Telecom 101 - CTA Study Guide An - Coll, Eric
Telecom 101 - CTA Study Guide An - Coll, Eric
Fourth Edition
1
Copyright © 2016, Teracom Training Institute, Ltd.
All rights reserved. No part of this document nor the accompanying presentation may be repro-
duced or transmitted in any form or by any means, electronic or mechanical, including but not
limited to duplication, photocopying, scanning, peer-to-peer file sharing or by any other infor-
mation storage and retrieval system, without permission in writing from the copyright holder.
Trademarks and registered trademarks referenced in this text are the property of their respec-
tive holders and are used for identification purposes only. Teracom is a registered trademark of
Teracom Technologies Inc.
Notice: The information contained in this document is provided as general background infor-
mation only. Design and implementation of a communication system requires professional ad-
vice to identify and resolve issues specific to that particular system, including but not limited to
performance and security issues. Additionally, while we have striven to be as accurate as pos-
sible, we make no representation of fitness or warranty that the information provided is 100%
accurate. The information in this document is not to be relied upon as professional advice, nor
is it to be used as the basis of a design. Users of this document agree to hold the author and
Teracom Training Institute Ltd. harmless from any liability or damages. Acceptance and use of
this document shall constitute indication of your agreement to these conditions.
2
For the circus.
3
Preface
This book is based on the course materials from Teracom’s instructor-led Course 101 Tele-
com, Datacom and Networking for Non-Engineering Professionals. It covers the core knowl-
edge set required in the telecom business today.
The Fourth Edition is completely updated, featuring the new-generation Optical Ethernet, IP
and MPLS-based network. More than half the book is on the IP telecom network.
It has been written for those new to telecom, those getting up to speed, those filling in gaps,
and for all those who do not have Engineering degrees specializing in telecommunications.
Our goal is to demystify jargon and buzzwords, and put in place a structured understanding of
telecom, the technologies and services, and most importantly, the underlying ideas – and how
it all fits together.
The knowledge in this book is drawn from over 35 years of experience in the telecom busi-
ness, working for telephone companies in jobs including Junior R&D Engineer, systems engi-
neer, consultant writing R&D tax credit project reports, and teaching many private onsite cour-
ses for carriers.
The style of this book, the selection of material, its ordering and pacing, and the jokes, are the
result of being the instructor at hundreds and hundreds of 2-day and 3-day seminar courses on
these topics over the past 24 years.
The result is this book, Telecom 101: the course materials for an instructor-led course that
costs US$1395 to attend, augmented with substantial additional material, available in softcover
textbook and ebook.
Telecom 101 is intended to be used as a textbook, sequentially building one concept on an-
other like an instructor-led course. It is also intended to be a valuable day-to-day reference
handbook and glossary.
Let’s get started!
EC
April 2016
4
Table of Contents
Introduction
Our Approach
How the Text is Organized
How to Use This Text
The Three Answers
Fundamentals of Telephony
History of Telecommunications
The Public Switched Telephone Network
Analog
Capacity Restrictions
Problems with Analog Transmission
Plain Ordinary Telephone Service (POTS)
Network Addresses: Telephone Numbers
SS7
Voice over IP (VoIP)
Switching
Telephone Network Architecture
Telephone Switches
Traditional PBX and Centrex
SIP, Soft Switches, Hosted PBX and IP Centrex
SIP Trunking
The Telecommunications Industry
US Telephone Companies
AT&T and Verizon
Canadian Telephone Companies
PSTN Switching Center Hierarchy
Switched Access to LD Competitors: LECs, POPs and IXCs
High-Capacity Access to Long-Distance
CLEC: Collocations and Dark Fiber
Bypass
Competitive Carrier Network Model: Rings, POPs and MANs
Digital
Analog and Digital: What do we really mean?
Continuous vs. Discrete Signals
Voice Digitization (Analog-Digital Conversion)
Voice Reconstruction (Digital→ Analog Conversion)
Voice Digitization: 64 kb/s G.711 Standard
Digital Video, H.264 and MPEG4
Digital Transmission: Binary Pulses
Transmission Systems
Channelized Time Division Multiplexing (TDM)
Multiplexers
The Digital Hierarchy: Legacy Channelized Transmission Speeds
Digital Carrier Systems:Legacy Transmission Technologies
Framing
ISDN
Statistical Time Division Multiplexing
Framing on IP Packet Networks
Coexistence and Transition from Channels to Packets
The Cloud and Service Provisioning
Anatomy of a Service
The Network “Cloud”
Inside the Network Cloud
Network Equipment
Service Provisioning Summary
Fiber Optics
Fiber Basics
Glass Fiber and Fiber Cables
Optical Wavelengths, Bands and Modes
Wave-Division Multiplexing: CWDM and DWDM
Optical Ethernet
Network Core
Metropolitan Area Network
Fiber to the Premise (FTTP) & PONs
5
DSL and Cable Modems: Last Mile on Copper
Modems
Modulation Techniques
Digital Subscriber Line (DSL)
DSLAMs
Fiber to the Neighborhood (FTTN), DSL to the Premise
DSL Standards
Broadband Carriers: FTTN & Broadband Coax to the Premise
DOCSIS and Cable Modem Standards
Wireless
Radio
Mobile Networks
Cellular Radio and 1G
Second Generation: Digital Cellular
Mobile Internet and “Data” Plans
FDMA, TDMA, CDMA and OFDM
3G Cellular: CDMA
4G Mobile Cellular: LTE
Wireless LANs
Communication Satellites
“Data” Communications
Convergence: Treat Everything Like Data
Information Theory
Data Circuit Model
DTE: Data Terminal Equipment
Data Circuits
DCE: Data Circuit-Terminating Equipment
Point-to-Point Circuits
Multidrop Circuits
LANs: Local Area Networks
WANs: Wide Area Networks
Coding, Frames and Packets
Essential Functions for Communication
Coding Quantities: Number Systems
Coding Text
“Asynchronous”: Start/Stop/Parity
Frames and MAC Addresses
Networks, Packets & IP Addresses
Packets vs. Frames
IP Packets
The OSI Layers and Protocol Stacks
Protocols and Standards
ISO OSI Reference Model
The OSI 7-Layer Model
Physical Layer: 802.3, DSL, DOCSIS
Data Link Layer: 802 MAC
Network Layer: IP and MPLS
Transport Layer: TCP and UDP
Session Layer: POP, SIP, HTTP
Presentation Layer: ASCII, Encryption, Codecs
Application Layer: SMTP, HTML, English …
Protocol Stacks
Protocol Stack in Operation: Russian Dolls
Standards Organizations
Ethernet, LANs and VLANs
LAN Basics
Ethernet and 802 Standards
LAN Cables and Categories
LAN Switches: Layer 2 Switches
VLANs
IP Networks, Routers and Addresses
Definition of Network
Simplest Example: Private Network
Routers and Customer Edge
IPv4 Address Classes
DHCP
Public and Private IPv4 Addresses
Network Address Translation
6
TCP and UDP
IPv6
IPv6 Address Allocation and Address Types
MPLS and Carrier Networks
Introduction
Carrier Packet Network Basics
Service Level Agreements
Provider Equipment at the Customer Premise
Virtual Circuit Technologies
Packet-Switching using Virtual Circuits
Frame Relay using Virtual Circuits
ATM
MPLS
MPLS VPN Service for Business Customers
MPLS and Diff-Serv to Support Class of Service
MPLS for Integrated Access
MPLS for Traffic Aggregation
M is for Multiprotocol: Virtual Private LAN Service (VPLS)
The Internet
A Network To Survive Nuclear War
The Inter-Net Protocol
Internet Service Providers
World Wide Web
Domain Name System
Hypertext
MIME and Base-64 Encoding for Email Attachments
Internet Telephony & VSPs
Internet VPNs
T1
T1 History and Applications
T1 Circuit Components
Operation
T1 Framing
Pulses and Line Code: AMI
Synchronization: Bit-Robbing
B8ZS and 64 kb/s Clear Channels
How T1 Is Provided
Fractional T1, DACS and Cross-Connects
Subrate Data Circuits 1.2 kb/s to 56 kb/s
Voice Services and Jargon
Local Voice Services
Long Distance Voice Services
Acronyms and Abbreviations
About Teracom
About the Author
Public Seminars
Private Onsite Seminars
DVD-Video Courses
GSA Schedule
Online Courses
TCO Telecommunications Certification
7
1
Introduction
In this chapter, we discuss the approach taken in organizing the topics in this text and provide
suggestions for how to use it. The chapter is completed with the answer to all questions about
telecommunications.
8
5 Digital
6 Transmission Systems
7 The Network Cloud and Service Provisioning
8 Fiber Optics
9 DSL and Cable Modems: Last Mile on Copper
10 Wireless
The second part is devoted to telecommunications technologies: the actual methods used to
implement circuits and services. We begin with digital: what digital is, how voice and video are
digitized, and how digitized information is actually transmitted.
The next chapter is transmission systems: the high-capacity systems developed to carry many
users’ traffic. This starts with the installed base of channelized systems, the hierarchy of DS0,
DS1 and DS3 rates and an overview of T1, T3, SONET and ISDN. Then our attention turns to
the new generation packetized systems, introducing the concepts of overbooking and band-
width on demand instead of channels, how this is implemented with frames and packets, coex-
istence and transition from channels to packets.
Then we understand the “Network Cloud”, how services are actually implemented, the three
basic types of services and the equipment used for each.
Completing this part are three chapters on the technologies used to implement the network,
circuits and services. First is Fiber Optics including fundamentals of fiber, wave-division multi-
plexing, the network core, Metropolitan Area Networks and fiber to the premise.
Second is DSL and Cable Modems to implement the “last mile” on existing copper plant, cov-
ering fundamentals of modems, DSLAMs, VDSL, broadband and cable modems.
Last is Wireless, concentrating on mobile communications: cellular and mobility concepts, the
technologies TDMA, CDMA and OFDM, the generations from 1G to 4G, and the systems
GSM, UMTS, 1X and LTE. This chapter is completed with WiFi and satellite.
Part III: The IP Packet-Switched Telecom Network
11 “Data” Communications Concepts
12 Coding, Frames and Packets
13 The OSI Layers and Protocol Stacks
14 Ethernet, LANs and VLANs
15 IP Networks, Routers and Addresses
16 MPLS and Carrier Networks
17 The Internet
18 Wrapping Up
The third part of the book is dedicated to the new-generation IP telecommunications network.
We begin by understanding how convergence was achieved by treating voice and video like
data – then accordingly, cover the fundamentals of what used to be called “data communica-
tions”: DTEs, DCEs, LANs and WANs and the crucial concepts of packets and frames.
There are so many functions that need to be performed to implement phone calls, television,
web browsing, email and everything else over the IP network, a structure is necessary to be
able to identify and discuss separate issues separately. For this purpose, we use the OSI Ref-
erence Model and its layers, identifying what the layers are, examples of protocols for each
layer and how they work together in a protocol stack.
Then we begin moving up the layers. Having already mostly covered the physical connections
(Layer 1) in the chapters on fiber, DSL, cable and wireless, the next chapter is on Ethernet,
LANs and VLANs (Layer 2), including MAC addresses and MAC frames, LAN cables, Optical
Ethernet, LAN switches and how VLANs are used to separate traffic.
The next chapter is all about IP (Layer 3): how routers implement the network, routing tables,
IP addresses, subnets, IPv4 address classes, static addresses, dynamic addresses and
DHCP; public addresses, private addresses and NAT; and an overview of IP version 6.
On a real-world telecom network, a traffic management system is required. This is imple-
mented with a technique called in general virtual circuits, and in particular with MPLS. The next
chapter in the book covers the fundamentals, briefly reviews legacy technologies X.25, Frame
9
Relay and ATM, then focuses on MPLS and how it is used to implement VPNs, Class of Ser-
vice, service integration and traffic aggregation.
The last main chapter is on the Internet: its origins, what an ISP is and how an ISP connects to
the rest of the Internet via transit and peering, the web, the Domain Name System, HTML and
HTTP, SSL, MIME and base-64 encoding for email, Internet telephony and Internet VPNs vs.
business-customer “MPLS service”.
The final chapter is a summary and wrap-up, covering technology deployment from the top
down, useful reference charts listing all of the technologies, standard network designs and
ending with a look at The Future.
Appendices
Appendix A All About T1
Appendix B Legacy Voice Services and Jargon
Appendix C Acronyms and Abbreviations
Telecommunications technology is in constant change – and technologies that used to be of
prime importance are not so important today, and so have been moved from the main part of
the book into appendices. The very last part of the book provides a comprehensive list decod-
ing mainstream acronyms and abbreviations used in telecom.
10
one place to another – and not surprisingly, there is a strong correlation between that and how
much you have to pay for it.
When we discuss technologies like POTS, T1, T3, SONET, ISDN, IP and others, one thing that
we will try to convey in this text is that these technologies are all essentially trade-offs between
cost and performance decided by a group of people sitting around a conference table one
Tuesday morning.
T1 was an example of this. T1 was designed in the late 1950s by a group of people at Bell
Labs in Holmdel, New Jersey. The requirement was to implement “digital” communications on
the existing copper wire transmission circuits, to increase the number of phone calls carried on
a set of physical wires.
Presumably, analyses were performed, lab experiments and field trials were undertaken, and it
was discovered that if the repeaters were spaced about one mile apart, it would be possible to
transmit about 1.5 Mb/s most of the time on most of the existing wires... so this design was
chosen, and 1.5 Mb/s became a standard line speed in the industry.
The repeaters could have been spaced two miles apart, and it would have been cheaper to im-
plement, but it also would have run more slowly. This was a trade-off between cost and perfor-
mance.
More recent examples include all of the different variations of Optical Ethernet, trading off bit
rate against cost of the optical transceivers and reach.
1.4.2 Answer Number 2: History
Those who do not learn history are doomed to repeat it.
You may be interested in learning about Voice over IP (VoIP). You probably should be inter-
ested in learning about it, as all telephone calls will be VoIP in the not-too-distant future.
If you want to understand Voice over IP, there are a number of technologies that come in to
play. One is Voice. Another is IP.
Voice is digitized in the phone in a VoIP system to be carried in IP packets.
Voice digitization involves three elements:
1) Sampling the value of the analog voltage coming out of the microphone at regular intervals,
2) Quantizing the range of possible values of the sample into fixed increments, and
3) Coding the resulting quantized value into binary.
Questions that arise are: how often do samples have to be taken, what are the quantization in-
crements and what algorithm is used to represent the quantized value in binary?
It turns out that it is necessary to take samples more than twice as often as the width of the fre-
quency band of the analog voltage coming out of the microphone.
All of a sudden we’re back to the summer of 1874 when Alexander Graham Bell made some
design decisions, and a bit later when loading coils were deployed on long-distance trunks,
which directly affect the method of digitization of voice for Voice over IP.
And the quantization and coding algorithms for VoIP are the same as those used for digital
voice channels called DS0s beginning in the 1950s.
We would claim that if you don’t understand this progression of one thing on top of another,
you will never really understand where we are today, and won’t be ready to understand where
we are going tomorrow, the all-IP Network..
In this text, and in our seminars and videos, we start at the beginning, progress in a logical or-
der, and finish at the end – to build structured knowledge so that you can understand how ev-
erything fits together.
1.4.3 Answer Number 3: It’s All Pretty Much the Same Thing
We could simplify “telecommunications” by claiming that there are two kinds of traffic or infor-
mation to be communicated: information that happens in continuous streams, and information
that happens in bursts.
Video is a good example of information that happens in continuous streams: when sending
video to someone, we are constantly transmitting picture information. E-mail is a good example
of information that happens in bursts: you send e-mail to someone, and then you don’t.
11
Telecommunication service providers like Verizon, AT&T, Bell Canada, TELUS and Sprint have
two basic kinds of services: they have services that allow their customers to transmit continu-
ous streams of information; and services that allow their customers to transmit bursts of infor-
mation.
If we look one level deeper in the network, to see how these services are offered, we find that
the way that a service provider offers to its customers the possibility of communicating informa-
tion in bursts is to take a circuit that actually communicates in continuous streams, attach
boxes called MPLS routers to each end, connect a large number of customers and let them
send information whenever there’s a free spot on the circuit that communicates all the time.
Now you know everything there is to know about telecommunications. Not. We’re not going to
simplify things quite that much, but…
☞ Once you achieve spiritual nirvana in telecommunications, you will realize that all of the
services you hear about like Internet access, telephone service, MPLS service, T1,
ISDN and the rest are all really billing plans.
There is really only one kind of transmission network, built with fiber optic transmission sys-
tems using Optical Ethernet for new installations and an installed base of SONET from days
past.
There are a few methods of providing access to these fiber transmission systems: copper
wires, radio and fiber. There are many, many ways of billing you for using some of the capacity
on the transmission system in different ways and at different times.
It’s not like there is one “fiber backbone” for voice, a different one for data, a third one for tele-
vision and a fourth one for the Internet.
It all runs over the same pieces of glass with the same light flashing on and off 10,000,000,000
times per second to represent 1s and 0s.
Those are the answers.
The rest of this book is devoted to understanding the questions...
12
2
Fundamentals of Telephony
2.1 History of Telecommunications
Telecommunications began not with telephones, but with telegraphs. Telegraph systems were
the command and control systems for railways: used to communicate information about trains
from one end of the line to the other. Railways and their telegraph systems were deployed
across North America in the first half of the 1800s, and these were the first communication net-
works.
2.1.1 Invention of the Telephone
The telephone was invented by Alexander Graham Bell between 1874 and 1876, with most of
the work done on his father’s homestead near Brantford, Ontario in the Niagara region, and
some of the work done at his winter job at a school for deaf children in Boston.
It was in Brantford, in the summer of 1874, that Bell told his father how he proposed to build a
telephone, and there in the summer of 1875 that he drew up the patent application.
Bell demonstrated the telephone apparatus over short distances of wire with the words “Mr.
Watson, come here I want you!” on March 10, 1876 in Boston, and again at the Centennial Ex-
position in Philadelphia in June 1876… but communications across distance remained elusive.
Returning to Brantford in the summer of 1876, Bell refined his apparatus and made three suc-
cessful tests of communication across distance. This is generally considered to be the first
long-distance phone call.
The article The Human Voice Transmitted by Telegraph in the September 1876 issue of Scien-
tific American magazine outlined these experiments.
13
In August 1876, Bell successfully demonstrated speech communication across wires of the
Dominion Telegraph Company between telegraph offices in Brantford and Mount Pleasant On-
tario; then between the Bell homestead and the telegraph office in Brantford, a distance of four
miles; and on August 10, 1876 over the eight-mile telegraph line between Brantford and Paris,
Ontario with the battery 58 miles away in Toronto.
If the Dominion Telegraph Company had been able to foresee that Bell’s company (that to this
day bears his name) would eventually put them out of business, they might not have been so
cooperative in hosting the trials!
Bell patented his device in 1876. Subsequently, it became a national sport to challenge his
patent in court. There were over 600 court challenges to Bell’s patent – every one unsuccess-
ful.
The many notes and diagrams produced in Brantford in the summers of 1874 and 1875, along
with his father’s diary were used to prove Bell’s claim to the invention of the telephone.
14
Figure 2. Chronology of the invention of the telephone in Alexander Graham Bell’s handwriting.
Figure 2 is an image of one of the many memorabilia residing in the Bell Homestead Museum
at Tutelo Heights, Brantford, Ontario, Canada. It was composed by Bell following the opening
of the Bell Memorial at Brantford 24 October 1917. Credit to telecommunications.ca for the im-
age.
Claims are made for both Boston and Philadelphia as being the place where the telephone
was invented. In 2002, the US Congress passed a resolution claiming that Italian-American
15
Antonio Meucci had in fact invented the telephone and Bell had taken his lab notes and
patented the idea.
None of these claims are consistent with the serious, repeated, detailed investigations by hun-
dreds of people alive at the time of the events leading to court decisions what was invented
where and by whom (the telephone, in Brantford Ontario Canada, by Alexander Graham Bell)
during challenges of Bell’s patent.
2.1.2 Local Phone Companies
Telephone service began with connections within cities. A company would establish a Central
or Central Office (CO) downtown, and connect subscribers to their communication service to
the CO using pairs of copper wires to carry the electrical signals representing speech.
These subscribers would alert an operator in the CO that they wanted to establish a connec-
tion by cranking a handle that caused a bell to ring at the CO, and then telling the operator the
name of the person to which they wished to be connected. The operator would use a cord to
connect the two subscribers via a large patch board. This was the first kind of telephone
switch.
Since copper is a good, but not perfect, conductor of electricity – it has some resistance to the
flow of electrons through it – the copper wires could only be a certain maximum length before it
would not be possible to hear what the other person was saying.
Thus, local phone companies providing service in a radius of a few miles around a Central Of-
fice sprung up in major cities across the continent beginning in 1878. Inter-city long-distance
communications was not technically possible yet.
2.1.3 The Bell System
In the USA, these local phone companies were either part of, owned by or licensed by the Bell
Telephone Company which became the American Bell Telephone Company in 1880.
Its Chief Operating Officer and later president, Theodore Vail, began creating the Bell System,
to be composed of regional companies offering local service, a long distance company and a
manufacturing arm providing equipment.
Figure 3. Building telecommunications networks - planting poles and stringing wires across the continent - is big
business, like railroads. In the photo, making the first call from New York to San Francisco, left to right is
16
Theodore Vail, the man who got it done, financiers William Rockefeller (seated) and J. P. Morgan Jr. (standing)
along with network architects Samuel Trowbridge and Welles Bosworth.
The American Telephone and Telegraph Company (AT&T) was incorporated in March, 1885 as
a wholly-owned subsidiary of American Bell, with the initial business plan of providing long-dis-
tance service for the Bell System: connecting the local companies.
Building out from New York, its initial goal Chicago was reached in 1892, and San Francisco in
1915. AT&T continued as the “long-distance company” until Dec. 30, 1899, when it changed its
business model to be vertically integrated: local and long distance, by acquiring the assets of
the American Bell Telephone Company and becoming the parent company of the Bell System.
2.1.4 US Regulation and Competition
Until Bell’s patent expired in 1894, only licensees of American Bell could legally operate tele-
phone systems in the United States.
Between 1894 and 1904, over six thousand telephone companies, called independents (that
is, not part of the Bell System) went into business, and the number of telephones increased
from some 250,000 to over 3,000,000… but in many cases, there was no interconnection be-
tween the independents.
For much of its history, AT&T and the Bell System functioned as a regulated monopoly. The
idea was that the telephone system, by the nature of its technology, would operate most effi-
ciently as a monopoly providing universal service.
However, business practices prompted the United States government to sue AT&T three times
under antitrust laws: 1913, 1949 and 1974.
The 1913 suit resulted in the Kingsbury Commitment, in which among other things AT&T
agreed to connect independents to its long-distance network.
Several court decisions forced the opening of AT&T’s network from a technical point of view.
These included the Carterphone decision, which allowed customers to use their own terminal
equipment on the Bell System, and MCI’s successful suit that allowed MCI to connect to
AT&T’s network to carry long-distance calls.
A 1974 suit by the Justice Department was settled when AT&T agreed to divest itself of local
operating companies in January 1984 in exchange for loosening of regulation.
The ownership of AT&T’s local operations was transferred to one of seven holding companies,
known as the Baby Bells: US West, Pac Bell, Southwestern Bell, Bell South, Bell Atlantic,
NYNEX and Ameritech.
The remaining operations were the long lines, now called AT&T Corp., which was then forced
to compete with other companies for carrying phone calls and data services long distance.
Figure 4. The ownership of AT&T’s local operations was transferred to seven holding companies, known as the
Baby Bells.
In 1996, the federal government’s Telecommunications Act removed many of the remaining
obstacles at the federal level to wide-open competition for both local and long-distance
17
telecommunications... which meant in practice that local and long-distance operations could
merge back together.
Significant obstacles remained at the state Public Utility Commission level, which were slowly
overcome.
2.1.5 Consolidation
1996 saw the beginning of consolidation of the Baby Bells with the purchase of NYNEX by Bell
Atlantic.
SBC Communications Inc., owner of Southwestern Bell, purchased Pac Bell in 1997, SNET in
1998 and Ameritech in 1999.
In 2000, Bell Atlantic merged with GTE, owner of many independents, and baptized the result
Verizon, a focus-group-tested name from a combination of the words veritas (truth) and hori-
zon. They lead to the true horizon.
US West was purchased by Qwest, later merging with Century Tel to form CenturyLink.
Many other independent companies continued to own and/or operate local networks and re-
gional fiber backbones.
Once the LECs could be IXCs, local and long-distance operations were merged back together
by the LECs purchasing the IXCs.
In 2005, Verizon purchased MCI.
To get the valuable brand name “AT&T”, SBC implemented a reverse takeover of AT&T, pur-
chasing AT&T Corp. and changing the name of the resulting company to “AT&T”.
18
VoIP and Internet telephony began commercially in 2002 and 2003, the beginning of the end
for the time-and-distance pricing model for voice communications and pure long-distance carri-
ers.
These topics are covered in detail in subsequent chapters.
2.1.7 Canadian Telegraph Companies
Telecommunications in Canada began with telegraph companies. By 1847, the Montreal Tele-
graph Company was established and providing service in the Quebec City - Windsor corridor,
with a link to Western Union in Detroit.
Telegraphs were instrumental in the construction and operation of railways. In 1886, Canadian
Pacific Railways Telegraphs came online as a competitor.
After World War I, most of Canada’s smaller railways were in serious financial difficulty. A
bailout by the federal government saw the merger of these railways into the Canadian National
Railway, and their telegraph lines became the CN Telegraph Company.
Figure 6. CN and CP railway telegraph systems were the basis for Allstream.
During the period from 1932 to 1964, these two railway telegraph companies both competed
and jointly offered services. In 1932 they provided national network services for the Canadian
Radio Broadcast Commission. In 1939, national weather service; after the Second World War
private wire services; in 1956 the first telex services in North America, and in 1964 a cross-
Canada microwave radio transmission network.
These two railway telegraph companies were fused to form CNCP Telecommunications in
1980. In 1988 Canadian Pacific bought out CN, sold 40% of the company to Rogers Communi-
cations Inc. and renamed the company Unitel.
Decision 92-12 by the Canadian Radio-Television Telecommunications Commission, the fed-
eral regulatory agency, allowed Unitel to provide competitive long-distance services. In 1993,
20% of Unitel was sold to AT&T Corporation of the United States.
Even though the regulators gave Unitel a discount on payments to the telephone companies
for using their access wires for the first five years, a number of factors including the necessity
to build and maintain a transmission network 7,200 kilometers (4,500 miles) long to connect
Victoria to St. John’s, plus the costs of the POPs and interconnection in toll centers, customer
care and billing systems, the people to run it all and the natural competitive practices by incum-
bent carriers made Unitel unprofitable.
After several years, Rogers Communications Inc. abandoned its interests in Unitel and through
a Canadian Creditors’ Protection Act bankruptcy-like proceeding, Unitel’s ownership was re-
duced to AT&T Corporation and three Canadian banks. The reorganized company became
AT&T Canada Long Distance Services Company.
Subsequently, AT&T Corporation of the USA bought out the rest of AT&T Canada through a
holding company. However, the geographic and market factors that made Unitel unprofitable
had not changed, and AT&T Canada continued to lose money. AT&T Canada sold its residen-
tial long-distance operations to Primus Telecommunications, and in 2003 went through a sec-
ond bankruptcy-like reorganization.
The resulting company was re-baptized Allstream, providing corporate and data services. All-
stream was subsequently purchased then sold by MTS of Manitoba. Allstream today is the
main facilities-based Inter-Exchange carrier competing with the telephone companies.
19
2.1.8 Canadian Telephone Companies
In 1880, the Bell Telephone Company of Canada was established in Montreal, and other com-
panies providing local service in other cities sprung up across the country. At the time, long-
distance inter-city communications was not technically possible, so these companies each pro-
vided telephone service in a local area.
In 1921, the Telephone Association of Canada was formed to promote the construction of a na-
tional network. In 1931, the Trans-Canada Telephone System, again an association of “local”
telephone companies, began the development of a national network. In 1958, a 158-station
cross-Canada microwave network was completed - the world’s longest at the time. In 1983, the
association changed its name to Telecom Canada and in 1992 to Stentor. The facilities that
made up the national network were owned and operated by member companies such as Bell
Canada and BC Tel. The Stentor Alliance was terminated effective December 31, 1999.
Figure 7. The Canadian business model mostly evolved to the same as the US: large companies owning local op-
erations in many areas, CLECs in many others and long-distance transmission facilities.
The Canadian business model mostly evolved to large holding companies owning local opera-
tions in many areas plus long-distance transmission facilities, and operating agreements be-
tween the companies for interconnect.
BCTel, AGT, Ed Tel and Quebec Telephone merged to form TELUS. Bell Canada and the four
telephone companies in the maritime provinces were reorganized as Bell Canada in metropoli-
tan areas of Ontario and Quebec and Bell Aliant elsewhere, both majority owned by BCE.
These companies both provide IPTV on VDSL or fiber, and are both expanding to provide na-
tional service via fiber, collocations and wireless.
Rogers Communications Inc. is now another major player in the telephone business. Rogers
started in the cable TV business, with the creation of Rogers Cable by Ted Rogers in 1967 in
Ontario. In 1979, Rogers acquired Canadian Cablesystems and became the largest cable
company in Canada.
In the 1980s, Rogers entered the cellular market under the Cantel brand name and later ac-
quired Microcell and its Fido brand.
After its first venture in telecom with Unitel ended, in 2004 Rogers re-entered the business, ac-
quiring Sprint Canada and Callnet, operating as a facilities-based Inter-Exchange Carrier, a re-
seller and as a Competitive Local Exchange Carrier (CLEC) with landlines in Richmond BC.
2.1.9 The Rest of the World
In many European countries, the national government operated a Post, Telephone and Tele-
graph (PTT) company that was a government-owned monopoly.
Competition for both local and long-distance voice and data communications has been intro-
duced at different rates in different countries.
In all cases, we see the progression of telecommunications service characterized by:
20
• Monolithic organizations holding a monopoly and the mandate to provide universal service
under government ownership, control or regulation,
• Then the breakup of the monopoly to introduce competition in inter-city and long distance
communications,
• Followed by competition in providing local services.
In many parts of the world, particularly in developing areas without usable existing infrastruc-
ture, mobile wireless is a more popular method of accessing the telephone network - and inter-
net - since it is far simpler and less expensive to set up cellular radio base stations than it is to
wire or fiber neighborhoods.
In addition to services for individuals, providing high-capacity and high-availability voice and
data services for business customers like banks, distribution centers and government is a vi-
able business everywhere in the world.
21
At the top of Figure 8 is a telephone and a telephone switch. The telephone is located in a
building called a Customer Premise, and the telephone switch is located in a building called a
Central Office or CO. One could refer to the telephone as Customer Premise Equipment or
CPE.
2.2.2 Loops
The telephone is connected to the telephone switch with two copper wires, often called a local
loop or a subscriber loop, or simply a loop. This is a dedicated access circuit from the cus-
tomer premise to the network.
There is usually the same arrangement at the other end, with the far-end telephone in a differ-
ent customer premise and the far-end telephone switch usually in a different central office.
Copper is a good conductor of electricity - but not perfect; it has some resistance to the flow of
electricity through it. Because of this, the signals on the loop diminish in intensity or attenuate
with distance.
The maximum resistance allowed is usually 1300 ohms, which is reached in 18,000 feet (3
miles or 5 kilometers) on standard-thickness 26-gauge cable, but could be as long as 14 miles
or 22 kilometers on thicker 19-gauge cable.
This maximum loop length of 3 miles or 5 kilometers defined the traditional serving area
around a Central Office, about 27 square miles or 75 km2.
2.2.3 Trunks and Circuit Switching
Telephone switches are connected with trunks. While subscriber loops are dedicated access
circuits, trunks are shared connections between COs.
To establish a connection between one customer premise and another, the calling party signals
the network address (the telephone number) of the called party over their loop to the network,
or more specifically, to their CO switch.
The switch makes a routing decision for the phone call then implements it by seizing an un-
used trunk circuit going in the correct direction and connecting the loop to that trunk.
The called party network address is signaled to the far-end switch, which connects the trunk to
the correct far-end loop. When the far-end customer picks up the phone, an end-to-end con-
nection is in place and maintained for the duration of the phone call.
When one end or the other hangs up, the trunk is released for someone else to use for con-
nections between those COs. This method for sharing trunks is circuit-switching, called dial-up
when telephones had rotary dials.
2.2.4 Remotes
Figure 8 was a model for the telephone network up to the end of the Second World War. With
the subsequent suburban sprawl, it was not cost-effective to build COs every five miles or eight
kilometers.
New subdivisions began to be served from remote switches or more simply, remotes, which
are low-capacity switches in small above-ground buildings or underground controlled environ-
ment vaults.
As illustrated in Figure 10, the remote provides telephone service on copper loops in the subdi-
vision and is connected back to the nearest big CO with a fiber backhaul.
The electronics and optics in the remote connect the fiber to the copper wires, or perhaps
more precisely, take information received over the fiber and transmit it to the residences over
copper loops, and vice-versa.
2.2.5 DSL and DSLAMs in the Outside Plant
In the 1990s, modem technology called Digital Subscriber Line (DSL) began to be deployed,
using the existing copper loop to connect a modem at the customer to a modem in the CO for
high-speed Internet access coexisting with telephone service on the loop.
To increase the achievable bit rate, the distance between the modems was shortened by mov-
ing the network side modem, contained in a device called a Digital Subscriber Line Access
Multiplexer (DSLAM) into the neighborhood.
22
The equipment and wiring in neighborhoods, along with transmission systems carrying trunks
is collectively referred to as the outside plant.
This remote DSLAM is usually located in a small enclosure bolted on to the side of a larger en-
closure called an Outside Plant Interface (OPI) or Serving Area Concept (SAC) box.
23
Figure 10. Remote Switches and DSLAMs
This is increasingly being seen as a temporary measure while waiting to pull fiber to the home
in an older neighborhood.
Eventually, most customers will have their own fiber terminal... connecting to copper wires and
WiFi inside the house.
2.2.7 Greenfields: GPONs on Fiber to the Premise
In greenfields, i.e. newly-constructed neighborhoods and multi-tenant buildings, where the ca-
bling is the initial installation, fiber to the premise is routinely installed.
Gigabit Passive Optical Network (GPON) technology is usually employed, where typically 32
customers time-share a fiber connection to the network. One fiber backhaul towards the net-
work is connected in a Central Splitting Point via lenses and mirrors to 32 fibers leading to cus-
tomer premises.
Only one customer can transmit at a time, so the uplink is shared in a round-robin fashion, and
each user is reserved a fixed amount of capacity on the uplink whether they are using it or not.
In the Transmission Systems chapter, this is called channelizing or channelized multiplexing.
2.2.8 Active Ethernet to the Premise
Active Ethernet may also be deployed. In this case, the customer’s fiber terminates on its own
port on an Ethernet switch, located either in the neighborhood or at a wire center. Customers
have the possibility of transmitting upstream any time they like instead of in time slots. In the
Transmission Systems chapter, this is called bandwidth on demand or statistical multiplexing.
Statistical multiplexing is more efficient than channelizing and gives users higher upload
speeds for the same capacity backhaul... but compared to the PON of Section 2.2.7 requires
24
31 more network-side fiber transceivers, so is more expensive to install and maintain.
Active Ethernet is routinely implemented for business customers.
2.2.9 Why the Loop Still Matters
It is important to note that even though today there may be digital switching and digital trans-
mission, for traditional telephone service in established areas, the access circuit between the
customer and the network - the local loop, the “last mile” - employs analog technology dating
back to the late 1800s.
Even if residential telephone service becomes Voice over IP over fiber, or VoIP over cable mo-
dem, analog technology of the local loop from 1880 is still used!
Telephone service from the cable TV company means traditional analog telephony on the in-
side wiring, plugged into a converter that carries it as Voice over IP over cable modem outside
of the house.
DSL service, broadband from the telephone company, is delivered on the existing local loop…
by modems in the remote in the previous image.
The 64 kb/s DS0 rate for channelized digital transmission systems, covered in a subsequent
lesson, is based on the frequency band supported on the traditional analog local loop.
For these reasons, an understanding of the characteristics and limitations of the local loop is
essential knowledge.
2.3 Analog
The technique for representing information on an ordinary local loop is called analog. This term
is often thrown about with little regard for its actual meaning, so we will spend a bit of time un-
derstanding what is meant by “analog”.
2.3.1 Analog Signals
The term analog comes from the use of a microphone in the handset of the telephone. A sim-
ple type of microphone, such as those in the handset of a telephone, has a plastic housing, a
paper diaphragm and carbon particles between the two.
Figure 11. The voltage on the wires is an analog of the strength of the sound pressure waves coming out of the
speaker’s mouth.
When someone speaks, sound pressure waves come out of their mouth. The person using the
telephone holds the microphone in front of their mouth, so that the sound pressure waves push
on the paper diaphragm.
This has the effect of compressing the carbon particles in the microphone, changing its electri-
cal characteristics… the microphone’s capacitance, to be precise.
The fact that the electrical characteristics of the microphone change as the sound pressure
waves hit it can be used to make a voltage on the telephone wires change.
☞ This voltage is a direct representation or analog of the strength of the sound pressure
waves: as a pressure wave pushes on the microphone, the voltage increases; as it
stops pushing on the microphone, the voltage reverts to where it was.
This is all that is meant by “analog”: representation. The voltage on the wires is an analog of
the strength of the sound pressure waves coming out of the speaker’s mouth. This voltage
25
could also be called an analog signal.
At the other end, a speaker is used to create sound pressure waves based on the received
analog signal. A speaker is an electromagnet glued onto a paper diaphragm.
The voltage that is the analog is applied to the electromagnet, causing the paper diaphragm to
move back and forth, creating sound pressure waves, which are hopefully a faithful reproduc-
tion of the original sound pressure waves coming from the speaker’s mouth.
2.3.2 Analog Circuits
The voltage carried on the loop is an analog signal. People then stretch this terminology and
refer to the two copper wires that form the loop as an “analog circuit”, which is not very accu-
rate.
The only thing analog in this story is the method for representing speech on copper wires using
electricity.
It would be more precise to call the loop “two copper wires that were designed to carry a volt-
age that is an analog of the strength of the sound pressure waves coming out of the speaker’s
face”.
It is possible to use digital techniques on the same copper wires.
26
Figure 12. A representation of a speech analog generated by a stereo microphone. The upper part of the diagram
shows on the vertical axis the sound pressure, interpreted by your brain as volume; and the lower part of the dia-
gram shows on the vertical axis the frequency of the compression-rarefaction cycle, interpreted by your brain as
pitch. The horizontal axis is time.
Sound pressure waves coming out of the speaker’s face vibrate rapidly, that is, go through cy-
cles of compression and rarefaction. If this vibration occurs between 20 and 20,000 cycles per
second, the sound pressure waves are said to be audible by the human ear.
2.4.2 Do Trees Falling in the Forest Make a Sound?
Understanding that sound is cycles of varying air pressure, and knowing that if this occurs be-
tween 20 and 20,000 times per second it is audible still does not tell us how faithful the voltage
analog must be, and how faithfully the sound must be reproduced at the far end.
27
Figure 13. Reconstructing Sounds vs. Reconstructing Thoughts
An age-old question is: if a tree falls in the forest, and no one is there to hear it, does it cause a
sound?
That depends whether you believe sound is pressure waves: air molecules being compressed
and rarefied as per the preceding textbook definition; or if you believe sound is the sensation
one gets in one’s brain when one hears the sound pressure waves.
The two choices in designing the telephone system are then to either:
a) Reproduce sound pressure waves coming out of the speaker in the far-end telephone ex-
actly as they entered the microphone in the near-end telephone; or
b) Reproduce the sensations in the listener’s brain the same as they would experience were
they speaking directly to the other person.
The difference between these two ideas is that the brain is a hugely complicated processing in-
strument, and it is possible to play different stimuli at it and get the same response.
Each choice has a dramatically different implication for the cost of implementing the system.
2.4.3 The Voiceband
What answer did Alexander Graham Bell choose? Answer (b).
Based on testing human beings’ ears, throats and brains, combined with a technical innovation
that extended the achievable transmission range, led us to transmit the information in the fre-
quency range between 300 and 3300 Hz.
Hertz (Hz) is the unit for frequency, or changes per second. The range or band of frequencies
from 300 to 3300 Hz is called the voiceband.
28
Figure 14 is an idealized representation of the voiceband, with frequency on the horizontal axis
and amplitude or intensity on the vertical axis.
29
Figure 15. The sound is reproduced just well enough so that the listener can recognize the speaker and under-
stand what the speaker is saying, thus meeting the requirement to communicate information using speech and
hearing
The sound is reproduced just well enough so that the listener can recognize the speaker and
understand what the speaker is saying, thus meeting the requirement to communicate informa-
tion using speech and hearing.
We are interested in transmitting the minimum required to meet that objective since there is a
direct relationship between the capacity a user can employ on the access circuit and the cost
of transmitting the information long-distance.
2.4.6 Problems With Voiceband Restrictions
It turns out that the voiceband is not quite enough bandwidth to be able to understand every-
thing the speaker is saying!
In particular, it is difficult to tell the difference between “S” and “F” over a telephone. This is be-
cause the frequency of sound pressure wave that distinguishes “S” from “F” is above 3300
Hz… which is not transmitted over the phone system.
Phonetic alphabets , such as one used by military forces, use words to communicate each let-
ter, for example, “S as in Sierra” and “F as in Foxtrot”
30
Figure 16. Standard and Alternate Phonetic Alphabets
.
One could also say things like “S as in Sea”, “C as in Cue”, “A as in Are” and “E as in Eye” to
liven things up. If that doesn’t get the listener confused, there’s always “E as in Ewe” and “Y as
in You”.
31
Figure 17. Attenuation and Amplifiers
In both cases, too far away from the transmitter, the signal will “disappear into the noise”, that
is, the signal level will become less than the noise level on the line, and it would be impossible
to faithfully reconstruct the speech.
Before this happens, the signal must be amplified at regular distance intervals to boost it back
up. The device that performs this function is called an amplifier. It multiplies or boosts the sig-
nal on its input by a certain factor.
The problem is noise that is added to the signal during transmission, before the signal reaches
the amplifier. The noise and signal are combined; when the signal is boosted up by an ampli-
fier, so is the noise.
This is the fundamental problem with analog transmission: the transmission system both atten-
uates the signal and adds noise to it; then to boost up the signal, the amplifier also boosts up
the noise.
An analog signal becomes noisier and noisier as it passes through each amplifier along a
transmission system.
2.5.2 Electro-Magnetic Interference
Noise comes in many forms. On copper-wire access circuits, the most problematic is caused
by radio waves, or more precisely, Electro-Magnetic Interference (EMI)
Copper wires act like antennas. When a radio wave impinges on a wire, it induces electricity
that adds to the desirable signal being carried on the wire. The source of such interfering addi-
tive noise includes television broadcasts, microwave ovens, computer chips, cellular radio
base stations, wireless LANs and other sources.
Interestingly, glass – fiber optics – does not act like an antenna and does not pick up this kind
of interference.
2.5.3 Crosstalk
Crosstalk is a specific type of EMI, the transference of energy from one wire to another via
electro-magnetic radiation. Usually, this happens when two circuits are in the same cable: a
signal placed on one circuit will create a magnetic field that passes through the other circuit
and induces current on it.
This is why you can hear other people talking on your regular wired telephone sometimes. The
annoyance factor decreases with comprehensibility.
2.5.4 Impulse Noise
Impulse noise appears like spikes of voltage on a circuit. This is caused by lightning striking
the wires, by the spark that jumps across the contacts of a switch just before it closes, and
when the brushes on an electric motor pass the unpowered portion of its armature.
In days past, this could be seen as white dots on a television screen when a drill or vacuum
cleaner is operated in close proximity.
Impulse noise is not additive noise – it hard-limits the signal to maximum, and causes a burst
of errors to happen.
The most popular way to deal with impulse noise is to format data into frames with error detec-
tion, and re-transmit a frame if there was a spike on the line that caused a burst of errors to
happen.
32
This is covered in detail in a subsequent chapter.
33
To minimize the amount of noise picked up on the wires, they are covered in plastic, then
twisted together.
Since there is plastic on the wires, they still act electrically like one big current loop, but from
an antenna point of view they appear as a series of small loops. The small loops have a
smaller area than the big loop, and so this minimizes the antenna effect of the wires.
Since there are two wires twisted together, we call them twisted pair. Twisted pair is used for
mostly all cabling, including telephone wires on poles, inside wiring and data cabling – LAN ca-
bles have four twisted pairs.
2.6.3 Line Card
The twisted-pair loop is terminated on the network side on a line card.
A line card is traditionally a small fiberglass board populated with a number of components, in-
tegrated circuits and connectors. This line card is plugged into a slot in a drawer, in a shelf, in a
rack, that is part of a traditional telephone switch.
In newer applications, the line card might be part of a gateway that converts between POTS
and Voice over IP, discussed in detail in a subsequent section.
The line card implements quite a number of functions, sometimes referred to by the acronym
BORSCHT: battery, overvoltage protection, ringing, supervision, codec, hybrid and testing.
2.6.4 Microphone and Speaker
The microphone is a kind of transducer, creating a voltage based on sound pressure waves.
The value of this voltage is a representation or analog of the strength of the sound pressure
waves coming out of the speaker’s throat.
The voltage is carried from the telephone over the loop to the line card at the near end, where
it is digitized by the codec and transported by the telephone network to be reproduced by the
far-end line card and carried by the far-end loop to the far-end telephone.
The speaker, as might be imagined, works in a manner opposite to the microphone: it uses re-
ceived voltage to create sound pressure waves that are directed into the user’s ear.
2.6.5 Balanced Signaling
Voltage is always measured as a difference between the voltage on one object and the voltage
on another.
In many cases, one object is the earth and the other is a wire, so the voltage measurement is
with respect to the ground.
This is not the case with a telephone loop. On a telephone loop, the voltage is measured be-
tween the two wires that are the loop, not between the earth and the wires.
Balanced signaling is used. This means that if the voltage on one wire with respect to ground
is some positive value, the voltage on the other wire with respect to ground will be the same
value, but negative.
Since added noise will be the same on the two wires, when measuring the voltage between the
two wires at the receiver, the signal is doubled and the noise is canceled.
2.6.6 Two-Way Simultaneous
The two wires that are the loop are used to transmit information in both directions at the same
time.
Both the telephone and the line card cause voltage analogs of sound to be placed across the
two wires of the loop. The voltages from the devices at each end are added together.
2.6.7 Hybrid Transformer
The voltage for each direction is separated by a device inside the telephone called the hybrid,
which has the two-wire loop on one side and two circuits on the other side, one for the speaker
and the other for the microphone.
A similar function is implemented on the line card, connecting the loop to the transmit and re-
ceive pins of the codec.
2.6.8 Battery
34
In addition to the voltage analog of sound, which might be thought of as an AC (or varying) sig-
nal, the line card also places a DC (or steady) voltage across the two wires that make up the
loop.
This voltage is called battery in the business, and is used to power the telephone. It is nomi-
nally -48 volts, measured from ring to tip.
2.6.9 Lightning Protection
Another item on the diagram is the protection circuit across the loop. This is to protect the tele-
phone user from being electrocuted, if lightning hits the loop or a high-voltage electrical trans-
mission wire touches the loop.
There are in fact three levels of protection: a fuse on the line card will blow if too much current
passes through it, circuitry on the demarc or demarcation point where the telephone com-
pany’s wires connect to the customer’s wires that will fall to ground if the voltage is too high,
and third, inside the telephone a circuit that will short-circuit the loop if the voltage across the
loop is too high.
2.6.10 Supervision
Two other components of the telephone, the hook switch and ringer, are used for supervision.
Supervision means regardless of to whom you wish to speak, and regardless of what you are
going to say to them, you must indicate to the other end of your loop that you want to start do-
ing all of this.
The hook switch in the telephone is normally open, so the two wires that make up the loop are
not connected, and no electricity or current is flowing around the loop.
To initiate communications, the user picks up the handset (goes off-hook), which causes the
hook switch to close, connecting the two wires together, which then allows the line voltage to
push current around in a… loop. This is why they are called loops.
This type of supervision is called loop start signaling: the two wires are connected, forming a
loop and allows current to flow in a loop.
The line card on the telephone switch detects this current and acknowledges with a dial tone
(assuming you have paid your bill).
There are variations on this theme used in other applications such as PBX switches, such as
ground start signaling, where one of the wires is plugged into the ground, so the current flows
along one wire then back through the ground; reverse battery signaling where the positive and
negative line voltage is reversed; and wink start signaling where that is done for a short interval
then returned to normal value.
For supervision in the other direction, the switch indicates it wants to initiate communications
by having the line card place a ringing signal on the loop.
This is yet another voltage, one that varies 20 times per second. It is applied to the line for two
seconds then not for four seconds in a repeating cycle.
When your phone rings, it is on-hook. This means that the hook-switch is open, so the current
pushed by this ringing signal flows through the ringer as shown in Figure 18 – originally two
brass bells with a clapper between that would move back and forth 20 times per second for
two seconds then rest for four seconds. The user acknowledges by going off-hook.
The line voltages are nominally as follows:
• On Hook: -48 Volts DC
• Ringing: -48 Volts DC, plus 100 Volts RMS @ 20 Hz
• Off-Hook: -7 to -12 Volts DC.
2.6.11 Call Progress Tones
Dial tone is a type of call progress tone. There are many others, such as busy, fast busy sig-
nals, ringback, congestion, sounder and howler tones. These are generated by the switch to
inform the user of different conditions.
Some of the call progress tones, such as dial tone and fast busy are generated by the near-
end switch. Busy signals are generated by the far-end switch.
35
2.7 Network Addresses: Telephone Numbers
Once your request to communicate is acknowledged with a dial tone, it is necessary to inform
the network where the call is to be connected.
In general, network address is the name given to the piece of information used to identify the
final destination of a connection across a network. For POTS, network addresses are of course
called telephone numbers.
2.7.1 Dialing Plan
The length of the telephone number, that is, the number of digits that have to be dialed, and
how the addresses are assigned to subscribers is called a numbering plan or dialing plan.
In days past, the North American Numbering Plan for telephone numbers was composed of
digits with specific purposes. Restrictions were placed on the values of various digits so that
dumb mechanical and analog switches could distinguish between them.
Addresses were originally of the form NBN-NNX-XXXX, where
• N is any number from 2 – 9
• B is any number from 0 – 1
• X is any number, and
• The first three digits were the area code,
• The next two were the CO code,
• The next one identified the switch in that CO,
• The last four identified the physical pair of wires.
The user had to dial anywhere from five to ten of these digits, sometimes prefaced with a 1 to
indicate the desired destination.
All of this has changed with the introduction of computer-based switches, computer control
systems for the switching, and the need for more network addresses: the last area code under
this plan was assigned in the 1990s!
Today, telephone numbers can be of the form NXX-NXX-XXXX, and the “area code” no longer
necessarily corresponds to a unique geographic area nor necessarily means long distance
charges will apply.
To provide new network addresses, area codes are split and overlaid, and users are required
in these locations to dial ten digits.
The physical destination corresponding to any particular address is now stored in a database
in a computer.
2.7.2 Address Signaling
The last main aspect of POTS is address signaling, and in particular, how the network address
of the called party is indicated or signaled from the calling party’s telephone to the CO switch.
The first kind of CO switch was a person using a switchboard and patch cords to connect loops
and trunks. In this case, the mechanism for the caller to signal the network address of the
called party was for the caller to use their voice and identify the desired called party by name.
2.7.3 Pulse Dialing
To signal numerical addresses from the telephone to the switch, a rotary dial was added to the
telephone. This dial was a metal disc with holes, connected to a dial switch inside the tele-
phone with a spring.
To indicate a digit, the caller placed a finger in the hole in the dial corresponding to that digit,
rotated the dial to a stop position, then removed their finger from the hole. As a spring rotated
the dial back to its rest position, another spring would cause the dial switch to open and close
a number of times corresponding to the desired digit.
Since the hookswitch is closed at this time, opening the dial switch would momentarily interrupt
the flow of electricity on the loop, then closing the dial switch would allow the resumption of the
current, then interrupted, then resumed, and so on.
From the line card point of view, this would appear as pulses of electrons coming down the
loop; viewed on a voltmeter, it would appear as square pulses of voltage, and so this signaling
technique is called pulse dialing.
36
Figure 19. Rotary Dial Telephone
One question that arises is: what is the difference in function between the hook switch and the
dial switch, other than the fact that the hook switch is normally open and the dial switch is nor-
mally closed?
The answer: nothing. Both switches do the same thing: they either make or break the loop… a
Flintstones-era technology called “make-or-break” signaling. Knowing this, it should be possi-
ble to signal network addresses using the hook switch on a telephone…
The hook switch must be depressed for 45 milliseconds, then released for 55 ms, which would
be one pulse. This is repeated the number of the digit, for example, four times to indicate a “4”.
Then a pause, the inter-digit interval of 700 ms is required, then the next digit is signaled.
With some practice, it is not difficult to signal “4-1-1” using this method. Be sure to hang up be-
fore being charged for directory assistance if you try this and succeed!
There are two problems with pulse dialing: first, it is ridiculously slow – a 0 is not zero pulses,
but ten pulses, so it takes 1.7 seconds to signal a 0 including the inter-digit interval. Second,
the only device that the signaling goes to is the line card on the switch; the make-or-break-the-
loop signaling stops there.
2.7.4 DTMF: “Touch Tone”
The improvement on pulse dialing was called Touch Tone. Pulse dialing is very slow. Touch-
tone is faster.
Touch-tone is actually a registered trademark of AT&T. The generic name for this type of sig-
naling is Dual Tone Multiple Frequency or DTMF signaling. This is an address signaling mech-
anism that uses combinations of tones, i.e. single pure frequencies, to represent buttons being
pressed, and the buttons each represent a number.
On a standard telephone keypad, there are 12 buttons: 0 – 9, star (*) and octalthorpe (#). Oc-
talthorpe is commonly also called the “pound” key.
The reason this is called a dual tone signaling system is that rather than defining one tone per
button, which would require 12 tone generators in the telephone and 12 tone detectors on the
line card to represent the 12 buttons on a normal telephone keypad, the tones are instead ar-
ranged in a grid pattern, and two tones are generated to represent each button.
For example, to signal the number 4 to the line card, pressing the button marked four causes a
tone at 770 Hz and a tone at 1209 Hz to be generated.
Using two tones per button requires only 7 tones (3 + 4) instead of 12 (3 x 4), and so is
cheaper to implement: only 7 tone generators in the telephone and only 7 tone detectors in the
line card instead of 12.
Figure 20. DTMF
37
DTMF signaling is faster than pulse dialing, as the button must be depressed for a minimum of
50 ms and the inter-digit interval is 50 ms – for all buttons. A zero requires 100 ms (0.1 sec) to
signal using this method, compared to 1.7 seconds using dial pulsing.
2.7.5 In-Band Signaling
Another advantage of DTMF is that it is an in-band signaling mechanism. All of the tones are
within the voiceband: 300 - 3300 Hz. The capability put in place for voice communication is
also being used to signal control information, using tones within the frequency band used for
voice.
This allows the re-use of DTMF signaling end-to-end between customer premise equipment af-
ter the call is completed: for example, from a telephone to a voice mail system.
2.7.6 “Hidden” Buttons
Though a standard telephone keypad has 12 buttons, there are actually 16 buttons defined for
DTMF. The “hidden” four buttons are labeled A – D and share the high group frequency 1633
Hz.
These tones are used only for very special signaling situations, like Call Waiting with Caller ID.
2.7.7 Caller ID
Caller ID is another example of in-band signaling. The Caller ID is delivered to the telephone
by a 1200 b/s modem in the line card that operates in the voiceband. With standard Caller ID
service, the modem transmits ASCII code representing the date, time, calling number and pos-
sibly calling name, beginning 0.5 seconds after the first ring and ending before the second ring
happens.
During this time, the telephone is on-hook, so the called party does not hear the modem signal
being transmitted in the voiceband.
The tones corresponding to the “hidden” four buttons, A – D are used only for very special in-
band signaling situations; one example is to support caller ID with call waiting service, also
called Call Waiting ID service, where the ID of a second caller is displayed while the line is al-
ready in use with a call.
Since the Caller ID is delivered with a modem signal in the voice band, if no special measures
were taken, the called party would hear the hissing of the modem signal on the line delivering
the ID of the second caller while the first call is in progress. Plus, voice on the line might inter-
fere with the accuracy of detection of the modem signal.
38
To deal with this problem, an dual-tone CPE alerting signal of 2130 + 2750 Hz is generated by
the line card, which instructs the telephone to mute its speaker. The telephone acknowledges
with DTMF D. Then the modem signals the call waiting Caller ID and the telephone unmutes
the speaker as soon as the modem transmission is completed.
While this allows transmission of a modem signal to communicate the second Caller ID, it also
momentarily interrupts the voice communications, which can be annoying to the user.
It is an excellent example of the advantage of an out-of-band signaling system: where the con-
trol signals are not carried in the voice band, but are communicated in parallel on a separate
control circuit or channel. Having such a capability would make it unnecessary to interrupt the
voice conversation to send signals.
2.8 SS7
Once the caller has signaled the desired called party’s address from the telephone to the near-
end switch, the next two functions are routing the phone call and signaling the called number
to the far-end switch.
The called number has to be forwarded to the far-end telephone switch so that it is able to con-
nect the incoming trunk to the correct far-end loop.
In the old days, this was done using Multifrequency (MF) tones similar to DTMF on the trunk
circuits.
The problem with that was again speed, especially considering that there are multiple switches
between the near-end switch and the far-end switch, and the whole number would have to be
signaled using tones from the first switch to the second, then once that was completed, from
the second to the third, then once that was completed from the third to the fourth and so on to
the far end.
Today, a control system called Signaling System 7 (SS7), also known as Common Channel
Signaling System Number 7 (CCS7 or C7) is used to do this address signaling function.
SS7 is a global standard defined by the International Telecommunication Union (ITU) Telecom-
munication Standardization Sector (ITU-T).
It defines the protocols by which network elements exchange information for call setup, routing
and control, both wireline and wireless.
39
Figure 21. SS7
The ITU definition of SS7 allows for variants including the American National Standards Insti-
tute (ANSI) and Bellcore standards used in North America, and the European Telecommunica-
tions Standards Institute (ETSI) standard used in the rest of the world, which is called “Europe”
in the business.
2.8.1 Out-Of-Band Signaling
With SS7, signaling is out of band, that is, using digital coded messages on separate data
channels, not using tones on the voice communication channels.
In practice, SS7 is centralized computers and databases (Service Control Points, SCPs) con-
nected via the Message Transfer Part (MTP), which is data circuits and packet switches called
Signal Transfer Points (STPs), to telephone switches (Service Switching Points, SSPs).
SS7 implements an infrastructure and standard protocols for the exchange of control mes-
sages or signaling between control computers and switches. The set of call control messages
is called the ISDN User Part (ISUP).
A company’s SS7 system will exchange ISUP messages with their switches, with other compa-
nies’ SS7 systems, and with customers’ control systems. Messages to and from customer sys-
tems are usually communicated over an ISDN Primary Rate Interface (PRI) signaling channel.
2.8.2 Advanced Intelligent Network (AIN)
In a perfect world, called the Advanced Intelligent Network (AIN), all telephone call routing de-
cisions would be made by the centralized computers, the Service Control Points, and not the
switches.
40
This has large advantages for the network service provider, since it allows the rollout of fea-
tures on the one or two sets of centralized computers, rather than on the hundreds of CO
switches.
However, having the SCPs perform all call routing introduces a single point of failure into the
telephone system… proved during a nine-hour complete failure of the telephone system on the
East Coast of the United States some years ago.
2.8.3 Switch-Based Call Routing
Due to this failure mechanism, in practice, most telephone companies use a call routing com-
puter program from a supplier like Alcatel-Lucent to update CO switch-based routing tables ev-
ery ten seconds or so.
The switch uses this table to determine the call routing, rather than a table in the SCP. This al-
lows the continued functioning of the network if the call routing computer crashes.
2.8.4 SS7 In Practice
SS7 is in practice used by big telephone companies for call setup signaling, to support data-
base inquiries, and for high-end call routing features.
Call setup signaling is indicating the called number to the far-end switch, and possibly the call-
ing number for caller ID purposes.
SS7 is also used for call setup between different carriers, for example, communicating the call-
ing number and called number from the local phone company’s system to a wireless carrier
when a call is placed from a home phone to a cell phone.
An example of a database inquiry message is credit authorization for billing phone calls, such
as when you use your telephone company calling card from a payphone, or roam with your
cellphone.
2.8.5 Residential Service Application Example
High-end value-added call routing features are sometimes called AIN services. An example for
residential service is call forwarding.
When you press *72 on your phone and hear four beeps, this indicates that you are now com-
municating with the SCP, perhaps indirectly.
When you enter the number you want your phone forwarded to, an entry is made in a data-
base, and a trigger is placed on your line card. The trigger is in fact a bit set in a status register
associated with your line card in the computer called the telephone switch.
When a call is to be routed to that number using the basic switch-based routing, the fact that
the trigger on the line card is set causes the far-end CO switch to not terminate the call on that
line card, but instead to do a query on the SCP to get the routing information – which will be to
the number you forwarded your phone to.
2.8.6 Business Service Application Example
For businesses, examples include both basic 800 service and sophisticated call routing ser-
vices that change where an 800 number is terminated based on time of day, geographic loca-
tion of the caller or the call volume.
An example of the latter is an airline that has two call centers in different parts of the country,
for example, one in Utah and one in Georgia. There is a single 800 number 1-800-AIRLINE for
that airline that is valid everywhere in North America.
By default, calls are routed based on geographic location of the caller; callers in the West are
routed to the call center in Utah, and callers in the East go to Georgia.
However, the airline pays their Inter-Exchange Carrier for a service that allows them to do load
balancing: if for example the call center in Utah becomes busy and the call center in Georgia is
not, the airline can signal the network to route phone calls to Georgia, regardless of where the
caller is geographically located… and then signal the network to change the routing back to
normal a minute later.
This idea is sometimes referred to as “customer control of the network”, perhaps more accu-
rately “real-time customer control of their call routing”. It is a sophisticated service enabled by
SS7.
41
2.9 Voice over IP (VoIP)
Though there are hundreds of thousands if not millions of traditional CO circuit switches and
PBXs still in operation, new systems are based on Voice over IP (VoIP).
We begin understanding VoIP in this chapter with fundamental concepts and a top-level view
of the major components of a VoIP system.
These components may be located at the customer premise, at a carrier, at a third party, or
any combination thereof.
Understanding VoIP includes understanding IP packets, IP addresses, digitized voice, routers,
Ethernet and a number of other supporting technologies.
The numerous supporting technologies are mentioned in this fundamentals chapter, and cov-
ered in detail in subsequent chapters.
2.9.1 Packetized Voice
Figure 22 provides a very high-level block diagram view of the processes involved in communi-
cating speech in IP packets from one person to another.
Starting on the left, commands from the speaker’s brain cause combinations of lungs, di-
aphragm, vocal cords, tongue, jaw and lips to form sounds.
42
Lower level functions such as framing and link addressing are usually performed following the
IEEE Ethernet and MAC standards. At the lowest level, the links are physcially implemented
with Category 6 LAN cables, DSL modems, Cable modems, fiber optics and radio systems.
At the destination, the bits are extracted from the IP packet and fed into a codec, which re-cre-
ates the analog voltage.
This voltage drives a speaker, which re-creates the sound pressure waves, which travel down
the ear canal to the inner ear, causing hairs on the cochlea to vibrate, triggering neural im-
pulses to the brain, making the listener think they are hearing something.
It is important to note that the voice packets are communicated directly from one telephone to
the other over the IP network. The packets do not pass through a CO telephone switch, for ex-
ample.
2.9.2 VoIP System Components
A VoIP system includes terminals, LAN infrastructure, a softswitch, voicemail server, router,
gateway, firewall and network connections.
43
Another component of a VoIP system is the physical connections, implemented with LAN infra-
structure, consisting of LAN cabling or wireless LANs, and LAN switches.
2.9.5 Softswitch
The softswitch, also called a SIP proxy or call manager, is an important component of a VoIP
system. Its main function is to assist in call setup. The softswitch also manages terminals, reg-
ulates admission to the VoIP system and provides terminal authentication, registration, status
and address resolution as well as call control.
2.9.6 Router
The router connects LAN segments, properly called LAN broadcast domains, to each other
within the building, and to external connections, including to the circuit-switched PSTN, the In-
ternet, VPN services and SIP trunking services that move VoIP phone calls long distance.
2.9.7 Gateway
Gateways perform format conversions. This includes both coding format and signaling format
conversions between the IP world and the circuit-switched PSTN.
2.9.8 Firewall
A firewall system is required to manage connections to other IP networks, which include:
• The Internet, which allows any communications to anywhere but with no performance guar-
antees,
• Virtual Private Networks (VPNs), which allow any communications to specific locations
(e.g. other locations of an organization), and may include performance guarantees, and
• SIP trunking, which carries VoIP to specific locations in native format, with performance
guarantees suitable for telephone calls, and may include gateway service to convert VoIP to
traditional telephony for calls terminating on the PSTN
44
3
Switching
3.1 Telephone Network Architecture
45
Figure 25. Fiber to the Neighborhood OPI/SAC Box
Fiber to the Neighborhood (FTTN) then DSL to the subscriber is used to implement high-speed
internet access in the very large installed base.
A fiber is pulled from the CO to each OPI/SAC box, which may be generically referred to as an
outside plant enclosure.
Inside the enclosure, the fiber is connected to a DSLAM, which houses banks of DSL modems.
A short pair of wires is used to connect one of the DSLAM’s modems to one subscriber for
high-speed Internet.
The customer’s network access is fiber to the enclosure, then a short run of copper to the cus-
tomer premise.
The shorter the run of copper at the end, the more bits per second can be communicated.
VDSL2 technology achieves 200 Mb/s with a maximum run length of 150 meters (150 yards).
In new neighborhoods, called greenfields, fiber to the premise is deployed. For residences and
small business, a Passive Optical Network (PON) strategy may be employed, where typically
32 customers share a fiber backhaul using time sharing. Medium and large businesses might
be connected with a dedicated fiber.
3.1.2 Switching Network
The switching part of the network was traditionally organized into a five-level hierarchy, with
the Central Office at the lowest level in a hierarchy of switching centers.
A Central Office is the wire center, where all of the access wires converge and are connected
to switching equipment. This equipment is usually owned by the telephone company, but might
also be equipment owned by a competitor collocated in the CO. In the past, this switching
equipment was a circuit switch, establishing connectivity to an outgoing circuit for the duration
of a phone call. Going forward, this switching equipment is a packet switch or router, forward-
ing one packet at a time.
This equipment is called edge equipment by network engineers, as it is notionally the edge of
the telephone company’s core network. This equipment provides a data concentration function
and converts between the physical media of the access circuit and the physical media of the
connections between switching centers and the transmission network.
The COs in a city are connected to its toll center, a building at the second level in the switching
hierarchy and the interconnection point with transmission networks owned by the same tele-
phone company or by a competitor.
3.1.3 Transmission Network
The transmission network connects switching centers, providing high-capacity and high-avail-
ability connectivity between COs and between cities. This part of the network is called the net-
work core by transmission engineers. In the past, the capacity was organized into fixed 64 kb/s
channels, with switches or routers directing traffic onto the channels. Going forward, traffic on
the core is all packets, transmitted on demand.
46
3.2 Telephone Switches
Telephone switches are used to establish connections across a network for phone calls. The
purpose of a switch is to establish a connection between one input and one output.
3.2.1 Circuit Switching
In the case of a CO switch, the connection is full-time for the duration of the call, between a
loop and a trunk, or between two loops for a call local to that switch. In a toll center, this would
be trunk to trunk connections.
47
Figure 27. Front Bay of a DMS-100 CO Switch
Alcatel/Lucent’s CO switch product is the Class 5 Electronic Switching System (5ESS). Nortel’s
main product was the Digital Multiplex Switch model 100 (DMS-100). The DMS product line
and the servicing of its installed base was acquired by Avaya following Nortel’s bankruptcy.
These switches are capable of handling up to 100,000 loops, but are usually built up to a maxi-
mum of 60,000 loops per switch.
There are many other switch manufacturers and products.
3.2.3 Line Cards
The twisted pair loops are carried into the switch on a Main Distribution Frame. The compo-
nent of a switch that terminates a loop is called a line card.
Just as a PC can have an adapter card that allows a telephone line to be plugged into the PC,
a telephone switch has line cards to allow the connection of loops to the switch.
Individual line cards are implemented as small Printed Circuit Board (PCB) line card modules,
plugged onto a larger PCB, mounted in a drawer in a shelf in a rack as illustrated in Figure 28.
48
Line card drawers make up most of the footprint of a CO switch. Figure 27 illustrates only the
first row of racks of a DMS-100 switch. There are at least ten full-length rows of racks packed
with line card drawers behind it.
3.2.4 Digital Switching
All of the communication of voice information inside the switch is digital. As we will see in
Chapter 5, “Digital”, the analog voice signal on a loop is digitized at 8,000 bytes per second, or
64 kb/s on the line card.
The fundamental task of a traditional telephone circuit switch is to transfer a byte through the
switch from one input to one output, and vice versa, eight thousand times per second, for the
duration of a call.
49
all cases; it refers to whether these trunks are used to receive phone calls, initiate outgoing
calls or both.
3.3.3 Digital Telephones: Electronic Business Sets
Both Centrex and PBXs support analog and digital telephones. Digital telephones, which are
often called Electronic Business Sets, are far more popular as they support a much richer user
interface and feature set.
“Digital telephone” means that the voice is digitized in the telephone and communicated as 1s
and 0s along with call control messages from the phone to the switch, represented by pulses
of voltage on copper wires.
For the traditional Centrex and PBX described in this section, the coding and formatting of the
digitized voice and the call control messages are not standards-based, meaning that only tele-
phones supplied with the Centrex service or PBX device will work. This is on purpose, to lock
the switch customer into buying all phones and upgrades from the PBX or Centrex vendor.
This is a source of profit for the vendor.
New-generation Voice over IP systems are much more likely - but not guaranteed - to use
standard methods of coding and call control messaging, which would allow the use of third-
party telephones.
3.3.4 PBX and PABX
The term Exchange is an older term for a circuit switch. Private means that the customer has
the switch, not the telephone company. Branch refers to the topology of PBX trunks looking
like branches off the main telephone company tree trunks.
In the beginning, a PBX was implemented with a board with jacks terminating loops and PBX
trunks, and an operator connecting loops to PBX trunks manually with a patch cord, like the
first CO switches.
Like CO switches, PBXs came to be implemented with mechanical systems then computers.
For a while, computer-based PBXs were called Private Automated Branch Exchanges
(PABXs). This term is not used much today.
3.3.5 Attendant
Even though the switch is implemented with a computer that connects PBX trunks and tele-
phones, an operator or attendant is required to route inbound calls, to connect an incoming call
to the correct telephone in-building.
Typically, all of the inbound trunks will be associated with a single telephone number valid on
the public telephone network. When a caller dials that number, the CO switch will connect the
caller to an available incoming trunk, terminating on the PBX.
In the simplest implementation, the PBX by default connects all incoming calls to an attendant
console, where the attendant answers the call and asks the caller to whom they would like to
speak.
The caller identifies the desired called party by name to the attendant using their voice, the at-
tendant looks up the corresponding extension number on a piece of paper or computer screen,
enters the extension number in the console and presses the “transfer” button.
This instructs the PBX to now connect the incoming trunk to the line card corresponding to that
extension number and start it ringing.
3.3.6 Automated Attendant
An attendant is expensive, and can route only one call at a time. A computer program running
on the PBX performing the attendant function, called an automated attendant, is much less ex-
pensive than an employee, and can handle more than one incoming call at a time.
Incoming calls are first terminated on automated attendant software on the PBX, which plays a
recorded message to the caller requesting that if the caller knows the extension number they
would like to be connected to, that the caller use in-band DTMF signaling to indicate the exten-
sion number.
Once received, the automated attendant software conveys the extension number to the PBX
switching software, which connects the incoming trunk to the appropriate line card and starts it
50
ringing.
If the caller does not supply the extension number, possibly because they have a rotary-dial
phone, or they don’t know it, or selected a preconfigured option like 0, the automated attendant
software will route the call to a human attendant.
In a low-budget implementation with no backup human attendant, the caller might be trans-
ferred to a voice mailbox and asked to leave a message.
3.3.7 IVR
The automated attendant function is usually implemented in practice as part of an Interactive
Voice Response (IVR) system running on the PBX.
An IVR provides more ways for the caller to have their call routed through the PBX to a particu-
lar telephone without knowing the extension number.
The most common implementation involves a recorded message asking the caller to signal a
number corresponding to one of a number of menu choices. The result will either be transfer to
a particular extension, or to a second menu where the process is repeated.
Speaker-independent word recognition has become reliable enough that the caller may have
the option to speak words to navigate the menu instead of using in-band DTMF signaling.
In addition to determining the extension to which to transfer the call, an IVR may be used to
have the caller enter information, for example, their account number at the called organization.
A sophisticated IVR might be integrated into the called organization’s customer care system,
allowing the caller to retrieve information without speaking to a person.
An example would be calling an airline and the caller entering their frequent-flyer number, then
having the IVR do a query on the airline’s customer care system to determine that account’s
mileage balance and communicating it to the caller using recordings of someone speaking
numbers.
3.3.8 Direct Inward Dialing (DID)
The telephone company controls the telephone numbers and charges per number, per month
to assign numbers to users.
The lowest-cost configuration with a PBX is to pay for only one telephone number for the PBX.
All inbound PBX trunks are associated with that one telephone number in a hunt group. When
a call is placed to that number, the CO switch hunts through the group of trunks to find the next
one available and connects to call to the PBX on that trunk. The caller must as a second step
indicate to an attendant or automated attendant to whom they wish to speak.
If an organization desires to have a PBX but eliminate the two-step process of first dialing a
number then dealing an attendant or automated attendant to have calls connected, the organi-
zation can pay the phone company for Direct Inward Dial (DID) service.
With DID, the hardware configuration of PBX connected to CO with PBX trunks of Figure 29
remains unchanged. The telephone company assigns a telephone number called a DID num-
ber that is valid on the public telephone network, for each of the extensions on the PBX.
When a caller dials one of those DID numbers, the call is connected from the CO to the PBX
over a PBX trunk as usual, plus the CO switch indicates to the PBX the DID number that was
called. The PBX can then look up in a table to determine the extension number associated with
that DID number and switch the call to the correct line card without any further interaction by
the caller.
This service is billed per DID number, per month by the phone company.
3.3.9 Automated Call Distribution (ACD)
The destination of a call could be an extension that identifies not a particular line card, tele-
phone and person, but instead identifies an Automated Call Distributor.
When running on the same hardware as the PBX switching function, an ACD is a computer
program that deals with situations when there are more callers than there are people or agents
to answer the calls.
The ACD is configured to have queues associated with extension numbers. The queues are
associated with specific activities, such as a particular type of caller wanting to perform a par-
51
ticular activity.
Upon being transferred to the ACD, the caller is placed in a queue and recordings are typically
played to the caller to keep them interested. Which queue the caller is placed in might be de-
termined by the number they dialed, or choices they made in an IVR before being transferred
to the ACD.
Agents are associated with queues. An agent can be dedicated to answering one call queue,
or able to answer multiple call queues. When the ACD determines an agent is available to an-
swer the next call in a queue, the caller is switched from the ACD’s recording to that agent.
3.3.10 Call Centers
Inbound call centers are places where customer service agents receive calls from customers
and access the customer’s account information via a terminal connected to a customer care
system, a data processing system.
Traditionally, this has been a customer-premise-based solution. The end-user company buys,
integrates and maintains a PBX to handle incoming calls, an IVR to get information about the
caller, and an ACD to route the call to an agent, and a customer care system to store and ma-
nipulate information about customers and orders.
The agents sit in a large “call center” room with supervisors and may have to raise a paddle to
request to go to the bathroom… and might not be allowed to if the call volume is heavy.
A sophisticated integrated system would first pass the caller through an IVR to determine their
account number and desired activity, then to the appropriate queue on an ACD, then when the
call is finally switched to an agent, send a message to the customer care system. The cus-
tomer care system would then cause the caller’s account information to appear on the agent’s
screen at the same time the agent answers the call.
52
The next step is multimedia contact centers, where there are a number of different ways that a
customer can contact the agents in the center, including speaking to the agent, e-mail, web
chat, web collaboration, click-to-talk, and click-to-see.
3.3.11 Advantages of PBX
The main advantages of a PBX system is the service pricing model and the ability to control
the hardware and features.
With Centrex service, described in following sections, the switch is at the CO, and the tele-
phone company provides telephones connected with individual lines to the CO switch.
With a PBX, the connections are trunks, not loops, with something like one trunk for every ten
telephones. PBX trunks cost more than individual lines, but not ten times as much. This means
that the monthly service cost is less.
Moreover, the cost of value-added features like call forwarding and voice mail are notionally
per PBX, not per line, which is a definite cost savings.
Plus, the customer determines which features are available, based on selection and configura-
tion of the PBX by them, not by the phone company.
Another advantage of having a PBX is not having to pay the phone company for moves and
changes. If a person moves to a new cubicle, and wants to keep their extension number, a
technician has to reconfigure the switch so that the extension number is associated with the
line card or wires going to the new cubicle, and not the old cubicle.
With a PBX, the organization can perform moves and changes with in-house staff instead of
paying the phone company to do it.
3.3.12 Disadvantages of PBX
The main disadvantages of having a PBX are capital cost, scalability, support and mainte-
nance. When an organization gets a PBX, they are going into the local telephone business in-
side their building, and must perform all the functions of a local telephone company.
This means the organization must decide which manufacturer and which model of PBX to get,
how many of them to get – one for each location is the starting point – plan for future growth
and future features and technologies, and finance the hardware.
Planning for the future is especially important considering that the connection from the PBX to
the telephone is historically not standards-based, meaning that only particular telephones
made by the same manufacturer will work with the PBX.
The implication is that once a PBX is purchased, the customer is obliged to purchase all future
telephones from that manufacturer, which may turn out to be costly.
Having a PBX means the organization must have a help desk, trouble ticket system and skilled
staff to operate, maintain and repair the telephone system and to deal with the carriers provid-
ing local and long-distance telephone service.
The organization must also decide how long they want their telephones to keep working after
the big ice storm, hurricane or earthquake knocks out all of the main power distribution for
thirty miles around the building. A minute? An hour? A week?
The latter requires a contract signed before the disaster happens for guaranteed delivery of
fuel for generators… when the city is blacked-out and everyone wants fuel, this organization is
the one that will get it.
Finally, unless the organization is willing to pay per extension per month for DID service, call-
ers have to go through a two-step process to connect a call: first dialing a phone number, then
dealing with an attendant or IVR before the call is connected.
3.3.13 Centrex
Service with the exact same look and feel to the user as having a PBX can be provided by the
telephone company. This is generically referred to as Centrex. Every telephone company has
their own brand name for this service or bundle of services.
Centrex means that the telephone service is provided by a CO switch, rather than a PBX. Typi-
cally, a part of the CO switch will be partitioned in software and dedicated to a particular cus-
tomer, making it appear to the customer as though they have their own switch, with the same
features as a PBX such as four-digit dialing and having to dial “9” for an outside line.
53
With Centrex service, the connections between the telephone company and the customer are
loops - one for each telephone. If a particular Centrex customer has many telephones, the tele-
phone company will carry the loops not on many pairs of wires, but instead on a single fiber
optic loop carrier system between the buildings.
The loop carrier system does not add any value to the service; it is simply a mechanism to
carry the information for the individual loops together on one fiber instead of on many sets of
copper wires.
In this case, as illustrated in Figure 31, the fiber terminating equipment at the customer
premise for Centrex has line cards connected to telephones by copper wires.
PBX trunks are carried the same way, on fiber, so the fiber terminating equipment at the cus-
tomer premise for PBX also has line cards connected to telephones by copper wires.
In fact, comparing the two architectures in Figure 31, the choices are identical except for loca-
tion, location and location: whether the switching is at the customer premise (PBX), or at the
CO (Centrex)
Figure 31. Traditional PBX and Centrex solutions have the same physical layout. The location of the switching is
the difference.
.
3.3.14 Advantages of Centrex
The main advantage of Centrex is that the phone company will take care of planning, purchas-
ing, installation and maintenance of the telephone switch and telephones, and provide a ser-
vice agreement specifying the availability of service and time to repair. The customer does not
need to have experts on staff to configure and maintain the telephone system.
With Centrex, there is no capital cost for the switch, though there may be for the phones.
Monthly payments with a fixed-length contract are typical.
In addition, the phone company deploys many switches in different geographical areas, facili-
tating the implementation of seamless regional and national service, and ensuring that there is
enough switching capacity for each of the customer locations.
3.3.15 Disadvantages of Centrex
The downside of Centrex is cost. Centrex is not a money-losing business at the phone com-
pany; it’s part of their bread-and-butter.
The pricing model for Centrex service is per line. The monthly service charge for dial tone is
per line. Cost for voice mail and features like call forwarding is per line. This ends up being
more expensive than service implemented with a PBX, where the pricing model is more per-
PBX.
In addition to monthly charges, another cost with Centrex is moves and changes.
54
When someone changes cubicles and wants to keep their phone number, the switch has to be
reconfigured to associate the phone number with a different line card, terminating the wires go-
ing to the new cubicle.
This costs in the neighborhood of $100 per change... every time someone changes cubicles.
3.3.16 PBX vs. Centrex
The question of PBX vs. Centrex often boils down to this question: what business is the cus-
tomer in? Do they want to devote part of their energy to providing local phone service, and
save some money by doing it themselves; or do they want to use their energy for their printing
business and pay the phone company to do phone service, knowing that the phone company
makes a profit doing it.
3.3.17 Key Systems
A key system is a low-capacity, low-budget combination of Centrex and PBX functions. A key
system terminates lines from the phone company, not PBX trunks, but, like a PBX, allows the
connection of more phones than there are lines. A 3x8 key system would support up to 8 tele-
phones in-building connected to one of 3 phone lines.
In the old days, mechanical key systems used telephones with a row of transparent buttons
across the bottom to select which line the phone was connected to.
More recent electronic key systems use Electronic Business Sets with programmable buttons
and displays, more or less identical to those used for Centrex and PBX.
In the future, all call setup will be done with SIP.
55
Regardless of what it is called, the main function of a softswitch is call setup, and the essential
function is to inform the telephones at each end of the call of the other telephone’s IP address,
since the voice goes in IP packets directly between the phones, not through a telephone
switch.
For both privacy and flexibility, the IP address of the called party’s telephone is usually not
published. It has to be determined before voice communications can begin.
3.4.3 SIP
During a VoIP telephone call, the telephones send IP packets containing digitized speech di-
rectly to each other. To be able to do this, the telephones must know each other’s IP address.
In a standards-based system, the SIP protocol is used to inform the telephones of each other’s
IP address.
Each phone is associated with a SIP server, which acts on behalf of or is a proxy for the tele-
phone to set up the call. Instead of a telephone number, each person has an Address of
Record, which in the SIP standard has the same format as an email address, for example,
[email protected].
For interoperability with traditional systems, the Address of Record might be translated to a for-
mat that looks like a traditional telephone number... but this has to be resolved behind the
scenes to a SIP standard format.
Everyone’s Address of Record is made visible to the public. This would be printed on business
cards and included in email signature blocks.
To make a VoIP phone call to someone, it is necessary to find out what their telephone’s IP ad-
dress is.
It is possible to find out the IP address of their SIP server by looking it up in the Domain Name
System (DNS) just like a web server... but it is not possible to determine their telephone’s IP
address. Only their SIP server knows their phone’s IP address.
When a phone is plugged in or restarted, it is assigned an IP address like any other computer.
Then the phone registers with its SIP server, that is, informs its SIP server of its current IP ad-
dress.
56
volved.
This is necessarily a simplified explanation of the SIP call setup protocol, but hopefully con-
veys the essential idea. Voice digitization, IP addresses and packets, DNS and other protocols
are covered in subsequent chapters.
3.4.4 Additional Functions
In addition to running a SIP server for call setup, the softswitch may also perform authentica-
tion, authorization and accounting functions such as generation of Call Detail Records, and po-
tentially hundreds of other call setup and processing functions, such as voice mail, integrated
messaging, call pickup groups, Interactive Voice Response (IVR) functions and Automated
Call Distributor (ACD) functions.
3.4.5 Location Independence
The softswitch can be located anywhere on the planet.
As long as IP packets containing the SIP call setup messages can be communicated from a
telephone to its SIP server with suitable maximum delay and packet loss, it is irrelevant where
the SIP server is physically located.
The SIP server could be located at the customer premise, at a telephone company building, or
at some third party data center.
The SIP messages between the telephone and its SIP server are short and simple, requiring
very low bandwidth compared to the subsequent exchange of digitized speech between the
telephones.
3.4.6 Customer Premise Softswitch
When the hardware and software implementing the softswitch is located at the customer
premise, typically purchased by the customer, it is usually called a softswitch, call manager,
unified communications system or IP phone system.
3.4.7 Centrex
When the hardware and software implementing the softswitch is located at a telephone com-
pany, its functions are provided as a service by the telephone company, and might be called IP
Centrex or Hosted VoIP by the telephone company’s marketing department.
Alternatively, the phone company might continue to the call the service Centrex to avoid con-
fusing anyone. The fact that it is implemented IP packets and SIP for new customers is just a
detail.
3.4.8 Hosted PBX
When the hardware and software implementing the softswitch is located at a third party, the
software and the hardware it runs on is provided as a service by the third party and is usually
called a Hosted PBX, similar in concept to web hosting and virtual web servers.
Of course, telephone companies may be in the business of providing Hosted PBX services in
addition to IP Centrex.
57
channels.
Also in days past, tie lines were services that appeared to the customer to be dedicated lines
that directly linked the customer’s PBXs in different cities. A sophisticated system of tie lines
connecting multiple locations of an organization plus four- and five-digit dialing plans was
called a Virtual Private Network (VPN). It is to be noted that this kind of voice VPN is not the
same thing as today’s MPLS or IP packet encryption-based VPNs.
LECs, IXCs, switched access, ISDN, PRI, DS0 and channels, MPLS and IP encryption-based
VPNs are all covered in upcoming chapters.
3.5.2 VoIP Trunking
In the early days of VoIP, a business could implement VoIP on LANs in-building, but there were
no carrier services with performance guarantees suitable for moving IP packets containing dig-
itized speech between buildings.
The business had to convert VoIP phone calls to traditional telephony, that is, PBX trunks car-
ried on ISDN PRI connections to the LEC, for phone calls to their other locations, then convert
them back to VoIP at the other end.
This was in essence islands of VoIP connected with the “old” circuit-switched technology and
services.
Now, carriers offer IP connectivity for business customer VoIP systems, which can be used for
VoIP phone calls between two locations of the same business in different cities, and for VoIP
phone calls to the PSTN.
In the case of VoIP phone calls between two locations of the same business, the IP packets
containing digitized voice are carried natively between the two locations, that is, without being
converted to something else.
58
as a 64 kb/s DS0 stream, then hands it off to the LEC in exactly the same way as an Inter-Ex-
change Carrier hands long-distance phone calls to the LEC.
In the future, agreements for connections to LECs in the form of IP packets instead of DS0
channels will be formalized in tariffs and this conversion will not be required.
59
4
The Telecommunications Industry
4.1 US Telephone Companies
The official parlance for a company that provides POTS in the US is Local Exchange Carrier
(LEC). These companies own the CO and the “last mile” of cabling between the CO and the
customer premise.
At the CO, they provide to the customer equal access to long distance or Inter-Exchange Carri-
ers (IXC). Many companies are both LECs and IXCs.
4.1.1 LECs, LATAs and Baby Bells
AT&T used to own the “Bell System”, with local and long-distance operations spanning the
country.
To settle an anti-trust suit, the Bell System was split into pieces in a process called divestiture:
AT&T divesting itself of its local operations in the 1980s.
To define how the physical network was to be split, the US lower 48 states were geographically
divided into 195 Local Access and Transport Areas (LATAs). The piece of what used to be the
Bell System’s local operations that found itself in a LATA became a Local Exchange Carrier, a
LEC.
The ownership of each LECs was then spun off to one of seven holding companies, known as
“Baby Bells”, Regional Bell Holding Companies (RBHCs) and Regional Bell Operating Compa-
nies (RBOCs).
The Baby Bells were US West, Pacific Telesis Group (Pac Bell), Southwestern Bell, BellSouth,
Bell Atlantic, NYNEX and Ameritech. Each of these companies owned a number of LECs.
60
These companies, such as Champlain Telephone in Champlain NY are referred to as indepen-
dents since they were never part of the Bell System.
Large companies including Century Link, Frontier Communications, Verizon and Windstream
own many independents.
4.1.3 Inter-Exchange Carriers: IXCs
One of the main purposes of the breakup of the Bell System was to introduce competition in
long-distance communications.
This was initially implemented by splitting the Bell System into LECs as described in the previ-
ous section, and mandating LECs to complete phone calls within the same LATA, and equal
access to competing Inter-Exchange Carriers who would carry calls from one LATA to another.
The biggest IXC was AT&T Corp., which started out as the long lines that were left over after
the local operations were divested.
The first main competitor was Metropolitan Communications Inc. (MCI) that broke ground with
fiber-optic connections in Chicago. Sprint was number three, WorldCom number four. World-
Com purchased MCI to move up to the number two spot, and before going bankrupt, spinning
off the MCI residential long-distance unit, and changing the name of the resulting long-distance
company back to MCI.
4.1.4 Switched Access Charge
The theory was that the LEC owned the CO and the access network, also referred to as the
outside plant: the connection from the customer premise to the CO. The IXCs only have long-
distance circuits.
If a call stayed with a LATA’s boundaries, then the LEC provided access for and transported
the call.
If the call crossed a LATA boundary, three companies have to be involved: the LEC for local
access, an IXC for long-distance, and a LEC for local access at the far end.
The customer signs a contract with the IXC for long distance communications. To make a long-
distance phone call happen, LECs at each end switch in a connection from the customer to the
IXC for the duration of the phone call.
For this connection, the IXC has to pay the LEC a per-minute switched access charge which
varies from $0.0075 to $0.07 per minute in different places.
4.1.5 CLECs and ILECs
Competitive Local Exchange Carriers (CLECs) are companies that can co-locate equipment in
the CO and provide services over the local access network to customers. The LEC that built
the CO is referred to as the Incumbent Local Exchange Carrier (ILEC) to distinguish the two.
4.1.6 Resellers
Another category of carrier is a reseller. These companies lease high-capacity services from
Inter-Exchange Carriers, and buy or lease switching capability, then sign up customers and
convince them to route their calls over the high-capacity leased service: buying wholesale and
selling retail.
The profit margins for resellers have been dramatically reduced, to the point where many for-
mer resellers have either gone out of business, or been forced to purchase physical circuits
and turn into facilities-based Inter-Exchange Carriers.
4.1.7 Consolidation
A consolidation took place: Bell Atlantic purchased NYNEX then merged with GTE and re-bap-
tized the result “Verizon”; SBC purchased Pac Bell, Southwestern Bell, Ameritech and SNET
and later BellSouth.
Qwest, a fiber-backbone company, purchased US West, then merged with CenturyTel to form
CenturyLink, which subsequently purchased many independents.
Federal legislation passed in 1996 permitted wide-open competition, with all companies per-
mitted to provide all types of services.
Individual state Public Utility Commissions have a large amount of regulatory power indepen-
dent of the federal government, regulating activities within a state.
61
This means that a national carrier has to deal with paperwork and regulations from more than
51 regulatory agencies, so the possibility of the LECs operating as national IXCs took some
time.
Once the LECs could be IXCs, ownership and operation of the local and long-distance opera-
tions were merged back together by the LECs purchasing the IXCs.
SBC purchased AT&T Corp and changed its name to AT&T. Verizon purchased the next-big-
gest IXC, MCI, reconstituting most of the Bell System in two geographic landline pieces: AT&T
and Verizon. Each company provides services in the other’s territory via fiber, collocations and
especially wireless.
4.1.8 Cable TV: Broadband Carriers
Companies using a coaxial entry cable, primarily to residences were historically called Com-
munity Antenna Television (CATV) companies and more recently cable companies. With the
delivery of telephone service and Internet via broadband modems, and backbone fiber net-
works, cable companies are now full telecom service providers and carriers, for both business
and residence, and are properly referred to as broadband companies.
62
These maps reveal that the notional geographic division of the US into seven sections, each
controlled by a Baby Bell, is no longer of much use as a model.
The “eastern” Baby Bells: NYNEX and Bell Atlantic merged with GTE to form Verizon, which
dominates New York City and Boston, and also provides service in many parts of the country
including significant areas of California, Oregon and Texas among others.
AT&T, formed by the merger of Southwestern Bell, Pac Bell, Ameritech, SNET, AT&T Corp.
and BellSouth, covers more than half of the country: Texas, Oklahoma, California, Illinois,
Michigan, Connecticut, Florida, Georgia and more.
Statistics after the BellSouth merger (as of 2005 09 30 and 2006 03 01) show that AT&T ended
up a bit bigger than Verizon:
• Verizon: 49,689,000 access lines, 4,531,000 DSL lines.
• AT&T: 70,200,000 access lines; 9,400,000 DSL lines.
Wireless coverage by affiliates of these two companies is much more complete, both covering
all of the top 100 markets in the country.
It is important to also keep in mind that in addition to CenturyLink, there are hundreds of inde-
pendent ILECs that are not owned by Verizon or AT&T. And hundreds of CLECs.
63
Figure 36. Canadian Telephone Companies
4.3.2 TELUS
BCTel, AGT, Ed Tel and Quebec Tel merged to form TELUS, providing virtually all landline ser-
vice in BC and Alberta, plus service to some 443,000 customers in Quebec. Using a mixture of
POPs, collocation and subcontracts, TELUS provides service to business customers in
Toronto, Montreal and other cities where Bell Canada formerly held a monopoly.
4.3.3 Ownership
Ownership of the telephone companies is varied. BCE of Montreal, a publicly-owned holding
company, owns Bell Canada and BARC. Verizon (through its acquisition of GTE) originally
owned half of BCTel and half of Quebec Tel through a holding company in Montreal. This was
divested in 2005, sold to TELUS, also a publicly-owned holding company. SaskTel is a provin-
cial crown corporation, as were AGT and MTS until they were privatized.
4.3.4 Competitive Inter-Exchange Carriers
Competitive Inter-Exchange Carriers exist, but find their profit margins slim due to the geo-
graphical nature of the network and strong competition. The main competitor traces its roots
from CNCP Telecommunications, to Unitel, a joint venture of Rogers Cable and CNCP, to
AT&T Canada, which sold its residential long-distance voice services to Primus then changed
its name to Allstream, which was then acquired by MTS.
4.3.5 Resellers
A number of resellers including Call-Net, Lightel, fonorola, Group Telecom and others have at-
tempted to enter the business, but were not successful and were mostly consolidated under
Call-Net, a subsidiary of Sprint Canada. Sprint Canada provided both competitive long-dis-
tance services and local service to some 200,000 homes as a CLEC. Sprint Canada was ac-
quired by Rogers Communications Inc.
360networks attempted to provide bulk fiber-based services, but went bankrupt and sold most
of their assets to Bell Canada.
4.3.6 Wireless
The main wireless carriers are affiliates of the phone companies (“wireline” carriers), including
TELUS and Bell, as well as Rogers Communications Inc., Canada’s biggest cable company.
64
Figure 37. Five Classes of Switching Centers
65
Some of these cables contain fibers connecting to other COs, and fibers to the Toll Center for
interconnect with Inter-Exchange Carriers as described in the following sections.
4.4.3 Local Calls
When you place a call to your neighbor, the neighbor’s loop is usually connected into the same
CO as you, and so the call is handled within the Central Office.
If you place a call across town, your call will be routed across trunk circuits to another CO
switch and then on to the far-end loop. The Central Office is level 5 in this hierarchy, so CO
switches are called class 5 switches.
4.4.4 Class 4: Toll Center
Directly connecting the thousands of Central Offices together would not be possible due to the
enormous numbers of connections that would be required. A hierarchy was needed.
The general idea is that each metropolitan area has a building called a toll center, containing
switches to which all of the CO switches in that city are attached.
To make a phone call to another city, your call is routed from your CO to your city’s toll center,
and on the far-end city’s toll center, to the far-end CO and then the far-end loop.
This arrangement is sometimes called a tandem arrangement, and the switches in toll centers
called tandem switches or toll switches. The toll center is level 4 in the hierarchy, so toll
switches are called class 4 switches.
4.4.5 Class 1, 2 and 3 Switching Centers
Because the Bell System was so large, there are more levels in the hierarchy. Each state had
a primary center (class 3) to which all of the toll centers in that state were homed. The country
was always divided in seven sections, and all of the primary centers in each section were
homed to a sectional center (class 2). Sectional centers were connected via regional centers
(class 1).
4.4.6 High Usage Trunks
In practice, connections are installed between switching centers where traffic warrants. If there
is high traffic between two COs not homing on the same Toll Center, then a High Usage Trunk
might be installed directly between those COs.
This practice moves the actual implementation of the network from the strict hierarchical model
shown to more of a meshed network, with many different paths between switching centers.
Traditionally, these trunk circuits have been carried as reserved channels on SONET fiber-op-
tic transmission systems organized in ring patterns around town, around the region and around
the country.
Going forward, phone calls will be carried when needed in IP packets in Ethernet frames on
fiber optics.
66
4.5.2 Long Distance: IXCs
The long-distance networks connect toll centers in different cities. These long lines are owned
and operated by Inter-Exchange Carriers (IXCs).
A facilities-based IXC is one that for the most part owns their own physical transmission facili-
ties, typically fiber-optic cables and equipment.
A reseller leases capacity from a facilities-based carrier to form a network. Both of these com-
panies are Inter-Exchange Carriers.
Due to the pricing structure at the time, many reseller-type IXCs sprung into business once
competition was introduced, leasing high-capacity services from IXCs, and signing up cus-
tomers who route their calls over the high-capacity leased service… buying wholesale and sell-
ing retail.
With a subsequent drop in retail prices, the profit margins for resellers were dramatically re-
duced, to the point where many went out of business, or transitioned into more facilities-based
operations.
4.5.3 Switched Access
The IXCs have equal access to the ILEC’s last mile; or, the other way around, the ILEC is re-
quired to provide their customers equal access to competitive IXCs.
The customer of the ILEC can select any IXC, and the ILEC will connect the customer to that
IXC in the toll center on a call-by-call basis. This is called switched access.
The ILEC at each end bills the IXC a per-minute switched access charge for that last mile con-
nection.
4.5.4 POP: Point of Presence
The termination of the IXC’s cabling in the toll center was called a Point of Presence (POP).
This term originated when different court decisions, regulations and agreements forced the Bell
System to provide physical space in the toll center for a competitor like MCI to terminate fibers
and house equipment.
67
The term POP has now moved into general usage, to mean a building where a competitive
carrier terminates at least two fiber-optic cables; a station on a regional ring.
This building is today often not the toll center, but a different building across the street or
across town connected to the toll center with fiber.
4.5.5 Equal Access and PIC Codes
Equal access means that a customer can select in advance the Inter-Exchange Carrier that will
handle that customer’s long distance, and the routing through the toll center and the POP on to
the IXC’s network is transparent to the customer.
This is implemented with an entry in a database maintained by the ILEC called the customer’s
Preferred Inter-Exchange Carrier (PIC) code.
Each IXC has a Carrier Identification Code. AT&T’s carrier code is 0288 (ATT on a telephone
keypad). MCI is 0222, Sprint is 0333, Global Crossing is 0444. There are many others.
When a customer of the ILEC changes long-distance companies, the customer’s PIC code is
changed to the carrier code of the new IXC.
When making a call from someone else’s telephone, such as a payphone at an airport, it is
possible to manually route the call through a particular IXC on a call-by-call basis by dialing
101 then the carrier code.
Dialing 1010288 connects to AT&T’s POP; 1010222 connects to MCI, 1010333 to Sprint and
so forth. Many of these companies also have 1-800 numbers that accomplish the same thing.
In 1984 in the USA, the ILEC and IXCs were strictly separate companies. Following changes in
law and regulation, today typically the holding company that owns the ILEC also owns one of
the IXCs.
This was always the case in Canada, where the phone companies were not split into separate
local and long-distance companies; but equal access to competitive IXCs was ordered in 1992.
68
In an unregulated world, the ILEC might refuse to provide such point-to-point dedicated line
services to a competitor of the ILEC’s own long-distance services, to prevent the competitor
from providing long-distance service to the insurance company.
Fortunately for the competitor, the ILEC has filed tariffs for point-to-point “dedicated line” or
more correctly, full period services in that city.
A tariff is a legal document that specifies the service level (bit rate, delay, maximum number of
bits in error etc.), the cost for a service and the business terms under which it is provided.
Once a tariff is accepted by the ILEC’s regulator, the ILEC must provide the service to anyone
who asks, including their competitor.
If the competitive carrier has a number of customers around a particular CO (for example, the
main CO downtown in a big city), then they could order point-to-point tariffed services connect-
ing each customer to the CO, then a higher-capacity point-to-point tariffed service aggregating
the traffic between the CO and their POP.
69
Subsequent legislation and regulatory decisions unbundled the ILEC’s physical access net-
work from the ILEC’s services provided on that network.
This enables competitive carriers to lease just the ILEC’s physical cabling to the customer in-
stead of paying for a tariffed service from the ILEC on the same cable.
The regulatory rationale is that the ILEC built the wire center and access network when they
were a monopoly. The community was obliged to pay the ILEC to build the access wiring.
Therefore, in a way of thinking, the community has a degree of ownership of the resulting
physical access wiring... and therefore, the community has the right to use it without being
obliged to also have the ILEC provide them services over it.
4.7.2 Dark Fiber and Dry Copper
If the ILEC is providing copper wires without electricity on them, i.e. not attached to a CO
switch line card, this is called a dry circuit. A fiber not attached to anything is called dark fiber.
4.7.3 Competitive Local Exchange Carrier (CLEC)
The next more sophisticated solution to connect a competitive carrier’s customer to their POP
in the same city is to rent two fibers from the ILEC: one from the CO to the customer, and one
from the CO to the POP.
The competitive carrier must also rent space inside the ILEC’s CO - at the wire center closest
to the customer, where they can locate equipment to operate the fibers.
The competitive carrier installs fiber-terminating equipment at the customer, in the ILEC’s CO
and at their POP, then connects the POP to the CO with one ILEC fiber and the CO to the cus-
tomer with another.
An organization doing this is said to be a Competitive Local Exchange Carrier (CLEC).
It should be noted that large carriers use this technique for the last mile in areas where they
are not the ILEC.
In this case, it is not really appropriate to call the large carrier “a CLEC”, as this is a very small
part of their business. It is more correct to say that the large carrier “has collocations”.
4.7.4 Collocations
In addition to being required to lease dark fiber to their competitor, the ILEC is required to build
collocation facilities in its COs.
Collocation facilities are rooms in the CO, often with separate entrance doors, where the com-
petitive carrier can locate their own equipment.
The competitive carrier thus gains access to the wire center: the termination point for the fibers
and copper wires in cables leading out to the street and ultimately to the customer premise.
In the collocation facility, the competitive carrier places or collocates network equipment like
Optical Ethernet switches and routers.
The ILEC’s dark fiber is connected to optical transceivers in the collocated equipment in the
CO at one end and at the customer premise at the other end, implementing a “last mile” con-
nection over the ILEC’s fiber.
4.7.5 Advantages
There are two key benefits of leasing dark fiber and collocations compared to tariffed services
from the ILEC for the last mile:
1) Cost: leasing a dark fiber is a tiny (!) fraction of the cost of paying for a 10 Gb/s dedicated
service from the phone company.
2) Performance: The competitive carrier is now in control of the optical technology: the optical
transceiver technology, WDM strategy, the manufacturer, the bit rates, transmission character-
istics and so forth.
4.7.6 Disadvantages
This does not happen with a phone call, as does a service from the phone company.
This requires the competitive carrier to have Engineers to design the system, select the equip-
ment and determine how it should be installed and configured. This is a never-ending process,
70
as newer, better products and technologies are constantly becoming available.
Another disadvantage is that there may not be any dark fiber available from the ILEC, and no
time frame for new cable construction in that area.
The CLEC does not have any control over the physical connection and how it is provisioned,
maintained and especially repaired.
The CLEC is relying on their competitor to provide and maintain the physical fiber, and to re-
pair the fiber and restore the service in a timely fashion after the fiber is cut.
4.7.7 Application
Collocations would be implemented when there is enough business around a particular CO to
justify it.
Collocations and dark fiber can be used to provide 10 Mb/s to 10 Gb/s Optical Ethernet ser-
vices over fiber. In theory, they can also be used to provide DSL and even POTS and T1/PRI
services on twisted pair copper wires to a customer.
For the POP to CO portion of the physical connection, sometimes called the backhaul, the
same technique of leasing a dark fiber from the ILEC between the POP and collocation may be
used.
4.8 Bypass
While collocations and dark fiber from the ILEC is a way to provide high bitrate service to a
customer, it is not the final answer.
With dark fiber, the competitive carrier is relying on their competitor to provide a mission-critical
piece of the service.
As soon as there is sufficient revenue in a particular area of a city, the competitive carrier will
install their own fiber from the POP to the collocations and to the customers, bypassing the
ILEC altogether.
This eliminates the uncertainty of relying on the competitor, as well as increasing efficiency by
eliminating the never-ending service ordering and billing interactions with the ILEC.
4.8.1 Easements
Physically installing fiber across a city requires easements from landowners, which convey the
right to place and leave cabling on the property.
The biggest landowner in a city is usually the municipal government, since they own all of
streets. Electrical companies, railroads, pipeline companies, CATV companies, regional, state
and federal governments, building owners and private bridge owners all sell easements.
An alternative way of bypassing the ILEC is to use point-to-point microwave radio between
buildings. High-capacity radio systems require a frequency license from the government to op-
erate. Other point-to-point systems can operate on unlicensed bands, eliminating the need for
a license at the cost of much higher interference and thus lower bit rates.
71
Figure 40. Competitive Carrier Network Model
Competition today includes competitors providing various services to residences and busi-
nesses using a mix of collocation, bypass, switched access and dedicated line access.
A model for a competitive carrier’s network, depicted in Figure 41, includes POPs in cities con-
nected together to form a regional inter-city “long distance” backbone, plus one or more Metro-
politan Area Networks (MANs) built out from the POP in each city.
In-city, these MANs connect the POP to locations like the ILEC’s toll center, collocations in the
ILEC’s COs, telecom rooms in large multi-tenant office buildings and apartment buildings, and
directly to big customers.
4.9.1 Fiber Rings
To ensure high availability, redundant connections are required to provide protection against
cut lines. This means at least two fibers, in different cables, in different ducts under different
streets between each node.
It turns out that the cheapest way to achieve this objective is to connect the nodes neighbor-to-
neighbor-to-neighbor to form what looks like a ring.
This strategy means that there are two cables to each node, but does not require twice as
many cables; only one extra cable is required, so many fiber networks are built in ring patterns.
There are several strategies for implementing cut line detection and automated service
restoration on a fiber ring.
The competitive carrier’s POPs in cities are connected to form regional rings, which are inter-
connected at multiple places to implement national communications.
The competitive carrier will install or lease fiber in-city to connect their POP to the toll center,
COs and large customer buildings. These locations are connected neighbor-to-neighbor in a
ring called a MAN.
72
5
Digital
5.1 Analog and Digital: What do we really mean?
The words “analog” and “digital” are often used with little regard for their actual meaning. It is
useful to review the definitions of these terms to better understand the concept of a digital
communication circuit.
73
5.1.5 Bandwidth
For the purposes of this course, bandwidth means capacity.
The capacity of an analog circuit is measured as the width of the frequency band supported on
the circuit, called its frequency bandwidth. The units of measurement are changes per second
or Hertz (Hz).
Wideband and broadband are used to describe circuits that support a large frequency band-
width, like coaxial copper cable (“coax”), which can support 3 GHz of bandwidth.
Companies that offer POTS on twisted pair call the frequency range of their basic service offer-
ing the voiceband, which is 3 kHz wide. Companies that operate broadband coax networks re-
fer to the voiceband as narrowband.
The capacity of a digital circuit is also called its bandwidth, but is not measured in Hertz, but
rather measured in bits per second (b/s). A broadband digital circuit is one that communicates
many bits per second.
74
Figure 44. Discrete Signal
Notice that the number of people in a room is discrete in value, but continuous in time. There
are always a number of people in the room.
How would we turn this into a signal that is discrete in time? We would have to, on a regular
basis, count the number of people in the room and write the answer down on a piece of paper.
This is a good test to see whether a signal is discrete or not: can it be written down on a piece
of paper? Or stored on a disk?
Digital signals are discrete.
75
5.3.2 Sampling
The second step is sampling. Sampling is the process of changing the signal from being con-
tinuous in time to one that is discrete in time.
This must be done on a regular basis, like clockwork.
In the example of Figure 45, the vertical lines indicate the times at which the samples are
taken. At each of these times, the signal is sampled, that is, the value of the signal is mea-
sured and recorded.
The value of the signal that is recorded is the level it is in at that time.
5.3.3 Coding
The third step is coding. The value of the signal taken at each sample (the level number) must
be coded into 1’s and 0’s so that it can be transmitted over a digital carrier system or stored in
a computer.
The objective is to transmit the codes representing the value of each sample to the far-end line
card where the reverse process is performed: reconstructing the analog waveform from the re-
ceived codes.
The whole point in doing this is to move the analog voice signal from the near-end loop to the
far-end loop over a digital transmission system without adding any noise – and allowing voice
to be carried on the same system as data, video and any other kind of information.
76
Figure 46. Quantization Error
The difference between the center of the level and where the signal actually was is a small er-
ror introduced into the reconstructed signal, and is called the quantization error. The size of the
quantization error is directly related to the size of the levels.
To make the quantization error smaller on average, more levels can be defined, to make the
levels smaller.
The telephone company uses enough levels so that a human can’t hear the quantization error
noise.
5.4.3 Aliasing Error
If samples are not taken frequently enough, then not enough information will be transmitted so
that when the “dots” are connected at the far end, the reconstructed signal is faithful to the
original signal.
This is called an aliasing error. It can be pictured by removing 2/3 of the samples in Figure 46,
then connecting the remaining dots… the result is close to a flat line and does not resemble
the original analog.
Harry Nyquist, who obtained a Ph.D. from Yale in 1917 and worked his entire career for AT&T
and Bell Labs, discovered that it is necessary to take samples more than twice as often as the
frequency bandwidth of the signal to avoid aliasing errors.
This theorem was published in his 1928 paper “Certain Topics in Telegraph Transmission The-
ory“, and is known today as the Nyquist sampling theorem. It determines the number of sam-
ples per second.
77
Figure 47. 64 kb/s Voice Digitization
78
When someone talks about a channel on a digital transmission system, they usually mean a
DS0, 64 kb/s.
These channels could be aggregated into higher bit rate channels, notably DS3 at 45 Mb/s.
This is covered in Chapter 6, “Transmission Systems”.
5.5.6 64 kb/s Packetized Voice
Going forward, voice is carried in systems originally designed for data.
For efficiency, these systems do not divide the transmission capacity into fixed-size channels,
where all users take turns one after another in a strict order, but instead make it first-come,
first-served, one packet at a time.
Every destination on the network must have a network address. On a telephone network, it’s
called the phone number. On a postal network, it’s called the mailing address. On packet net-
works, it is the IP address. IP is a standard way of packet addressing that everyone has
agreed to use.
Users create IP packets by breaking their transmissions into small chunks, perhaps 1500
bytes, and pasting the IP address of the desired destination on the front.
The user then transmits the packet to a router, which relays it onward to another router, on and
on until it reaches the indicated destination.
At the receiver, the chunks of data are extracted from the packets and put together to recon-
struct the original transmission.
The IP packets contain anything… including segments of digitized voice conforming to the 64
kb/s G.711 standard.
There are more efficient coding schemes for voice, sometimes called voice compression, but
they are only used when there are bandwidth limitations. Most of the time, G.711 is employed
to avoid compatibility problems.
☞ Regardless of whether the bits are communicated in a channel or in a packet, the bot-
tom line is that a byte, representing the value of the sample, is transmitted 8,000 times
per second to communicate digitized voice when following the near-universal G.711
standard.
79
down, a total of 921,600 pixels.
921,600 pixels, with three color bytes per pixel, refreshed 60 times per second is 1.3 Gigabits
per second. This is the output of the digitizer.
“A picture is worth a thousand words” is a well-known saying... but compared to 64 kb/s voice,
raw HD video is worth over 20,000 words!
This 1.3 Gb/s bit rate is lowered for storage, transmission and display using mathematical
compression techniques. Standard methods of compression are called codecs. MPEG is a
popular choice.
5.6.2 Factors Affecting Video Quality
A number of factors affect the perceived or subjective quality of the images on the far-end
user’s screen. Aside from network issues like transmission error rate and variability of delay,
the main factors are picture definition and refresh rate, the number of bits per second required
and the number of processing operations per second that must be performed to implement the
compression and decompression in real time.
The objective is to transmit high-definition images using a low number of bits per second while
achieving reconstructed picture quality people will be willing to use.
However, these factors are often in conflict: for example, high compression requires intensive
processing, and large picture size means a higher number of bits per second. It is one thing to
optimize two of the three factors; it is another to optimize all three at the same time.
80
move smoothly across the screen.
Early developers of television took advantage of the persisting glow of phosphorous on their
picture-tube displays to increase the apparent resolution of a display at no cost by doing the
refresh in two passes, every odd-numbered line then every even-numbered line.
Each half-picture is called a field. Fields are transmitted 60 times per second, leading to the
designation 60 Hz interlaced. Two fields make a frame.
SD in North America is abbreviated as 480i.
In the rest of the world, the number of lines per second is the same, but the definition is higher
at 720 x 576 since the screen is only refreshed 25 times per second. This is abbreviated 576i.
Videophones and desktop videoconferencing systems in the past supported the Common In-
terface Format (CIF) at 352 x 258 pixels.
5.6.5 High Definition, Progressive and 720p
When the screen refresh is done in one pass, it is referred to as progressive and abbreviated
with a p, for example, 480p.
The first step beyond standard definition is High Definition (HD), which is 1280 x 720 progres-
sive and referred to as 720p, and refreshed 50 or 60 times per second.
5.6.6 Full HD 1080 and 2K
Next is 1920 x 1080, interlaced or progressive: 1080i or 1080p.
This is called HD, Full HD, True HD, and in some cases 2K since there are approximately
2000 pixels horizontal definition in the consumer formats.
Advanced readers may want to note that abbreviations with a “K” are also used to describe
studio formats, which are slightly different than the consumer formats.
5.6.7 Ultra HD and 4K
More recently, the consumer format 3840x2160 has been marketed. It is referred to as Ultra
HD, Quad Full HD and 4K.
The usual application for higher definition (more pixels) is bigger screens, not more detailed
pictures on a small screen.
In the future, displays will have 4,000,000 x 3,000,000 pixels and will occupy entire living room
walls. The marketing department will probably call them “4M” displays.
5.6.8 Compression
Compression is required to store and transmit these images. Without compression, 720 x 480
at 30 Hz, with one byte each for red, green and blue is 250 Mb/s. 1280 x 720 at 60 Hz is 1.3
Gb/s. 1920x1080 is 3 Gb/s.
Compression is performed by an algorithm called a coder/decoder or codec, either on a spe-
cial-purpose integrated circuit chip, or on the shared main processor in a computer.
Video compression is lossy compression, meaning the reconstructed image is not exactly the
same as the original.
To operate in real time (at playing speed), codecs are usually implemented as highly optimized
machine code on custom-built chips containing multiple Digital Signal Processors (DSPs).
5.6.9 MPEG
Standards are required for interoperability. The Moving Picture Experts Group (MPEG) and the
ITU establish standards in this area.
MPEG-1 was for video on CDs, with the video coded at 1.15 Mb/s.
This was replaced with MPEG-2, which offers a wide range of coding and compression op-
tions, grouped in profiles. Each profile supports a certain picture size, definition, refresh rate
and image quality, and results in a different average bit rate, typically 1 to 3 Mb/s.
MPEG-2 is used as the basis for SD video stored on Digital Versatile Disks (DVDs) and trans-
mitted via cable, satellite and IPTV video services.
5.6.10 MPEG-4 and H.264
81
Part 10 of the MPEG-4 standard specifies the use of the H.264 codec standardized by the ITU.
H.264 provides the same quality of reconstructed signal as MPEG-2 for 1/3 the bit rate with
better error tolerance.
H.264 is used for coding HD video for Blu-ray DVDs, and HD channels delivered by cable,
satellite, Internet and IPTV video services. HD video is typically coded at 6 Mb/s for broadcast.
Much lower rates are used for Internet video.
82
Pulses of electricity on copper wires will also be attenuated with distance and will also have
noise added. The square corners will also be rounded off due to capacitance of the wires.
However, instead of boosting the pulse with an amplifier, a repeater is used. Repeaters do not
boost the incoming signal: repeaters are binary devices that make a decision.
If a repeater decides it detects an incoming pulse, however degraded, it regenerates a clean
copy of the signal, a new noiseless square pulse on its output, to be transmitted on the next
cable segment.
5.7.3 Repeaters on Copper Wires
Repeaters are required every mile or two on copper wire systems to be able to regenerate the
pulses while they are still detectable without errors.
For example, repeater spacing is every 6,000 feet on T1 and every 12,000 feet on High-Speed
Digital Subscriber Line (HDSL), a 1.5 Mb/s technology not related to residential DSL.
5.7.4 Repeaters on Fiber
Repeaters are required on fiber optic systems at 40 to 80 km (or more on special systems like
transoceanic cables) due to a different mechanism that degrades the pulses called dispersion.
This is the lengthening of the duration of the pulse caused by the light following different
bounce paths, called modes, inside the fiber.
Since some paths have a longer length than others, the light following those paths takes longer
to arrive at the far end, so the pulse becomes longer in time. The pulses must be regenerated
before they overlap.
5.7.5 Comfort Noise Generation
For digital transmission, voice is coded into 1s and 0s, which are represented as pulses. The
pulses can be reliably detected and regenerated as needed, allowing the communication of the
1s and 0s with a very low error rate.
This allows the eventual reconstruction of the signal at the far end with no added noise.
Sprint’s advertising tag line was “so quiet, you can hear a pin drop”.
In fact, when this was first rolled out in the Bell System beginning in the 1960s and 70s, sub-
scribers complained that it was too quiet.
People used to hearing hissing and humming on old analog trunks, didn’t like the silence, say-
ing it was difficult to tell if the call was connected.
To address this user issue, the G.711 codec standard includes Comfort Noise Generation,
where the codec adds noise to the signal so users are comfortable and don’t complain that it is
too quiet.
83
6
Transmission Systems
From about 1960 to 2000, the telecom network was constructed of high capacity transmission
systems shared amongst users by employing Channelized Time-Division Multiplexing (TDM),
also known as Synchronous Time-Division Multiplexing.
These systems are now referred to as legacy systems, meaning left over from a previous era...
but that does not mean they have disappeared. Telephone companies tend to keep existing
systems running for as long as possible.
Additionally, both GSM cellular and Passive Optical Networks implement channelized TDM, so
knowledge of channelized TDM remains part of the core knowledge set required in the telecom
business today.
In the first half of this chapter, we cover the installed base of channelized TDM transmission
systems with the DS0-based hierarchy of bit rates and the technologies T1, SONET and ISDN.
Then we begin understanding new-generation transmission systems, which share their capac-
ity amongst users with Statistical Time-Division Multiplexing, also known as bandwidth on de-
mand.
In the second half of this chapter, we cover the fundamental ideas of statistical multiplexing
and bandwidth on demand, including the critical concept of overbooking.
Subsequently, Chapter 8 and Chapters 11 through 16 cover the technologies used to imple-
ment the new-generation transmission systems, including fiber optics, fundamentals of frames
and packets, Ethernet and MAC frames, IP packets and IP addressing, and MPLS.
84
use of the condo for the next week, and so on in a strict rotational order.
When the rotation is completed, it repeats, year after year.
If a user pays for a week, but does not actually show up to use it, the condo is nonetheless re-
served for that user and remains empty for that week.
The users are time-sharing the condo, each getting a fixed amount of capacity. In the case of
condos, the standard amount is one condo for one week per year.
6.2 Multiplexers
To implement channels, a multiplexer is attached to each end of a circuit.
On one side of the multiplexer are the users’ lower-speed access circuits, each on a separate
hardware port. On the other is the high-speed aggregate port. The multiplexer intersperses the
users’ data in a strict order to form a high-speed stream that is transmitted on the aggregate
port.
What goes in on a particular hardware port at one end comes out on the corresponding hard-
ware port at the other end.
85
Each user gets a fixed fraction of the capacity of the high-speed circuit to carry the data on
their lower-speed circuit from one building to another. This capacity is their channel.
The multiplexer implements the channels. Telephone switches and routers connected at each
end of each channel direct traffic onto the channels.
Of course, multiplexers are built into telephone switches so that both the multiplexing and cir-
cuit-switching functions are in the same product.
6.2.1 Example: T1
To understand how this kind of channelized or synchronous multiplexing is accomplished, it is
useful to consider an example technology, Trunk Carrier System 1, or T1 for short.
T1 is a technology popular from 1960 – 2000, designed to carry 24 trunks over 4 copper wires
using channelized TDM. Though fiber is now routinely used, there remain thousands of T1 cir-
cuits installed and in operation.
86
rotational order, one after another. The resulting data rate is 24 x 64 kb/s = 1.536 Mb/s.
6.2.4 Framing Bits
To be able to sort out what goes where at the far end, the transmitting multiplexer sends an ex-
tra framing bit before the byte from the first port.
The receiving multiplexer uses this framing bit to identify the beginning of the byte for channel
one in the incoming bit stream, and direct that byte to low-speed output port number 1 on the
far side.
Then the next eight bits are directed to port 2, then the next to port 3 and so one until a byte for
each port has been received, then the process repeats.
Framing is covered in detail in Section 6.5.2.
6.2.5 DS1 Rate
The framing bit brings the bit rate to 1.544 Mb/s, the DS1 rate.
The entire system is two-way simultaneous.
6.2.6 CSU
The aggregate port on the multiplexer is connected to a CSU. The CSU is the circuit-terminat-
ing equipment for the T1 circuit.
This device represents binary digits on the physical wires using pulses of voltage on the cop-
per wires. It performs the same functions as a modem - but is not called a modem since it is a
digital device.
6.2.7 Repeaters
In this particular technology, repeaters are required to regenerate the voltage pulses every
6000 feet (6 kft / 1 mile / 1.6 km) along the T1 circuit.
6.2.8 Synchronization
All of the devices have to be synchronized at the bit level to know when a pulse of voltage
starts and ends.
In days past, all devices used a clock derived from the US National Bureau of Standards or
Canadian National Research Council cesium clock.
Today, clocks are derived from Global Positioning System (GPS) satellites.
6.2.9 Applications for T1
T1 was first used to carry long-distance trunks, then became an access technology for busi-
ness customers.
T1 was used to carry PBX trunks, used for ISDN PRI services, used to access Frame Relay
data services, and to implement private networks made of dedicated lines.
6.2.10 SONET TDM on Fiber
Synchronous Optical Network (SONET) technology, used for the network core from 1980-
2000, operates in the same way as T1.
SONET implements up to 129,024 DS0 channels by transmitting a byte 8,000 times per sec-
ond for each channel.
The resulting aggregate speed is measured in multiples of 45 Mb/s and is transmitted on fiber
using the Optical Carrier (OC) system.
87
pensive legacy circuits that are no longer being used... but the customer has never canceled
them.
These systems were designed to be voice trunk carrier systems, and so operate at multiples of
64 kb/s, the standard bit rate for digitized voice, referred to as Digital Service Level Zero or
DS0 for short.
To allow interoperability of systems, standardized multiples of DS0 channels were defined.
These standard multiples and the resulting line speeds are known as the digital hierarchy.
Equipment manufacturers made products operating at these standard bit rates. Telephone
companies purchased this equipment and integrated it to form networks operating at these bit
rates. Their marketing departments created products and services at these standardized bit
rates.
6.3.1 Kilo, Mega, Giga, Tera
Abbreviations are used to refer to data rates:
103 = thousand = kilo
kilobits per second (kb/s)
106 = million = Mega
Megabits per second (Mb/s)
109 = billion (US), thousand million (UK) = Giga
Gigabits per second (Gb/s)
1012 = trillion (US), billion (UK) = Tera
Terabits per second (Tb/s)
6.3.2 DS0
Channelized digital transmission systems move the 64 kb/s DS0 rate for historical (voice) rea-
sons. Multiple DS0 channels are combined or aggregated into higher bit-rate streams for trans-
mission.
Anything below 64 kb/s is referred to as a subrate.
6.3.3 DS1 and E1
88
The first step above a DS0 is the DS1 rate. This rate is equal to 24 DS0s, or if you prefer, 24
times as fast as the DS0 rate.
Note that the mathematics does not quite work out. Multiplying 64 kb/s by 24 does not quite
equal 1.544 Mb/s. This is due in fact to some overhead added in by the T1 carrier system (the
framing bits).
There is also an E1 rate, used in Europe, which is 32 DS0s.
6.3.4 DS2
The next rate up is the DS2 rate. This rate is not interesting, and is hardly ever offered com-
mercially. It is the least common denominator between DS1 and E1, and was used as a step-
ping stone to the DS3 rate on old multiplexing systems.
6.3.5 DS3
The next rate of real interest is the DS3 rate. North American carriers’ legacy backbone trans-
mission systems operate at multiples of DS3 rates.
Both SONET fiber optic systems and point-to-point microwave radio systems were used to im-
plement n x DS3 circuits.
6.3.6 STM and SDH
In the rest of the world, transmission systems conformed to the European Synchronous Digital
Hierarchy (SDH), which moves Synchronous Transport Modules (STM).
STM is a frame size, which transmitted 8,000 times per second results in a data rate of about
155 Mb/s. This is also called an STS-3C in North America.
89
6.4.5 SONET and Byte-Interleaved Multiplexing
SONET (Synchronous Optical Network), also called synchronous DS3 multiplexing, was the
newer method. This involves byte-interleaved multiplexing right from DS0 or DS1 to DS3 rates
and beyond.
This means that it is easy to drop and insert individual channels out of the DS3. In addition, ex-
tra signaling and control for end-to-end error checking is included in overhead bits.
6.4.6 SDH
The Synchronous Digital Hierarchy (SDH) is a European standard for multiplexing that moves
multiples of 155 Mb/s, called Synchronous Transport Modules (STMs).
Where a SONET system moving multiple DS3s would be used in North America, an SDH sys-
tem moving multiple STMs is used in Europe.
6.4.7 Line Speed vs. Technology
It is important to distinguish between the line speed or data rate of a circuit and the particular
technology employed to provide a circuit with that data rate.
A common mistake is to always refer to 1.5 Mb/s as “a T1”. It ain’t necessarily so. T1 is a par-
ticular technology for providing a DS1-rate service, which is 1.5 Mb/s, using four copper wires
and a particular scheme for pulses to represent 1s and 0s.
There are other ways of moving 1.5 Mb/s, including HDSL on copper, on fiber and wireless. It
would be most accurate to refer to 1.5 Mb/s as “a DS1”.
That said, keep in mind that most people erroneously interchange “T1” and “DS1”, making
statements like “we’ve got a T1 coming into the building”.
To avoid this mistake, say “we have a 1.5 Mb/s circuit” or “we have a DS1-rate service” or “we
have a DS1 coming into the building”.
It is the rate – the line speed – not the technology that is usually of most interest.
6.5 Framing
In this section, we understand framing. Framing is extra information transmitted with the data,
allowing the demultiplexer at the far end to direct bits in the incoming aggregate to the correct
output port.
6.5.1 Synchronous Time-Division Multiplexing
To recap: in a channelized transmission system, the traffic for many users is aggregated onto a
high-bit-rate transmission system using synchronous Time Division Multiplexing (TDM).
Multiplexing means sharing. Time Division means that the sharing is done in time. Synchro-
nous means that the time-sharing is performed in a strict order in time, resulting in each user
being assigned a fixed time slot on the transmission system, called a channel.
The TDM is implemented by network equipment called multiplexers, which send a byte from
each user in a strict order, one after another, across the transmission system. This happens
8,000 times per second, and so moves 64 kb/s per channel: DS0 channels.
The stream of bytes from a particular user is interspersed with bytes from other users – other
channels – on the transmission system.
6.5.2 Framing and Transmission Frames
To allow the demultiplexer at the far end to direct the correct bits to the correct low-speed out-
put, it is necessary to also send control information.
90
Figure 53. DS1 Frame
Since the users are sending bytes in a strict order, like a batting order at a baseball game, the
control information is minimal: it is only necessary to mark the beginning of the batting order
with framing bits.
When the far-end detects this information marking the beginning of the batting order, it then
knows that the next byte goes out to user 1, the byte following goes to user 2 and so forth… in
a strict order.
The information marking the beginning of the batting order, i.e. marking the beginning of the
frame is called the framing.
The framing, plus a byte from each user, is called a frame in the transmission business.
Frames are transmitted synchronously, 8,000 times per second.
6.5.3 DS1 Frame
The DS1 frame is the lowest level, the smallest frame, containing bytes from 24 channels plus
one bit for framing, as illustrated in Figure 53 and at the top of Figure 54.
A discussion of the actual DS1 framing bits and the framing patterns, Superframe and Ex-
tended Superframe formats is included in Appendix A.
6.5.4 STS-1 (DS3) Frames
Frames are packaged together into larger frames for high-bit-rate transmission systems. As il-
lustrated in the middle of Figure 54, the next frame size up from DS1 is the Synchronous
Transport Signal 1 (STS-1), which carries 28 DS1 frames.
91
The STS-1 carries a DS3, plus more framing called the transport overhead, and is commonly
called a DS3 frame. These larger DS3 frames are also transmitted 8,000 times per second.
6.5.5 SONET Optical Carrier Frames
The SONET Optical Carrier (OC) system moves multiple DS3 frames. For example, as illus-
trated at the bottom of Figure 54, a SONET OC192 system transmits 192 DS3 frames 8,000
times per second.
OC3 (3 DS3 frames), OC12 (12 DS3s) , OC48 (48 DS3s) and OC192 products were com-
monly deployed.
6.5.6 Advantages and Disadvantages of Channels
Implementation of channelized TDM results in “pipes”, that is, the capability to move a fixed
number of bits per second between A and B.
The main advantages of channelizing is that each user knows exactly what capacity they are
going to get.
The downside is that if a user has nothing to transmit, their channel is nonetheless reserved
and can not be employed by any other users. This makes the system inefficient for carrying
bursts of data.
6.6 ISDN
Integrated Services Digital Network (ISDN) is another technology for carrying DS0 channels.
Unlike T1 and SONET, which are essentially point-to-point transmission technologies, ISDN
also includes network addressing and circuit-switching: being able to specify where the DS0s
are to be terminated on a call-by-call basis.
Two flavors of ISDN are Basic Rate Interface (BRI) and Primary Rate Interface (PRI). These
are two very different technologies and must be distinguished.
92
Combining B channels to form a 128 kb/s data connection for telecommuters was one of the
applications for ISDN BRI.
The equipment needed to connect devices to an ISDN line must include the circuit terminating
function, a Network Termination Type 1 (NT-1), as well as an Terminal Adapter (TA).
These two functions usually come together in a single device, which has a jack for the phone
line on the phone company side, and a POTS jack and data equipment connector on the other
side.
6.6.2 Obsolescence of BRI
People have been talking about ISDN BRI for about 50 years. It was slow getting off the
ground and never gained much momentum. It now appears that ISDN BRI will join telegraphs
in the dustbin of history. Technologies like DSL, IP and Optical Ethernet have made it obsolete.
6.6.3 Primary Rate Interface (PRI)
ISDN PRI is not yet obsolete. PRI is a service that turns a DS1-rate access into 23 DS0 chan-
nels plus a signaling channel. PRI trunk means a DS0 that has an associated PRI signaling
channel.
93
6.7 Statistical Time Division Multiplexing
Statistical TDM is more efficient than channelized TDM.
With synchronous or channelized TDM, each user gets to use the high-speed circuit to send a
byte, in a strict rotational order like a time-share condo. This has the effect of giving each user
a fixed amount of capacity, called a channel.
This was designed for voice communications, since it is easiest to do quality voice communica-
tions if there is a constant amount of transmission capacity available for it.
If a particular device is idle, its channel, its assigned fraction of the high-speed circuit, is none-
theless reserved and cannot be used by any other devices. This makes implementation sim-
ple, but is not an efficient use of the high-speed circuit.
For data communication applications, we don’t really need – nor want – to have fixed amounts
of capacity available for transmission, since the traffic isn’t fairly constant like voice, but hap-
pens in bursts. With email or web surfing, the vast majority of the time, nothing is being trans-
mitted and occasionally, small file transfers happen.
In this case, a more efficient scheme of multiplexing called statistical TDM can be employed.
Capacity is allocated to a user when they demand it; otherwise, a different user can employ the
capacity instead. Since the term bandwidth means capacity, this is called a bandwidth on de-
mand strategy.
6.7.1 Toll Plaza Example
An example of statistical time-division multiplexing is a toll plaza.
There are a number of toll booths, with lines of traffic moving slowly through each onto a toll
highway, where traffic moves at high speed. Each line sends a car onto the highway as
needed
94
Of course, this is exaggerated – but in the direction opposite to what you might think! The “in-
coming lanes” would be the in-building LAN, which could be 1000BASE-T, running at 1000
Mb/s. The “outgoing” lane would be the WAN circuit, and could be running at 10 Mb/s… so
1000 MPH on the inputs and 10 MPH on the outputs would be closer to reality.
Clearly, it is necessary to know the statistics of how many cars per hour arrive at the toll plaza
demanding to use the outbound lanes – regardless of the fact they are traveling 1000 miles per
hour – to know how many input lanes there can be and what kind of traffic jams to expect.
Airlines also do this. Knowing that some passengers will not show up to claim their seat, air-
lines overbook flights. The objective is to end up with 100% full planes: no-one left behind, no
empty seats. It is necessary to know the historical statistics of how often people actually did
show up to claim their seat to know how much to overbook the flight.
95
Ethernet switches, IP routers and MPLS LSRs are covered in detail in upcoming chapters.
6.7.5 Packet Networks
In this section, we have been explaining the concept of overbooking, called statistical multi-
plexing, using the simplest example: where the overbooking is done by multiplexers at each
end of one circuit.
If we then extend the concept to a whole network of high-speed circuits, what do we have? IP
packet networks.
This is the essential idea behind a packet network: the user takes a chunk of data, puts an ad-
dress on the front indicating the destination, which forms a packet, then the user sends this
packet whenever there is a free spot on the overbooked circuits that make up the network.
At each intermediate step, a device called a router examines the network address on the
packet and uses that information to decide on which overbooked circuit to forward the packet
next.
Overbooking the network circuits lowers the cost to users for a given access line speed. A net-
work where the internal circuit capacity is equal to the total of the access line capacity, called a
non-blocking network, would be prohibitively expensive.
An overbooked network, where the internal capacity is much less than the total access line
speeds is much less expensive, and gives almost the same apparent performance to the
user... based on the fact the users will normally do nothing, and only occasionally transmit a
packet at their access line speed.
96
Figure 59. New systems transmit IP packets in MAC frames as needed, instead of single bytes and framing bits
all the time
MAC framing is six bytes, a special bit pattern so that the receiver can find the start of the
frame. This is followed by the destination and source MAC addresses, indicating the sending
and destination stations on the current circuit. Then a control field indicates how many bytes
there are in the payload or information field, in which is carried typically one IP packet. This is
followed by an error detection scheme called Cyclic Redundancy Checking (CRC), imple-
mented using a Frame Check Sequence (FCS).
6.8.3 Routers
A router is used to direct the packets onto the outgoing transmission system. The users’ pack-
ets will arrive on one or more incoming physical access circuits and the router will relay or for-
ward the packets, in frames, on the outgoing transmission system.
The users only send packets to the router when they have traffic to be transmitted. The router
will forward the packets on a first-come, first-served basis if there is no prioritization imple-
mented. This implements the “bandwidth on demand”. It is the router than manages the over-
booking or oversubscription of the outgoing circuit.
6.8.4 Prioritization
If a prioritization scheme is implemented, the router will forward incoming packets not on a
first-come, first-served basis but in an order determined by the indicated priority of a packet
and the queuing algorithm that the router is implementing. For example, packets containing a
live telephone call might be prioritized over packets containing email messages.
6.8.5 MPLS
It should be noted that a traffic management system called Multiprotocol Label Switching
(MPLS) is used in a carrier’s network core. The IP packets have a label number affixed to
them, and this label number is used for routing (and possibly prioritization) instead of the IP ad-
dress. This is internal to the network and invisible to end-users.
6.8.6 Implementation with Optical Ethernet
In practice, this new generation of IP packets in MAC frames is implemented using Optical Eth-
ernet, which is Ethernet switches connected with point-to-point fibers. MAC frames are sig-
naled over the fibers by flashing a light on and off.
97
Telephone calls were converted from voiceband analog on loops to 64 kb/s DS0 streams by
the line cards in the CO switch, then switched to trunks carried long distance in DS0 channels
on the SONET backbone, one trunk per channel.
Data was carried in ATM cells or IP packets interspersed in a high-speed stream by a router.
These high-speed data streams were carried point-to-point between routers in DS3 channels
on the SONET backbone.
As illustrated at the top of Figure 60, in this way, integration was achieved in the network core
by carrying everything in channels.
6.9.2 New: Everything in Packets
Going forward, the telecom network core is everything in IP packets carried on Optical Ether-
net and managed with MPLS.
A practical question for carriers is how to transition the huge installed base of analog loops,
CO switches and channelized SONET infrastructure to the new IP over Ethernet paradigm.
98
loops for the time being
6.9.4 Packetized Voice from the Customer Premise
However, that is not the final answer, hence the label “NEWER” instead of “NEW” in Figure 60.
In the longer term, the gateway function will be moved to the customer premise and the analog
loops, CO switches and DS0 trunks will completely disappear. Traffic to and from the customer
premise will be voice, video and data interspersed in packets.
6.9.5 Packets over Non-Channelized SONET
To avoid having to immediately replace the existing network core SONET equipment with Opti-
cal Ethernet, the SONET systems might be used in a non-channelized fashion, that is, using
the entirety of a 10 Gb/s SONET OC192 link to carry MAC frames point-to-point in the same
way that a 10GBASE-x Optical Ethernet link (Section 8.5) would.
In the longer term, the SONET equipment and its optical transceivers will be replaced with Op-
tical Ethernet.
99
7
The Cloud and Service Provisioning
7.1 Anatomy of a Service
Any service provided by a telecommunication service provider is made up of three compo-
nents: access, network connection and billing agreement.
The access circuits are physical lines with circuit terminating equipment at each end. These
lines run from a user’s site to the nearest physical attachment point to the carrier’s network.
The location containing this physical attachment point is usually a Central Office (CO). It may
be in an enclosure outdoors or underground in a vault.
There are many different technologies for access circuits, including
• Plain Ordinary Telephone Service (POTS) lines
• Older-style digital data circuits at up to 56 kb/s,
• ISDN BRI digital telephone lines at 128 kb/s,
• xDSL technology at 1 – 200 Mb/s,
• Cable modem technology at 1 – 500 Mb/s or more,
• Passive Optical Networks at 1 Gb/s or more,
• T1 digital access circuits at 1.5 Mb/s,
• Cellular and point-to-point radio,
• SONET fiber-based circuits based around 45 Mb/s,
• Optical Ethernet from 1 to 100 Gb/s.
These are short circuits, hopefully less than a couple of miles long. Each type of access circuit
must have a specific type of Data Circuit-terminating Equipment (DCE), a type of customer
premise equipment, attached to the line to be able to transmit data on that circuit. Some exam-
ples are:
• Small Formfactor Pluggable (SFP) optical transceivers for fiber,
• LAN Network Interfaces: copper, fiber and wireless implementations,
• Modems for wireless, DSL, cable modem and POTS,
• Data Service Units (DSUs), for old 56 kb/s non-switched digital circuits,
• Channel Service Units (CSUs), used on T1 circuits,
• CSU/DSUs, used on switched-56 kb/s circuits,
• Optical Network Units (ONUs), Optical Network Terminals (ONTs), and Optical Line Termi-
nals (OLTs) used on fiber circuits.
100
Figure 61. The Network Cloud
Network connections between the access circuits are made over high-capacity circuits that are
owned and managed by the network service provider. Many options as methods of connection
through their networks are offered. These can be summarized into three fundamental choices:
• Full period: connected all the time, billed as a monthly fixed charge.
• Circuit-switched: connected on demand, billed as a monthly fixed charge for the access cir-
cuit plus a per minute usage-sensitive charge.
• Bandwidth on Demand or “packet-switched”: available all the time, billed as a monthly fixed
charge for the access circuit plus in theory a usage-sensitive charge based on the amount
of data transmitted.
Note that there is a monthly charge for each access. A combination of access circuits with their
circuit-terminating equipment, method of connection, and of course, billing plan make up a ser-
vice.
101
Figure 62. Inside The Cloud
To connect the customers’ access circuits and lower-bit-rate services to the core fiber ring,
edge equipment is provisioned at each station on the ring, and this edge equipment is con-
nected in pairs across the ring.
The edge equipment acts as a data concentrator, and as a converter between access circuit
technology (e.g. copper wires or lower-speed fiber) and the fiber-optic core technology. Cus-
tomers’ access circuits are connected to the edge equipment, which aggregates the traffic into
a stream transmitted to its opposite number. The edge equipment at the far end distributes the
traffic to the correct far-end access.
There are three basic kinds of edge equipment: multiplexer, telephone switch and router. Each
of these partitions the capacity of the connection across the ring between the users in a differ-
ent way, and so each is used to implement a different kind of network service. This is covered
on the next page.
In the future, there will be only one kind of network service: IP packets carried in Ethernet
frames, and so the switches and multiplexers will disappear and only routers will be used for
the data concentration function.
102
For business customers, the same Optical Ethernet technology used on the core will be used
on the access, so the physical conversion functions associated with edge equipment will be
largely unnecessary.
For residential customers, the existing copper entrance cable will be used for some time to
come, so the edge equipment will route packets between DSL modems and copper wires on
the low-speed (customer) side and the fiber core on the aggregate (network) side.
103
Figure 63. The Three Basic Types of Edge Equipment
A router doesn’t establish connections, and doesn’t reserve capacity for a particular user.
Routers are stateless devices that treat each packet they receive individually. At a network ser-
vice provider, the packets come in on low speed access circuits and go out on the next avail-
able spot on a high-speed backbone. Routers are used for bandwidth on demand services like
Internet service and commercial IP packet communication services.
The question of reserving capacity or not can be described by full-period (muxes) vs. circuit-
switching (switches) vs. bandwidth on demand (routers). This all boils down to channelized vs.
statistical multiplexing of portions of the backbone.
For advanced readers: The distinction between a router and a switch can be confusing when
considering an ATM switch. This device performs both switching and bandwidth on demand.
The easiest way to understand this is to consider that “switching” and “routing” both mean
making a route decision. Traditionally, the term “switch” also means that a connection is estab-
lished by the network equipment, and that there will be a flow of information along the same
path to a particular destination. In this case, the ATM switch is capable of establishing virtual
circuits, which are routes over which everything will travel. Conversely, routing IP packets does
not involve setting up virtual circuits, and IP packets do not have to all follow along the same
path. In MPLS, both terms are used together: virtual circuits are called Label-Switched Paths,
and to cover all bases, the network device is called a Label-Switching Router.
104
Figure 64. Service Provisioning
Going forward, the network core is packetized, moving IP packets in Ethernet frames. All traf-
fic: voice, data, video, Internet traffic and anything else is placed in IP packets and inter-
spersed with other users’ packets on the core. Routers forward packets from the access cir-
cuits to the core and from the core to the access circuits.
105
8
Fiber Optics
8.1 Fiber Basics
The fundamental idea behind optical transmission is varying some characteristic of a light
beam to represent information, transmitting that light beam through a solid tube of glass that
guides the light to the far end of the tube, where the light is detected and interpreted.
106
The rate at which the light can be turned on and off is the primary factor determining how many
bits per second can be represented on the fiber.
An exception where pulses of light are not used is fiber to the neighborhood in many cable TV
systems. On these systems, the amplitude of light is varied continuously within a broad band of
frequencies, as a direct analog of the electrical signal at the same frequencies on coaxial cop-
per wires.
8.1.3 Attenuation and Dispersion
Impairments, that is, the factors that reduce the ability to reliably detect the pulses at the far
end include attenuation and dispersion, and usually worsen with distance, so have the effect of
limiting the useful range.
Attenuation is the diminishment of signal strength with distance, caused by not-perfectly-trans-
parent glass. This is usually not the limiting factor – unless bad splices or faulty connections
severely attenuate the signal.
Dispersion causes the lengthening in time of the pulse envelope while in transit over the fiber.
If the pulse duration were to double during transit, at the far end the pulses would merge to-
gether, making it impossible to reliably detect them.
Before this happens, the pulses must be detected and regenerated by a repeater in an optical-
electrical-optical process, or with very advanced technology, the pulses are reshaped (short-
ened) optically.
There are many ways that dispersion happens: modal dispersion, chromatic dispersion, polar-
ization mode dispersion and others. This is covered in more detail in a subsequent lesson.
107
Figure 66. Fibers and Cables
The innermost part of the fiber is a solid tube of glass called the core. The purpose of the core
is to act as a waveguide for the light.
The core diameter is measured in millionths of a meter, called microns.
micro (μ) = 10-6; 1 μm = 10-6 m.
Fiber core sizes range from about 5 to 50 microns. A human hair is about 100 microns in diam-
eter.
8.2.2 Cladding and Coating
Around the core is the cladding, which is also glass, but with a different refractive index than
that of the core.
The difference in refractive index causes light injected into the core at certain angles to reflect
back into the core – thus constraining all of the optical energy which is the pulse to travel in the
core and exit the far end.
Around the core and cladding is a colored plastic coating to waterproof and identify the fiber.
8.2.3 Cables
A fiber optic cable contains multiple fibers, which are usually organized in bundles in colored
soft plastic tubes called the inner sheath for identification.
A sticky waterproof compound is placed in the inner sheath to repel water, which can infiltrate
glass and change its transmission characteristics.
More layers of hard plastic and metal are added to protect the fibers from water, shovels and
backhoes. A strengthening member may be present to keep the cable from being bent too
sharply during installation, causing micro-cracks or outright breaks.
Mechanical protection - armor - is added to protect against a type of signal degradation on
fibers known as backhoe fading: being cut with a mechanical shovel.
The outermost layer is called the outer sheath. Ripcords – steel and/or nylon – may be incor-
porated to allow installers to strip away sheaths without damaging the fibers.
A slippery covering can be added to make it easy to pull the cable through long runs of conduit
called ducts.
A fluorescent orange outer covering may be added to make the cable more visible and lessen
the chance of an accidental cut.
8.2.4 Redundancy
108
Cables get cut, particularly by construction crews digging up streets with backhoes for unre-
lated work.
To maintain availability of communications, two fibers on different cables following different ge-
ographical routes can be installed.
This is called redundancy or path diversity.
In some systems, the same data is transmitted on both cables at the same time, guaranteeing
no loss of data.
Other strategies implement automatic protection switching, i.e. moving traffic to a different ca-
ble after a break, which may involve some loss of data.
8.3.1 Bands
The first two bands generally used in transmission systems were centered around 850 nm and
1310 nm. The first band, near 850 nm, was used almost exclusively for short-range, multimode
applications.
Single-mode fibers were first designed for use in the second window, near 1310 nm. To opti-
mize performance in this window, the fiber was designed so that a type of dispersion called
chromatic dispersion would be close to zero near the 1310 nm wavelength.
As the need for greater bandwidth and distance increased, a third window near 1550 nm called
the Conventional or C-band has been exploited for transmission. It has much lower attenua-
tion, and is within the frequencies amplified by erbium-doped fiber amplifiers.
More recently, bands above and below the C-band, called the Short or S-band and Long or L-
band have been exploited for transmission.
8.3.2 Multimode and Modal Dispersion
Dispersion is the spreading of the duration of the pulse envelope and is caused by numerous
factors.
109
As illustrated in Figure 68, if the pulse envelope lengthens too much, adjacent pulses merge
together and can not be detected at the receiving end. This limits the distance before a re-
peater is required.
110
Since the propagation speed of light in glass is affected by its wavelength, this imperfection
has the effect of causing some light to take longer to arrive at the far end later than other light,
causing dispersion. This type of dispersion is called chromatic dispersion.
8.3.5 Polarization-Mode Dispersion
The propagation speed of light in a fiber is also affected by the diameter of the fiber. As light is
actually two waves at right angles (horizontal and vertical) propagating forward, slightly oval-
shaped fiber causes these two waves to propagate at different speeds, causing polarization
mode dispersion.
111
Multiplexers and demultiplexers can be either passive or active in design. Arrayed waveguide
gratings consist of an array of curved-channel waveguides with a fixed difference in path
lengths. The waveguides are connected to cavities at the input and output.
When light enters the input cavity, it is diffracted and enters the waveguide array. There, the
length difference of each waveguide causes phase delays at the output cavity, where an array
of fibers is coupled. Different wavelengths have constructive interference at different locations,
which correspond to the output fibers.
A different technology uses thin film filters; the property of each filter is such that it transmits
one wavelength while reflecting others. By cascading these devices, multiple wavelengths can
be isolated.
8.4.3 Optical Ethernet Paths
A low-cost type of WDM multiplexer is an Optical Ethernet transceiver that transmits data in
parallel over several wavelengths to achieve high bit rates.
For example, the 40GBASE-LR4 standard signals 10 Gb/s over four wavelengths in parallel to
achieve 40 Gb/s.
100GBASE-SR10 signals 10 Gb/s over ten wavelengths in parallel to achieve 100 Gb/s.
Each of the parallel wavelengths is called a path.
8.4.4 Current and Future Capacities
There is a large installed base of expensive DWDM multiplexers implementing 24 or 32 wave-
lengths around 1550 nm for very high capacity core network connections.
In the future, systems implementing 1,000 wavelengths on each fiber, each signaling at least
10 Gb/s, will result in available capacity of 10,000,000,000,000 bits per second, which is
10,000,000 Mb/s or 10 Terabits per second (Tb/s), per fiber, in the core.
In the not-too-distant future, 10 Gb/s will be a normal speed for business customer services.
112
Figure 70. SFP Optical Transceivers
The SFP module format is not the subject of a standard, but rather described in industry Multi-
ple Sourcing Agreements (MSA).
113
used to provide access to this core to users.
A method of organizing the bits for transmission, plus monitoring, alarming, testing and auto-
matic protection switching is required for reliable service.
8.6.1 SONET and SDH
In the past, the most popular technology for these functions in North America was a standard
called Synchronous Optical Network (SONET).
In the rest of the world, a very similar technology called Synchronous Digital Hierarchy (SDH)
is employed. There is a very large installed base of SONET and SDH systems.
8.6.2 Optical Ethernet, RPR and MPLS
For new deployments, Optical Ethernet, that is, 802 MAC frames signaled on fiber between
Layer 2 switches is deployed. Layer 2 switch is another term for a LAN switch or Ethernet
switch, since its functions correspond to Layer 2 of the OSI 7-Layer Reference Model.
A technology called Resilient Packet Ring (RPR) and/or MPLS is used instead of the protec-
tion-switching capabilities of SONET / SDH to implement the recovery from broken connec-
tions.
8.6.3 Fiber Rings
To ensure high availability, that is, the possibility of communicating even if a line is cut or
equipment fails, it is necessary to provide multiple redundant paths between each point.
Figure 72. The Network Core - Fiber Rings
114
The cheapest way to do this is to connect locations in ring patterns. This way, there are two
connections to every location, but only one extra circuit.
Rings are used to connect COs in a city together. Rings are also installed to connect cities in
regions together, and these regional rings are interconnected at multiple places for long-dis-
tance communications.
Short-cuts, i.e. connections between non-adjacent points on the ring, are implemented as traf-
fic dictates. The end result is a semi-meshed network, where some locations are directly con-
nected and others are reached via intermediate stations.
115
In residential neighborhoods, a MAN would connect Layer 2 switches contained in outside
plant enclosures to the CO. From these switches, fiber would lead to Passive Optical Network
splitters on poles or in pedestals, where typically 32 fiber access circuits are pulled as spokes
to residences and small businesses, time-sharing the backhaul to the switch in the enclosure.
A MAN would also connect DSLAMs contained in outside plant enclosures to the CO. The
DSLAM contains network-side modems that are hard-wired to subscriber loops to implement
communications at up to 200 Mb/s over the last few hundred meters in brownfields, i.e. where
copper loops are already deployed.
116
OLT at the service provider.
Since point-to-point dedicated connections are the normal configuration in Ethernet, presum-
ably the only reason the word “active” is included in the product name is to differentiate it from
PON products.
One variation implemented for residential customers includes proprietary equipment housing
the OLTs in the CO plus dedicated fiber from the CO to each customer.
Another variation of active Optical Ethernet is the Metropolitan Area Network (MAN) of Section
8.7, Optical Ethernet connections between switches deployed in ring topologies.
A business could be a station on a MAN, meaning there is an Ethernet switch owned by the
carrier deployed at the customer premise, plus two fiber connections.
Being part of a MAN ring in this configuration means the customer would enjoy high availability
- while paying for two optical accesses.
A business could also have a single fiber access as a spoke connecting to a station on the
MAN that is located in a CO, POP, in a collocation, in an equipment room or in an outside plant
enclosure, as illustrated at the top right of Figure 73.
In this case, the business pays only one optical access charge but would have time to restora-
tion in the case of a cut line measured in hours and days instead of milliseconds.
117
9
DSL and Cable Modems: Last Mile on Cop-
per
9.1 Modems
Modems are used to represent binary digits, that is, 1s and 0s, on copper wires for the last
mile in brownfields, i.e. neighborhoods where (brown) copper is already installed. Last mile
means the access circuit, i.e. the connection from the customer premise to the network.
Historically, this was POTS on twisted pair between the customer premise and the CO as cov-
ered in Section 2.2, but is equally applicable to cable companies with coaxial copper wire infra-
structure.
This chapter begins with general principles of modems and modulation, then covers DSL
modems for twisted pair and cable modems for coaxial cable in detail.
9.1.1 Why Bother With Modems?
One question often asked is, “Why bother with modems? Why not transmit the information ‘dig-
itally’?”
In other words, “Why not use pulses of voltage like on LAN cables, for example, +3 volts ap-
plied to the line for a short time to represent a “1” and -3 volts to represent a zero?”
The answer is that modems are required to represent 1s and 0s on circuits that are restricted
to a range of frequencies that does not include 0 Hz. This is often called a pass-band, since
there is a range of frequencies that will be passed and everything else is suppressed.
For example, with POTS, the telephone company implements the service with twisted pair ter-
minated on a line card on a telephone switch.
The line card has a simple electrical circuit on it called a filter that blocks the transmission of
energy at any frequencies outside the voiceband, that is, any frequencies less than 300 Hz or
greater than 3300 Hz. In other words, the pass-band for POTS is 300 - 3300 Hz.
To represent 1s and 0s as pulses of voltage, which would look something like a square wave
on the line (Labeled “IN” on Figure 75), would require a component at 0 Hz to be able to repre-
sent the steady-state voltage that is the top of the pulse, and many components at frequencies
higher than 3300 Hz to represent the sharp transitions of voltage.
118
other, as illustrated with the line labeled “OUT” on Figure 75.
With line noise added, it is very difficult to reliably detect the pulses, and thereby communicate
1s and 0s using pulses on this kind of circuit.
The situation for higher-frequency channels such as those employed for DSL, cable modems
and all kinds of radio is the same.
119
Since noise (more or less) affects all frequencies equally, this technique, called Frequency
Shift Keying (FSK), is more robust in the presence of additive noise.
120
and nothing to indicate a “0”.
Since the frequency is constant, the design of the receiver is simpler, and there is less har-
monic noise. Since the amplitude is constant, the technique is less susceptible to added noise.
Overall, the error performance of PSK is about twice as good as FSK.
9.2.5 Define More Signals to Communicate More Bits
Voiceband modems that can establish a data rate of more than 2.4 kb/s exist. V.91 standard
modems can achieve 53 kb/s in the voiceband.
Can this be achieved with FSK and switching back and forth between the two frequencies
53,000 times per second?
No. The maximum signaling rate on a voiceband circuit is around 2,400 signals per second.
Any more often is trying to use more bandwidth than 300-3300 Hz, which is not passed by the
filters, and the received signal will be distorted to the point where the receiver can not reliably
detect it.
The maximum signaling rate is directly related to the width of the pass-band. Once the maxi-
mum signaling rate is achieved, the key to greater data rate is not faster signaling, but more
signals.
9.2.6 Quadrature PSK (QPSK)
If four phase shifts are defined, each of 90 degrees (1/4 of a period), this yields four possible
signals that might be conveyed to the receiver.
Since there are four signals, each can be used to represent 2 bits. Writing out the numbers be-
tween 0 and 3 in binary will demonstrate this, as illustrated in Figure 79.
By making a choice of one of the four signals in particular and transmitting that signal, two bits
are communicated with one signal.
Since there are four signals, this modulation scheme is called Quadrature Phase Shift Keying
(QPSK).
In the example of the voiceband channel, we could continue signaling at 2,400 signals per sec-
ond, but now with 2 bits conveyed by each signal, the data rate is 4,800 bits/second.
On a 4G cellular (LTE) system, the signaling rate is 15,000 symbols per second per subcarrier.
QPSK, one of the allowed modulation schemes for LTE, would yield 30 kb/s per subcarrier.
As can be seen on the lower left side of Figure 79, drawing pictures of signals with different
phases using Cartesian (x,y) coordinates becomes tedious and uninformative, particularly as
the number of signals increases.
121
Figure 79. Quadrature Phase Shift Keying (QPSK)
More often, polar coordinates are used to represent the signals. As illustrated on the lower
right of Figure 79, each signal is represented by an arrow, where the length of the arrow is the
amplitude and the rotational angle represents the phase shift.
The diagram is called a phasor diagram; the arrows are the phasors. This is the source of the
Star Trek expression “phasors on stun”.
9.2.7 Quadrature Amplitude Modulation (QAM)
Why stop at a repertoire of four signals? Why not define a million signals, using combinations
of amplitude, frequency and phase shifting, so each signal conveys log2(1 million) = 20 bits?
The answer is errors. The more signals defined, the higher the probability of making an error at
the receiver deciding which signal was transmitted, and so the effective error-free data rate de-
creases.
Quadrature Amplitude Modulation (QAM) is a technique that combines phase shifting and am-
plitude shifting to generate a repertoire of many signals that could be transmitted, to increase
the number of bits indicated by each signal.
QAM-16 uses combinations of phase and amplitude shifting to define 16 signals, evenly
spaced in a square as illustrated in Figure 80.
Since 16 = 24, each signal conveys 4 bits.
122
In the voiceband, QAM-16 at 2400 signals per second would yield a data rate of 9,600 bits per
second, a popular modem standard implemented in a fax machine.
QAM-16 and QAM-64 are modulation techniques specified in the 4G cellular LTE standard.
123
The solution for brownfields is the definition of a second, wide frequency band in which
modems can operate above the voiceband on the existing copper twisted pair. This is called
Digital Subscriber Line (DSL) technology, and allows broadband (high bit-rate) communica-
tions of 1s and 0s while still supporting POTS on the same line.
There are a number of DSL modulation techniques, each employing different bandwidths and
signaling schemes, with different requirements for loop characteristics and providing different
numbers of bits per second… and improving all the time.
Calling this “digital” is inaccurate. DSL does not use pulses, which is the definition of digital
transmission; instead DSL employs modulation in frequency channels above the voiceband…
a technique more associated with the terms “modem” and “analog” than digital.
Figure 81. DSL: Broadband modems operating in a wide frequency band above the voiceband on the existing
twisted pair loop.
“Broadband modems operating in a wide frequency band above the voiceband on the existing
twisted pair loop” would be more accurate... but of course, “Digital Subscriber Line” sounds
better.
9.3.2 ADSL, SDSL and XDSL
When the downstream capacity (towards the user) is larger than the upstream capacity, it is
called Asymmetric DSL (ADSL). Symmetric DSL (SDSL) has the same capacity in both direc-
tions. The term “XDSL” is used to generically refer to the idea of broadband modems on
twisted pair, regardless of the variety.
9.4 DSLAMs
This diagram illustrates the equipment used for DSL. At the customer premise, the DSL mo-
dem is connected to the twisted pair loop, which is connected to a Digital Subscriber Line Ac-
cess Multiplexer (DSLAM).
The DSLAM contains the DSL modem to which the DSL modem at the customer premise is
communicating, as well as multiplexing equipment and a fiber backhaul to the network core
and eventually to the Internet.
The DSLAM was originally located in the CO. To shorten the distance between the modems, to
be able to increase the bit rate achieved, the DSLAM is now typically deployed in an outside
plant enclosure as a type of remote fiber terminal. This is a type of Fiber to the Neighborhood
(FTTN).
9.4.1 DSL Modem Hard-Wired to Loop
DSL is markedly different than the old “dial-up” voiceband modem connections, where the dial-
up modem makes a phone call and a circuit-switched connection through the telephone switch
to a far-end modem, for the duration of the communication session.
124
Figure 82. Fiber to the Neighborhood and DSLAM.
DSL modems on existing twisted pair DSLAM to customer..
With DSL, the customer’s modem is communicating with a modem connected to the other end
of the customer’s loop.
There is no connection through telephone switches; the DSL modems are hardwired together.
This avoids the filters on the CO switch line card and allows the use of a wider frequency band
by the modems, and hence more bits per second.
DSL service is referred to as always on: the DSL modem at the residence is always connected
to the DSL modem in the DSLAM. The connection between the modems is not broken after
each communication session like with circuit-switched or dial-up modems in the voiceband.
9.4.2 Coexistence with POTS
The telephone puts energy on the line in the POTS voiceband, and the DSL modem puts en-
ergy on the line in bands at higher frequencies. Since these are separated in frequency, the
DSL modem does not interfere with telephone service the way a voiceband modem does.
Since the DSL band is much wider than the voiceband, it is possible to communicate more bits
per second: tens of Mb/s as a standard service offering today and improving all the time.
125
Figure 83. Fiber to the Neighborhood (FTTN)
126
Newer DSL modems implement VDSL2, standard G.992.3 from the ITU. This standard uses
up to 30 MHz of bandwidth on the subscriber loop and can achieve 100 Mb/s symmetric at 500
feet.
Bonding and vectoring increase the bit rate and/or maximum range.
Optical Ethernet and VLANs are used to aggregate the traffic on the fiber backhaul.
9.6.3 VDSL2 Frequency Bands and Profiles
The frequency band for DSL modems is broken into a number of smaller bands, some for up-
loading and some for downloading.
127
Figure 85. VDSL Profiles, Speeds and Ranges
128
Figure 86. CATV FTTN and Coax to the Premise
Today, Head Ends are connected to other Head Ends in other cities with a fiber backbone for
digital content distribution.
Coax supports a much broader bandwidth than twisted pair, so these systems can be called
broadband systems and the operating companies broadband carriers.
9.7.1 Hybrid Fiber-Coax Network
This is implemented with a combination of fiber to the neighborhood then coaxial copper cable
for the last mile, and so CATV systems are also called Hybrid Fiber-Coax (HFC) systems.
An HFC network consists of a Head End, fiber to the neighborhood terminated on Optical Net-
work Units, coaxial copper feeder cables running down streets, amplifiers, splitters, taps and
drop lines into customers’ homes where a converter and television are located – along with
computers and telephones.
9.7.2 Frequency Channels
In the previous millennium, Cable TV networks carried multiple analog video signals. The am-
plitude of the video signal is an analog of the intensity of the light at a point on the screen as it
is being scanned along lines left-to-right and top-to-bottom.
The American NTSC standard scans half the screen sixty times per second, resulting in a sig-
nal about 4 MHz in bandwidth.
The bandwidth on coax is at least 450 MHz and up to 3 GHz. Many carriers currently use up to
1 GHz.
To make this wide bandwidth usable, it was divided into smaller 6-MHz frequency bands called
channels by equipment in the Head End. This technique is called Frequency Division Multi-
plexing (FDM).
129
Figure 87. 6-MHz CATV channels
For standard-definition analog service, the Head End gathered video signals from satellites,
terrestrial antennas and local content sources and placed a video signal in each channel using
Vestigial Side Band Amplitude Modulation (VSB-AM). The video signal is combined with a sin-
gle pure sine wave at the frequency of the desired channel, called a carrier frequency, to shift
the video signal up to the channel frequency.
For those who like details: this actually creates two video signals at frequencies on either side
of the carrier. One of the copies and the carrier are suppressed, meaning one copy remains
(the vestigial copy) on one side of the carrier (the side band).
9.7.3 Fiber Serving Area
This entire group of signals, all channels together, is transmitted to the neighborhood using
analog techniques on fiber.
The fiber terminates on an Optical Network Unit, located in a cabinet on a pole or on some-
one’s front lawn, where the signals are transferred to copper coaxial feeder cables that run
down streets.
The coverage of the coax cables terminating on one ONU is called a Fiber Serving Area
(FSA), typically passing 200 – 500 homes.
Taps are installed on the feeder cables at regular intervals. A copper coaxial drop wire is in-
stalled from one of the connectors on the tap to the residence.
This has the effect of physically connecting all of the users together and to the ONU, in an ar-
chitecture similar to the original LAN bus topology. The electrical signal placed on the coax is
broadcast to everyone tapped onto the cable.
Since attenuation is more severe on coax than on twisted pair, and more severe at high fre-
quencies, amplifiers are used to boost the signal. Amplifiers are spaced typically every 660
feet, about one amplifier per block.
9.7.4 Television Converters
At a customer, the converter picks the desired frequency channel out of the entire lot, and
shifts the signal there back down to the “natural” frequency range 0 - 4 MHz so that it can be
displayed on the screen of the television. This “natural” range is called the baseband, or some-
times Channel 1.
In days past, a Video Cassette Recorder (VCR) was sometimes used as the converter device,
downshifting the desired channel to Channel 3 and the television’s tuner would downshift that
to Channel 1 and display it.
9.7.5 Modems on CATV Channels
Once a cable TV system is in place, there is no reason why it has to be used only for analog
video signals.
Modems may be attached to each end of the system, and one or more channels on the CATV
system used for communication of the modem signals.
These modems signal 1s and 0s that can be digitized video, Internet traffic and VoIP telephone
service.
“Digital” cable, for example, an HD channel, is video that has been digitized, turned into a
stream of 1s and 0s, which are transmitted from the Head End one-way to the set-top box us-
ing a modem.
130
9.7.6 Two-Way Communications Over Shared Access
For Internet access, VoIP telephone service or any other two-way communications over this in-
frastructure, modems are required for each direction.
The main obstacle is the fact that the access circuit is a multi-drop architecture: everyone on
the street is connected to and sharing the same cable… methods of rationally sharing the com-
mon communication channels are required.
One strategy would be to allocate two 6-MHz channels on the system for each user: one for a
modem for uploading and one for downloading, with corresponding modems at the Head End.
That would be a very inefficient way to allocate capacity… there are far fewer available chan-
nels than users in a fiber serving area, and 12 MHz of bandwidth is reserved for a subscriber
whether they are actually using it or not.
In practice, the users share channels. In many cases, bandwidth is allocated above the televi-
sion channels for downloading, and below the television channels for uploads from sub-
scribers. This is called a high-low split strategy and makes amplifier deployment easier.
In the downstream direction, a modem at the Head End broadcasts traffic intended for a cus-
tomer to everyone in their neighborhood. The traffic is encrypted by the Head End and de-
crypted in the device containing the customer’s cable modem. The Head End broadcasts
users’ data as needed as it arrives, or in a rotation if there are many active users.
Sharing a modem band in the upstream direction is more difficult. The users’ modems are all
tuned to transmit on the same channel, so they can’t all transmit a simple modem signal to the
Head End at the same time.
131
10
Wireless
10.1 Radio
When we say “wireless”, we generally mean the use of radio, which is electromagnetic waves
at frequencies measured in Gigahertz (GHz), that is, vibrating 109 or a billion times per second.
We could, in theory, be discussing electromagnetic energy vibrating on the order of 1014, hun-
dreds of trillion times per second (this is called light); but one of the problems in wireless com-
munications is obstacles.
It turns out that the higher the frequency, the longer distance it takes for energy to refract or
bend around an object.
Light does refract around objects – this is how we can tell there are planets around other suns
– but the length of the shadowed area behind the object is too long for use on a terrestrial
scale.
If we reduce the frequency of the energy, it refracts at a sharper angle and so the length of the
shadow behind an obstacle shortens.
In addition, lower-frequency energy can penetrate through objects like walls and clouds more
easily (there’s a reason why fog horns are very low frequency).
For these reasons, we tend to use energy at Gigahertz frequencies, two or three hundred thou-
sand times lower than light, and call it radio.
This chapter covers communications centered at Gigahertz frequencies, in frequency bands
with widths measured in Megahertz (MHz).
Radio is used in many different kinds of systems with different applications, including every-
thing from demagogues broadcasting angry rants on talk radio shows using analog AM, to mo-
bile cellular systems for telephone calls, messaging, youTube and anything else on the Inter-
net, trunked radio for police communications, fixed wireless to remote residences, short-range
wireless LANs, geosynchronous communication satellites, Low Earth Orbit satellites and more.
132
Figure 88. Lower frequencies result in shorter shadows
Video broadcast, two-way voice communications and point-to-point digital microwave commu-
nications were the biggest applications for radio in the past.
Mobile voice and Internet access is a big business in the present.
In the future, wireless will be ubiquitous.
To represent information, we could take a single pure frequency (called a carrier frequency)
and vary the amplitude (volume) of the carrier frequency in a continuous fashion as an analog
of the sound coming out of the speaker’s mouth.
Or we could vary the frequency of the carrier as an analog of the sound.
These are called Amplitude Modulation (AM) and Frequency Modulation (FM) respectively.
When we wish to represent 1s and 0s, we have a more complex task. Since radio bands do
not include zero Hertz, sometimes called DC, pulses can not be used to represent 1s and 0s
as on copper wires.
Instead, it is necessary to use techniques similar to those used in telephone line modems to
represent the 1s and 0s, such as shifting back and forth between specific amplitudes, frequen-
cies or phases, or combinations thereof.
133
The first kind of radio systems connected to the PSTN were called MPS: the Mobile Phone
System.
These employed radios in automobiles fitted with big whip antennas to communicate to base
stations in large metropolitan areas.
The caller had to call a “mobile operator” and ask for a particular “mobile number”, and would
(maybe) be patched through.
The geographical areas where service was available – the coverage – was very limited.
There was very little capacity – not many people could use the system at the same time.
And ironically, it did not support mobility: once the call was connected… if the person with the
mobile radio drove too far away from the base station, the call would be dropped.
10.2.2 Mobility
The definition of mobility is having the ability to start a communication session using a terminal
communicating with a particular antenna, then move away from the antenna and not lose com-
munications, but rather be handed off to another antenna.
10.2.3 Base Station, Cell, Airlink and Handset
The cellphone, called a mobile, terminal or handset, is connected to the network via an airlink
to a base station.
134
In the MTSO, routers direct Internet traffic to an ISP, or to a specific content provider. The
routers direct phone calls to a mobile switch.
135
When there is an incoming call, the mobile switch will page the handset from the base station it
last registered on.
If the handset does not answer the page, the network will resend the page from all base sta-
tions in the area or in some cases, all of the base stations on the network.
Once the handset answers the page and the user presses the “talk” or call button, voice com-
munications take place over the radio airlink to the base station, then over the backhaul to the
mobile switch.
For a mobile to mobile call, the communications will be routed to a base station. For mobile to
landline, the call will be routed to the PSTN.
10.2.7 Handoff
If a user moves during a call, at some point, the user will be handed off from one base station
to another.
This means that the network will switch to using a different base station to communicate to the
handset, and, depending on the technology employed, may involve changing the radio fre-
quency of the handset.
The handoff implements mobility – the ability to maintain communications while traveling.
136
Figure 91. Radio coverage in cells, each using a different group of frequencies.
Figure 91 illustrates a cell centered on Menlo Park, CA in Silicon Valley.
Then the operator would find another location six miles or ten kilometers away, and build a
second base station, using a second group of frequencies… for example, in Fremont across
the Bay.
This pattern could be continued to build seven base stations, using all seven groups within the
block of spectrum available.
At that point, the operator would have coverage in the geographical area illustrated, all the way
over to Cupertino CA where Apple is headquartered, and all of their spectrum would be used.
137
Figure 92. Frequency re-use. Using the same frequencies in two cells spaced miles apart.
138
Figure 93. Frequency re-use in cells to meet the coverage objective
139
cell.
40 users, 3 miles radius… about 1.5 users per square mile… doesn’t work so well in Silicon
Valley, Manhattan or just about anywhere else.
Sectorization, using antennas with shaped beams to create triangular-shaped cells (called sec-
tors to confuse people) can be employed to improve capacity; but not enough for the immense
popularity of mobile communications. We had to move on to better technologies.
Figure 94. 2G
The second generation of cellular technology employed lower power, smaller cells and imple-
mented digital communications.
It was in some cases referred to as Personal Communication Services (PCS), and in many
places, the Global System for Mobile communications (GSM).
The advantage of implementing digital communications is better sound quality, better signaling
and control capability, and mobile access to the Internet and other networks.
Second-generation cellular (2G) was initially deployed in North America on frequency bands
centered around 1.9 GHz, whereas AMPS was deployed on frequency bands centered around
800 MHz.
Handsets were dual-mode, meaning they could support both AMPS at 800 MHz and PCS at
1.9 GHz.
Several different technologies were deployed by different carriers for spectrum-sharing for the
second generation.
These included techniques called CDMA or Code Division Multiple Access and TDMA or Time
Division Multiple Access (TDMA) in North America.
In the rest of the world, a 2G TDMA scheme called GSM, the Global System for Mobile com-
munications was widely deployed.
The fundamentals of TDMA and CDMA are covered in an upcoming section.
140
10.4.2 Digital Cellular Radio
Putting aside for the moment the discussion of TDMA vs. CDMA, we’ll first understand how
digital cellular radio works.
The cellphone contains a microphone, which creates a voltage that is an analog of the strength
of the sound pressure waves at the microphone.
This analog signal is fed into a codec or vocoder inside the terminal that digitizes the analog
waveform.
Additional complex digital signal processing may performed.
The result is 1s and 0s representing the digitized speech.
Then a modem that operates at radio frequencies is used to represent those 1s and 0s using a
modulation technique such as Quadrature Amplitude Modulation within the radio band.
This modem waveform is broadcast into space by the antenna on the cell phone.
At the base station, an antenna detects the radio waves and feeds them into a modem in the
Base Station Transceiver that interprets it and produces 1s and 0s.
Complex signal processing is performed on those 1s and 0s to extract the original digitized
speech.
This digitized speech is then backhauled or transmitted back to the mobile network’s switch via
a Base Station Controller, where it can be routed to the PSTN for a mobile-to-wireline call, or
routed to another base station for a mobile-to-mobile call.
141
10.5 Mobile Internet and “Data” Plans
The great thing about digital cellular is that we can take advantage of its inherent capability to
move bits to communicate not just digitized speech, but 1s and 0s that are representing e-mail
messages, web pages, video, music or literally anything else.
In this section, we’ll understand how the system designed to carry digitized speech using
modems can be employed to carry anything coded into 1s and 0s.
142
The computer then sees the cellphone like an external modem, very much as if one had
plugged a landline modem into the computer.
10.5.1.2 Wireless Tethering with Bluetooth
One could also connect the computer to the cellphone with a short-range Bluetooth wireless
link, which is completely separate from the cellular radio.
10.5.1.3 WiFi Bridging
Another option is to activate the feature in a smartphone that turns the smartphone into a Wire-
less LAN (WiFi) access point.
The computer then connects to the smartphone’s WiFi access point just as it would connect to
any other WiFi access point at Starbucks or at home, and the smartphone internally bridges
the WiFi connection to its cellular Internet data connection.
10.5.2 Packet Relay to the Internet
Essentially, the microphone, speaker, screen and keyboard in the phone are ignored; the com-
puter connects via USB cable, Bluetooth or WiFi to the cellular modem in the cellphone and
uses that along with the radio, antenna and battery to communicate data from the computer to
the cellular network base station.
The cellphone has to tell the base station that this is a “data” call, so that the received 1s and
0s are not fed to the cell phone company’s voice switch for onward forwarding to the PSTN or
to another cell phone, but rather to a router for onward forwarding to the Internet.
The router relays packets to local content servers, servers on the Internet, or perhaps servers
reached over a managed IP/MPLS network for video connections or secure corporate connec-
tions.
10.5.3 Dongles
A very similar story can be implemented with what the marketing department might call a
“stick” – a modem, radio and antenna built into a small dongle that plugs into a USB port on
the computer.
The dongle implements the same capability as a cellphone, but without the speaker, micro-
phone, codec, battery, keyboard and screen.
10.5.4 Cellphone as the Terminal
Of course, all cellphones are also computers.
The keypad on the cellphone can be used as an input device and the screen on the cellphone
used as the display.
The keypad could be the regular telephone keypad, requiring the user to press the 2 button
three times to select the character “c”, for example.
The keypad could also be a qwerty-type keypad included with the phone like on a classic
Blackberry, or of course, implemented on a touch screen with an underlying graphic image of
keys as on smartphones.
10.5.5 “Data” Billing Plans
One must be very careful with billing plans when using a cellphone for Internet access.
There may be one set of rates for using the cellphone as a tethered modem and a different set
of rates for using a browser integrated in the cellphone.
If a user does not add a data plan to their account before using the phone to access the Inter-
net, they will be charged the “default” or “casual use” rate, which can be astronomically high. In
Cozumel Mexico, in 2016, a carrier was offering “data roaming” at $5 per MB.
That’s $5,000 per Gigabyte. $6000 to download an HD movie via torrent.
$125,000 to download the data on a single-layer Blu-ray DVD.
It is not unusual to hear of people watching youTube and Netflix on a smartphone while roam-
ing without a “data” plan, then getting a bill of $20,000 from their home carrier, who is collecting
the funds and paying the Mexican roaming partner.
143
10.5.6 Fluid Layout, Responsive Design & “Mobile” Pages
When using a small cellphone screen as the display, special measures may needed due to the
small number of pixels on the phone’s screen.
144
4G LTE claims data transfer measured in the hundreds of Mb/s, eliminating this area of con-
cern.
145
During a handoff, the end-to-end communications path will be interrupted or muted for a short
period of time while the base station and frequency channel change is made.
This interruption is heard as a “click” during a voice call; it causes modems to disconnect.
FDMA was the method used in first-generation “analog” systems, including AMPS, NMT, and
TACS used in various countries.
10.6.1.1 AMPS
In North America, AMPS was deployed in radio bands 25 MHz wide at 800 MHz (824-849 MHz
uplink, 869-895 MHz downlink).
The radio band is divided into 30 kHz channels, with groups of channels allocated to base sta-
tion transceivers front-ended with antennas mounted on towers, providing radio coverage in an
area around the tower: the cell.
The groups of channels are allocated so that they can be re-used geographically far enough
away so that they do not interfere.
Organizing the channels into 7 groups is referred to as N=7, and allows coverage of arbitrarily
large areas using a honeycomb pattern for the cells as illustrated in Figure 93.
The capacity of the system is limited by the number of channels in the group of frequencies,
and is relatively low… 1.5 users per square mile in the previous calculation.
It is possible to sectorize a cell to achieve higher capacity, that is, more users per square mile.
Sectorization means using directional antennas with 120 degree or 60 degree beamwidths, in-
stead of an omnidirectional antenna with a 360 degree beam.
Sectorization implements a number of pie-wedge-shaped cells emanating from a single tower.
Typical plans for AMPS were to use 7 groups with 3 sectors for “rural” areas and 4 groups with
6 sectors for “urban” areas.
However, the resulting capacity is still too low, and data communications was very difficult us-
ing dial-up modems over the analog radio system.
10.6.2 TDMA
One strategy used for spectrum sharing for 2G was Time-Division Multiple Access (TDMA),
where a radio channel is shared in time between a number of users, hence the term Time Divi-
sion.
Figure 99. TDMA is time-sharing of radio channels via fixed time slots. The North American version IS-136 is illus-
trated. GSM has 16 time slots on 200 kHz channels.
Users transmit and receive modem signals one after another in a strict order in time slots on a
radio channel.
146
TDMA is called digital radio, since the modems integrated in the handset and base station
transceiver end up moving 1s and 0s, which could be coded digitized speech, text messages,
web pages, control and signaling or anything else.
In North America, the IS-136 standard for TDMA was deployed.
10.6.2.2 GSM
In most of the world, a form of TDMA called the Global System for Mobile Communications
(GSM) was deployed for 2G.
In GSM, the channels are 200 kHz wide with 16 time slots, meaning seven users per 200 kHz:
7 time slots each way for voice or data and 1 each way for control.
This was widely deployed, and became the most popular spectrum-sharing technology.
10.6.2.3 IDEN
The Integrated Digital Enhanced Network (IDEN) from Motorola is an overlay on TDMA that al-
lows group walkie-talkie functions similar to trunked radio systems used on construction sites
and at sporting events.
10.6.2.4 Inefficiency of TDMA
TDMA provided an improvement in capacity, by having users time-share radio channels; but it
is not an efficient way to share.
Users are assigned specific time slots and these time slots are reserved for them, whether
they have anything to transmit or not.
This is inefficient for telephone calls, where one speaks only half the time, and highly inefficient
for data communications like web browsing, where one has nothing to communicate most of
the time.
10.6.3 CDMA
Another spectrum-sharing strategy deployed for 2G was Code-Division Multiple Access
(CDMA). CDMA is completely different than FDMA and TDMA.
In a CDMA system, the available spectrum is divided into relatively wide frequency bands
called carriers in the business. For 2G, these carriers were 1.25 MHz wide.
The carrier is not divided into radio channels, and the users do not time-share radio channels.
Instead, all users transmit at the same time, spreading energy across the width of the same
carrier, in the same geographic area.
Each user is assigned a code, which is a binary number typically 64 bits long. If the user wants
to transmit a “0”, they send their code. If they want to transmit a “1”, they send the mathemati-
cal complement of their code.
The codes are arranged so that when codes from multiple cellphones are received at the base
station at the same time, the base station can determine which cellphones transmitted and
which didn’t.
This is analogous to being at a cocktail party where everyone is speaking at the same time in
the same space, but each pair of people are speaking unique languages - and you only under-
stand your partner’s language.
You can understand this by trying to match sounds you hear to your vocabulary. Only your
partner’s words make sense; everything else sounds like noise to you.
147
Figure 100. CDMA implements “spread spectrum” by transmitting a 64-bit code to represent 0s and its comple-
ment to represent 1s, causing the energy to be spread over a wider band. At the receiver, transmissions from mul-
tiple handsets are added together. The receiver detects which codes have been transmitted by complex signal
processing.
148
In an OFDM system, hundreds or thousands of subcarriers are defined within the main carrier.
A subcarrier is a single frequency that will be modulated, spreading energy in a small band
around the subcarrier.
So far, this is the same as FDMA and its channels.
OFDM diverges from FDMA in two significant ways:
First, the subcarriers are not modulated continuously like “analog” FM radio; instead a modem
signal representing 1s and 0s is at each subcarrier frequency in the handset and at the base
station.
Second, users are assigned more than one subcarrier, allowing communication of high bit
rates by transmitting multiple streams in parallel.
Figure 101. OFDM subcarriers. In the most sophisticated implementations, a modem with 64 signals is run on
each subcarrier. In 4G LTE, multiple subcarriers are assigned dynamically to terminals for massive parallel down-
loads.
Essentially, this is taking the idea of a modem and its modulation and implementing it hundreds
or thousands of times in narrower frequency bands within the larger frequency band, then as-
signing multiple “modems” to each user to employ in parallel.
Other aspects of OFDM – which are of interest mainly to mathematicians and engineers with
graduate degrees in Digital Signal Processing – include the fact that the combined output
waveform from all of the subcarrier modems is calculated in a single mathematical step called
an Inverse Discrete Fourier Transform, and that the waveform is transmitted at the same rate
as the subcarrier spacing.
OFDM is also used for 802.11 wireless LANs and DSL.
We examine its use in 4G cellular, called LTE, in Section 10.8.
149
• The tragic-comic attempts to deploy UMTS without reliance on Qualcomm or on the United
States government’s GPS,
• The data-optimized variations of the two, 1XEV-DO and HSPA respectively, and
• The capitulation of the 1X camp to the UMTS camp’s plan for 4G, and how that led to the
widespread deployment of HSPA.
10.7.1 IMT-2000
To try to avoid a repeat of the 2G CDMA vs. TDMA dichotomy, in 2000, a standards committee
attempted to define a world standard for 3G called IMT-2000.
They failed.
The result was a “standard” describing five incompatible implementation variations. Like many
other technologies, we ended up with one solution for “North America” and a different solution
for “Europe”.
To support higher bit rates over the airlink, more frequency bandwidth is required.
Out of the five variations in IMT-2000, the two serious ones both specified CDMA as the
method for spectrum-sharing – but disagreed on the width of the radio bands and how many
bands there should be.
10.7.2 1X or CDMA2000: IMT-MC
Service providers using CDMA for 2G, primarily North American and certain Asian countries,
favored a strategy that was basically a software upgrade from 2G, employing existing 1.25
MHz radio carriers and allowing multiple carriers.
This is called IMT-MC or multi-carrier CDMA.
Qualcomm’s brand name for this was CDMA2000.
The service provider could purchase licenses for as many bands as desired, and the bands
could be variable sizes to meet different countries’ radio licensing plans, providing a flexible
and scalable capacity.
150
United States government’s Global Positioning System respectively.
European operators, with their UMTS, did not favor the notion of paying an American company
royalties, and did not favor building a network dependent on the American government’s GPS.
Since UMTS required mathematical calculations across a 5 MHz band, compared to 1X’s 1.25
MHz band, at the time, the processor in the phone required to perform such calculations drew
so much current from the battery that the battery heated up to the point that people burned
their hands on the phones during trials.
The GSM/UMTS Europeans embarked on a seven-year-long odyssey attempting to circum-
vent Qualcomm patents, and avoid using GPS.
After a number of strategies failed, a Euro-GPS called Galileo was created for UMTS; the first
satellite was launched December 28 2005.
This delayed deployment of UMTS until 2007.
1X was deployed and working years earlier.
The tipping point between 2G and 3G in the GSM/UMTS camp was reached in the summer of
2007, when more new activations on these carriers’ networks were 3G CDMA (UMTS) instead
of 2G TDMA (GSM).
The 2G TDMA technology GSM still had far more users, but like 1G analog, GSM will eventu-
ally disappear.
10.7.4 Data-Optimized Carriers: HSPA and EV-DO
For Internet access and watching video on cellphones, variations of the coding schemes opti-
mizing for the statistical characteristics of “data” were developed and deployed by both camps.
In both cases, these were deployed on carriers (the 1.25 or 5 MHz bands) apart from those
used for telephone calls.
Accessing these data carriers required either a “stick”, the USB dongle described in an earlier
section, or dual radios in a phone, one tuned to the traditional carrier for telephone calls and a
second tuned to the data-optimized carrier for watching video.
The 1X camp developed a variation called 1X Evolution Data-Optimized (1XEV-DO), allocating
a carrier for data communications and promising 2.4 Mb/s over the airlink in the first incarna-
tion.
Proposals for future revisions of EV-DO promised to support more than 70 Mb/s over the air-
link.
In the UMTS camp, the variation was called High Speed Packet Access (HSPA), referring to
improvements in the UMTS downlink, often called High Speed Downlink Packet Access (HS-
DPA) and in the uplink, High Speed Uplink Packet Access (HSUPA) and also Enhanced Dedi-
cated Channel (E-DCH).
Revisions of HSDPA promised download rates of 14.4 Mb/s then 42 Mb/s.
10.7.5 The End of the Standards War
Market forces finally pushed the two camps together.
The fact that there were far more 2G GSM users on the planet meant that for one thing, hand-
set manufacturers produced 2G GSM phones before 2G CDMA phones.
GSM phones were less expensive and had better features.
This trend was continuing into 3G, where UMTS phones would have the same advantage over
1X phones.
Another fact was that Steve Jobs of Apple only permitted carriers operating TDMA systems to
have the iPhone, then only permitted carriers with HSPA systems to have the iPhone 3G.
Finally, the 1X camp threw in the towel and decided to go with the UMTS camp’s proposal for
the fourth generation to level the playing field.
As soon as that decision was made, then the deployment of 1XEV-DO was more or less
capped, and 1X carriers began deploying HSPA instead.
And the fact is, as soon as carriers that were in the 1X camp, like Verizon in the US and Bell
and TELUS in Canada deployed HSPA, Steve Jobs allowed the iPhone on their networks.
151
As the iPhone was at the time the most popular phone, this was a major incentive for the 1X
camp.
It appears that one of the legacies of Steve Jobs will not just be the iPhone, but a key part in
ending the spectrum-sharing standards war.
152
Figure 103. OFDM
In the simplest implementation, illustrated in Figure 103, the incoming bits are used to turn
subcarriers on or off, splitting the incoming bit stream at a rate of 1 bit per subcarrier and im-
plementing binary Amplitude Shift Keying, with one of the amplitudes zero.
In the most complex implementation, the incoming bit stream would be allocated at a rate of 6
bits per subcarrier, used to implement QAM-64 on each of the subcarriers.
The outputs of the subcarrier modulations are all added together to produce a transmittable
waveform.
To allow multiple users at the same time, Orthogonal Frequency-Division Multiple Access
(OFDMA) is implemented… essentially adaptively assigning specific subcarriers to particular
users.
The beautiful part of OFDM (at least to Engineers) is that the modulation of each subcarrier
and adding them all together is calculated in a single step with a digital signal processing oper-
ation called an Inverse Discrete Fourier Transform. At the receiver, a Discrete Fourier Trans-
form performs the reverse process to yield the original bit stream.
This calculation is performed, and a waveform transmitted at the same frequency as the spac-
ing of the subcarriers, which has the result of making the harmonics of all of the subcarriers
cancel each other out at the receiver, hence the term orthogonal.
In the LTE standard, the subcarriers are spaced 15 kHz apart, and the output is calculated
15,000 times per second.
Prior to modulation, Forward Error Correction is implemented, adding redundancy to the bit
stream so correct decisions can be made based on maximum likelihood in the presence of im-
pairments like noise and fading.
The bit stream is also shuffled or interleaved, re-arranging the order of the bits in time so that
burst errors are no longer sequential errors.
In the uplink, LTE uses a pre-coded version of OFDM called Single Carrier Frequency Division
Multiple Access (SC-FDMA) to avoid needing power amplifiers, which would increase handset
cost and shorten battery life.
10.8.3 3GPP Standards Committees
153
The 3GPP Technical Report 25.913 contains the detailed requirements specification for LTE.
The system architecture, in Technical Specifications 36.300 and 36.401, is simplified to two
principal network elements: evolved Network Base stations (eNBs) and Evolved Packet Cores
(EPCs). eNBs communicate with EPCs, with each other and with user equipment.
The ITU defined as 4G supporting at least 1 Gb/s downloading. LTE does not meet that crite-
ria, and so in a strict standards committee environment, LTE would be called a 3G technology.
An updated version, 3GPP release 10, called LTE-Advanced, is expected to be submitted to
the IMT-Advanced standards committee, which would cause those standards committee mem-
bers to declare LTE-Advanced to be a 4G standard.
Everyone else will refer to LTE as 4G from the start.
10.8.4 Qualcomm Patents
One of the reasons for the 3G standards war was the requirement to pay American company
Qualcomm royalties on patents for several techniques necessary for a mobile CDMA system.
LTE is not CDMA, so those royalties are avoided… but it turns out that Qualcomm filed or has
purchased many patents that underpin LTE.
Additionally, since LTE phones will have to be backwards-compatible with 3G CDMA networks,
Qualcomm sees “no impact” on patent royalty revenue for the first ten years of LTE develop-
ment according to COO Sanjay Jha.
154
Figure 104. WiFi
155
simultaneous transmission using 1 to 4 antennas, allowing very high data rates.
In theory, 802.11n will implement 300 Mb/s with a single antenna… but that would be on the
moon, where there are no atoms between the transmitter and receiver and no interference.
802.11ac purports to achieve 500 Mb/s.
As soon as there is anything between the transmitter and receiver – like water molecules, plas-
ter, concrete and so forth, and/or interference, the power-to-noise ratio and thus bit rate drops.
10.9.4 VoIP over Wireless LANs
Most of the time, 802.11 wireless LANs are used to access the Internet for email, web,
youTube and the like, and cellular is used for phone calls.
Phone calls over a device using a “free” wireless LAN connection instead of a paid cellular
connection will be a growth area.
As soon as a smartphone supports WiFi, and uses an app like Google Hangouts, which pro-
vides free phone calls to the PSTN, there is no need to pay for cellular airtime on the smart-
phone to make a phone call whenever the phone is connected to WiFi.
10.9.5 Wireless Security
A major concern with wireless LANs is security.
Network security that can be enacted is Media Access Control (MAC) address filtering: setting
the base station to only accept connections from specific, predefined wireless LAN cards.
This protects the network connection from access by unauthorized users – but does not pro-
tect legitimate users’ transmissions from eavesdropping.
If someone can get physically close enough to receive signals, there is no way to prevent them
from eavesdropping on communications, which can include intercepting and re-using user-
names and passwords and intercepting and “wikileaking” sensitive information.
This is particularly troublesome in coffee shops, airports and anywhere else the communica-
tions are not encrypted, an “open” hotspot.
In 2010, a plugin for the Firefox browser was made available that allowed someone sitting in
such a coffee shop to eavesdrop on everyone else’s communications – and with one click, to
re-use other people’s credentials to log in to servers.
This means that secure encryption of communications over the airlink is now mandatory, not
optional.
If it can be ensured that the users always, without fail, implement client-server encryption
(sometimes called Transport Layer Security… though anyone who has taken the OSI Layers
course will know it is Presentation Layer security), by using VPN software for connecting to
work, typing https:// for all web surfing, and using encrypted email communications, then there
is no need for encryption of the airlink.
However, users can not be relied upon, so encryption of the communications on the airlink be-
tween the access point and terminal must be implemented whenever possible.
Wired Equivalent Privacy (WEP) was the first encryption algorithm for wireless LANs; but its
use is not recommended as there are software tools available that can crack it in a matter of
minutes.
WiFi Protected Access (WPA) or the 802.11i WPA2 should be implemented on the airlink
whenever possible.
156
Instead of base station transceiver, the term transmitter/responder or transponder is used in
the satellite business.
In two-way systems, radio signals are transmitted from the earth to the transponder, which re-
sponds with radio signals directed back down to the surface at a different frequency to avoid
interfering with the surface transmitter.
There are two basic choices for the orbits of communication satellites: geosynchronous orbit or
low earth orbit.
10.10.2 Geosynchronous Orbit
Geosynchronous satellites are parked 22,300 miles (35,680 km) above the surface of the earth
above the equator.
At that radius, the orbital speed is the same as the rotational speed of the earth, and hence the
satellite appears to stay in the same spot in the sky.
This is geosynchronous or geostationary... depending on your point of view.
Geosynchronous communication satellites are operated by the International Telecommunica-
tions Satellite Organization (Intelsat), the International Marine Satellite Organization (In-
marsat), numerous private companies, government and military.
157
under one second delay.
If the two locations can not see the same satellite, then an intermediate ground station must be
used, meaning a path delay of about two seconds.
This wreaks havoc with the protocol people use to decide who gets to talk next during a phone
call, and the extended delay causes users to hear echoes that are normally suppressed.
No one likes using use geosynchronous satellites for phone calls; trans-oceanic fiber optic ca-
bles are preferred because they are much shorter, meaning that the path delay is negligible;
about 25 milliseconds from New York to Paris on fiber, for example.
One-way communications is the natural application for geosynchronous satellites.
Television is the biggest market.
Radio-frequency modems communicate video that has been digitized, coded using MPEG-2 or
H.264 (MPEG-4 Part 10) and encrypted, from a Digital Broadcast Center of a satellite TV com-
pany up to the transponder, which repeats the modem signal back to the earth.
Access to the Internet is also implemented on geosynchronous satellites for those who do not
have DSL, Cable or WiMax terrestrial links available.
The “upload” path from the customer to the Internet is often over modems over a regular
phone line, and the download path is via satellite.
This makes the customer premise electronics cheaper and cuts the delay in half.
Two-way satellite communications is also available.
Another service based on geosynchronous satellites is Very Small Aperture Terminal (VSAT),
which means “small dishes” in plain English.
Applications for this two-way wide-area data communication service include emergency
backup communications capabilities and nationwide VPN services.
10.10.3 Low Earth Orbit
The path delay problem of geosynchronous platforms can be fixed by bringing the satellite
closer in.
These types of communication satellites are called Low Earth Orbit (LEO).
These can be used for voice communications because the path delay is reduced to an accept-
able level.
158
This introduces two different problems: the satellites do not stay in the same position in the sky
to an earthbound observer, and the coverage or footprint of the satellite is reduced.
Multiple satellites to ensure coverage and a switching system for doing handoffs from one
satellite to another as they move are required.
The handoff problem is similar to that of cellular, where the base stations are stationary and
the users move around, except that with LEO satellites, the users are mostly stationary and the
base stations move around.
Motorola’s Iridium project was one example of this. Iridium planned to launch 77 satellites (Irid-
ium is element number 77 in the periodic table of the elements), but went live after deploying
only 66 satellites.
Gaps in coverage, poor in-building penetration and difficult data communication over the ana-
log radio system led to poor user response and Iridium was a financial failure.
Motorola announced that they would “de-orbit” the satellites at a loss of five billion dollars. At
the last minute, an “entrepreneur” purchased Iridium for 25 million dollars. It cost five billion
1998 dollars to build.
Other LEO companies include Orbcomm and Globalstar. Orbcomm was a joint venture be-
tween Teleglobe and Orbital Sciences Corporation, intended to provide two-way data commu-
nications and the capability to track trucks on highways and tanks on battlefields.
Globalstar is a consortium of telecommunications companies operating a constellation of 48
low-earth-orbit (LEO) satellites.
Globalstar phones incorporated both the satellite radio and a cellphone, and could operate on
local cellular and/or satellite.
Globalstar sold high-capacity inter-city links wholesale to regional and local telecom service
providers around the world.
All three LEO systems have experienced severe financial difficulties.
159
11
“Data” Communications
Since the Holy Grail of convergence has been achieved by treating voice and video like data,
we begin understanding the new-generation telecom network with a chapter on what used to
be called data communications, historically a different topic than voice or video communica-
tions.
160
11.1.3 Convergence via IP
The third attempt, carrying everything in IP packets plus a traffic management technology
called MPLS in the network core, has proved to be the charm, and the Holy Grail of integration
of all services on a single network appears to have achieved.
With IP and MPLS, we are treating voice and video like data, carrying everything in data pack-
ets and providing bandwidth to users on demand.
161
tion will be communicated; and the Data Circuit-terminating Equipment (DCE), the devices
placed at each end of the physical medium.
To communicate information, it must be coded into binary digits (1s and 0s), which are repre-
sented on the physical medium. The data circuit could be a guided system such as wires or
optical fiber, or non-guided like radio.
The DTE is the source of the 1s and 0s. The DCE represents them on the physical medium.
There are specific types of DCE for each physical medium.
162
11.5 Data Circuits
A circuit is made of a physical medium on which the information coded into binary digits is to
be represented. There are many different types of circuits, and many different media available.
The binary digits are usually communicated over the media using bursts of energy: electrons,
photons, electro-magnetic radiation. Guided transmission systems are those that use a guide
for the energy, like a wire or a glass fiber. Non-guided systems are those that transmit through
the air, such as wireless LANs.
11.5.1 Analog Data Circuits
Data circuits are often categorized as analog or digital. The word analog comes from the
method by which voice is represented on an ordinary telephone line: a voltage is used to rep-
resent, or be an analog of, the voice. The voltage is an analog signal, and the circuit is popu-
larly (and inaccurately) called an analog circuit.
Data can be communicated on these “analog” circuits using modems as the circuit-terminating
equipment. The modems essentially produce a waveform to represent 1s and 0s that is like an
analog signal, which can be carried over a circuit designed to move analog signals.
11.5.2 2-Wire and 4-Wire Circuits
In days past, dial-up circuits – regular two-wire phone lines – were used for data communica-
tion. Expensive dedicated point-to-point two-wire circuits could also be employed. Conditioning
could be applied to these dedicated lines, improving their transmission characteristics and thus
the number of bits per second communicated.
It is also possible to order dedicated point-to-point two-wire circuits from the phone company
that are not telephone lines, they are bare copper wires, not restricted to the voiceband as cov-
ered in Section 2.4.3. These are called unloaded or dry circuits.
Two of those circuits, one for each direction, were used for expensive point-to-point 4-wire data
circuits in the previous millenium.
11.5.3 Broadband Analog
Cable TV systems and radio employ wider or broader frequency bands than pairs of copper
wires, and so are sometimes referred to a broadband circuits. Just as with telephone lines,
modems are used to represent 1s and 0s on cable TV and radio channels.
11.5.4 Analog on Fiber
Hybrid Fiber-Coax cable TV systems, covered in Section 9.7, employ fiber for distributing sig-
nals to neighborhoods. On these fibers, techniques involving varying the intensity of the light
on the fiber continuously as an analog of modem signals or analog television pictures are often
used. This is “analog” on fiber.
11.5.5 Digital
“Digital” communications involves the use of circuits that were not designed to carry analogs of
signals, but instead were designed from the beginning to communicate 1s and 0s using pulses
of energy.
On twisted-pair copper wire digital circuits, like LAN cables, a “pulse” is raising the line voltage
to some fixed value like 3 volts for a fixed period of time, then returning it to zero. A graph of
voltage vs. time would look like a square wave.
On fiber systems like Optical Ethernet, a “pulse” is turning a laser on for a fixed period of time,
then turning it off. The laser produces a pulse of light. A graph of light intensity vs. time would
look like a square wave.
In both cases, on a “digital” circuit, the signaling is binary: either a pulse is happening, or not.
163
Just as we categorize the way we represent information on circuits into “analog” and “digital”,
so we classify circuit-terminating equipment as analog or digital.
164
then tell the other box to look at the circuits because the data is valid. This is called parallel be-
cause the wires are literally in parallel in a cable.
The other choice would be to connect up one single circuit, and represent the bits one after an-
other in a sequence in time on the single circuit. This is called serial, though a mathematician
would prefer to call it sequential.
Inside a computer, data is grouped into bytes, which are grouped into files. To communicate
these groups of bits over a serial line, a function traditionally called a serial port is required to
represent the bits one after another in a sequence in time on the single circuit. Another serial
port function is required at the far end to look at the line at the appropriate times to receive the
bits.
165
Figure 112. Multidrop Circuit
Examples of multidrop circuits include Wireless LANs (WiFi), Cable TV distribution and IBM
mainframes.
One implementation is an unbalanced mode, where there is a primary station, or controller,
which controls the link, communicating to secondary stations or controlees. The secondary sta-
tions are computers, and in turn have Human-Machine Interface (HMI) devices attached. Ex-
amples of HMI devices are television displays, telephones, PCs and dumb terminals.
Other implementations are balanced configurations, where there are no controllers and con-
trolees: all stations are equal.
WiFi is a balanced configuration, where the stations alternate: first the primary station (the Ac-
cess Point) transmits and all of the stations hear its transmission, then there is a quiet period,
then a secondary station can transmit and all of the stations hear its transmission.
On Cable TV systems, for downstream communications (to the residence), your information is
broadcast to everyone in your neighborhood, with an address indicating for whom it is in-
tended. For upstream, the secondary stations (residences) can either contend for the right to
transmit, or transmission time slots or subcarriers can be reserved for specific users. This is
covered in more detail in Section 9.7.
The unbalanced architecture was used in large IBM mainframe computer installations. The
Front End Processor or Communications Controller is the primary station, and Remote Termi-
nal Controllers are the secondary stations. These type of circuits and the data that they carry
are called legacy systems and legacy traffic... meaning that they are leftovers from previous
eras.
A strategy for controlling which station can communicate on the shared link is required. Polling
techniques were implemented for mainframes. The primary polls the secondaries and gives
them permission to transmit by selecting them.
These systems have a problem with scalability… the number of secondary stations cannot be
arbitrarily extended due to the control overhead. For in-building wiring, we tend not to use this
architecture much anymore.
166
Originally, LANs were multidrop data circuits: each computer was physically connected to a
common central bus cable.
A LAN adapter or Network Interface Card (NIC) was plugged into the motherboard of a com-
puter to implement the physical connector. Today the LAN function is usually integrated in a
computer – wired or wireless – and so the term LAN interface is used instead of NIC.
LANs changed to multipoint circuits, where each device had its own wires connected to a cen-
tral hub, which evolved into a switch.
LAN switches come in all different sizes… four ports, eight ports, sixteen ports, 192 ports.
Eight is a popular size. If one took eight PCs with LAN interfaces and wired each to a switch,
this would form a LAN.
Any PC in this group then has the possibility of communicating information to any or all other
PCs in the group. For this reason, the group of eight PCs in this example is said to form a
broadcast domain.
Several control functions are required to deal with the fact that the PCs are connected in this
way: it is necessary to transmit an address (called the Media Access Control or MAC address)
along with data to indicate for whom it is intended, as all stations in the broadcast domain
might receive the data; and an access control mechanism is required to determine which sta-
tion can transmit, as only one station can transmit at a time.
A LAN switch is a wiring hub with a processor in it. The processor examines the destination
address and directs the transmission to the correct station. Note that this is not like a tele-
phone switch, which makes a connection for the entire communication session. Here, the
transmission is “switched” to the correct destination one block of data at a time.
The original brand name for the LAN technology used today was Ethernet. This term is now
used to refer to technology that follows the 802 series of standards that are almost but not
quite exactly the same as Ethernet.
Ethernet subsequently migrated from in-building connections to the telecommunications net-
work core and access circuits. Extremely high horsepower LAN switches in different locations
connected with point-to-point fiber called Optical Ethernet is now the basis for the converged
network core and access circuits.
Please refer to Section 8.5 for Optical Ethernet and Chapter 15 for complete discussion of
LANs.
167
Figure 114. Wide Area Network
Router would be a good name for a device that can make route decisions.
The router needs information to use to make the routing decisions. The most popular strategy
is to assign network addresses to all of the computers. When one wishes to send a block of
data to another computer, one puts the destination’s network address on the front of the block,
forming a packet, which is sent to the router. The router uses the destination network address
as the basis of making a route decision.
There are a few choices for addressing, routing and end-to-end error checking protocols. The
TCP/IP suite of protocols, which includes the Transmission Control Protocol (TCP) and the In-
ternet Protocol (IP) are by far the most popular.
There are many choices for the telecommunications services used to connect the sites.
The most popular, flexible and cost-effective services for connecting the buildings are band-
width on demand services, in particular IP packet-based services managed with MPLS.
In days past, Frame Relay and ATM were used for this purpose, as well as dedicated lines like
dark fiber and old-fashioned T1s, and circuit-switched services like ISDN and dial-up modems.
Most of the rest of this book is devoted to exploring and explaining all of the different compo-
nents illustrated in Figure 114.
1 This was the original definition of the word “bit”, a measure of information content in a signal. This original
meaning has been lost in the mists of time, and “bit” is now used to mean binary digit: 1 or 0.
168
12
Coding, Frames and Packets
In this chapter, we explore essential functions required to communicate information on circuits.
As in the previous chapter, many of these concepts were associated with what used to be
called “data communications”, and are now used for everything: voice and video, as well as
business data services and Internet traffic.
To get started, we begin in this chapter with coding, error control, framing and addressing. This
leads to the critical concepts of frames, packets and how packets and frames and their ad-
dresses are related.
The next chapter, “The OSI Layers and Protocol Stacks” completes the story with the full list of
functions required to communicate.
169
Figure 115. Bits and Bytes
12.1.3 Bytes
Bits are organized into groups of eight, called bytes. Historically, bytes have had various sizes:
6, 7, 8, 12 bits. Today, eight bits per byte is more or less standard.
Half a byte is called a nibble. (Really).
To refer to individual bits within a byte, they are given numbers: bit 1, bit 2, ..., bit 8. Often, due
to serial transmission, there is ambiguity as to which bit is bit 1 and which is bit 8… which end
is which.
To avoid this problem, the terms Least Significant Bit (LSB) and Most Significant Bit (MSB) are
used. The LSB is the one which has the least numeric value, the bit that changes the most of-
ten when counting.
12.1.4 Error Control
All communications is subject to errors during transmission. Normally, methods for error control
are implemented to deal with this. Error control consists of error detection and error correction.
Error detection methods include parity checking and the more reliable Cyclic Redundancy
Check, both of which involve adding redundancy (extra bits) to the transmitted data so the re-
ceiver can determine if an error happened. Error correction is implemented by retransmitting
errored data.
Forward Error Correction (FEC) means that a great deal of redundancy is added to the trans-
mitted data so that the receiver (the forward end) can determine if an error occurred, and cor-
rect the error without a retransmission.
12.1.5 Framing
Whether pressing buttons on a keyboard or downloading a web page, data happens in bursts;
there are times when there is data to be transmitted and times when there is not data to be
transmitted.
To indicate to the receiver the start and end of a group of data, markers or delimiters are
placed before and after the data. This is called framing.
12.1.6 Addressing
A single circuit may have more than one terminal connected. In the example of the multi-drop
circuit and wireless LAN from the previous chapter, many devices were physically connected,
and all devices received all transmissions.
In this case, an address is required to indicate for whom on the circuit the data is intended –
which station should react to the data, since all of them will hear it. This is called the link ad-
dress, and in the IEEE LAN standards, called the Media Access Control or MAC address.
A network is composed of many independent circuits. Routers connect these circuits together
and perform a relay function, moving data from one circuit to another.
To provide a means of determining to which circuit to relay the data, to eventually get it to the
correct circuit, devices are assigned a network address. The most popular standard method of
assigning network addresses is IP.
The link address, along with framing and error detection is contained in a frame. The network
address is contained in a packet.
Understanding how these are related, and how the link address changes as the data moves
from one circuit to the next in a network is a critical part of this chapter, and a critical part in un-
derstanding any kind of communications.
170
12.2 Coding Quantities: Number Systems
The purpose of this section is to cover the fundamentals of binary numbers, and explain hexa-
decimal, used to represent LAN interface MAC addresses and IPv6 addresses.
To explain binary and hexadecimal, we begin with decimal.
All of these are number systems, which are the coding step to represent quantities. Humans
currently use the decimal number system; computers and communication systems use the bi-
nary number system.
12.2.1 Decimal
Decimal is a number system based on tens… presumably because most people have ten fin-
gers. There are ten symbols in the decimal number system: 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9.
Quantities are represented as powers of ten.
When expressing quantities in the decimal number system, we use a shorthand notation to in-
dicate how many of which powers of ten are needed to make up the quantity.
For example, when we write the number “1967”, what we mean is
1 x 103 + 9 x 102 + 6 x 101 + 7 x 100. This could also be written as
(1 x 1000) + (9 x 100) + (6 x 10) + (7 x 1).
The digits 1, 9, 6, and 7 indicate, for the appropriate power of 10, how many of that power of
ten go into making up the quantity 1967.
In other words, the numbers 1, 9, 6 and 7 are placeholders in the shorthand notation, indicat-
ing how many of the powers of ten in that place go in to making up the quantity.
12.2.2 Binary
Communication systems and computers use binary numbers to represent control information
and data, because computers only have two fingers: on and off.
Computers are built using transistors, and the way that a transistor is used in a digital com-
puter is like a switch: open or closed. All of the processing part of your computer is built out of
tiny switches. All of the live memory, the RAM, is built out of tiny switches.
To represent the state of the RAM, i.e. what number is in there, it is most efficient to use a
numbering system with two states… binary.
The binary number system is the same as the decimal number system, except it is based on
two instead of ten. You could even call it base 2 arithmetic if you wanted to. There are two
symbols in the binary number system: 0 and 1. Quantities are represented as powers of two.
When expressing quantities in the binary number system, we use a shorthand notation to indi-
cate how many of which powers of two are needed to make up the quantity.
For example, when we write the number “11001001”, what we mean is
1 x 27 + 1 x 26 + 0 x 25 + 0 x 24 + 1 x 23 + 0 x 22 + 0 x 21 + 1 x 20.
This could also be written as
(1 x 128) + (1 x 64) + (0 x 32) + (0 x 16) + (1 x 8) + (0 x 4)+ (0 x 2) + (1 x 1).
171
Figure 117. Binary Numbering System Example
The binary digits 1, 1, 0, 0, 1, 0, 0 and 1 indicate, for the appropriate power of 2, how many of
that power of two are in the quantity.
In other words, the numbers 1, 1, 0, 0, 1, 0, 0 and 1 are placeholders in the shorthand notation,
indicating how many of the powers of two in that place go in to making up the quantity.
Compare this to decimal numbers, and it becomes apparent that the concept of binary and
decimal are the same – only the base is different. Decimal is based on ten and binary is based
on two.
12.2.3 Hexadecimal
The hexadecimal number system is the same as the decimal and binary number systems, ex-
cept it is based on sixteen instead of ten or two. Hexadecimal could even be called base-16
arithmetic.
There are sixteen symbols in the hexadecimal number system:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
Note that the letters A, B, C, D, E and F are used as symbols to represent the quantities 10,
11, 12, 13, 14 and 15 respectively, since symbols can have only one character.
Quantities are represented in hexadecimal as powers of sixteen. Just as in decimal and bi-
nary, when expressing quantities in hexadecimal, we use a shorthand notation. This indicates
how many of which powers of sixteen are needed to make up the quantity.
For example, when we write the number “7C9H”, what we mean is
7 x 162 + 12 x 161 + 9 x 160.
This could also be written as
(7 x 256) + (12 x 16) + (9 x 1).
172
Figure 118. Hexadecimal Numbering System Example
The hexadecimal symbols 7, C and 9 indicate, for the appropriate power of 16, how many of
that power of sixteen are in the quantity.
In other words, the numbers 7, C and 9 are placeholders in the shorthand notation, indicating
how many of the powers of sixteen in that place go in to making up the quantity.
Compare this to decimal numbers, and it will become clear that the concept of binary, decimal
and hexadecimal are all the same – only the base is different. Hexadecimal is based on six-
teen; decimal is based on ten and binary is based on two.
12.2.4 Common Use for Hexadecimal
Why would we bother with a numbering system based on 16s? Not many people have sixteen
fingers…
Hexadecimal (or hex for short) is perhaps most often used in practice as a short form for bi-
nary numbers.
173
To represent any pattern four bits long requires 24 = 16 symbols. Therefore, a byte can be rep-
resented with two of these symbols, instead of eight bits. Since 161 = 24, conversion from bi-
nary to hex is simple: the binary number is segmented into groups of four bits, and each set of
four bits is converted individually to their hex equivalent.
Consider the binary representation of 1993D: 011111001001.
For readability, instead of commas we use semicolons: 0111:1100:1001.
The hexadecimal equivalent of this number is 7C9H.
The hex version uses only 1/4 the symbols, and so is easier to write and to pronounce.
174
Figure 120. ASCII Code Set
IBM used an 8-bit code set called the Extended Binary Coded Decimal Interchange Code
(EBCDIC) code set on mainframes. With respect to this chart, an EBCDIC chart would be up-
side down, backwards, twice as big and none of the characters would be the same. Other than
that, EBCDIC is exactly the same thing as ASCII - it is a standard way of coding keystrokes
into bytes.
Various ad-hoc extended ASCII code sets were defined, particularly in Microsoft’s Disk Operat-
ing System (DOS), adding an extra bit, doubling the size of the table. The characters in the ex-
tended ASCII table are Greek letters, box drawing characters, és and so forth. However, there
were dozens of variations to choose from, so ¬ sometimes came out as î, if for example a
computer and printer did not agree on what extended ASCII variation is in use.
The International Organization for Standardization (ISO) and their friends at the International
Electrotechnical Commission (IEC) eventually published a standard code set ISO/IEC 8859-1
(Part 1 of ISO/IEC 8859), an 8-bit code set for the Latin alphabet. The original definition of this
code set did not include the control codes, and was not used in practice, but did form the basis
for two 8-bit code sets that are now in wide use: ISO-8859-1 and Windows-1252.
ISO-8859-1, defined in RFC1345, is a superset of the original ISO/IEC 8859-1 to include con-
trol codes and is at present widely used for plain text web pages and email. It is the default en-
coding for MIME type “text”.
Windows-1252 is almost the same, but substitutes a number of printable special characters
like left double quotes where ISO-8859-1 has control codes. These special characters are ren-
175
dered as a question mark or hollow box when displayed on a web page by a browser, since
they are undefined characters in ISO-8859-1, which the browser uses by default.
12.3.2 Unicode
Unicode and its Unicode Transformation Format (UTF) may end up becoming universal stan-
dard codes for character sets.
Unicode defines a codespace of 1,114,112 codes in the range 0 to 10FFFFH and methods of
representing them, called transformation formats. The most popular is UTF-8, which allows
one to four bytes to represent a character.
It is normal to reference a Unicode code by writing “U+” followed by its value in hex. Often,
double-byte or four hex characters are used, for example U+005A for Z and U+548C for 和.
In HTML, characters may be expressed as &# followed by the decimal value of the code and a
semicolon. For example, Z would be rendered as Z. Or, characters may be expressed as
&#x followed by the hex value of the code and a semicolon, for example, Z.
The characters allowed in URLs (web addresses) may be represented as % followed by the
hex value of the code (for example, %5A).
176
Figure 121. Start/Stop/Parity Format
Since the circuit is never disconnected, it is always communicating one or the other. One of
these levels must be chosen as the idle condition, i.e. the condition that is presented to the re-
ceiver when nothing is happening.
Understanding this, deciding what a “start bit” should be is simple. It is NOT the state chosen
to be the idle condition. This idle to not-idle transition warns the receiver that a byte is coming.
A stop bit is the idle condition to guarantee an idle to not-idle transition when the next start bit
happens.
12.4.3 Parity Checking
To perform error detection at the receiver, a single extra bit called the parity bit is appended to
the 7-bit ASCII code and sent over the communication circuit. Just one bit is used, to imple-
ment a simple technique while minimizing the overhead in extra bits.
This is one reason why ASCII was designed as a 7-bit code: 7 bits of data and one bit of error
detection to make up an 8-bit byte.
There are two parity rules: even parity and odd parity. The transmitter and receiver must de-
cide in advance and agree upon which rule they will use, then stay with that rule.
Under the even parity rule, the extra bit is set at the transmitter so that the total of all of the bits
including the parity bit is even. The receiver checks to see if the total is even. If not, it knows
an error happened in transmission, and can flag a parity error. If the total is even then there
were no errors.
The odd parity rule works in the same manner.
Unfortunately, this even/odd scheme does not work if there are two bits in error, or four, or
six… and errors happen in bursts.
The probability that if there is one bit in error, that the bit beside it is also in error is between 20
and 50% depending on the physical medium being used. For this reason, parity checking is al-
most useless.
Many systems ended up using no parity, and instead of using one bit for parity, use it for data.
This is often represented as a code “8N1” that has to be typed into a setup screen on software.
Using what was the parity bit for data instead extends the ASCII code to 8 bits as discussed in
Section 12.3.1.
177
Formatting and packaging data one character at a time is not efficient. Percentage-wise, the
overhead for framing and error control is very high.
It is more efficient to code characters, quantities or analogs into bytes, then group many bytes
into a block and transmit the block as a package.
178
The data field or information field or payload follows the control field. This field contains the
block of data that is being communicated.
The data field can be any length. In practice, it is a fixed length on a particular circuit or particu-
lar virtual circuit. The length is determined by hardware capability, circuit noise level and how
the data is formatted on cabling systems passing data to this one. Common implementations
have data field sizes ranging from 48 bytes to 8,192 bytes. LANs tend to use frames about
1500 bytes long.
12.5.6 CRC: Cyclic Redundancy Checking
An error detection scheme called Cyclic Redundancy Checking (CRC) is implemented using a
Frame Check Sequence (FCS) appended to the block. The receiver uses this extra information
to determine if any errors have occurred anywhere in the frame during transmission. With the
right choice of FCS, this method is very reliable.
179
• Any odd number of errors,
• Any burst error (n-1) bits long or less, and
• Most larger burst errors.
180
The most popular standard protocol for formatting packets with network addresses is the Inter-
net Protocol (IP).
12.8 IP Packets
The Internet Protocol (IP) is part of the TCP/IP suite of protocols developed by the US military,
now used on the Internet and carrier networks. IP is a network protocol, defining the network
packet format and network addressing scheme.
181
IP was originally published as military standard MIL-STD-1777, then updated in Request for
Comments RFC 0791 Internet Protocol. IP version 4 (IPv4) is currently in use. IP version 6
(IPv6) is coming next.
182
In fact, in an IP network, there are no guarantees that a packet will be transmitted, when that
might happen, and how often that might happen.
There is no error check on the payload, only on the data in the header.
12.8.3 Relationship to TCP
Since there is no guarantee an IP packet will be received, and no error checking of the payload
being carried in the packet, a higher-level protocol is required to perform end-to-end error
checking.
The most popular higher-level protocol for end-to-end error checking is the Transmission Con-
trol Protocol (TCP). The abbreviation TCP/IP is sometimes used, but should be avoided, as it
inaccurately suggests that it is necessary to use TCP and IP together, or that TCP is part of the
network.
IP is the packet and address format for the network. TCP is a protocol for communicating be-
tween the sender and receiver to ensure error-free delivery of messages. TCP is used for file
transfers including web pages and email, retransmitting message segments that are lost or er-
rored.
The User Datagram Protocol (UDP) is an alternative to TCP. It implements error detection, but
does not retransmit lost or errored message segments. UDP is used for streaming applications
like voice and video.
183
13
The OSI Layers and Protocol Stacks
13.1 Protocols and Standards
We use the term protocol in the data communications business the same way it is used in the
diplomacy business: it is a plan for how two different systems will interact.
In diplomacy, protocol officers get together in advance and hammer out the plan: it says who is
going to greet whom at the bottom of the steps of the aircraft, what color the carpet is going to
be, what music the band will be playing, are you allowed to be sitting down while the president
of the United States is in the room… the plan on how two countries will interact.
To communicate, it is necessary to have a set of conventions that specifies how the systems
are going to communicate. This is the definition of a protocol. Mutual adherence to an agreed
protocol or set of protocols makes communication possible.
13.1.1 Functions To Be Performed
Quite a number of areas and functions must be covered in a communication protocol.
Taking e-mail as an example, first, it is necessary to agree what the format of the message will
be.
How will the message be coded into 1s and 0s? Will it then be encrypted? There had better
have an agreed plan for that, or not much communications will be happening.
Most communications today is client-server… and e-mail is an easy example. When checking
Outlook-type email, it is necessary to log on to the mail server with a username and password
and be authenticated… so part of the protocol has to be how to transmit usernames and pass-
words to the server.
One could imagine the mind-numbing complexities created if it is desired that the password not
be transmitted as clear text, but encrypted as a measure against eavesdropping… how to
transmit the decryption key for the password without encrypting it?
Once authenticated, then it is necessary to transport the message from the server to the client,
and there are a number of things that have to be figured out.
Segmentation and reassembly are usually required, breaking up the message into manage-
able pieces for transmission and putting it back together at the receiver… in the correct order.
The segment of the message has to be encapsulated in control information. An example of
control information for a segment of data is a network address.
Once a packet with a network address is created and transmitted to a router, how are routers
going to make routing decisions based on those network addresses? And how is the route de-
cision-making kept up to date as new links are added, others are removed or become busy?
Probably the most important aspect is error control: sending data with errors and not knowing
about it is probably worse than not sending any data at all. Sometimes error control is per-
formed on each link. Sometimes not. It ends up being necessary to check errors end-to-end
between the sender and recipient.
How is flow control implemented: when one system can’t process information as fast as the
other, and has to have a way of temporarily interrupting the flow of data.
How is access control implemented – when there is more than one station on the link, which
gets to transmit next?
At the bit level there are things that have to be specified: what physical medium to use, and
how to represent the bits on the physical medium. How will conversions between different me-
dia and different bit rates be implemented? All this and more has to be part of the plan.
184
Figure 127. A protocol is a plan
185
A key point is that this is a model for discussing protocols and standards. It does not specify
how to actually perform a function, but instead describes what functions must be performed,
and organizes these functions into manageable groups or layers.
13.2.1 Layers
A layer is a subset of the totality of functions that must be implemented to interwork diverse
systems. Protocols are established for each layer.
The physical connection between the systems is specified by one layer, and implemented in
hardware and signaling using electricity, radio waves or light to communicate 1s and 0s be-
tween the systems.
All of other functions, all of the other layers, are implemented in software. A particular software
package may implement one or more layers.
13.2.2 Separability of the Layers
The choice of functions included in each layer was made so that the layers were separable:
the functions performed by one layer are independent of the functions performed by another
layer.
This allows systems to choose a protocol for a particular layer without having to take into con-
sideration the choices made for other layers. For example, the choice of email message format
is independent of the choice made for network packet format.
Dividing functions into separate layers is also useful for understanding the different functions
that must be performed and how they are implemented, being able to discuss separate issues
separately and not get things confused.
186
layers, arranged in a hierarchy. Each layer has a name and a number. The numbering starts at
the bottom:
1: Physical Layer The physical layer provides a raw bit stream service. It moves 1s and 0s
between the systems. This is all it does, but it has to do this completely. The physical layer in-
cludes the mechanical, electrical, functional and procedural specifications for moving binary
digits over a physical medium.
2: Data Link Layer The data link layer manages communications on a single circuit, a single
link. There may be several stations connected to the circuit as is the case with a wireless LAN,
or there may be just two stations on the link, as is the case with a LAN patch cable. The data
link layer performs access control, flow control and error detection on the link, transmitting
frames on the physical medium. This allows communications of blocks of data from one device
to another that are on the same circuit.
3: Network Layer The definition of a network is multiple data links connected by network
equipment. Instead of broadcasting data to all stations on all of the links, data is relayed from
one link to the next to eventually be delivered to the correct link to which the desired station is
attached. A router moves packets from one link to another, essentially a forwarding function.
Knowing which link to forward the data on is the routing part of the story. All of these functions
are the network layer.
The first three layers working together form a communication network, giving the user the abil-
ity to send data to a destination on a different circuit.
4. Transport Layer The transport layer implements two major functions. One is reliability. The
other is network connection sharing.
Some network protocols, IP for example, do not provide guaranteed delivery of packets. The
transport layer communicates between the source and destination across the network to verify
that each segment of a message is successfully received, and in the case of file transfers, re-
transmits lost segments.
The second function performed by the transport layer is to identify the software application the
data is intended for at the far end. There may be many apps running on the far-end computer.
The port number in the transport layer header indicates which app the segment of data is for.
This allows multiple applications to use the same network connection, for example, an email
program and a browser can both receive packets over a single shared network connection.
The port number indicates whether an incoming packet is for the email application or the
browser application.
These four layers working together provide a transport service, moving data reliably from an
application on one system to an app on another system. This is also called a socket in the IP /
UNIX worlds .
187
Figure 129. The OSI 7-Layer Model
The remaining three layers are called the upper layers:
5. Session Layer The session layer manages sessions between applications, including initia-
tion, maintenance and termination of information transfer sessions. Usually this is visible to the
user by having to log on with a password in the case of client-server sessions.
6. Presentation Layer The presentation layer is very important: this is the coding step, repre-
senting the message to be communicated in 1s and 0s. ASCII is an example of a presentation
layer protocol. Compression and encryption also fit into the presentation layer – they are meth-
ods of coding messages into 1s and 0s, as are codecs for voice and video digitization.
7. Application Layer Sitting on top of all of this is the application layer. The application layer
defines the format of the messages that will be exchanged, and usually implements a Human-
Machine Interface.
Using the application layer is a person.
The person interacts with the system via the Human-Machine Interface implemented by the
application layer, that lets the person create a message.
In turn, the application layer would ask the presentation layer to code it, and then that would
ask the session layer to open a session with the far-end piece of software, and in turn ask the
transport layer to move it reliably to a particular application on the far-end system.
The transport layer would ask the network layer to move it to the far-end computer, perhaps on
a best-efforts basis, then the network layer will move a packet to the next hop, the next router,
by putting the packet in a frame and transmitting the frame one bit at a time on a physical con-
nection like a LAN cable or wireless frequency.
At the far end, the network-layer packet is received in a link-layer frame over a physical-layer
connection. The content of the packet is extracted and passed to the transport layer, which
would perform error recovery if necessary then pass it to the correct computer program.
That computer program would pass the data to its presentation layer to decode it, then to the
top layer, the application layer to display it as a message to a human.
188
13.4 Physical Layer: 802.3, DSL, DOCSIS
Layer 1, the physical layer, provides a raw bit stream service to higher layers.
The physical layer includes the mechanical, electrical, functional and procedural specifications
for moving binary digits over a physical medium.
The mechanical specification includes which type of physical medium will be used. This could
include copper wires - shielded cables, twisted pair, or coaxial cable; it could include space (ra-
dio), or optical fiber. The connectors or antennas are also specified.
The electrical specification dictates how binary digits will be represented on the physical
medium - the modulation technique or digital line code.
The functional specification indicates how many individual wires or circuits will be used to
make up a single communication channel, and the function of each circuit.
The procedural specification specifies the relationship between the circuits: are some for data,
some for control; is there a circuit that has to operate first, one second and so forth.
There are many different physical layer protocols.
Any kind of modem implements a physical layer protocol by specifying the physical medium
and how bits are represented on it. This includes DSL modems that operate over twisted pairs
of copper wires, DOCSIS cable modems operating in channels on a Hybrid Fiber-Coax sys-
tem, all kinds of “digital” wireless systems where modems communicate 1s and 0s over radio
channels, and of course, old-fashioned dial-up modems.
LANs include a physical layer protocol – the LAN interfaces that provide the familiar LAN jack
implement signaling using pulses of voltage on twisted pairs in Category 5, 5e and 6 cables
following the 803.2 standard.
Figure 130. A Physical Layer protocol specifies the physical medium and how bits are to be represented on it.
Optical Ethernet employs optical transceivers to signal using pulses of light on fiber to commu-
nicate bits between devices.
The older SONET includes a physical layer protocol, specifying how the laser is turned on and
off to signal anywhere from 500 Mb/s to 10 Gb/s.
Repeaters, amplifiers, pulse shapers, DWDM frequency spacing and anything related are part
of a physical layer protocol.
ISDN Basic Rate Interface (BRI) - digital telephone lines - include a physical layer, specifying
pulses on the loop.
The old T1 technology implemented a physical layer protocol, moving 1.5 Mb/s over four cop-
per wires using the AMI line code, CSUs and DSUs.
The old serial port standard RS-232 is a physical layer protocol.
The list goes on and on.
189
The data link protocol encapsulates segments of data to be transferred into frames: adds a link
address and control information in a header, a frame check sequence in a trailer, and framing
around the whole lot.
190
13.6 Network Layer: IP and MPLS
The data link layer handles communications between devices on the same physical circuit.
What if there is not a single physical circuit, but 86 of them, and it is not desired that data be
broadcast to all stations on all 86 circuits, but rather routed or switched and delivered to a par-
ticular destination? This is the definition of a network, and Layer 3 of the OSI model.
A network is made up of many network devices like switches or routers connected with high-
speed data links. Access circuits are provided to the network equipment to allow users to send
data into the network. The network equipment moves data from one circuit to another, es-
sentially a relay function.
Networks always have two points of view: from the user’s point of view, how does the user in-
dicate to the network where the data is to be delivered? This information usually takes the form
of a network address.
From the network’s point of view, if it receives data to be sent to a particular network address,
how does it actually decide which route to take to reach that destination address?
13.6.1 Packet-Switched Networks
The most widely-deployed type of network used to be a circuit-switched network, the traditional
Public Switched Telephone Network (PSTN). To place a call, the caller tells the network the ad-
dress of the person to whom they wish to connect - their telephone number - then a route is
chosen and then trunk circuits are switched in and reserved to form an end-to-end path for the
duration of the call.
Figure 132. Networks are made of high-capacity links connected by routers or switches. Access circuits connect
the users to the network.
This is now replaced with a packet-switched network, where trunks are not reserved for the du-
ration of a communication session, but rather voice, video, Internet traffic or anything else is
segmented and placed in packets that are transmitted into the network on an as-needed basis,
and relayed from one router to the next, interspersed with many other users’ packets until it is
delivered to the far end. This is also called bandwidth on demand.
Every destination on the network is assigned a network address. To transmit data to a destina-
tion, the address of the desired destination is placed in the header at the beginning of the
packet, and each router uses the destination address to determine the next hop.
The router implements the routing by taking the packet from an incoming circuit (or more pre-
cisely, the incoming broadcast domain), and transmitting it out on a different circuit. Routers
perform essentially a relay function. Knowing which circuit to move the packet to is the routing
part of the story. This whole process is called packet switching.
191
The most popular protocol for assigning network addresses and formatting packets is IP, the
Internet Protocol, developed by the Department of Defense and is now maintained by the Inter-
net Engineering Task Force (IETF). It is, of course, the protocol for network addresses and
packet format on the Internet, and also used for networks not directly connected to the Inter-
net… and has become the only standard for packets worth learning about.
13.6.2 Routing Table Updates
The devices that perform the routing of packets must have a way of making route decisions. In
general, they use routing tables and look up the routing for each packet based on the destina-
tion address.
The routing tables are kept updated using protocols like Open Shortest Path First (OSPF) and
Border Gateway Protocol (BGP). There are other proprietary protocols also available for this
purpose.
13.6.3 MPLS
It should be noted that IP networks generally have Multiprotocol Label Switching (MPLS) im-
plemented to allow the management of traffic and transmission characteristics. MPLS is an im-
plementation of virtual circuits, where a path for packets is pre-determined and programmed
into the routers by equipment at a Network Operations Center. In this case, MPLS replaces
OSPF and IP addresses for routing.
MPLS is covered in detail in Chapter 16.
Figure 133. The Transport Layer implements error checking end-to-end between the sender and receiver
The most popular transport protocol is the Transmission Control Protocol (TCP), which pro-
vides sequence numbers, error checking and retransmission of data that is received with er-
rors or not received at all.
192
The TCP software at the sender puts a sequence number and error check on the segment,
and the TCP software at the receiver normally returns a message to the sender acknowledging
successful receipt. If the sender’s TCP software does not receive this acknowledgment, it au-
tomatically retransmits the segment. The result is 100% error-free communication.
This is for file transfers, including email messages and web pages.
For live, streaming communications, like Voice over IP and video over IP, there is no time to
perform retransmission of bad data, so a different transport protocol, the User Datagram Proto-
col (UDP) is used instead.
UDP implements error checking, but not retransmission. Instead the receiver might interpolate
the missing data – fill in the gaps – using prior and subsequent data values to guess what the
missing one was.
13.7.2 Port Numbers
Another important function of the transport layer is to identify the application that is sending the
message and the application it is intended for on the far end.
Figure 134. The port number identifies the sending and receiving app
There is usually more than one application using an Internet connection on a computer or a
phone; for example, email and browser both running.
When a packet arrives at the computer, how does the computer know whether this packet is
for the email application or for the browser?
Every application is given a number called a port number. The first two bytes of the Layer 4
header are a field where the port number of the source application is populated, and the port
number of the destination application is populated in the next two bytes of the header.
This information at the beginning of the layer 4 header is used by the far end computer to de-
termine where to direct the data – which application this data is for – on the far-end computer.
The near- and far-end computers are called terminals, endpoints or hosts.
The IP address of the host concatenated with the port number of the application is called a
socket in UNIX and IP. It is called the transport service in the OSI model.
This allows segments of messages to be moved reliably from a particular application on one
host to a particular application on a different host.
193
Establishing a session is often implemented by “logging on” to a remote system with a user-
name and password. An agreement on how the password chosen by the user is transmitted to
the far-end computer during account creation.
One can imagine the complexity when it is desired that the password be encrypted before
transmission, so that it can not be intercepted and re-used... how to transmit the decryption
key for the password without encrypting it?
13.8.2 Authentication Servers
Another area of development in session establishment is authentication servers.
Without an authentication server, there are two basic choices for remembering user names
and passwords on servers:
1) Use different usernames and passwords for every server you access. The question is, how
does one remember all these user names and passwords? Perhaps recording them in a file
called “user names and passwords.doc” in your My Documents folder? That does not sound
very secure!
2) Use the same username and password on every server. This exposes you to a serious se-
curity risk: that your username and password will be stolen from one of those servers by an in-
truder or a technician, then re-used to log in to your accounts on other servers.
An authentication service, like Google Accounts or Log in with Facebook, allows you to only
have one username and password, which allows you to access many services. You log in the
authentication server and it provides credentials to the server you are logging in to, without re-
vealing the username and password to the third party.
If a particular service, like the control panel for your web-based email wants extra protection, it
will ask you to log in again – but the username and password you type in are not validated on
the email server, they are passed to the authentication server for verification.
This way, you don’t have to store a user name and password on every server. Just one.
Google, Facebook and many other companies implement forms of authentication services.
13.8.3 Cookies
After you log on to a server, it would be nice if it remembered what you were doing last time
you logged on… restore your previous session. A method for session restoration used on the
Web is cookies.
When your browser uses HTTP to request a file from a web server, the web server replies with
the file – but first an instruction to your browser to store a cookie for the server’s domain using
the Set Cookie instruction.
The cookie is one or more name-value pairs and the server’s domain name in plain text, saved
in a small file in a folder on your hard drive.
These name-value pairs could be your username and password for the server, to be used to
log you on transparently later on. In this case, the cookie might be userid=yaright; pass-
word=fuggedaboudit; domain=forgetit.com.
Every subsequent time you request a file from that domain, your browser automatically sup-
plies the name-value pair as part of the HTTP file transfer request.
The example above has the problem of storing your password in a plain text file on your com-
puter, and giving it out to pretty much anything that asks for it.
Additionally, since the session information is stored on the client, the designer of the system
would have to account for obvious issues for users with more than one client computer.
To avoid these problems, Google sets a cookie that is one name-value pair, an encrypted code
that identifies the user, and the cookie information for their applications is stored on their
servers.
A problem is privacy. One well-known Internet web page banner advertising company was
caught defining their cookie in such a way that every client computer returned ALL of its cook-
ies to them.
They were accused of using this trick to – unethically – gather data for data-mining to deter-
mine where you had surfed.
They were literally stealing cookies from children (!).
194
13.8.4 Client-Server Sessions
An example of a standard session layer protocol is the Post Office Protocol (POP), an agree-
ment on how your computer logs on to a mail server to check for new e-mail messages then
downloads them.
Figure 135. Client-Server sessions are usually established by the client logging on to the server with a username
and password.
When setting up a POP-type email account, such as in Outlook, it’s necessary to start the
client software, then configure your user name and password and the name of the POP server.
Then, when you click “send and receive”, your POP client attempts to log on to that POP
server using that user name and password.
If it is successful the server indicates how many messages there are and then it uses the file
transfer protocol to download the email messages –which are data files – one at a time, from
the server to the client.
If the transfer is interrupted in the middle of a message, the next time the POP client runs, the
transfer resumes from the beginning of the message – so POP implements session state and
session restoration as well.
One could argue that the Hypertext Transfer Protocol (HTTP) is a session-layer protocol; this
is the protocol used to initiate a download from a web server by a browser.
The session only lasts for the transfer of all of the files referenced in one web page, and there
is no authentication – but an example of a session establishment nonetheless.
13.8.5 Peer-Peer Sessions
In standards-based VoIP systems, the Session Initiation Protocol (SIP) is used to establish
VoIP phone calls.
Figure 136. SIP uses proxy servers for peer-to-peer or “client-client” VoIP phone call session setup
In this case, the result will be a session between two telephones, where the two telephones
are peers, meaning they are equals. Instead of a client-server session, a VoIP phone call is a
client-client or peer-to-peer session.
To set up a phone call, it is necessary to communicate the IP address and communication port
numbers used by a phone to the other phone. The two phones subsequently transmit IP pack-
ets from one phone to the other.
195
SIP includes proxy servers that act as intermediaries between the caller and called party so
that the caller only finds out the called party’s IP address if the called party wants to take the
call.
196
Popular methods include the Advanced Encryption Standard (AES) using the Rijndael (“rhine-
doll”) algorithm.
13.9.6 Asymmetric Encryption: Public Key Encryption and Digital Signa-
tures
The other type of encryption is called asymmetric key encryption. What this means is that there
is a key pair; and what key A encrypts, key B can decrypt… and what key B encrypts, key A
can decrypt.
This is used in two different ways: for secure communications, called public key encryption,
and for authentication, called a digital signature.
For secure communications, a key pair is generated. One of the keys is made public, available
on a public key server, and the other key is kept private.
To communicate securely, the sender creates a message then uses the receiver’s public key to
encrypt it and transmits the encrypted message. The receiver uses the private key to decrypt
the message.
This avoids the problem inherent with symmetric or private key encryption for communications,
which requires transmitting the key, exposing it to potential eavesdropping. With public key en-
cryption, the decryption key is never transmitted.
197
Higher and lower layers know nothing of the encryption process. Higher layers have simply se-
lected a secure communications option, and know nothing of the details of how this is accom-
plished.
They pass messages to the presentation layer, which performs the encryption on the transmit-
ting side, then decryption on the receiving side before passing the message up to the applica-
tion layer at the receiver.
Lower layers know nothing of the encryption process – they are just tasked with moving 1s and
0s just like any other data.
13.9.8 Example of Peer Protocol
Encryption is also a very good illustration of the idea of peer protocols: having the same plan
on both systems at each layer.
If the sender uses one protocol for encryption and the receiver is using a different protocol,
there is not going to be any communication ...
198
Figure 138. SMTP Header and HMI
RFC 5322 defines the structure and content of the header. It tells you the format of a header
line is field-name:field-body. It tells you what the header field-names are. It tells you what the
allowed field-body values are. It tells you how to format the time, and the allowed values. It
tells you how to format an address.
It doesn’t tell you what message to write in the body.
13.10.2 More Application Layer Examples
English is an application layer protocol: its syntax rules define the format of messages and its
vocabulary is the allowed content of messages.
HTML is also an application layer protocol: it specifies the structure, syntax and vocabulary of
messages colloquially referred to as web pages.
File transfers could be considered as being in the application layer, though some might argue
that file transfers and file systems are actually all three of the upper layers... but it’s not a very
interesting argument. The File Transfer Protocol (FTP) is an example of this type of protocol.
Remote operations: remote monitoring and control of devices from a central station are a class
of application protocols, and represent a growing market segment, especially in the WAN man-
agement arena. An example is the Simple Network Management Protocol (SNMP).
This is also a messaging protocol, allowing the transfer of status inquiry and response mes-
sages and alarm messages between network elements like routers and a central monitoring
station running software like HP Openview.
199
tions is called a protocol stack.
The same protocol is required at each layer. This is called a peer protocol.
The peers communicate, even if their communications are encapsulated inside other protocols’
data units to be carried to the other system.
Figure 139 provides a visual summary of the material discussed in the previous pages, and is
used to illustrate how information travels down through the protocol stack on the left, through
the network equipment in the center, and back up the protocol stack on the right.
13.11.1 Example: Web Surfing
The protocol stack when surfing the web is: application-layer messages formatted following
HTML, coded into 1s and 0s using ASCII at the presentation layer, retrieved from a server us-
ing HTTP at the session layer, communicated reliably between server and browser using TCP
at the transport layer, in network layer IP packets, in link layer MAC frames, on a LAN cable for
the last three feet.
13.11.2 Voice over IP
The protocol stack for a VoIP telephone call is: application-layer messages formatted using
English, coded by the presentation layer into 1s and 0s using the G.711 codec, a session set
up between the telephones using SIP, communicated using best efforts using UDP at the
transport layer, in network layer IP packets, in link layer MAC frames, on a LAN cables for the
last three feet.
200
Figure 140. Each layer’s output, called a Protocol Data Unit (PDU), is encapsulated inside the next layer’s PDU,
like Russian Matryoshka dolls.
201
The session layer might put some audit information on the front, like which client it came from
and any session authentication information that’s necessary, then give it to the transport layer.
The transport layer is responsible for identifying the source and destination applications, and
for end-to-end error checking, so it will take what it gets from the session layer, and put the
source port number and destination port number, a sequence number and error check on it,
and give this transport layer protocol data unit to the network layer to transmit to the far-end
host.
The network layer will take the incoming transport layer PDU and put that into a network layer
PDU – called a packet – with the network address of the final destination on the front of the
packet.
The packet goes into the data link layer PDU – called a frame – with the MAC address of the
destination on this particular circuit on the front of the frame, for transmission via a physical
port.
The frame is then transmitted one bit at a time over the physical layer: one bit at a time over
the LAN cable, over an airlink, over a fiber.
The physical layer on the next system receives the bits and passes them up to the data link
layer protocol software, which performs an error check on the frame, looks at the MAC address
on the frame, and compares it to the MAC address hard-coded into its LAN interface, and if
they are a match, indicating this is the desired receiver, it extracts the payload from the frame
(which is a packet) and passes it up to the network layer.
The network layer software will look at the address on the packet and use that as the basis of
making a route decision. If it is going to route the packet somewhere, the way it implements
the route decision is to take the packet and put it back in a frame and change the destination
MAC address, (because now it’s going to a different destination on a different broadcast do-
main), recalculate the frame check sequence and then transmit it out on a different circuit or
different broadcast domain.
Eventually the packet will arrive at the far-end network layer software, which will see that the
destination IP address on the packet is the same as its own IP address, so that will extract the
data from the packet and give it to the transport layer on the far-end computer.
The transport layer will check the error check that its peer (on the originating computer) put on
the information, and if it fails the error check, discards the received segment.
If it passes, then the transport layer extracts the payload from the transport protocol data unit,
and passes this to the correct software application on the far-end computer indicated by the
destination port number in the layer 4 header.
The received codes are passed to the presentation layer on the far end, which will decode
what it receives and pass the result to the application layer, which will recreate the original
message and display it to the person at the far end via a Human-Machine Interface.
13.12.2 Segmentation at Each Layer
At each stage, the protocol might segment the data unit it receives from a higher layer and
transmit a number of smaller data units to its peer protocol on the opposite system, which re-
assembles them back into the original size to hand back up to the higher layer.
13.12.3 Nested Headers: Matryoshka dolls
By passing segments of data to a lower layer, which performs its function, adds a header and
passes the result to a yet lower layer, the protocol data units of each layer end up being nested
one inside another inside another like Russian Babushka dolls, properly called Matryoshka
dolls.
The innermost, smallest doll is a segment of the application-layer message.
At the bottom of the protocol stack, all of the headers added by the layers are in place, one af-
ter another as illustrated in Figure 140. The result is a lot of overhead – all those headers – but
also the ability to make the best choice for protocols at many different levels independently.
202
Many different organizations with different perspectives and agendas have become involved.
Out of the resulting myriad choices, particular protocols become standards in the actual sense
of the word through popularity - the choices most popular in the market, sometimes referred to
as the “thundering herd”.
13.13.1 ISO
The International Organization for Standardization (ISO) defined the OSI Reference Model that
we examined in detail.
It’s important to keep in mind that the OSI Reference Model does not tell us how to do all of
these functions - it tells us what we have to do, and gives us a structured way of discussing
what we have to do so we can discuss separate issues separately, and not get things jumbled
up.
In addition to the reference model, ISO does publish particular protocols, such as the data link
protocol HDLC. These OSI-published protocols enjoy varying degrees of actual industry use:
slim to none. This is a side issue to the OSI Reference Model and the concept of open sys-
tems.
13.13.2 DOD and IETF
There are a number of standards organizations for communications. The US Department of
Defense (DOD) published specifications for a suite of protocols including the Internet Protocol
(IP) and Transmission Control Protocol (TCP).
These are now maintained by the Internet Society, through the Internet Advisory Board (IAB)
and the clique called the Internet Engineering Task Force (IETF) that publishes Internet stan-
dards called Request for Comments (RFCs).
13.13.3 ITU and Bellcore
Lest we forget! The telephone network is the world’s biggest network; it made the Internet look
tiny in comparison in the previous millennium. Eventually, the Internet and the telephone net-
work will be the same thing. In the meantime, there are standards specific to the telephone
network.
The Comité Consultatif International de Téléphone et de Télégraphe (CCITT), now officially
called the Telecommunications Standards Sector of the International Telecommunications
Union (ITU-T) is an international treaty organization, with strong European telephone company
influences. This organization publishes many standards, including the V. series of modem
standards, the X. series of data network access standards, and the I. series of digital tele-
phone network standards.
The former Bellcore (Bell Communications Research), now called Telcordia and originally part
of Bell Labs, publishes standards for the North American public telephone network.
13.13.4 TIA and IEEE
Industry organizations include the Telecommunications Industries Association (TIA), which is a
subgroup of the Electronic Industries Association (EIA), which publishes the old RS-232 stan-
dard for modem cables connections, and the newer TIA-568 standard for building wiring.
The Institute of Electrical and Electronic Engineers (IEEE) publishes standards for how to build
LANs on TIA-568 cabling, the 802 series of LAN standards. “Ethernet” is 802.3 and 802.2 to-
gether.
13.13.5 ANSI
In addition to these organizations with specific areas of interest, there are national organiza-
tions such as the American National Standards Institute (ANSI) that try to coordinate standards
at a national level.
Sometimes, in an attempt to coordinate two similar but not identical competing standards from
different groups, and come up with a unified standard, ANSI ends up creating a third standard
that then competes with the two existing “standards”.
203
14
Ethernet, LANs and VLANs
LANs were commercialized in 1979 by DEC (now HP), Xerox and Intel with a product called
Ethernet. LANs became popular for connecting computers, printers and file servers in-building
during the 1980s.
One of the original requirements for a LAN was to connect computers in an office to a shared
laser printer.
This requirement generalized to connectivity between devices for the sharing of all kinds of re-
sources, including hardware resources: hard disks and surveillance cameras; information re-
sources: centralized databases; software resources: network address configuration programs,
communication resources: WAN circuits, amongst countless other examples.
Ethernet, and its many subsequent updates in the IEEE 802 standards, is now almost univer-
sally used on fiber, twisted-pair copper, and over the air to implement the Layer 2 links that
make up the telecom network.
In doing so, Ethernet achieved one of the long-sought goals in the telecommunications busi-
ness: the same technology used in the network core, on the network access circuit, and at the
customer premise.
204
Figure 141. Broadcast Domain
205
to the data; in other words, indicating for which station the data is intended.
The software that implements the addressing is described in the standards documents as be-
ing part of the Media Access Control sublayer, and so the link addresses are called MAC ad-
dresses.
Every LAN interface is given a hard-coded 48-bit MAC address by its manufacturer. The first
three bytes of the address identify the manufacturer and the last three bytes are a serial num-
ber.
14.1.7 Communication of MAC Frames
The mechanism for communicating to another station on a LAN is to transmit a frame with the
MAC address of the intended receiver in this broadcast domain in the destination address field
of the frame.
The frame is transmitted, all stations receive it, perform the CRC error check (which protects
the address), then compare the destination address on the frame to their own MAC address.
If the MAC address on the frame is not the same as a station’s MAC address, it is supposed to
ignore the frame.
If they are the same, then the station knows it is the intended receiver and processes the
frame, extracting the payload from the frame and passing it up to the next higher-level soft-
ware.
206
14.2.4 Baseband LAN
Ethernet is a baseband system: a station uses the entire capacity of the bus when transmitting.
The CSMA-CD access control mechanism is used to decide if a station can transmit on the
bus at any given time.
IBM attempted to commercialize an in-building communication system very much like modems
on Cable TV, where there was a wide frequency bandwidth and multiple channels. IBM called
this a broadband LAN.
IBM’s product no longer exists – there is no such thing as a broadband LAN, and all LAN tech-
nologies are “baseband” LANs, hence the designation BASE in the 802.3 standard.
14.2.5 10BASE-5
In the initial design, to connect a station, a transceiver was physically attached to the coaxial
cable bus and a short tail circuit run from the transceiver to the station’s Ethernet card.
Stations communicated by broadcasting frames with the MAC address of the source and de-
sired destination at the beginning of the frame. Anything a station transmits is received by all
other stations.
The original design is referred to as 10BASE-5, since it provides 10 Mb/s, implements a single
baseband channel on the bus, and the maximum length of a cable segment is 500 m.
14.2.6 10BASE-2
The first improvement to this design was to reduce the cost of the bus cable and transceiver. A
thinner coaxial cable was specified, and the transceiver function moved to the adapter card in-
side the PC instead of being a separate device.
This was referred to as a Thinwire Ethernet or 10BASE-2, because the maximum cable seg-
ment length is 185 m with the thinner cable.
It is sometimes still used to run Ethernet over existing in-building coaxial cable TV wiring.
14.2.7 10BASE-T
The next improvement, 10BASE-T, implemented Ethernet using point-to-point twisted pair ca-
bles connected to a passive hub to replace the bus. The maximum length of twisted pair cable
is 100 m.
14.2.8 100BASE-T
100BASE-T is 10BASE-T ten times faster, on Category 5 unshielded twisted pair, employing
two of the pairs for data with a 3-volt, 3-level Manchester line code. The other two pairs are ei-
ther unused, or sometimes used to deliver power to terminal devices.
Cable categories are covered in the next section.
207
14.2.9 1000BASE-T
1000BASE-T is Gigabit Ethernet, implementing two-way simultaneous transmission over all
four pairs of a LAN cable in parallel.
The bit stream is divided into four and 250 Mb/s is transmitted over each pair, using bandwidth
of approximately 100 MHz on each of the pairs.
For those who like details: the line coding is 5-level Pulse Amplitude Modulation (PAM) with 4-
dimensional 8-state Trellis Forward Error Correction encoding, pulse shaping and signal equal-
ization, Near-End Cross Talk (NEXT) cancellation and echo cancellation using digital signal
processing. Available in quantity 1 for less than $10!
In theory, the next step is 10 Gb/s on Category 6 copper cables.
14.2.10 Optical Ethernet
Optical Ethernet, that is, signaling MAC frames point-to-point by flashing a light on and off on a
fiber, begins with 1000BASE-SX and 1000BASE-LX Gigabit Ethernet over fiber, the SX being
short wavelength (850 nm) and the LX being long wavelength (1550 nm) with a specified range
of 5 km.
Optical Ethernet is covered in Section 8.5.
At time of press, the high end for Optical Ethernet is 100GBASE-ER4, 100 Gb/s Extended
Range, signaling the bits on four wavelengths in parallel with a range of up to 40 km. This will
increase in the future.
208
• Category 2 cable was 25-pair multiconductor cables for old key telephone systems that had
buttons to press to access different lines.
• Category 3 cable was for 10 Mb/s Ethernet on twisted pair, 10BASE-T.
• Category 4 cable was specified for 16 Mb/s token ring.
• Category 5 cabling was for The Future at up to 1000 Mb/s.
Categories 1 through 5 are no longer installed.
Figure 143. Category 5e LAN cable. Bulk cable is terminated on keystone connectors that snap into the back of a
cover plate. Patch cables, illustrated on the left, can be made by crimping RJ-45 connectors on bulk cable..
Category 5 (Cat 5) cable was supposed to support Gigabit Ethernet, but in practice turned out
to be missing the specification of some required transmission characteristics.
Enhanced Category 5 (Cat 5e) was subsequently specified to guarantee the operation of Giga-
bit Ethernet on twisted pair, 1000BASE-T.
Whether a cable can be certified as conforming to a standard is often dependent on the con-
sistency and placement of twists during manufacturing.
Category 6 cable is specified to support 10 Gb/s on twisted pair.
At 1 Gb/s, it becomes necessary to specify the frequency bandwidth supported on the twisted
pair, along with all of the other transmission characteristics, to enable signaling at these line
speeds.
In theory, Category 7 supports 100 Gb/s on twisted pair. This is in the same league as current
mainstream fiber-optic transmission systems, so one could probably expect it will be a while
before there is any significant deployment of Cat 7 copper wires.
14.3.4 TIA-568A vs. TIA-568B
There are two specifications for which wires in the cable go to which pins on the connectors:
TIA-568A and TIA-568B. There is no difference between the two in terms of performance – but
it is necessary to pick one of the two configurations and use it consistently on every jack, every
patch panel, every patch cord and every connector.
Figure 143 illustrates TIA-568B, which is the most popular choice. Holding a male Category 5e
connector in front of you with the retainer clip facing you and the metal contacts on the top, pin
1 is on the left. The wires are color-coded in a standard way, using white, orange, green, blue
and brown.
The TIA-568B connections are:
Pin 1 – white/orange
Pin 2 – orange
Pin 3 – white/green
Pin 4 – blue
Pin 5 – white / blue
Pin 6 – green
209
Pin 7 – white / brown
Pin 8 – brown
This pinout must be used consistently, as the design of both the connector and the cable and
their performance measured in transmission characteristics such as crosstalk, insertion loss,
echo and other metrics are based on particular signals being on particular wires.
14.3.5 Maximum Cable Length and Cabling Architecture
All categories specify cables with four pairs (eight wires) and a maximum length of 100 meters.
This means the maximum run length of the cables – including runs through risers, poles, con-
duits – is 100 m (330 feet).
To be conservative, devices would be connected to a switch located in a wiring closet within a
radius of perhaps 200 feet.
These wiring closet switches could be connected to centralized Ethernet switches on each
floor and/or connected to a router in the communications room, possibly using fiber.
14.3.6 Difference Between Categories
The difference between the categories rests in guaranteed transmission characteristics of the
cable, including specifications for Near-End Crosstalk (NEXT), Attenuation to Crosstalk Ratio
(ACR), supported frequency bandwidth, all of which affect the maximum possible information
transfer rate, and hence what kind of devices can be successfully attached to each end of the
cable.
One of the main factors in getting a cable certified to meet the TIA-568 category is quality con-
trol, particularly in the consistency of the twisting and placement of the pairs.
Two pairs will be twisted at a particular number of twists per inch, but offset by half a period to
minimize crosstalk between the pairs. The other two pairs will be twisted at a different rate that
is not a multiple of the other, and similarly with the twists exactly not lined up.
How well and how consistently this is accomplished during the manufacturing process deter-
mines how successful the manufacturer will be in having the cable certified as meeting the
standard.
14.3.7 Which Category To Use
When determining which category of cable to use, life cycle and labor cost are determining fac-
tors.
For a patch cable connecting a DSL or Cable Modem to a device inside a residence, where we
have an expectation that the line speed will not exceed 100 Mb/s in the foreseeable future,
then Cat 5 patch cables may be used.
For an extra ten cents, a Cat 5e patch cable would allow the continued use of the cable were
the line speed to increase above 100 Mb/s, as it inevitably will at some time in the future.
Since the labor cost is usually far greater than the cable, it is strongly recommended to install
cabling inside walls with capacity greater than immediate needs, and twice as many cables as
what the conventional wisdom dictates.
Two Category 6 cables to each work area would be the Cadillac solution.
Two Category 5e cables to each work area would be well positioned for the future.
One Category 5 cable to each work area would probably be viewed as a mistake ten years
down the road.
210
Figure 144. LAN Switch
This device replaces bus cables and hubs, providing dramatic improvements in performance
plus the possibility of implementing improved traffic management and security through Virtual
LAN (VLAN) technology.
14.4.1 Hardware
In concrete terms, a Layer 2 switch is a small dedicated-purpose computer with anywhere from
two to hundreds of LAN hardware ports, an internal bus, memory and software performing the
switching function and possibly additional VLAN-related functions.
Each hardware port is an Ethernet jack, and should support 1000, 100 and 10 Mb/s full-duplex.
14.4.2 Purpose and Operation
The essential function of a Layer 2 switch is to receive frames from devices, examine the desti-
nation MAC address on the frame, determine which hardware port(s) this corresponds to, and
relay the frame to the computer connected to the indicated hardware port(s).
To determine the MAC address of the computer connected to a particular hardware port, the
processor reads the sender MAC address on frames and stores this information in what might
be called a MAC table.
14.4.3 Buffers
Since there is typically only one processor and one internal bus connecting these hardware
ports inside the switch, small amounts of memory called buffers are provided for each port to
allow stations to send frames simultaneously.
The frames are stored in the buffer then relayed to the appropriate port(s) by the switch’s pro-
cessor, normally on a first-come, first-served basis, or in a prioritized order in the case of an
expensive switch implementing prioritization protocols.
14.4.4 Frame Forwarding
In normal operation, the processor relays a frame from one port to one other, and it does this in
a lightning-fast manner, since it only reads the destination MAC address, does a lookup in the
MAC table then forwards the frame to the indicated port. It does not receive the whole frame
and perform an error check; the destination computer performs error recovery.
14.4.5 Broadcast Domain Defined by Switch
In exceptional circumstances, the Layer 2 switch broadcasts the frame to all the hardware
ports.
This happens when there is no entry in the MAC table for the destination MAC address. It also
happens when the content of the destination MAC address field explicitly instructs the switch to
211
broadcast the frame, when the sending computer is running the Address Resolution Protocol,
for example, attempting to discover the MAC address of the computer that owns a particular IP
address.
Because there is the possibility the switch will send a copy of the frame to all of the hardware
ports, all of the computers connected to a Layer 2 switch are in a broadcast domain: any sta-
tion has the possibility of communicating directly with any other in the broadcast domain with-
out the need of other equipment or protocols.
14.5 VLANs
14.5.1 Broadcast Domains Defined in Software
VLANs are essentially a software trick, implemented by the switch, to define broadcast do-
mains in software, for the purpose of traffic management.
A basic LAN switch does not implement VLANs. All of the devices physically connected to the
basic LAN switch form a broadcast domain; there is no way of preventing one device from
communicating with another.
A more sophisticated switch supporting VLANs allows an administrator to identify specific
hardware ports as belonging to a particular VLAN group, identified by a 12-bit number.
In the simple example illustrated in Figure 145, the ports for the IP phones producing voice
packets are defined to be in VLAN 1 and the ports for the desktop computers are defined to be
in VLAN 2.
Once this is set up, the processor will only forward frames between hardware ports that are in
the same VLAN, and if it is necessary to make a copy of a frame to send to “all” ports, a copy
is only sent to the ports in the same VLAN and not to any others.
14.5.2 Routing Between VLANs
In the example illustrated in Figure 145, the port labeled “uplink” is the connection leading to
the rest of the network, i.e. to a router. This port is defined by the administrator to belong to
both VLAN 1 and VLAN 2.
Communication from a device in VLAN 1 to a device in VLAN 2 can implemented by transmit-
ting a packet in a frame from the device in VLAN 1 to a router via the uplink port, whereupon
the router could transmit the packet in a frame back to VLAN 2.
212
To indicate to the device on the uplink port which VLAN a frame is originating from, an extra
Tag Header conforming to the 802.1Q standard is added to the frame immediately following
the address fields, and the VLAN ID is populated in the Tag Header.
Tagging the frame with the VLAN ID allows the definition of VLAN groups that span multiple
physical switches.
Additionally, the Tag Header includes the Tag Protocol Identifier identifying the frame as a
tagged frame, and following the 802.1p protocol, can optionally carry a three-bit number indi-
cating the priority of the frame for Quality of Service mechanisms.
14.5.4 Traffic Management and Network Security
VLANs are a powerful low-level tool for traffic management and network security. It allows the
grouping of devices into separate broadcast domains so that devices in one VLAN can not
communicate to devices in a different VLAN, a measure against attacks launched from in-
fected Windows computers against a VoIP system, for example.
It is also an essential tool used to separate customers of a carrier who are using a shared facil-
ity. By putting each customer’s hardware ports in a unique VLAN, traffic from different cus-
tomers will be interspersed on a shared circuit, but the customers can not communicate to
each other nor receive copies of other customers’ traffic.
213
15
IP Networks, Routers and Addresses
This chapter could equally be called “Layer 3”.
In this chapter, we cover networking, which is Layer 3 of the OSI model, including routers,
packets and network addresses. We’ll understand how the network is built by connecting cir-
cuits with routers, and trace the flow of a packet from end to end.
The standard method of formatting packets and assigning network addresses is of course IP,
formerly known as the Internet Protocol, so this chapter could also be called “All about IP”.
214
Figure 146. Simplest Example of a Network
The inter-building or Wide Area Network (WAN) circuits could be implemented with point-to-
point fibers, point-to-point radio links or full-period “dedicated line” services like T1 from a car-
rier.
This is useful as the simplest framework for understanding how circuits, routers, routing, IP
packets and IP addresses, MAC addresses and MAC frames, copper and fiber work together
to implement a packet network.
In the next chapter, “MPLS and Carrier Networks”, the story is made more realistic – and more
complex – replacing the dedicated lines with packet-switched bandwidth-on-demand services
from a carrier.
15.2.1 Broadcast Domain at Each Location
In the example of Figure 146, at each location there are a number of terminals or devices –
VoIP telephones, desktops, servers, plus a router, all connected to a LAN switch.
All of the devices connected to the LAN switch in building A are in the same broadcast domain.
This allows the communication of MAC frames between the devices in building A and the
router in building A.
15.2.2 Edge Router at Each Location
The router in building A has three Ethernet jacks for terminating circuits. One of them is con-
nected to the LAN switch in building A. The other two are connected to circuits leading to the
routers in other buildings.
By internally moving packets from one jack to another, the router moves packets between
buildings.
In Windows, the building A router is called the default gateway by building A devices. In any
device’s routing table, the IP address of Router A is listed as the default route.
If a device wants to send a packet outside its broadcast domain, its only hope is to send the
packet on its default route – to that gateway – for onward forwarding.
That gateway, more generally called the edge router for building A, is the only device in build-
ing A that connects to other broadcast domains.
15.2.3 Subnet Assigned to Broadcast Domain
Each broadcast domain, i.e. each building, is assigned a unique range or block of IP ad-
dresses, called a subnet.
215
The terminals and the router in each broadcast domain are assigned an IP address within the
subnet for that broadcast domain.
15.2.4 Default Gateway
The terminals are informed of the IP address of the router in their subnet, which is their default
gateway to other broadcast domains.
Informing the devices of the IP address of their edge router allows the devices to communicate
packets to it for onward forwarding.
15.2.5 Subnet Mask
Figure 147. Subnet Mask and Addresses. This is much easier to understand in binary than decimal.
The devices are also informed what subnet they are in and how big it is. This is accomplished
via a number called the subnet mask that identifies which part of their address identifies the
subnet, and which part of their address identifies their machine within the subnet.
The beginning of the address is the subnet ID, and will be common to all machines in the sub-
net. The end of the address is the machine or host ID, so will be different for each machine in
the subnet.
The subnet mask identifies which bits are the subnet ID with 1s in the positions that are the
subnet ID, and 0s in the positions that are the host ID.
15.2.6 Packet Creation
To communicate VoIP from the telephone in building A to the telephone in building C, tele-
phone A first has to find out the IP address of telephone C, usually using the SIP protocol as
described in Section 3.4.
Once the conversation starts, telephone A creates IP packets addressed to telephone C con-
taining snippets of digitized speech.
15.2.7 Packet Transmission from the Source
To send a packet from telephone A, there are only two choices: send the packet directly to
telephone C, or if that is not possible, send the packet to its default gateway, router A, for on-
ward forwarding.
To determine which of these two possibilities to use, telephone A first determines if it can send
the packet directly to telephone C.
216
By definition, that would require telephone A and C to be in the same broadcast domain. Since
each broadcast domain has been assigned a subnet, by definition, that requires telephone A
and C in the same subnet.
Telephone A can determine the answer by applying the subnet mask using the logical AND op-
eration to its own address, and to the address of telephone C, then comparing the result.
If they are the same, the two telephones are in the same subnet, and thus in the same broad-
cast domain, and so telephone A can transmit the packet directly to telephone C.
In this example, the result will not be equal, allowing telephone A to determine that telephone
C is in a different subnet, which means in a different broadcast domain, and so by definition,
telephone A knows it can not communicate the packet directly to telephone C.
It must instead send the packet to the router in building A (which is in the same broadcast do-
main) for onward forwarding.
Once telephone A has decided the destination is router A, it transmits the packet to router A by
putting the packet in a MAC frame with destination MAC address that of router A, then repre-
senting the bits that make up the frame one at a time on the copper wire LAN cable plugged in
to the phone by putting electrical voltage pulses on the wires.
15.2.8 IP to MAC Address Resolution Protocol (ARP)
Since telephone A has been informed of router A’s IP address, it can determine router A’s MAC
address by asking the router what it is using the Address Resolution Protocol (ARP).
Telephone A transmits a packet addressed to router A in a frame with all 1s as the MAC ad-
dress, an instruction that a copy of the frame should be sent to all devices in the broadcast do-
main.
After router A replies to telephone A with its MAC address as the source address in the frame
header, telephone A can address frames to router A.
15.2.9 Packet Routing
Upon receiving the MAC frame and extracting the packet from it, router A will physically for-
ward or relay the packet from the LAN in building A to a circuit that can get to building C.
Determining where the packet should be relayed is the routing.
Networks are built with redundant connectivity for service availability reasons: more than one
way to get from A to C The router in building A is connected to two circuits that lead to building
C.
Router A must decide which circuit to forward the packet on.
Router A has a routing table, which has entries relating ranges of IP addresses (subnets) to
the IP address of a device that can forward a packet there, and the cost.
Cost is usually measured by number of hops, i.e. circuits to traverse.
The routing table is populated by entries manually typed in by a technician, by the routers com-
municating with each other in the background, or by a central control system in a Network Op-
erations Center.
In this case, the routing table will have two entries for subnet C, which contains telephone C:
1) All of the devices in building C are reachable by going to router C, and the cost is one
hop, and
2) All of the devices in building C are reachable by going to router B, and the cost is two
hops.
The router picks the least-cost route, and forwards the packet to router C.
15.2.10 Overbooking & Bandwidth on Demand
Beside the question of routing is a different discussion: performance.
In the example of Figure 148, each device has the possibility of transmitting packets to the
LAN switch then to the router at 1000 Mb/s, and onward to other buildings at 10 Mb/s… but
none of those bits per second are reserved for any particular device, either on the LAN or the
WAN.
Statistically speaking, most of the time, telephone A does not transmit anything. Occasionally,
it will transmit a packet in a frame to the LAN switch then router A over the LAN at 1000 Mb/s.
217
The router will relay the packet to a jack that has a 10 Mb/s dedicated line to another router,
and transmit it at 10 Mb/s to the other router. Occasionally, a different device will transmit a
packet to router A.
218
Figure 149. Customer Edge Router
From the point of view of a carrier that might be providing the point-to-point links, it defines the
edge of the customer’s in-building network, and so is called the Customer Edge (CE) device by
carriers.
This device has also in the past been called the premise router, the customer premise router,
and is called the “default gateway” by Windows computers.
It can be implemented as a $20 stand-alone device or included in the same device that houses
a DSL or Cable modem or fiber termination for home or small office use. Industrial-strength
versions costing thousands of dollars are of course also available from companies like Cisco
for larger offices.
15.3.2 Router Connects Broadcast Domains
In the configuration illustrated, the CE router belongs to four broadcast domains: the two
VLAN-defined broadcast domains on the upper LAN switch, the hardware-defined broadcast
domain on the lower LAN switch, and the WAN circuit is a fourth broadcast domain.
Without a router, these four broadcast domains are like individual standalone circuits. The
router implements the network by implementing the possibility of communications between the
broadcast domains.
15.3.3 Routing
The router examines the destination address field in the Layer 3 header (Network Layer
header) on a packet, and uses this value along with information in its routing table to determine
where to forward the packet.
The routing table essentially lists ranges of addresses (subnets) against the address of a de-
vice that can relay a packet to any address in that subnet, and at what cost.
The “answer”, result of the route calculation is the address of the next hop, in other words, the
device to which the packet should be forwarded to get to the destination address.
The next hop address is resolved to a broadcast domain, then to a hardware interface, then
the packet is physically forwarded in a frame.
15.3.4 Denying Communications
In addition to implementing the network by implementing the possibility of forwarding packets
between broadcast domains, a router also acts as a point of control, denying communications.
219
This is part of basic network security practice. The objective is to compartmentalize the net-
work, allowing communications only between machines and/or applications when there is a le-
gitimate and desirable reason to do so.
In practice, this is implemented by denying all communications by default, then permitting com-
munications between specified machines and/or between specific applications.
15.3.5 Packet Filtering
Permitting communications to specific machines is implemented with rules based on source
and destination network addresses in the Layer 3 header, and is called packet forwarding.
When denied, it is called packet filtering.
15.3.6 Port Filtering
Permitting communications to specific applications is implemented with rules based on the
source and destination port number in the Layer 4 header.
The port number is essentially an identification of the computer program running on a machine.
This is referred to as port forwarding and filtering.
15.3.7 Firewall
Note that packet or port filtering alone is not a firewall.
Packet or port filtering is a low-level traffic management tool that is the first stage in a firewall.
Firewalls bring in the beginning of a message - contained in a number of packets - and exam-
ine the content of the packets to determine the application being carried in the packet, and ap-
ply permit / deny rules based on that.
The technique used is called Stateful Packet Inspection (SPI).
A packet or port filter bases its permit/deny decision only on the address or port number on the
packet. It does not look inside the packet to see what the content is.
Hence, a properly-configured packet or port filter restricts communication of packets to desti-
nations that have a legitimate and desired use – but allows all communications, including at-
tacks, to reach those destinations.
If the traffic does not come from a trusted source, it is necessary to examine the content of
packets permitted through a packet filter to make a final permit or deny decision.
A firewall has both the packet filter and SPI functions.
220
A method of assigning IP addresses to machines on these pre-existing networks was neces-
sary.
To make routing tables efficient, it was desirable to associate a contiguous range or block of
addresses with a pre-existing network. The block would ideally have as many addresses as
there were machines in that network.
The developers decided to standardize on three typical sizes of networks, which they called
classes of networks: big, medium and small, or Class A size networks, Class B size networks
and Class C size networks respectively, and so three standard sizes of blocks of addresses
that would be assigned: Class A blocks, Class B blocks and Class C blocks.
221
65,536 machines.
A Class C block begins with 110. The first three bytes of the address are the same for all ma-
chines and the last byte or 8 bits are used to number 28 or 256 machines.
Addresses beginning with 111 were originally reserved for “escape to extended addressing
mode”, then divided into two parts:
15.4.5 Class D and E
Addresses beginning with 1110 are multicast addresses, sometimes referred to as Class D.
The division of address space between “network” ID and “host” ID is not defined.
Addresses beginning with 1111 remain reserved for some unknown use, and are sometimes
called Class E.
15.4.6 Classless Inter-Domain Routing
For more flexibility, blocks of IP addresses are no longer restricted to one of the three sizes.
Blocks of addresses called subnets, that are of any power of 2 size less than Class A can be
defined.
The subnet ID is the first part of the address, which will be the same for all devices in the sub-
net.
The subnet, and its size, is identified with a starting IP address followed by /n, with n indicating
the number of bits at the beginning of the address that are the subnet ID.
This evolution of address assignment from one of three classes to arbitrarily-sized blocks was
called Classless Inter-Domain Routing (CIDR).
15.4.7 Dotted-Decimal Notation
IPv4 addresses are 32-bit binary numbers – but writing 32-bit binary numbers on pieces of pa-
per or computer screens, or speaking them between people is unwieldy if not impossible.
Hexadecimal, a numbering system based on 16s, is a good short form for binary numbers, as
it is simple to convert to binary and segments the address into groups of four bits.
Unfortunately, those that came up with IPv4 decided to use decimal as a short form for binary
numbers, and came up with an awkward notation called dotted-decimal, where the 32 bits are
divided into four groups of 8, then the groups of 8 are converted independently to decimal,
yielding addresses written like 232.155.166.1.
Using decimal as a short form for binary numbers is awkward, since it is difficult to convert be-
tween decimal and binary.
15.5 DHCP
IP addresses may be static or dynamic. Static means that the address assigned to a machine
generally does not change.
Dynamic means that an IP address is assigned to a computer on demand, for a fixed lease pe-
riod. The computer may be assigned a different address each time it demands one.
Addresses are assigned to a computer using the Dynamic Host Configuration Protocol
(DHCP).
15.5.1 Dynamic Addresses for Clients
Dynamic addresses are acceptable for a machine running client software, since the way things
are organized is that the client initiates communications with a server, and includes its return
address (the source IP address) in every packet sent to the server.
15.5.2 Static Addresses and DNS for Servers
To communicate to a server, it is necessary to find out the numeric IP address of the server be-
fore the client can communicate to it. That is often accomplished through the Domain Name
System (DNS), essentially tables where the IP address of a server can be looked up.
To avoid having to frequently update those tables, servers are generally assigned static ad-
dresses.
15.5.3 DHCP Client – Server Communications
222
The system administrator provisions a DHCP server, configured to assign IP addresses within
a specific block (within a subnet) to clients. Computers are loaded with DHCP client software.
Communications between the DHCP client and server are effectively application-layer mes-
sages, coded into ASCII and carried in UDP protocol data units, which are carried in IP pack-
ets, which are carried in MAC frames.
The desired recipient of the messages is indicated as being the DHCP on a machine by popu-
lating in the UDP header destination port = 67 for messages to the server and destination port
= 68 for messages to the client.
The messages are “broadcast”, which means that the destination IP address is all 1s and des-
tination MAC address is all 1s. The actual addresses are used for source MAC and IP ad-
dresses, except that the client uses “0” as its IP address, since of course the whole point of the
exercise is to get an IP address.
223
The lease time may be configured by the system administrator to any value. This function
might be useful to help manage situations where there are more clients than addresses.
If the DHCP server reaches the end of its configured range of addresses, it attempts to re-as-
sign previously-assigned addresses to new requestors, beginning with those previously-as-
signed addresses for which the lease has expired. Before re-assigning the address to a differ-
ent machine, the server might optionally ping the address to determine if it is still in use.
15.5.6 DHCP to Assign Static Addresses
Even though it is the “dynamic” host configuration protocol, DHCP is also used to assign static
addresses to machines.
This is accomplished with a table in the server, configured by the system administrator, which
relates MAC addresses to IP addresses.
Whenever a computer with a MAC address contained in the table asks for an IP address, it will
always be assigned the IP address specified in the table.
This allows the assignment of static addresses to computers from a centralized management
system (the DHCP server), conveyance of other information like default gateway and netmask,
and eliminates the need for any human involvement (and its associated errors) in configuring
computers.
In Windows, you can see the IP address currently assigned to a computer, as well as its LAN
card MAC address by opening the Network Connections folder and viewing the detailed “sta-
tus” of the LAN card.
If under “properties” of the TCP/IP protocol the choice “obtain a network address automatically”
is selected, the DHCP client is run at startup and when the adapter is disabled then re-en-
abled.
224
block of 4096 addresses efficiently.
The cost for a block of 4096 addresses from ARIN is $2,250 per year, or about 50 cents per
address per year.
ISPs resell these addresses as dynamic addresses bundled with end-user Internet access ser-
vice. Web hosting providers resell these addresses as static addresses, bundled with a hosting
plan.
Providers also rent “additional” addresses at costs like $2 per month per address… a markup
of 2400%, and a very lucrative business.
15.6.3 Unassigned or Private Addresses
However, the Internet Society didn’t give all of the IP addresses away. RFC 1918, “Address Al-
location for Private Internets” defines three contiguous blocks of IPv4 address space that are
not used, and not valid, on the public IP network (the Internet).
These addresses are officially called unassigned addresses and usually referred to as private
IP addresses. Sometimes they are called non-routable addresses, though this is not very accu-
rate; routers can route them, just not on the Internet.
Using private addresses in-building allows the use of IP and all of its associated protocols and
services for in-building communications without having to pay anyone for a block of rented ad-
dresses.
225
Figure 154. Network Address Translation
226
These fields are used to indicate which application on a computer the message is being sent
from and to.
The NAT selects an arbitrary “fake” port number to identify a computer on the private network,
and records this port number against the private address in a table.
When a packet is transmitted to the Internet, the NAT records the actual source port number
then changes the source port value to the “fake” port number.
When the reply from the server is received from the Internet, it has the “fake” port number in
the destination port field of the Layer 4 header. The NAT uses this to look up the correct private
IP address and correct port number and enter those values in the destination address and des-
tination port number fields, thus relaying the incoming packet to the correct computer on the
private network.
15.7.4 Advantages of NAT
NAT provides a number of advantages:
1. A NAT allows multiple computers in-building to share a single Internet address and Internet
connection.
2. A NAT provide a truly “always-on” connection to the Internet. Services like DSL and Cable
modem described as “always on” are always connected at the Physical Layer. They do not
provide “always on” at the Network Layer, since DHCP must be run every time the attached
device restarts to get a public IP address.
When a NAT is inserted, it runs DHCP to get the public IP address; so if the NAT is not pow-
ered off, the site will always have a public IP address assigned, and thus a connection to the
Internet always ready for immediate use.
3. A NAT shields machines from attacks from the Internet. Since a private IP address is not
reachable from the Internet, there is no way for a machine on the Internet to initiate communi-
cations to a machine on the private network. The only device exposed to the Internet is the
NAT.
Normally, the NAT is not running on a computer running Windows, so attackers have a greatly
diminished chance of finding a vulnerability to exploit compared to connecting a computer run-
ning Windows naked onto the Internet.
15.7.5 Implementation
Devices that perform this function are available in industrial-strength versions from companies
like Cisco. Hardware devices to do this are also available for about $20 from companies like
Linksys for use on a DSL or cable modem connection. They often include both an Ethernet
switch and an 802.11 wireless LAN access point for the private network side.
Most ISPs now provide the CE router with NAT function integrated in a device that includes the
DSL or Cable modem, or for the lucky few, the fiber terminal supplied by the ISP.
227
expire, and the sender will automatically retransmit the segment.
15.9 IPv6
The main limitation of IPv4 was a shortage of network addresses. Though having a 32-bit ad-
dress space, yielding 232 or 4.3 billion addresses, the assignment of large blocks of addresses,
particularly Class A, caused a rapid exhaustion of available addresses.
Additionally, mechanisms for security and traffic management were not provided or not well
supported by IPv4, requiring the development of additional protocols, headers and overhead to
perform these functions.
RFC 2460 Internet Protocol, Version 6 (IPv6) emerged from a pack of contenders to be the
eventual replacement for IPv4. The improvements that IPv6 offers over IPv4 are expanded ad-
dressing capabilities, header simplification, improved support for extensions and options, sup-
port for traffic management and support for data integrity and data security.
15.9.1 Expanded Addressing Capabilities
The main improvement is expansion of the address field from 32 bits to 128 bits, expanding
the available address space to 2128 = 3 x 1038 addresses
(340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact) … enough to allocate a
block of 560 trillion trillion addresses to every person on earth.
15.9.2 Header Simplification
Some IPv4 header fields have been dropped or made optional, to reduce the bandwidth cost of
the IP header, and to reduce the number of operations – and thus time – required to forward a
packet.
15.9.3 Improved Support for Extensions and Options
A flexible mechanism for adding to the IP header with variable-length extension headers has
been implemented. This allows optional implementation of error detection, source authentica-
tion and encryption as standardized services at the network layer that would be available to all
applications.
15.9.4 Support for Traffic Management
228
Fields in the header allow identification of priority, and identification of a packet as belonging to
a flow of packets, that is, a sequence of packets originating from the same source and going to
the same destination and intended to receive the same forwarding treatment. Currently, this
would be an MPLS label number. These capabilities can be used to implement traffic manage-
ment and prioritization as Quality of Service mechanisms.
15.9.5 IPv6 Packet Format
The IPv6 header is 40 octets long, and includes the following fields:
Version field: 4 bits, indicating the version of IP. This would be “6”.
Traffic Class: 8 bits, indicating a “priority” or precedence for this packet. This field can be popu-
lated by the originator of the packet, or by subsequent network equipment. This could be used
to support differentiated Classes of Service for different applications.
Flow Label: 20 bits that can be used to identify the packet as belonging to a group or class of
packets which should receive the same forwarding treatment on the network. This would typi-
cally be an MPLS label.
Payload Length: 16 bits, containing length of the payload immediately following this header,
which includes any optional extension headers.
Next Header: 8 bits identifying the type of header following. In the simplest implementation, the
IP packet will be encapsulating a transport layer protocol data unit, such as that output by TCP.
In that case, the header immediately following the IP header would be the TCP header.
Hop Limit: 8 bits, populated by the source with a number between 1 and 255. This number is
decremented by each device that forwards the packet. When it reaches zero, the packet is dis-
carded. This prevents endless forwarding of packets in loops.
Source Address: 128 bits, identifying the originator of the packet.
Destination Address: 128 bits, usually identifying the final destination on the network. If a Rout-
ing extension header is present, the destination address field will contain the address of the
next router through which the packet must travel.
229
In North America, ARIN’s policy is that the first 32 bits of the address identifies a block allo-
cated to a Local Internet Registry, most of the time a big ISP.
15.10.2 Sites and Global Routing Prefix
The first 48 bits of the address is called the Global Routing Prefix and identifies a site. Most of
the time, this will be an ISP’s data center, though it might be a university campus or large orga-
nization’s building.
15.10.3 Interface ID
The last 64 bits of the address is called the Interface ID, and could be the updated version of a
MAC address called EUI-64, or a random number for privacy reasons.
It identifies the integrated circuit running a LAN connection – wired or wireless – on a device.
For consumer equipment with one LAN connection like a PC or smartphone, it effectively iden-
tifies the device.
15.10.4 Subnet ID
Between the 48-bit Global Routing Prefix, which essentially identifies buildings or campuses,
and the 64-bit Interface ID, which identifies LAN connections is 16 bits called the Subnet ID.
The Subnet ID can be used to implement a hierarchy of addresses assigned to end-users
and/or subnets at a particular end-user.
Residential users generally do not have multiple subnets, so in the case of an ISP’s site, this
16-bit field can be used to assign one subnet, that is, one /64 block to 65,536 customers per
site.
In this case, all IP addresses at the residence (the end-site) would have the same first 64 bits,
and the last 64 bits would be IDs of interfaces at the residence. Every light switch, light bulb,
every electrical socket, both slots in your toaster … everything will have an IP address in the
future.
Large government and corporate end-sites would normally have more devices and multiple
subnets (broadcast domains) to be compartmentalized for network security reasons, so they
might be assigned multiple subnets, for example a /56 block from the ISP’s site.
In this case, the end-user in the office building would employ the lower 8 bits of the subnet field
to identify up to 256 subnets (broadcast domains) at their end-site. On each of these, the first
64 bits of the IP address would be the same for all devices on the subnet (in the broadcast do-
main), and the last 64 bits are the Interface ID. The ISP could service up to 256 of this kind of
customer from one /48 site block at the ISP’s data center.
230
Customers of an ISP that have sites bigger than a large corporation or government building in-
clude… smaller ISPs. For this type of customer, a /48 block would allow the downstream ISP
to resell the /64 block residential and /56 block corporate / government scenarios just de-
scribed.
15.10.5 Subnet Prefix
The first 64 bits of the address are called the Subnet Prefix, and identifies a broadcast domain.
15.10.6 IPv6 Address Types
Three main IPv6 address types are defined: unicast, anycast and multicast.
A unicast address identifies a single interface. A global unicast address is basically a valid In-
ternet address – that may or may not be directly reachable from the Internet, for security rea-
sons.
Both anycast and multicast addresses identify a set of interfaces. A packet addressed to an
anycast address is delivered to the nearest interface in the set, while a packet addressed to a
multicast address is delivered to all of the interfaces in the set.
The address 0 is called the unspecified address, used as the source address of an interface in
the process of acquiring an address using DHCP, for example. The address 1 is called the
loopback address, and is used by an interface to reference itself.
Addresses beginning with 1111:1101 (FDH) are called unique local addresses, used in the
same way as IPv4 private addresses. These addresses can be routed on a private network,
but are not valid on the public internet.
Addresses beginning with 1111:1110:10 (FE8H - FEFH) are link-local unicast addresses. They
end with a 64-bit interface ID, and are valid only on a single broadcast domain, for functions
like neighbor discovery. Routers are not allowed to forward packets addressed to these ad-
dresses to a different broadcast domain.
Addresses beginning with 1111:1111 (FFH) are multicast addresses. All other addresses are
global unicast addresses, i.e. addresses for the public Internet. Anycast addresses are taken
from unicast address space.
One other type of address worth noting is the IPv4-mapped IPv6 address. This begins with 80
zeros, then 16 ones (FFFFH), followed by a 32-bit IPv4 address. This is a method for transition
from IPv4 to IPv6 and may end up being the way that a “legacy” IPv4 addressing scheme is
accommodated on an IPv6 network.
RFC4291 “IPv6 Addressing Architecture” is the authoritative reference for the discussion in this
section.
231
16
MPLS and Carrier Networks
16.1 Introduction
Packet networks incorporate two ideas: packet switching and bandwidth on demand. In this
chapter, we examine how these principles are implemented by common carriers, i.e. organiza-
tions that build networks and carry many users’ packets over common facilities.
16.1.1 Overbooking
Packet switching, also called packet forwarding and routing, means relaying user data in pack-
ets from one circuit to a different circuit, or to be exactly precise, from one broadcast domain to
a different broadcast domain.
Routers physically move packets from one circuit to another, using network addresses to de-
termine which circuit to relay them to.
Bandwidth on demand means giving many devices access to a circuit and giving each the
possibility of transmitting. If a device does not have anything to transmit, another device can
use the available capacity.
This allows the implementation of overbooking or oversubscription, where the total of the in-
coming line speeds is greater than the outgoing line speed.
The appropriate level of overbooking can be calculated based on the historical demand statis-
tics, how often the devices actually transmit data – regardless of what access line speed they
have – and so overbooking is also called statistical time-division multiplexing.
16.1.2 Congestion, Contention and Packet Loss
When the demand exceeds the available capacity – more packets being sent in to a router
than can be sent out – the network is said to experience congestion. At a router, packets are
stored in temporary memory called buffers while waiting to be transmitted.
Under heavy load, the buffers can fill up. Then, in the case where a new packet arrives before
the oldest one in the buffer can be transmitted, the new packet over-writes the oldest one in
the router’s buffer memory.
When a packet is over-written, it disappears. This is also called a dropped packet, non-deliv-
ered packet and packet loss.
For applications like email and web pages, packet loss is typically not a problem; the TCP soft-
ware re-transmits the missing data in a new packet from the source. The user might only no-
tice the page taking longer to load.
For live telephone calls and television programs carried in IP packets, there is no time to re-
transmit missing data, so packet non-delivery and excessive delay can result in poor voice
quality on phone calls, and serious pixilation or block-averaging distortions on video.
16.1.3 MPLS Traffic Management System
To assure suitable performance for delay- and packet-loss-sensitive applications, a traffic man-
agement system called MPLS is used by the network operator.
Performance is usually defined as packet delivery percentage, maximum delay and maximum
variability in delay.
Specific performance thresholds are called Classes of Service (CoS), and are part of the ser-
vice contract between the carrier and their customer called a Service Level Agreement (SLA).
One Class of Service could be defined for delay- and packet-loss-sensitive applications like
voice and video, with guaranteed high packet delivery rate and low delay.
232
Another CoS could be defined for delay- and packet-loss-tolerant applications like web pages
and email, with lower guaranteed packet delivery rate and longer delays.
If there is congestion at a router, packets with the higher CoS are transmitted at the expense of
packets with a lower CoS that are delayed or dropped.
In addition to managing performance guarantees, traffic management is also required for net-
work load balancing and recovery from equipment failure and cut lines.
233
PE functions may be implemented in provider equipment deployed at the carrier premise. This
is discussed in an upcoming section.
16.2.2 Access
The access circuit is generally a dedicated physical connection.
Current choices for access circuits include copper-wire DSL and cable modem technologies at
speeds measured in the tens to hundreds of Mb/s, and fiber systems moving 10 Mb/s to 40
Gb/s. These line speeds will continue to increase in the future.
In days past, copper-wire technology including 56 kb/s digital service and 1.5 Mb/s T1 were
popular choices. Higher-end services might have used SONET on fiber at rates like 150 Mb/s
(OC3) or 500 Mb/s (OC12).
16.2.3 Advantages of Packet Networks
There are a number of significant advantages to the use of packet network services from carri-
ers instead of dedicated lines or circuit-switching.
First, there is no circuit set-up delay as with a dial-up modem; with a packet-switched service,
the possibility of communicating to the network is maintained constantly over the access cir-
cuit, so communications can begin anytime without delay simply by transmitting a packet from
the Customer Edge to the Provider Edge router. The packet is delivered to the far end CE
sometime later.
Second, users can send packets addressed to many different destinations interspersed on a
single access circuit, thus communicating ‘simultaneously’ to many destinations with only one
access circuit at each location.
Since there is a monthly charge per access circuit or port in this business, this is a large cost
advantage compared to dedicated or circuit-switched services, which require a separate ac-
cess circuit for each simultaneous connection.
The third advantage is cost.
For all types of services, there is a flat rate per month for the access. Then, for dedicated lines,
there is a mileage charge per month. Circuit-switched phone calls are billed per minute.
Packet services are (in theory) billed per packet. Since the users normally will be doing noth-
ing, it will be cheaper to pay per packet than pay all the time – which is a “dedicated line” actu-
ally is.
Whether or not a packet service is billed per packet, or flat rate, or flat rate up to a bandwidth
cap then per packet for overage is a business decision on the part of the carrier.
In any case, the cost for packet network service is less than the cost of dedicated line or cir-
cuit-switched services, because the network circuits are overbooked and so the cost to the car-
rier is lower.
234
16.3.2 Contract
The contract is: as long as the customer traffic is less than the restrictions of the traffic profile,
the service provider is obliged to provide the specified Class of Service, i.e. meet the specified
transmission characteristics.
If the provider does not meet the specification, then in many cases, the customer can get a
partial rebate of service cost for the month.
16.3.3 Business Decisions
Whether the service provider requires the customer to specify a traffic profile, and the details of
traffic profiles are a business decision on the part of the carrier.
Some carriers, perhaps to distinguish themselves from the competition, do not enforce traffic
profiles. Or perhaps more accurately, they only support one traffic profile, which is “transmis-
sion at full access line speed 24/7”.
If the customer has a physical access to the provider’s network at 10 Mb/s, then they are al-
lowed to transmit 10 Mb/s all the time – and still require the carrier to meet the Class of Service
guarantees.
Other carriers only sell SLAs with traffic profiles; in other words, they will only guarantee a
Class of Service if the customer guarantees they will restrict their traffic below set limits.
Historically, this has been the case because of limited resources – because the carrier network
is heavily overbooked, and the carrier must restrict the incoming traffic to be able to meet the
CoS guarantees.
Their network is in no way capable of supporting all customers transmitting at full line speed
24/7 at the same time. The carrier’s network was purposely designed to support lower traffic
profiles, to reduce the cost, giving the customers high apparent network speeds at a lower
cost.
An easy example of this today is residential internet access. To reduce the cost to customers,
the access network in a neighborhood is heavily overbooked.
When a customer signs up for Internet access at 25 Mb/s for $60/month, they are not paying
for a traffic profile that allows them to transmit and receive 25 Mb/s 24 hours per day, 7 days a
week, 365 days per year.
They are paying for a residential user traffic profile, which is “receive at 25 Mb/s in short bursts
once in a while”.
Two-way 25 Mb/s Internet access guaranteed to work at full speed 24 hours per day, 7 days a
week, 365 days per year is available – but that costs $500 per month not $60 per month.
16.3.4 Enforcement: Out of Profile Traffic
On the enforcement side, traffic is metered, and traffic exceeding an agreed profile is said to
be out of profile.
The question is then what to do with out of profile traffic. If the network is heavily overbooked,
customers might need to be forced to conform to their agreed traffic profile if the network is go-
ing to meet the Class of Service standards for all customers… and not have to give refunds to
everyone every month.
In this case, out-of-profile traffic might be:
• assigned to a lower Class of Service, and so becoming more likely to be dropped by some
equipment downstream,
• billed at a higher rate,
• temporarily delayed to bring short-term overages into compliance with the traffic profile
(called traffic shaping), or
• discarded at the input to the network (traffic policing).
For business customers, traffic profiles were required in the past for the same reason: the net-
work was overbooked.
Today, if there is practically infinite bandwidth underlying all parts of the networks between
business customer locations, then there is no technical need for traffic profiles.
235
There is, however, a business reason why a carrier would continue requiring traffic profiles af-
ter the technical need for them has diminished… which is of course revenue.
Out-of-profile traffic could be, and is, billed as “overage”. From a service provider business
point of view, the service provider is keeping the cost of service offerings low for everyone, and
charging extra to those that transmit more than everyone else.
From a customer point of view, this might be seen as a hidden cost that is only discovered af-
ter a contract is signed.
16.3.5 Abusive Applications: Bit Torrent
Residential customers that run the bit torrent file “sharing” application transmit and receive far,
far more traffic than regular users, and usually face traffic policing and/or charges for overage.
Some go as far as to claim that net neutrality is required, and in their case, they believe net
neutrality means they should not be subject to traffic caps, traffic policing (throttling), or extra
charges, instead pay the same as their neighbors – even though they are using far more band-
width.
It must be noted that the activity these customers are usually undertaking is reception and dis-
tribution of intellectual property for which they have not paid the copyright holder.
From a technical point of view, these users are essentially asking their neighbors to subsidize
what the copyright holder would likely consider to be criminal activity.
236
16.5 Virtual Circuit Technologies
Traffic management on IP networks is implemented with virtual circuits internal to the network,
invisible to users, with a protocol called Multi-Protocol Label Switching. MPLS is a tool en-
abling the centralized control of routing and prioritization of different kinds of network traffic
such as telephone calls vs. file transfers.
The remainder of this chapter explains the basic principles of virtual circuits, briefly covers
legacy technologies, then MPLS and how MPLS is used for traffic management, VPNs, service
integration and traffic aggregation.
In an IP network, the route decision for a packet arriving at an IP router is calculated using a
relatively complicated algorithm that takes into account the destination IP address, the cost of
different routes to the destination and other factors.
This algorithm is run for each packet, on every router in the chain. This takes a relatively long
time, increasing network delay. More importantly, it makes practically impossible the control of
routes, prioritization and resulting traffic characteristics since each router operates indepen-
dently.
237
In many cases, the ingress device is part of the Provider Edge (PE), meaning that the entire
story of virtual circuits and traffic classes is internal to a carrier’s network and invisible to the
customer.
The best place to at least initially classify traffic is at the customer premise, as this allows use
of local information not available in the carrier network, and allows subsequent aggregation of
multiple traffic classes on a single physical access.
For this reason, the traffic classification function is often performed by provider (carrier) equip-
ment located at the customer premise.
In other cases, the ingress device is part of the Customer Edge, meaning that the customer is
responsible for purchasing this complicated equipment, managing it and coordinating traffic
classes and virtual circuit IDs with the carrier at both ends.
16.5.4 Forwarding Based on Class Number
Once the traffic is classified, the carrier network equipment does not use the IP packet ad-
dress, but instead uses the class number to look up the next hop and possibly relative priority
in its routing table.
This reduces the routing decision at each router from a complex algorithm to a simple table
lookup, reducing the delay through each router and load on the router’s processor.
More importantly, it provides a carrier with a mechanism for managing flows of packets end-to-
end, implementing load balancing and swift service restoration after a fault, by managing the
next hop entry for each class in each routing table from a centralized Network Operations Cen-
ter (NOC).
16.5.5 Differentiated Services
Implementing multiple traffic classes that might all go from the same place to the same place,
but each associated with a different priority allows the implementation of Differentiated Ser-
vices, i.e. multiple Classes of Service on a packet network, so that packets with different con-
tent will experience different transmission characteristics. An alternate method, particularly
suited to IPv6, is one virtual circuit code and a separate traffic class code.
16.5.6 SVCs and PVCs
In some technologies, there are additional buzzwords describing two flavors of virtual circuits:
Permanent Virtual Circuits (PVCs) and Switched Virtual Circuits (SVCs).
Switched Virtual Circuits are set up in a manner similar to making a phone call: your network
equipment asks the network to establish a connection to some destination, the network sets it
up without further human intervention, you communicate, then the connection is released when
you have finished communicating.
The difference between an SVC and a phone call is that full-time capacity is not reserved in
the network for an SVC… it is just a path, a route, a possibility. With a phone call, 64 kb/s are
reserved in the network during your communication session, whether you’re using them or not.
Permanent Virtual Circuits are exactly the same as Switched Virtual Circuits, except that they
are set up and never released.
The set-up process for virtual circuits is in many cases a manual operation, performed by a
technician sitting at a control console that commands the network routing equipment.
For this reason, in practice all virtual circuits tend to be Permanent Virtual Circuits… set up and
left set up.
238
the framework of the OSI 7-layer reference model.
☞
If you are not interested in the precursor / legacy technologies, feel free to skip ahead to
Section 16.9, “MPLS”.
X.25 was a widely-accepted standard protocol for packet networks, standardized by the CCITT
(now ITU) in 1976 and deployed by all telephone companies for business and government
data communications. Some precursors of what we know today as the Internet, for example,
CompuServe, ran on X.25 networks.
239
packet.
This software passes the packet back to the layer 2 software on the packet switch, along with
the link address of the next hop. The layer 2 software on the packet switch revises the frame
address, recalculates the frame error check value then transmits the frame on the appropriate
physical output to the next packet switch.
This repeats until the packet is delivered in a frame to the far-end PAD, which extracts the data
from the packet and passes it to the far-end application.
16.6.2 Reliable Network Service: Guaranteed Delivery
X.25 implements an error-recovery mechanism, retransmitting missing or errored data on indi-
vidual links, to guarantee delivery of user data (supporting dumb terminals). There are no tim-
ing or delay guarantees.
X.25 in effect implements a single Class of Service that might be called guaranteed data deliv-
ery. This is also referred to as a reliable network service.
16.6.3 Connection-Oriented vs. Connectionless Network Service
Connection-oriented communications means in general that there is communication with the
far end before a file transfer begins; the sender gets an acknowledgment that the receiver is
online and ready to accept data. Since a virtual circuit is set up before communications begins,
X.25 implements connection-oriented communications at the network level. X.25 was reliable,
connection-oriented packet communications from the Phone Company.
Contrast that with unreliable, connectionless network service. Unreliable means that there is
no guarantee from the network that a packet will be delivered, and no acknowledgment of
transmission of a packet is provided by the network.
Connectionless means that there is no communication with the far end before a file transfer
begins. To use an unreliable, connectionless network service, the user must perform the relia-
bility and connection functions. The Postal Service is an example of an unreliable, connection-
less network service. The Internet is another.
Business, government and the military liked X.25, because it was cheaper and much more
flexible than dedicated lines, allowing communication to many locations over one access cir-
cuit.
However, X.25 was not scaled to higher throughputs to support LAN-LAN communications,
and did not support any kind of class of service other than “data”. It was necessary to deploy
other packet network and virtual circuit technologies that supported higher line speeds and
more sophisticated classes of service.
240
Figure 162. Frame Relay
241
This is implemented by defining virtual circuits and associating them with a virtual circuit ID
called a Data Link Connection Identifier (DLCI), and populating this in the frame address field.
A control system configures routing tables in the network elements with the routing for each
DLCI. When a frame arrives at the network element, the DLCI on the frame is used to look up
the next hop.
On a private network, the DLCI can be the same across the network. On a public network, the
DLCI will change from link to link, and so the end-to-end connection is a virtual circuit made up
of a sequence of DLCIs.
16.7.2 Unreliable Service
Another reason why Frame Relay is faster is because it is does not provide reliable network
service... the delivery guarantee and error recovery protocols of X.25 are replaced with mere
error detection.
If a frame is corrupted, or if the network gets busy, the network discards the frame. The net-
work does not retransmit the frame (like X.25 does). This also eliminates overhead and redun-
dancy, improving throughput.
16.7.3 Network Structure and Operation
Frame Relay was designed for LAN to LAN client-server data communications between loca-
tions of a business or government.
Permanent Virtual Circuits identified with a sequence of DLCIs will established between every
two of the locations.
To communicate from one customer location to another, the customer must have edge equip-
ment that relates DLCIs to destinations, and packages the customer data into the same frame
format used by the service provider.
The customer-premise equipment that performs this function is called a Frame Relay Access
Device (FRAD). Typically, IP subnets, that is, blocks of IP addresses, will be assigned to each
customer location. The routing table in the FRAD is then populated with which DLCI to use to
get to a given IP subnet.
Since there is a possibility that frames will be discarded during transit, users must run an end-
to-end error-checking and retransmission protocol to implement reliability. TCP is normally
used.
16.7.4 No Guarantees for Voice
Frame Relay provides no guarantees as to end-to-end delay in the delivery of frames, and no
guarantees as to the maximum variability of delay, called jitter.
This means that while it is possible to communicate digitized speech in packets in frames over
a Frame Relay network, it is not possible to guarantee the quality of the reconstructed speech
in the case of a live telephone call.
A 20-ms-long segment of digitized speech arriving 300 ms after the previous segment usually
has the same effect as not arriving at all: reconstructed speech that has parts of syllables
missing and noticeable clicking noises.
A technology that can guarantee transmission characteristics such as delay and jitter is re-
quired to be able to guarantee the quality of delay- and loss-sensitive applications like tele-
phone calls and live television.
16.8 ATM
For a long time, Asynchronous Transfer Mode (ATM) was thought to be the answer to all of the
requirements for guaranteeing different transmission characteristics for voice, video and data
interspersed on the same circuit.
Unfortunately, ATM became very complicated and very expensive and is no longer used for
new deployments.
This section provides an overview of ATM and its jargon before moving on to its replacement,
MPLS in the next section.
242
Figure 163. ATM
ATM is similar to X.25 and Frame Relay, transferring cells (instead of packets or frames) of in-
formation over virtual circuits. The difference is that ATM was supposed to be able to guaran-
tee suitable transmission characteristics for any type of traffic: telephone calls, television, busi-
ness data, web pages, e-mail or anything else, to achieve the goal of integration or conver-
gence, everything on one network.
16.8.1 Future-Proof Technology (Not)
Some even were claiming that ATM was future-proof, supporting switched virtual circuits for
flexibility, scalable to arbitrarily high line speeds and supporting any type of traffic. There would
be no technology after ATM.
Unfortunately, this did not happen. If it had, people would be discussing “Voice over ATM” in-
stead of “Voice over IP”. ATM was used on carrier networks to achieve integration of all data
services, but it was never deployed on the PSTN to carry delay-sensitive telephone calls.
The establishment and management of Switched Virtual Circuits in ATM is so complicated that
it was rarely implemented – most often, manually-configured Permanent Virtual Circuits were
used. ATM became so cumbersome and expensive that it is headed for the dustbin of history,
replaced by MPLS and Differentiated Services.
16.8.2 ATM Cells
ATM packages data into 53-byte packets (called cells to confuse the innocent), consisting of
48 bytes of data and a 5-byte header. Three of the bytes in the header are a virtual circuit ID
used to route the cell.
16.8.3 Service Classes
ATM implemented Quality of Service (QoS), allowing the specification of service classes for
virtual circuits. This allowed the integration of many services over the physical circuits that
make up a network (e.g. 10 Gb/s OC192) by establishing ATM virtual circuits between numer-
ous types of network and edge equipment across the physical circuits and assigning a service
class to each.
On an ATM virtual circuit, the user agrees to a traffic profile: the number of bits per second
steady-state, the maximum short-term burst rate, how long it can last and how often it can hap-
pen.
In exchange, the network guarantees transmission characteristics like delay, variability in de-
lay, number of errored bits and so forth.
ATM Service Classes were a set of standardized choices for traffic profile and transmission
characteristics:
243
• Continuous Bit Rate for constant bit rate traffic with fixed timing, typically for full-period ser-
vice emulation.
• Variable Bit Rate - Real Time for variable bit rate traffic with fixed timing; for example,
phone calls and television. This was never deployed in practice on the PSTN, and here ATM
failed to meet the objective of service integration and convergence.
• Variable Bit Rate - Non-Real Time for variable bit rate traffic with no timing relationship be-
tween data samples, but requiring guaranteed average bandwidth. This was used to inte-
grate traffic for all data services, including Frame Relay and IP, on the core.
• Available Bit Rate (ABR): “best efforts” service, where flow control is used to increase and
decrease the capacity allowed to the user based on available network capacity. Designed to
transport LAN-LAN communications, which opportunistically use as much bandwidth as is
available from the network.
• Unspecified Bit Rate (UBR): no guarantees. The user is free to send any amount of data up
to a specified maximum while the network makes no guarantees at all on the cell loss rate,
delay, or delay variation that might be experienced.
When setting up a virtual circuit, ATM switches implement an algorithm called Connection Ad-
mission Control (CAC) to determine if it is possible to deliver a requested service class.
Using link parameters and end-to-end connection metrics, the switch determines whether ac-
cepting “just one more” connection would impact its ability to meet Service Class guarantees
for existing virtual circuits.
The network can enforce a traffic profile by traffic policing. The ATM switch will meter an in-
coming stream to confirm it is respecting the agreed traffic profile. A switch can either discard
out-of-profile cells or tag them by setting a Cell Loss Priority bit in the cell header, marking the
cell to be first to be discarded should there be congestion in the network.
ATM switches from companies like Nortel, Lucent and Cisco that implemented CAC and traffic
policing cost $800,000 or more in 1995 dollars each, plus yearly license fees and upgrades.
16.9 MPLS
IP is firmly established as the standard protocol for networking… but in itself, does not have
any way of implementing performance guarantees measured by characteristics like packet de-
livery rate and delay.
16.9.1 MPLS vs. TCP
TCP can deal with non-delivered packets, implementing communication between the source
and destination for delivery confirmations and retransmission of non-delivered data.
But TCP only retransmits lost data; it does not influence the packet delivery rate or end-to-end
delay, both of which are critical for telephone calls and live video over IP as well as business
data services.
To control packet delivery rate and delay, a traffic management system is required to manage
and prioritize flows of IP packets.
Multi-Protocol Label Switching (MPLS) is used for this purpose, providing network operators
with IP packet traffic management using virtual circuits.
MPLS concepts are the same as other virtual circuit technologies X.25, Frame Relay and ATM
covered in the preceding sections, and the general concepts of Section 16.5 “Virtual Circuit
Technologies”… but the jargon is changed.
16.9.2 Forwarding Equivalence Class
For “traffic class”, MPLS uses the term Forwarding Equivalence Class (FEC) to mean a group
of packets that are forwarded over the same path with the same forwarding treatment.
16.9.3 Labels
Instead of “virtual circuit ID”, labels are used to identify a FEC.
In IPv4, the label is typically contained in an MPLS Shim Header, which is four bytes of extra
overhead prepended to the IPv4 packet. Twenty bits are used for the label, three bits for exper-
imental functions, one bit to indicate “last label” in a stack, and eight bits for time to live.
244
In IPv6, the label can reside in the “Flow Label” field in the packet header defined for this pur-
pose.
A packet can have multiple labels, organized on a last-in, first-out basis, called the label stack.
This allows a hierarchy of FECs, and aggregation of traffic by type (e.g. telephone calls, televi-
sion, web pages, bit torrent) so all of the instances of a single type of traffic can be managed
as a single entity in the core. The processing is always based on the top label, regardless of
whether any others might be “below” it.
245
ment at the exit from the carrier network, before the IP packet is delivered to the user. The user
never sees MPLS labels.
16.9.7 Label-Switching Routers
The routing devices internal to an MPLS network are Label Switching Routers (LSRs). These
devices use the value of the topmost label on a packet to look up the forwarding and possibly
prioritization instructions for the packet, then forward the packet.
Making the routing decision a table lookup rather than a complicated algorithm, minimizes de-
lay through the LSR and facilitates control of routing via an external system populating the con-
tents of the table.
In the LSR, the Incoming Label Map is the “lookup table”, indexed by label number. The Next
Hop Label Forwarding Entry is an entry in the Incoming Label Map that contains information on
forwarding a labeled packet: the next hop, what operation to perform on the label stack, and
can contain other information needed to properly forward the packet. There can be more than
one entry for a given label value.
The essential function of an LSR is label swapping. The LSR examines the label at the top of
the stack, and does a table lookup in the Incoming Label Map to get the Next Hop Label For-
warding Entry, then uses that information to encode a new label on the packet and forward it
on the appropriate outgoing link with the appropriate relative priority.
The labeled packet can be forwarded to the next LSR or LER over a data link running any kind
of layer 2 protocol, typically Ethernet.
246
A popular application for Internet VPNs is working from home, accessing servers at work over
the Internet. Internet VPNs are covered in Section 17.9.
16.10.4 MPLS VPN
MPLS VPNs are a different story. In the case of a VPN service provided by a carrier to a bank,
the bank’s traffic is not sent over the Internet between branches, it is sent over the circuits of
the carrier that is selling the service to the bank.
That carrier does control all the circuits over which the bank’s traffic travels end-to-end.
The carrier uses its MPLS traffic management system to define label-switched paths between
the bank’s buildings, and associate a Class of Service with each LSP. The LSP acts like a tun-
nel, carrying the customer traffic end-to-end.
This allows the marketing and sales departments to sell banks and government reliable IP
packet communication services, backed up with the Service Level Agreement they require.
Multiple such point-to-point IP packet communication paths connected with routers at each
bank building effectively implements a private network: the bank can only communicate be-
tween the locations where the LSPs are set up, and the traffic moving over these LSPs is not
visible to any other customers of the carrier. Plus, the carrier can guarantee transmission qual-
ity by prioritizing traffic on the LSP.
In this case (and any other case) the bank would encrypt their traffic before giving it to the car-
rier. The general rule in the security business is “if it is not encrypted, it has been released to
the public”.
Figure 165. MPLS VPNs. A carrier defines MPLS Label-Switched Paths between customer locations in pairs. A
Class of Service is associated with each LSP to implement performance guaranteed to the customer.
This service will eventually replace all existing carrier “business customer” data services like
“dedicated T1s” and Frame Relay.
247
then give classified packets appropriate forwarding treatment in terms of prioritization at each
hop in a DS-compliant network.
16.11.1 DS Codepoints
Packets are classified at the ingress or boundary of a network supporting DS, associating the
packet with a DS codepoint, which is jargon to mean “Class of Service”, and at the packet
level, “relative priority”.
In a DS router, each DS class is associated with a Per-Hop Behavior (PHB), defining the for-
warding behavior, i.e. transmission characteristics desired for that class.
☞
This only becomes meaningful when there is congestion: contention for available pro-
cessing and transmission resources.
Applying PHB criteria to DS classes assigns relative priorities to packets passing through a DS
router when contention occurs. The result is the ability to implement externally-observable CoS
in terms of bandwidth, delay, jitter and dropped packets.
16.11.2 Assured Forwarding and Expedited Forwarding
RFC2597 Assured Forwarding and RFC2598 Expedited Forwarding contain suggestions for
actual values for the DS codepoints, but appear to be largely academic exercises, defining
dozens of Classes of Service.
In practice, a carrier might implement three priority levels:
1. Telephone calls
2. Television programs and
3. Internet traffic.
A more sophisticated implementation might have eight priority levels, and so eight Classes of
Service, in order from highest to lowest:
1. Network control messages
2. Live telephone calls
3. Live streaming television programs
4. Live Internet web surfing
5. Video and music download
6. Email and other Internet traffic
7. Filler material like news headlines
8. Bit torrent peer-to-peer intellectual-property-stealing file-sharing traffic.
Since the classification is performed only at the input to a DS domain, the complex decision-
making process – deciding what QoS a packet should receive – is performed once. Subse-
quently, each DS router has a simpler decision-making process, based on actual traffic and
pre-assigned PHBs to determine relative priorities.
☞ This is very similar to MPLS labeling at the ingress to the network.
Considered separately, the MPLS label identifies the routing, and the DS codepoint identifies
the priority for a packet.
These two ideas can be combined by implementing multiple LSPs, all going from the same
place and to the same place, but each associated with a different DS priority level. Then, the
label on the packet is used by the router internal to the network to determine both the routing
and prioritization of the packet.
248
Figure 166. Differentiated Services
An alternate implementation is to keep the MPLS label and Diff-Serv codepoint separate. In
this case, the 6-bit DS codepoint is populated in the Type of Service field in the IPv4 packet
header, or in the Traffic Class field in the IPv6 packet header, and the network routers would
process the label and codepoint separately.
249
• Tie lines or a voice VPN with a custom dialing plan from an IXC for telephone calls to/from
other locations of the organization,
• Dedicated T1s from an IXC for data to/from other locations of the organization, and
• DSL, Cable or T1 access from an ISP for data, video and possibly voice to/from the Inter-
net.
16.12.1 SIP Trunking, VPN and Internet on One Access
As illustrated in Figure 168, moving to an all-IP environment, these four circuits can be re-
placed with one bill for one 10 Mb/s to 10 Gb/s Optical Ethernet access circuit with three traffic
classes, each identified with their own label number.
The three traffic classes / labels would be:
• A traffic class for telephone calls. This might be called a “SIP trunking service” by the mar-
keting department. This virtual circuit will carry VoIP phone calls to/from the carrier for com-
munication either in native IP format to/from other locations, or conversion to/from traditional
telephony for phone calls to/from the PSTN.
• A traffic class for data. This might be called a “VPN service” by the marketing department.
This virtual circuit carries file transfers, client-server database communications and the like
securely to/from other locations of the organization.
• A traffic class for Internet traffic. This virtual circuit carries anything in IP packets to/from
the Internet.
Figure 168. After: Integrated Access - One Access Circuit, Separate Labels
All of this traffic is IP packets interspersed over the single access circuit. The way the traffic is
distinguished is by classifying it on a piece of carrier equipment at the customer premise, tradi-
tionally called an Integrated Access Device (IAD), which in this case classifies the packet then
stamps the appropriate label on each packet.
At the other end of the access circuit, the carrier uses the label to route the traffic onward and
to prioritize it to assure the appropriate service level.
The result is all of the organization’s traffic carried over a single access circuit, using a single
technology. This is the Holy Grail of the telecommunications business, called convergence or
service integration, having significant advantages in cost and flexibility.
250
Consider an example of a bank with an MPLS VPN for data between major offices in New
York, DC and San Francisco. Each of these bank locations has a specific IP subnet, a unique
block of IP addresses. To emphasize the fact that these communications do not go over the In-
ternet, IP addresses in the private address space are used in the example.
251
The carrier does the same thing on the core.
When the packet arrives at the network end of the customer’s access circuit in New York, the
second label saying “all VPN data on integrated access” is removed as it is no longer meaning-
ful, and a new second label saying “all VPN data on core New York – DC” is added. Other
packets, labeled as VPN data from other customers, would also have this second label added.
The result of all having the same second label is all VPN data traffic New York - DC on the
core can be managed as a single entity: a single icon on a monitoring console at the NOC,
configured as a single Class of Service and single route in MPLS LSRs by the carrier.
At the other end, the core LSR in DC would remove the second label and replace it with a new
second label indicating data on the integrated customer access in DC.
The LER in DC, the egress device, would remove both labels and pass the packet to the cus-
tomer edge router at the bank building in DC for forwarding to the machine with private IP ad-
dress 192.168.102.8 in this example.
252
17
The Internet
17.1 A Network To Survive Nuclear War
The Internet has its roots in anarchy. It’s like some sort of fungus, spreading across the planet.
There are theories that it will become self-aware one day. The humans will try to unplug it, and
the network will retaliate by nuking the humans and hunting the survivors.
253
17.1.2 Al Gore Invents the Internet
The Internet started out as federally-funded data links connecting universities and research in-
stitutes like UC Berkeley, UCLA and MIT as well as defense establishments and defense con-
tractors.
The links between these locations were paid for by the government, and the universities and
research institutes. One of the government institutes was the National Science Foundation
(NSF), which paid for some of the most expensive links.
Al Gore was apparently instrumental in getting funding for the NSF approved, and in a moment
of weakness publicly stated that he had “invented the Internet”, words he quickly regretted.
The DARPA net was renamed the ARPA net, and then the Internet.
Today, the Internet is no longer just a national security project, but has gone global, and will
soon replace the telephone and television networks.
What started off as a small group of technically advantaged researchers and computer buffs
has turned into a network accessed by billions around the planet.
17.1.3 Who Pays for the Internet?
The government no longer pays for the links.
Telephone companies, broadband carriers, fiber backbone companies and other commercial
organizations provide the network connectivity at their expense, then bill for access to it and
packet delivery over it. Bigger companies bill smaller companies and users in a giant pyramid
scheme.
The end users end up paying for the Internet through monthly fees to their immediate service
provider for access and packet delivery.
17.1.4 Primitive Beginnings
The initial implementation of the DARPAnet was based on UNIX computer communications de-
veloped by UNIX computer programmers.
The DARPAnet had a Human-Machine Interface (HMI) developed by the computer program-
mers, which was more or less useless to the general public. It took very specialized knowledge
– and access – to use the network to ask people in Toledo what the weather was like there.
Luckily, this has been fixed with the Web and browsers, giving us a point-and-click, tap or
swipe Graphical User Interface (GUI).
Some things are taking longer to fix. In the beginning, UNIX only handled seven-bit bytes: 128
ASCII characters or a seven-bit number. The Internet email system, using unix commands,
could only transfer 7-bit bytes.
To be able to transfer an image made of eight-bit bytes (called “binary”), users or Internet email
programs had to transform the image into a file of 7-bit groups which could be coded as “text”,
then transform it back into 8-bit bytes at the receiver. This still happens to this day, but is auto-
mated.
The Internet was designed for data communications. Short, 7-bit ASCII text messages. Text
messages are not sensitive to delay and non-delivered packets can be retransmitted.
There were no mechanisms in the design to implement a guaranteed Class of Service... which
is necessary for packet loss and delay-sensitive applications like phone calls and streaming
video.
The addition of MPLS as a traffic management system internal to the network and invisible to
users provides this mechanism.
254
Figure 172. Need for an Inter-Net Protocol
17.2.1 Gateways
The devices that connected the local networks to the data circuits were called External Gate-
ways.
In general, gateway means protocol converter. These devices were called gateways because
they converted between different packet and network address protocols used at the different
universities and research institutes.
Today, these devices are called routers, and they do not convert packet formats or network ad-
dresses. The IP packet format and addressing scheme took over the world.
17.2.2 IP: Common Packet Format and Address Scheme
To send a message to a user on a network, it is necessary to know their network address. If
the destination is on a different network, there may be no method for finding out what their ad-
dress is, nor any way of actually transmitting a packet with an address in a different network’s
format from the source computer.
The Internet Protocol (IP) was the solution to this problem: network addressing and packet for-
mat that would be used by all parties.
To send a message to another user, the message is segmented into chunks and the IP ad-
dress of the destination is added to form packets. These IP packets were then transmitted from
one network to another, originally carried inside whatever packets were being used at each in-
stitution.
Subsequently the IP took over and all of the institutions adopted IP as the native packet for-
mat.
17.2.3 Connectionless
Each IP packet is treated by an IP router as being completely independent from any other.
Packets might follow different routes across various different networks and experience different
delivery delays depending on changing congestion conditions.
17.2.4 Unreliable
There were and are no guarantees on the Internet. Data can be corrupted, copied, or thrown
away. Bombs might fall. Routers and links might turn into fused glass. The network does not
provide any information on the status of a packet in transit.
17.2.5 Need for TCP
Strong end-to-end error checking implemented by the users is required to check to see if data
arrived, and if not, retransmit it.
This end-to-end error checking is implemented by users running the Transmission Control Pro-
tocol (TCP), which employs sequence numbers, error checks, source timers and positive ac-
knowledgments to implement reliability on the unreliable IP network.
255
17.2.6 Routing and ASes
A group of interconnected routers controlled by the same organization is called an Autono-
mous System (AS).
Routers require tables with values identifying what address to go to in order to get to a device
with an address within a particular range or subnet.
The values in the routing tables can be entered manually and/or learned from other routers.
The Routing Information Protocol (RIP) was first used to exchange routing tables between ad-
jacent routers in an AS every 60 seconds.
RIP was replaced with Open Shortest Path First (OSPF), which exchanges update messages
between all routers in an AS, but only when a change occurs.
The Border Gateway Protocol (BGP) is used to define routing between different Autonomous
Systems.
256
The networks are physically connected at Internet Exchange (IX) centers such as Equinix
Chicago at 350 E Cermak. These are buildings with equipment implementing network intercon-
nection operated by a neutral third party. The ASs are responsible for paying for connectivity to
the IX.
Peering is settlement-free, i.e. no money is exchanged. Packets are exchanged and forwarded
on a best-efforts basis.
Transit, assuring the delivery of packets, is a commercial service. Larger ISPs charge smaller
ISPs for transit services.
The largest networks are sometimes called Tier-1 service providers. “Tier-1” is not an officially-
defined term. A “Tier-1 network” might best be thought of as one operated by a large facilities-
based carrier that has a presence in most or all IXs on the planet.
Virtually all networks employ a mix of peering and transit agreements to connect to other net-
works. The exact nature of such connections is non-disclosed confidential business informa-
tion.
The ISPs build the access network and peering or transit connections to other networks, then
charge the users for access. It’s a pyramid scheme. The end users end up paying for all.
In addition to access services, the ISP provides a DHCP server to lend you an IP address valid
for use on the Internet, a Domain Name Server, and auxiliary services like e-mail servers and
web hosting.
17.3.4 Resellers
In the Flintstones era, when dial-up Internet access was first available, telcos were a bit slow to
react, so for a while, companies like Netcom, MindSpring, Portal, Pipeline, iStar and others
had their day in the sun.
These organizations were resellers, leasing circuits from a carrier and reselling them to users
under per-minute or per-month billing plans.
The carriers eventually began competing with resellers, who mostly went out of business, sell-
ing their customers to the carriers. For example, Netcom is now part of Earthlink, which is ma-
jority owned by Sprint.
For the most part, it is business units of the companies that own the cables coming into your
home – the LEC and the cable TV company – along with wireless carriers that are the ISPs to-
day.
Current reseller-type ISPs require a LEC or cable company to provide and install the physical
and network connection. They are essentially buying large blocks of carrier services at volume
discount rates, and reselling the carrier service at retail prices.
Deciding whether to use a reseller-type ISP involves evaluating the level and rapidity of cus-
tomer service as well as Class of Service guarantees versus any cost savings compared to
buying directly from the carrier.
257
Figure 174. The Web: Client-Server Computing: fishing net, spider web... many links tied together.
HyperText Markup Language (HTML) is the main standard for formatting web page files.
The browser client does not communicate with the web server for more than the download of a
one file at a time. The user or the browser implements navigating to other pages, page refresh
and session restoration.
17.4.2 Hyperlinks and URLs
Some of the text on the display will be underlined, indicating links. Associated with the text that
is underlined is a Uniform Resource Locator (URL), which identifies the file to download, along
with the name of the server it lives on and the protocol to use to get it.
Tapping or clicking the underlined text causes the browser to look in the page code for the ref-
erenced URL and go there to download the indicated files and display a new page.
These protocols have changed the Human-Machine Interfaces to the Internet from difficult key-
stroke-based and command-line interfaces to a point-and-click Graphical User Interface (GUI).
The unpleasant details of network addresses, file names and file transfers are mostly hidden
from users.
The default file that is transferred from a server if no file name is specified is called the home
page or index page, and has by default the name index.html. There is no difference between
an index page and any other page.
258
Figure 175. Domain Zone File entries
The domain zone file is a text file of records with the numeric IP address for the domain’s web
server, its email server, subdomains and others.
The Start of Authority (SOA) record indicates what domain this zone file is for. Address (A)
records match a domain name to an IP address. There are many other kinds of records includ-
ing Mail Exchange (MX) and text (TXT)records for application-specific information like the
server’s public key.
17.5.2 Name Resolution
When a person wants to access a server, they use an application-level program – typically a
browser – that provides the user interface and contains a web client, a DNS client and a re-
solver.
The user can learn the domain name of the desired server by reading it in an advertisement,
then typing it in the address bar of the browser. The user might also learn the domain name of
the server from a search engine like Google. The domain name is a major component of an
URL.
The IP address corresponding to that domain name is determined by a small program in the
browser called a resolver. The resolver sends a request to a Domain Name Server inquiring
what the binary IP address corresponding to the domain name is.
The numeric IP address of the server is returned as the response to the query, whereupon the
browser can start sending packets to the server at that IP address, with a message requesting
transfer of the desired file.
17.6 Hypertext
17.6.1 HTML
The language used in the files transferred for the World Wide Web is called HyperText Markup
Language (HTML).
As illustrated in the example of Figure 177, an HTML file is plain text, and includes both the
text to display and embedded formatting commands, similar to old word processing systems.
The browser interprets the file to produce the page displayed on the screen.
HTML files contain hypertext references (HREFs), which specify the name and location of
other files, in a standard format called a Uniform Resource Locator (URL) or Uniform Resource
259
Identifier (URI).
The URL describes the protocol which should be used to transfer this other file, the network
address, and the file name and type.
Along with the page text, HTML files can also contain directives to download and display im-
age files, video, sound and other media.
The HTML from Figure 177 when interpreted by the browser yields the page displayed to the
user in Figure 178. The HTML file has a separate entry for each of the images shown, and
each one has an associated HREF causing the browser to download and display a different
page when the image is clicked in the browser.
17.6.2 HTTP
The Hypertext Transfer Protocol (HTTP) includes commands that a client browser can send to
a web server. The most popular command is GET.
For example, “GET /online-courses-previews.htm HTTP/1.1” is an actual command sent to the
server of the page in Figure 178. Presumably, this command was generated by the browser
when the user clicked text saying “free previews” that had that URL in an HTML HREF tag.
The server would return an HTTP response message that included the indicated file. Other
HTTP response messages include the familiar 404 Not Found and 500 Internal Server Error.
There are many others.
HTML is now ubiquitous, used for defining the screens in many Graphical User Interfaces
(GUIs).
260
Figure 178. Web page
261
17.7.2 MIME
Now this function is automated: the sender’s e-mail program automatically transforms any “bi-
nary” elements of the message into “text” and tags the result with header information the re-
ceiver requires to perform the reverse transformation.
This is described in detail in RFC 2045: Multipurpose Internet Mail Extensions (MIME). MIME
defines a number of header fields that are used to describe the content of a message.
The Content-Type header field specifies the nature of the data in the body of an entity by giv-
ing media type and subtype identifiers.
17.7.3 Quoted-Printable
Two transforms are often used: quoted-printable encoding, and base-64 encoding. Quoted-
Printable Content-Transfer-Encoding is intended to represent data that largely consists of
octets that correspond to printable characters in US-ASCII. Octets with decimal values of 33
through 60 inclusive, and 62 through 126, inclusive, may be represented as the US-ASCII
characters that correspond to those octets. Any octet, except a CR or LF may be represented
by an “=” followed by a two digit hexadecimal representation of the octet’s value.
17.7.4 Base64 Encoding
The base64 transformation is premised on the fact that 3 x 8 = 4 x 6. As illustrated in Figure
179, three octets of the image file are re-packaged into four groups of six bits each.
Since 26 = 64, any combination of 1s and 0s in each of the groups can be represented by one
of 64 printable ASCII characters, hence the name of the transformation.
The result can then be transmitted as if it were plain text. In fact, as if it were a telex message
from the 1970s. Telex was a service that transmitted short text messages, the improvement on
telegrams.
262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-
fip+KlxuXG5cbg0KTEFTVC1NT0RJRklFRDoyMDEyMDYwNVQxMzUzNDhaDQpMT0NBVElP
TjoNClNFUVVFTkNFOjANClNUQVRVUzpDT05GSVJNRUQNClNVTU1BUlk6SXNsYW5kDQp
UUkFOU1A6VFJBTlNQQVJFTlQNCkJFR0lOOlZBTEFSTQ0KQUNUSU9OOkRJU1BMQVkNC
kRFU0NSSVBUSU9OOlRoaXMgaXMgYW4gZXZlbnQgcmVtaW5kZXINClRSSUdHRVI7VkFM
VUU9REFURS1USU1FOjIwMTIwNjE1VDE2NDUwMFoNCkVORDpWQUxBUk0NCkVORDpW
RVZFTlQNCkVORDpWQ0FMRU5EQVINCg==
--f46d044787ffe35c5304c1b9fae7--
Running that “text” through a base64 decoder yields the application-level calendar invite mes-
sage interpreted as 8-bit bytes:
BEGIN:VCALENDAR
PRODID:-//Google Inc//Google Calendar 70.9054//EN
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:REPLY
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220616
DTEND;VALUE=DATE:20220618
DTSTAMP:20120605T135349Z
ORGANIZER:mailto:[email protected]
UID:040000008200E00074C5B7101A82E0080000000030B5520D-
F442CD01000000000000000
01000000054E223AC47E23943B3D633C2D1951BB9
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=AC-
CEPTED;CN=Eric V
anasse;X-NUM-GUESTS=0:mailto:[email protected]
CREATED:20120605T122103Z
DESCRIPTION:When: Saturday\, June 16\, 2022 12:00 AM to Monday\, June 18\,
2022 12:00 AM (UTC-05:00) Eastern Time (US & Canada).\n\nNote: The GMT offset above
does not reflect daylight saving time adjustments.\n\n*~*~*~*~*~*~
*~*~*~*\n\n\n
LAST-MODIFIED:20120605T135348Z
LOCATION:
SEQUENCE:0
STATUS:CONFIRMED
SUMMARY:Island
TRANSP:TRANSPARENT
BEGIN:VALARM
ACTION:DISPLAY
DESCRIPTION:This is an event reminder
TRIGGER;VALUE=DATE-TIME:20120615T164500Z
END:VALARM
END:VEVENT
END:VCALENDAR
263
This section covers VoIP phone calls where at least one end has an Internet connection in-
stead of a POTS line.
17.8.1 VoIP Service Provider (VSP)
With “net to phone” services, packetized voice travels over the Internet to a gateway, which
converts VoIP to regular telephony and connects it an Inter-Exchange Carrier or directly to a
Local Exchange Carrier, eventually connecting the VoIP call to someone with a regular phone
line over the LEC’s access network.
This type of telephone service provider could be called a VoIP Service Provider (VSP). Vonage
is currently the most visible player, charging a monthly fee. Google provides the service for
free in their messaging app.
264
free.
Eventually, there will be industry standards and formal agreements (called tariffs) for exchang-
ing VoIP packets and using SIP call setup.
This may take some time, as the extensive existing reliable, proven infrastructure and industry
standard practices to support this must be completely renewed for VoIP.
Elements that have to be agreed on are standards for voice coding; standards for call signal-
ing, setup and termination; agreements on what network addresses are reachable; standards
for call quality and how it will be measured; standards defining when a call begins and ends;
standard methods of rating and billing calls… to name a few.
17.8.3 Adapters
Only a small portion of residential customers will have a computer with a headset for making
native VoIP phone calls. The solution for the VSP is to supply an adapter to connect the cus-
tomer’s POTS phones to the customer’s Internet connection.
This adapter is a gateway, converting between POTS at the customer premise to VoIP for the
Internet. It includes computer functions: LAN and IP network protocols, analog-digital conver-
sion, speech coding and VoIP protocols, plus provides jacks to plug in regular telephones.
17.8.4 Cost Savings
VSP phone service is lower cost than POTS for several reasons:
a) The switched access charges added by the LEC to any long-distance phone call are
avoided – at the originating end in the example illustrated.
b) This telephone service occurs over a data service (the Internet connection), not over a
POTS line, so avoids regulation and fees imposed on POTS.
c) There are no “long distance” charges to locations the VSP serves.
265
Figure 181. Internet VPN using IPsec
As illustrated in Figure 181, any IP packets leaving the near-end secure network and destined
for the far-end secure network are intercepted by the near-end VPN hardware, encrypted, then
packaged or encapsulated inside another IP packet that is addressed to the far-end VPN hard-
ware and transmitted across the non-secure IP network.
The far-end VPN hardware receives these packets and decrypts the contents, extracting the
original packet and routing it on its way in the far-end private system. This encrypt-transmit-de-
crypt process is referred to as tunneling, and the point-to-point communications called a tun-
nel.
17.9.3 Hardware
The IPsec protocols can be implemented on special-purpose stand-alone hardware (“VPN
hardware”) to serve multiple users, to increase speed, and implement a higher level of security
compared to running the protocols on a shared Windows-based computer. This would be a
typical choice at a customer’s building.
For people working from home or on the road, the IPsec protocols are of course implemented
in software that runs on a PC or laptop. In this case, the PC is the “VPN hardware”.
This is slightly less secure than dedicated-purpose hardware, as the PC runs on the Windows
operating system that may have security weaknesses, the IPsec software shares memory with
other applications, which might be exploited to defeat the IPsec software, and the security is
dependent on the individual user to ensure proper configuration.
266
Appendix A
T1
This appendix provides detailed information on the carrier system technology called T1. These
discussions used to be a principal part of telecommunications courses, but are now relegated
to the back of the book, as T1 is a copper-wire technology running at 1.5 Mb/s.
That said, there are thousands of T1 circuits installed and in use, and some readers of this ref-
erence book have picked it up precisely to learn about T1 because they have been tasked with
supporting it, or auditing an existing installation.
Power companies, the military and government still have T1s in place, along with T1s at big or-
ganizations that are no longer being used, but have been forgotten and are still being paid for
each month... a small but appreciated part of any phone company’s revenue.
Another remaining use of this chapter on T1 is a detailed explanation of synchronous Time-Di-
vision Multiplexing, framing and channels.
Since the principles of operation of legacy SONET fiber-optic transmission systems are the
same as T1, learning about T1 is also learning about SONET.
Chapter 5, “Digital” should be read before this one.
☞
If you do not need to know about T1 or channelized time-division multiplexing, feel free
to skip this Appendix.
267
hardware ports, each one running at 64 kb/s.
The multiplexer’s aggregate or high-speed output connects to a CSU.
The CSU is the interface device connecting the T1 multiplexer and the actual T1 circuit. This
device is the one that represents binary digits on the physical T1 circuit. It performs the same
functions as a modem – but since it is a digital device, it is not called a modem (Section 11.6).
The T1 circuit is four copper wires, two for each direction.
Binary digits are represented on these copper wires using pulses of voltage following a line
code called AMI, covered in Section A.5.
Repeaters are spaced every 6 kft (1 mile / 1.6 km) along the T1 circuit.
A.3 Operation
A T1 system works in a strict, ordered rotation, where each user transmits one byte at a time.
First, the user attached to hardware port 1 on the multiplexer gets to use the outgoing high-
speed aggregate circuit to transmit a byte to the corresponding port 1 output at the other end.
Then, port 2 sends a byte, then port 3, and so on down the line in strict order, until port 24
sends a byte.
Then, one extra bit called the framing bit is transmitted, marking the end of the batting order,
and the process repeats: port 1 sends a byte, port 2 sends a byte and so on. The process re-
peats 8,000 times per second.
The bytes from each port are interspersed or interleaved on the T1, and so it is called a byte-
interleaved system.
At the far end, the high-speed aggregate circuit is plugged into a demultiplexer, which directs
each byte to the correct output hardware port one at a time.
The entire system is two-way simultaneous: both directions at the same time. When we say
“input”, we should really say “input and output”… but it is easier to discuss it one direction at a
time.
The end result is to communicate 24 DS0s, that is, 24 64 kb/s channels in both directions at
the same time over four copper wires.
268
A.4 T1 Framing
To ensure that each user ends up with a fixed fraction of the capacity of the high-speed circuit,
a channel, the users transmit one byte at a time, one after another in a strict order as illus-
trated at the top of Figure 183.
After each cycle, a framing bit is transmitted. The framing bit is used at the far end to locate
each user’s bytes in the incoming bit stream, to direct each byte to the correct output.
A byte from each port plus a framing bit makes up a T1 frame.
A T1 frame is 24 channels x 1 byte/channel x 8 bits/byte + 1 framing bit = 193 bits long.
Frames are transmitted 8,000 times per second.
269
The receiving multiplexer has now found the framing bits, and frame synchronization is
achieved.
The receiving multiplexer now knows which byte goes to which output, and at this moment, all
of the data on the outputs becomes valid.
This process usually happens once, when the circuit is turned up.
This idea is referred to in general as framing, and this technique is called Superframe Format
or D4 format in particular after a type of AT&T equipment.
A.4.2 ESF
An improvement called Extended Superframe Format (ESF) or D5 format was made to the
original design, for more efficient use of the framing bits.
The rationale behind Extended Superframe Format is that it was not really necessary to have
one bit per frame = 8 kb/s for framing, so only some of those framing bit positions would actu-
ally be used for framing, and the rest could be used for other functions, like error checking and
reporting.
ESF groups T1 frames in groups of 24, and uses 2 kb/s for framing, 2 kb/s to perform a CRC-6
(Section 12.5.6) on each frame and provide a 4 kb/s free data channel between the multiplex-
ers.
This data channel is often referred to as the Facility Data Link (FDL).
It is used to report the results of the CRC check and other performance parameters down the
line. AT&T Technical Publication 54016 and ANSI T1.403 are standards for use of the FDL.
270
A.5.1 Repeaters
A pulse is energy applied to a circuit by the transmitter for a pre-determined length of time. At
the receiver, we wish to make a simple decision: whether a pulse is happening or not.
However, as the energy which is the pulse travels over the physical medium between transmit-
ter and receiver, it will be degraded due to the imperfect nature of the physical medium.
On a T1 system, a pulse is voltage carried on copper wires… and the voltage is attenuated by
the resistance of the copper wires. This is exactly the same problem encountered when dis-
cussing analog techniques and maximum loop lengths in Section 5.7.1.
The shape or envelope of the pulse will also be distorted, with the corners rounded by the ca-
pacitance of the wires.
If the distance between the transmitter and receiver is such that the pulse will become so badly
degraded that it is not possible to make a reliable decision whether a pulse is happening or
not, it is necessary to regenerate the pulse at intermediate points using a repeater.
271
Later, carriers started using the Global Positioning System (GPS) satellites to derive their own
master clocks.
In 1958, there were not any central network clocks nor GPS satellites. Timing was kept by re-
synchronizing on the rising edges of the pulses that are the AMI line code.
Every time a pulse happened, its rising edge was used to pull wayward devices back into
alignment if they had drifted a bit.
Since the system uses pulses for synchronization, there is a requirement to send a certain
number of pulses down the line; and since pulses are caused by sending 1s, this boils down to
a requirement to send a certain number of 1s down the line.
This is referred to as the Ones Density Rule. A simplified version of this rule is that there must
be at least one 1 per byte to keep synchronization.
The designers of the T1 system in 1958 came up with an inelegant solution to this require-
ment: they made the multiplexers always set the least significant bit of most of the channels to
a 1.
This was called bit robbing... the network appropriated one of the eight bits in every byte for
network clocking purposes.
Except in frames 6 and 12 of the Superframe; these positions are reserved for supervision sig-
naling for voice trunks.
The interested voice communications reader may want to note that these bit positions usually
hold digitized versions of the E&M signaling leads from the analog trunks that the T1 carrier
system replaced. These bits are referred to as the A and B signaling bits respectively.
If the system is carrying digitized voices, which was its original intent, the effect is to add in a
bit more quantization noise to the voice signal, because half the time the received signal is in
error by one level.
A human being cannot hear this happening on a voice call. Since T1 was designed for voice
only, it was deemed at the time that this robbing of one of the bits for network synchronization
purposes was acceptable.
☞
This has nothing to do with “56K” modems. “56K” modems and 56 kb/s digital data cir-
cuits are different things.
272
special line code is inverted.
This code is special, because it causes pulses of the same polarity to occur one after another:
in effect, we have created an exception to the alternating rule to mean eight zeros in a row.
When this special code is received at the far end, it is interpreted to mean a byte with 8 zeros
in it. This technique is known as Bipolar Eight Zero Substitution (B8ZS).
The result is that the LSB in each byte is not molested by the transmission system, and so the
user can employ this bit to transmit data, resulting in being able to employ all eight bits of each
byte for data transmission.
This capability was referred to as clear channels in the business. At eight thousand per sec-
ond, the result is 64,000 bits per second or 64 kb/s per channel for data communication.
273
Figure 187. T1 Provisioning
As illustrated in Figure 187, T1 is a 4-wire copper circuit running from the local phone com-
pany’s building (usually a Central Office) to the customer premise.
At the customer side, the wires are terminated on a Channel Service Unit (CSU), which pro-
vides an interface for the customer’s multiplexer.
At the Central Office, the wires are terminated on an Office Channel Unit, which performs the
same functions. If obtaining service from an Inter-Exchange Carrier for a long-distance circuit,
the service will be carried through the local phone company’s CO to the IXC’s Point of Pres-
ence.
A 1/0 multiplexer, with DS1 on one side and DS0s on the other, can be located at the customer
premise. The T1 carries the DS1 to the CO. Fiber backbone transmission systems carry multi-
ples of DS3-rate signals, not DS1s, and so at the CO, the information on the T1 will be com-
bined with many other DS1-rate streams to form a DS3-rate stream by a 3/1 multiplexer.
These DS3-rate streams are then moved long distance over fiber.
At the far end, the reverse process takes place with similar equipment and cabling. If the other
end is in Europe, the signal may be delivered as an E1 over the CEPT-1 carrier system.
A.8.1 HDSL
For advanced readers: T1 as such was not actually used for many T1 services (!) An issue
with T1 is that it requires repeaters: the first one at 3,000 feet, and every 6,000 feet thereafter.
274
Repeaters are expensive to install and maintain. Variations on T1 that do not require repeaters
up to 12,000 feet were developed.
These technologies are called High-Speed Digital Subscriber Line (HDSL). [not related to resi-
dential DSL].
When someone said, “we have a T1” from here to there, this might have been wholly inaccu-
rate. They had HDSL access and SONET transport, and no T1 technology at all.
It would be more accurate to say, “we have a full-period DS1-rate service” from here to there.
But “T1” is short and catchy-sounding…
275
channels that are being used, and insert them into a DS1 with other customers, to make up a
DS1 with all channels used.
This piece of equipment is called a Cross-Connect, a Digital Cross-Connect System (DCS) or
Digital Access and Cross-Connect System (DACS).
It takes fractional DS1s from a number of customers to make up a full DS1. This DS1 then is
multiplexed into a DS3 and carried over the backbone just as for full T1 service in the previous
section.
At the far end, the same equipment is required, and the reverse process happens, picking out
the right DS0s and sending them over a T1 to the far end customer premise.
This is a good illustration of difference between “T1” and “DS1”. T1 is the physical layer proto-
col for physically cabling together the OCU and CSU. DS1 is the rate of signal that it carries.
The DS1 can be split into individual DS0s. The T1 is four wires.
276
Figure 189. Subrate Data Services
The terms CSU, DSU and CSU/DSU are often interchanged. Most people in the business
called all three devices a “CSU/DSU” without knowing the official definitions:
• A CSU was the circuit-terminating equipment for a T1.
• A DSU was a line extender for extending single channels from the CO to the customer.
This is called a tail circuit, since the DSUs are on the slow side of the multiplexer.
• A CSU/DSU is a DSU that can also signal control information to the network, used for
switched 56 kb/s services, which were called Dataphone Digital Services (DDS).
277
Appendix B
Voice Services and Jargon
B.1 Local Voice Services
This appendix provides a high-level overview of popular local and long-distance voice services,
and explains some of the associated jargon.
B.1.7 Access
278
One of the most important functions after dial tones: the local phone company provides the ac-
cess to long-distance carriers.
Long-distance phone calls are digitized on the CO switch or remote owned by the LEC, then
multiplexed together into DS3-rate streams to be placed on a SONET fiber connection to a toll
switch owned by an Inter-Exchange Carrier.
B.2.6 WATS
Current services include WATS, which stands for Wide Area Telephone Service and is volume
discounts on outgoing long distance calls.
800 service used to be called INWATS, and is the same thing as WATS except that the called
party pays... and has a volume discount. Of course, 888, 877 and 866 are also used for these
toll-free calls.
279
These kinds of services are sometimes referred to as Advanced Intelligent Network (AIN) ser-
vices.
The Signaling System Seven (SS7) control network, which is made up of computers and data-
bases connected to telephone switches in COs and toll centers provides the infrastructure
which allows the deployment of these services.
A trigger can be associated with a particular telephone number, telling the switching system to
perform a database lookup via the SS7 network to determine the routing for that particular call.
☞ Caveat: VPN means abbreviated dialing when used in context of voice services, and
secure packet data communications when used in context of IP networks. Even though
these two ideas have the same name, they are completely different concepts.
280
Appendix C
Acronyms and Abbreviations
10BASE-2 Thinwire Ethernet LAN
10BASE-5 Ethernet LAN
10BASE-T 10 Mb/s Baseband Ethernet LAN on Twisted Pair
100BASE-T 100 Mb/s Ethernet LAN on Twisted Pair
1000BASE-T 1 Gb/s Ethernet LAN on Twisted Pair
1xEV-DO 1X Evolution, Data-Optimized
3GPP Third Generation Partnership Project
ABR Available Bit Rate
ACD Automated Call Distributor
ACK Acknowledgment
ACR Attenuation to Crosstalk Ratio
ADCCP Advanced Data Communication Control Procedures
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AIN Advanced Intelligent Network
AM Amplitude Modulation
ANI Automatic Number Identification
ANSI American National Standards Institute
AON Active Optical Network
AP Access Point
ARIN American Registry for Internet Numbers
ARP Address Resolution Protocol
AS Autonomous System
ASK Amplitude Shift Keying
ASN Autonomous System Number
ATM Asynchronous Transfer Mode
b/s bits per second
BGP Border Gateway Protocol
BPV Bipolar Violation
BRI ISDN Basic Rate Interface
BST Base Station Transceiver
BTS Base Transceiver Subsystem
CAC Connection Admission Control
CAT Category
CATV Cable TV or Community Antenna Television
CCITT Comité Consultatif International de Téléphone et de Télégraphe
CD Collision Detection
CD Compact Disc
CDMA Code Division Multiple Access
CIDR Classless Inter-Domain Routing
CIF Common Interface Format
CLEC Competitive Local Exchange Carrier
CO Central Office
CoS Class of Service
CP Customer Premise
CPE Customer Premise Equipment
CRC Cyclic Redundancy Check
CSMA-CD Carrier Sensing Multiple Access with Collision Detection
CSU Channel Service Unit
CTNS Certified Telecommunication Network Specialist
CWDM Coarse Wave-Division Multiplexing
DACS Digital Access and Cross-Connect System
DARPA Defense Advanced Research Projects Agency
DCE Data Circuit-terminating Equipment
DCS Digital Cross-connect System
DF Don’t Fragment
DHCP Dynamic Host Configuration Protocol
DLCI Data Link Connection Identifier
DMS Digital Multiplex Switch
DNS Domain Name System
DOCSIS Data over Cable System Interface Specification
DoIP Data over IP
281
DPSK Differential Phase Shift Keying
DS Differentiated Services
DS0 Digital Service Level 0: 64 kb/s
DS0A Subrate multiplexing scheme “A”
DS0B Subrate multiplexing scheme “B”
DS1 Digital Service Level 1: 1.5 Mb/s
DS2 Digital Service Level 2: 6.3 Mb/s
DS3 Digital Service Level 3: 45 Mb/s
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DTE Data Terminal Equipment
DTMF Dual Tone Multiple Frequency
DTU Digital Terminal Unit
DVD Digital Versatile Disk
DWDM Dense Wave Division Multiplexing
EBCDIC Extended Binary Coded Decimal Interchange Code
EIA Electronic Industries Association
EMI Electro-Magnetic Interference
eNB Enhanced Network Base Station
EoMPLS Ethernet over MPLS
EPC Evolved Packet Core
ESF Extended Superframe Format
ESN Electronic Serial Number
ETSI European Telecommunications Standards Institute
FCS Frame Check Sequence
FDL Facility Data Link
FDM Frequency Division Multiplexing
FDMA Frequency Division Multiple Access
FEC Forward Error Correction
FEC Forwarding Equivalence Class
FM Frequency Modulation
FRAD Frame Relay Access Device
FSA Fiber Serving Area
FSK Frequency Shift Keying
FTP File Transfer Protocol
FTTH Fiber to the Home
FTTN Fiber to the Neighborhood / Node
FTTP Fiber to the Premise
FX Foreign Exchange
G Giga = 109 = Billion (US), Thousand Million (UK)
GB Gigabyte = 1030 bytes
Gb/s Gigabit per second
GHz Gigahertz
GPON Gigabit Passive Optical Network
GPRS General Packet Radio System
GPS Global Positioning System
GSM Global System for Mobile Communications
GUI Graphical User Interface
HD High Definition
HDLC High-level Data Link Control protocol
HDSL High-Speed Digital Subscriber Line
HFC Hybrid Fiber-Coax
HMI Human Machine Interface
HSDPA High Speed Downlink Packet Access
HSPA High Speed Packet Access
HSUPA High Speed Uplink Packet Access
HTTP Hypertext Transport Protocol
HTTPS Secure Hypertext Transport Protocol
Hz Hertz = cycles per second
IAB Internet Advisory Board
IAD Integrated Access Device
IANA Internet Assigned Numbers Authority
IC Integrated Circuit
IDEN Integrated Digital Enhanced Network
IEC International Electrotechnical Commission
IEEE Institute of Electrical and Electronic Engineers
IETF Internet Engineering Task Force
ILEC Incumbent Local Exchange Carrier
IMT International Mobile Telecommunications
IMT-2000 International Mobile Telecommunications 2000 (3G)
IMT-DS IMT-Direct Spread (UMTS, W-CDMA)
282
IMT-MC IMT-Multicarrier (CDMA2000, 1X)
INWATS Incoming Wide Area Telephone Service
IP Internet Protocol
IP-PSTN IP Packet-Switched Telecommunications Network
IPsec IP Security
IPTV Television over IP
IPv4 IP version 4
IPv6 IP version 6
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISP Internet Service Provider
ISUP ISDN User Part
ITU International Telecommunications Union
IVR Interactive Voice Response System
IX Internet Exchange
IXC Inter Exchange Carrier
JPEG Joint Photographic Experts Group
k kilo = 103 = thousand
K 210 = 1024
kb kilobit = 1,000 bits
KB Kilobyte = 210 bytes = 1024 bytes
kft kilofeet = 1000 feet
λ lambda (wavelength)
L2 Layer 2
L3 Layer 3
LAN Local Area Network
LATA Local Access and Transport Area
LD Long Distance
LEC Local Exchange Carrier
LED Light-Emitting Diode
LEO Low Earth Orbit
LER Label Edge Router
LLC Logical Link Control
LMS Local Measured Service
LSB Least Significant Bit
LSP Label-Switched Path
LSR Label-Switching Router
LTE Universal Terrestrial Radio Access Network Long Term Evolution
LX Long Wavelength
LZW Lempel – Ziv –Welch
M Mega = 106 = Million
M.Eng. Master of Engineering
MAC Media Access Control
MAN Metropolitan Area Network
Mb Megabit = 1,000,000 bits
MB Megabyte = 220 bytes = 1,048,576 bytes
MF Multifrequency
MF Mainframe
MHz Megahertz
micro (m) 10-6
milli (m) 10-3
MIME Multipart Internet Mail Extensions
MIMO Multiple-Input, Multiple-Output
MPEG Moving Picture Experts Group
MPLS Multiprotocol Label-Switching
MSA Multiple Sourcing Agreement
MSB Most Significant Bit
MTP Message Transfer Part
MTSO Mobile Telephone Switching Office
MUX Multiplexer
MX Mail Exchanger
nano (n) 10-9
NAT Network Address Translator
NCTE Network Circuit Terminating Equipment
NHLFE Next Hop Label Forwarding Entry
NIC Network Interface Card
NMT Nordic Mobile Telephone System
NOC Network Operations Center
NSF National Science Foundation
NT1 Network Termination type 1
283
NTSC National Television Standards Committee
OC Optical Carrier (SONET)
OC3 OC level 3 = 3 DS3s
OC48 OC level 48 = 48 DS3s
OCU Office Channel Unit
OE Optical Ethernet
OFDM Orthogonal Frequency-Division Multiplexing
OLT Optical Line Terminal
ONT Optical Network Terminal
ONU Optical Network Unit
OPI Outside Plant Interface
OPX Off-Premise Extension
OSI Open Systems Interconnect
OSPF Open Shortest Path First
PABX Private Automated Branch Exchange
PBX Private Branch Exchange
PC Personal Computer
PCM Pulse Code Modulation
PCS Personal Communication Services
PDU Protocol Data Unit
PHB Per-Hop Behavior
PIC Preferred Inter-exchange Carrier
pico (p) 10-12
PON Passive Optical Network
POP Point of Presence
POP Post Office Protocol
POTS Plain Ordinary Telephone Service
PRI ISDN Primary Rate Interface
PSK Phase Shift Keying
PSTN Packet-Switched Telecommunications Network
PSTN Public Switched Telephone Network
PTT Post Telephone and Telegraph
PVC Permanent Virtual Circuit
QAM Quadrature Amplitude Modulation
QoS Quality of Service
QPSK Quadrature Phase Shift Keying
RBHC Regional Bell Holding Company
RBOC Regional Bell Operating Company
RFC Request for Comments
RIR Regional Internet Registry
RPR Resilient Packet Ring
RSA Rivest Shamir Adelman
RTP Real-Time Control Protocol
RTP Rusty Twisted Pair
SAC Subscriber Area Concept
SCP Service Control Point
SD Standard Definition
SDH Synchronous Digital Hierarchy
SDLC Synchronous Data Link Control
SDSL Symmetric Digital Subscriber Line
SFP Small Formfactor Pluggable
SIM Subscriber Information Module
SIP Session Initiation Protocol
SLA Service Level Agreement
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOA Start of Authority
SONET Synchronous Optical Network
SPI Stateful Packet Inspection
SRC Source
SSH Secure Shell
SSID Service Set ID
SSL Secure Socket Layer
SSP Service Switching Point
STM Synchronous Transport Module
STP Signal Transfer Point
STS Synchronous Transport Signal
SVC Switched Virtual Circuit
SX Short Wavelength
T Tera = 1012 = Trillion (US), Billion (UK)
284
TACS Total Access Communication System
TCO Telecommunications Certification Organization
TCP Transmission Control Protocol
TDM Time-Division Multiplexing
TDMA Time-Division Multiple Access
TIA Telecommunications Industries Association
TIU Terminal Interface Unit
TSB Technical Service Bulletin
μ micro
μm micron = 10-6 meters
U/D Up / Down
UBR Unspecified Bit Rate
UDP User Datagram Protocol
UMTS Universal Mobile Telecommunications Service
UNIX Harem Guards
URL Uniform Resource Locator
USB Universal Serial Bus
UTF Unicode Transformation Format
UTP Unshielded Twisted Pair
UTRAN Universal Terrestrial Radio Access Network
UUCP Unix-Unix Copy Protocol
VBR Variable Bit Rate
VCSEL Vertical-Cavity Surface-Emitting Laser
VDSL Very High Bit Rate Digital Subscriber Line
VLAN Virtual Local Area Network
VoD Video on Demand
VoIP Voice Over IP
VPI Virtual Path Identifier
VPLS Virtual Private LAN Service
VPN Virtual Private Network
VSAT Very Small Aperture Terminal
VSB-AM Vestigial Side Band Amplitude Modulation
VSP VoIP Service Provider
WAN Wide Area Network
WATS Wide Area Telephone Service
W-CDMA Wideband CDMA (= IMT-DS, UMTS)
WDM Wave Division Multiplexing
WEP Wired Equivalent Privacy
Wi-Fi Wireless Fidelity
WiMAX Worldwide Interoperability for Microwave Access
WLAN Wireless Local Area Network
WPA Wi-Fi Protected Access
xDSL Any DSL Technology
285
About Teracom
About the Author
Eric Coll is an international expert in telecommunications, data communications and network-
ing and has been actively involved in the industry since 1983. He holds Bachelor of Engineer-
ing and Master of Engineering (Electrical) degrees.
Mr. Coll has taught telecommunications technology training seminars to wide acclaim across
North America since 1992, and has broad experience working as an engineer in the telecom-
munications industry.
He has worked for Nortel’s R&D labs as a design engineer on projects including digital voice
and data communications research and digital telecom network equipment design; and on
satellite radar systems; consulting on Wide Area Network design for HMO applications; and
many other projects in capacities ranging from detailed design and implementation to systems
engineering, project leader and consultant.
In addition to being founder and Director of Teracom Training Institute, Mr. Coll provides con-
sulting to the telecommunications industry and acts as a telecommunications technology sub-
ject matter expert for tax and legal matters.
Public Seminars
Instructor-led training is the best you can get, allowing you to ask questions and interact with
classmates. Teracom’s public seminars are instructor-led courses geared for the non-engineer-
ing professional needing a comprehensive overview and update, and those new to the busi-
ness needing to get up to speed.
Teracom instructor-led seminars are career-enhancing training. They’re the ideal way to put in
place a solid base of knowledge.
We start at the beginning of the story, progress through it in a logical order and finish at the
end.
We will explain the jargon and buzzwords, and even more importantly, provide you with a
structured understanding on which you can build in the future. Visit teracomtraining.com to see
the latest schedule.
DVD-Video Courses
Teracom’s DVD video training courses are high-quality multimedia productions featuring the in-
structor, extensive animated graphics and bullets... like private lessons from the Director of the
286
Institute!
Our engaging and humorous instructor Eric Coll talks to you directly via the camera, using his
vast experience and acclaimed ability to explain key concepts, mainstream technologies and
how it all fits together – in plain English – while keeping your attention.
Our goal is to bust the buzzwords, explain the jargon and instill structured understanding -
knowledge that lasts a lifetime.
Every course comes with a comprehensive workbook with copies of all graphics and detailed
reference notes, sure to be a valuable reference for years to come. Online courses and certifi-
cations are included at no extra charge with the DVD courses. Visit teracomtraining.com for
details.
GSA Schedule
Teracom instructor-led courses, DVDs, online courses and certification packages are on our
US Government GSA schedule supply contract... which took two years and a 200-page appli-
cation to obtain... so you know you are getting quality.
Online Courses
Teracom Online Courses are based on our famous instructor-led courses, tuned and refined
over more than 20 years of teaching these topics to thousands of students and hundreds of
companies and organizations.
These courses are the same courses used by the biggest telecom carriers in the business to
train their employees - constantly updated to deliver the core technical knowledge required in
the telecom business today.
This is the best quality training of its kind available.
287
Teracom is a Gold Training Partner of the Telecommunications Certification Organization, au-
thorized to administer exams for TCO certifications on the myTeracom Learning Management
System and award TCO Certifications.
✴ Certified Telecommunications Network Specialist (CTNS)
✴ Certified Telecommunications Analyst (CTA)
✴ Certified Wireless Analyst (CWA)
TCO Certification is proof of your knowledge of telecom, datacom and networking fundamen-
tals, jargon, buzzwords, technologies and solutions.
Guaranteed to Pass – and repeat courses anytime with the Unlimited Plan!
Join our thousands of satisfied customers including:
the FBI Training Academy, US Marine Corps Communications School, US Army, Navy, Air
Force, Coast Guard, CIA, IRS, CRA, CRTC, RCMP, banks, power companies, police forces,
manufacturers, government, local and regional telcos, broadband carriers, individuals and
many more.
Visit teracomtraining.com to register today. Scan this code with your smartphone to visit the
certifications page for full details!
288