Telecommunication Networks PDF
Telecommunication Networks PDF
2 Outline
Communication?
Telecommunication?
Network?
Telecommunication Network?
History and evolution of telecommunication
network?
3 Communication?
Communication is the sharing of information or messages between two or more
entities.
Elements of a Communication System
➢ Source - the originator of the message, whether it is a person or machine.
➢ Transmitter - the equipment that modifies the message (either data or voice) into
the form required for transmission.
➢ Communications channel - the means of carrying the signal from the source to the
destination.
➢ Transmission media - may be physical, like a copper wire or fiber optic cable, or
atmospheric, like radio waves.
➢ Receiver - is the device that captures the message from the communications
channel and converts it into a form that the person or machine at the destination
can understand.
➢ Destination - the person or machine to whom the message is directed.
4 Block diagram for communication system
Flow of Messages
➢ Simplex
➢ Half-duplex communication
➢ Full-duplex communication
Telecommunication
5
umbrella
14 Telegraphy
When a finger presses the key, electricity flows from the battery through the wires
and causes an impulse to flash to the electromagnet at the receiving end.
➢ The impulse causes a burst of magnetism that causes two pieces of iron to be
attracted to each other and make a click.
➢ If the operator depresses and releases the key quickly, a short click is produced,
a “dot”.
➢ If the operator holds down the key for a count of about three , a longer click is
produced, a “dash”.
➢ Each letter of the alphabet is assigned its own configuration of dots and dashes.
17 Con…
❖ Communication networks are designed to serve a wide variety of users who are using
equipment from many different vendors.
❖ Standards are necessary to achieve interoperability, compatibility, and required
performance in a cost effective manner.
❖ Open standards are needed to enable the interconnection of systems, equipment, and
networks from different manufacturers, vendors, and operators.
❖ Example International Telecommunication Union (ITU), American National
Standards Institute (ANSI).
19 Telecommunication Network
Introduction
Technology of communication
Operation of a Conventional Telephone
Signaling between Exchange and Telephone
Telephone Numbering
23 INTRODUCTION
There are three technologies needed for communication through the network.
➢Transmission,
➢Switching, And
➢Signaling.
25 Transmission
➢ Off-hook condition: The exchange notices that the subscriber has raised the
telephone hook (dc loop is connected) and gives a dial tone to the subscriber.
➢ Dial: The subscriber dials digits and they are received by the exchange.
➢ On-hook condition: The exchange notices that the subscriber has finished the call
(subscriber loop is disconnected), clears the connection, and stops billing.
31 Operation of a Conventional Telephone
Home telephone receives the electrical power from the local exchange via two
copper wires.
This subscriber line, which carries speech signals as well, is a twisted pair
called a local loop.
32 Microphone
When we raise the hook of a telephone, the on/off hook switch
is closed and current starts flowing on the subscriber loop
through the microphone that is connected to the subscriber
loop.
The microphone converts acoustic energy to electrical energy.
When sound waves pressed the carbon grains more tightly,
loop resistance decreased and current slightly increased.
The variable air pressure generated a variable alternating
current to the subscriber loop.
This variable current contained voice information.
33 Earphone
Alternating current, generated by the microphone, is converted
back into voice at the other end of the connection.
The earphone has a diaphragm with a piece of magnet inside a
coil.
The coil is supplied by alternating current produced by the
microphone at the remote end of the connection.
The current generates a variable magnetic field that moves the
diaphragm that produces sound waves close to the original
sound at the transmitting end.
34 Signaling between Exchange and Telephone
Originating Terminating
Originating Switching Switching Terminating
CPE Office Office CPE
Idle
1
Off-hook
2
Dial Tone
3
Dialed Digits
4
Off-hook
5
Off-hook (wink)
6
On-hook (wink)
7
Dialed Digits
8 9
10 Audible Ring Ringing
Answer 12 Off-hook 11
13 Disconnect
38 Telephone Numbering
An international telephone connection from any telephone to any other telephone is made
possible by unique identification of each subscriber socket in the world.
International Prefix:-used for international calls, may differ from country to
country.
Country Code:-one to four numbers that define the country of called subscriber, are
not needed for national calls because their purpose is to make the subscriber
identification unique in the world.
Trunk Code, Trunk Prefix, or Area Code:-defines the area inside the country
where the call is to be routed. In the case of cellular service, the trunk code is used to
identify the home network of the subscriber instead of the location.
Subscriber Number:-is a unique identification of the subscriber inside a geographical
area
Operator Numbers:-a subscriber will need to dial additional digits to select a service
provider
39 Con…
40 QUISE(10%)
6/20/2019
43 outline
PSTN
Mobile to land call
Land to mobile call
Theory of traffic engineering
44 PSTN
PSTN is the worldwide collection of interconnected public
telephone network that was designed primarily for
analog telephone.
It is Circuit switching network.
A dedicated circuit is established for the duration of a
telephone call.
It uses signaling number 7.SS7 as a signaling protocol.
➢In telecommunication signaling is used for
controlling communication
➢SS7 is used to set up and terminate a telephone call
45 Con…
Major Components of the Public Switched Telephone Network (PSTN):
Switching Offices
Transmission facilities
Customer Premise Equipment (CPE)
46
6/20/2019
47
6/20/2019
48
6/20/2019
49
6/20/2019
Con…
50
Special
Service
Circuit
51 Introduction to channels on network
Signaling information sent to the mobile is on the Forward
Control Channel (FCC).
Signaling information sent to the cell site is on
the Reverse Control Channel (RCC).
There is also a Forward Voice Channel (FVC) for voice
communication and a Reverse Voice Channel (RVC).
52 CONTROL CHANNEL FUNCTIONS
➢ These are messages that are transmitted when there are no other messages to
be transmitted on the FOCC.
Control Filler Messages ➢ This maintains the mobile's synchronization to the Overhead Message Train.
➢ This message can also be used to tell the mobiles what power level to use
when accessing the system on the Reverse Control Channel.
55 Con…
RCC
Base Mobile
station station
FVC
In call
RVC management
56 Mobile to land line communication
57 Con…
58 Call Termination Flow Chart
59 Land to Mobile Call
60 Theory of traffic Engineering
✓ If “U” be number of users and “C” be number of channels, for any c < u, possibility of more
requests than channels
❑ Trunking exploits statistical behavior of users so that a fixed number of channels
accommodate a large, random user.
6/20/2019
61 TRUNKING
When a user request service and if all channels occupied
1. The user is blocked or denied access to the system
2. In some systems a queue may be used to hold the requesting users until
a channel becomes available.
Up on termination of a call the previously occupied channel immediately
returned to the pool.
To handle a given capacity at a specific grade of service requires
Trunking and queuing theory .
62
63
64
65
Modeling of Traffic Flows
66
The job of a traffic engineer is to balance the trade-off between cost and
service.
➢ Must be able to handle traffic sufficiently during busy hours.
➢ Designs based on historic data.
➢ how many trunks are enough?
67
Principles Governing Network Design
Efficiency is defined as the percent of time the
server is working (carrying traffic) as opposed to
waiting for a call.
➢ This is also known as occupancy.
If the busy hour of each day varies, the average is called the
Average Bouncing Busy Hour (ABBH).
73 Classification of Networks
Busy Hour
❖At the busy hour, more blockage will occur,
➢ It is not feasible to design circuits to handle the absolute peaks.
➢ Therefore, some blockage is expected.
❖If some seasons have busier times than others, the study
should be taken then.
➢ Between the holidays or registration week at a college.
For k event
78 Con…
79
Traffic Usage is measured in CCS or Erlang.
❖Erlang equals 1 hour of traffic usage.
➢Can be converted to minutes by multiplying by 60.
❖CCS (Centi* Call Seconds) is used for smaller increments
of measurement.
➢1 CCS is worth 100 seconds.
➢C is the Roman Numeral for 100
1 Erlang=60 minutes=3600 seconds=36 CCS, 1 CCS=1.67
minutes.
Knowing desired GoS and traffic load, the number of circuits
is found using traffic tables.
Example: using the first type of table, we state that 1% blocking is
acceptable, and 4 Erlangs of traffic are measured during the
ABBH, 10 trunks are needed. If 5% blocking is acceptable, only
8 trunks are needed.
80
81
6/20/2019
82
6/20/2019
83
6/20/2019
84 Con…
Sources of traffic usage information
85
6/20/2019
Chapter -IV
Introduction to digital telecom signaling and applications
overview of SDH, PDH, SONET and ATM
89 Transmission mode
➢ Data transmissions may be either asynchronous or synchronous.
➢ In an asynchronous transmission, only one character is transmitted or received at a time.
➢ During transmission, there is start bit and followed by a stop bit that lets the receiving
device know where a character begins and ends.
➢ Asynchronous transmission is inherently inefficient due to the additional overhead
required for start and stop bits, and the idle time between transmissions.
➢ It is generally used only for relatively low-speed data transmission.
➢ In synchronous transmission, a group of characters is sent over a communications
link in a continuous bit stream, while data transfer is controlled by a timing signal
initiated by the sending device.
➢ The sender and receiver must be in perfect synchronization to avoid the loss or gain of
bits.
➢ Synchronous transmission is generally used for transmitting large volumes of data at high
speeds.
Plesiochronous Digital Hierarchy (PDH)
90
Plesiochronous Digital Hierarchy (PDH)
91
ITU-T Recommendation G.702 defines a time-multiplex structure based on
64 Kbit/s channels for the basic bit rates of 2.048 Mbit/s in E1 and 1.544
Mbit/s in T1.
The conversion of voice signals into digital code was always performed at a
sampling rate of 8 kHz.
The analog signal is sampled at intervals of 125 µs, which according to
Nyquist is sufficient to digitize all the information contained in a 4 kHz
voice channel.
Because every measured value is coded in 8 bits, the voice channel is
transmitted at 64 Kbit/s.
The T1 Interface (Carrying DS1 Signals)
92
E1 frame
DS-1 frame in T1 and E1
Con…
97
Timeslot 0 alternates a frame alignment signal (FAS), containing an alignment
bit pattern, with a “Not Frame Alignment” signal (NFAS), containing error
management information.
Timeslot 16 was originally designed to carry signaling information, such as
telephone numbers dialed.
This leaves 30 payload timeslots (1 to 15, 17 to 31) available in the so-called PCM-
30 system. In a PCM-30 system, Timeslot 16 of each frame carries signaling
information for two payload channels (4 bits each)
98 The SONET OC-1 Interface
STS-1 frame
Equipment Components
Power distribution box
◼ Equipment's Components
include: Backplane
⚫ Power distribution box
⚫ Sub rack
◼ Board area
◼ Back plane
◼ Fan plug-in box
◼ Dustproof unit Interface
boards area
Processing
board area
Fan plug-in box
Dustproof unit
Comparing SDH and SONET
115
The main difference between SDH and SONET is that SONET generally uses the
VC-3 virtual container for data transmission, while SDH transports user data for
the most part in VC-4 containers.
This is because the existing North American PDH hierarchy, especially the third
hierarchical layer, DS3 (44.736 Mbit/s), is better suited for transport in a VC-3
than in a VC-4.
Furthermore, SONET has the extra STS-1 level with a bit rate of 51.84 Mbit/s that
can transport exactly one VC-3 and is thus ideal for transporting DS3 streams.
116
117 Con…
FAN
PWR PWR
118 Introduction of Slots
S O O N
A C C C
I S S P
L1 L2 L3 L4 L5 L6
1 2 3 4 5 6 7 8 11 12 17
PWR PWR
i. Datagram and
ii.Virtual circuit.
DATAGRAM
150 ➢In datagram, each packet within a stream is independently routed.
➢A routing table stored in the router (switch) specifies the
outgoing link for each destination.
➢The table may be static or it may be periodically updated.
➢In the second case, the routing depends on the router’s
estimate of the shortest path to the destination.
➢Since the estimate may change with time, consecutive packets
may be routed over different links.
➢Therefore each packet must contain bits denoting the source
and destination. Thus may be a significant overhead.
Con…
151
➢The circled one are called the switching nodes whose
purpose is to provide a switching facility that will move the
data from node to node until they reach the destination.
➢The squared one are called the stations. The stations may
be computers, terminals, telephones or other.
➢Station A is assumed to send three packets of message
namely P1, P2 and P3 .
➢At first, A transmits these packets to node 1. Node 1 makes
decision on routing of these packets.
152 Con…
➢Node 1 finds node 4 as shortest compared to node 3.
➢Thus it passes p1 and p2 to node 4.
➢ Accidently, if node 4 is not accessible, node 1 finds
node 3 as shortest and sends packet P3 to node 3.
153 Con…
➢Node 3 and 4 sends its received messages to the destination C
through node 6.
➢It is shown that the order of the packet is changed due to the
different routing of the packets.
➢Thus in datagram, it is the responsibility of destination station
to reorder the packets in proper sequence.
➢ Also if a packet crashes in a switching node, the destination C
may not receive, all packets.
➢In such a case also, it is the responsibility of station C to recover
the lost packet.
154 Advantage of datagram switching over circuit switching
UDP accepts information from the application layer and adds a source port, destination
port, UDP length and UDP checksum.
168 Con…
❑The IP protocol adds its header to the packet received from UDP and passes to LLC.
❑The LLC generates 802.2 Frame and passes to MAC layer.
❑ MAC adds its own header and transfers the frame to the physical layer for
transmission.
169 Transmission Control Protocol (TCP)
:
✓The transmission control protocol (TCP) is a transport layer that
carries application layer packets and services between two users.
✓In TCP, connection between users is established before
transmitting information.
✓TCP assigns a sequence number to each packet.
✓The receiving end checks the sequence number of all packets to
ensure that they are received.
✓When the receiving end gets a packet, it sends acknowledgment.
✓If the sending node does not receive an acknowledgement within
a given period of time, if retransmits the previous packet.
TCP header
170
The data link layer is divided into two sublayers. They are :
1. Logical link control (LLC) and
2. Media Access control (MAC)
176 LLC layer
❖The LLC layer is designed to establish a
logical connection between source and
destination.
❖The IEEE standard for LLC is IEEE 802.2
Destination Service Access Point (DSAP) and Source Service Access Point (SSAP)
defines the location of the end points in communication link for either
connection oriented or connectionless service
The control field identifies the frame type
If the LLC frame is used to encapsulate, a higher level protocol within the pay
load field, 802.2 provides for a means, known as the sub network assess protocol
(SNAP),to identify the protocol
178 MAC layer
❖The function of MAC is to access the network.
❖It defines, how different stations can access the transmission medium.
❖The MAC uses CSMA/CD protocol.
❖ In an Ethernet network, each station uses CSMA/CD protocol to access
the network in order to transmit information.
179 Working principle of CSMA/CD:
1. If a station wants to transmit, the station senses the channel.
2. If the channel is busy, it continues the sensing of the channel. When the
channel becomes idle, the station starts transmit data.
3. After sending data, the station senses for the collision, as there is a possibility
that two station may send data at the same time.
4. If the collision detected, the station which detected first sends a jamming code
(32bits) on the bus, in order to indicate the other station that there is a
collision on the bus.
5. If no collision, transmission completed.
6. The two stations, which enveloped in collision, wait according to back-off
algorithm.
Back off algorithm is a method used to generate waiting time for stations that
were involved in collision.
180 FRAME Format of MAC