0% found this document useful (0 votes)
19 views15 pages

Bee4102 Chapter 5

Uploaded by

Amanya Denis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views15 pages

Bee4102 Chapter 5

Uploaded by

Amanya Denis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

BEE4102 TELEPHONE SYSTEMS CHAPTER 5

CHAPTER V: INTEGRATED SERVICES DIGITAL NETWORK

A. INTRODUCTION
In this chapter, we delve into the Integrated Services Digital Network (ISDN). Previously, the
transmission of both data and voice was achievable through traditional Plain Old Telephone Systems
(POTS). However, with the advent of the Internet, telecommunication underwent significant
advancements. Despite this progress, the simultaneous transmission of data and voice posed
challenges; users were typically constrained to using either the Internet or the telephone.

The invention of ISDN revolutionized this landscape. Prior to ISDN, connecting a home computer
to an Internet Service Provider required considerable effort, often involving the use of a modulator-
demodulator unit, commonly known as a MODEM. Fig. 5.1 illustrates the complexity of this
process, wherein digital signals had to be converted to analog and vice versa using modems
throughout the transmission path.

Figure 5.1

ISDN emerged from the simple yet transformative idea of enabling the transmission of digital
information end-to-end without the need for analog conversions. By utilizing the existing telephone
cable infrastructure through the telephone exchange, ISDN facilitated the simultaneous transmission
of voice and data. Notably, ISDN offers numerous advanced features surpassing those of traditional
Public Switched Telephone Networks (PSTN).

B. ISDN
ISDN, initially defined in the CCITT red book in 1988, stands for Integrated Services Digital
Network. It represents a telephone network infrastructure designed to enable the simultaneous
transmission of voice and data at high speeds with enhanced efficiency. Unlike traditional telephone
networks, ISDN operates as a circuit-switched system while also providing access to packet-
switched networks.

The model of a practical ISDN is as shown below.

Page 1 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

Figure 5.2

ISDN offers a wide range of services to users, including:

- Voice calls
- Facsimile transmission (fax)
- Videotext services
- Teletext services
- Electronic mail (email)
- Database access
- Data transmission alongside voice
- Connection to the internet
- Electronic fund transfers
- Exchange of images and graphics
- Document storage and transfer
- Audio and video conferencing
- Automatic alarm services for emergency response (e.g., fire stations, police, medical
services)

Types of ISDN:
ISDN encompasses various types of interfaces and configurations, each serving distinct purposes
within telecommunications.

1. Basic Rate Interface (BRI):


o BRI utilizes existing telephone infrastructure and is commonly used by smaller
organizations or home users.
o Configuration: Provides two bearer channels at 64 Kbps each and one control
channel at 16 Kbps.
o Suitable for local group communication over a limited area.
2. Primary Rate Interface (PRI):
o PRI is utilized by enterprises and offices, offering higher capacity than BRI.
o Configuration: Based on T-carrier (T1) in the US, Canada, and Japan (23 bearer
channels and one control channel), or E-carrier (E1) in Europe, Australia, and some
Asian countries (30 bearer channels and two control channels).
o Bandwidth: 1.544 Mbps (T1) or 2.048 Mbps (E1).
o Commonly used by larger organizations, enterprises, and Internet Service Providers
(ISPs).
Page 2 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

3. Narrowband ISDN (N-ISDN):


o N-ISDN carries voice information in a narrow band of frequencies, digitizing analog
voice signals.
o Uses circuit switching at 64 Kbps.
o Implemented for voice data transmission requiring lesser bandwidth on a limited
number of frequencies.
4. Broadband ISDN (B-ISDN):
o B-ISDN integrates digital networking services and enables digital transmission over
various media, including ordinary telephone wires and fiber optic cables.
o Bandwidth: Ranges from 2 Mbps to 1 Gbps.
o Transmission Protocol: Asynchronous Transfer Mode (ATM).
o Ideal for high-speed communications, commonly utilizing fiber optic cables.
o Provides continuous flow of information from a central source to multiple authorized
receivers, though users cannot control this flow.

Each type of ISDN serves specific needs within telecommunications, offering varying levels of
capacity, speed, and functionality to meet diverse requirements in communication networks.

Advantages of ISDN:

1. Digital Services: ISDN offers digital services, reducing the chance of errors compared to
analog systems.
2. Faster Connection: ISDN provides faster connection speeds, enhancing efficiency in data
and voice transmission.
3. Higher Bandwidth: With ISDN, users benefit from higher bandwidth capacities, allowing
for smoother and more reliable communication.
4. Multimedia Transmission: ISDN enables the transmission of voice, data, and video over a
single line, facilitating multimedia communication.

Disadvantages of ISDN:

1. Specialized Services: ISDN requires specialized digital services, making it more costly
compared to traditional telephone systems.

Motivation for ISDN:


Three main factors have motivated the development of ISDN:

1. Societal Needs: The evolving societal demands for complex communication facilities, such
as remote diagnostics, database access, and audio conferencing, necessitate advanced
telecommunication systems like ISDN.
2. Economic Necessities: Economic pressures drive the need for efficient and cost-effective
communication solutions, prompting the integration of various services onto a single
network to reduce overheads.
3. Technological Developments: Advances in digital technology have made it possible to
digitize various aspects of telecommunication systems, leading to the development of ISDN
as a unified digital network supporting integrated services.

The necessity for a more integrated and efficient telecommunications system like ISDN:

The rapid developments in various facets of society call for increasingly complex communication
facilities. For instance, a biotechnologist today would like to remotely examine a blood sample and
simultaneously compare its analytical results with those of other samples stored in a centralized
Page 3 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

database. They may also need to consult with their assistant, who is in a laboratory some distance
away, and report the findings as the investigation progresses to their superior, who is in another
building. To meet such demands, we need to electronically transmit the microscopic image of the
blood sample and graphically reproduce it on the computer screen of the biotechnologist, at a speed
fast enough to faithfully reproduce the movements of living cells. Simultaneously, the same
communication medium is used to access a remotely located database and hold an audio conference
with the assistant and superior.

Another example is a senior executive of a company who often makes important decisions at home
late in the evening or while on holiday. They would like to instantly implement these decisions,
which may require access to different computer systems connected in a network. This includes
electronic banking facilities, facsimile transmission, and desktop image processing facilities, all
available wherever they are located, whether it be in automobiles, homes, boats, hotel rooms, or
railway compartments. Automatic calling party identification and guaranteed transaction privacy
and security are essential signaling requirements for systems that support such applications. In effect,
society needs a telecommunication system that can support universal access to a host of services.

In such a system, it should be possible for a user to attach to the network anywhere in the world
using the equipment of their choice to obtain a particular service. The user will be allotted a
permanent identification number or code, similar to an income tax permanent account number or a
social security number, which would be valid for their lifetime. Regardless of where a user lives or
how often they shift residence, dialing the assigned number will always connect to their telephone,
computer system, or any other equipment. Similarly, irrespective of where a user obtains their
services, the related charges are debited to their account.

Traditionally, network providers have set up separate and independent networks to support different
services, such as telex networks, data networks, telephone networks, and CATV networks. However,
independent networks require separate administration, maintenance staff, and infrastructure for
housing switching systems. This duplication leads to high capital costs, low maintenance efficiency,
and high management costs. Additionally, network facilities are never fully utilized as services are
independently supported on different networks, resulting in excessive overheads and economically
unviable network services. Clearly, the independent network approach is not viable for current and
future services. Therefore, it is essential to consider the possibility of sharing resources to reduce
costs. Sheer economic necessity is forcing network providers to look for solutions where different
services may be integrated and supported on common network resources.

The end equipment for different services were analog in nature and had different electrical,
electronic, signal, and communication characteristics. This necessitated the design of different
networks to suit each device. For example, the voltage, current, and bandwidth requirements of a
teleprinter, a computer terminal, and a telephone instrument are vastly different. Accordingly, the
switching systems, signaling systems, and transmission media had to be different. However, if the
end equipment, switching, transmission, and signaling systems can all function in the digital domain,
the interface and communication requirements can be uniform for all services.

Today, digital technology has matured to a level where all the above-mentioned functions of a
telecommunications network can be realized in the digital domain. It is interesting to trace the history
of the process of digitalization in the field of telecommunications. Traditionally, digital technology
always appeared first in the field of computers. In the late 1930s and early 1940s, while the theory
of digital communication (pulse code modulation, sampling theorem, etc.) was emerging, digital
computers were already being built. The first step in the digitalization of telecommunications
occurred when the slow channel was introduced for long-distance transmission in the early 1960s.
Transistorized or integrated circuit-based minicomputers opened up the possibility of digital
Page 4 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

switching in the late 1960s. These computers were used in exchanges, and switching was organized
in the space domain or time domain. Developments in the field of packet switching networks led to
the possibility of digital signaling in the mid-1970s. Since the late 1970s, digital end equipment such
as digital telephones and digital facsimile machines have been developed.

Each Plenary Assembly of the CCITT, which takes place once every four years, assigns specific
topics related to ISDN to the concerned study groups for an in-depth study during the ensuing four-
year period. The result of such an organized study over many decades is that the ISDN architecture
has evolved, and a plethora of services have been supported in ISDN. As must be obvious by now,
ISDN is the apt nomenclature for the telecommunications network in which all network functions
are handled in the digital domain, and a single network supports a set of integrated services.

C. ISDN SERVICES
ISDN supports a variety of services. A short list of some of the important services includes:

1. Videotex
2. Electronic mail
3. Digital facsimile
4. Teletex
5. Database access

These services are described in the following sections.

1. Videotex
Videotex is a generic term for systems that provide easy-to-use, low-cost computer-based services
via communication facilities. Three forms of videotex exist:

- View
- Teletext
- Open channel teletext

View data is fully interactive videotex, meaning that requests for information or service from a user
are actually sent to, received by, and acted on by a centralized computer.

Teletext is a broadcast or pseudo-interactive videotex service. Teletext users may select the
information to be seen, the pace at which the information is to be displayed, and often the sequence
of display. The information is cast in the form of frames, and a set of frames, called a magazine, is
recycled continuously. Teletext is a one-way communication system, and there is no real interaction
between the user and the computer.

Open channel teletext is a totally non-interactive, one-way videotex. With this form of videotex,
the user receives preselected information in a predetermined order. There is no interaction, either
real or apparent. The user has no control over the pace or sequence of display; they simply watch
what appears on the screen and pick up the information that is of use to them as and when it appears
on the screen. Open channel teletext may be classified into three categories according to the way the
preselected information is displayed and the way the display channel is used:

- Dedicated open channel


- Open captioning
- Closed captioning

Page 5 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

In dedicated open channel teletext, a separate transmission channel is dedicated for the display of
preselected information. Open captioning shares a normal display channel, and the teletext display
appears at fixed intervals along with other programs on the channel.

2. Electronic Mail
Electronic mail, popularly known as email, may be defined as the communication of textual
messages via electronic means. Even telex communication is electronic in nature. Then, what is the
difference? There are many. While telex communication is terminal-to-terminal, electronic mail
communication is user-to-user. In telex, messages destined for a number of users are sent to the same
terminal, from where they are distributed by an operator or a messenger. On the other hand,
electronic mail is delivered to the mailboxes of individuals. Telex works on a circuit-switched mode,
whereas electronic mail is a store-and-forward (S&F) service. Electronic mail is a computer-based
messaging system, whereas telex generally is not. Being a person-to-person communication system,
electronic mail turns out to be a cheaper alternative to telephone conversation and eliminates the
time spent in establishing phone calls. Early electronic mail systems were organized around a single
time-sharing or multiuser computer system, where electronic mail was exchanged among the users
of the system. Since the late 1970s, the electronic mail facility has been extended over networks. A
typical configuration of an electronic mail system is depicted in the figure.

Figure 5.3: A Typical configuration of an electronic mail system


A Typical configuration of the an electronic mail system
There are two major components of the system: one to handle mail within the system and another to
handle mail over the network. Both share common disk storage where mailboxes are maintained.
The terminals connected to the system may be distributed throughout the organization and kept on
the tables of individuals.

Every registered user is provided with a mailbox in the system. Any user may log on to the system
from any of the terminals and send mail to another user on the same system or on the network. If the
recipient is currently logged on, a message may be flashed on their terminal about the arrival of mail.
Otherwise, they are informed about the mail waiting in their mailbox as soon as they log on to the
machine. If the mail arrives when a recipient is logged on to the machine, they may suspend the
present work and enter into a conversational mode with the sender. Thus, real-time exchange of
messages is possible in an electronic mail system if the two concerned parties are logged on at the
same time. Electronic mail, being an S&F service on a network, real-time exchange may not be
possible.

Page 6 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

Users of homogeneous computer systems were the first to introduce electronic mail over networks.
There are numerous computer networks worldwide that support electronic mail services. Some of
the well-known networks that initially offered electronic mail services were UUNET, BITNET,
CSNET, and JÆNET. As a next step in development, internetwork electronic mails have garnered
the attention of global network communities.

An important issue in internetwork messaging is the highly varied mail address structures used by
different networks. Users of a particular network are familiar with their own addressing schemes,
which need to be modified and recast into another format when sent over to another network. This
process is conveniently carried out using gateways, relieving users of the burden of understanding
different addressing schemes and associated conversion processes. Most networks worldwide have
established gateways to one or more networks for messaging purposes. Consequently, it is now
possible to send electronic mail to almost anyone on any network globally.

Efforts are also underway to evolve a uniform addressing scheme for all networks. In the context of
Open System Interconnection (OSI) networks, electronic mail is considered an application process
running on the seventh layer. Standard electronic mail service components were defined and
approved by the 1984 CCITT Plenary Assembly.

These are known as X.400 family of standards for message handling systems (MHS) Presently
defined standards do not deal with the user interface or the services available directly to the user.
They do, however. specify a set of base services that can be used for building suitable user-level
interfaces.

Table 5.1: X.400 Family of Standards

Number Subject dealt with

X.400 System model – service elements

X.401 Basic service elements and optional user facilities

X.408 Encoded information – type conversion rules

X.409 Presentation transfer syntax and notation

X.410 Remote operations and reliable transfer server

X.411 Message transfer layer

X.420 Interpersonal messaging – user agent layer

X.430 Access protocols for teletex terminals

X.435 Electronic data interchange messaging system

The MHS model as defined in X.400 has two types of entities:

- User agent entity (UAE)


- Message transfer agent entity (MTAE).
Page 7 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

The figure of X.400 model is given below. User agent performs functions relating the preparation,
submission and delivery of messages.

Figure: 5.4: X.400 message handling system model

MHS-message handling system

MTA-message transfer agent

MTS – message transfer system

UA-user agent

It also assists the user in other message functions such as filing, replying, retrieving, and forwarding.
The Message Transfer Agent (MTA) is concerned with transferring messages across the network
and functions within an environment designated as the Message Transfer System (MTS). It obtains
messages from the source UA and delivers them to the destination UA. Upon accepting a message,
the Message Transfer Agent (MTA) performs either a delivery function or a routing function. If the
destination UA is in the same system as the MTA or is directly attached to the MTA, then the MTA
performs a delivery function; otherwise, it performs a routing function.

Depending on the physical location of the MTAs and UAs, various physical realizations of email
systems are possible. Some typical realizations are depicted in the figure.

Page 8 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

Figure 5.5: Email system configuration

Generally, in a multiuser system, a single MTA and many UAs are present. In a personal computer,
it is usually implemented with only one UA. In a workstation, one MTA and one UA are present. In
a computer dedicated to mail transfer functions, there is only one MTA, which interacts with several
UAs outside the machine. The figure illustrates an electronic mail configuration around a
minicomputer system, another figure illustrates several personal computers attached to the dedicated
mail transfer system, and yet another figure shows a workstation attached to a minicomputer.

3. Digital Facsimile
Document exchange through facsimile systems has emerged as a major application of
telecommunication systems. Unlike electronic mail, facsimile is capable of transmitting and
receiving printed matter, which may include graphics, drawings, and pictures. Two types of
facsimile systems exist:

- Photographic facsimile
- Document facsimile

In photographic facsimile, gray-level information is transmitted and printed in addition to black and
white. Typically, there are 8 or 16 gray levels that can be recognized by the system. Document
facsimile systems handle only black and white levels, i.e., only two gray levels. Document facsimile
systems are more popular than photographic systems. The receiver-transmitter functions applicable
Page 9 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

to both types of facsimile systems are shown in the figure. A scanner converts the print material into
a set of points represented by bit-mapped electrical signals. In document facsimile, every point is
represented as a zero or one, whereas in photographic facsimile, each point is represented by 3 or 4
bits giving the gray level values. Scanning resolution is of the order of 4–16 dots per mm (100–400
dots per inch) horizontally across the page and 4—8 lines per mm (100—200 lines per inch)
vertically down the page. An A4 size page (210 x 297 mm) generates about 3 million picture
elements (pels).

Functions ofFigure 5.6:system


facsimile Functions of facsimile system

At a transmission rate of 9600 bps, it takes approximately 300 seconds or about 5 minutes to transmit
3 million bits. Facsimile information is transmitted using regular telephone lines at the same tariff
as telephone charges. It is necessary to compress the scanned data before transmission, which
constitutes the second step in facsimile transmission.

There are two types of compression techniques:

- Information-preserving techniques
- Approximate techniques

CCITT has standardized on two compression techniques, both belonging to the first category. These
techniques reproduce an exact replica of the scanned image, while techniques in the second category
approximate the original in the output. The two techniques standardized by CCITT are:

- Modified Huffman (MH) technique


- Modified READ (MR) technique

Before applying the Huffman or Relative Element Address Designate (READ) technique, the
scanned information is coded using a basic technique known as run-length coding. In a document
facsimile system, the pels are represented by zeros and ones. A quick observation of a printed
document, considering the horizontal scan resolution of about 200 dots per inch, reveals that the
scanned information would contain strings of zeros and ones. Longer strings of zeros and ones are
more probable than short strings. Run-length coding conveys a count of continuous ones and zeros
instead of the pattern itself.

Page 10 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

Huffman coding is based on the principle that a more efficient coding scheme can be developed by
using short code words for frequently occurring symbols and long code words for infrequently
occurring symbols, instead of using a uniform size for all symbols. In the case of document facsimile,
longer strings of zeros or ones are coded with short code words as they are more probable, and vice
versa with shorter strings. However, the string sizes vary over a very large range, theoretically from
one to a few million per page. Consequently, the average size of the code word is large. To overcome
this problem, the Huffman code is modified to view the run-lengths in two parts and code them
independently, taking into account their probability of occurrence. The two parts of the run length
are known as the makeup code part and the terminating code part. The first part is used for coding
run lengths that are less than 64, and the latter part is used for run lengths greater than or equal to
64.

The Relative Element Address Designate (READ) code is based on the principle that coding
efficiency can be enhanced by coding the relative position of changing elements. There is a strong
correlation between the black-white patterns of two adjacent scan lines in a document, which is
utilized in modified READ (MR) coding. A changing element is encoded based on its distance from
a preceding changing element on the same or the previous line. The selection of which element to
choose as a reference depends on the relative position of the element being coded. Typically, the
reference element is chosen to minimize the size of the required code word.

Numerous studies have been conducted to evaluate the effectiveness of MH and MR coding schemes
over a representative set of document pages. Both coding schemes achieve significant compression.
It has been observed that MR coding is more effective than MH coding, with compression ratios
averaging 1:8 for MH and 1:16 for MR coding schemes.

Since their introduction in the early 1970s, four models of facsimile machines, known as Group I,
II, III, and IV machines, have evolved. Group I and II machines are analog, while Group III and IV
utilize digital technology. Group I, II, and III machines are designed for operation with the Public
Switched Telephone Network (PSTN), whereas Group IV machines are designed for Integrated
Services Digital Network (ISDN) operation. A comparison of the features of these machines is
provided in the table. Group IV machines further have models known as Class 1, 2, and 3 machines.
Class 2 and 3 machines have a horizontal and vertical resolution of 11.8 pels per mm each. Class 2
machines are capable of receiving teletex messages, whereas Class 3 machines can both receive and
transmit teletex messages.

4. Teletex
Teletex represents an advancement from traditional telex service, transforming terminal-to-terminal
communication into an office-to-office document transmission system. It facilitates direct
communication among electronic typewriters, word processors, and personal computers, equipped
with storage for transmitting and receiving messages. The utilization of such equipment significantly
broadens the character set available for document preparation. Teletex supports not only the standard
character set but also a diverse range of graphic symbols and a comprehensive set of control
characters. These control characters aid in document preparation and reproduction, allowing for
tasks such as positioning the printing element, specifying page orientation, setting left and right
margins, adjusting vertical spacing, and implementing underlining. Moreover, the page control
feature permits the use of standard A4 size papers for receiving messages instead of the continuous
stationery used in conventional telex systems.

Teletex offers a background-foreground operation, ensuring that the transmission and reception of
messages can proceed in the background without interrupting the user's foreground activities with
the equipment. This means that users can simultaneously prepare a new document while another
Page 11 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

document is being transmitted or received. Additionally, Teletex maintains compatibility with


existing telex systems and can interoperate with them seamlessly.

Teletex procedures involve the exchange of header information before the actual document transfer
occurs. This header information consists of four parts:

- Part 1: Destination ID
- Part 2: Originator ID
- Part 3: Date and Time Stamp
- Part 4: Document Reference

The Destination and Source IDs consist of four fields each:

- Field 1: Country Network Code


- Field 2: National Subscriber Number
- Field 3: Reserved for Future Use
- Field 4: Terminal Owner Code

The number of characters allotted to each of the above fields is variable, subject to a maximum for
each field, with the total not exceeding 24 characters.

5. Database Access
We are living in an age of information explosion, where an overwhelming amount of new
information is being generated and published regularly, making it nearly impossible to keep track
of developments in any field. In this context, electronic databases are proving to be invaluable.
Through a suitable search query, users can access all the information available on a particular
topic. There is a multitude of databases worldwide covering a wide range of subjects, including
humanities and social sciences, science and technology, engineering, and industry. These
databases can be accessed online via the telephone network, modem, and a personal computer.
However, gaining access to a database requires signing agreements with database vendors, each
of whom may have different terms and conditions. Dealing with multiple database vendors can
be cumbersome and challenging for both individuals and organizations.

To streamline access to various databases through a single point of contact, database hosts, or
agents, have emerged. These hosts are connected to multiple databases, allowing users to gain
access to a variety of databases by entering into an agreement with a single database host agent.
While using a database host simplifies the access procedure, users still need to consult directories
and other publications to determine the appropriate database to access, which requires significant
knowledge, expertise, and effort on their part. Casual users and even frequent users seek a simpler
way of accessing information relevant to their interests.

To address this need, a new type of service has been introduced through the establishment of
knowledge gateways. These gateways utilize concepts from artificial intelligence and techniques
from expert systems. Users interact with the knowledge gateways, which provide expert
assistance in selecting the right database related to their subject of interest. The scheme of access
is illustrated in the following figure.

Page 12 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

Figure 5.7: Electronic access information

Through knowledge gateways, users are provided transparent access to information, making the
process of accessing databases more user-friendly and efficient.

ASSIGNMENT 2:
1) Discuss the significance of ISDN and elaborate on its basic concept. Provide an overview
of the protocol architecture of ISDN.
2) Describe the protocol architecture of SS7, including a clear diagram. Explain the call
setup process of ISDN networks using SS7 signaling, supported by a diagram.
3) Analyze the distinctions between ISDN and IDN. Outline the methods of accessing ISDN.
Define broadband ISDN and compare the services offered in B-ISDN.

Page 13 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

QUESTIONS:
1. Motivation for ISDN:

- What factors motivated the development of Integrated Services Digital Networks


(ISDN)?
- How does ISDN address the limitations of traditional telephone networks?
- What are the key advantages of ISDN over previous telecommunication technologies?

2. New Services:

- What new services are enabled by ISDN that were not possible with traditional telephone
networks?
- How does ISDN support the integration of voice, data, and other multimedia services?
- Can you provide examples of innovative services made possible by ISDN?

3. Network and Protocol Architecture:

- What is the architecture of an ISDN network, and how does it differ from traditional
telephone networks?
- What protocols are used in the ISDN architecture, and what are their roles?
- How does the ISDN architecture support the integration of various services and
applications?

4. Transmission Channels:

- What types of transmission channels are available in ISDN?


- How are these channels allocated and managed within the ISDN network?
- What are the characteristics and capabilities of each type of transmission channel?

5. User Network Interface:

- What is the User Network Interface (UNI) in the context of ISDN?


- How does the UNI facilitate communication between end-users and the ISDN network?
- What are the standard interfaces and protocols used at the UNI?

6. Signaling:

- How is signaling handled in ISDN networks?


- What signaling protocols are used for call setup, teardown, and other network
management functions?
- How does ISDN signaling ensure efficient and reliable communication?

7. Numbering and Addressing:

- How are numbers and addresses assigned in an ISDN network?


- What is the structure of ISDN numbering and addressing schemes?
- How does ISDN ensure globally unique identifiers for network entities?

8. Service Characterization:

- How are services characterized and differentiated in ISDN?


- What parameters are used to describe the quality and capabilities of ISDN services?

Page 14 of 15
BEE4102 TELEPHONE SYSTEMS CHAPTER 5

- How does ISDN meet the diverse needs of users with different service requirements?

9. Interworking:

- How does ISDN interwork with other telecommunication networks and systems?
- What protocols and mechanisms are used for interoperability between ISDN and non-
ISDN networks?
- Can you explain the challenges and solutions for seamless integration between ISDN and
other networks?

10. ISDN Standards:

- What organizations are responsible for developing and maintaining ISDN standards?
- What are some key ISDN standards and specifications?
- How do these standards ensure compatibility and interoperability among different ISDN
implementations?

11. Broadband ISDN and Voice Data Integration:

- What is Broadband ISDN (B-ISDN), and how does it differ from traditional ISDN?
- How does B-ISDN support higher data rates and multimedia applications?
- Can you explain how ISDN facilitates the integration of voice and data services, including
packet-based voice transmission?

Page 15 of 15

You might also like