1.2. Basics of Telecom Networks
1.2. Basics of Telecom Networks
2
Communication Networks
Communication networks enable users to transfer
information in the form of: voice, video, Data, and
computer files.
Users request the communication service they need by
means of networked devices using:
a telephone handset or cellular phone ,
set-top T V box , o r
through applications running on a host computer such as a PC
or workstation .
3
Communication Networks Types are:
1. Telecommunication Networks
2. Computer Networks
3. Cable Television Networks and
4. Wireless Networks
4
Telecommunication Networks
A telephone network comprises:
• Switching points,
• Communications lines, and
• Telephone sets.
The telephone network is actually one great communication
system which encompasses many different networks.
▪ If we consider the customers of networks and the availability of
services, there are two broad categories:
a. Public Networks and
b. Private or Dedicated Networks.
5
a. Public Networks
Public networks are owned and managed by
telecommunications network operators.
These network operators have a license to provide
telecommunications services.
1. Public Switched Telephone Network (PSTN): is the main
public network in use.
PSTN is the main system which forms the world’s telephone network.
The PSTN is the system which allows any phone in the world to connect to
any other phone in the world.
2. Public Land Mobile Telephone Networks (PLMN):
They are regional or national access networks and connected
to the PSTN for long-distance and international connections.
The Cellular networks connect mobile phones to the PSTN.
6
Public Networks continued …
7
Private or Dedicated Networks
Private networks are built and designed to serve the needs of
particular organizations.
They usually own and maintain the networks themselves.
1. Voice Communication Networks:Examples of private dedicated
voice networks are those used by the police and other
emergency services.
2. PBX Networks
Are private networks used by companies and organizations
If necessary, they can be connected to the fixed line network to
connect outside the organization
3. Data Communication Networks: Data communication networks
are dedicated networks especially designed for the transmission
of data between the offices of an organization.
8
Private Network Continued…
3. Virtual Private Networks (VPN): provides a service similar to an
ordinary private network, but the systems in the network are
the property of the network operator.
In effect, a VPN provides a dedicated network for the customer
with the help of public network equipment.
A virtual private network that is established over, in general, the
Internet
It is virtual because it exists as a virtual entity within a public
network
From the user’s perspective, it appears as a network consisting of
dedicated network links
These links appear as if they are reserved for the VPN clientele
Because of encryption, the network appears to be private
9
Networking Principles:
The four principles that underlie the growth of
communication network services are:
• Digitization,
• Economies of scale,
• Network externalities, and
• Economies of scope or Service integration.
• Economies of scope , or service integration , refers
to the fact that a network that currently provides
one set of services may be expanded to provide new
services at an additional cost that is much less than if
a separate network were built to provide those new
services.
10
Service Integration Continued …
• Economies of service integration are possible
because communications engineers now design
services in a modular and standardized way so that
new services can be introduced using existing
hardware and software modules .
The widespread deployment of ATM, and broadband access
over cable TV and ADSL, will facilitate service integration to
such an extent that one can imagine a single network that will
provide all of the services that today are provided by separate
networks.
These services include telephone, data, broadcast TV and
radio, and CATV.
11
Traffic Characterization and QOS:
Traffic Characterization describe the traffic that the
applications generate as well as the acceptable delays and
losses by the network in delivering that trafic.
The information that applications generate can take many
forms: Text, Voice, Audio Data, Graphics, Pictures, and
Videos
Moreover the information can be:
• One-way
• Two-way
• Broadcast or
• Multi-point
12
Continued …
We classify all traffic into three types. That is a user
application can generate:
• Constant bit rate (CBR)
• Variable Bit rate (VBR) or
• A sequence of Messages with different temporal
characters tics
13
Constant Bit Rate
To transmit a voice signal, the telephone network equipment
first converts it into a stream of bits with a constant rate of
64Kbps.
Video compression standards convert a video signal into a bit
stream with a CBR.
For instance, MPEG1 produces a poor quality video at
1.15Mbps and a good quality at 3 MBps.
For the voice or video application to be an acceptable quality,
the network must transmit the bit stream with a short delay
and corrupt at most a small fraction of bits.
This fraction is called the bit error rate (BER)
14
Variable Bit Rate
Some signal compression techniques convert a signal
into a bit stream that has a variable bit rate.
For instance, MPEG2 is a family of standards for such
variable bit rate compression of video signals.
Messages
Many user applications on a network are implemented
by processes that exchange messages.
15
Network (Communication) Services:
➢ Are Connection-Oriented Service and Connectionless
Service
Connection-Oriented Service
➢ Setup data transfer ahead of time (through handshaking)
➢ It provides:
✓ Reliable, in-order byte delivery
✓ Flow control
✓ Congestion control.
➢ Internet’s connection-oriented service is TCP
(Transmission Control Protocol).
➢ Applications using TCP: Email (SMTP), web browsing
(HTTP), and file transfer (FTP)
16
Connection-oriented versus Connectionless
Connectionless Services
➢ It provides:
✓unreliable data transfer
✓no flow control
✓no congestion control
➢ Internet’s connectionless service is UDP (User Datagram
Protocol.
➢ Applications using UDP: streaming media, video
conferencing, and IP telephony.
17
Network Elements
A Communication Network is a collection of network elements
interconnected and managed to support the transfer of
information from a user at one network location or node to a
user at another node.
There are two principal network elements:
✓ Transmission links and
✓ Switches
18
Continued …
A transmission link transfers a stream of bits from one end to
the other at a certain rate with a given bit error rate and a
fixed propagation time.
Transmission systems use four basic media for information
transfer from one point to another:
1. Copper cables, such as those used in LANs and telephone
subscriber lines
2. Optical fiber cables, such as high-data-rate transmission
in telecommunications networks;
3. Radio waves, such as cellular telephones and satellite
transmission;
4. Free-space optics, such as infrared remote controllers.
19
Basic Network Mechanism
A network bearer services comprise the end-to-end
transport of bit streams, in specific formats over a
set of routes.
These services are differentiated by quality:
• Speed, delay, errors.
They are produced using five basic mechanisms:
1. Multiplexing
• Multiplexing combines data streams of many users into
one large bandwidth stream.
• Users thereby can share the large bandwidth.
20
Continued …
2. Switching
• Switching allows us to bring together the data streams of
dispersed users.
• In telephone networks, a switch is located in the central
office.
• A link between two switches is called a trunk.
• A link between a subscriber telephone and a switch is
called an access line or subscriber loop.
21
Fig 2.1. A Basic Telecommunications Network
22
Continued …
3. Error Control: All transmission links occasionally
corrupt the messages they transmit. It is therefore
important for the network to control such errors.
4. Flow control: is a mechanism that enables the receiver
to pace the transmission of the source.
23
Continued …
24
Layered Architecture
An architecture is a specific way of organizing many functions
performed by a computer network when it provides services
such as: a file transfer, e-mail, directory services, and terminal
emulation.
When protocols are arranged into layers, the protocol entities
of adjacent layers exchange messages.
Once it gets a message, a protocol entity performs some
operations before it transmits the message to the next
protocol entity.
25
Telephone Numbering
An international telephone connection from any telephone to
any other telephone is made possible by unique identification
of each subscriber socket in the world.
In mobile telephone networks, each telephone set (or
subscriber card) has a unique identification number.
The numbering is hierarchical, and it has an internationally
standardized country code at the highest level.
This makes national numbering schemes independent from
each other.
26
International prefix
An international prefix or international access number is used for
international calls.
It tells the network that the connection is to be routed via an
international telephone exchange to another country.
The country code contains one to four numbers that define the
country of subscriber. Country codes are not needed for national
calls because their purpose is to make the subscriber identification
unique in the world.
A telephone number that includes the country code is called an
international number and it has a maximum length of 12 digits.
The country codes have been defined by the ITU.
27
00 or + 251 046 2207051
29
Call set-up and release
31
Call set-up and release
Calls:
A call requires a communication circuit (connection) between
two subscribers.
Figure 2.4 shows a number of connections in the network of Fig.
2.3 that involve subscriber Sp.
In Fig. 2.4(a), Sp is on a call with Sq who is attached to the same
exchange. Calls of this type are known as interexchange calls.
The circuit in case (b) consists of a temporary path across
exchange A, trunk T1, a temporary path across exchange
B, and SLr .
The connections of Fig. 2.4 are set up (switched “on”) at the start
of a call and released (switched “off ”) when the call ends.
32
Call set-up and release
Setup and Release:
The setup and release of connections in telecommunication
networks are triggered by signals. Starting and ending a call
involve signalling between the subscribers and their local
exchanges and, for interexchange calls, signalling between the
exchanges along the connection.
Figure 2.5 shows the signalling for the setup of the connection of
Fig 2.4(b).
Subscriber Sp sends a request-for-service signal to exchange
A (by lifting the handset of a telephone) and then signals the
digits of the telephone number of Sr (with the dial or keyset of the
telephone).
From the received number, exchange A determines that Sr is
served by exchange B, and that the call is to be routed out on a
trunk in group TG1 (Fig. 2.3).
33
Call set-up and release
35
Timing Diagram: Landline to Mobile connection set up
36
37
Timing Diagram: Mobile to Landline connection set
up
38
Network Load Parameters
Busy hour: Continuous 1-hour period lying wholly in the time
interval concerned, for which the traffic volume or the number of
call attempts is greatest.
OR
In a day ,the 60-minute interval in which the traffic is the highest
is called the busy hour.
Peak busy hour: The busy hour each day; it is usually varies
from day to day, or over a number of days.
Time consistent Busy Hour: The 1-hour period starting at the
same time each day for which the average traffic volume or the
number of call attempts is greatest over the days under
consideration.
39
Network Load Parameters
Call Completion rate (CCR): is defined as the ratio of the
number of successful calls to the number of call attempts.
Busy hour call attempts (BHCA): The number of call attempt
in the busy hour is called Busy hour call attempts (BHCA), which
is an important parameter in deciding the processing capacity of a
common control or a stored program control system of an
exchange.
Traffic intensity: The traffic on the network may be measured in
terms of the occupancy of the servers in the network. Such a
measure is called the Traffic intensity.
A0 =Period for which a server is occupied/total period
of observation
A0 is dimensionless and is called erlang (E).
40
Network Load Parameters
Traffic intensity is also measured in another way. This
measure is known as centum call second (CCS) which
represents a call-time product.
One CCS may mean one call for 100 seconds duration or 100
calls for one second duration each or any other combination.
Sometimes, call seconds (CS) and call minutes (CM) are also
used as a measure of traffic intensity.
1E=36 CCS = 3600 CS =60 CM
Grade of Service: The amount of traffic rejected by the
network is an index of the quality of the service offered by
the network. This is termed grade of service (GOS)
41
Network Load Parameters
It is defined as the ratio of lost traffic to offered traffic.
Offered traffic is the product of the average number of calls
generated by the users and the average holding time per call.
The actual traffic carried by the network is called the Carried
traffic and is the average occupancy of the servers in the
network as given by
GOS=A-A0/A
Where A=offered traffic
A0=carried traffic
A-A0 =lost traffic
42
Telecommunication Services
▪ In general, telecommunication services can classified into three
broad categories.
i. Basic Services
✓ Are services that everyone needs
✓ Ask cost
▪ Telecommunications Channels,
▪ Computers and
▪ Telecommunications Control Software.
44
Components of Telecommunication Networks Cont’d….
▪ Terminals:
✓ Input / Output Devices
✓ Any input or output device that is used to transmit or receive data can be
classified as a terminal element.
✓ are the starting and stopping points in any telecommunication network
environment.
▪ Telecommunication processors:
✓ support data transmission and reception between terminals and computers
by providing a variety of control and support functions (i.e. convert data
from digital to analog and back).
45
Components of Telecommunication Networks Cont’d….
46
Components of Telecommunication Networks Cont’d….
47
Components of Telecommunication Networks Cont’d….
▪ Computers:
✓ In a telecommunication environment computers are connected through
media to perform their communication assignments.
✓ Early networks were built without computers, but late in the 20th
century their switching centers were computerized or the networks
replaced with computer networks.
48
Exercise I
1. An exchange serves 2000 subscribers. If the average BHCA is
10,000 and the CCR is 60%, calculate the busy hour calling rate.
2. In a group of 10 servers, each is occupied for 30 minutes in an
observation interval of two hours. Calculate the traffic carried by the
group.
3. A group of 20 servers carry a traffic of 10 erlangs. If the average
duration of a call is three minutes, calculate the number of calls put
through by a single server and the group as a whole in a one-hour
period.
4. A Subscriber makes three phone calls of three minutes, four
minutes and two minutes duration in a one-hour period. Calculate
the subscriber traffic in erlangs, CCS and CM.
49
Thank You!
50