in areas where the frequency spectrum is congested.
Less (Optimum) Power per cell:
Power Control Methods: As we have already seen that in CDMA the entire bandwidth of
1.25Mhz is used by all the subscribers served in that area. Hence they all will be
transmitting on the same frequency using the entire bandwidth but separated by different
codes. At the receiving end the noise contributed by all the subscribers is added up. To
minimize the level of interfering signals in CDMA, very powerful power control methods
have been devised and are listed below:
1. Reserve link open loop power control
2. Reserve link closed loop power control
3. Forward link power control
The objective of open loop power control in the reverse link (Mobile to Base) is that the
mobile station should adjust its transmit power according to the changes in its received
power from the base. Open loop power control attempts to ensure that the received signal
strength at the base station from different mobile stations, irrespective of their distances
from the base site, should be same.
In Closed loop power control in reverse link, the base station provides rapid corrections
to the mobile stations open loop estimates to maintain optimum transmit power by the
mobile stations. The base station measures the received signal strength from the mobile
connected to it and compares it with a threshold value and a decision is taken by the base
every 1.25 ms to either increase or decrease the power of the mobile.
In forward link power control (Base to Mobile) the cell (base) adjusts its power in the
forward link for each subscriber, in response to measurements provided by the mobile
station so as to provide more power to the mobile who is relatively far away from the
base or is in a location experiencing more difficult environment.
These power control methods attempt to have an environment which permits high quality
communication (good S/N) and at the same time the interference to other mobile stations
sharing the same CDMA channel is minimum. Thus more numbers of mobile station are
able to use the system without degradation in the performance. Apart from the capacity
advantage thus gained power control extends the life of the battery used in portables and
minimizes the concern of ill effects of RF radiation on the human body.
Seamless Hand-off:
CDMA provides soft hand-off feature for the mobile crossing from one cell to another
cell by combining the signals from both the cells in the transition areas. This improves
the performance of the network at the boundaries of the cells, virtually eliminating the
dropped calls.
No Frequency Planning:
A CDMA system requires no frequency planning as the adjacent cells use the same
common frequency. A typical cellular system (with a repetition rate of 7) and a CDMA
198
1981
system is shown in the following figures which clearly indicates that in a CDMA network
no frequency planning is required.
CDMA Frequency
B. Space Diversity:
199
1991
Capacity Considerations
Let us discuss a typical CDMA wireless in local loop system consisting of a single base
station located at the telephone exchange itself, serving a single cell. In order to
increase the number of subscribers served the cell is further divided into sectors. These
sectors are served by directional antennas.
The capacity of a cellular system is claimed to be 20-40 active lines per sector per 1.25
MHz for a single CDMA Radio Channel. In WLL environment assuming an average
busy hour traffic of 0.1 Erlang, 400 subscribers can be served per sector over a single
1.25 MHz channel.
Assuming typically six sectors in a cell the total capacity of a CDMA network consisting
of 1.25 MHz duplex channels is 2400 (400x6) subscribers.
Capacity can further be increased if we use another frequency on the same base station
covering the same geographical area (overlapping cell). Thus in 10 Mhz in the bandwidth
we can utilize 5 MHz of bandwidth in the forward link and 5 Mhz in the reverse link.
Hence if we have 4 RF carriers in 5 Mhz bandwidth, the network can support 12000
(5x400x6) subscribers per cell.
Conclusion
Hence we see that use of common frequency, multipath rake receiver, power control &
variable bit rate vocoding and soft hand-off features of CDMA give us the benefits of no
frequency planning, larger capacity, flexibility alongwith high performance quality.
Introduction to CDMA 2000-1X
Network entity description
Base station subsystem (BSS) Base station subsystem is the general term for the wireless
devices and wireless channel control devices that serve one or several cells. Generally, a
BSS contains one more base station controllers (BSC) and base transmitter stations
(BTS).
Mobile switch center (MSC)
MSC is a functional entity that performs control and switching to the mobile stations
within the area that it serves, and an automatic connecting device for the subscriber
traffic between the CDMA network and other public networks or other MSCs. MSC is
the kernel of the CDMA cellular mobile communication system, and it is different from a
wired switch in that an MSC must consider the allocation of the wireless resources and
the mobility of subscribers, and at least it must implement the follows processing
activities:
1. Location Registration processing;
2. Handoff.
200
2002
MS
PSTN
Um
BT S
Ai
E
Abis
B SC
M S C/SSP
VLR
BSS
Q
MC
MC
C
HLR
D
H
AUC
MSS
RGMTTC Presentation
200
2002
1. Subscription information
2. Subscriber-related information stored in the HLR
Authentication center (AUC)
Authentication center is a function entity for the management of authentication
information related to the mobile station. It implement mobile subscriber authentication,
stores the mobile subscriber authentication parameters, and is able to generate and
transmit the corresponding authentication parameters based on the request from
MSC/VLR. The authentication parameters in the AUC can be stored in the encrypted
form. The authentication center is generally configured together with the HLR. The
authentication parameter stored in the AUC include:
1. Authentication key (A_KEY);
2. Share secret data (SSD);
3. Mobile identification number/international mobile subscriber identity
(MIN/IMSI);
4. Authentication algorithm (AAV);
5. Accounting (COUNT).
Short message center (MC or SC)
As an independent entity in the CDMA cellular mobile communication system, the short
message center works in coordination with other entities such as MSC, HLR to
implement the reception, storing and transfer of the short messages from CDMA cellular
mobile communication system subscribers, and store subscriber-related short message
data.
Short message entity (SME)
SME is a function entity for synthesis and analysis of short messages.
Operation and maintenance Center (OMC)
The OMC provides the network operator with network operation and maintenance
services, manages the subscriber information and implements network planning, to
enhance the overall working efficiency and service quality of the system. There two type
of operation and maintenance centers: OMC-S and OMC-R. An OMC-S is mainly used
for the maintenance work at the mobile switching subsystem (MSS) side; an OMC-R is
mainly used for the maintenance work at the base station subsystem (BSS) side.
Third Generation Standards
CDMA2000/FDD-MC CDMA2000 using Frequency Division DuplexingMulticarrier (FDD-MC) mode. Here multicarrier implies N x 1.25 MHz channels
overlaid on N existing IS-95 carriers or deployed on unoccupiedspectrum.
CDMA2000 includes:
1x using a spreading rate of 1.2288 Mcps
3x using a spreading rate of 3 x 1.2288 Mcps or 3.6864 Mcps
1xEV-DO (1x Evolution - Data Optimized)using a spreading rate of
1.2288 Mcps optimized for data
WCDMA/FDD-DS Wideband CDMA (WCDMA) Frequency Division
Forward Dedicated Control Channel - This channel is used for transmission of user
and signaling information to a specific mobile during a call. Each Forward Traffic
Channel may contain one Forward Dedicated Control Channel.
Forward Supplemental Channel (valid for Radio Configurations 3 thro 9) This channel
is used for the transmission of user information to a specific mobile during a call. This is
typically used for high-speed data applications. Each Forward Traffic Channel may
contain up to two Supplemental Channels.
Power Control Subchannel - This subchannel is typically associated with the
Fundamental Channel, but if the F-FCH is not used for a given call, then it is associated
with the Dedicated Control Channel (F-DCCH).
All of the CDMA2000 dedicated channels can be established using
the TIA/EIA Paging (F-PCH) and Access (R-ACH) Channels.
Reverse Link Channels:
- Access Channel (R-ACH)
_ Reverse Pilot Channel (R-PICH)
_ Enhanced Access Channel (R-EACH)
_ Reverse Common Control Channel (R-CCCH)
_ Reversed Dedicated Control Channel (R-DCCH)
_ Reverse Fundamental Channel (R-FCH)
_ Reverse Supplemental Channel (R-SCH)
_ Reverse Supplemental Code Channel (R-SCCH)
The Access Channel and Reverse Supplemental Channel are retained for backward
compatibility with TIA/EIA-95A/B. For Radio Configurations 1 and 2, the channel
structure for the Reverse Fundamental Channel and Reverse Supplemental Channel is the
same as the channel structure of Rate Set 1 and Rate Set 2 used in TIA/EIA-95A/B.
EV-DO
EV-DO is a mobile technology that facilitates higher throughput on mobile platform.
The third generation of cellular standards has seen a dominance of CDMA as the
underlying access technology. UMTS (Universal Mobile Telecommunication Services) is
3G evolution for GSM world. The standardization work for UMTS is being carried-out
by 3GPP. The standardization work for CDMA 2000 and its enhancements is being
carried out under the supervision of 3GPP2.
1x Evolution-Data Optimized, abbreviated as EV-DO or 1xEV-DO, is an evolution of
CDMA 2000 1x to support higher data rates. It is defined in TIA (Telecommunication
Industry Association) standard IS 856. It is commonly referred to as DO. It is officially
termed as "CDMA2000, High Rate Packet Data Air Interface". Working on same carrier
bandwidth of 1.25 MHz as CDMA 2000 1x systems, 1xEV-DO provides significantly
higher data rates to Access Terminals (mobile devices). Downlink data rates supported
are up to 2.4576 Mb/s in Rev. 0 and up to 3.1 Mb/s in Rev. A.
Traditional wireless networks create a physical path between receiving and sending
devices, much like traditional telephone networks. EVDO instead adopts the same
approach used for the internet. IP, the Internet Protocol, breaks data into small pieces
called packets. Each packet is sent independently of all the other packets. This saves
bandwidth for use by other devices; when neither party on a phone call is speaking, the
connection consumes no bandwidth because there are no packets to send. Radio resources
are allocated only at the time of actual data transfer leading to better spectral efficiency.
EV-DO does not support voice services. In Forward link supports data rates up to 2.4576
Mbps. There is no power control in Forward Link. Peak data rate in Reverse Link is
153.6 kbps.
Generic Model of CDMA 2000 1x EVDO System:
A generic model of a CDMA 2000 1 x EV-DO System typically consists of:
a) Access Network (AN) consisting of Radio Node (RN) & Radio Network Controller
b) Packet Core Network (PCN)
a) Radio Node (RN): It is a multiple circuit transceiver which shall radiate to cover a cell
or a sector. It consists of radio modules, base band signal processor, network interface,
antenna, feeder etc. It can be co-located with RNC or remotely located. RN shall include
the functions related to channel coding/decoding, interleaving, encryption, frame
building, modulation/demodulation, RF transceiver, antenna diversity, low noise
amplification etc. as per CDMA 2000 1 x EV-DO standards.
The AN obtains the timing reference and positioning reference from the GPS system
and hence the GPS receiver shall form an integral part of the RN along with other fixtures
such as GOS antenna, cable etc. AN split mounting arrangements with tower mountable
RF components such as PAs, LNAs, Filters etc. are also acceptable.
b) Radio Network Controller (RNC): It is responsible for inter connection between the
RN and the PCN and it provides control and management for one or more RNs. It assigns
traffic channels to individual users, monitors system performance and provides interface
between the RN and the PCN. RNC performs the radio processing functions such as
management of the radio resources, radio channel management, local connection
management etc.
It also processes information required for decision on handover of calls from one RN to
another. RNC can be collocated with the PCN or remotely located. The Packet Control
Function (PCF) shall form an integral part of RNC.
Packet Core Network (PCN): The packet data core network provides packet data
services to Access Terminal (AT) and consists of PDSN, HA, AAA, AN-AAA and
FA functionalities. The functional entities AAA and ANAAA may be a single physical
entity or two separate physical entities.
Operations and Maintenance Centre (OMC): The Operations and Maintenance Centre
(OMC) allow the centralized operation of the various units in the system and the
functions needed to maintain the sub systems. The OMC provides the dynamic
monitoring and controlling of the network management functions for operation and
maintenance.
Call Processing in CDMA
Call processing refers to all the necessary functions that the system needs to carry out in
order to set up, maintain, and tear down a call between a mobile and another party.
after the mobile has successfully originated, the mobile may enter the traffic channel
state. In the traffic channel state, the mobile communicates with the base station using the
forward and reverse traffic channels. This state consists of 5 sub states
traffic channel initialization sub state
waiting for order sub state
waiting for mobile state answer sub state
conversation sub state
release sub state
Hand Offs in CDMA
As the phone moves through a network the system controller transfers the call from one
cell to another, this process is called handoff. Handoffs maybe done with the assistance
of the mobile or the system controller will control the process by itself. Handoffs are
necessary to continue the call as the phone travels. Handoffs may also occur in idle state
due to mobility.
Types of Handoffs in CDMA: There are primarily three types of Handoffs in CDMA.
They are
Soft
Hard and
Idle.
The type of handoff depends on the handoff situation.
To understand this we should know the cellular concept used in CDMA.
CDMA frequency- reuse planning (cellular concept):
Each BTS in a CDMA network can use all available frequencies. Adjacent cells can
transmit at the same frequency because users are separated by code channels, not
frequency channels. BTSs are separated by offsets in the short PN code This feature of
CDMA, called "frequency reuse of one," eliminates the need for frequency planning
Soft Handoff:
A soft handoff establishes a connection with the new BTS prior to breaking the
connection with the old one. This is possible because CDMA cells use the same
frequency and because the mobile uses a rake receiver. The CDMA mobile assists the
network in the handoff. The mobile detects a new pilot as it travels to the next coverage
area. The new base station then establishes a connection with the mobile. This new
communication link is established while the mobile maintains the link with the old BTS.
Soft handoffs are also called "make-before-break." Soft handoff can take place only when
the serving cell and target cell are working in the same frequency.
COLUMN-B
1)..........
A)Walsh code 0
2)..........
B) 869-889MHz
3) Pilot channel
3)..........
C) Walsh code 32
4) Sync channel
4)..........
5) Paging channel
5)..........
E) 1.25 Mhz
6) Traffic channel
6)..........
F) 824-844MHz
8)
9)Space Diversity
9)..
10)Time Diversity
10)
10) User mask is derived from electronic serial number of the hand set/ FWT.
11) Symbol is produced after coding process.
12) Chip is produced after spreading process.
13) CDMA system power control is applied only in the reverse link.
14) All CDMA system need GPS support for their functioning.
15) Long code is used for scrambling in the forward link.
16) Short code gives the BTS ID.
3) CHOOSE THE BEST CORRECT ANSWER:
1) Softer hand off is of _
before break
type
2) Sequence used for spreading at trans end is 1001, then receiver will use
for despreading
A) 0110 B) 1001 C) 1010 D) 1111
3) Long code is of length
4) Long and short codes are: A) orthogonal codes B) pseudo random codes
C) none of the above
5) In forward link spreading is done by A) Walsh code B) Long code
6) If there are 4 shift registers in a PN code generator, the length of the code is
A) 15 bits B) 16 bits C) 8 bits
7) Forward link is
8) Reverse link is
A) BTS to mobile B) Mobile to BTS
210
A) 20 B) 64 C) 50
1)..........
A) E interface
2) MSC-HLR
2)..........
B) 3G Standard
3) HLR-VLR
3)..........
C) 3.6864Mcps
4) MSC-MSC
4)..........
D) N interface
5) HLR- SMC
5)..........
6) CDMA IS 95 A network
6)..........
F) C interface
7)..........
G) B interface
8)..........
H) D interface
9) Spreading Rate 1
9) I)2G Standard
10)Spreading Rate 3
10).
J) 1.2288 Mcps.
211
212
CHAPTER 12
INTRODUCTION TO BROADBAND
Objectives
The main objective of this chapter is to build up the following
i)
ii)
iii)
Overview
The confluence of two forcesthe globalization of business and the networking of
information technologyhas created the Internet economy. Advances in
telecommunications and data technology are creating new opportunities for countries,
businesses and individualsjust as the Industrial Revolution changed fortunes around
the globe. The new economy is defining how people do business, communicate, shop,
have fun, learn, and live on a global basisconnecting anyone to anything. The
evolution of Internet has come into existence & Internet service is expanding rapidly.
The demands it has placed upon the public network, especially the access network, are
great.
The rapid growth of distributed business applications; the proliferation of private
networks, e-commerce, and bandwidth-intensive applications (such as multimedia,
videoconferencing, and video on demand) generate the demand for bandwidth and access
network.
Moreover, an increasing number of consumers in this area further leads to a demand for
carrying these applications faster and reliable. Essentially, the broadband revolution is
about a huge increase in the range of services that can be offered via the Internet and
digital television. It promises a new age in entertainment and communications, as well as
a major boost for e-commerce. To meet this explosive demand for bandwidth and to
capitalize on this growing data opportunity, many data competitive local-exchange
carriers are aggressively targeting small businesses, SOHOs, and teleworkers in the
selected areas of the country in which they are operating.
However, technological advances promise big increases in access speeds, enabling public
networks to play a major role in delivering new and improved telecommunications
services and applications to consumers .The Internet and the network congestion that
followed, has led people to focus both on the first and last mile as well as on creating a
213
2132
different network infrastructure to avoid the network congestion and access problems.
The solution to this is Broadband.
As a result, many different companies have worked to develop "broadband" or
high-speed access. These broadband services will allow Internet subscribers to send or
receive video and audio content of digital quality; to download interactive graphic-rich
WebPages; and to allow Internet entrepreneurs to bring new services to market that take
advantage of speeds that will make the Internet truly interactive in real time. In short,
broadband promises to revolutionize the Internet in the same way that the introduction of
the Internet revolutionized communication.
In deploying these broadband services, service providers are developing whole
new ways to access the Internet. The Internet was never designed to handle the amount of
traffic that we are seeing today. The increasing penetration of broadband access and the
demand for multimedia applications is exacerbating this problem. The increasing
importance of the Internet and the importance of delivering Web content quickly and
reliably have put strains on the network.
Broadband indicates a means of connectivity at a high or broad bandwidth,
which is capable of delivering multiple services simultaneously. It generally refers to
transmission of data over numerous frequencies. With the evolution of computer
networking and packet switching concept a new era of integrated communication has
emerged in the telecom world.
A concept of broadband services and the means of access technologies to bridge
the need of customer and service provider has emerged through out the world.
"Broadband" refers to high-speed Internet access. Traditionally, residential subscribers
have accessed the Internet by attaching a modem to their phone line and placing a local
call to their ISP. This "dial-up" or "narrow band" service has a number of constraints on
speed. Most commercial modems can achieve a maximum speed over the phone line of
56 kilobits per second (kbps).
Meaning of Broadband services
Broadband services are defined in various terms by different organization. Few of these
are given below: Original Bell System Definition
A broadband channel is a communications channel having a Bandwidth greater than a
voice-grade channel, and therefore capable of higher-speed data transmission.
1996 Telecom Reform Act
Broadband services are capable of carrying high-quality voice, data, graphics, & video.
CCITT definition
A service requiring transmission channels capable of supporting rates greater than 1.5
Mbps or primary rate in ISDN or T1/E1 in digital terminology.
Definition of broadband
Recognizing the potential of ubiquitous Broadband service in growth of GDP and
enhancement in quality of life through societal applications including tele-education,
tele-medicine, e-governance, entertainment as well as employment generation by way of
high speed access to information and web-based communication, Government have
finalised a policy to accelerate the growth of Broadband services. In India, DoT has
issued a Broadband policy in 2004. Keeping in view the present status, Broadband
connectivity is defined at present as: An always-on data connection that is able to support interactive services
including Internet access and has the capability of the minimum download speed of 256
kilo bits per second (kbps) to an individual subscriber from the Point Of Presence (POP)
of the service provider intending to provide Broadband service where multiple such
individual Broadband connections are aggregated and the subscriber is able to access
these interactive services including the Internet through this POP. The interactive
services will exclude any services for which a separate licence is specifically required, for
example, real-time voice transmission, except to the extent that it is presently permitted
under ISP licence with Internet Telephony.
Implementation of Broadband
To Strengthen Broadband Penetration, the Government of India has formulated the
Broadband Policy whose main objectives are to:Establish a regulatory framework for the carriage and the content of information
in the scenario of convergence.
Facilitate development of national infrastructure for an information based society.
Make available broadband interactive multimedia services to users in the public
network.
Provide high speed data and multimedia capability using new technologies to all
towns with a population greater than 2 lakhs.
Make available Internet services at panchayat (village) level for access to
information to provide product consultancy and marketing advice.
Deploy state of art and proven technologies to facilitate introduction of new
services.
Strengthen research and development efforts in the telecom technologies.
Need of Broadband
The Internet, e-mail, web sites, software downloads, file transfers: they are all now part
of the fabric of doing business. But until now, it has not been possible for businesses to
fully take advantage of the benefits that technology can truly deliver. The reason for this
is a simple one - a lack of bandwidth. Even for small businesses, narrowband dial-up
access is no longer sufficient. It simply takes too long to do basic tasks, like downloading
a large file, and is increasingly being recognized as insufficient and inconvenient.
Kim Maxwell in his book-"Residential Broadband: An Insider's Guide to the Battle for
the Last Mile" has grouped potential residential broadband applications into three general
categories: "professional activities " (activities related to users' employment),
"entertainment activities " (from game playing to movie watching), and "consumer
activities " (all other non-employment and non-entertainment activities). as follows:
Professional Activities:
Telecommuting (access to corporate networks and systems to support working at
home on a regular basis)
Video conferencing (one-to-one or multi-person video telephone calls)
Home-based business (including web serving, e-commerce with customers, and
other financial functions)
Home office (access to corporate networks and e-mail to supplement work at a
primary office location)
Entertainment Activities:
Web surfing (as today, but at higher speeds with more video content)
Video-on-demand (movies and rerun or delayed television shows)
Video games (interactive multi-player games)
Consumer Activities:
Shopping (as today, but at higher speeds with more video content)
Telemedicine (including remote doctor visits and remote medical analyses by
medical specialists)
Distance learning (including live and pre-recorded educational presentations)
Public services (including voting and electronic town hall meetings)
Information gathering (using the Web for non-entertainment purposes)
216
2162
217
2172
Doctors situated in different clinics can stay in contact and consult themselves directly to
other regional medical centers, using videoconference and the exchange of high quality
images, giving out test results and any type of information. Also rural zone can have the
opinion of specialists situated in remote hospitals quickly and efficiently.
Electronic commerce
Electronic commerce is a system that permits users to pay goods and services by Internet.
Thanks to this service, any person connected to the network can aquire such services with
independence from the place that he is situated and during the 24 hours, simply using a
portable computer.
Services on BB-Multiplay (Triple Play i.e. Voice, Data and Video)
TVOIP
1. TVOIP (also called as IPTV) delivers television programming to households via
broadband connection using Internet protocols.
2. Internet Protocol Television (IPTV) is expected to change the way people watch
TV. As the name suggests, IPTV is television programs delivered to subscribers
through the Internet
3. It requires a subscription and IPTV set-top box (STB).
4. IPTV is typically bundled with other services like Video on Demand (VOD),
Voice Over IP (VOIP) or digital Phone, and Web access.
5. IPTV viewers will have full control over functionality such as rewind, fastforward, pause, and so on.
6. IPTV (Internet Protocol Television) is a system where a digital television service
is delivered by using Internet Protocol over a network.
7. If you've ever watched a video clip on your computer, you've used an IPTV
system in its broadest sense.
8. For residential users, IPTV is provided with Video On Demand and may be
bundled with Internet services such as Web access and VoIP.
9. Microsoft is one of the many companies developing solutions to support the
Internet Protocol TV (IPTV) market.
10. IPTV is an emerging technology and will evolve into a completely interactive
experience in the future!
218
2182
11. First things first: the Set-Top Box (STB), on its way out in the cable world, will
make resurgence in IPTV systems.
12. The box will connect to the home DSL line and is responsible for reassembling
the packets into a video stream and then decoding the contents.
13. The video stream is broken up into IP packets and dumped into the core network,
which is a massive IP network that handles all sorts of other traffic (data, voice,
etc.)
VOIP
1. The technology used to transmit voice conversations over a data network using
the Internet Protocol.
2. A category of hardware and software that enables people to use the Internet as the
transmission medium for telephone calls.
3. VoIP works through sending voice information in digital form in packets,
4. VoIP also is referred to as Internet telephony, IP telephony, or Voice over the
Internet (VOI)
Benefits of VoIP
1. Cost reduction
a. Toll by-pass
b. WAN Cost Reduction
2. Operational Improvement
219
2192
Wireless
Wireline
3G Mobile
Cable Modem
WiMAX
221
2212
GigE Fiber
MDU
City: High-rise
multi-family units
Homes
Suburbs:
Individual
single-family
units
Farm
Rural: isolated
single family unit
Cable
Twisted pair
Satellite
The broadband services reached to customer from the three providers. Basically these are
Service Provider, Network Provider and Access Provider. The role of Network Provider
is to provide the services offered to customer through the access extended by Access
Provider. There are various types of networks which are capable of transmitting and
managing the broadband traffic to desired nodes or locations.
Wireline access technology through DSL, Fiber, Cable etc., generally adopts:
IP based Network
ATM Network
Wireless access technology through Wi-Fi, Wi-MAX, 3G mobile etc provides wireless
access to ingress point of any core network and migrates to Internet world.
Broadband technologies used in Asian countries
Broadband technologies go through two stages of development in Asian countries. In the
early stage, sharp technological divisions exist among players due to regulatory
constraints. There are various mode of access used by service providers in this field.
Following was the beginning scenario in various countries like Hong Kong, Malaysia,
Indonesia, India and Singapore: Basic Telecom service providers adopted the use of ISDN/DSL
CATV operators use cable modems
Competitive players use wireless technologies.
In the later stage of development, technological divisions are shaped by geography and
infrastructure. The broadband started establishing and due to a progressive regulatory
framework it has matured in the market. In the countries like Korea and Philippines
service providers employ several technologies for the broadband in their networks.
DSL and cable modems are used where the PSTN and CATV are in place.
222
2222
Where rainfall is light, LMDS is used to serve densely populated areas with little
infrastructure and unwired business districts.
Satellite is used to service rural areas where population densities are low
Once newer technologies are available in the market, ISDN becomes relatively less
important. Established telephone companies are calculating the economics of converting
the Last Mile of existing networks to all-digital systems. Hong Kong and Singapore
citizens already have broadband access, such as movies on demand, through their local
telecom network. Cable-TV operators, too, are venturing into high-speed Internet access
through modified networks and end-user "cable modems." Advances in wireless
communications means that people starts surfing the net with cell phones at speeds
comparable to or greater than current home access.
The service provider converged voice and data network promises to be
implemented as nodes in a neighborhood or remote switches in regional locations.
Netwo
twork Architecture of Broad
oadband
Network architecture can be broadly classified into four categories:
1. Core or Backbone Network supporting multiple services of different QoS
implemented as packet switching nodes.
2. Aggregation or Distribution Network for extending the reachability to remote
locations and able to provide a cost effective solution to access the backbone
node.
3. Last mile connecting the subscriber Access Network
4. Home Network or Subscribers network.
Summary
There are tremendous changes in the telecommunication technologies. With the evolution
of Internet telecom world has merged rapidly in computer network.
Broadband Internet connections allow users to download web pages and data many times
faster than conventional 'narrowband' Internet access. Broadband services are 'always-on'
- the computer is connected to the Internet continuously. Users pay a flat rate independent
of how long they spend on the Internet or the amount of data downloaded. Broadband
users typically spend four times as long online as narrowband customers and broadband
take-up has been faster than many comparable technologies, competitiveness. Broadband
is needed in the present scenario due to new technologies and emerging out various types
of Data communication applications.
DMT also operates by dividing signals into separate channels without using two quite
broad channels for upstream and downstream. The modulation technique that has become
standard for ADSL is called the Discrete Multitone Technique, which combines QAM
and FDM. In ADSL, the available bandwidth of 1.104 MHz is divided into 256 channels.
Each channel uses a bandwidth of 4.312 KHz. Each channel is 4KHz wide with a guard
band of .312KHz.. Hence the name Discrete Multitone.
Each sub carrier can support maximum15 number of bits. Depending on signal to noise
ratio for that sub carrier, a decision is taken as to how many bits that particular sub carrier
can support. Every channel is monitored and if the quality is low, the signal is shifted to
another channel. DMT constantly shifts signals between different channels, looking for
the best channels for transmission and reception. Moreover, some of the lower frequency
channels, are used as bi-directional channels for upstream and downstream. Keeping up
with the quality of all channels, monitoring and sorting the information on the bidirectional channels, makes the implementation of DMT more complex than CAP.
However, it provides more flexibility on lines of different quality.
Voice Channel 0 is reserved for voice communication.
Idle Channels 1 to 5 are not used, to allow a gap between voice and data
communication.
Upstream data and control. Channels 6 to 30 (25 channels) are used for upstream
data transfer and control. One channel is for control and 24 channels are for data
transfer. If there are 24 channels, each using 4KHz (out of 4.312KHz available)
with QAM modulation, we have 24x4000x15, or a 1.44Mbps bandwidth, in the
upstream direction.
Downstream data and control Channels 31 to 255 (225 channels) are used for
downstream data transfer and control. One channel is for control, and 224
channels are for data. If there are 224 channels, we can achieve upto 224 channels
are for data. If there are 224 channels, we can achieve upto 224 x 4000 x 15 or
13.4 Mbps.
LOW-PASS FILTER
CAP and DMT are similar in one way as they both use frequencies above 4KHz. That is
why every ADSL user needs small filters to attach to the outlets that do not provide
signal to the ADSL modem. The low pass filter blocks all signals above 4KHz. The
reason is that all voice conversations take place below 4KHz and the low-pass filter
prevents the data signals from interfering with standard telephone calls. The basic
telephone service channel is split off from the digital modem by splitter at client site
ADSL characteristics:
1. Asymmetric ? The data can flow faster in one direction than the other. More
precisely, Data transmission is faster downstream (to the user) to the subscriber
than upstream (from the user). Customers do not need a high bi-directional
transmission speed. They actually connect to the internet in a relatively passive
mode because the amount of data they download is enormously higher than the
amount of data they transmitting.
2. Digital ? No type of communication is transferred in an analog method. All data is
purely digital, and only at the end, modulated to be carried over the line.
3. Subscriber Line ? The data is carried over a single twisted pair copper loop to the
subscriber premises
ADSL Architecture
Delivery of ADSL services requires a single copper pair configuration of a standard voice
circuit with an ADSL modem at each end of the line, splits the telephone line into three
information channels: a high speed downstream channel, a medium speed upstream
channel, and a Plain Old Telephone Service (POTS) channel for voice or an ISDN
channel.
The ADSL network components are:
229
2292
1.
The ADSL modem at the customer premises, that is called an ADSL transceiver
unit-remote (ATU-R). It provides local loop termination on the customer side.
2. The modem of the central office that is called an ADSL Transmission Unitcentral office (ATU-C). It terminates the ADSL local loop at the central office
premises.
3. DSLAM - DSL access multiplexer. Many ATU-C units are inserted into the
DSLAM. This unit can connect through an ATM or an ETHERNET access
network to the internet.
4. Splitter :- An electronic low pass filter that separates the analogue voice or ISDN
signal from ADSL data frequencies when they get to the subscriber premises. For
outgoing traffic, when they are transmitted from the subscriber premises, it
combines the voice and the data frequencies onto one line. This allows a POTS
phone connection to operate at the same time as ADSL digital data is transmitted
or received on the same line. One splitter is located at the central office and
another at the subscriber premises. The splitter at the central office can be
separate device or may be incorporated into the DSLAM.
230
2302
On the outside, ADSL looks simple and transparent, but on the inside there is a miracle of
modern technology.
In ADSL, downstream data rates can be between 1.5 Mbps and 8 Mbps, while upstream
data rates are between 16 Kbps and 832 Kbps. The minimum configuration provides 1.5
or 2.0 Mbps downstream and a 16 kbps duplex channel; others provide rates of 6.1 Mbps
and 64 kbps duplex. Products with downstream rates up to 8 Mbps and duplex rates up to
640 kbps are also available.
Known Problems & Solutions
The factors that can influence the downstream data rates are the length of the line, the
gauge of the line, presence of bridged taps and crosstalk from other wires in the same
time that cause noise. Line attenuation increases with line length and frequency, and
decreases as wire diameter increases. Also, some copper loops use different gauge wires
at different points and this can cause reflections in the signal, effectively attenuating
some frequencies. Ignoring bridged taps, ADSL will perform as follows:
Data Rate
0.5 mm
5.5 km
0.4 mm
4.6 km
6.1 Mbps
24 AWG
0.5 mm
3.7 km
0.4 mm
2.7
232
2322
Features of ADSL
Allows simultaneous access to the line by the telephone and the computer
In case of power/ADSL failure, data transmission is lost but basic
telephone service will be operational
ADSL Provides 16-640 kbps upstream and 1.5-9 Mbps downstream. It can
work up to a distance of 3.7 to 5.5 kms depending upon the speed required
Advantages of ADSL
You can leave your Internet connection open and still use the phone line
for voice calls.
The speed is much higher than a regular modem
DSL doesn't necessarily require new wiring; it can use the phone line you
already have.
The company that offers DSL will usually provide the modem as part of
the installation.
Variants of ADSL
THE ADSL2 FAMILY
As ADSL popularity grew, it begun spreading world-wide and clearly became the
carriers, service providers and subscribers choice of broadband media. Their feedback,
along with rising demand for improvements, contributed to the completion of a new
family of standards named ADSL2. These, beside offering higher rates, are more userfriendly for subscribers on one hand, and more profitable to carriers on the other hand. In
addition, most ADSL2's modems are backward compatible and support the simple
ADSL, making it easier to step into the next level when upgrading.
How can we choose the best configuration for a connection between a certain consumer
and the CO? Well, one of ADSL2's characteristics is being almost entirely automated,
and here is no different. A new feature called "Automode" enables service providers to
give their customers the optimal level of service, by analyzing the line condition and
gathering various information during connection between the CO and the customer
premise, and then choosing (automatically) the best line configuration.
233
2332
Improved initialization -ADSL2 improves the the line initialization process, which is more automated than
ADSL, thus reducing error rate and increasing throughput. Improvements
includes:
Reducing near-end echo and crosstalk interferences at the binder.
Enabling RFI (radio frequency interference) cancellation techniques by disabling
tones during initialization.
Receiver allocated pilot tone helps avoiding bridged taps and RFI.
Receiver and Transmitter reach optimum in signal processing functions by
controlling the length of certain initializations states.
Better equalization with spectrum shaped init signals to improve channel
discovery.
Diagnostics
ADSL2's transceivers have been enhanced with Real-time performance-monitoring
capabilities to provide measurements of line noise, loop attenuation, and signal-to-noise
ratio (SNR) at both ends of the line, even when connection can not be achieved due to
poor quality of the line. This is of great value to both service providers which can use it
to track and prevent failures, and to carriers to determine if a customer qualifies for
higher data-rate services.
Power consumption
ADSL2 introduces two power management modes to help reduce power consumption:
the first is called "L2 low power mode" which enables power saving at the transceivers in
the central office (the ATU-C) by going into low power state whenever internet traffic is
decreased. The moment traffic has increased its detected by the transceiver which goes
back into full power mode (called L0).
The other power saving technique is called "L3 low power mode", and is used on both
CO's transceivers and the remote transceivers (the ATU-R), and basically enters the
transceiver into sleep mode when no traffic is detected on the connection. Returning into
full power mode requires re-initialization, but as we see shortly it is quite fast.
Fast startup A fast start-up mode reduces initialization time from about 10 seconds (in ADSL) to
approx 3 seconds.
ADSL2 Plus
235
2352
ADSL2Plus (also known as ADSL2+), has joined the ADSL2 family In January 2003 as
standard
g992.5
after
been
approved
by
the
ITU.
ADSL2+ doubles the downstream frequency band from 1.1Mhz in basic ADSL2, up to
2.2Mhz in ADSL2+, therefore increases the downstream data rate on shorter phone lines,
reaching 20Mbps on lines of max length of 5000ft (~1.5km). ADSL2+ upstream remains
1Mbps, depending of course on loop conditions.
RADSL
The Rate-adaptive ADSL is a non standard version of ADSL, in which the DSL modem
have the additional capability of adjusting bandwidth to the quality of the phone line not
only at the start of the connection but also at any time during the data transmission.
RADSL increases the maximum distance supported from 3.5 to around 5.5km (18000ft)
which makes it ideal for suburban neighborhoods. However, once again we pay the cost
of reduced data rate.
CABLE MODEM
Cable companies are now competing with telephone companies for the customer who
wants high-speed access to the Internet. DSL technology provides high-data-rate
connections for residential subscribers over the local loop. This imposes an upper limit on
the data rate. Cable TV operators use the cable TV network . In this section, we briefly
discuss this technology.
Traditional cable network: Cable TV network started to distribute broadcast video signal to locations with poor or no
reception in the late 1940s .It was called Community Antenna TV (CATV) because an
antenna at the top of a hill or building received the signals from the TV stations and
distributed them, via coaxial cables, to the community. Figure 1 shows a schematic
diagram of a traditional cable TV network.
237
2372
Figure 1
The cable TV office called the head end, receives video signals from broadcasting
stations and feed the signals into coaxial cables. The signals become weaker and weaker,
so amplifiers were installed through the network to amplify the signals. There could be
up to 35 amplifiers between the head end and the subscriber premises. At the other end,
splitters split the cable, and drop cables makes the connections to the subscriber premises.
The traditional cable TV system used coaxial cable end to end. Due to attenuation of the
signals and the use of a large number of amplifiers, communication in the traditional
network was unidirectional (one way). Video signals were transmitted downstream, from
the head end to the subscriber premises.
HFC Network
The second generation of cable network is called a hybrid fiber-coaxial (HFC) network.
The network uses a combination of fiber-optic and coaxial cable. The transmission
medium from the cable TV office to a box, called the fiber node, is optical fiber. From
the node through the neighborhood and into the subscriber premises is still coaxial cable.
The transmission medium from the cable TV office to a box, called the fiber node, is
238
2382
optical fiber; from the fiber node through the neighborhood and into the house is still
coaxial cable, figure shows a schematic diagram of an HFC network.
The regional cable head (RCH) normally serves up to 400,000 subscribers. The RCHs
feed the distribution hubs, each of which serves up to 40,000subscribers . The distribution
hubs plays an important role in the new infrastructure. Modulation and distribution of
signals are done here; the signals are then fed to the fiber node through fiber-optic cable.
The fiber node split into the analog signals so that the same signal is sent to the each
coaxial cable. Each coaxial cable serves up to 1000subscribers .the uses of fiber optic
cable reduce the need for amplifiers down eight or less.
One reason for moving from traditional to hybrid infrastructure is to make the cable
network bi-directional (two way).
Figure 2
Even in an HFC system, the last part of the network, from the fiber node to the subscriber
premises, is still coaxial cable has a bandwidth that ranges from 5 to 750 MHz
(approximately). The cable company has divided this bandwidth into three bands,: video,
downstream data, and upstream data, as shown in figure 3.
239
2392
Video Band
The downstream only video band occupies frequencies from 54 to 550 MHz. Since each
cable TV channels occupies 6MHz, this can accommodate more than 80 channels.
Figure 3
Downstream data are modulated using the 64 - QAM (or possibly 256QAM) modulation technique.
Data rate
There are 6bits for each baud in 64 QAM. One bit is used for forward
error correction; this leaves 5 bits of data per baud. The standard
specifies 1Hz for each baud; this means that theoretically, downstream
data can be received at 30 Mbps (5 bits /Hz x 6 MHz). The standard
specifies only 27 Mbps. However, since the cable modem is connected
240
2402
to the computer through a 10 base T cable, this limits the data rate to 10
Mbps.
Upstream Data Band
The up stream data (from the subscriber premises to the internet) occupies the lower
band, from 5 to 42MHz. This band is also divided into 6-MHz channels.
Modulation
The upper stream data used lower frequencies that are more susceptible
to noise and interference. For this reason, the QAM technique is not
suitable for this band. a better solution is QPSK.
Data rate
There are 2 bit for each baud in QPSK. The standard specifies 1 Hz for
each baud; this means that, theoretically, up stream data can be sent at
12 Mbps (2 bit/ Hz 6 Mbps). However, the data rate is usually less
than 12 Mbps.
Sharing
Both upstream and down band are shared by the subscribers.
Upstream sharing
The up stream data bandwidth is only 37 MHz. This means that there are only six 6-MHz
channels available in the upstream direction. A subscriber needs to use channels to send
data in the upstream direction. The question is, how can six channels be shared in an area
with 1000, 2000 or even 100,000 subscribers? The solution is timesharing. The
bandwidth is divided into channels using FDM; these channels must be shared between
subscribers in the same neighborhood. The cable provider allocates one channel,
statically for a group of subscribers. If one subscriber wanted to send data, she or he
contends for the channel with other who wants access; the subscriber must wait until the
channel is available.
Downstream sharing
We have a similar situation in the down stream .the downstream band has 33 channels of
6 MHz. a cable provider probably has more than 33 subscriber; there fore, each channel
must be shared between a group of subscribers. However the situations is different for the
downstream directions; here we have a multicasting situation .if there are data for any of
the subscriber in the group, the data are sent to that channels. Each subscriber is sent the
data. But since each subscriber also has an address registered with the provider, the cable
modem for the group matches the address carried with the data to the address assigned by
the provider. If the address matches, the data are kept; otherwise, they are discarded.
241
2412
CM AND CMTS
To use a cable network for data transmission, we need two key devices; a CM and a
CMTS.
CM
The cable modem (CM) is installed on the subscriber premises. it is similar to an ADSL
modem .figure 5 shows its location
CMTS
The cable modem transmission system (CMTS) is installed inside the distribution hub by
the cable company. It receives data from the Internet and passes them to the combiner,
which sends them to the subscriber. The CMTS also receives data from the subscriber
and passes them to the Internet.
Figure 4
242
2422
Figure 5
Data Transmission Schemes:
During the last few decades, several schemes have been designed to create a standard for
data transmission over an HFC network. Prevalent is one devised by Multimedia Cable
Network System (MCNS), called Data Over Cable System Interface Specification
(DOCSIS). DOCSIS defines all the protocols necessary to transport data from a CMTS to
a CM.
Up stream communication
The following is a very simplified version of the protocol defined by DOCSIS for
upstream communication. It describes the steps that must be followed by a CM.
1. The CM checks the downstream channels for a specific packet periodically sent
by the CMTS. The packet asks any new CM to announce itself on a specific
upstream channels.
2. The CMTS send a packet to the CM, defining its allocated downstream and
upstream channels.
3. The CM then starts a process, called ranging, which determine the distance
between the CM and CMTS. This process is required for synchronization between
243
2432
all CM s and CMTS s for the minislots used for timesharing of the upstream
channels.
4. The CM sends a packet to the ISP, asking for the Internet address.
5. The CM and CMTS then exchange some packets to establish security parameters,
which are need for public network such as cable TV.
6. The CM sends its unique identifier to the CMTS.
7. Upstream communication can start in the allocated upstream channel; the CM can
contend for the mini slots to sent data.
Downstream communication
In the downstream direction, the communication is much simpler. There is no contention
because there is only one sender. The CMTS sends the packet with the address of the
receiving CM, using the allocated downstream channel.
DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER(DSLAM)
Introduction
To enable DSL technology, service providers must have a DSLAM located in their
networks to interact with the customer premises equipment (CPE) at the end user
location.
DSLAM is an integrated hardware and software system that allows the user to access
Broadband services as well as originate and terminate telephone calls over the same
single pair of copper wires
A Digital Subscriber Line Access Multiplexer (DSLAM) delivers exceptionally highspeed data transmission over existing copper telephone lines
A DSLAM separates the voice-frequency signals from the high-speed data traffic and
controls and routes digital subscriber line (xDSL) traffic between the subscriber's enduser equipment (router, modem, or network interface card [NIC]) and the network service
provider's network. A DSLAM takes connections from many customers and aggregates
them onto a single, high-capacity connection to the Internet. DSLAMs are generally
flexible and able to support multiple types of DSL in a single central office, and different
varieties of protocol and modulation, both CAP and DMT, in the same type of DSL. The
DSLAM may provide additional functions including routing or dynamic IP address
assignment for the customers.
The DSLAMs is in general be collocated with existing PSTN exchanges which provide
last mile access to customers over copper wire up to average span lengths of 3 kms.
Features of DSLAM
A digital subscriber line access multiplexer (DSLAM) delivers exceptionally high-speed
data transmission over existing copper telephone lines. A multiservice DSLAM is a
broadband-access network element (NE) that combines support for multiple DSL
transmission types. When coupled with high-capacity asynchronous transfer mode
(ATM) switching, multiservice DSLAMs deliver scalability, port density, and a
redundant architecture for reliability. Multiservice DSLAMs, together with various CPE
elements, can enable the relatively efficient deployment of broadband networks for highspeed Internet access as well as voice and video applications. The basic features of
Digital Subscriber Line Access Multiplexure (DSLAM) are describes below: DSLAM aggregates the subscriber lines
A Digital Subscriber Access Multiplexer delivers exceptionally high speed data
transmission over existing copper telephone lines
DSLAM separates Voice and Data of the Subscriber i.e. it separates the voice
frequency signal from High Speed data traffic
Routes and Controls Digital Subscriber Line (xDSL) traffic between the
subscribers end-user equipment (Router, Modem, or Network Interface Card
(NIC) and the Network Service Providers network.
Voice is given to the exchange switch
Data is fed to the IP Network through the LAN Switch
DSLAMs have been categorized in to 6 types based on no. of ports (480, 240,120,
64, 48 & 24) provided and planned for deployment based on the expected demand
DSLAM provides Access from 128Kbps to 8Mbps
DSLAM supports for QOS features such as Committed Access Rate between CPE
and DSLAM, Traffic Policing per port
DSLAM works Satisfactory without any degradation in performance and without
using any repeater/regenerator over a distance for various access speeds for
0.5mm copper pair.
Distance wise downstream bit rate in DSLAM
Distance
6 Mbps
1.5 Kms
2 Mbps
3.5 Kms
1 Mbps
4.0 Kms
Implementation Of DSLAM
Broadband connectivity is extended to these DSLAM through the core network via the
LAN switch. Commonly it is available with 480, 240, 120, 64, 48 and 24 ports. DSLAMs
are generally aggregated through a Fast Ethernet or Gigabit Ethernet Interface. DSLAMs
are available with different types of access modules and capacities. The FX or GBIC
module in DSLAM and LAN switch should be capable of driving up to 10km on a single
mode fibre. The SX or GBIC module will support
Connectivity of DSLAM
DSLAM is connected to ATM or IP based core network through the networking
elements. It aggregates the data traffic of all the users provided to it and extends to core
network. The telephone traffic of each user is separated by splitter available in it and
transmits to PSTN network. DSLAM provides user access through user access layer and
Connectivity to IP backbone is provided through IP convergence layer.
247
CHAPTER - 13
INTELLIGENT NETWORK
The service logic is concentrated in a central node called the Service Control
Point (SCP0.
The switch with basic call handling capability and modified call processing model
for querying the SCP is referred to as the Service Switching Point (SSP).
Intelligent Peripheral (IP) is also a central node and contains specialized resources
required for IN service call handling. It connects the requested resource towards a SSP
upon the advice of the SCP.
Service Management Point (SMP0 is the management node which manages
services logic, customers data and traffic and billing data. The concept of SMP was
introduced in order to prevent possible SCP malfunction due to on-the-fly service logic or
customer data modification. These are first validated at the SMP and then updated at the
SCP during lean traffic hours. The user interface to the SCP is thus via the SMP.
All the nodes communicate via standard interfaces at which protocols have been
defined by international standardization bodies. The distributed functional architecture,
which is evident from the above discussion, and the underlying physical entities are best
described in terms of layers or planes. The following sections are dedicated to the
discussion of the physical and functional planes.
Physical Plane
Service Switching Point (SSP)
The SSP serves as an access point for IN services. All IN services calls must first
be routed through the PSTN to the "nearest" SSP. The SSP identifies the incoming call as
an IN service call by analysing the initial digits (comprising the "Service Key") dialled by
the calling subscriber and launches a Transaction Capabilities Application Part (TCAP)
query to the SCP after suspending further call processing. When a TCAP response is
obtained from the SCP containing advice for further call processing, SSP resumes call
processing.
The interface between the SCP and the SSP is G.703 digital trunk. The MTR,
SCCP, TCAP and INAP protocols of the CCS7 protocol stack are defined in this
interface.
Service Control Point (SCP)
The SCP is a fault-tolerant online computer system. It communicates with the SSPs
and the IP for providing guidelines on handling IN service calls. The physical interface to
250
2502
the SSPs is G.703 digital trunk. It communicates with the IP via the requesting SSP for
connecting specialized resources.
SCP stores large amounts of data concerning the network, service logic, and the
IN customers. For this, secondary storage and I/O devices are supported. For more details
refer to the chapter on the "SCP Architecture".
As has been commented before, the service programs and the data at the SCP are
updated from the SMP.
Service Management Point (SMP)
The SMP, which is a computer system, is the front-end to the SCP and provides
the user interface. It is sometimes referred to as the Service Management System (SMS).
It updates the SCP with new data and programs (service logic) and collects statistics from
it. The SMP also enables the service subscriber to control his own service parameters via
a remote terminal connected through dial-up connection or X.25 PSPDN. This
modification is filtered or validated by the network operator before replicating it on the
SCP.
The SMP may contain the service creation environment as well. In that case the
new services are created and validated first on the SMP before downloading to the SCP.
One SMP may be used to manage more than one SCPs.
Intelligent Peripheral (IP)
The IP provides enhanced services to all the SSPs in an IN under the control of
the SCP. It is centralized since it is more economical for several users to share the
specialized resources available in the IP which may be too expensive to replicate in all
the SSPs. The following are examples of resources that may be provided by an IP:
Voice response system
Announcements
Voice mail boxes
Speech recognition system
Text-to-speech converters
The IP is switch based or is a specialized computer. It interfaces to the SSPs via
ISDN Primary Rate Interface or G.703 interface at which ISUP, INAP, TCAP, SCCP and
MTP protocols of the CCS7 protocol stack are defined.
251
2512
252
2522
SMAF
SMF
SCEF
SCF
SDF
SRF
SSF
CCAF
SSF
CCF
CCF
CCF
CCAF
Management interface
In real time interface
Signaling circuit
Fig. 2 Distributed Functional Entities
The distribution of functional entities over the physical entities and their interconnection is summarized in Table 1 and 2 below. It may be noted that all the physical
entities may not be present in all INs as the choice of functional entities to be provisioned
is entirely up to the service provider.
Table 1
Distribution of FE's over PE's
Physical Entity
SSP
SCP
SMP
IP
Table 2
FE-FE Relationship to PE-PE Relationship
FE-FE
SSF-SCF
SCF-SDF
SCF-SRF
PE-PE
SSP-SCP
SCP-SDP
SCP-IP
SCP-SSP-IP
SRF-SSF
SSP-IP
8.5 IN Services
Protocol
INAP, TCAP, SCCP and MTP
X.25 or Proprietary
INAP, TCAP, SCCP and MTP
ISUP, INAP, TCAP, SCCP and
MTP
ISUP and MTP
The IN services proposed to be introduced in Indian network have been derived from
ITU-T recommendations. Q.1211 (April 92). This document briefly gives the description
of 25 services mentioned in Capability set no. 1 (CS1) of above mentioned ITU-T
recommendations. CS1 basically deals with single ended services (which ITU-T calls as
Type-A services). Single needed services apply to only one party in the call.
(1)
ABD Abbreviated dialing
The subscriber can register a short dialing code and use the same for access to any PSTN
Number.
(2)
(3)
(4)
CD Call Distribution
This service allows subscribers to have I/C calls routed to different
destinations according to allocation law specified by management (The
Subscriber has multiple installations).
% Load distribution
(7)
Completion of calls to busy subscriber
The service cannot be fully implemented with CSI capability since the status of called
party need to be known.
The calls are completed when subscriber who is busy becomes free.
On getting busy tone user dials a code.
The user disconnects.
On called party becoming free, call is made by the exchange first to
originating then to terminating subscriber (without any call attempt by the
user).
(8)
CON Conference Calling
The service cannot be fully implemented with CSI capability. In adding or dropping the
parties concerned it is not possible to check the authenticity of the parties. This service
requires a special transmission bridge to allow conversation among multiple subscribers.
CON-Add-ON-Conference Calling
User reserves the CON resources in advance indicating date, time of
conference and duration.
Controlled by user.
In active phase of conference parties can be added, deleted, isolated again
reattached or split the group of parties.
CON-Meet-ME Conference calling meet me
User reserve the resource same as 8A.
(12)
(13)
(15)
(16)
(18)
(19)
(20)
VOT - Televoting
It is used to survey the public opinion by different agencies.
The network operator allocates a single telephone number to surveyor.
Each time user makes a call he can get access to televoting.
An announcement asks him to input further choice digits as per
preference.
As the user presses the digits the choice counter is incremented.
After voting is ceased the service subscriber is supplied the results.
(21)
(22)
(23)
(24)
(25)
444
8.6 Charging
The IN services can be broadly divided into three categories for charging purposes :
-
No charging for calling user : FPH, VCC and VPN services fall under this category.
Level 160 is free at present and is proposed to be allotted to such services. Local
exchanges need to analyse only 160 and route the call to SSP. This level has to be
created as charge free. New services of this type can be introduced in future without any
requirement of further modification in local exchanges
Charging of calling user as per local call : UN (local) falls under this category. Level
190 is free at present and is proposed to be allotted to such services. Local exchanges
need to analyse only 190 and route the call to SSP. This level has to be created as local
charge. New services of this type can be introduced in future without any requirement of
further modification in local exchanges.
Charging of calling user at higher rates : PRM and UN (long distance) falls under this
category. Since the charging is at higher rate it is proposed that prefix 0 may be used to
have barring facility. Level 090 may be used for such purpose. Local exchange will
analyse 090 and route the call to SSP. This level has to be created as charge on
junction pulses. New services of this type can be introduced in future without any
requirement of further modification in local exchanges.
The access code of various IN services as proposed is as follows :
No charging for calling user :
FPH
1600
VCC
1601
1602
VPN
1603
1901
Televoting
1902
0900
UN (Long distance)
0901
************
555