Practical Data Communications Roger L Freeman
Practical Data Communications Roger L Freeman
Practical Data Communications Roger L Freeman
Communications
Practical Data
Communications
Second Edition
Roger L. Freeman
New York
Chichester
Weinheim
A Wiley-Interscience Publication
JOHN WILEY & SONS, INC.
Brisbane
Singapore
Toronto
Designations used by companies to distinguish their products are often claimed as trademarks.
In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names
appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the
appropriate companies for more complete information regarding trademarks and registration.
Copyright 1995, 2001 by Roger L. Freeman. All rights reserved.
Published by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic or mechanical, including uploading, downloading,
printing, decompiling, recording or otherwise, except as permitted under Sections 107 or
108 of the 1976 United States Copyright Act, without the prior written permission of the
Publisher. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY
10158-0012, 212. 850-6011, fax 212. 850-6008, E-Mail: PERMREQ & WILEY.COM.
This publication is designed to provide accurate and authoritative information in regard to the
subject matter covered. It is sold with the understanding that the publisher is not engaged in
rendering professional services. If professional advice or other expert assistance is required, the
services of a competent professional person should be sought.
ISBN 0-471-22422-7
This title is also available in print as ISBN 0-471-39302-9 cloth. and 0-471-39273-1 paper..
For more information about Wiley products, visit our web site at www.Wiley.com.
CONTENTS
Preface
Chapter 1
Chapter 2
xxix
The
1.1
1.2
1.3
1.4
1.5
13
vii
viii
CONTENTS
2.9.4
Chapter 4
41
57
CONTENTS
ix
4.5
Chapter 5
Data Transmission I
5.1 Electrical Communication of Information 73
5.2 The Bit and Binary Transmission of
Information 73
5.3 Binary Codes for Data Communication 76
5.4 Electrical Bit Decisions 79
5.5 Electrical Representation of Binary Data 82
5.5.1 Neutral and Polar Waveforms 82
5.5.2 Waveforms and Line Codes 83
5.6 Binary Conventions 84
5.7 Bit-Parallel and Bit-Serial 85
5.8 Baseband 86
5.9 Data Rate 87
5.9.1 Error Rate 87
References 88
73
Chapter 6
Data Transmission II
6.1 Interpreting a Serial Stream of Bits 89
6.1.1 The Problem 89
6.1.2 StartStop Transmission 89
6.1.3 Synchronous Transmission 91
6.2 Timing Distortion in a Serial Bit Stream 93
6.3 The Transmission of Digital Data 94
6.3.1 Baseband Transmission 94
6.3.2 Transmission of Data over Longer
Distances 95
6.3.2.1 The Voice Channel 95
6.3.2.2 Modems 95
6.3.2.3 Voice Channel Impairments to
Data Transmission 97
6.3.3 Data Circuit Performance 102
6.3.3.1 Introduction to Error
Performance 102
89
CONTENTS
6.3.3.2
121
CONTENTS
xi
155
xii
CONTENTS
8.5.4
8.5.5
203
CONTENTS
9.5
9.6
xiii
xiv
CONTENTS
9.6.7.4
9.7
9.8
CONTENTS
xv
9.8.3.1
9.8.3.2
9.8.3.3
Overview 277
Objectives 278
Summary of 1000BASE-X
Sublayers 278
9.8.3.4 Physical Coding Sublayers PCS.
279
9.8.4 System Considerations for Multisegment
1000-Mbps Networks 283
9.8.4.1 Overview 283
9.8.4.2 Single-Collision-Domain
Multisegment Networks 284
9.8.4.3 Transmission System
Model 1 285
9.8.4.4 Transmission System
Model 2 285
References 288
Chapter 10
289
xvi
CONTENTS
10.1.4.3
10.1.4.4
363
CONTENTS
11.2.1.1
xvii
xviii
CONTENTS
11.4.5.3
11.4.5.4
11.4.5.5
11.4.5.6
11.4.5.7
Frame Relay
12.1 How Can Networks Be Speeded Up? 433
12.1.1 The Genesis of Frame Relay 435
12.2 Introduction to Frame Relay 436
12.2.1 The Frame Structure 437
12.2.2 Address Field Discussion 441
12.2.2.1 Address Field Variables 441
12.3 DL-CORE Parameters As Defined by ANSI.
444
12.3.1 Procedures 444
12.4 Traffic and Billing on Frame Relay 445
433
CONTENTS
xix
xx
CONTENTS
13.6.2.2
13.6.2.3
13.6.2.4
13.6.2.5
13.6.2.6
527
CONTENTS
xxi
xxii
CONTENTS
Chapter 15
551
CONTENTS
xxiii
15.3.1.3
15.3.1.4
15.3.1.5
601
xxiv
CONTENTS
CONTENTS
16.9.4.2
xxv
xxvi
CONTENTS
16.12.4
681
CONTENTS
xxvii
17.3.2
727
xxviii
CONTENTS
18.4
Appendix II
Index
Addressing Conventions
I.1
Transforming Decimal Numbers to Binary
Numbers and Transforming Binary Numbers
to Decimal Numbering 757
I.2
Decimal Digit Representation in IP Addresses
759
I.3
Binary, Octal, and Hexadecimal Numbers
761
Acronyms and Abbreviations
757
763
779
PREFACE TO
THE SECOND EDITION
This revised second edition of Practical Data Communications has been
prepared with the IT technologist in mind, rather than the electrical engineer. I did this simply to reach a larger readership. The revision required a
completely different perspective on my part. I found this experience refreshing.
But which came firstthe chicken or the egg? In this case, where should
the emphasis be placed? On the electrical data signal itself? Or the software
that makes a data circuit work? I opted for the latter in this edition.
Still and yet, I have not lost sight of my principal purposeto share with
others my long learning experience in the field of data communications. It
started in 1955 with datas predecessor, the automatic telegraph aboard a
ship where I served as Radio Officer, using the old Teletype Corporation
Model 15 clacking along at 60 wordsrminute wpm.. When ashore, I marveled at the Navys 100 wpm circuits which operated at 75 bps. When I was
station engineer at the USAF 2049 th Communications Group, one of the first
LogComNet circuits was established between McClellan AFB and Norton
AFB. It was truly high speed at 150 bps. The circuit was asynchronous, better
called a startstop operation. That system became DoDs AutoDin and was
indeed a data circuit, but based on telegraph technology.
My learning was based on setting up real circuits; the experience was
hands-on. Thus my goal with this text is to facilitate an understanding of data
communications that emphasizes practical application rather than theory. It
is meant to serve as a basic reference for practitioners at all levels of this vital
industry. It is tutorial as well, and will bring along the neophyte.
I have gone to great lengths to use careful language. The term bandwidth
is one of which I am particularly conscious. It is measured in Hz, not in bits
per second, which seems to be the prevailing belief. I will admit I have been
forced to slip on the misuse of words when I quote somebody.
This text deals with generic systems. I have kept clear of any description of
proprietary techniques. Ethernet and CSMArCD are used synonymously. If
some find fault with equating the twoso be it. When I prepared the first
xxix
xxx
edition, there were three subsets of IEEE 802.3; today there are 22 quoted in
the IEEE green tome, some 1200 pages thick. I have devoted one complete
chapter to this subject because it pervades the marketplace. There are two
reasons for this: cost and simplicity.
Some people refer to telecommunications as a technology dealing exclusively with voice communications. Data communication is a separate entity
with its own rules and laws of nature; never the twain shall meet. From my
perspective, they both fall under electrical communication, which is synonymous with telecommunication. In fact, later chapters of the text show the
melding of voice, data and video into the larger field of telecommunication.
For example, the underlying objective of the Integrated Services Digital
Networks ISDN. is the integration of all media into a single telecommunication system. ATM is based on the same premise, and in my opinion, truly
accomplishes the goal. I did prepare one section on the philosophy of
signaling showing where, in that one arena, data and traditional voice
telecommunications differ.
I also have broken with tradition and included chapters on the description
of the present underlying digital network, including SONET and SDH. Other
texts on data do not do this. I firmly believe that to design a complete data
network, more often than not, we have to take advantage of services available
from the PSTN. This is common practice with WANs. In Chapter 17,
Last-Mile Data Distribution Systems, a customer can access any one or
several of the media at hisrher premises site, which are voice, data, and
video. On the entry side, these circuits somewhere, somehow, will be transported on the PSTN. Knowledge of how the PSTN can either hurt or help, is
vital for a complete understanding of data networks.
The first edition chapter sequence started with rudimentary electrical
signals and later on introduced protocols. This edition does the reverse,
starting with a description of a data-link layer protocol after introducing the
layering concept and OSI. There are three chapters dealing with data
transmission, which serve as a tutorial basis for the remainder of the book.
LANs and WANs are treated in an area which I choose to call Enterprise
Networks. I emphasize data networks and their protocols eliminating discussion of specialized networks, such as DQDB, SMDS, and HIPPI. IPv4 is
stressed, but I do include a short overview of IPv6. An entire chapter is
devoted to ATM, highlighting data application.
I am of the opinion that three generic system types, CATV, DSL and
LMDS, will vie for last-mile distribution. One or two of these systems will
continue the battle for leadership for broadband delivery during the lifetime
of this edition. Internet connectivity is the driving force. A brief description
of each system can be found in Chapter 17.
During the preparation phase of the second edition, the Internet was
discovered to be an excellent source of information. This held particularly
true for IP. There is a data bank available for all RFCs including the latest.
xxxi
ACKNOWLEDGMENTS
Dr. Ernie Woodward gave me a new perspective on how to present practical
data communications to a general readership. Data communications may be
broken down into two basic elements: procedural and electrical. I was
brought up more on the electrical engineering side of the fence. Ernie
showed me that there was another way of doing it by following a procedural
approach from the beginning, namely, the application of data protocols. The
objective was to make the book more attractive to IT personnel. Ernie was
previously a section manager at Motorola Chandler and now is with INTEL
here in the Valley. While at Motorola, Ernie was my boss for some eight
months. In that period, I prepared the Frame Relay Interface Control
Document for the Celestri terminal segment. He was a great boss and is a
fine human being.
Many other associates offered positive suggestions to improve this work.
Dr. Ron Brown, an independent consultant, gave me a lot of encouragement
for the new approach while the book was in the outline stage. I have gone out
on a limb with several statements and Ron and John Lawlor supported me.
John is another associate and independent consultant. Our son, Bob, who
works in the field, gave me much encouragement, particularly in layer 3
switching, or is it routing?.. My wife, Paquita, kept the home fires burning.
She had great patience and gave me warm love and support.
I also received support and encouragement from the crew I worked with at
Motorola on the Celestri program which eventually became Teledesic .. In
particular, the wife-and-husband engineering team, Jill and Dave Wheeler,
gave me insight into network security. Doug White, Mr. TCPrIP, willingly
answered my many questions on such topics as time to live. Thank you all.
You are a great crew.
ROGER L. FREEMAN
Scottsdale, Arizona
December 2000
Practical Data
Communications
30
31
1
THE ENTERPRISE NETWORK
ENVIRONMENT
Figure 1.1. An example of a LAN. Single ownership is assumed over its entire route.
This would be a private network. With the familiar arrangement, the connectivity could be facilitated by the owners local telephone company or by a
long-distance carrier such as Sprint, MCI, France Telecom, or AT & T.
An example of a LAN is illustrated in Figure 1.1, and an example of a
WAN is shown in Figure 1.2.
The bit rate capacity of a LAN varies from 4 Mbps to 1000 Mbps; for a
WAN, from 56r64 kbps to 1.5r2.0 Mbps up to 45 Mbps or greater. The LAN
ordinarily is owned by the enterprise. Therefore there are no recurring costs
besides maintenance. The WAN customarily involves leasing, commonly from
the PSTN or other common carrier. Leasing is a recurring cost, and it
increases exponentially with bit rate and more or less linearly with distance.
Maintenance is customarily borne by the carrier leasing the circuits to the
enterprise. The exception, of course, is when the enterprise can justify a
private network. Power companies have private networks.
Often an enterprise will have many LANs. In some cases they may be
interconnected by bridges that contain routing software. Some types of LANs
have very severe distance limitations, typically Ethernet* LANs. Even with
the 2.5-km maximum extension, such a LAN can accommodate hundreds of
accesses. As the number of accesses increases, the efficiency of a LAN,
especially an Ethernet LAN, decreases. Transactions slow down; and in the
case of Ethernet, collisions and backoffs increase. Somewhere between an
18% to 35% activity factor, transactions will stop and the entire time is spent
with collision resolution.
One method to alleviate the situation is to segment the LAN into areas of
common community of interest. A bridge connects segments together. For
example, the entire accounting department is on one segment; the operations
department on another segment; and engineering on a third segment. Traffic
intensity inside a segment is high; among segments it is low.
sense of a WAN. Figure 1.1 shows a simple bus network. A tree network is
illustrated in Figure 1.5, and a ring network is shown in Figure 1.6. Figure 1.7
is a simple star network, and Figure 1.8 shows a higher-order star network. In
some situations in the enterprise environment, star networks are used e.g.,
where a PABX acts as a data switch .. In the PSTN, the hierarchical network
is nearly universal. A hierarchical network derives from the higher-order star
network.
The two most common topologies found in the local area enterprise
environment are the busrtree configuration and the ring network. Ethernet
utilizes a tree topology; token ring, of course, uses a ring; and FDDI is based
on the ring configuration.
A LAN will have three or four types of terminals attached. These are
workstations PCs., one or more servers, and often a bridge and hubs. A
bridge connects the LAN to other LANs.rWANs. or to another segment of
the same LAN.
A serer can be broadly defined as a device that performs a service for a
user or for the network. For example, on a network running NT, a network
serer polices the network with logins and firewalls; it may also carry out
complex processing functions for a user. A print serer allows users to share a
high-speed printer. File serers contain large core storage and high-speed
processing capabilities.
Figure 1.9. A simple LAN connected in a ring topology showing the use of a wiring closet.
end of that time duration, the user must relinquish the token to the next user
in line. If a user cannot finish transmitting the packets the station has in
queue, the user must await the next turn on the token.
We discuss these access techniques in Chapters 9 and 10.
TABLE 1.1 Initial Selection Tradeoff Analysis: Random Access and Token Passing
Item r Parameter
Cost r user
Installation simplicity
Traffic load
Number of accesses
Maximum distance
Random Access
(i.e., Ethernet)
Low
More simple
Breaks down at 18%
to 38% loading
Up to 1000 (in theory)
Up to 2500 m
Controlled Access
(i.e., Token Passing)
Mediumhigh
More complicated
Handles up to 100% loading
Up to 250 (token ring)
Up to 16-dB loss at 16 MHz
or 640 ft (195 m) with
CAT5 UTP. FDDI 100 km
Token passing time;
function of number of users:
10 users, low; 200 users,
mediumhigh
10
Encapsulation. Encapsulation is the adding of header and control information to a frame in front of the text or info field and the adding of
parity-check information. The parity-check field is generally carried
after the text or info field of a frame. Use of the parity check is
described in detail in Chapter 4 in the section on data integrity Section
4.3.5..
Connection Control There are three stages of connection control:
1. Connection establishment
2. Data transfer
3. Connection termination
Of course we are talking about connection-oriented service. There is no
connection control in connectionless service.
Some of the more sophisticated protocols also provide connection interrupt and recovery capabilities to cope with errors and other sorts of interruptions.
Ordered Deliery. Packets, frames, or blocks are often assigned sequence
numbers to ensure ordered delivery of data at the destination. In a
large network with many noses and possible routes to a destination,
especially when operated in the packet mode, the packets can arrive at
the destination out of order. With a unique packet or frame numbering
plan using a simple numbered sequence, it is a rather straightforward
task for a long file to be reassembled at the destination in its original
order. Packet and frame numbering, as discussed in Chapter 4, is also a
tool used to maintain data integrity.
Flow Control. Flow control refers to the management of the data flow
from source to destination such that buffer memories do not overflow,
but maintain full capacity of all facility components involved in the data
transfer. Flow control must operate at several peer layers of protocols,
as will be discussed later.
Error Control. Error control is a technique that permits recovery of lost or
errored packets frames or blocks.. There are four possible functions
involved in error control:
1. Numbering of packets frames, blocks. to maintain a consistent
accounting system. This will indicate at the receive end if there
are packets missing. It is also a handy tool used in a data integrity
acknowledgment scheme.
2. Incomplete octets. By definition an octet must have 8 bits.
3. Incomplete frames. When key elements of a frame are missing or
are redundant. When the octet maximum in an information field
is exceeded or when the octet minimum is not complied with.
4. Bit-error detection. Error detection and error correction are
discussed in Sections 4.4 and 4.5.
REFERENCES
11
REFERENCES
1. Roger L. Freeman, Fundamentals of Telecommunications, John Wiley & Sons, New
York, 1999.
2. The IEEE Standard Dictionary of Electrical and Electronic Terms, IEEE Std. 1001996, IEEE, New York, 1996.
2
THE OSI MODEL AND THE
DATA-LINK LAYER
2.1 INTRODUCTION
The concept of Open System Interconnection OSI. and its reference model
were developed by the International Standards Organization ISO; Geneva.
in the early 1970s. The ISO impetus to develop OSI stemmed from the
proliferation of proprietary systems typically IBM 360 and UNIX, others.
that could not interoperate. The concept was that if an operating system or
protocol was developed around an open system rather than a proprietary
system, interoperation of systems became more practicable.
The IEEE Ref. 1. defines an open system as follows:
A system that implements sufficient specifications for interfaces, and supporting
formats to enable properly engineered applications software to be ported across
a wide range of systems with minimal changes, to interoperate with other
applications on local and remote systems, and to interact with users in a style
which facilitates user portability.
A key element of this definition is the use of the term open specification,
which is defined Ref. 1. as follows:
A public specification that is maintained by an open, public consensus process
to accommodate new technology over time and that is consistent with standards.
14
2.2 LAYERING
2.2.1 Notation
In the layered OSI model the following notation is used:
N .-layer: any specific layer
N q 1.-layer: the next higher layer
N y 1.-layer: the next lower layer
15
one or several N .-entities. Entities exist in each layer. Entities in the same
layer are termed peer entities. Note that the highest layer does not have an
N q 1.-layer above it and the lowest layer does not have an N y 1.-layer
below it.
Not all peer N .-entities need, nor have the ability, to communicate.
There may be conditions that prevent this communication e.g., they are not
in interconnected open systems, or they do not support the same protocol
subsets ..
16
DATA UNITS
17
18
Figure 2.5. An illustration of mapping between data units in adjacent layers. PCI, protocol
control information; PDU, protocol data unit; SDU, service data unit. Note 1. This figure
assumes that neither segmenting nor blocking of ( N )-service data units is performed. Note 2.
This figure does not imply any positional relationship between protocol control information
and user data in protocol data units. Note 3. An ( N )-protocol data unit may be mapped
one-to-one into an ( N y 1)-service data unit, but other relationships are possible. (From
Figure 9, page 16, ITU-T Rec. X.200, Ref. 2.)
Except for the relationships defined in Figures 2.4 and 2.5, there is no
overall architectural limit to the size of data units. There may be other size
limitations at specific layers. The size of N .-interface data units is not
necessarily the same at each end of the connection. Data may be held within
a connection until a complete data unit is put into the connection.
2.6 SPECIFIC LAYERS OF THE OSI REFERENCE MODEL
The OSI reference model contains seven layers as shown in Figure 2.6. The
highest layer, the layer at the top of the figure, is the application layer, which
consists of application entities that cooperate in the OSI environment OSIE..
The lower layers provide services through which the application entities
cooperate.
Layers 16 together with the physical media for OSI provide a step-by-step
enhancement of communication services at which an OSI service recommendation is defined, while the functioning of the layers is governed by OSI
protocol recommendations.
Not all open systems provide initial source or final destination of data.
When the physical media for OSI do not link all open systems directly, some
open systems act only as relay open systems,* passing data to other open
systems. The functions and protocols that support the forwarding of data are
then provided in the lower layers as shown in Figure 2.7. Note in the figure
that the relay function only requires the first three OSI layers.
LAYER DESCRIPTIONS
19
Figure 2.6. The seven-layer OSI reference model with peer protocols. (From Figure 11, page
28, ITU-T Rec. X.200, Ref. 2.)
Figure 2.7. Communication involving relay open systems. (From Figure 12, page 29, ITU-T
Rec. X.200, Ref. 2.)
20
The application entity contains one user element and a set of application
service elements. The user element represents that part of the application
process which uses those application service elements needed to accomplish
the communication objectives of that application process. Application service
elements may call upon each other andror upon presentation services layer
6. to perform their function.
The only means by which user elements in different systems may communicate is through the exchange of application protocol data units. These
application protocol data units are generated by application service elements.
Other services that may be included in the application layer are a.
identification of intended communication partners e.g., by name and address, by definite description, and by generic description ., b. determination
of the current availability of intended communication partners, c. establishment of the authority to communicate, d. authentication of intended communication partners, e. determination of cost allocation methodology, f.
determination of adequacy of resources, g. determination of acceptable
quality of service such as response time and error rate., h. synchronization
of cooperating applications, i. selection of the dialogue discipline including
the initiation and release procedures, j. agreement on the responsibility for
error recovery, k. agreement on procedures for control of data integrity, and
l. identification of constraints on data syntax character sets, data structure ..
When a specific instance of an application process wishes to communicate
with an instance of an application process in some other open system, it must
invoke an instance of an application entity in the application layer of its own
open system. It then becomes the responsibility of this instance of the
application entity to establish an association with an instance of an appropriate application entity in the destination open system. This process occurs by
invocation of instances of entities in the lower layers. When the association
between the two application entities has been established, the application
processes can communicate.
Presentation Layer. Two definitions need to be given here:
Concrete Syntax. Those aspects of the rules used in the formal specification
of data which embody a specific representation.
Transfer Syntax. The concrete syntax used in the transfer of data between
open systems.
The presentation layer provides for the representation of information that
application entities either communicate or refer to in their communication.
The presentation layer covers two complementary aspects of this representation of information: i. the representation of data to be transferred between
application entities and ii. the representation of the data structure which
application entities refer to in their communication, along with the representation of the set of actions which may be performed on this data structure.
LAYER DESCRIPTIONS
21
22
performed either as a specific syntax-matching service provided to the application entities or as a function internal to the presentation layer.
Negotiation of syntax is carried out by communication between presentation entities on behalf of the application entities to determine the form that
data will have while in the OSI environment. The negotiations will determine
what transformations are needed if any. and where they will be performed.
Negotiations may be limited to the initiation phase, or they may occur any
time during a session.
Session Layer. Two definitions need to be given here:
Interaction Management. A facility of the session service which allows correspondent presentation entities to control explicitly whose turn it is to
exercise certain control functions.
Session-Connection Synchronization. A facility of the session service which
allows presentation entities to define and identify synchronization points
and to reset a session connection to a predefined state and to agree on a
resynchronization point.
The purpose of the session layer is to provide the means necessary for
cooperating presentation entities to organize and synchronize their dialogue
and to manage their data interchange. To do this, the session layer provides
services to a. establish a session connection between two presentation
entities and b. support orderly data exchange interactions.
To implement the transfer of data between presentation entities, the
session connection is mapped onto and uses a transport connection transport layer, layer 4..
A session connection is created when requested by a presentation entity at
a session-service access point. During the lifetime of the session connection,
session services are used by the presentation entities to regulate their
dialogue and to ensure orderly message exchange on the session connection.
The session connection exists until it is released by either of the presentation
entities or the session entities. While the session connection exists, session
services maintain the state of the dialogue even over data loss by the
transport layer.
A presentation entity can access another presentation entity only by
initiating or accepting a session connection. A presentation entity may be
associated with several session connections simultaneously. Both concurrent
and consecutive session connections are possible between two presentation
entities.
The initiating presentation entity designates the destination presentation
entity by a session address. In many systems, a transport address may be used
as the session address i.e., there is a one-to-one correspondence between the
session address and the transport address .. In general, however, there is a
LAYER DESCRIPTIONS
23
24
LAYER DESCRIPTIONS
25
26
a.
b.
c.
d.
e.
f.
g.
Data-link addresses
Data-link connection
Data-link service data units SDUs.
Data-link connection endpoint identifiers
Error notification
Quality of service QoS. parameters
Reset
LAYER DESCRIPTIONS
27
Data-Link Serice Data Units. The data-link layer allows for exchange of
data-link service data units over a data-link connection or exchange of
data-link-service data units that bear no relation to any other data-link
service data units. using the connectionless mode data-link service. The size
of the data-link service data units may be limited by the relationship between
the physical-connection error rate and the data-link layer error detection
capability.
Data-Link Connection Endpoint Identifiers. If needed, the data-link layer
provides data-link connection endpoint identifiers that can be used by a
network entity to identify a correspondent network entity.
Error Notification. Notification is provided to the network-entity when any
unrecoverable error is detected by the data-link layer.
Quality of Serice Parameters. Quality of service parameters may be optionally selectable. The data-link layer establishes and maintains a selected
quality of service for the duration of the data-link connection. The quality of
service parameters include mean time between detected but unrecoverable
errors, residual error rate where errors may arise from alteration, loss,
duplication, misordering, misdelivery of data-link service data units, and
other causes., service availability, transit delay, and throughput.
Reset. The network-entity can force the data-link entity invocation into a
known state by invoking the reset facility.
FUNCTIONS WITHIN THE DATA-LINK LAYER. In the connection mode and connectionless mode, the functions performed by the data-link layer are as
follows:
a.
b.
c.
d.
e.
f.
In the connection mode, the following functions are also performed by the
data-link layer:
a. Data-link connection establishment and release
b. Connection mode data-link data transmission
c. Data-link connection splitting
28
d.
e.
f.
g.
h.
Sequence control
Delimiting and synchronization
Flow control
Error recovery
Reset
LAYER DESCRIPTIONS
29
Identification and Parameter Exchange. This function performs data-linkentity identification and parameter exchange.
Reset. This function performs a data-link reset forcing the data-link-entity
invocation to a known state.
Control of Data-Circuit Interconnection. This function conveys to network
entities the capability of controlling the interconnection of data circuits
within the physical layer.
Note: This function is used in particular when a physical connection is
establishedrreleased across a circuit-switched subnetwork by relaying within
an intermediate system between data circuits. These data circuits are elements of the end-to-end path. A network entity in the intermediate system
makes the appropriate routing decisions as a function of the path requirements derived from the network signaling protocols.
Routing and Relaying. Some subnetworks, and particularly some configurations of LANs, require that routing and relaying between individual local
networks be performed in the data-link layer.
Data-Link Layer Management. The data-link layer protocols deal with
some management activities of the layer such as activation and error
control.. See Section 8 of ITU-T Rec. X.200 Ref. 2. and ITU-T Rec. X.700
Ref. 3. for the relationship with other management aspects.
Physical Layer. The following definition needs to be given here:
Data Circuit. A communication path in the physical media for OSI between
two physical entities together with the facilities necessary in the physical
layer for the transmission of bits on it.
The physical layer provides mechanical, electrical, functional, and procedural means to activate, maintain, and deactivate physical connections for bit
transmission between data-link entities. A physical connection may involve
intermediate open systems, each relaying bit transmission within the physical
layer. Physical layer entities are interconnected by means of a physical
medium.
SERVICES PROVIDED TO THE DATA-LINK LAYER. The services or elements of
services provided by the physical layer are as follows:
a. Physical connection
b. Physical-service data units
c. Physical connection endpoints
30
Figure 2.8. Interconnection of data circuits within the physical layer. (From Figure 17, page
50, ITU-T Rec. X.200, Ref. 2.)
d.
e.
f.
g.
Data-circuit identification
Sequencing
Fault condition notification
Quality of service parameters
LAYER DESCRIPTIONS
31
a.
b.
c.
d.
32
Figure 2.9. Examples of interconnection. (From Figure 19, page 52, ITU-T Rec. X.200,
Ref. 2.)
conveyed by the individual physical connections over the single data circuit.
The multiplexing function is optional.
Note: A particular example of the use of multiplexing is offered when a
transmission media is divided into data circuits in support of the different
data link protocols used in the signaling phase and in the data transfer phase
when using circuit-switched subnetworks. In such usage of multiplexing, flows
of different nature are permanently assigned to different elements of the
multiplex group.
Physical Layer Management. The physical layer protocols deal with some
management activities of the layer such as activation and error control.. See
Section 8 of Ref. 2 and ITU-T Rec. X.700 Ref. 3. for the relationship with
other management aspects.
Note: The above text deals with interconnection between open systems as
shown in Figures 2.6 and 2.7. For open systems to communicate in the real
environment, real physical connections should be made as, for example, in
Figure 2.9a. Their logical representation is as shown in Figure 2.9b and is
called the physical media connection. The mechanical, electromagnetic, and
other media-dependent characteristics of physical media connections are
defined at the boundary between the physical layer and the physical media.
Definitions of such characteristics are specified in other standards which
shall be discussed below.
33
34
Figure 2.11. Entities, service access points (SAPs), and identifiers. (From Figure 7, page 14,
ITU-T Rec. X.200, Ref. 2.)
35
connect, maintain connected, and disconnect the physical circuits that form
the physical connectivity. The physical layer describes the traditional interfaces between data terminal equipment DTE. and data communication
equipment DCE.. These interfaces are described in Section 6.4 Chapter 6..
The physical layer has four important characteristics:
Mechanical
Electrical
Functional
Procedural
The mechanical aspects include the actual cabling and connectors necessary
to connect the communications equipment to the transmission medium.
Electrical characteristics include voltage, signal sense,* impedance, and balanced or unbalanced circuits for signal and control. Functional characteristics
cover connector pin assignments at the interface and the precise meaning
and interpretation of the various interface signals and data set controls.
Procedures cover sequencing rules that govern the control functions necessary to provide higher-layer services such as establishing a connectivity across
a switched network.
Some of the applicable standards for the physical layer are as follows:
EIA stands for Electronics Industries Alliance; TIA stands for Telecommunications Industry
Association.
36
Figure 2.12. Generalized data-link layer frame. The address and control fields taken together
are often referred to as the header.
or logical link control LLC in the case of LANs. and inserts a payload data
unit into the INFO portion of the link layer. A generic data-link layer frame
is illustrated in Figure 2.12.
There is a fair universality of this type of frame for the data-link layer
across numerous data protocol families. Chapter 3 contains a detailed discussion of one application of a typical data-link layer frame.
Moving from left to right in Figure 2.12, the first field is the flag field. In
nearly all data-link frames of this type, this field is the bit sequence 01111110.
It tells the receiving processor of the frame to start counting bitsroctets
bytes. at the end of the 8th bit of the flag sequence. The receiving processor
knows a priori the length of the address and control fields so it can delineate
these two. It also knows by counting octets. that the end of the control field
is the beginning of the information field.
The information field, depending on the protocol, may be of fixed length
or variable length. If it is of fixed length, the processor will have this length
information a priori. For the variable-length case, the control field will carry
that length information which will tell the receiving processor what length to
expect.
The processor continues its counting of bytes octets. and will know the
end boundary of the information field. It will now know that the next two
octets bytes. carry the frame check sequence FCS. information for the case
of a WAN, and it will know that the next four octets carry the FCS in the
case of a LAN.
The functions of the fields are described as follows. The flag provides the
marker for the beginning of operations. It delimits the frame at both ends. If
only one frame is to be transmitted, the flag bit sequence not only starts the
frame but it is also appended at the end of the frame to indicate termination.
If another frame follows directly after the first frame, the ending flag
sequence of the first frame is the beginning flag sequence of the second
frame.
In some types of data-link layer protocols the address field only contains
the destination address. However in most cases, it contains both the destination address es. and the source address.* In other words, the address field
tells the receiving processor who is the intended recipient s. of the data
message or frame. In some cases a second address field follows the destination address. This is the source address field that tells the receiving processor
who originated the data message or frame.
*The source is the originator of the frame or packet.
37
The control field covers a number of functions such as sequence numbering, a commandresponse bit, and type of frame such as information frame,
supervisory frame, and unnumbered frame. The control frame will often have
a flow control responsibility, usually incorporated in the sequence numbering. In the cases of a variable-length frame, it will give some indication to the
receiving processor the length of the information field.
The information field contains a payload service data unit inserted by the
network layer. For fixed-length frames, the information field will contain
padding if there are insufficient bytes octets. inserted by the network layer
to fulfill minimum byte octet. requirements. There must be some sort of
indicator to tell the processor that there is padding and how much to expect.
The frame check sequence FCS. is the primary tool used to detect
transmission errors. See Section 4.4 for a detailed discussion of the operation
of an FCS.
2.9.3 The Network Layer (Layer 3)
The network layer moves data through the network. At relay or switching
node along the traffic route, layering concatenates. In other words, the
higher layers above layer 3. are not required, and they are used only at user
endpoints. The user endpoints and relay function are shown in Figure 2.7.
The network layer carries out the functions of switching and routing,
sequencing, and logical channel control. We note the duplication of error
recovery with the data-link layer. Link layer error recovery is only on the link
it is responsible for. Network layer error recovery is network-wide.
The network layer also provides and manages logical channel connections
between points in the network such as virtual circuits across the PSTN. On
simpler data connectivities, such as point-to-point, point-to-multipoint, and
LANs, the network layer is not required and can be eliminated. A packetswitched network, on the other hand, is a typical application where the
network layer is most necessarily needed.
The best-known network layer standard is ITU-T Rec. X.25. Other protocols are ISO 8348 and the Internet Protocol IP of the TCPrIP family of
protocols.. However, in this chapter we treat IP in its specialized function of
interfacing between disparate networks in an artificial layer called layer 3.5.
2.9.4 Internet Protocol (IP) and Gateway Sublayer (Layer 3.5)
William Stallings in his Handbook of Computer-Communication Standards
Ref. 5., has introduced a sublayer called layer 3.5. This sublayer provides
functions for interfacing different networks. When one of the networks is a
LAN and the other a WAN, Stallings uses the term gateway as the device
that performs the interface function. Commonly, this function is performed
by a router or even a bridge.
A popular protocol for interfacing disparate networks is the Internet
Protocol IP., which is usually joined with a related protocol called Transmis-
38
sion Control Protocol TCP..* Thus we have TCPrIP, which was developed
for the U.S. Department of Defense DoD.. It is now one of the most widely
used protocols in the commercial sector for OSI layers 3 and 4.
One applicable gateway protocol is ITU-T Rec. X.75 Ref. 6., which is a
companion to X.25 Ref. 7.. Figure 2.13 shows the sublayering of OSI layer 3
for internetworking or internetting as suggested by Stallings Ref. 5..
2.9.5 The Transport Layer (Layer 4)
The transport layer layer 4. is the highest layer of the services associated
with the telecommunications provider. From our perspective, OSI layers 14
are the responsibility of the telecommunications system engineer, whereas
layers 5, 6, and 7 are the responsibility of the data end user.
The transport layer has the ultimate responsibility of providing a reliable
end-to-end data delivery service for higher-layer users. It is defined as an
end-system function, located in the equipment using network service or
services. In this way its operations are independent of the characteristics of
all the networks that are involved. Services that a transport layer provide are
as follows:
Connection Management. This includes establishing and terminating connections between transport users. It identifies each connection and
negotiates values of all needed parameters.
Data Transfer. This involves the reliable delivery of transparent data between users. All data are delivered in sequence with no duplication or
missing parts.
Flow Control. This is provided on a connection basis to ensure that data
are not delivered at a rate faster than the users resources can accommodate.
*In fact TCPrIP is part of a rather large and popular family of protocols discussed in Section
11.4.
REFERENCES
39
Transmission Control Protocol TCP, Ref. 8. was the first working version
of a transport protocol and was created, as was the rest of the TCPrIP family
of protocols, by DARPA Defense Advanced Research Projects Agency. for
its DARPANET. All the features of TCP have been adopted in the ISO
version. The applicable ISO references are ISO 8073, called Transport
Protocol Specification, and ISO 8072, called Transport Serice Definition.
Many readers will recognize the TCPrIP family of protocols for the part
they play in the popular, and nearly ubiquitous, INTERNET.
2.10
2.10.1
REFERENCES
1. James Isaak, Kevin Lewis, Kate Thompson, and Richard Straub, Open Systems
Handbook, IEEE Standards Press, IEEE, New York, 1994.
2. Information TechnologyOpen Systems InterconnectionBasic Reference Model:
The Basic Model, ITU-T Rec. X.200, ITU Geneva, July 1994.
3. Management Framework for Open Systems Interconnection (OSI) for CCITT Applications, CCIT Rec. X.700, ITU Geneva, September 1992.
4. Information TechnologyOpen Systems InterconnectionBasic Reference Model:
Conentions for the Definition of OSI Serices, ITU-T Rec. X.210, ITU Geneva,
November 1993.
40
3
HIGH-LEVEL DATA-LINK CONTROL
(HDLC) TYPICAL DATA-LINK
LAYER PROTOCOL
3.1 INTRODUCTION
The majority of the data-link layer protocols in use today derive from HDLC
Ref. 1.. It was developed by the International Standards Organization ISO.,
and the relevant standard is ISO 3309. The following is a partial list of
data-link layer standards spawned by HDLC:
1. Advanced Data Communications Control Procedures ADCCP., developed by ANSI. It has been adopted by the U.S. government for official
use. See FIPS Pub. 71-1 and FED-STD-1003A. It is identical to
HDLC.
2. Link Access Procedure Balanced LAPB. operates in the HDLC balanced mode only, otherwise it is almost identical to HDLC. It is
supported by the ITU-T Organization and is incorporated as part of the
ITU-T Rec. X.25 document Ref. 2.. See Section 11.3.2.
3. Link Access Procedure D-Channel LAPD.. Originally designed for the
ISDN D-channel, Basic Rate Service. Variants of LAPD are used in
the frame relay service see Section 13.7..
4. Synchronous Data-Link Control SDLC. was developed by IBM, particularly for SNA, and has wide use in that arena.
5. Logical Link Control LLC. resides in the upper sublayer 2 of all IEEE
802 and FDDI LANs. See Section 9.4.
In the next section, we define some terms used in HDLC.
41
42
43
44
45
field is 8 bits long and uses modulo-8 sequence numbering. There are three
types of control field: i. I frame information frame., ii. S frame supervisory frame., and iii. U frame unnumbered frame.. The three control field
formats are shown in Figure 3.3.
The control field may be extended by the addition of a second contiguous
octet immediately following the basic field. The extension increases the
modulus count to 128. The extended control field is often used on long
propagation delay circuits such as geostationary satellite circuits, basically to
extend the sequence modulus number.
Consider the basic 8-bit form of the control field as shown in Figure 3.3.
The information follows from left to right. If the first bit in the control field
is a binary 0, the frame is an I frame Figure 3.3a.. If the bit is a 1, the frame
is an S frame or a U frame Figures 3.3b and 3.3c.. If the first bit is a 1
followed by a 0, it is an S frame; and if the bit is a 1 followed by a 1, it is a U
frame. These bits are called format identifiers.
3.4.1 Sequence Numbering in HDLC
Turning now to the I figure Figure 3.3a., its purpose is to carry user data.
Here bits 2, 3, and 4 of the control field in this case carry the send sequence
of transmitted messages I frames.. Sequence numbers are used to detect lost
or out-of-sequence frames. This provides one check on the integrity of the
received data. Sequence numbers are controlled by send and receive state
variables and are represented by send and receive sequence numbers that
appear in the control field.
46
Each information frame is sequentially numbered and may have the value
0 through MODULUS minus 1, where MODULUS is the MODULUS of the
sequence number. Modulus equals 8 for the basic control field and 128 for
the extended control field. The sequence numbers cycle through the entire
range.
The maximum number of sequentially numbered information format
frames that a station may have outstanding i.e., unacknowledged . at any
given time may never exceed one less than the modulus of the sequence
numbers. This restriction is to prevent any ambiguity in the association of
transmission frames with sequence numbers during normal operation andror
error recovery actions.
Conceptually, sequence number control is often represented as a window
that is open to the value equal to the number of unacknowledged frames
allowed before transmission is halted flow control.. The two variables and
two numbers involved are as follows:
Send State Variable V ( S ). This is the sequence number of the next insequence information frame to be transmitted.
Send Sequence Number N( S ). The value of V S . is inserted in the control
field of a transmitted information frame as N S ..
Receive State Variable V ( R ). This denotes the sequence number of the next
expected in-sequence information frame to be received.
Receive Sequence Number N( R ). The value of V R . is inserted into the
control field of a transmitted frame to indicate that frames numbered
N R . y 1 and lower have been received.
To describe window, consider data link X to Y. The receiver Y has seven
buffers the number was selected arbitrarily .. Thus Y can accept seven
frames or messages. and X is allowed to send seven frames without acknowledgment. To keep track of which frames have been acknowledged, each is
labeled with a sequence number 07 modulo 8.. Station Y acknowledges a
frame by sending the next sequence number expected. For instance, if Y
sends a sequence number 3, this acknowledges frame number 2 and is
awaiting frame number 3. Such a scheme can be used to acknowledge
multiple frames. As an example, Y could receive frames 2, 3, and 4 and
withhold all acknowledgments until frame 4 arrives. By sending sequence
number 5, it acknowledges the receipt of frames 2, 3, and 4 all at once.
Station X maintains a list of sequence numbers that it is allowed to send, and
Y maintains a list of sequence numbers it is prepared to receive. These lists
are thought of as a window of frames.
HDLC allows a maximum window size of 7, or 127 frames. In other words,
a maximum number of 7, or 127 unacknowledged frames, can be sent, or one
less than the modulus 8 or 128. N S . is the sequence number of the next
frame to be transmitted, and N R . is the sequence number of the frame to
be received.
47
Bits 1 to 8
1000 PrF
1001 PrF
1010 PrF
1011 PrF
N R.
N R.
N R.
N R.
48
There are also unnumbered information UI. frames that furnish a means of
providing connectionless service at the data-link level. The UI frames are
transmitted without disturbing the N S . and N R . values used in normal I
frame transmissions. Because of this, the sequencing and verification facilities provided by I, RR receive ready command., SREJ selective reject
command., and so on, are not applicable. The UI frame may be lost or
duplicated without any notification to the sender. If a more reliable environment for UI is needed, similar mechanisms to the normal I frames must be
constructed at an OSI layer higher than the data-link layer. The UI frames
can be used for higher layer procedures or for interruption of the normal
data transfer mechanisms without disturbing them. Prioritized or real-time
transmissions can be accommodated by the UI frame.
3.4.5 Information Field
The information field I. follows the control field, as illustrated in Figure 3.2.
The information field is present only in information I. frames and some
unnumbered U. frames. The I field may carry any number of bits in any
code, related to character set structure or not. Its length is not specified in
the ISO underlying standard wISO 3309 Ref. 1.x. Specific system implementations, however, usually place an upper limit on I field size. Some implementations of HDLC require that the I field contain an integral number of octets.
3.4.6 Frame Check Sequence (FCS) Field
The frame check sequence field FCS. follows the information field or the C
field if there is no I field. and is carried in each frame. The FCS field detects
49
errors due to transmission. The FCS field contains 16 bits, in most implementations, which are a result of a mathematical computation on the digital value
of all bits excluding inserted 0s zero insertion. in the frame and including
the address, control, and information fields.
The CRC used in HDLC is based on the CRC-16 FCS developed by
CCITT in Rec. V.41 Ref. 7. using generating polynomial X 16 q X 12 q
X 5 q 1. It should be noted, however, that in some situations that require
more stringent undetected error conditions andror because of frame length,
a 32-bit CRC FCS. may be used. This is similar to the 32-bit CRC used with
LANs, described in Chapter 9.
Error recovery and the operation of the FCSrCRC are described in
Section 4.4.
50
51
52
ERROR RECOVERY
53
54
REFERENCES
55
The final station, the initialization state, uses the set initialization mode
SIM. command, defined in Section 3.5.1, to provide a means for a secondary
station to undergo a system-defined procedure. The procedure will vary
according to the type of equipment and network parameters in a given
implementation. It is intended to place a secondary station in a known state
where it can proceed with data-link control procedures.
There is an unnumbered POLL UP. that is an optional polling mechanism for a primary station. It can be used with a single secondary station or
as a group poll. The group poll procedure is not specified. When the POLL
bit is set, the secondary station must respond with at least one usually RR if
no I frames are ready. frame with FINAL bit set in the last frame. If the
POLL bit is off, the secondary may respond if it has UI, I, unacknowledged
frames, or a change in status to report. The final bit is off in all frames.
REFERENCES
1. High Leel Data Link Control (HDLC) ProceduresFrame Structure, ISO 3309,
International Standards Organization, Geneva, 1976.
2. High Leel Data Link Control ProceduresConsolidation of Elements of Procedures,
ISO 4335, International Standards Organization, Geneva, 1977.
3. High Leel Data Link Control ProceduresConsolidation of Classes of Procedures,
ISO 7809, International Standards Organization, Geneva, 1978.
4. John McConnell, Internetworking & Adanced Protocols, Network Technologies
Group, Inc., Boulder, CO, 1985.
5. Roger L. Freeman, Reference Manual for Telecommunication Engineering, 3rd
edition, John Wiley & Sons, New York, 2001.
6. William Stallings, Handbook of Computer Communication Standards, Vol. 1,
Macmillan, New York, 1987.
7. Code Independent Error Control System, CCITT Rec. V.41, Fascicle VIII.I, IXth
Plenary Assembly, Melbourne, 1988.
4
DATA NETWORK OPERATIONS
4.1 CHAPTER OBJECTIVE
Data communications means to communicate data. The objective of this
chapter is to discuss how we can carry out this function effectively. At the
outset, we assume that there are two terminals in a data connectivity, a
near end of the circuit and a far end. We could call this one-to-one pairing.
There is also another possibility, a one-to-many connectivity, sometimes
called broadcast. For this discussion, data connectivities are on a one-to-one
basis.
The data to be interchanged consists of 8-bit sequences* whose meanings
are understood at both ends of the connection.
This chapter, then, contains a general overview of data operations or the
effective interchange of data between two stations. The word effectie implies
that data messages will be delivered to the destination users. error-free. The
reader should appreciate that no data circuit is completely error-free. Thus
the subject of data integrity is treated with considerable detail.
The final section gives an overview of data switching, along with the
switching alternatives available to the network designer.
57
58
59
60
better is the return on our investment. This brings up the term latency. This
is the time it takes a data message to arrive at its destination from its origin.
Based on averages, the time it takes a data message to cross the North
American continent using packet transmission based on a popular protocol is
about 200 ms; when employing frame relay for the same message, it takes
about 20 ms.
There are several components in the latency equation:
In most situations where a frame or message is corrupted, the framermessage is discarded. In the some cases the originator is informed of the nondelivery. However, in most cases, where feasible, a repeat of the corrupted
frame is requested.
The most common form of a corrupted frame is one in which one or more
errors have occurred. Errors are detected by the receive-end through the
processing the FCS field see Figure 3.2.. A certain known bit sequence is
61
62
Figure 4.1. Sample matrix employing VRC and LRC together. The convention here is odd
parity.
bottom from longitudinal redundancy checking LRC., again using the oddparity checking on each column. We could transmit the 8th row to the distant
end where a similar matrix could be constructed to verify that the same 8-bit
sequence is derived from LRC. Of course the VRC would also be checked.
Using LRC and VRC together reduces the residual error rate from 1 in 100
to 1 in 10,000 Ref. 1..
It can be demonstrated that VRCrLRC used in tandem leaves a fair
amount of residual errors. The next section discusses cyclic redundancy check,
which has excellent residual error performance.
4.4.2 Cyclic Redundancy Check (CRC)
A more powerful method of error detection involves the use of CRC. It is
employed with HDLC Chapter 3.. It is used with messages that are data
blocks, frames, or packets. Such a data message can be simplistically represented as shown in Figure 4.2.
The bit sequence in a data frame can be represented by a polynomial.
Lets call this the message polynomial, G X .. G X . is multiplied by X 16 ,
which corresponds to shifting the message G X . 16 places to provide space
for the 16 bits in the FCS. We divide the resulting product w X 16 GX .x by a
known generating polynomial. The result of this division is a quotient and a
remainder. The remainder is 16 bits long, and it is placed in the FCS slot
Figure 4.2.. At the receive side, essentially the same operation is repeated
and a remainder is generated. If the remainder generated by the receiver is
the same sequence as found in the FCS slot of the received frame, the frame
is error-free. If it is not the same, there was at least one bit error in the
received frame.
63
Figure 4.2. Coverage of CRC in a data-link frame (based on HDLCrLAPB). Note that there
are 16 bits in the FCS field (Ref. 2).
Note: The description of CRC operation given above is valid for HDLC
and its related link layer protocols such as ADCCP and LAPB. In fact, for
error-free operation, the remainder is the sequence 0001110100001111. Traditional CRC systems that do not start with a preset value in the shift register
as HDLC does. have an all-zero remainder for error-free operation.
There are two generator polynomials accepted by the industry:
ANSI CRC16.:
CCITT ITU-T.:
X 16 q X 15 q X 2 q 1
X 16 q X 12 q X 5 q 1
ANSI CRC-16. is applied to synchronous systems that use 8-bit characters. The FCS accumulation is 16 bits. It provides error detection of error
bursts up to 16 bits in length. Additionally, more than 99% of error bursts
greater than 16 bits can be detected.
The CCITT ITU-T. standard generator polynomial also operates with
8-bit characters in synchronous bit streams. The FCS accumulation is 16 bits.
It provides error detection of bursts up to 16 bits in length. In addition, more
than 99% of error bursts greater than 16 bits can be detected. A typical shift
register used with this CRC is shown in Figure 4.3.
Figure 4.3. Shift register used with CRC-CCITT. MSB, most significant bit; LSB, least
significant bit. [, exclusive-OR gate modulo-2 addition.
64
To derive an algebraic polynomial from a string of bits, review the following: A polynomial is usually represented algebraically by a string of terms
in powers of X such as X n q qX 3 q X 2 q X q X 0 or 1.. In binary
form, a 1 is placed in each position that contains a term; absence of a term is
indicated by a 0. The convention used in the following presentation
is to place the X 0 bit at the right. For example, if a polynomial is given as
X 4 q X q 1, its binary representation is 10011 3rd- and 2nd-degree terms
are not present .. The number 1 in the polynomial represents the X 0 power
that was artificially added.
Suppose a message polynomial was 110011. This would be represented by
X 5 q X 4 q X q X 0 or X 5 q X 4 q X q 1..
Stop-and-wait ARQ
Continuous, sometimes called selective, ARQ
Go-back-n ARQ
Stop-and-Wait ARQ. Stop-and-wait ARQ is the most straightforward to implement and the least complex. However, it is inefficient. With stop-and-wait
ARQ, a frame is transmitted to the distant end. At the completion of sending
the frame, transmission ceases stop.. The receiving terminal processes the
frame and then examines the FCS field. If it is the expected sequence for
error-free operation, it sends an acknowledgment ACK. to the sending end,
which then promptly transmits the next frame. However, if the receiving end
does not encounter the expected sequence in the FCS field as a result of its
processing, it sends a negative acknowledgment NACK. to the transmitting
end. The transmitter then resends that frame.
Stop-and-wait ARQ is inefficient primarily due to the stop time. This is
the wasted period of time waiting for the receive end to process the frame
and to send the ACK or NACK. It can be particularly wasteful of circuit time
on connectivities with long propagation delays such as geostationary satellite
circuits, and there are long frames involved. It is, however, ideal for halfduplex operation.
Selective or Continuous ARQ. Selective or continuous ARQ eliminates the
quiescent nonproductive time of waiting and then sending the appropriate
65
signal back after each frame or packet.. With this type of ARQ, the transmit
end sends a continuous string of frames or packets., each with an identifying
number in the header of each frame packet.. When the receive end detects a
frame in error, it requests the transmit end to repeat that frame. The request
that the receiver sends to the transmitter includes the identifying number
more commonly called sequence number . of the frame in error. The transmit
end retrieves that frame from its buffer storage and retransmits it, with the
appropriate identifying number, as another frame in the continuous string.
The receive end receives the repeated frame out of sequence order., reruns
the processing procedure to ensure error-free reception, and then places the
frame in proper numerical sequence for delivery to the end-user facility.
Obviously, selective or continuous ARQ is more efficient regarding circuit
usage. It requires full-duplex operation. Such operation uses bookkeeping at
both ends of the link. It requires more buffer storage at both ends, but the
cost of memory continues to erode.
Go-Back-n ARQ. Go-back-n ARQ is probably the most popular of the three
varieties of ARQ. It, too, permits continuous frame transmission. As with
continuous ARQ, when an errored frame is encountered, the receiving end
informs the far-end transmitter by the return channel. The errored frame is
identified by sequence number. The transmitter repeats the frame that was in
error and all subsequent frames, even though they have been received before.
This approach alleviates the problem at the receive end of inserting the
errored block in its proper sequence. With this type of ARQ, buffers must be
capable of storing two or three frames, depending on the propagation delay
of the circuit and the frame length.
The reader should turn back to Section 3.4.1 for a description of how
ARQ is implemented in HDLC. It will be noted that HDLC uses a go-back-n
strategy with its window of frames and method of acknowledgment.
4.5.2 Forward Error Correction (FEC)
FEC is a method of error correction, or, if you will, a method of error
reduction at the far-end receiver. No return channel is required. The concept
is based on adding systematic redundancy at the transmit end of a link such
that errors caused by the transmission medium can be corrected at the
receiver by means of a decoding algorithm. The amount of redundancy is
dependent on the type of code selected and the level of error correction
capability desired. Unless an additional processing step is included, FEC will
only correct random errors i.e., not burst errors..
Forward error correction uses channel coding whereas the coding that
many readers are familiar with Section 5.3ASCII code, EBCDIC, etc.. is
source coding. The channel coding used in FEC can be broken down into two
broad categories of codes: block codes and conolutional codes. Modulo-2
addition is widely used in both error detection and error correction. This is
66
DATA SWITCHING
67
The encoder output sequence is then transmitted to the line via a modulator e.g., modem. or modulator-transmitter. At the receive end, demodulation is performed to recover the coded symbols at R C symbols per second.
These symbols are then fed to a decoder with an output of R S bits per
second, which are then delivered to the data destination.
The major advantages of an FEC system are as follows:
There are two basic disadvantages with an FEC system. To effect FEC for
a fixed information bit rate, the bandwidth must be increased to accommodate the redundant symbols. For example, a rate 12 FEC system would
require twice the bandwidth of its noncoded counterpart. However, trellis
coding, described later, ameliorates some of the bandwidth expansion requirement. There is also the cost and complexity of the added encoder and
decoder. Nevertheless, with present VLSIrVHSIC technology, an encoder
and decoder can be mounted on a chip, and they are readily available
off-the-shelf for some of the more popular encodingrdecoding configurations.
68
DATA SWITCHING
69
70
Advantages
Mature technology
Near real-time
connectivity
Excellent for inquiry
and response
Leased service
attractive
Message switching
Efficient trunk
utilization
Cost-effective for
low-volume leased
service
Disadvantages
High cost of switch
Lower system utilization,
particularly link
utilization
Packet switching
Efficiency
Approaches near realtime connectivity
Highly reliable,
survivable
REFERENCES
71
Data frame headers, along with the trailing FCS field, are overhead. The
info field is the payload. It carries the revenue-bearing portion of a frame.
Surely, some of us have gathered that even the info field carries overhead
information. This is embedded information used to service the message or
frame. The information derives from the upper OSI layers. A telephone call
carries no such overhead except for the simple supervisory signaling. From
this perspective, conventional telephony is more efficient than its data transmission equivalent.
4.6.2 Smart Bridges, Routers, and Switching Hubs
Each of these devices carries out some form of switching. The general application is with LANs. Some will say that each device carries out a routing
function. The basis of routing is by means of a routing table which may or
may not be dynamically updated. Bridges, routers, and hubs are discussed in
Sections 10.2, 10.3, and 10.4, respectively.
REFERENCES
1. John E. McNamara, Technical Aspects of Data Communication, 2nd ed., Digital
Equipment Corp., Bedford, MA, 1982.
2. High Leel Data Link Control (HDLC) Frame Structure, ISO 3309, International
Standards Organization, Geneva, 1976.
3. Reference Data for Radio Engineers, 5th ed., ITT Howard W. Sams, Indianapolis,
1975.
5
DATA TRANSMISSION I
5.1 ELECTRICAL COMMUNICATION OF INFORMATION
Telecommunication transmission involves electrical communication of information. We communicate voice, image, and data. Our concern here is the
electrical communication of data.
By electrical communication of data, we mean the formation of an electrical signal that connotes information which can be interpreted at some distant
receiver with minimal or no ambiguity. One way of doing this is to impress a
voltage on an electrical circuit. The on voltage can signal something, and
the off voltage signals something else. Think of turning a light on and
turning the light off. The on condition could represent a binary 1 and the
off condition can represent a binary 0. We now have related the very
essence of expressing information electrically.
74
DATA TRANSMISSION I
For the requirements of data communications, a single bit with its two
possible states provides little information. Suppose now that two contiguous
bits are transmitted rather than just one bit. We now have a four-state system
or four possible bit combinations as follows:
00, 01, 10, and 11.
The electrical representation of these are shown below:
Let us carry this thinking forward one more step. This time each piece of
information we wish to transmit contains three consecutive bits. Each of the
bits, of course, can be a 1 or a 0. If we write down all the possibilities of 1s
and 0s in a three-bit sequence, we find there are eight as follows: 000, 001,
010, 011, 100, 101, 110, and 111. Each bit sequence could represent a letter of
the alphabet. However, we would only cover eight letters such as A, B, C, D,
75
E, F, G, and H. These bit sequences are shown with their electrical equivalents as follows:
Then if n is the number of bits per character in a binary code set, the
number of different characters, graphic symbols, and nonprinting characters
control functions. is simply 2 n.
Today we commonly use 5-, 6-, 7-, and 8-bit codes.
76
DATA TRANSMISSION I
77
required to do this: uppercase and lowercase. Thus the net gain was to
double the code possibilities minus the two nonprinting characters used to
achieve the code extension. This left a code that could accommodate 62 characters, which met the requirements of the day.
A somewhat modified Baudot code is still in use today. It is the ITA2
code. ITA stands for International Telegraph Alphabet. The code is employed chiefly on record traffic circuits, but has also been used for data
communications. Figure 5.1 shows the ITA2 code.
In the late 1950s, when data communications began to take hold, it was
found that the ITA2 code was not rich enough to support this emerging
industry. Several ad hoc codes were being fielded, mostly 6-bit codes. By now
we know that a 6-bit code provides 2 6 s 64 possibilities, or a 64-character
code. This was really not much better than the ITA2 code with its upperand lowercase characters.
Supported by some of the emerging giants in the data processing world,
the American National Standards Institute ANSI. developed a 7-bit code,
which today has worldwide acceptance. This is the American Standard Code
for Information Interchange, which goes by the acronym ASCII. The code
provides 128 distinct code possibilities 2 7 s 128., or 128 characters. ASCII is
illustrated in Figure 5.2. One should note that it provides a large number of
nonprinting characters, many of which may be used for data-link control
Figure 5.2. American Standard Code for Information Interchange (ASCII). See Table 5.1 for
definitions. (Basic source: Ref. 3; see also Ref. 4.)
78
DATA TRANSMISSION I
TABLE 5.1 Definitions for Figure 5.2: Control Characters and Format Effectors
NUL: All zero characters. A control character used for fill.
SOH (Start of heading): A communication control character used at the beginning of a
sequence of characters which constitute a heading. A heading contains address or routing
information. An STX character has the effect of terminating a heading.
STX (Start of text): A communication control character that terminates a heading and indicates
the start of text or the information field.
ETX (End of text): A communication control character used to terminate a sequence of
characters started with STX and transmitted as an entity.
EOT (End of transmission): A communication control character used to indicate the conclusion of transmission which may have contained one or more texts and associated headings.
ENQ (Enquiry): A communication control character used as a request for response from a
remote station. It may be used as a Who are you (WRU) to obtain identification, or may be
used to obtain station status, or both.
ACK (Acknowledge): A communication control character transmitted by a receiver as an
affirmative response to a sender.
BEL: A character for use when there is a need to call human attention. It may control alarm or
attention devices.
BS (Backspace): A format effector which controls the movement of the active position one
space backward.
HT (Horizontal tabulation): A format effector which controls the movement of the active
position forward to the next character position.
LF (Line feed): A format effector which controls the movement of the active position advancing
it to the corresponding position of the next line.
VT (Vertical tabulation): A format effector which controls the movement of the active position
to advance to the corresponding character position on the next predetermined line.
FF (Form feed): A format effector which controls the movement of the active position to its
corresponding character position on the next page or form.
CR (Carriage return): A format effector which controls the movement of the active position to
the first character position on the same line.
SO (Shift out): A control character indicating the code combination which follows shall be
interpreted as outside of the character set of the standard code table until a shift in (SI)
character(s) is reached. It is also used in conjunction with the (ESC) escape character.
SI (Shift in): A control character indicating that the code combinations which follow shall be
interpreted according to the standard code table (Figure 5.2).
DLE (Data-link escape): A communication control character which will change the meaning of
a limited number of contiguously following bit combinations. It is used exclusively to provide
supplementary control functions in data networks. DLE is usually terminated by a shift in (SI)
character(s).
DC1, DC2, DC3, DC4 (Device controls): Characters for the control of ancillary devices associated with data or telecommunication networks. They switch these devices on or off. DC4
is preferred for turning a device off.
NAK (Negative acknowledgment): A communication control character transmitted by a receiver as a negative response to a sender.
79
CCITT Rec. T.50 Ref. 2. points out that positions 0r0 to 1r15 the first two
columns, which are blank in the figure. are reserved for control characters.
Note the control characters in the first two columns of Figure 5.2..
IBM went one step further and defined an 8-bit code. It is called
EBCDIC, which stands for Extended Binary Coded Decimal Interchange
Code. This code is shown in Figure 5.4. It will be noted that EBCDIC is very
rich in graphic characters. It should also be clear that some of the character
possibilities are not used i.e., left blank..
5.4 ELECTRICAL BIT DECISIONS
Electrical noise tends to corrupt a telecommunication system. Let us define
noise as unwanted disturbances superimposed upon a useful signal that
tend to obscure its information content Ref. 1.. Accept the fact that all
electrical communication systems have some sort of noise component superimposed upon a wanted signal. All other signal impairments will be disregarded for now.
80
DATA TRANSMISSION I
Figure 5.3. Basic code table for CCITT International Alphabet No. 5 (IA5), the International
Reference Alphabet (IRA). (From Table 4, page 11, CCITT Rec. T.50, Ref. 2.)
We find that binary digital receivers are very forgiving of noise. The
reason is that such a receiver is a device that must make a simple decision:
whether a pulse is a 1 or a 0.
In the case of the scenario described in Section 5.2, a positive pulse is a
1 and no pulse is a 0. Consider Figure 5.5, which shows the ideal
situation of a stream of alternating 1s and 0s. The signals have not been
corrupted by noise. Figure 5.6 shows the same signals corrupted by noise.
What is meant by corruption is really the likelihood that an incorrect decision
could be made. Conventionally, a binary digital receiver makes a decision at
81
82
DATA TRANSMISSION I
Figure 5.6. The same signal as in Figure 5.5, but corrupted with noise, cable pair capacitance, and loss. The capacitance causes rounding, and the loss causes a reduction in
amplitude.
pulses. We could set the decision level higher, say to 34 amplitude, or use
some other method of representing the 1 and the 0. There are many ways to
improve performance of binary transmission of data in the presence of
impairments such as noise. Often an apparent improvement will also have a
drawback. The fact that binary data receivers have to make a decision of one
of only two possibilities makes this type of transmission very forgiving in the
presence of impairments. However, we must remember that the forgiveness is
allowed only up to a certain point before performance suffers. That point will
vary, of course, depending on the level of performance that is set for the
system.
Another aspect of digital transmission is that the signal can be regenerated. A regenerator is simply a decision circuit and a clock. A regenerator
accepts a corrupted pulse at its input and clocks out a squared-up 1 or
0. This concept is shown in Figure 5.7.
83
passive state. A passive state can be easily corrupted by a noise spike such
that a receiver would mistakenly consider it an active state if the noise level
were of sufficient amplitude. To help avoid such situations, a polar* representation of a binary 1 and 0 was devised, where both states are active.
Neutral and polar representations of binary data are compared in Figure 5.8.
In the future we will call these neutral and polar waveforms. These states are
a negative voltage and a positive voltage. To be consistent with Section 5.2,
we chose to call the positive pulse a 1 and a negative pulse a 0.
It should be noted that in modern Layer 1 standards, the states are
reversed: a binary 1 is a negative voltage, and a 0 is a positive voltage
typically as set out in EIArTIA-232E Ref. 5..
At times, while working with binary bit streams we can, either by accident
or on purpose, reverse the sense of the bits. This simply means reversing the
bits* polarity, where the negative battery and positive battery are reversed.
You might say where the 1s become 0s and the 0s become 1s. This would be
highly undesirable for operational circuits, but we may want to reverse the
sense to carry out some form of testing or troubleshooting.
5.5.2 Waveforms and Line Codes
There are yet other ways of representing 1s and 0s electrically, each waveform with its own advantages and disadvantages. Generally, binary data
waveforms can be divided into two groups: non-return-to-zero NRZ. and
return-to-zero RZ.. These are shown and compared in Figure 5.9. Among
the advantages and disadvantages are simplicity and the ability to extract
timing, but at the expense of increasing the number of transitions per average
unit time. This, in essence, increases the frequency of the waveform, which,
under certain circumstances, may be highly undesirable typically on a
fiber-optics link..
*Polar is called double-current by CCITTrITU-T.
84
DATA TRANSMISSION I
Figure 5.9. Some waveforms (line codes) used in binary digital transmission. Note that
Manchester coding is widely used on baseband LANs.
85
Binary 0
Space or spacing
No perforation
Positive voltage
Condition A
Tone off
High frequency
Reference phase (phase modulation)
Inversion of the phase
CCITT Recs. V.10 and V.11 (Refs. 7 and 8, respectively) and EIA r TIA-232 (Ref. 5 ).
Source: CCITT Rec. V.1 (Ref. 6 ). Courtesy of ITU-CCITT.
passive state. To confuse matters, the mark is associated with the 1 and the
space is associated with the 0; we call them synonymous, meaning that a
binary 1 and a mark have the same meaning. Contrary to our discussion in
Section 5.2, modern data systems use the convention that a negative-going
voltage is a 1 and a positive-going voltage is a 0.
One key standard, probably familiar to many users of this text, namely
EIArTIA-232, states that a voltage of q3 volts or greater is a 0 and that a
voltage of y3 volts or greater e.g, y4 volts. is a 1. Voltages between y3
and q3 volts are indecisive. Many other standards generally follow suit such
as EIArTIA-422, EIArTIA-423, and ITU-T Rec. V.10 and V.11, to name
a few.
86
DATA TRANSMISSION I
Figure 5.11. Serial data transmitter with parallel data input, configured for startstop operation and an 8-bit character.
complexity of line drivers and receivers increases, due to the major difficulty
of properly driving and receiving signals on long runs of wire pairs.
Bit-serial transmission is generally used where the cost of the communications medium is high enough to justify a relatively complex transmitter and
receiver system that will serialize bits that represent a character, send over a
single line, and reassemble them in parallel form at the receiving end. In
most data transmission systems, serial transmission is preferable to parallel
transmission.
5.8 BASEBAND
The term baseband is defined by the IEEE Ref. 1. as the band of
frequencies occupied by the data. signal before it modulates a carrier or
subcarrier . frequency to form the transmitted line or radio signal. Baseband,
therefore, is the data signal as it leaves or enters a data processing or
DATA RATE
87
presentation device. The signal has frequency content extending into the
direct current region. Baseband data can be transmitted hundreds and even
thousands of feet. This is commonly done on wire pair. Figure 5.9 shows
several common baseband data waveforms. Transmission distance is limited
because of several factors. The data signal suffers loss due to the length and
characteristics of the wire pair. It can be corrupted by noise, which often can
be related to length of the wire pair. The signal itself will become distorted
due to the electrical characteristics of the medium. Distances can be extended by the use of regenerators, which were described above.
Long distances can be achieved by having the baseband signal modulate a
radio or light carrier signal. Some refer to this as carrier transmission.
88
DATA TRANSMISSION I
REFERENCES
1. The IEEE Standard Dictionary of Electrical and Electronic Terms, 6th ed., IEEE
Standard 100-1996, IEEE, New York, 1996.
2. International Reference Alphabet (IRA) Information Technology7-bit Coded Character Set for Information Interchange, CCITT Rec. T.50, ITU Geneva, September
1992.
3. Common Long-Haul and Tactical Communication System Technical Standards, MILSTD-188-100, US Department of Defense, Washington DC, November 15, 1972.
4. American National Standard, Coded Character Sets: 7-bit American National Standard Code for Information Interchange (7-bit ASCII), ANSI X3.4-1986, ANSI, New
York, 1986.
5. Interface Between Data Terminal Equipment and Data Circuit Terminating Equipment
Employing Serial Binary Data Interchange, EIArTIA-232E, Telecommunications
Industry Association, Washington DC, July 1991.
6. Equialence Between Binary Notation Symbols and the Significant Conditions of a
Two-Condition Code, CCITT Rec. V.1, Fascicle VIII.1, IXth Plenary Assembly,
Melbourne, 1988.
7. Electrical Characteristics for Unbalanced Double-Current Interchange Circuits Operating at Data Signaling Rates Nominally up to 100 kbps, ITU-T Rec. V.10, ITU
Geneva, March 1993.
8. Electrical Characteristics for Balanced Double-Current Interchange Circuits Operating
at Data Signaling Rates up to 10 Mbps, ITU-T Rec. V.11, ITU Geneva, October
1996.
9. Transport Systems Generic Requirements (TSGR): Common Requirements, Telcordia
Bellcore. GR-499-CORE, Issue 1, Piscataway, NJ, December 1995.
6
DATA TRANSMISSION II
90
DATA TRANSMISSION II
Figure 6.2. Startstop character format. SS, start-space; SM, stop-mark. ASCII letter A and
the beginning of the ASCII letter S. Note: The duration of the stop-space is one unit interval
(i.e., duration of 1 bit), and the stop-mark (in the figure) has a duration of two unit intervals
(i.e., 2 bits).
In those old teleprinters, the convention was adopted that when the line is
idle, current is flowing e.g., voltage is present .. The commencement of the
transmission of a character or string of characters is indicated when this
current is interrupted and the normal current or voltage. state drops to 0,
the space condition. To start the receiver teleprinter, the line condition
changes from one of current to a no-current condition, and the 0 state
holds for the duration of one bit 1-bit time.. The space element is called
the start bit or start element. The start element is followed by eight successive
bit times or unit intervals see Figure 6.2. which represent the character
being sent. These bit times may be either a 1 active state. or 0 passive
state. in any combination thereof for 8 consecutive bits. Note that if 8
information bits are used, we could be dealing with the EBCDIC code or
ASCII with the added parity bit..
The last element transmitted is the stop element, which can have 1-,
1.5-, or 2-bit duration, depending on the convention accepted. The stop
element allows the receiver to coast back to a known position in time until
the beginning of the next start space element signifying the beginning of
the next character.
With startstop transmission it is true that precise synchronization between the far-end transmitter and the near-end receiver is not necessary.
However, the receiver must sample the income bit stream at roughly the
same rate as the transmitted bits are gated out on the transmit side so that
the receiver can sample each incoming bit at the proper time.
When a line is idle in startstop transmission, a continuous 1 or mark is
transmitted and current is flowing in the data loop. Once the receiver detects
a transition from current flow to no-current flow, it counts out 5, 6, 7, or 8
bits, depending on the code used, and then knows that the next element must
be the stop-mark or current-flow state. If another character directly follows
the first, there again is the mark-to-space transition right after the stop-mark
and the start-space begins and lasts for the duration of 1 bit, and the
receiver starts its count again. As one can see, the receiver must maintain
91
92
DATA TRANSMISSION II
protocols use the sequence 01111110 as the starting and ending flag. At the
end of the starting flag, we start counting increments of eight delineating bits.
Of course we must start counting with the very first bit appearing after the
flag sequence.
At this juncture we must define a character. The IEEE Ref. 1. defines a
character data transmission. as one of a set of elementary symbols which
normally include both alpha and numeric codes plus punctuation marks, and
any other symbol which may be read, stored or written, and are used for
organization, control, or representation of data. With a few exceptions such
as the ITA 2 code., all of our characters are 8 bits or 1 octet long. A
character can be an operational sequence performing the function of space
bar, hard return, soft return, and so on.
Before proceeding further, let us consider what a generic data frame looks
like. Depending on the type of system, some may call a data frame a packet,
a block, or a cell. A generic data frame is shown in Figure 6.3. Note that the
flag is shown as the first and last field of the frame. The address and control
fields together are often called the header. Generally packets and cells have
fixed length text or info field; frames and blocks may carry varying-length text
or info fields. The term arying should not be confused. All text or info fields
have length constraints that is, maximum length and minimum length.
Thus, it would appear we would like long frames long info fields. to
amortize overhead. However, on noisy circuits where a lot of frame repeats
are required, short frames are more desirable.
Frame structure has had detailed explanation in Chapters 2 and 3. Our
discussion here deals with synchronous transmission. With startstop transmission, the beginning and end of a character were well-delineated by the
start and stop elements. In the case of synchronous transmission, the flag
carries out this function; the receiver-processor counts bitsroctets after the
initial flag. The processor has been programmed in advance for the link-layer
protocol to be used. Thus, the processor knows a priori where each of the
header fields begins and ends and acts upon the contents.. For fixed-length
frames, the processor knows the length of the info field, where it ends and
where the FCS begins, and where the frame ends, by means of the trailing
flag.
To measure the efficiency of a certain data link, we sum all the bits in the
header, FCS, and flag fields and divide this value by the total number of bits
in a frame. We then subtract that value from 100 for a percent efficiency
value.
Figure 6.3. A generic frame or packet of data. See Chapters 2 and 3 for more detailed
discussion of frame structure.
93
Example. A certain data link has 16 bits for the two flags, 16 bits of address
information, 8 bits of control information, and 16 bits for the FCS field. The
information field has 1600 octets 12,800 bits..
There are 56 bits of overhead, and the total number of bits in the frame is
56 q 12,800 or 12,856 bits, 56r12,856 s 0.004356.
100 y 0.004356 s 99.995%
Without considering header overhead, startstop transmission based on
11-bit characters of which 3 bits are used for start and stop elementswill
have the following efficiency:
3r11 s 0.2727
100 y 0.2727 s 99.727%
On synchronous circuits that are idle no traffic is being passed ., fill or idle
patterns are transmitted to maintain synchronization. If a circuit is dormant
and at some moment in time traffic will be passed, a short training period
should precede the traffic to allow synchronization and to initiate other
features such as automatic equalizers.
6.2 TIMING DISTORTION IN A SERIAL BIT STREAM
We define distortion as the unwanted modification or change of signals from
their form by some characteristic of the communication line or equipment. In
data communications, distortion is usually manifested by improper timing.
One type of distortion is called bias distortion, where the duration of the
mark pulse the 1 pulse. is elongated a certain amount and the space pulse
0 pulse. is shortened a corresponding amount. Of course we can have the
reverse situation, where the space pulse is lengthened at the expense of the
mark pulse.
One cause of bias distortion is wire-pair capacitance. Another cause is that
it is likely that the resistance of the driver transmitter end. and the receiver
circuitry is different for the mark-to-space transition than for the space-tomark transition. Thus, there will be a different amount of time required to
charge the cable capacitance of the two transitions. One of the most wellknown standards involved in this interface is EIArTIA RS-232 Ref. 2.,
which states that there should be no more than 2500 picofarads of cable
capacitance on such a circuit. If the value of 2500 picofarads is exceeded, the
increase in bias distortion can be dramatic. Figure 6.4 shows a binary bit
stream with marking bias bias distortion..
Figure 6.4. A binary data serial bit stream with marking bias. Ideally the 1 bits and the 0 bits
should be of equal duration.
94
DATA TRANSMISSION II
Figure 6.5. Types of timing distortion. Note: In bit stream drawings, such as this one, the
current sense convention as established in EIAr TIA-232 and in similar standards may or may
not be followed, depending on what is being expressed. This convention established the 1
as a negative-going voltage and the 0 as a positive-going voltage, as shown in Table 6.2.
The sense is reversed in the drawing above.
The timing distortion of signal elements bits. can be resolved into two
components, commonly termed systematic and fortuitous. Systematic distortion is repetitive and is the average distortion as a data signal is transmitted
through the system. The fortuitous component is the variation from the
average. The sum of the systematic and fortuitous components makes up the
total distortion.
Systematic distortion is further broken down into bias and characteristic
distortion. Bias distortion is brought about by the lack of symmetry in the
system, as was discussed above. Characteristic distortion is brought about by
intersymbol interference ISI. resulting from nonlinear phase versus frequency characteristic. Fortuitous distortion is caused by extraneous factors
such as noise, crosstalk, and carrier phase effects, all of which may occur at
random with respect to the signal bit sequence.
There are two ways of expressing the amount of distortion. It can be
stated in time units, commonly milliseconds, or it can be expressed as a
percent of a unit interval a bit.. The latter is more common in the industry.
Of course when using percentage, we must state the speed of transmission
i.e., the data rate. at which the percent of distortion applies. The speed is
almost universally given in bits per second. Figure 6.5 shows several types of
distortion that have been discussed above.
6.3 THE TRANSMISSION OF DIGITAL DATA
6.3.1 Baseband Transmission
Data are transported electrically on a copper wire pair over comparatively
short distances. For example, data may be transmitted across a room, across
a floor, throughout a building, or, in some cases, throughout several contiguous buildings. This is commonly called baseband transmission. Distances are
limited by the buildup of loss, distortion, and noise. Distance is also a
function of bit rate.
95
96
DATA TRANSMISSION II
Data Modulation
Terminology
Abbreviation
Commonly Used
ASK
FSK
PSK
that generates an audio tone whose frequency is compatible with the voice
channel. This tone is modulated by a baseband digital data signal in either
the frequency, amplitude, or phase domain or combinations of two of these.,
and the resultant signal is coupled to the voice channel. On the receive side,
a modem converts the modulated audio tone back to a digital data serial bit
stream.
There are three generic types of modulation: amplitude modulation AM.,
frequency modulation FM., and phase modulation PM.. As we remember, a
wave e.g., a sine wave. is defined in terms of amplitude, phase, and
frequency. Information can be transported on such a wave by varying the
value of any one of these properties in accordance with an electrical baseband signal which contains that information. This, in essence, is modulation.
Many data transmission terms derive from its predecessor, the telegraph.
When dealing with data transmission, consider Table 6.1. The term keying
derives from Morse code operation of a transmitter using the Morse key. The
key was held down i.e., contact was made. just for a moment for a dot, and
it was held down for a longer period for a dash. When the key was pressed
down, an electrical contact was made and the transmitter was turned on,
thereby emitting a carrier frequency CW. wave. When the key was released,
the transmitter was turned off and the carrier wave ceased. The terminology
further evolved through automatic telegraph, a true forerunner of data
communications.
When these automatic telegraph systems were introduced, the radiofrequency carrier remained on all the time, and the information was transmitted by means of shifting changing. the carrier frequency upward in
frequency some hundreds of hertz for a mark or 1 and downward in
frequency an equal amount for a space or 0. Thus the term shift keying
came about; that is, the carrier was shifted.
For ASK modulation, a carrier is turned on for a mark or 1 and is turned
off for a space or 0, PSK systems came later, and in this case a binary 1 is
transmitted at reference phase, and a binary 0 is transmitted with the phase
retarded, usually 180 degrees.
Data modems employ FSK modulation almost universally for all systems
operating at 1200 bps or less. Above 1200 bps, some form of PSK is used. For
higher data rate modems, above 4800 bps typically CCITT Rec. V.29; see
Ref. 3., a combination of ASK and PSK is used.
97
In fact, these three impairments will affect any transmission medium, especially metallic media e.g., wire pair and coaxial cable.. There are two other
impairments that affect the voice user much more than the data user. These
are echo and singing.
Figure 6.6. A simplified conceptual illustration of a voice channel traversing the telecommunications network. Note that the multiplexing may be in the time domain or in the frequency
domain. If the multiplexing is in the time domain, the switching is digital using time division
techniques. M, modulator; D, demodulator.
98
DATA TRANSMISSION II
Figure 6.7. Permissible attenuation variation with frequency, reference 800 Hz. Objective for
worldwide four-wire chain of 12 circuits in tandem, terminal service. (From Ref. 4. Courtesy of
ITU-CCITT.)
99
Figure 6.8. Typical attenuation distortion curve for a voice channel. This is a North
American-defined, 200- to 3200-Hz voice channel with reference frequency at 1000 Hz. (From
Ref. 5. Reprinted with permission.)
100
DATA TRANSMISSION II
Figure 6.9. Typical differential delay across a voice channel. (From Ref. 5. Reprinted with
permission.)
Thermal noise
Crosstalk
Intermodulation noise
Impulse noise
Thermal noise, as defined by the IEEE Ref. 1., is the noise occurring in
electric conductors and resistors and resulting from random movement of
free electrons contained in the conducting material. The noise derives from
the fact that such random motion depends on the temperature of the
material. Thermal noise has a flat power spectrum out to extremely high
frequencies.
101
Thermal noise is always present in an electrical circuit. It can be characterized by an equivalent noise temperature measured in kelvins temperature
scale based on absolute zero. or by noise figure. Noise figure in decibels . of
a device can be defined as the difference of the signal-to-noise ratio between
the output of a device and its input.
In this text, unless otherwise specified, we will be dealing with thermal
noise. Thermal noise is random in nature and is treated statistically a
Gaussian distribution .. Thermal noise thresholds noise floors. can be calculated based on a thermal noise floor of an ideally perfect receiver at absolute
zero where the noise level is y228.6 dBW in 1 Hz of bandwidth. For the
same receiver at room temperature 290 K., this value is y204 dBWrHz.
Crosstalk is defined by the IEEE Ref. 1. as the undesired energy appearing in one signal path as a result of coupling from another signal path. Path
in this context implies wires, waveguides, or other localized or constrained
transmission systems.
For example, on telephone circuits we may hear extraneous voice transmissions. Data circuits can be even more susceptible to extraneous signal
energy. Excessive crosstalk, in this case, manifests itself usually as error
bursts or, if crosstalk coupling loss is very low, in an unacceptable error rate.
Intermodulation noise is extraneous signal energy derived from some portion of the wanted energy when the signal energy is passed through a
nonlinear device. It is characterized by the appearance at the output of a
device of frequencies equal to the sums and differences of integral multiples
of two or more component frequencies present in the output signal. In
Figure 6.10 the input of the device shown has frequencies A and B. For the
voice channel, often 1000 and 1200 Hz are used as examples of frequencies
A and B.. The terms intermodulation noise and intermodulation products are
synonymous, sometimes referred to as IM noise.
Intermodulation products IM noise. are generated in nonlinear devices
such as amplifiers, transformers, and coils which use ferrous materials, even
waveguides. Although many amplifiers operate in a linear region, they display
what are called weak nonlinear characteristics. And as such we have to
contend with their intermodulation products.
Of principal concern are second- and third-order products. For the case of
a two-frequency input to a nonlinear device as shown in Figure 6.10, there
are the second-order products. The first of these is simply the second
harmonic 2 F1 andror 2 F2 ., which is the same as that obtained if each input
102
DATA TRANSMISSION II
103
one must express how long a block is either in bits or in octets. Block error
rate is coming more into favor with ATM and its fixed-length cells. A data
block is a set of contiguous bits or octets which make up a definable quantity
of information. The term frame can be used interchangeably with a block.
Bit error rate ratio. BER. is defined as the ratio of the total bits received
at a data-link destination to the bits received in error; or the contrary, the
bits received in error to the total number of bits received. It is expressed as 1
in 10 n or 1 = 10yn. For example, if 100 bits are received and one of those
bits is in error, the bit error rate BER. is 1 = 10y2 , or 1 error in 10 2 .
Let it be understood that there is no data circuit completely free of errors.
However, we may have to wait awhile for an error to occur, but eventually an
error will occur. There may be periods of time when a circuit is free of errors.
The common unit of performance in this case is the error-free second EFS..
Error rate should be handled statistically, and thus we should talk about
probability of error. This is because one of the most common causes of bit
errors is random noise peaks, which are treated statistically. So when we
express BER, we really are describing the probability of error.
Another measure of data circuit performance is throughput. To many of
us, throughput defines the number of correct bits, blocks, or frames received
which are error-free. To others, it means the number of useful bits received
that are not in error. Unless we concretely define useful bits, it is a
comparatively meaningless measure of performance. For example, should the
start and stop bits be included as useful bits? As we delve further into our
discussion of data communications, we will encounter many other bit groupings that are necessary to telecommunication engineers but have no use for
the end user, who may be a programmer. Header information is an example
in point. Headers direct traffic to a particular destination and carry out other
control functions, but carry no useful information for the data end user.
There are two generic categories of errors. These are random errors and
burst errors. If the cause of error is insufficient signal-to-noise ratio, such
errors will be random if the noise in question is random in nature such as
thermal noise.
An error burst is a string of contiguous bits with a very high probability of
being in error. There are two general causes of these error bursts: impulse
noise spikes and signal fading. If some portion of a data circuit traverses a
line-of-sight microwave link, fading may be expected. Fading may also occur
during heavy rainfall events on certain satellite circuits as well as on certain
line-of-sight microwave links. There may be other causes of error bursts such
as crosstalk.
6.3.3.2 Error Performance from an ITU-T Perspective. CCITT in the
1970s recommended a bit error rate no worse than 1 = 10y5. In the 1980s
with the advent of ISDN, CCITT tightened this value to 1 = 10y6 end-to-end
for the ISDN 64-kbps channel. In this case the 64-kbps digital channel is a
voice channel used as a bearer of data. CCITT Rec. G.821 Ref. 8. states that
fewer than 10% of 1-minute intervals should have a bit error rate worse than
104
DATA TRANSMISSION II
TABLE 6.2 CCITT Error Performance Objectives for International ISDN Connections
Objective (Note 3)
Performance Classification
(a) (Degraded minutes)
(Notes 1, 2)
(b) (Severely errored seconds)
(Note 1)
(c) (Errored seconds)
(Note 1)
Note 1. The terms degraded minutes, severely errored seconds, and errored seconds are used as a
convenient and concise performance objective identifier. Their usage is not intended to imply the
acceptability, or otherwise, of this level of performance.
Note 2. The 1-min intervals mentioned in Table 1rG.821 and in the notes (i.e., the periods for
M ) 4 in Annex B ) are derived by removing unavailable time and severely errored seconds from the
total time and then consecutively grouping the remaining seconds into blocks of 60. The basic 1-s
intervals are derived from a fixed period.
Note 3. The time interval TL , over which the percentages are to be assessed, has not been specified
because the period may depend upon the application. A period of the order of any one moment is
suggested as a reference.
Note 4. For practical reasons, at 64 kbit rs, a minute containing four errors (equivalent to an error
ratio of 1.04 = 10 y6 ) is not considered degraded. However, this does not imply relaxation of the
error ratio objective of 1 = 10 y 6 .
Source: CCITT Rec. G.821, Fascicle III.5, Table 1rG.821, page 29, CCITT Blue Books, IXth Plenary
Assembly, Melbourne, November 1988.
Figure 6.11. Block representation of signals. (From Figure 1, page 57, Ref. 10. Reprinted
with permission.)
105
Bits r block
ESR
SESR
BBER
1.55
) 515
) 1555
) 55160
) 1603500
) 3500
20008000
20008000
400020,000
600020,000
15,00030,000
FFS b
0.04
0.05
0.075
0.16
a
FFS
0.002
0.002
0.002
0.002
0.002
FFS
3 = 10 y 4
2 = 10 y 4
2 = 10 y 4
2 = 10 y 4
10 y 4
FFS
106
DATA TRANSMISSION II
Figure 6.12. Hypothetical reference path (HRP). (From Figure 2, page 57, Ref. 10. Reprinted
with permission.)
Distance Allowance
1% per 500 km
International Portion a
Transit Allowance
2% per intermediate
country
1% per terminating
country
Distance Allowance
1% per 500 km
Satellite hops each receive 35%, but the distance of the hop is removed from the distance
allowance.
b
Four intermediate countries are assumed.
Source: Reference 10, Table 3, page 59.
consecutive SESs. The unavailable time stops and of course available time
begins. at the start of 10 consecutive ESs or better., each of which is not
severely errored.
Apportionment. The apportionment rules contained in G.826 are different
from those used in G.821. These rules are given in Table 6.4, and one should
refer to Figure 6.12 for the HRP.
The IEEE reference article Ref. 10. notes that it is not immediately
obvious that the EPO percentage figures of Table 6.4 yield 100%. However,
under the assumption of four intermediate countries and no satellite hops,
the following breakdown can be obtained:
Terminating countries:
2 = 17.5% q 2 = 1% s 37%
Intermediate counties:
4 = 2% s 8%
107
Distance allowance:
27,500 km s 55 = 500 km 55 = 1%. s 55%
Total
100%
If one satellite hop is employed, it uses 35%, corresponding to a nominal
hop distance of 17,500 km.
The identification of an SES event during ISM is not so straightforward.
This is because the definition of an SES involves SDPs. SDP events can only
be measured during an out-of-service condition. Thus, equivalent ISM
events need to be defined if SDPs are to be detected while in-service. It is
recognized that there is not an exact 1 : 1 correspondence between SDP
events measured in-service and measured out-of-service. The objective of
annexes 2, 3, and 4 to G.826 is to provide ISM events that are reasonably
close to the G.826 error events.
It should be noted that G.826 generally applies to underlying transport
systems such as E1rT1 PDHChapter 7., SDHrSONET Chapter 15., and
cell-based transport Chapter 16.. Of course the impact of G.826 will be felt
on data systems being carried by that digital transport network.
The material in Section 6.3.3.2 was derived from Refs. 810.
108
DATA TRANSMISSION II
Figure 6.13. Functional diagram of data terminal equipment (DTE) and data communication
equipment (DCE) in a point-to-point configuration. The electrical and functional interface
between DTE and DCE is discussed in this section.
109
CCITT
Number
1
2
3
4
103
104
105r 133
106
BA
BB
CAr CJ
(Note 1)
CB
6
7
8
9
10
107
102
109
CC
AB
CF
11
12
126
122r112
(Note 4)
SCFr CI
(Note 2)
13
14
15
121
118
114
SCB
SBA
DB
16
17
119
115
SBB
DD
18
19
20
141
120
108r1,r2
LL
SCA
CD
21
22
23
140r110
125
111r112
24
113
RLrCG
CE
CHrCI
(Note 2)
DA
25
142
TM
26
Circuit
(Note 3)
Description
Shield
Transmitted data
Received data
Request to sendr Ready for receiving
Clear to send
DCE ready
Signal common
Received line signal detector
(Reserved for testing)
(Reserved for testing)
Unassigned
Secondary received line signal
Detectorr Data signal rate selector
(DCE source)
Secondary clear to send
Secondary transmitted data
Transmitter signal element timing
(DCE source)
Secondary received data
Receiver signal element timing
(DCE source)
Local loopback
Secondary request to send
DTE ready
Remote loopbackrSignal quality detector
Ring indicator
Data signal rate selector
(DTErDCE source)
Transmit signal element Timing
(DTE source)
Test mode
No connection
Note 1: When hardware flow control is required Circuit CA may take on the functionality of Circuit
CJ.
Note 2: For designs using interchange circuit SCF, interchange circuits CH and CI are assigned to
pin 23. If SCF is not used, CI is assigned to pin 12.
Note 3: Pin 26 is contained on the Alt A connector only. No connection is to be made to this pin.
Note 4: Pin 11 is unassigned. It will not be assigned in future versions of EIArTIA-232. However, in
international standard ISO 2110, this pin is assigned to CCITT Circuit 126, Select Transmit Frequency.
Source: Reference 2. Copyright Electronic Industries Association rTelecommunications
Association. Reprinted with permission.
Industries
110
DATA TRANSMISSION II
CCITT
Number
AB
102
BA
BB
103
104
CA
CB
CC
CD
CE
CF
CG
CH
105
106
107
108r1,r2
125
109
110
111
CI
112
CJ
RL
LL
TM
133
140
141
142
DA
113
DB
114
DD
115
SBA
SBB
118
119
SCA
SCB
SCF
120
121
122
Circuit
Direction
Circuit
Type
Signal Common
Common
Transmitted data
Received data
To DCE
From DCE
Data
Data
Request to send
Clear to send
DCE ready
DTE ready
Ring indicator
Received line signal detector
Signal quality detector
Data signal rate selector
(DTE)
Data signal rate selector
(DCE)
Ready for receiving
Remote loopback
Local loopback
Test mode
To DCE
From DCE
From DCE
To DCE
From DCE
From DCE
From DCE
To DCE
Control
Control
Control
Control
Control
Control
Control
Control
From DCE
Control
To DCE
To DCE
To DCE
From DCE
Control
Control
Control
Control
To DCE
Timing
From DCE
Timing
From DCE
Timing
To DCE
From DCE
Data
Data
To DCE
From DCE
From DCE
Control
Control
Control
Circuit Name
Industries
and DCE, and EIArTIA-422 and EIArTIA-423 uniquely define the electrical interface.
Table 6.5 gives the functional interface of EIArTIA-232. The table shows
the assignment and function of each pin in a 25-pin plug for a cable
connecting the DTE to the DCE. The related CCITT standard is CCITT
Rec. V.24 Ref. 13.. Table 6.6 gives the EIArTIA-232 interchange circuits by
category and provides equivalent CCITT Rec. V.24 circuit nomenclature.
r TIA-232 Electrical Interface. For data interchange circuits,
6.4.2.1 EIAr
the signal is considered in the marking condition i.e., binary 1. when the
voltage on the interchange circuit, measured at the interface point, is more
than y3 volts with respect to signal ground circuit AB.. The signal is
considered in the spacing condition i.e., binary 0. when the voltage is more
111
Negative
Positive
Binary state
Signal condition
Function
1
Marking
OFF
0
Spacing
ON
positive than q3 volts with respect to signal ground circuit AB.. The region
between q3 volts and y3 volts is defined as the transition region. The signal
state is not uniquely defined when the voltage is in this transition region.
During the transmission of data, the marking condition is used to denote
the binary state one, and the spacing condition is used to denote the binary
state zero.
For the timing and electrical control interchange circuits, the function is
considered on when the voltage on the interchange circuit is more positive
than q3 volts with respect to circuit AB, and it is considered off when the
voltage is more negative than y3 volts with respect to circuit AB. The
function is not uniquely defined in the transition region between q3 volts
and y3 volts. Table 6.7 reflects standard signal sense and terminology.
It should be noted that there are three types of interchange signals
described in the standard: data, control, and timing.
EIArTIA-232 places the following limitations on the interchange signals
transmitted across the interface point, exclusive of external interference:
1. All interchange signals entering into the transition region shall proceed
through the transition region to the opposite signal state and shall not
reenter the transition region until the next significant change of signal
condition.
2. There shall be no reversal of direction change while the signal is in the
transition region.
3. For control interchange circuits, the time required for the signal to pass
through the transition region during a change in state shall not exceed
1 ms.
4. For data and timing interchange circuits, the time required for the
signal to pass through the transition region shall be in accordance with
the table below:
5. The maximum instantaneous rate of voltage change should not exceed
30 volts per microsecond.
Duration of Unit Interval
UI G 25 ms
25 ms ) UI G 125 s
125 s G UI
1 ms
4% of a unit interval
5 s
112
DATA TRANSMISSION II
Definition of Unit Interval (UI) (Also called Signal Element). The part of a
signal that occupies the shortest interval of a signaling code. It is considered
to be of unit duration in building up signal combinations 1.. Unit duration
in this context is the duration of 1 bit, and thus the UI is a bit.
Note: Good engineering practice requires that the rise and fall times of
data and timing signals should be approximately equal within a range of 2 : 1
or 3 : 1..
6.4.2.2 Functional Description of Selected Interchange Circuits. The
circuit identifiers are shown in Table 6.6.
Circuit BATransmitted Data. Direction: To DCE. Signals on this circuit are
generated by the DTE and are transferred to the local DCE for transmission of data to remote DCEs. or for maintenance or control of the local
DCE.
The DTE shall hold circuit BA transmitted data. in the marking condition at all times when no data are being transmitted. In all systems, the DTE
shall not transmit data unless on condition is present on all of the following
circuits, where implemented:
1.
2.
3.
4.
Circuit
Circuit
Circuit
Circuit
CA request to send.
CB clear to send.
CC DCE ready.
CD DTE ready.
Circuit BBReceived Data. Direction: From DCE. Signals on this circuit are
generated by the DCE in response to data signals received from remote
DCEs., or by the DCE in response to maintenance or control data signals.
Circuit BB received data. shall be held in the binary one marking. condition
at all times when circuit CF received line signal detector. is in the off
condition.
On a half-duplex channel, circuit BB shall be held in the binary one
marking. condition when circuit CA request to send. is in the on condition
and for a brief interval following the on to off transition of circuit CA to
allow for the completion of transmission and decay of line reflections.
Circuit CARequest to Send. Direction: To DCE. This circuit is used to
condition the local DCE for data transmission and, on a half-duplex channel,
to control the direction of data transmission of the local DCE.
For simplex or duplex operation, the on condition maintains the DCE in
the transmit mode. The off condition maintains the DCE in a nontransmit
mode.
113
CCITT
Number
Interchange
Points
Circuit
Category
Direction
Shield
BA
BB
CAr CJ
(Note 1)
CB
103
104
105r133
A-A
A-A
A-A
I
I
I
To DCE
From DCE
To DCE
106
A-A
From DCE
107
A-A
II
From DCE
7
8
9
10
CC
(Note 3)
AB
CF
DD
CF
102A
109
115
109
C-C
A-A
B-B
B-B
I
I
I
From DCE
From DEC
From DCE
11
12
13
14
15
DA
DB
CB
BA
DB
113
114
106
103
114
B-B
B-B
B-B
B-B
A-A
I
I
I
I
I
To DCE
From DCE
From DCE
To DCE
From DCE
16
17
18
19
BB
DD
LL
CArCJ
(Note 1)
CD
(Note 3)
104
115
141
105r133
B-B
A-A
A-A
B-B
I
I
II
I
From DCE
From DCE
To DCE
To DCE
108r1, r2
A-A
II
To DCE
1
2
3
4
5
6
20
Circuit
21
22
23
24
25
RL
CE
AC
DA
TM
140
125
102B
113
142
A-A
A-A
C-C
A-A
A-A
II
II
To DCE
From DCE
I
II
To DCE
From DCE
26
(Note 2)
Source: Reference 16, Figure 3.9, page 16. Courtesy of Electronic Industries AlliancerTelecommunications Industry Association. Reprinted with permission.
114
DATA TRANSMISSION II
indicating to the DTE that data may be transferred across the interface point
on interchange circuit BA transmitted data..
A transition from on to off instructs the DCE to complete the transmission of all data which were previously transferred across the interface point
on interchange circuit BA and then assume a nontransmit mode or a receive
mode as appropriate. The DCE responds to this instruction by turning off
circuit CB clear to send. when it is prepared to again respond to a
subsequent on condition of circuit CA request to send..
Note: A nontransmit mode does not imply that all line signals have been
removed from the communications channel.
When circuit CA request to send. is turned off, it shall not be turned on
again until circuit CB clear to send. has been turned off by the DCE.
r TIA Interface Standards: EIAr
r TIA-422, and
6.4.2.3 EIAr
r TIA-530, EIAr
r TIA-423. EIArTIA-530 Ref. 14. defines a 25-pin, and alternatively a
EIAr
26-pin, interface between DTE and DCE. It is designed for data rates up to
2.1 Mbps with serial bit streams. The electrical interfaces are described in
EIArTIA-422 Ref. 15. and EIArTIA-423 Ref. 16.. Connector contact
assignments are shown in Table 6.8, and Table 6.9 gives the interchange
circuits.
TABLE 6.9 EIAr
r TIA-530 Interchange Circuits
Circuit
Mnemonics
CCITT
Number
AB
AC
102
102B
Signal common
Signal common
BA
BB
103
104
Transmitted data
Received data
To DCE
From DCE
CA
CB
CF
CJ
CE
CC
CD
105
106
109
133
125
107
108r1, r2
Requested to send
Clear to send
Received line signal detector
Ready for receiving
Ring indicator
DCE ready
DTE ready
To DCE
From DCE
From DCE
To DCE
From DCE
From DCE
To DCE
DA
113
To DCE
DB
114
DD
115
LL
RL
TM
141
140
142
Circuit Name
Circuit
Direction
Circuit
Type
COMMON
From DCE
DATA
CONTROL
TIMING
From DCE
To DCE
To DCE
From DCE
Source: Reference 14, Figure 4.1, page 17. Courtesy of Electronic Industries AlliancerTelecommunication Industry Association. Reprinted with permission.
115
EIArTIA-422 Ref. 15. and EIArTIA-423 Ref. 16. give the electrical
characteristics for interchange circuits and are companion standards for
EIArTIA-530 Ref. 14.. EIArTIA-422 provides for balanced voltage digital
interface circuits, and EIArTIA-423 provides for unbalanced voltage digital
interface circuits. Remember that an unbalanced connection means that one
signal lead is grounded.
The transition region at the receiver for EIArTIA-422 is between q200
mV and y200 mV. Thus any voltage more positive than q200 mV represents a spacing or 0 condition on condition. and any voltage more negative
Figure 6.15. Unbalanced digital interface circuit, EIAr TIA-423. A, C s generator interface;
A, B s load interface; C s load circuit ground; C s generator circuit ground; Vg s ground
potential difference. (From Ref. 16. Copyright Telecommunication Industry Association.)
116
DATA TRANSMISSION II
117
118
DATA TRANSMISSION II
6.5.5 Summary
As we describe in the next chapter, we can pack more bits per hertz of
bandwidth by turning to multilevel systems or M-ary techniques, rather than
binary techniques.
Thus, we can turn to the original idea of 1 bit per hertz for binary
transmission, admitting it is a very rough first approximation. We warn that
the conventional habit of equating bandwidth to bit rate can be fraught with
danger.
REFERENCES
1. The IEEE Standard Dictionary of Electrical and Electronic Terms, 6th ed., IEEE
Std. 100-1996, IEEE, New York, 1996.
2. Interface Between Data Terminal Equipment and Data Circuit Terminating Equipment Employing Serial Binary Data Interchange, EIArTIA-232F, Telecommunication Industry Association, Washington DC, 1997.
3. 9600 Bits per Second Modem Standardized for Use of Point-to-Point 4-Wire Telephone-Type Circuits, CCITT Rec. V.29, Vol. VIII.1, IXth Plenary Assembly,
Melbourne, 1988.
4. Attenuation Distortion, CCITT Rec. G.132, IXth Plenary Assembly, Melbourne,
1988.
5. Roger L. Freeman, Telecommunication Transmission Handbook, 4th ed., John
Wiley & Sons, New York, 1998.
6. Data Communications Using Voiceband Priate Line Channels, Bell System Technical Reference Publication 41004, AT & T, New York, October 1973.
7. Transmission Systems for Communications, 4th ed., Bell Telephone Laboratories,
Holmdel, NJ, 1970.
8. Error Performance of an International Connection Forming Part of an ISDN, CCITT
Rec. G.821, Vol. III, Fascicle III.3, IXth Plenary Assembly, Melbourne, 1988.
9. Error Performance Parameters and Objecties for International Constant Bit Rate
Digital Paths at or aboe the Primary Rate, ITU-T Rec. G. 826, ITU Geneva, 1993.
10. Monsoor Shafi and Peter J. Smith, The Impact of G.826. IEEE Communications
Magazine, September 1993.
11. Transport Systems Generic Requirements: Common Requirements, Bellcorer
Telcordia GR-499-CORE Issue 1, Bellcore Piscataway, NJ, December 1995.
12. Support of Data Terminal Equipment (DTEs) with V-Series Type Interfaces by an
Integrated Serices Digital Network (ISDN), CCITT Rec. V.110, Vol. VIII.1, IXth
Plenary Assembly, Melbourne, 1988.
REFERENCES
119
13. List of Definitions for Interchange Circuits Between Data Terminal Equipment (DTE)
and Data Circuit-Terminating Equipment (DCE), CCITT Rec. V.24, IXth Plenary
Assembly, Melbourne, 1988.
14. High Speed 25-Position Interface for Data Terminal Equipment and Data CircuitTerminating Equipment, Including Alternatie 26-Position Connector, EIArTIA-530,
Telecommunication Industry Association, Washington DC, May 1992.
15. Electrical Characteristics of Balanced Voltage Digital Interface Circuits, EIArTIA422, Telecommunication Industry Association, Washington DC, December 1978.
16. Electrical Characteristics of Unbalanced Voltage Digital Interface Circuits,
EIArTIA-423, Telecommunication Industry Association, Washington DC,
December 1978.
17. H. Nyquist, Certain Topics in Telegraph Transmission Theory, AIEE Transactions, Vol. 47, April 1928.
18. C. E. Shannon and W. Weaver, The Mathematical Theory of Communications,
University of Illinois Press, Urbana, 1963.
7
THE TELECOMMUNICATIONS
NETWORK AS A VEHICLE
FOR DATA TRANSPORT
7.1 THE PUBLIC SWITCHED TELECOMMUNICATION NETWORK
7.1.1 Introduction
A major means of longer-distance data transport is the public switched
telecommunication network PSTN.. It is essentially ubiquitous and is often
the most cost-effective alternative for such transport. To intelligently decide
when and how to use the PSTN to serve data communication needs, we must
know how the network operates, as well as its advantages and limitations.
The intent of this section is to provide the reader with a review of the
operation of the PSTN from the point of view of a potential data user.
Emphasis is placed on the digital network, both transmission and switching.
The PSTN consists of a user access configuration, local switching, tandem
switching in selected situations with interconnecting trunks, and a longdistance network with its transit exchanges switches .. The PSTN access
configuration primarily consists of wire-pair subscriber loops that enter a
local serving telephone exchange via a main distribution frame. The main
distribution frame facilitates cross-connects. The loops then may be timedivision-multiplexed into groups of 24 or 30 channels in pulse code modulation PCM. configurations if the local exchange is digital. For most digital
exchanges, each switch port accepts such a channel group.
If the local serving exchange is an analog switch, each switch port accepts
one single voice channel. For the analog situation, at some point there will be
conversion to a PCM format to interface with higher levels of the local
network local exchange carrier in the United States . and the toll long
distance . network IXC or interexchange carrier network..
Given a particular desired connectivity, several switches in tandem may be
required to intervene to set up a call. In network design, the trunks that
121
122
connect switches are called links. CCITT Rec. E.171 Ref. 1. states that there
shall not be more than 12 links in tandem for an international connection.
The value of 12 is broken down into four links for the international portion
of the connection, four for the national side on one end, and four for the
national side on the other end of a call. Each time a link is added to a
connection, the quality of service QoS. tends to deteriorate. For digital
connections, the deterioration is a degradation in bit error rate BER.. For
this reason, the number of links in tandem which make up a telecommunication connectivity must be limited.
It should be noted that for voice operation over the digital PSTN, the
requirements for BER are far less stringent than those for data operation.
Voice operation requires a BER of - 1 = 10y3 , whereas for data operation
the value is better than 1 = 10y6 .
Our concerns here are as follows:
1. What services are available on the PSTN for the data end user?
2. How, and to what extent, will the PSTN degrade our data signal? This
includes other degradations such as loss of traffic, out-of-sequence
delivery, and so on.
3. What limitations are there in data rate and speed of service?
7.1.2 Access to the PSTN: The Subscriber Network
The subscriber plant presents a major constraint to effective data rate. The
subscriber plant consists of wire-pair terminations on the user premises
extending to the local serving exchange. We can expect the characteristic
impedance Z0 . of the typical wire pair as connected to be 600 or 900 ohms.
Ordinarily, wire pair is an excellent transmission medium. It can support
more than 100 Mbps over limited distances. However, our in-place subscriber plant probably cannot support such data rates. We must consider the
following:
1. Whether a particular pair has inductive loading and bridged taps..
Both limit useful bandwidth, add to group delay, and notably constrain
data rate.
2. The age of the portion of the plant in question and the condition of the
loop under consideration. Some plants have been in operation well over
50 years. Cables get wet; they dry and get wet again. Insulation
deteriorates. It has been said that only about 50% of the subscriber
plants in the United States can support the ISDN basic rate 160 kbps
in the United States ..
3. Wire pairs can also be noisy. One cause is the accidental grounding of
one side of the pair. Another cause is the deterioration of balance to
ground.
123
124
125
Figure 7.2. Simplified diagram of the formation of a PAM wave and a PCM bit stream. Only
three channels are sampled sequentially in this example. ( a ) Transmitter, ( b ) receiver.
(Courtesy of GTE Lenkurt Inc., San Carlos, California.)
126
channel just once is called a frame. And, of course, a frame is 125 microseconds in duration.
Quantization and Coding. The next step in the formation of a PCM signal is
quantization. In modern PCM systems, coding is carried out simultaneously
with the quantization process. Realize that quantization is simply setting
discrete voltage level possibilities. Each voltage level is assigned a binary
code, a sequence of 1s and 0s.
The number of bits required to represent a character is called a code
length, or, more properly, a coding leel. For instance, as we have learned in
Chapter 5, a binary code with four discrete binary elements a four-level
code. can code 2 4 separate and distinct meanings, or 16 characters 2 4 s 16.;
a five-level code would provide 2 5, or 32, distinct characters or meanings.
In modern PCM, we use an eight-level code deriving 256 different code
possibilities. Thus we must quantize the sample voltage levels into just 256
possibilities.
The PAM wave has an infinite number of code level voltage level.
possibilities. For all intents and purposes it is still an analog signal. If the
positive excursion of a PAM wave is between 0 and q1 volt, the reader
should ask: How many discrete values are there between 0 and 1? All values
must be considered, including 0.4578046 volts and an infinite number of
other values.
The intensity range of voice signals over an analog telephone channel is of
the order of 50 dB. The y1 to 0 to q1 volt of the PAM wave at the
excursion coder input should represent that 50-dB range. Furthermore, we
defeat the purpose of digitizing if we assign an infinite number of values to
satisfy every level encountered in the 50-dB range or a range from y1 to
q1 volt.. The key, of course, is to assign discrete levels from y1 volt to q1
volt the 50-dB range..
Actually, the assignment of these discrete values is what we call quantization. To cite an example, consider Figure 7.3. Between y1 and q1 volt, 16
quantum steps exist and are coded as shown in Table 7.1.
Figure 7.3 shows that step 12 is used twice, but in neither instance is it the
true value of the impinging sinusoid. It is a rounded-off value. These
rounded-off values are shown in the figure with a dashed line that follows the
general outline of the sinusoid. The horizontal dashed lines show the points
where the quantum step changes to the next higher or lower level if the
sinusoid curve is above or below that value. Take step 14, for example. The
curve, dropping from its maximum, is given two values of 14 consecutively.
For the first, the curve is above 14, and for the second, below. That error, in
the case of 14 for instance, from the quantized value to the true value is
called quantizing distortion or quantization noise. This distortion or noise is
a major form of imperfection found in PCM systems.
In Figure 7.3, maintaining the y1 to 0 to q1 volt relationship, let us
double the number of quantum steps from 16 to 32. What improvement
127
128
Code
Step
Code
0
1
2
3
4
5
6
7
0000
0001
0010
0011
0100
0101
0110
0111
8
9
10
11
12
13
14
15
1000
1001
1010
1011
1100
1101
1110
1111
would we achieve in quantization distortion? First determine the step increment in millivolts in each case. The total excursion is 2000 millivolts i.e.,
y1000 to 0 to q1000 mV.. This excursion is divided into 16 steps, or 125 mV
per step 2000r16 s 125.. In the second case we have 32 steps, thus 2000r32
or 62.5 mV per step. Or we have 62.5 mV above or below the nearest
quantizing step. For the 32-step case, the worst quantizing distortion case
would be at the half-step level or 31.25 mV, whereas for the first case it was
62.5 volts at mid-step level.
Thus the improvement in decibels for doubling the number of quantizing
steps is
20 log 62.5r31.25 . s 20 log 2 s 6 dB
Remember it is 20 log because we are in the voltage domain..
This expression is valid for linear quantization only. Thus, increasing the
number of quantizing steps for a fixed range of input values reduces quantization distortion accordingly. Experiments with linear quantization have
shown that if 2048 uniform steps are provided, sufficient voice signal quality
is achieved.
For the 2048-quantum-step samples. case, an 11-element code is required
2 11 s 2048.. With a sampling rate of 8000 samples per second per voice
channel, binary information rate per voice channel will be 88,000 bps.
Consider that equivalent bandwidth is a function of the information rate
data rate.; the desirability of reducing this figure i.e., 11 bits per sample. is
obvious when bandwidth is at a such a premium.
There are two different types of PCM systems in the world: the European
system with its E1 family of waveforms, and the North American system with
its T1 DS1. family of waveforms.
The North American PCM system uses 256 quantum steps for PCM
voltage samplesexcept every sixth frame, where only 128 quantum steps
are utilized. Each sample consists of an 8-bit PCM word. So a quantum
step is represented by an 8-bit word except at every sixth frame where only a
7-bit word is used. The 8th bit in that frame is reserved for signaling.
129
European systems use 8-bit words for all samples, allowing a full 256
quantum steps.
How do we reduce 2048 quantum steps to only 256? It was mentioned
above that 2048 quantum steps would be required for sufficient voice fidelity,
assuming linear quantization. The reduction is accomplished by companding.
Companding is a contraction for compression and expansion. In conventional telephone practice, a compressor compresses the intensity of speech
signals at the input circuit of a communication channel by imparting more
gain to weak signals than to strong signals. At the far-end output of the
communication circuit, the expander performs the reverse function. It restores the intensity of the signal to its original dynamic range.
The standard approach, both European and North American, is to impart
larger quantizing steps to high-level signals and smaller steps for lower-level
signals. The system takes advantage of the fact that for speech transmissions
there is a much greater likelihood of encountering signals with small amplitudes than those of large amplitudes.
Figure 7.4. Quantizing and coding used with the European E1 PCM system.
130
0
1
2
3
4
5
6
131
Figure 7.5. Coding of segment 4 (positive) of the E1 system. Dashed line shows position of
sample 8-bit sequence.
132
Figure 7.6. Positive portion of the segmented approximation of the -law ( s 255) quantizing curve used in the North American DS1 PCM system.
times and aligns the receiver. Such identification is called framing. A full
sequence or cycle of samples is called a frame in PCM terminology.
Note that there are only 255 quantizing steps because steps 0 and 1 use
the same bit sequence, thus avoiding a sequence of all zeros no transitions ..
CCITT Rec. G.701 Ref. 2. defines a frame as a set of consecutive digit
time slots in which the position of each digit time slot can be identified by
reference to a frame alignment signal. The frame alignment signal does not
necessarily occur, in whole or in part, in each frame.
The North American PCM system carries out frame alignment in a
different way from the E1 system. As its European counterpart, the North
American system uses 8-bit time slots for each sample and samples 24
channels sequentially. Sampling each of the 24 channels just once sequentially is a frame. To each frame one bit is added, called the framing bit. One
frame therefore has 193 bits, or
8 = 24 q 1 s 193
133
TABLE 7.2 Eight-Level Coding of the North American DS1 (T1) System
Code Level
255
239
223
207
191
175
159
143
127
126
111
95
79
63
47
31
15
2
1
0
a
(Center levels)
(Nominal zero)
1
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
1
1
0
0
1
1
1
1
1
1
0
0
1
1
0
0
0
0
0
1
0
1
0
1
0
1
1
1
1
0
1
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
1
1
1a
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
1
0
0
One digit is added to ensure that the timing content of the transmitted pattern is maintained.
The framing rate i.e., sampling rate. is 8000 times per second. This is the
so-called Nyquist rate. To compute the bit rate for the North American
DS1 T1. system, multiply 8000 by 193:
193 = 8000 s 1,544,000 bps, or 1.544 Mbps
The E1 system is a 32-channel system where 30 channels carry speech on
voice channels and the remaining two channels carry supervisory signaling
and framingrsynchronization information. Each channel is an 8-bit time slot,
and we speak of time slots 031 as follows:
Time Slot Number
0
115
16
1731
Synchronizing framing.
Speech
Signaling
Speech
134
Figure 7.7. Neutral versus bipolar bit streams. Top: Alternating 1s and 0s transmitted in a
neutral mode. Bottom: Alternating 1s and 0s transmitted with alternate mark inversion (AMI),
also called bipolar.
imitated. The remaining bits of time slot 0 can be used for the transmission
of supervisory information signals.
Framing and timing should be distinguished. Framing ensures that the
PCM receiver is aligned regarding the beginning and end. of a sequence or
frame; timing refers to the synchronization of the receiver clockspecifically, that it is in step with its far-end companion. transmit clock. Timing at
the receiver is corrected via the incoming markspace and spacemark.
transitions. It is important, then, that long periods without transitions do not
occur. This was equally important in our discussion of data transmission in
Chapters 5 and 6.
7.2.4 The Line Code
PCM signals transmitted on metallic-pair cable are in the bipolar mode
biternary . as shown in Figure 7.7. The marks or 1s have only a 50% duty
cycle.* There are several advantages to this mode of line transmission:
1. No direct-current return is required; hence transformer coupling can be
used on the line.
2. The power spectrum of the transmitted signal is centered at a frequency equivalent to half of the bit rate.
It will be noted in bipolar transmission that the 0s are coded as absence of
pulses, and the 1s are alternately coded as positive or negative pulses, with
the alternation taking place at every occurrence of a 1. This mode of
transmission is more often called alternate mark inersion AMI..
*With NRZ bit streams, which we have assumed up to now, each bit has 100% duty cycle. Here
we mean that the active part of a bit occupies the entire time slot assigned. In the case of AMI
bipolar. transmission, the 1s occupy only half of the slot assigned.
135
Figure 7.8. Simplified functional block diagram of a regenerative repeater for use with PCM
metallic cable systems.
136
137
often called the plesiochronous digital hierarchy PDH., whereas SONET and
its European counterpart, SDH, are called the synchronous digital hierarchy.
Table 7.3 summarizes and compares these multiplex levels for the North
American, Japanese, and European systems. The development of the North
American hierarchy is shown in Figure 7.9, which gives respective DS line
rates and multiplex nomenclature. Regarding nomenclature, we see from the
figure that M12 accepts level 1 inputs, delivering level 2 outputs to the line. It
TABLE 7.3 PCM Multiplex Hierarchy Comparison a
Level
System Type
North America
Number of voice channels
Line bit rate (Mbps)
1
24
1.544
2
96
6.312
3
672
44.736
4
4032
274.176
Japan
Number of voice channels
Line bit rate (Mbps)
24
1.544
96
6.312
480
32.064
1440
97.728
5760
400.352
Europe
Number of voice channels
Line bit rate (Mbps)
30
2.048
120
8.448
480
34.368
1920
139.264
7680
564.992
See Ref. 3.
138
actually accepts 4 DS1 inputs deriving a DS2 output 6.312 Mbps.. M13
accepts level 1 inputs, delivering a level 3 output to the line. In this case, 28
DS1 inputs form one DS3 output 44,736 Mbps.. The M34 takes six DS3
inputs level 3. to form one DS4 line rate 274.176 Mbps.. DS1C is a special
case where two 1.544 Mbps DS1 rates are multiplexed to form a 48-channel
group with a line rate of 3.152 Mbps.
By simple multiplication we can see that the higher-order line rate is a
multiple of the lower inputs rate plus some number of bits. The DS1C is an
example. Here the line rate is 3152 kbps, which is 2 = 1544 kbps q 64 kbps.
The additional 64 kbps are used for multiplex synchronization and framing.
Multiplex and demultiplex timing is very important, as one might imagine.
The two DS1 signal inputs are each 1.544 Mbps plus or minus some speed
tolerance specified as "130 ppm.. The two input signals must be made alike
in repetition rate and in a rate suitable for multiplexing. This is done by bit
stuffing. In this process, bits pulses. are added to each signal in sufficient
quantity to make the signal operate at a precise rate controlled by a common
clock circuit in the multiplex. Pulses are inserted stuffed . into multiplex slots
but carry no information. Thus it is necessary to code the signal in such a
manner that these noninformation bits can be recognized and removed at the
receiving demultiplex terminal.
Consider the more general case, using CCITT terminology. If we wish to
multiplex several lower-level PCM bit streams deriving from separate tributaries into a single PCM bit stream at a higher level, a process of justification
is required called bit stuffing above.. In CCITT Rec. G.701 Ref. 2. we find
the following definition of justification: a process of changing the rate of a
digital signal in a controlled manner so that it can accord with a rate different from its own inherent rate usually without loss of information.
Positive justification as above. adds or stuffs digits; negative justification
deletes or slips digits. Stuffing is a North American term; justification is
European. If we think of computer displays and print copy, a page may be
right-hand justified, left-hand justified, or right- and left-justified as this page
Repetition Rate
(Mbps)
Tolerance
(ppm) a
DS0
DS1
DS1C
DS2
DS3
DS4
0.064
1.544
3.152
6.312
44.736
274.176
"130
"30
"30
"20
"10
Format
Duty Cycle
(%)
Bipolar
Bipolar
Bipolar
B6ZS
B3ZS
Polar
100
50
50
50
50
100
139
Tolerance
(ppm)
Code
1
2
3
4
2.048
8.448
34.368
139.264
"50
"30
"20
"15
HDB3
HDB3
HDB3
CMI b
2.37 or 3 a
2.37
1.0
1 " 0.1c
a
b
c
is. Spacing is added or deleted for such justification. With this in mind,
justification is a better term.
7.2.7 Line Rates and Codes
Table 7.4 summarizes North American DS series of PCM multiplex line
rates, tolerances of these rates, and the types of line code used. Table 7.5
gives similar information for the E1 family of multiplex line rates.
140
Figure 7.10. A time-division switching showing time slot interchange. Connectivity is from
incoming time slot C to user G (outgoing time slot G ).
141
slots, and the E1 format contains 32 time slots. The time duration of a time
slot for DS1 T1. is 125r24 s 5.2803 s, and for E1 it is 125r32 s 3.906 s.
Time slot interchanging involves moving the information contained in each
time slot from the incoming bit stream location to an outgoing bit stream, but
in a different location. The outgoing location of the time slot is in accordance
with the destination of the time slot, where the information contained in the
time slot may be voice, data, video, or facsimile. Of course, at the output port
of the switch a whole new frame is generated for transmission. To accomplish
this, at least one time slot must be stored in memory write. and then called
out of memory in a changed sequence position read.. The operations must
be controlled in some manner; and some of these control actions must also
be kept in memory, such as the idle and busy condition of time slots.
Now we can identify three basic blocks of a time switch:
1. Memory for speech by time slots.
2. Memory for control
3. Time slot counter or processor
These three blocks are shown in Figures 7.11 and 7.12. The incoming time
slots can be written into the speech memory either sequentially i.e., as they
appear in the incoming bit stream. Figure 7.11. or randomly Figure 7.12.
where the order of appearance in memory is the same as the order of
Figure 7.11. Time slot interchange time switch; sequential write, random read. (From Ref. 4.)
142
Figure 7.12. Time switch, time slot interchanger, random write, sequential read. (From
Ref. 4.)
appearance in the outgoing bit stream. Now with the second version the
outgoing time slots are read sequentially because they are in the proper order
of the outgoing bit stream i.e., random write, sequential read.. This means
that the incoming time slots are written into memory in the desired output
order. The writing of incoming time slots into speech memory can be
controlled by a simple time slot counter and can be sequential i.e., in the
order in which they appear in the incoming bit stream Figure 7.11.. The
readout of the speech memory is controlled by the control memory. In this
case the readout is random where the time slots are read out in the desired
output order. The memory has as many cells as there are time slots. For the
DS1 example, there would be 24 cells. This time switch works well for a
single inletoutlet switch.
Consider a multiple port switch, which may be a tandem switch, for
example, handling multiple trunks. Here time slots from an inlet port are
destined for multiple outlet ports. Enter the space switch S .. Figure 7.13 is a
simple illustration of this concept. For example, time slot B1 is moved to the
Z trunk into time slot Z1 , and time slot Cn is moved to trunk W into time
slot Wn . However, we see that in each case of a space switch, there is no
change in time slot position.
7.3.4 Space Switch
A typical time-division space switch is shown in Figure 7.14. It consists of a
cross-point matrix made up of logic gates that allow the switching of time
143
Figure 7.13. Space switch allows time slot interchange among multiple trunks. (From Ref. 4.)
Figure 7.14. Time-division space switch cross-point array. (From Ref. 4.)
144
slots in the PCM time slot bit streams in a pattern required by the network
connectivity for that moment in time. The matrix consists of a number of
input horizontals and a number of output verticals with a logic gate at each
cross-point. The array, as shown in the figure, has m horizontals and n
verticals, and we call it an m = n array. If m s n, the switch is nonblocking.
If m ) n, the switch concentrates; and if n ) m, the switch expands.*
Sometimes other notation is used in the literature, such as n and k.
In Figure 7.14, the array consists of a number of m. input horizontals and
n. output verticals. For a given time slot, the appropriate logic gate is
enabled and the time slot passes from its input horizontal to the desired
output vertical. The other horizontals, each serving a different serial stream
of time slots, can have the same time slot e.g., a time slot from time slots
124, 130, or 1n; for instance, time slot 7 on each stream. switched into
other verticals by enabling their gates. In the next time slot position i.e., time
slot 8., a completely different path configuration could occur, again allowing
time slots from horizontals to be switched to selected verticals. The selection,
of course, is a function of how the traffic is to be routed at that moment for
calls in progress or calls being set up. The space array cross-point matrix.
does not switch time slots in the time domain as does a time switch time slot
interchanger .. This is because the occurrences of time slots are identical on
the horizontal and on the vertical. The control store memory. in Figure 7.14
enables the cross-point gates in accordance with its stored information.
In Figure 7.14, it is desired to transmit a signal from input 1 horizontal. to
output 2 vertical., and the gate at that interface would be activated by
placing an enable signal on S12 during the desired time slot. Then the
information bits of that time slot would pass through the logic gate onto the
vertical. In the same time slot, an enable signal Sm1 on the mth horizontal
would permit that particular time slot to pass to vertical. From this we can
see that the maximum capacity of the array during one time slot interval
measured in simultaneous call connections is the smaller value of m or n.
For example, if the array is 20 = 20 and a time slot interchanger is placed on
each input horizontal line. and the interchanger handles 32 time slots, the
array can serve 20 = 32 s 640 different time slots. The reader should note
how the time slot interchanger TSI. multiplies the call-handling capability of
the array when compared to its analog counterpart.
7.3.5 TimeSpaceTime Switch
Digital switches are composed of time- and space-switching stages. The letter
S designates a space-switching stage, and the letter T designates a timeswitching stage. For instance, a switch composed of a time-switching stage, a
space-switching stage, and a time-switching stage is called a TST switch.
*Concentration and expansion are the terms used, particularly for local switches, where there
are notably fewer trunks than lines.
145
146
147
148
When R2. is greater than R1., an overflow will occur, causing a loss of
data. When R1. is greater than R2., an underflow occurs causing extraneous data being inserted into the bit stream. These disruptions of data are
called slips.
Slips must be controlled to avoid loss of frame synchronization. The most
common approach is to purposely add an artificial frame or delete a traffic
frame that does not affect framing synchronization and alignment.
Slips do not impair voice transmission per se. A slip to a listener sounds
like a click. The impairments to signaling and framing due to slips depend on
the PCM system, whether it is DS1 or E1. Consider the latter E1.. It uses
channel-associated signaling in channel 16 and may suffer multiframe misalignment due to a slip. Alignment may take up to 5 ms to be reacquired, and
calls in the process of being set up may be lost. Common channel signaling
such as CCITT Signaling System No. 7 is equipped with error detection and
retransmission features so that a slip will cause increased retransmit activity,
but the signaling function will be otherwise unaffected.
One can imagine the effect of slips on data transmission that is riding on
one or more digital 64-kbps channels. At least one octet 8 bits. of data is lost
per channel. If frame alignment is lost, all data are lost, including the slip, for
the period required to reacquire alignment. As an example, consider just one
64-kbps channel. If 5 ms is required including one time slot slip. and it takes
125 s to transmit a frame, the number of lost bits is
8 5 = 10y3 . r125 = 10y6 s 320 bits
If the slip and realignment period occur right in the midst of where one data
frame ends and the next begins, then two frames are lost and must be
recovered. Besides, many data link protocols depend on bit counting to
determine field and frame boundaries. Imagine what would happen to the
counting if we drop 8 bits or add 8 extraneous bits!
7.5.2.2 North American Slip Objectives. The North American end-to-end
slip objective is 0 slips. However, when a higher-level network synchronization clock suffers a fault, a slip rate of 255 slips per day is possible Ref. 5..
This could happen if the master network synchronizing clock is lost and all
subsidiary switch clocks are left free-running.
7.5.2.3 CCITT Slip Objectives. The CCITT slip objective is 1 slip per 70
days per plesiochronous link. Note that plesiochronous operation implies
free-running, high-stability clocks. By high stability, we mean a stability on
the order of "1 = 10y11 per month or better Ref. 6..
The slip objective per link is 1 slip in 5.8 days. This is based on the CCITT
hypothetical digital connection HRX. which consists of 13 nodes interconnected by 12 links. Thus we have 70r12 or 5.8 days. CCITT Rec. G.822 Ref.
7. states that acceptable slip rate performance on a 64-kbps international
149
connection is less than 5 slips in 24 hours for more than 98.9% of the time.
Forty percent of the slip rate is allocated to the local network on each end of
the connection, 6% is allocated for each national transit toll. exchange, and
8% is allocated for the international transit portion.
150
151
will also be lost. If the data time slots can be segregated from those carrying
voice samples, then integrity can be maintained in either case.
152
REFERENCES
1. International Telephone Routing Plan, CCITT Rec. E.171, Fascicle II.2, IXth
Plenary Assembly, Melbourne, 1988.
2. Vocabulary of Digital Transmission and Multiplexing, and Pulse Code Modulation
PCM . Terms, CCITT Rec. G.701, ITU Geneva, March 1993.
3. Digital Hierarchy Bit Rates, CCITT Rec. G.702, Fascicle III.4, IXth Plenary
Assembly, Melbourne, 1988.
4. Roger L. Freeman, Telecommunication System Engineering, 3rd ed., John Wiley &
Sons, New York, 1996.
5. Bellcore Notes on the Networks, Issue 3, SR-2275, Bellcore, Morristown, NJ,
December 1997.
6. Timing Characteristics of Primary Reference Clocks, ITU-T Rec. G.811, ITU Geneva,
September 1997.
REFERENCES
153
8
THE TRANSMISSION OF
DATA OVER THE ANALOG
VOICE CHANNEL
8.1 BACKGROUND
Access to the PSTN is commonly by means of the standard analog telephone
channel. That access is usually a wire pair connecting the telephone to the
local serving exchange central office.. In the business environment, the telephone wire pair is usually terminated in a PABX where there is a conversion
to a digital regime internal to the PABX. When a call is routed to a distant
end-user, the PABX will place that call on a DS1 time slot, which is then
passed to the local serving exchange in a DS1 configuration Chapter 7..
Some PABXs extend digital service directly to an end-users telephone.
In most cases, whether residential or commercial, end-users are constrained by the typical analog voice channel. Baseband data transmission,
which we can typically expect as inputroutput of the DTE see Section 6.3.,
is incompatible with the analog voice channel. The device that makes the
baseband data signal compatible with the analog voice channel, is the DCE,
which we have called a modem.
In this chapter we first discuss two-wire and four-wire transmission,
because many data sets are connected to the network on a four-wire basis.
This is followed by a review of the basic impairments we can expect as our
data bit stream traverses the PSTN. The principal theme of the chapter is the
description of how modern data modems work.
Before tackling that question, we have to step back a bit to discuss the
evolution of modem technology. The principal constraint of the analog voice
channel is its limited bandwidth. Remember that it occupies the band from
300 to 3400 Hz, a 3100-Hz bandwidth. If we allow 1 bit per hertz of
bandwidth for data occupancy, the maximum data rate it can support is only
3100 bps, far less than the 34- and 56-kbps service that current modems
provide. This, really, is the basic thrust of the chapter.
155
156
157
158
159
160
Figure 8.3. Limits of overall loss of a circuit relative to that at 1020 Hz. It should be noted that
the figure expresses an amplitude distortion specification. (From Figure 1rM.1020, page 56,
CCITT Rec. M.1020, Ref. 4.)
Not all of the hertz are useful for data transmission. As we approach either
band edge, amplitude distortion and phase distortion become intolerable.
In this section we review amplitude and phase distortion as an introduction and background for our subsequent discussion of conditioning and
equalization. Section 6.3.2.3 gave a more in-depth review of these impairments.
8.4.2 Amplitude Distortion
Amplitude distortion, attenuation distortion, and amplitude response are
different names for the same phenomenon. Let us define this impairment as
the relative attenuation at any frequency with respect to that at reference
frequency. Common reference frequencies for the voice channel are 1000 Hz
in North America and 800 Hz in Europe.
CCITT Rec. G.132 Ref. 2. recommends no more than 9-dB attenuation
distortion relative to 800 Hz between 400 and 3000 Hz on an international
connection. Such distortion would be untenable for a data circuit. Figure 8.3
shows the typical limits required of attenuation distortion on a data circuit.
8.4.3 Phase Distortion
Many sources in the literature tell us that phase distortion is the principal
bottleneck to data rate. Phase distortion is the result of delay. Delay varies
from band center to band edge. In other words, our data waveform travels
161
the fastest at band center, and as we approach band edge, it starts to slow
down. What we are saying is that the velocity of propagation is not constant
across the band of interest.
Of course delay is minimal, and delay distortion i.e., phase distortion. is
the flattest around band center, which is in the vicinity of 1700 and 1800 Hz.
By flattest we mean where there is a comparatively minimum variation in
delay. Delay distortion is often expressed by a related parameter called
enelope delay distortion EDD.. For example, a certain specification may read
that the EDD between 1000 and 2600 Hz will not exceed 1000 s. Note that
1800 Hz is right in the center of this band.
One rule of thumb often used is that envelope delay distortion in the band
of interest should not exceed the period of one bit. With a non-return-to-zero
NRZ. waveform, the period of a bit is simply calculated by
Bit period seconds . s 1r bit rate .
Some Examples: The period of a bit i.e., the time duration of one bit. for
2400 bps bit stream is 1r2400 s or 416.66 s; for 56,000 bps, it is 1r56,000.
s 17.857 s; for 1 Mbps, it is 1r1 = 10 6 . s or 1 s; for 1.544 Mbps, it is
1r1.544 = 10 6 . or 0.6476 s. In a similar manner, given the period of a bit
in seconds, we can calculate the bit rate in bps, assuming an NRZ waveform.
For this discussion, we will assume that envelope delay distortion values are
the same as group delay distortion values.
If the envelope delay distortion is 1 ms from 1000 to 2600 Hz, the
maximum bit rate assumes binary transmission. is 1 kbps. We will find that
there are two ways to get around this dilemma of a limited bit rate. The first
is to use equalization discussed below., and the second is to reduce
the modulation rate. One way to accomplish the latter is to reduce the bit
rate. Another approach would be to use an M-ary wave form which reduces
the modulation rate without sacrificing the bit rate. M-ary waveforms are
discussed in Section 8.5. For further reading see CCITT Rec. G.133 Ref. 3..
8.4.4 Conditioning and Equalization
Line conditioning in the United States is a tariffed offering by the serving
common carrier to the data end user. In other words, the telephone company
or administration guarantees that a certain leased line or lines will meet
some minimum standards regarding amplitude distortion and envelope delay
distortion. Because these lines are special, the telephone company charges
the customer accordingly. Table 8.1 shows bandwidth parameter limits for
typical conditioned line offerings for the United States.
CCITT Rec. M.1020 provides requirements for special conditioning of
leased lines for data transmission. Figure 8.3 shows requirements for amplitude distortion i.e., overall loss relative to 1020 Hz., and Figure 8.4 shows
limits of group delay relative to the minimum measured group delay in the
162
Frequency
Range (Hz)
Basic
5002500
3003000
10002400 d
3002700 d
3003000
5002800 d
3003000 d
C1
C2
Variation
(dB) c
y2
y3
y1
y2
y3
y1
y2
to q8
to q12
to q3
to q6
to q12
to q3
to q6
C3
(access line)
5002800 d
3003000 d
y0.5 to q1.5
y0.8 to q3
C3
(Trunk)
5002800 d
3003000 d
y0.5 to q1
y0.8 to q2
C4
5003000 d
3003200 d
y2 to q3
y2 to q6
C5
5002800 d
3003000 d
y0.5 to q1.5
y1 to q3
Envelope Delay
Distortion
Frequency
Range (Hz)
Variation
(microseconds)
8002600
1750
10002400 d
8002600
1000
1750
10002600 d
6002600 d
5002800 d
10002600 d
6002600 d
5002800 d
10002600 d
6002600 d
5002800 d
10002600 d
8002800 d
6003000 d
5003000 d
10002600 d
6002600 d
5002800 d
500
1500
3000
110
300
650
80
260
500
300
500
1500
3000
100
300
600
Source: Reference 5.
Figure 8.4. Limits of group delay relative to the minimum measured group delay in the 500to 2800-Hz band. (From Figure 2r1020, page 56, CCITT Rec. M.1020, Ref. 4.)
163
band from 500 to 2800 Hz. For our discussion, group delay distortion. values
are very close to envelope delay values, and thus we may use them interchangeably. For example, in Figure 8.4, between 1000 and 2600 Hz, the
envelope delay distortion is 500 s.
Conditioning, therefore, is what the telephone company administration .
can do for the data end user. Equalization is what the data end-user can do
to improve either raw if nonconditioned lines are used. or residual amplitude distortion and envelope delay distortion in the case of conditioned lines.
There are several methods of performing equalization. One of the most
common is to use several networks in tandem. Such networks tend to flatten
response. In the case of amplitude distortion, they add attenuation increasingly toward band center where end-to-end loss is the least, and less and less
is added as band edges are approached. Essentially the amplitude equalizer
provides a mirror response opposite to that of the channel response, making
the net amplitude response comparatively flat.
The delay equalizer operates in a fairly similar fashion. Voice channel
delay increases toward channel edges parabolically from channel center. The
delay equalizer adds delay in the center, with less and less delay added as
band edges are approached, much like an inverted parabola. Thus the delay
response is flattened at some small cost in absolute delay, which, in most data
systems, has no effect on performance. However, care must be taken with the
effect of a delay equalizer on an amplitude equalizer, and, conversely, the
effect of an amplitude equalizer on a delay equalizer. Their design and
adjustment must be such that the flattening of the channel for one parameter
does not entirely distort the channel for the other parameter. Figure 8.5
shows typical envelope delay response in a voice channel along with the
opposite response of an equalizer to flatten the envelope delay characteristics
of the voice channel.
Another type of equalizer is the transversal type of filter, which is shown
in Figure 8.6. This equalizer is useful where it is necessary to select among,
or to adjust, several attenuation amplitude . and phase characteristics. As
shown in Figure 8.6, the basis of the filter is a tapped delay line to which the
input is presented. The output is taken from a summing network which adds
or sums the outputs of the taps. Such a filter is adjusted to the desired
response equalization of both phase and amplitude . by adjusting the tap
contributions.
If the characteristics of a line are known, which is probably the case for a
leased facility, another method of equalization is predistortion of the output
signal of the data set e.g., modem.. Some devices designed for this requirement consist of a shift register and a summing network. If the equalization
needs to be varied, then a feedback circuit from the receiver to the transmitter would be required to control the shift register. Such a type of active
predistortion is valid for binary transmission only.
A major drawback to the equalizers discussed with the exception of the
last with a feedback circuit. is that they are useful only on dedicated or
164
Figure 8.5. A delay (phase) equalizer tends to flatten delay characteristic of a voice channel.
(From Ref. 6. Copyright BTL. Reprinted with permission.)
leased circuits where the circuit characteristics are known and remain fixed.
Obviously, if a switched circuit is used, such as on a dial-up connection, a
variable automatic equalizer is required, or manual conditioning would be
necessary on every circuit in the switched systems that would possibly be
transmitting data.
Circuits are conventionally equalized on the receiving end. This is called
post-equalization. Equalizers must be balanced and present the proper
impedance to the line. Administrations telephone companies. may choose to
condition trunks and attempt to eliminate the need to equalize station lines.
The economy of considerably fewer equalizers is obvious. In addition, each
circuit that would possibly carry comparatively high-speed data in the system
would have to be equalized, and the equalization must be good enough that
any possible circuit combination would meet the overall requirements. If
DATA MODEMS
165
equalization requirements become greater i.e., parameters are more stringent., then consideration may have to be given to the restriction of the
maximum number of circuits trunks. in tandem. CCITT Rec. E.171. recommends no more than 12 circuits in tandem on an international connection.
Equalization to meet amplitudefrequency response attenuation distortion. requirements is less exacting on the overall system than is EDD. With
modern digital networks, considering the network in isolation, the principal
contributors to amplitude and phase distortion are the input and output
3.4-kHz filters. The measured performance for amplitude and phase distortion should prove out considerably better than the requirements of CCITT
Rec. M.1020. Now add a subscriber loop to each end of the connection to
permit a DCErDTE access, and we may have some fairly different results.
Automatic equalization for both amplitude and delay is widely used. All
CCITT-recommended modems operating at 2400 bps and higher have automatic equalizers built in. These equalizers are self-adaptive and require a
short adaptation or training period after a circuit is switched, on the order of
1 s or less. This can be carried out during the transmission of synchronization
sequences. Not only is the modem clock being averaged for the new circuit
on the transmission of a synchronization idle signal, but the self-adaptive
equalizer adjusts for optimum equalization at the same time.
166
In each case an audio tone is used to carry the information. It is called a tone
because if we connect a loudspeaker to the tone generator, the tone can be
heard having a musical quality. This happens because the tone, when detected, is in the audio-frequency range of the human ear. It is also in the
range of the standard voice channel, between 300 and 3400 Hz as one would
expect.
In the case of ASK, for binary transmission, a binary 1 is tone on and a
binary 0 is tone off. A binary sequence, then, is transmitted as a series of
tone-on and tone-off sequences.
The two binary states for FSK represent a higher-frequency tone for the
mark or binary 1 and a lower-frequency tone for the space or binary 0. At the
FSK receiver, two filters are used, one centered on each tone frequency. If
there is tone energy in the higher-frequency filter, then a mark or binary 1
has been received; if there is tone energy in the lower-frequency filter slot,
then a space or binary 0 has been received.
Phase-shift keying modems use only one tone, usually centered around
1700 or 1800 Hz, where phase distortion is flattest. The phase of the tone can
be retarded. Suppose a binary 0 is assigned to the condition of no phase
retardation and a binary 1 is assigned to 180 phase retardation. This now
defines BPSK or binary phase shift keying. For example, if we receive a
signal with 180 of phase retardation, we receive a binary 1; if we receive a
signal an 1800-Hz tone. with no phase retardation, we receive a binary 0.
Phase modulation is usually illustrated diagrammatically by a circle. Figure
8.7 shows our BPSK example.
Carry this concept one step further. Retard the phase in 90 increments,
or 0, 90, 180, and 270. Figure 8.8 shows where we divide the circle into
DATA MODEMS
167
0
90
180
270
00
01
10
11
We have increased the bit packing capacity to 2 bits per hertz of bandwidth.
This is so because for every transition, 2 bits are transmitted. For instance, if
there were a transition to 270, the bit sequence 11 would be transmitted.
This can be carried still one step further, where the circle has eight
positions at 45 increments. This is illustrated in Figure 8.9. Now each
transition represents 3 bits. The bit packing has been increased to 3 bits per
hertz of bandwidth. If there were 3000 Hz of bandwidth available, its
theoretical capacity is 9000 bps. We call this waveform 8-ary PSK.
The bit packing values discussed here e.g., 1 bitrHz, 2 bitsrHz, 3
bitsrHz. are theoretical values. Practical values are less optimistic. For
example, QPSK may achieve no more than 1.2 bits per hertz in the real
world.
168
Figure 8.10. An example of a 16-QAM signal constellation (i.e., 8 phases and 2 levels.)
DATA MODEMS
169
TABLE 8.2 Phase Encoding for the CCITT Rec. V.29 Modem
Q2
Q3
Q4
0
0
0
0
1
1
1
1
0
0
1
1
1
1
0
0
1
0
0
1
1
0
0
1
0
45
90
135
180
225
270
315
TABLE 8.3 AmplitudePhase Relationships with the CCITT Rec. V.29 Modem
Q1
Relative Signal
Element Amplitude
0
1
3
5
'2
3'2
170
Figure 8.11. Signal space diagram for the CCITT V.29 modem when operating at 9600 bps.
3. Quadrature amplitude modulation QAM. for each channel with synchronous line transmission at 2400 bauds.
4. Any combination of the following data signaling rates may be implemented: 9600-, 4800-, and 2400-bps synchronous.
5. At 9600-bps operation, two alternative modulation schemes are provided. One uses 16 carrier states, and the other uses trellis coding with
32 carrier states. However, modems providing the 9600-bps data signaling rate shall be capable of interworking using the 16-state alternative.
6. There is an exchange of rate sequences during start-up to establish the
data rate, coding, and any other special facilities requiring coordination.
7. There is an optional provision for an asynchronous startstop. mode
of operation in accordance with CCITT Rec. V.14.
8. The carrier tone. frequency is 1800 Hz " 1 Hz. The receiver can
operate with frequency offsets up to "7 Hz.
CCITT Rec. V.32 offers two alternatives for signal element coding of the
9600-bps data rate: i. nonredundant and ii. trellis coding.
With nonredundant coding, the scrambled data bit stream to be transmitted is divided into groups of four consecutive bits. The first 2 bits in time,
Q1 n and Q2 n , where the subscript n designates the sequence number of the
group, are differentially encoded into Y 1 n and Y 2 n , in accordance with
Table 8.4. Bits Y 1 n , Y 2 n , Q3 n , and Q4n are then mapped into coordinates of
the signal state to be transmitted according to the signal space diagram
shown in Figure 8.12 and as listed in Table 8.5.
When using the second alternative with trellis coding, the scrambled data
stream to be transmitted is divided into two groups of four consecutive data
DATA MODEMS
171
TABLE 8.4 Differential Quadrant Coding for 4800-bps Operation and for Nonredundant
Coding at 9600 bps
Inputs
Previous Outputs
Q1n
Q2 n
Y1n y 1
Y 2ny1
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
Phase Quadrant
Change
(deg)
q90
q180
q270
Outputs
Y1n
Y 2n
Signal State
for 4800 bps
0
1
0
1
0
0
1
1
1
1
0
0
1
0
1
0
1
1
0
0
0
1
0
1
1
0
1
0
0
0
1
1
B
C
A
D
A
B
D
C
C
D
B
A
D
A
C
B
Figure 8.12. Sixteen-point signal constellation with nonredundant coding for 9600-bps operation with subset A, B, C, and D states used for 4800-bps operation and for training. (From
Figure 1r V.32, page 236, CCITT Rec. V.32, Ref. 8.)
172
TABLE 8.5 Two Alternative Signal State Mappings for 9600-bps Operation
Coded Inputs a
Trellis Coding
( Y 0)
Y1
Y2
Q3
Q4
Re
Im
Re
Im
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
10
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
y1
y3
y1
y3
1
1
3
3
y1
y1
y3
y3
1
3
1
3
y1
y1
y3
y3
y1
y3
y1
y3
1
3
1
3
1
1
3
3
y4
0
0
4
4
0
0
y4
y2
y2
2
2
2
2
y2
y2
y3
1
y3
1
3
y1
1
y3
1
1
y1
3
y1
y1
3
y1
3
y1
y3
1
y3
1
y2
y2
2
2
2
2
y2
y2
4
0
0
y4
y4
0
0
4
Nonredundant
Coding
3
y1
1
y3
1
1
y1
3
y1
y1
bits. As shown in Figure 8.13, the first 2 bits in time Q1 n and Q2 n in each
group, where the subscript n designates the sequence number of the group,
are first differentially encoded into Y 1 n and Y 2 n in accordance with Table
8.6. The two differentially encoded bits Y 1 n and Y 2 n are used to input a
systematic convolutional coder which generates redundant bit Y 0 n . The
redundant bit and the four information carrying bits Y 1 n , Y 2 n , Q3 n , and Q4n
are then mapped into coordinates of the signal element to be transmitted
according to the signal space diagram shown in Figure 8.13 and as listed in
Table 8.5.
173
DATA MODEMS
Figure 8.13. A 32-point signal constellation with trellis coding for 9600-bps operation and
states A, B, C, and D used for 4800-bps operation and for training. The binary numbers
denote Y 0 n , Y1n , Y 2 n , Q3 n , and Q4n . (From Figure 3r V.32, page 239, CCITT Rec. V.32, Ref.
8.)
TABLE 8.6 Differential Encoding for Use with Trellis-Coded Alternative at 9600 bps
Inputs
Previous Outputs
Outputs
Q1n
Q2 n
Y1n y 1
Y 2ny1
Y1n
Y 2n
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
0
1
1
0
0
1
1
1
1
0
0
1
1
0
0
0
1
0
1
1
0
1
0
0
1
1
0
1
0
0
1
174
DATA MODEMS
175
Figure 8.14. Signal constellation and mapping for trellis-coded modulation at 14,400 bps.
Binary numbers refer to Q6 n , Q5 n , Q4n , Q3 n , Y 2 n , Y 2 n , Y1n , and Y0 n . A, B, C, and D refer to
synchronizing signal elements. (From Figure 2r V.33, page 255, CCITT Rec. V. 33, Ref. 9.)
176
Previous Outputs
Outputs
Q1n
Q2 n
Y1n y 1
Y 2ny 2
Y1n
Y 2n
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
0
1
1
0
0
1
1
1
1
0
0
1
1
0
0
0
1
0
1
1
0
1
0
0
1
1
0
1
0
0
1
Figure 8.15. Signal space diagram and mapping for trellis-coded modulation at 12,000 bps.
Binary numbers refer to Q5 n , Q4n , Q3 n , Y 2 n , Y1n , and Y 0 n . A, B, C, and D refer to
synchronizing signal elements. (From Figure 3r V.33, page 256, CCITT Rec. V.33, Ref. 9.)
DATA MODEMS
177
178
larger free distance. Generally, limited distance growth and increasing numbers of nearest neighbors and neighbors with next-largest distances are the
two mechanisms that prevent realizing coding gains from exceeding the
ultimate limit set by channel capacity. This limit can be characterized by the
signal-to-noise ratio at which the channel capacity of a modulation system
with 2 m q 1.-ary signal set equals m bpsrHz Ref. 10; also see Ref. 11..
Practical TCM systems can achieve coding gains of 36 dB at spectral
efficiencies equal to or larger than 2 bitsrHz.
31,200 bps
26,400 bps
21,600 bps
16,800 bps
12,000 bps
7200 bps
2400 bps
DATA MODEMS
179
180
2400
2743
2800
3000
3200
3429
1
8
7
5
4
10
1
7
6
4
3
7
reference document Ref. 12.. The auxiliary channel is used only when the
call and answer modems have both declared this capability. The primary
channel data rates may be asymmetric.
Symbol Rates. The symbol rate is S s arc . = 2400 " 0.01% 2D symbols
per second, where a and c are integers from the set given in Table 8.8 in
which symbol rates are shown rounded to the nearest integer.. The symbol
rates 2400, 3000, and 3200 are mandatory; 2743, 2800, and 3429 are optional.
The symbol rate is selected during phase 2 of modem start-up according to
procedures described in paragraph 11.2 or 12.2 of the reference publication.
Asymmetric symbol rates are optionally supported and are used only when
the call and answer modems have both declared this capability.
Carrier Frequencies. The carrier frequency is dre. = S Hz, where d and e
are integers. One of two carrier frequencies can be selected at each symbol
rate, as given in Table 8.9, which provides the values of d and e and the
corresponding frequencies rounded to the nearest integer. The carrier frequency is determined during phase 2 of modem start-up according to the
procedures given in paragraph 11.2 or 12.2 of the reference publication.
Asymmetric carrier frequencies are supported.
High Carrier
Symbol Rate, S
Frequency
Frequency
2400
2743
2800
3000
3200
3429
1600
1646
1680
1800
1829
1959
2
3
3
3
4
4
3
5
5
5
7
7
1800
1829
1867
2000
1920
1959
3
2
2
2
3
4
4
3
3
3
5
7
DATA MODEMS
181
Figure 8.16. Transmit spectra templates for indices 0 to 5. Note: Tolerance for transmit
spectrum is "1 dB. (From Figure 1r V.34, ITU-T Rec. V.34, Ref. 12.)
Preemphasis
TRANSMIT SPECTRUM SPECIFICATIONS. The transmit spectrum specifications
use a normalized frequency, which is defined as the ratio frS, where f is the
frequency in hertz and S is the symbol rate. The magnitude of the transmitted spectrum conforms to the templates shown in Figures 8.16 and 8.17 for
normalized frequencies in the range from dre s 0.45. to dre q 0.45.. The
transmitted spectrum is measured using a 600- pure resistive load.
Figure 8.16 requires parameter , which is given in Table 8.10; and Figure
8.17 requires parameters and , which are given in Table 8.11.
SELECTION METHOD.
182
Figure 8.17. Transmit spectra templates for indices 6 to 10. Note: Over the range specified,
the tolerance for the transmit spectrum magnitude is "1 dB. (From Figure 2r V.34, ITU-T
Rec. V.34, Ref. 12.)
TABLE 8.10
0
1
2
3
4
5
0 dB
2 dB
4 dB
6 dB
8 dB
10 dB
TABLE 8.11
Index
6
7
8
9
10
0.5 dB
1.0 dB
1.5 dB
2.0 dB
2.5 dB
1.0 dB
2.0 dB
3.0 dB
4.0 dB
5.0 dB
DATA MODEMS
183
1 q Xy18 q Xy23
1 q Xy5 q Xy23
8.5.6.4 Framing. Figure 8.18 gives an overview of the frame structure. The
duration of a superframe is 280 ms and consists of J data frames, where
J s 7 for symbol rates 2400, 2800, 3000, and 3200, and J s 8 for symbol rates
2743 and 3429. A data frame consists of P mapping frames, where P is given
in Table 8.12. A mapping frame consists of four four-dimensional 4D.
symbol intervals. A 4D symbol interval consists of two 2D symbol intervals. A
bit inversion method is used for superframe synchronization.
Mapping frames are indicated by the time index i, where i s 0 for the
first mapping frame of signal B1 as defined below. and is incremented by 1
for each mapping frame thereafter.
Sequence B1 consists of one data frame of scrambled 1s at the end of
start-up using selected data mode modulation parameters. Bit inversions for
superframe synchronization are inserted as if the data frame were the last
Figure 8.18. Overview of framing and indexing. (From Figure 3rV.34, ITU-T Rec. V.34,
Ref. 12.)
184
TABLE 8.12
Framing Parameters
Symbol Rate, S
2400
2743
2800
3000
3200
3429
7
8
7
7
7
8
12
12
14
15
16
15
for 1 F r F P
185
DATA MODEMS
TABLE 8.13
b and Switching Pattern (SWP) as a Function of Data Rate and Symbol Rate
2400 symr s 2743 symr s 2800 symr s 3000 symr s 3200 symr s
P s 12
P s 12
P s 14
P s 15
3429 symr
P s 16
P s 15
Data
Rate, R
SWP
SWP
SWP
SWP
SWP
SWP
2400
2600
4800
5000
7200
7400
9600
9800
12,000
12,200
14,400
14,600
16,800
17,000
19,200
19,400
21,600
21,800
24,000
24,200
26,400
26,600
28,800
29,900
8
9
16
17
24
25
32
33
40
41
48
49
56
57
64
65
72
73
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
FFF
6DB
14
15
21
22
28
29
35
36
42
43
49
50
56
57
63
64
70
71
FFF
56B
FFF
56B
FFF
56B
FFF
56B
FFF
56B
FFF
56B
FFF
56B
FFF
56B
FFF
56B
14
15
21
22
28
28
35
35
42
42
48
49
55
56
62
63
69
70
1BB7
0489
15AB
0081
0A95
3FFF
0489
1FBF
0081
1BB7
3FFF
15AB
1FBF
0A95
1BB7
0489
15AB
0081
13
14
20
20
26
27
32
33
39
39
45
46
52
52
58
59
64
65
71
71
3DEF
1249
0421
3777
2D6B
0081
7FFF
2AAB
14A5
3FFF
3DEF
1249
0421
3777
2D6B
0081
7FFF
2AAB
14A5
3FFF
12
13
18
19
24
25
30
31
36
37
42
43
48
49
54
55
60
61
66
67
72
73
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
FFFF
5555
12
12
17
18
23
23
28
29
34
35
40
40
45
46
51
51
56
57
62
63
68
68
0421
36DB
3DEF
0889
14A5
3F7F
7FFF
1555
2D6B
0001
0421
36DB
3DEF
0889
14A5
3F7F
7FFF
1555
2D6B
0001
0421
36DB
Table 8.13 gives the values for b and SWP for all combinations of data
rate and symbol rate. In the table, SWP is represented by a hexadecimal
number. For example, at 19,200 bps and symbol rate 3000, SWP is 0421 hex.
or 0000 0100 0010 0001 binary..
Multiplexing of Primary and Auxiliary Channel Bits. The auxiliary channel
bits are time division multiplexed with the scrambled primary channel bits.
The number of auxiliary channel bits transmitted per data frame is W s 8
at symbol rates 2400, 2800, 3000, and 3200, and W s 7 at symbol rates 2743
and 3429. In each mapping frame, the bit I1 i, 0 is used to send either an
auxiliary channel bit or a primary channel bit according to the auxiliary
channel multiplexing pattern, AMP, of period P see Figure 8.19.. AMP can
be represented as a P-bit binary number where a 1 indicates that an auxiliary
channel bit is sent and a 0 indicates that a primary channel bit is sent. AMP
depends only on the symbol rate and is given in Table 8.14 as a hexadecimal
number. The leftmost bit corresponds to the first mapping frame in a data
frame.
186
Figure 8.19. Encoder block diagram. (From Figure 4rV.34, ITU-T Rec. V.34, Ref. 12.)
TABLE 8.14
Symbol Rate, S
AMP
2400
2743
2800
3000
3200
3429
8
7
8
8
8
7
12
12
14
15
16
15
6DB
56B
15AB
2AAB
5555
1555
DATA MODEMS
187
Figure 8.20. One-quarter of the points in the superconstellation. (From Figure 5r V.34, page
14, ITU-T Rec. V.34, Ref. 12.)
the superconstellation. These points are labeled with decimal integers between 0 and 239. The point with the smallest magnitude is labeled 0, the
point with the next larger magnitude is labeled 1, and so on. When two or
more points have the same magnitude, the point with the greatest imaginary
component is taken first. The full superconstellation is the union of the four
quarter-constellations obtained by rotating the constellation in Figure 8.20 by
0, 90, 180, and 270.
A signal constellation with L points consists of Lr4 points from the
quarter-constellation in Figure 8.20 with labels 0 through Lr4 y 1, along
with the 3 Lr4 points that are obtained by 90, 180, and 270 rotations of
these signal points.
8.5.7 The V.90 ModemMaximum Data Rate: 56 kbps
8.5.7.1. Principal Characteristics. The V.90 modem Ref. 12. is designed
for full duplex operation over the PSTN. It normally operates on a two-wire
basis where interference between the send and receive channels is minimized
188
using local echo cancellation techniques. The modulation downstream toward the end-user . is PCM at 8000 symbols per second. It provides synchronous data signaling rates in the downstream direction from 28,000 to
56,000 bps in increments of 8000r6 bps.
In the upstream direction toward the local serving exchange or other,
similar node. V.34 Section 8.5.6. modulation is employed. The bit stream is
synchronous with upstream data rate from 4800 bps to 28,800 bps in increments of 2400 bps, with optional support of 31,200 and 33,600 bps.
Adaptive techniques are used which enable the modem to achieve close to
the maximum data signaling rates the channel can support on each connection. The modem will also negotiate V.34 operation if a connection will not
support V.90 operation. When the modem is started up, it exchanges rate
sequences to establish the operational data signaling rate.
8.5.7.2 Definitions
Analog Modem. The analog modem is the modem of the pair that, when in
data mode, generates ITU-T Rec. V.34 signals and receives ITU-T Rec.
G.711 PCM signals that have been passed through a G.711 decoder. The
modem is typically connected to the PSTN.
Note: ITU-T G.711, Pulse Code Modulation of Voice Frequencies,
deals with the coding of PCM signals derived from audio signals, as well as
with the decoding of those signals back to their audio equivalents. See
Chapter 7 for details.
Digital Modem. The digital modem is the modem of the pair, that, when in
the data mode, generates ITU-T Rec. G.711 signals and receives ITU-T
Rec. V.34 signals that have been passed through a Rec. G711 encoder.
The modem is connected to a digitally switched network through a digital
interface we.g., a basic rate interface BRI. or a primary rate interface
PRI.x. For a discussion of BRI and PRI, see Chapter 13..
Downstream. Transmission in the direction from the digital modem toward
the analog modem.
Uchord. Ucodes are grouped into eight Uchords. Uchord 1 contains Ucodes 0
to 15; Uchord 2 contains Ucodes 16 to 31; . . . ; and Uchord 8 contains
Ucodes 112 to 127.
Ucode. The universal code used to describe both a -law and A-law PCM
codeword. All universal codes are given in decimal notation in Table 8.15.
The -law and A-law codewords are the octets to be passed to the digital
interface by the digital modem and are given in hexadecimal notation. All
modifications defined in ITU-T Rec. G.711 have already been made. The
MSB in the -law PCM and A-law PCM columns in Table 8.15 correspond to the polarity bit of the Rec. G.711 character signals. A linear
representation of each PCM code word is also given.
DATA MODEMS
TABLE 8.15
189
Ucode
-Law
PCM
-Law
Linear
Ucode
-Law
PCM
-Law
Linear
A-Law
PCM
A-Law
Linear
FF
D5
33
DE
428
F4
560
FE
D4
24
34
DD
460
F7
592
FD
16
D7
40
35
DC
492
F6
624
FC
24
D6
56
36
DB
524
F1
656
FB
32
D1
72
37
DA
556
F0
688
FA
40
D0
88
38
D9
588
F3
720
F9
48
D3
104
39
D8
620
F2
752
F8
56
D2
120
40
D7
652
FD
784
F7
64
DD
136
41
D6
684
FC
816
F6
72
DC
152
42
D5
716
FF
848
10
F5
80
DF
168
43
D4
748
FE
880
11
F4
88
DE
184
44
D3
780
F9
912
12
F3
96
D9
200
45
D2
812
F8
944
13
F2
104
D8
216
46
D1
844
FB
976
14
F1
112
DB
232
47
D0
876
FA
1008
15
F0
120
DA
248
48
CF
924
E5
1056
16
EF
132
C5
264
49
CE
988
E4
1120
17
EE
148
C4
280
50
CD
1052
E7
1184
18
ED
164
C7
296
51
CC
1116
E6
1248
19
EC
180
C6
312
52
CB
1180
E1
1312
20
EB
196
C1
328
53
CA
1244
E0
1376
21
EA
212
C0
344
54
C9
1308
E3
1440
22
E9
228
C3
360
55
C8
1372
E2
1504
23
E8
244
C2
376
56
C7
1436
ED
1568
24
E7
260
CD
392
57
C6
1500
EC
1632
25
E6
276
CC
408
58
C5
1564
EF
1696
26
E5
292
CF
424
59
C4
1628
EE
1760
27
E4
308
CE
440
60
C3
1692
E9
1824
28
E3
324
C9
456
61
C2
1756
E8
1888
29
E2
340
C8
472
62
C1
1820
EB
1952
30
E1
356
CB
488
63
C0
1884
EA
2016
31
E0
372
CA
504
64
BF
1980
95
2112
32
DF
396
F5
528
65
BE
2108
94
2240
A-Law
PCM
A-Law
Linear
190
TABLE 8.15
( Continued )
Ucode
-Law
PCM
-Law
Linear
A-Law
PCM
A-Law
Linear
Ucode
-Law
PCM
-Law
Linear
A-Law
PCM
A-Law
Linear
66
67
BD
2236
97
2368
97
9E
8828
B4
8960
BC
2364
96
2496
98
9D
9340
B7
9472
68
BB
2492
91
2624
99
9C
9852
B6
9984
69
BA
2620
90
2752
100
9B
10364
B1
10496
70
B9
2748
93
2880
101
9A
10876
B0
11008
71
B8
2876
92
3008
102
99
11388
B3
11520
72
B7
3004
9D
3136
103
98
11900
B2
12032
73
B6
3132
9C
3264
104
97
12412
BD
12544
74
B5
3260
9F
3392
105
96
12924
BC
13056
75
B4
3388
9E
3520
106
95
13436
BF
13568
76
B3
3516
99
3648
107
94
13948
BE
14080
77
B2
3644
98
3776
108
93
14460
B9
14592
78
B1
3772
9B
3904
109
92
14972
B8
15104
79
B0
3900
9A
4032
110
91
15484
BB
15616
80
AF
4092
85
4224
111
90
15996
BA
16128
81
AE
4348
84
4480
112
8F
16764
A5
16896
82
AD
4604
87
4736
113
8E
17788
A4
17920
83
AC
4860
86
4992
114
8D
18812
A7
18944
84
AB
5116
81
5248
115
8C
19836
A6
19968
85
AA
5372
80
5504
116
8B
20860
A1
20992
86
A9
5628
83
5760
117
8A
21884
A0
22016
87
A8
5884
82
6016
118
89
22908
A3
23040
88
A7
6140
8D
6272
119
88
23932
A2
24064
89
A6
6396
8C
6528
120
87
24956
AD
25088
90
A5
6652
8F
6784
121
86
25980
AC
26112
91
A4
6908
8E
7040
122
85
27004
AF
27136
92
A3
7164
89
7296
123
84
28028
AE
28160
93
A2
7420
88
7552
124
83
29052
A9
29184
94
A1
7676
8B
7808
125
82
30076
A8
30208
95
A0
7932
8A
8064
126
81
31100
AB
31232
96
9F
8316
B5
8448
127
80
32124
AA
32256
Source: Table 1r V.90, ITU-T Rec. V. 90, ITU Geneva, September 1998, Ref. 13.
DATA MODEMS
191
8.5.7.3 Overview of V.90 Operation. As we know, the analog voice channel is limited to the frequency band of 3003400 Hz. This severely limits the
maximum data rate to be carried on that channel. In more advanced
countries the analog voice channel terminates the PCM channel banks at the
local serving switch central office.. Advantage is taken of this fact by the
V.90 modem, which emulates the PCM analog-to-digital conversion and
coding in the downstream direction. Depending on the quality of the subscriber loop, nearly 56 kbps can be achieved.
The V.90 modem operates asymmetrically providing the higher bit rate
downstream. In the upstream direction, the V.90 modem operates just like
the V.34 modem see Section 8.5.6.. In this case, the theoretical maximum bit
rate achievable is 33,600 bps.
The V.90 modem operates in a digital mode in the upstream direction. It
is very sensitive to quantization noise of the connecting circuits to the distant
end-user. If it detects additional digital-to-analogranalog-to-digital signal
processing i.e., a hybrid network. in those intervening circuits, it will back off
and operate in the V.34 mode in the upstream direction.
As we will remember from Chapter 7, PCM transmits samples of voltage
levels with a discrete coding process. There are a theoretical 256 coding steps
to express a voltage 255 steps in the real world.. Companding is utilized,
either A-law or -law, where, as a voltage level measurement approaches
zero, more and more companding steps are available. The PCM gradations
i.e., distance between discrete steps. are so small that they can be obliterated by noise. Thus, with the V.90 modem, only the higher levels steps
127255., are utilized. There are 128 such levels. The V.90 ships data in
chunks of 8 bits which some may wish to call a byte .. The transport rate is
8000 bytes or octets per second thats the Nyquist sampling rate.. Of course
this is the same rate used by the PSTN. The 8000 bytes per second of the
V.90 must be synchronized with the 8000 time slots a second of the digital
PSTN.
The V.90 constantly probes the downstream bit stream operation. When it
detects degradation, it drops back 92 levels for 52-kbps operation. Using
fewer levels provides more robust operation, but at a lower rate.
The V.90 consists of two modems: the digital modem and the analog
modem.
8.5.7.4 V.90 Encoder. Figure 8.21 is an overview of the encoder and
represents one data frame. Data frames in the digital modem have a
six-symbol structure. Each symbol position within the data frame is called a
data frame interal and is indicated by a time index, I s 0, . . . , 5, where I s 0
is the first in time. Frame synchronization between the digital modem
transmitter and analog modem receiver is established during training procedures.
192
Figure 8.21. Digital modem encoder block diagram. (From Figure 1r V.90, ITU-T Rec. V.90,
Ref. 13.)
Six PCM code sets, one for each data frame interval 05, where data
frame interval I has Mi members
K, the number of modulus encoder input data bits per data frame
Sr , the number of PCM code sign bits per data frame used as redundancy for spectral shaping and
S, the number of spectral shaper input data bits per data frame, where
S q Sr s 6. Table 8.16 shows the data signaling rates achieved by the
valid combinations of K and S during data mode. Table 17rV.90 in
reference publication . shows the valid combinations of K and S used
during phase 4 and rate renegotiation procedures
DATA MODEMS
TABLE 8.16
K, Bits Entering
Modulus Encoder
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
193
Data Signaling
Rate, kbitr s
From
To
From
To
6
5
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
5
4
3
28
28
28
28
29 1r3
30 2r3
32
33 1r3
34 2r3
36
37 1r3
38 2r3
40
41 1r3
42 2r3
44
45 1r3
46 2r3
48
49 1r3
50 2r3
52
53 1r3
54 2r3
56
28
29 1r3
30 2r3
32
33 1r3
34 2r3
36
37 1r3
38 2r3
40
41 1r3
42 2r3
44
45 1r3
46 2r3
48
49 1r3
50 2r3
52
53 1r3
54 2r3
56
56
56
56
Source: Table 2r V.90, ITU-T Rec. V.90, ITU-Geneva, September 1998, Ref. 13.
194
interval. Continue for the remaining five data frame intervals. This
gives K 0 to K 5 as
K i s R i modulo Mi ,
for i s 1, . . . , 5
DATA MODEMS
TABLE 8.17
195
Data Frame
Interval
Sr s 1, S s 5
p j (0) s 0
p j (0) s 0
p j (1) s s 0
p j (1) s s 0
p j (2) s s1
p j (2) s s1
p j (3) s s 2
p j q 1(0) s 0
p j q 1(1) s s1
p j (4) s s 3
p j q 1(1) s s 2
p j q 2 (0) s 0
p j (5) s s 4
p j q 1(2) s s 3
p j q 2 (1) s s 2
Sr s 2, S s 4
Sr s 3, S s 3
p j (0) s 0
p j (1) s s 0
p j q 1(0) s 0
Source: Table 3r V.90, ITU-T Rec. V.90, ITU Geneva, September 1998, Ref. 13.
TABLE 8.18
Data Frame
Interval
S r s 1, S s 5
X
p j (0)
0
1
X
p j (1)
2
3
4
5
X
p j (0)
s0
s p j (1) [
X
p j (2)
S r s 2, S s 4
X
p j y 1(5)
s p j (2)
s p j (4)
s p j (5) [
X
p j (3)
X
p j (1)
S r s 3, S s 3
X
p j (0) s 0
s0
s p j (1) [
X
p j y 1(1)
X
p j (2) s p j (2)
X
p j q 1(0) s 0
X
X
p j q 1(1) s p j q 1(1) [ p j (1)
X
p j q 1(2) s p j q 1(2)
X
p j (1)
X
s p j (1) [ p j y 1(1)
X
p j q 1(0) s 0
X
X
p j q 1(1) s p j q 1(1) [ p j (1)
X
p j q 2 (0) s 0
X
p j q 2 (1)
X
s p j q 2 (1) [ p j q 1(1)
Source: Table 4r V.90, ITU-T Rec. V.90, ITU Geneva, September 1998, Ref. 13.
The spectral shaper converts each bit t j k ., to a PCM code sign bit $ k as
described in Section 8.5.6.9.
Sr s 2, S s 4. Sign bits S0 to S3 are parsed to 3-bit shaping frames per data
frame as shown in Table 8.17. The odd bit in each shaping frame is
differentially encoded to produce differentially coded outputs pXj and pXjq1 in
accordance with Table 8.18.
Finally, a second differential encoding shall be performed on each shaping
frame to produce the initial shaping sign bit assignments t j 0. to t j 2. and
t jq1 0. to t jq1 2. using the differential encoding rule:
t j k . s pXj k . [ t jy1 k .
t jq1 k . s pXjq1 k . [ t j k .
The spectral shaper converts each bit t j k . to PCM code sign bit $ k and
converts each bit t jq1 k . to PCM code sign bit $ kq3 as described in Section
8.5.6.9.
196
TABLE 8.19
Data Frame
Data Frame
Interval
Sr s 1, S s 5
Sr s 2, S s 4
Sr s 3, S s 3
t j (0)
t j (0)
t j (0)
$0
t j (1)
t j (1)
t j (1)
$1
t j (2)
t j (2)
t j q 1(0)
$2
t j (3)
t j q 1(0)
t j q 1(1)
$3
t j (4)
t j q 1(1)
t j q 2 (0)
$4
t j (5)
t j q 1(2)
t j q 2 (1)
$5
Source: Table 5r V.90, ITU-T Rec. V.90, ITU Geneva, September 1998, Ref. 13.
DATA MODEMS
197
In a given spectral shaping frame j, the spectral shaper shall modify the
initial sign sequence, t j k ., according to one of the following four sign
inversion rules:
Rule A: Do nothing.
The trellis diagram describes the sequence of sign inversion rules that are
allowable. For example, when the spectral shaper is in state Q j s 0 at the
beginning of frame j, only rules A and B are allowable in frame j. The
current state Q j together with the sign inversion rule selected for frame j
determine the next state Q jq1 according to the trellis diagram.
The look-ahead depth parameter, 1d, is an integer between 0 and 3
selected by the analog modem during training procedures. 1d of 0 and 1 are
mandatory in the digital modem. 1d of 2 and 3 are optional.
To select the sign inversion rule for the jth spectral shaping frame, the
spectral shaper shall use the PCM symbol magnitudes produced by the
mapper for spectral shaping frames j, j q 1, . . . , j q 1d. It shall compute
the spectral metric that would result if each of the allowable sequences of
sign inversion rules for frames j through j q 1d, starting from the current
state Q j in frame j, were to be used. The shaper shall select the sign
inversion rule for frame j that minimizes the spectral metric, ww n x, defined in
Section 8.5.6.9 up to and including the final symbol of spectral shaping frame
j q 1d. The selection determines the next state Q jq1 .
The shaper shall then set PCM code signs $ i for shaping frame j according
to the selected sign inversion rule for shaper frame j.
198
8.5.7.11 Spectral Shape Filter. The analog modem determines the spectral shape filter function used in the digital modem by selecting parameters
of the following transfer function:
T z. s
1 y a1 zy1 . 1 y a2 zy1 .
1 y b1 zy1 . 1 y b2 zy1 .
F z. s
1
T z.
1 y b1 zy1 . 1 y b2 zy1 .
1 y a1 zy1 . 1 y a2 zy1 .
The filter input, x w n x, shall be a signed signal proportional to the linear value
corresponding to PCM codes being transmitted. The relationship between
PCM codes and corresponding linear values is given in Table 1rV.90. ww n x
shall be computed as follows:
1. yw n x s x w n x y b1 x w n y 1x q a1 yw n y 1x
2. w n x s yw n x y b 2 yw n y 1x q a2 w n y 1x
3. ww n x s 2 w n x q ww n y 1x
8.5.7.12 Sign Assignment. Six sign bits generated by the spectral shaper
described above are attached to six unsigned mapper outputs U0 to U5 to
complete the mapping of the data frame intervals. A sign bit 0 means that the
transmitted PCM codeword represents a negative voltage and a sign bit 1
means it will represent a positive voltage.
8.5.7.13 MUX. The signed PCM codewords, PCM i , are transmitted from
the digital modem sequentially with PCM 0 being first in time.
8.5.7.14 Analog Modem. The characteristics of the analog modem described in this section apply when in the V.90 mode. After fallback to the
V.34 mode, the analog modem has the characteristics as defined in ITU-T
Rec. V.34 Section 24-7.9..
Data Signaling Rates. The modem supports data rates of 4800 to 28,800 bps
in increments of 2400 bps, with optional support for 31,200 and 33,600 bps.
DATA MODEMS
199
The 200-bps V.34 auxiliary channel is not supported. The data rate is
determined during phase 4 of the modem start-up in accordance with the
procedures described in paragraph 9.4 of the reference document.
Symbol Rates. The analog modem supports the symbol rate 3200. It may
also support 3000 and the optional symbol rate 3429 as defined in ITU-T
Rec. V.34 Section 8.5.5.. The other V.34 symbol rates2400, 2743, and
2800are not supported. The symbol rate is selected by the analog modem
during phase 2 of modem start-up in accordance with paragraph 9.2 of the
reference publication.
Carrier Frequencies. The analog modem supports the carrier frequencies
specified in ITU-T Rec. V.34, paragraph 5.3 Section 8.5.5. for the appropriate symbol rate. The carrier frequency is determined during phase 2 of
modem start-up in accordance with the procedures specified in paragraph 9.2
of the reference document.
Preemphasis. The analog modem supports the preemphasis filter characteristics specified in ITU-T Rec. V.34, paragraph 5.4. The filter selection is
provided by the digital modem during phase 2 of modem start-up in accordance with the procedures specified in paragraph 9.2 of the reference
document.
Scrambler. The analog modem includes a self-synchronizing scrambler as
specified in ITU-T Rec. V.34, Section 7, using the generating polynomial,
GPA, given in Equation 7.2rV.34 Section 8.5.5..
Framing. The analog modem uses the framing method specified for the V.34
primary channel described in Section 8 of ITU-T Rec. V.34.
Encoder. The analog modem uses the encoder specified for the V.34 primary channel in Section 9, ITU-T Rec. V.34.
Interchange Circuits. The requirements of this section apply to both modems.
List of Interchange Circuits (V.34rV.90). Reference in this section to ITU-T
Rec. V.24 interchange circuit numbers are intended to refer to the functional
equivalent of such circuits and are not intended to imply the physical
implementation of such circuits. For example, references to circuit 103
should not be understood to refer to the functional equivalent of circuit 103
see Table 8.20..
200
TABLE 8.20
Interchange Circuits
Interchange Circuit
No.
Description
Notes
102
103
104
105
106
107
108r1 or
108r 2
109
125
133
Calling indicator
Ready for receiving
Note 1: Thresholds and response times are not applicable because a line signal
detector cannot be expected to distinguish received signals from talker echoes.
Note 2: Operation of circuit 133 shall be in accordance with 4.2.1.1 of Recom mendation V.43.
Source: Table 6rV.90, ITU-T Rec. V.90, ITU Geneva, September 1998, Ref. 13.
REFERENCES
1. Roger L. Freeman, Telecommunication Transmission Handbook, 4th ed., John
Wiley & Sons, New York, 1998.
2. Attenuation Distortion, CCITT Rec. G.132, Fascicle III.1, IXth Plenary Assembly,
Melbourne, 1988.
3. Group Delay Distortion, CCITT Rec. G.133, Fascicle III.1, IXth Plenary Assembly,
Melbourne, 1988.
4. Characteristics of Special Quality International Leased Circuits with Special Bandwidth Conditioning, CCITT Rec. M.1020, ITU Geneva, March 1993.
5. Data Communications Using Voiceband Priate Line Channels, Bell System Technical Reference, PUB 41004, AT & T, New York, 1973.
6. Transmission Systems for Communications, 5th ed., Bell Telephone Laboratories,
Holmdel, NJ, 1982.
7. 9600 Bits per Second Modem Standardized for Use on Point-to-Point 4-Wire Leased
Telephone Circuits, CCITT Rec. V.29, Fascicle, VIII.1, IXth Plenary Assembly,
Melbourne, 1988.
REFERENCES
201
9
DATA COMMUNICATIONS IN THE
OFFICE ENVIRONMENT, PART 1
9.1 INTRODUCTION
In the present office environment the personal computer PC. is nearly
ubiquitous. Some may be stand-alone devices, but in the majority of cases
they are interconnected by one means or another. They may also connect, via
a server, to a mainframe computer, high-speed printers, and mass storage
devices.
A workstation consists of a PC, and an interconnection capability is
implied. It is defined by the IEEE Ref. 1. as a device used to perform tasks
such as data processing and word processing. Often a workstation is just a PC
with keyboard and display. An office may be viewed as a conglomeration of
management information systems MIS.. MIS represents the entire electronic
data processing capabilities of an organization.
The interconnection of MIS assets on a local level is the subject of this
chapter. This interconnection is almost universally carried out by means of a
local area network LAN.. The IEEE Ref. 1. defines a LAN as a nonpublic
data network in which serial transmission is used without store and forward
techniques for direct data communication among data stations located on the
users premises.
A LAN is made cost-effective because a single transmission medium
interconnects all devices on the network. There are several simple assumptions on why we can do this with just one transmission medium such as a wire
pair. First, transactions are usually of very short duration. Consider a LAN
transmitting at a 10-Mbps data rate. It transmits 10,000 bits in 1 ms, or one
page of text of this book. Now if each user only transmits for a period of
1 ms, and we allow 1 ms between transactions for circuit setup, then in
1 second, 500 users could be accommodated. It is also apparent that a user
would not have to wait very long to access the medium.
203
204
Another reason that this can be accomplished with one medium such as a
wire pair is that distances are very short, probably never more than 200 m
500 ft.. Furthermore, a wire pair over comparatively short distances can
handle considerably more than a 10-Mbps data rate. 100 Mbps and even
1 Gbps are not uncommon rates with modern systems such as Ethernet
CSMArCD..
In the following sections we discuss several of the more popular nonproprietary. LANs which will likely be encountered in an office, factory, or
campus environment.
205
802.14*
Cable TV Working Group
802.15
Wireless Personal Area Working Group
802.16
Broadband Wireless Access LMDS. Working Group
Asterisk *. indicates published standards .
In some applications, the baseband modulates a radio frequency and then the resulting signal
is applied to the cable medium.
206
207
The LLC is a service specification to the network layer OSI layer 3., to
the MAC sublayer, and to the LLC sublayer management function. The
service specification to the network layer provides a description of the
various services that the LLC sublayer, plus underlying layers and sublayers,
offers to the network layer. The service specification to the MAC sublayer
provides a description of the services that the LLC sublayer requires of the
MAC sublayer. These services are defined so as to be independent of both
a. the form of the medium access methodology and b. the nature of the
medium itself. The service specification to the LLC sublayer management
function provides a description of the management services that are provided
to the LLC sublayer. All of these service specifications are given in the form
of primitives that represent in an abstract way the logical exchange of
information and control between the LLC sublayer and the identified service
function i.e., network layer, MAC sublayer, or LLC sublayer management
function..
The LLC provides two types of data-link operation. The first type of
operation is a data-link connectionless mode of service across a data link with
minimum protocol complexity. This type of operation is attractive when
higher layers provide any essential recovery and sequencing services so that
these do not need replicating in the data-link layer. In addition, this type of
operation may prove useful in applications where it is not essential to
guarantee the delivery of every data-link layer data unit. The connectionless
mode is described in terms of logical data links.
The second type of operation provides a data-link connection-mode service across a data link which is comparable to such protocol procedures as
high-level data-link control HDLC; see Chapter 3.. This service includes
support of sequenced delivery of data units and a comprehensive set of
data-link layer error recovery techniques. This second type of service is
described in terms of data-link connections.
The LLC standard Ref. 2. identifies two distinct classes of LLC
operation. Class I provides data-link connectionless-mode service only. Class
II provides data-link connection-mode service plus data-link connectionlessmode service. Either class of operation may be supported.
208
The basic LLC protocols are peer protocols for use in multistation,
multiaccess environments. Because of the multistation, multiaccess environment, it is possible for a station to be involved in a multiplicity of peer
protocol data exchanges with a multiplicity of different stations over a
multiplicity of different logical data links andror data-link connections that
are carried by a single physical layer PHY. over a single physical medium.
Each unique tofrom pairing at the data-link layer defines a separate logical
data link or data-link connection with separate logical parameters and
variables.
9.4.1 LLC Sublayer Services and Primitives
The services of a layer or sublayer. are the capabilities which it offers to a
user in the next higher layer or sublayer.. In order to provide its service, a
layer or sublayer. builds its functions on the services which it requires from
the next lower layer or sublayer.. Figure 9.3 illustrates the four generic
primitives in relation to service providers and service users.
Services are specified by describing the information flow between the
N-user and the N-layer or sublayer.. The information flow is modeled by
discrete, instantaneous events, which characterize the provision of service.
Each event consists of passing a service primitive from one layer or sublayer.
to the other through an N-layer or sublayer. SAP associated with the
N-user. Service primitives convey the information required in providing a
particular service. These service primitives are an abstraction in that they
209
specify only the service provided rather than the means by which the service
is provided. This definition of service is independent of any particular
interface implementation.
Services are specified by describing the service primitives and parameters
that characterize each service. A service may have one or more related
primitives that constitute the activity that is related to the particular service.
Each service primitive may have zero or more parameters that convey the
information required to convey the service.
There are four generic primitives described as follows:
Request. The request primitive is passed from the N-user to the N-layer
or sublayer. to request that a service be initiated.
Indication. The indication primitive is passed from the N-layer or sublayer. to the N-user to indicate an internal N-layer or sublayer. event
which is significant to the N-user. This event may be logically related to
a remote service request, or may be caused by an event internal to the
N-layer or sublayer..
Response. The response primitive is passed from the N-user to the N-layer
or sublayer. to complete a procedure previously invoked by an indication primitive.
Confirm. The confirm primitive is passed from the N-layer or sublayer. to
the N-user to convey the results of one or more associated previous
service requests..
Note the similarity with HDLC described in Chapter 3..
Possible relationships among primitive types are shown by means of
time-sequence diagrams in Figure 9.4. The figure also shows the logical
relationship of primitive types. Primitive types that occur earlier in time
connected by dotted lines in the figure. are the logical antecedents of
subsequent primitive types.
9.4.1.1 Unacknowledged Connectionless-Mode Service. This is defined as the data transfer service that provides the means by which network
entities LAN accesses . can exchange link service data units LSDUs. without
the establishment of a data-link connection. The data transfer can be
point-to-point, multicast, or broadcast.
9.4.1.2 Connection-Mode Services. This set of services provides the
means for establishing, using, resetting, and terminating data-link layers
connections. These connections are point-to-point connections between linklayer service access points LSAPs..
The connection establishment service provides a means by which a network entity can request, or be notified of, the establishment of data-link layer
connections.
210
211
Figure 9.5. LLC PDU format. DSAP Address s destination service access point address field;
SSAP Address s source service access point address field; Control s control field (16 bits for
formats that include sequence numbering, and 8 bits for formats that do not; Information s
information field; * s multiplication; M s an integer value equal to or greater than 0. (Upper
bound of M is a function of the medium access control methodology used.)
Type 2 Operation. With Type 2 operation, a data-link connection is established between two LLCs prior to any exchange of information-bearing
PDUs. The normal cycle of communication between two Type 2 LLCs
on a data-link connection consists of the transfer of PDUs containing
information from the source LLC to the destination LLC, acknowledged by PDUs in the opposite direction.
9.4.2 LLC PDU Structure
9.4.2.1 Overview. Figure 9.5 shows the LLC PDU format. As the figure
indicates, each LLC PDU contains two address fields: the destination service
access point DSAP. address field and the source service access point SSAP.
address field. Each of these fields contains only a single address. The DSAP
address field identifies one or more SAPs for which the LLC information
field is intended. The SSAP address field identifies the specific SAP from
which the LLC information field was initiated. Figures 9.6 and 9.7 show the
address field formats.
An individual address is usable as both an SSAP and a DSAP address; a
null address is usable as both an SSAP and DSAP address; and a group
address is usable only as a DSAP address.
All 1s in the DSAP address field i.e., the address type designation bit set
to 1 and the seven address bits set to 1. is predefined to be the global
DSAP address. The DSAP address designates a group consisting of all
DSAPs actively being serviced by the underlying MAC SAP address es..
All 0s in the DSAP or SSAP address field i.e., the address type designation bit set to 0 and seven address bits set to 0. is predefined to be the null
address. The null SAP address designates the LLC that is associated with the
underlying MAC SAP address and is not used to identify any SAP to the
network layer or any SAP to an associated layer management function.
Addresses 01000000 and 11000000 are designated as the individual and group
addresses, respectively, for an LLC sublayer management function at the
station. Other addresses with the next to low-order bit set to 1 are reserved
for International Standards Organization ISO. definition.
212
The control field consists of one or two octets that are used to designate
command and response functions and that contain sequence numbers when
required. The content of this field is described below.
The information field consists of any integral number including zero.
of octets.
The bit order is as follows. Addresses, commands and responses, and
sequence numbers are delivered torreceived from the MAC sublayer least
significant bit first i.e., the first bit of a sequence number that is
deliveredrreceived has the weight 2**0.. The information field is delivered
to the MAC sublayer in the same bit order as received from the network
layer. The information field is delivered to the network layer in the same bit
order as received from the MAC sublayer.
213
214
specified e.g., UI, TEST, FRMR, and XID., it is the only LLC PDU that
may contain an information field. The functions N S ., N R ., and pollrfinal
PrF. are independent wi.e., each I-format PDU has an N S . sequence
number, an N R . sequence number that acknowledges or does not acknowledge additional I-format PDUs at the receiving LLC, and a PrF bit that is
set to 1 or 0x. One notes the similarity to HDLC given in Chapter 3.
Supervisory Format S. The S-format PDU is used to perform data-link
supervisory control functions in Type 2 operation, such as acknowledging
I-format PDUs, requesting retransmission of I-format PDUs, and requesting
a temporary suspension of transmission of I-format PDUs. The functions of
N R . and PrF are independent i.e., each S-format PDU has an N R .
sequence number that does or does not acknowledge additional I-format
PDUs at the receiving LLC, and it also has a PrF bit that is set
to 1 or 0..
Unnumbered Format U. The U-format PDUs are used in either Type 1 or
Type 2 operation, depending upon the specific function utilized, to provide
additional data-link control functions and to provide unsequenced information transfer. The U-format PDUs contain no sequence numbers but include
a PrF bit that is set to 1 or 0.
9.4.2.3 Control Field Parameters
Type 1 Operation Parameters. The only parameter that exists in Type 1
operation is the PrF bit. The PrF bit set to 1 is only used in Type 1
operation with the XID and TEST commandrresponse PDU functions. The
poll P. bit set to 1 is used to solicit poll. a correspondent response PDU
with the F bit set to 1 from the addressed LLC. The final F. bit set to 1
is used to indicate that the response PDU which is sent by the LLC is the
result of a soliciting poll. command PDU P bit set to 1..
Type 2 Operation Parameters
MODULUS.
215
LLC PDU STATE VARIABLES AND SEQUENCE NUMBERS. A station LLC maintains
a send state variable V S . for the I PDUs it sends and a receive state variable
V R . for the I PDUs it receives on each data-link connection. The operation
of V S . is independent of the operation of V R ..
The send state variable denotes the sequence number of the next insequence I PDU to be sent on a specific data-link connection. The send state
variable takes on a value between 0 and MODULUS minus ONE where
MODULUS equals 128 and the numbers cycle through the entire range..
The value of the send state variable is incremented by one with each
successive I PDU transmission on the associated data-link connection, but
will not exceed N R . of the last received PDU by more than MODULUS
minus ONE. Again the similarity to HDLC should be noted.
Only I PDUs contain N S ., the send sequence number of the sent PDU.
Prior to sending an I PDU, the value of N S . is set equal to the value of the
send state variable for that data-link connection.
The receive state variable denotes the sequence number of the next
in-sequence I PDU to be received on a specific data-link connection. The
receive state variable takes on a value between 0 and MODULUS minus
ONE where MODULUS equals 128 and the numbers cycle through the
entire range.. The value of the receive state variable associated with a
specific data-link connection is incremented by one whenever an error-free,
in-sequence I PDU is received whose send sequence number N S . equals the
value of the receive state variable for the data-link connection.
All I-format PDUs and S-format PDUs contain N R ., the expected
sequence number of the next received I PDU on the specified data-link
connection. Prior to sending an I-format PDU or S-format PDU, the value of
N R . is set equal to the current value of the associated receive state variable
for that data-link connection. N R . indicates that the station sending the
N R . has received correctly all I PDUs numbered up through N R . y 1 on
the specified data-link connection.
POLLrFINAL PrF. BIT.
216
connection with the P bit set to 1, the LLC will have received a response
PDU with the F bit set to 1 from the addressed LLC. If no valid response
PDU is received within a system-defined P-bit timer timeout period, the
re.sending of a command PDU with the P bit set to 1 is permitted for
error recovery purposes.
A response PDU with the F bit set to 1 is used to acknowledge receipt
of a command PDU with the P bit set to 1.
Following the receipt of a command PDU with the P bit set to 1, the
LLC sends a response PDU with the F bit set to 1 on the appropriate
data-link connection at the earliest possible opportunity. The LLC is permitted to send appropriate response PDUs with the F bit set to 0 at any
medium access opportunity on an asynchronous basis without the need for a
command PDU..
9.4.2.4 Commands and Responses. The commandrresponse CrR. bit,
located as the low-order bit in the SSAP field, is used to distinguish between
commands and responses. Table 9.1 lists appropriate commands and related
responses.
Type 1 Operation Commands and Responses. The Type 1 commands and
responses are all U-format PDUs. The U-format PDU command encodings
for Type 1 operation are listed in Figure 9.9.
The unnumbered information UI. command PDU is used to send information to one or more LLCs. Use of the UI command PDU is not dependent
on the existence of a data-link connection between the destination and the
source LLCs, and its use will not affect the V S . and V R . variables
associated with any data-link connections. There is no LLC response PDU to
the UI command PDU.
IInformation
IInformation
217
218
219
Figure 9.12. Information transfer format control field bits, I PDU, Type 2 operation.
number as of the time the PDU is sent. of the next expected I PDU to be
received and consequently indicates that the I PDUs numbered up through
N R . y 1 have been received correctly. Supervisory, S, PDUs are used to
perform numbered supervisory functions such as acknowledgments, temporary suspension of information transfer, or error recovery.
PDUs with the S format do not contain an information field and, therefore, do not increment the send state variable at the sender or the receive
state variable at the receiver. The encoding of the S-format PDU control
field for Type 2 operation is shown in Figure 9.13.
An S-format PDU contains an N R ., receive sequence number, which
indicates, at the time of sending, the sequence number of the next expected I
PDU to be received and consequently indicates that all received I PDUs
numbered up through N R . y 1 have been received correctly.
When sent, an RR receive ready. or REJ PDU indicates the clearance of
any busy condition at the sending LLC that was indicated by the earlier
sending of an RNR receive not ready. PDU.
The RR PDU is used by an LLC to indicate that it is ready to receive an I
PDUs.. I PDUs numbered up through N R . y 1 are considered to be
acknowledged.
The reject REJ. PDU is used by an LLC to request resending of I PDUs
starting with the PDU numbered N R .. I PDUs numbered up through
N R . y 1 are considered as acknowledged. It is possible to send additional I
PDUs awaiting initial sending after the re-sent I PDUs.
With respect to each direction of sending on a data-link connection, only
one sent REJ condition is established at any given time. The sent REJ
220
221
Figure 9.15. Unnumbered command and response control field bit assignments.
222
permitted with the DISC command PDU. Prior to actioning the command,
the destination LLC confirms the acceptance of the DISC command PDU by
sending a UA response PDU on that data-link connection.
Previously sent I PDUs that are unacknowledged when this command is
actioned remain unacknowledged. Whether or not the LLC resends the
contents of the information field of unacknowledged outstanding I PDUs is
decided at a higher OSI. layer.
The frame reject response FRMR. information field is shown in
Figure 9.16.
Section 9.4 consists of abstracted and edited material from Ref. 2.
223
224
225
Start Frame Delimiter (SFD) Field. The SFD field is the sequence 10101011.
It immediately follows the preamble and indicates the start of frame.
ADDRESS FIELDS.
226
227
b. If the value of this field is greater than or equal to 1536 decimal equal
to 0600 hexadecimal ., then the lengthrtype fields indicates the nature
of the MAC client protocol Type interpretation ..* The length and
type interpretations of this field are mutually exclusive.
Regardless of the interpretation of the lengthrtype field, if the length of
the data field is less than the minimum required for proper operation of the
protocol, a PAD field a sequence of octets. is added at the end of the data
field but prior to the FCS field, as discussed below. The procedure that
determines the size of the PAD field is specified in Section 4.2.8 of Ref. 3.
The lengthrtype field is transmitted and received with the high-order octet
first.
DATA AND PAD FIELDS.
G x . s x 32 q x 26 q x 23 q x 22 q x 16 q x 12 q x 11 q x 10
q x 8 q x7 q x 5 q x 4 q x 2 q x q 1
Mathematically, the CRC value corresponding to a given frame is defined by
the following procedure:
a. The first 32 bits of the frame are complemented.
b. The n bits of the frame are then considered to be the coefficients of a
polynomial M x . of degree n y 1. The first bit of the destination
address field corresponds to the x ny1. term, and the last bit of the
data field corresponds to the x 0 term..
*Type field assignments are administered by the Registration Authority, IEEE Standards Dept.,
PO Box 1331, Piscataway, NJ 08855-1331.
228
Order of Bit Transmission. Each octet of the MAC frame, with the exception of the FCS, is transmitted low-order bit first.
Inalid MAC Frame. An invalid MAC frame is defined as one that meets
at least one of the following conditions:
1. The frame length is inconsistent with the length field.
2. It is not an integral of octets in length.
3. The bits of the incoming frame exclusive of the FCS field itself. do not
generate a CRC value identical to the one received. The contents of
invalid MAC frames are not passed to the LLC.
It should be noted that the LLC PDU is inserted into the MAC client data
field as shown in Figure 9.18.
229
9.5.2.3 CSMAr
r CD Basic Operation
Transmission Without Contention. When an LLC sublayer requests the
transmission of a frame, the transmit data encapsulation component of the
MAC sublayer constructs the frame from the LLC-supplied data. It appends
a preamble and an SFD to the beginning of a frame. A PAD is also
appended, if required. It also appends destination and source addresses, a
length count field, and an FCS. The frame is then handed to the transmit
media access management component in the MAC sublayer for transmission.
The transmit media access management then attempts to avoid contention
with other traffic on the medium by monitoring the carrier sense signal
provided by the PLS and deferring to passing traffic. When the medium is
clear, frame transmission starts. The MAC sublayer then provides a serial
stream of bits to the PLS interface for transmission.
The PLS performs the task of actually generating the electrical signals on
the medium that represent the bits of the frame. Simultaneously, it monitors
the medium and generates the collision detect signal, which, in the contention-free case, remains off for the duration of the frame.
Reception Without Contention. At each LAN receiving station, the arrival of
a frame is first detected by the PLS, which responds by synchronizing with
the incoming preamble and by turning on the carrier sense signal. As the
encoded bits arrive from the medium, they are decoded and translated back
into binary data. The PLS passes subsequent bits up to the MAC sublayer,
where the leading bits are discarded, up to and including the end of the
preamble and SFD.
Meanwhile, the receive media access management component of the MAC
sublayer, having observed carrier sense, has been waiting for the incoming
bits to be delivered. Receive media access management collects bits from the
PLS as long as the carrier sense signal remains on. When the carrier sense
signal is removed, the frame is truncated to the octet boundary, if necessary,
and passed to receive data decapsulation for processing.
Receive data decapsulation checks the frames destination address field to
decide whether the frame should be received by this station. If so, it passes
the destination address DA., the source address SA., and the LLC data
unit LLCDU. to the LLC sublayer along with the appropriate status code
indicating reception complete or reception too long. It also checks for
invalid MAC frames by inspecting the FCS to detect any damage to the
frame en route and by checking for proper octet boundary alignment of the
frame. Frames with a valid FCS may also be checked for proper octet
boundary alignment.
Access Interference and Recovery. If multiple LAN stations attempt to
transmit at the same time, it is possible for them to interfere with each
others transmissions, in spite of their attempts to avoid this by deferring.
230
231
where k s min n, 10 .
232
If all limit attempts fail, this event is reported as an error. Algorithms used to
generate the integer r are designed to minimize the correlation between the
numbers generated by any two stations at any given time.
It is noted that the values given above define the most aggressive behavior
that a station may exhibit in attempting to retransmit after a collision. In the
course of implementing the retransmission scheduling procedure, a station
may introduce extra delays that will degrade its own throughput, but in no
case may a stations retransmission scheduling result in a lower average delay
between retransmission attempts than the procedure defined above.
9.6 CSMAr
r CDCURRENT STATUS AND ADVANCED OPERATION
9.6.1 General
The original CSMArCD system operated at a nominal 10-Mbps data rate.
Subsequently, the system has undergone modifications for 100-Mbps and
1000-Mbps capabilities. Numerous variants on transmission media have also
evolved. Table 9.2 lists 22 varieties of CSMArCD, variously called Ethernet.
9.6.2 Half-Duplex and Full-Duplex
Half-duplex operation is where two or more stations share a common
transmission medium. Full-duplex operation, on the other hand, allows
simultaneous communication between a pair of stations using point-to-point
means dedicated channel .. Full-duplex operation does not require that
transmitters defer, nor do they monitor or react to receive activity, as there is
no contention for a shared medium in this mode. Full-duplex mode can only
be used when all of the following are true:
a. The physical medium is capable of supporting simultaneous transmission and reception without interference.
b. There are exactly two stations connected with a full-duplex point-topoint link. Since there is no contention for use of a shared medium,
the multiple access i.e., CSMArCD. algorithms are unnecessary.
c. Both stations on the LAN are capable of, and have been configured to
use, full-duplex operation.
The most common configuration envisioned for full-duplex operation consists
of a central bridge also known as a switch . with a dedicated LAN connecting
each bridge port to a single device. Repeaters as defined in the reference
standard are outside the scope of full-duplex operation.
9.6.3 Compatibility InterfacesPhysical Layer
In this section five important compatibility interfaces are defined in what is
architecturally the physical layer. These are shown in Figure 9.20.
233
rCD
TABLE 9.2 Variants of CSMAr
Type Name
Bit Rate
Transmission Medium
Comments
10BASE2
10 Mbps
RG 58 coaxia l cable
10BASE5
10 Mbps
Coaxial cable
10BASE-F
10 Mbps
Fiber-optic cable
10BASE-FB
10 Mbps
Fiber-optic cable
10BASE-FB
segment
10 Mbps
Fiber-optic cable
10BASE-FL
segment
10 Mbps
Fiber-optic cable
10BASE-FP
segment
10 Mbps
Fiber-optic cable
10BASE-FP
star
10 Mbps
Fiber-optic cablerstar
10BASE-T
10 Mbps
100BASE-FX
100 Mbps
100BASE-T
100BASE-T2
100 Mbps
Thicknet
100BASE-T4
100 Mbps
Category 3, 4, or 5 UTP
100BASE-TX
100 Mbps
100BASE-X
100 Mbps
Specialty shielded
copper cable
Fiber-optic cable
Fiber-optic cable
1000BASE-T
1000 Mbps
Balanced category 5
1000BA SE-X
1000 Mbps
General category
10BROAD36
10 Mbps
Single broadband
cable
1BASE5
1 Mbps
234
235
236
237
238
Values
slotTime
interFrameGap
attemptLimit
backoffLimit
jamSize
maxFrameSize
minFrameSize
burstLimit
Values
slotTime
interFrameGap
attemptLimit
backoffLimit
jamSize
maxFrameSize
minFrameSize
burstLimit
Values
slotTime
interFrameGap
attemptLimit
backoffLimit
jamSize
maxFrameSize
minFrameSize
burstLimit
239
Values
slotTime
interFrameGap
attemptLimit
backoffLimit
jamSize
maxFrameSize
minFrameSize
burstLimit
Note: The spacing between two noncolliding packets, from the last
bit of the FCS field of the first packet to the first bit of the preamble of
the second packet, can have a minimum value of 64 BT (bit times),
as measured at the GMII receive signals at the DTE. This interFrameGap shrinkage may be caused by variable network delays,
added preamble bits, and clock tolerances.
Source: Section 4.4.2 of Ref. 3.
240
Characteristics
silence:
preamble:
s no transitions
s alternating CD1. and CD0. 56 bit times
ending in CD0.
s CD1.CD0.CD1.CD0.CD1.CD0.
CD1.CD1.
s 8XN instances of CD0 or CD1
s IDL
sfd:
data:
etd:
241
242
signal is the uncomplemented value of the bit being encoded. Thus, a CD0 is
encoded as a bit-symbol in which the first half is HI and the second half is
LO. A CD1 is encoded as a bit-symbol in which the first half is LO and the
second half is HI. Examples of Manchester coding are shown in Figure 9.22.
The line condition IDL is also used as an encoded signal. An IDL always
starts with a HI signal level. Since IDL always starts with a HI signal, an
additional transition will be added to the data stream if the last bit sent was a
zero. This transition cannot be confused with clocked data CD0 or CD1.
since the transition will occur at the start of a bit cell. There will be no
transition in the middle of the bit cell. The IDL condition, as sent by a driver,
shall be maintained for a minimum of 2 bit times. The IDL condition shall be
detected within 1.6 bit times at the receiving device.
a. System jitter considerations make detection of IDL etd, end transmission delimiter. earlier than 1.3 bit times impractical. The specific
implementation of the phase-locked loop or equivalent clock recovery
mechanism determines the lower bound on the actual IDL detection
time. Adequate margin between lower bound and 1.6 bit times should
be considered.
243
Message
Description
normal
mau request O.
isolate O.
The meaning of the signals on the Control In circuit MAU to DTE. are
as follows:
Signal
Message
Description
CS1
mau aailable
mau not aailable
CS0
IDL
SIGNALING RATE.
244
245
except for delay between transmission and reception, which is inherent in the
broadband cable system. A transmitting MAU logically compares the beginning of the received data with the data transmitted. Any difference between
them, which may be due to either a. errors caused by colliding transmissions,
b. reception of an earlier transmission from another MAU, or c. a bit error
on the channel, is interpreted as a collision.
246
247
preamble, Start Frame Delimiter SFD., and data frame; and append
an unscrambled post-amble Broadband End of Frame Delimiter
wBEOFDx..
e. Differentially encode the packet generated previously.
f. Produce a band-limited double-sideband, suppressed carrier, binary
PSK modulated RF signal representing the generated differentially
encoded packet.
g. Drive the coaxial cable with the modulated RF signal.
MAU RECEIVE FUNCTION REQUIREMENTS.
following:
a. Receive the differentially encoded binary PSK modulated RF signal
from the broadband coaxial medium.
b. Receive the data band RF signals and reject signals in bands other
than the data band rejection of signals in the adjacent collision
enforcement band is optional..
c. Demodulate and differentially decode the incoming RF data signal
from the coaxial medium to provide a receive bit stream that represents the scrambled bit stream at the transmitter.
d. Descramble the receive bit stream using a self-synchronizing descrambler.
e. Manchester encode the descrambled bit stream.
f. Send to the DTE, using Circuit DI receive data pair., an additional,
locally generated, Manchester-encoded preamble equal to the number
of preamble bits lost in the receive data path plus or minus one bit.,
followed by Manchester-encoded bit stream. No more than 6 preamble
bits may be lost from the preamble presented to Circuit DO at the
transmitting MAU.
g. Detect end of frame, using the postamble BEOFD., and ensure that
no extraneous bits are sent to the DTE on Circuit DI.
248
249
75
14 dB min
q50 dBmV " 2 dB
q6 dBmV " 10 dB
y30 dBmV r 14 MHz
2 dB min, 52 dB max
36 dB min, 52 dB max
20 ns r 10 MHz max
34 ns max
Figure 9.25. Packet format and timing diagram, AUI to coaxial cable interface. (From Figure
11-6, page 233, IEEE Std. 802.3, Ref. 3.)
Selected Coaxial Cable Electrical Interface Requirements. These requirements are listed in Table 9.7.
Figure 9.25 shows the packet format and timing diagram at the coaxial
cable interface. Tables 9.8 and 9.9 show the single cable and dual-cable
frequency plans.
9.6.7 System Considerations for Multisegment 10-Mbps
Baseband Networks
9.6.7.1 Overview. Two transmission models are presented in Section 13 of
Ref. 3: Model 1 and Model 2. These models require that the network size be
limited to control round-trip propagation delay, and that the number of
250
Transmitter
Translation
192.25 Mhz
Data
Carrier
Coll Enf b
Center Freq
Transmit
Band
Head-End
Local Osc
Receive
Band
Head-End
Local Osc
Receive
Band
43
49
55
61c
67
73
52
58
64
70
76
82
35.7553.75
41.7559.75
47.7565.75
53.7571.75
59.7577.75
65.7583.75
245.75
257.75
269.75
281.75
293.75
305.75
192210
198216
204222
210228
216234
222240
192.25
192.25
192.25
192.25
192.25
192.25
228246
234252
240258
246264
252270
258276
Some of these optional bands are overlapping. Frequency tolerance of the data carrier and
head-end local oscillator shall each be "25 kHz.
b
Coll Enf, collision enforcement.
c
Preferred frequency allocation.
Source: Table 11.2-1, page 237, Ref. 3.
Coll Enf b
Center Freq
Data
Band
Coll Enf b
Band
43
49
55
61c
67
73
235.25
241.25
247.25
253.25 c
259.25
265.25
52
58
64
70
76
82
244.25
250.25
256.25
262.25
268.25
274.25
3650
4256
4862
5468
6974
6680
228242
234248
240254
246260
252266
258272
5054
5660
6266
6872
7478
8084
242246
248252
254258
260264
266270
272276
Some of these optional bands are overlapping. Frequency tolerance of the data carrier shall be
"25 kHz.
b
Coll Enf, collision enforcement.
c
Preferred frequency allocations.
Source: Table 11.2-2, page 237, Ref. 3.
repeaters between any two DTEs be limited in order to limit the shrinkage of
the interpacket gap as it travels through the network. Model 1 is the more
conservative that meets the two basic design criteria set forth above. The
Model 2 transmission system model validates an additional broad set of
topologies that are fully functional and do not fit within the simpler but more
restrictive rules of Model 1.
The physical size of a CSMArCD network is limited by the characteristics of individual network components. These characteristics include the
TABLE 9.10
251
Media Type
Mixing segment
10BASE5
10BASE2
10BASE-FP
Link segment
FOIRL
10BASE-T
10BASE-FB
10BASE-FL
AUI d 1 DTE r 1 MAU
Maximum Medium
Delay per Segment (ns)
500
185
1000b
2165
950
5000
1000
100c
1000
2000
50
5000
1000
10 000
10 000
257
following:
a.
b.
c.
d.
e.
f.
Table 9.10 summarizes the delays for the various network media segments.
For more specific delays of the various MAUs, the reader should consult the
reference specification, Sections 818.
9.6.7.2 Shrinkage of the Interpacket Gap (IPG). The worst-case variabilities of transmission elements in the network plus some of the signal
reconstruction facilities required in the 10-Mbps baseband repeater specification combine in such a way that the gap between two packets travelling
across the network may be reduced below the interFrameGap specified in
Tables 9.3 through 9.6. This parameter limits the equipment i.e., number of
repeaters . between any two DTEs. Again the limit applies to all combinations of DTEs on any network, but the worst case is apparent from an
inspection of a map or schematic representation of the topology in question.
9.6.7.3 Transmission System Model 1. The following network topology
constraints apply to networks Transmission System Model 1. If no segment
length constraints are given for a segment type, the maximum segment
length, as defined in the relevant MAU clause, applies.
252
253
254
Figure 9.27. Example of maximum transmission path using coaxial cable segments,
10BASE-T link segments, and fiber-optic link segments.
All of these factors are in proportion to the change in bit rate i.e., 10 Mbps
vs. 100 Mbps.. This means that the ratio of packet duration to network
propagation delay for 100BASE-T is the same as 10BASE-T.
9.7.1.1 Reconciliation Sublayer (RS) and Media-Independent Interface
(MII) Introduction. The media-independent interface MII. provides an
interconnection between the media access control MAC. sublayer and the
physical layer entities PHY. and between PHY layer and station management STA. entities. This MII is capable of supporting both 10-Mbps and
100-Mbps data rates through 4-bit wide nibble wide. transmit and receive
paths. The reconciliation sublayer provides a mapping between signals provided at the MII and the MACrPLS service definition.
255
Figure 9.28. Example of maximum transmission path with three repeater sets, four link
segments (two are 100-m 10BASE-T and two are 1-km fiber).
9.7.1.2 Physical Layer Signaling Systems. The MII attaches to any one
of a number of physical layer implementations as expressed in the following
table:
Designation
100BASE-T4
100BASE-FX
100BASE-TX
100BASE-T2
256
Figure 9.29. Example of maximum transmission path with three repeater sets, four segments
(one 1-km 10BASE-FB, one 1-km FOIRL, one 400-m 10BASE-FL, and one 300-m 10BASE-FP).
257
Figure 9.30. Example of maximum transmission path with four repeater sets, five segments
(two 500-m 10BASE-FB, one 500-m FOIRL, one 500-m 10BASE-FL, and one 300-m
10BASE-FP).
258
259
260
Figure 9.33. MII frame format. Sfd s start frame delimiter; efd s end frame delimiter.
The interface through the MII connector is used to provide media independence for various forms of unshielded twisted-pair wiring, shielded
twisted-pair wiring, fiber-optic cabling, and potentially other media, so that
identical media access controllers may be used with any of these media.
Rates of Operation. The MII can support two specific data rates, 10 Mbps
and 100 Mbps. The functionality is identical at both data rates, as are the
signal timing relationships. The only difference between 10-Mbps and 100Mbps operation is the nominal clock frequency.
Relationship of MII and GMII (gigabit media-independent interface). The
GMII is similar to the MII. The GMII uses MII management interface and
register set specified in Section 22.2.4 of the reference document. These
common elements of operation allow station management to determine PHY
capabilities for any supported speed of operation and configure the station
based on those capabilities. In a station supporting both MII and GMII
operation, configuration of the station would include enabling either the MII
or GMII operation as appropriate for the data rate of the selected PHY.
Most of the MII and GMII signals use the same names, but the width of
the RXD and TXD data bundles and the semantics of the associated control
signals differ between MII and GMII operation. The GMII transmit path
clocking differs significantly from MII clocking. MII operation of these
signals and clocks is specified in Section 22 and GMII operation is specified
in Section 35 of the reference publication.
9.7.2.1 MII Frame Structure. The data frames transmitted through the
MII have the format as shown in Figure 9.33.
For MII transmission and reception of each octet of data is done a nibble*
at a time with the order of nibble transmission and reception as shown in
Figure 9.34. The bits of each octet are transmitted and received as two
nibbles: Bits 0 through 3 correspond to bits 0 through 3 of the first nibble
transmitted and received, and bits 4 through 7 of the octet correspond to bits
0 through 3 of the second nibble.
Interframe. The interframe period provides an observation window for an
unspecified amount of time during which no data activity occurs on the MII.
The absence of data activity is indicated by the de-assertion of the RX DV
receive data valid. signal on the receive path, and the de-assertion of the
TX EN transmit enable. signal on the transmit path. The MAC interFrameSpacing parameter defined in Tables 9.3 through 9.6 is measured from
*A nibble is a sequence of 4 bits.
261
Figure 9.34. Octet r nibble transmit and receive order. (From Figure 22-11, page 500, IEEE
Std. 802.3, Ref. 3.)
the de-assertion of the CRS carrier sense. signal to the assertion of the CRS
signal.
Preamble. The preamble begins a frame transmission and consists of at least
seven octets of alternating 1s and 0s transmitted serially.
Start of Frame Delimiter (sfd). The sdf indicates the start of a frame and
follows the preamble. It consists of the octet:
10101011
Data. The data in a well-formed frame consists of N octets of data transmitted as 2 N nibbles. For each octet of data, the transmit order of each nibble is
as specified in Figure 9.34. Data in a collision fragment may consist of an odd
number of nibbles.
9.7.3 100BASE-T4, Its PMA and PCS
9.7.3.1 Introduction. 100BASE-T4 and baseband medium specifications
are aimed at users who want 100-Mbps performance, but would like to retain
the benefits of using voice-grade twisted-pair cable. 100BASE-T4 requires
four pairs of Category 3 or better cables.
9.7.3.2 Objectives. The following are the objectives of 100BASE-T4:
a. To support the CSMArCD MAC in the half duplex mode of operation.
b. To support the 100BASE-T MII, repeater, and optional autonegotiation.
c. To provide 100-Mbps data rate at the MII.
262
Figure 9.35. Division of responsibilities between 100BASE-T4 PCS and PMA. (From Figure
23-2, page 537, IEEE Std. 802.3, Ref. 3.)
263
Figure 9.36. Use of wire pairs. (From Figure 23-3, page 537, IEEE Std. 802.3, Ref. 3.)
264
9.7.3.4 Summary of Physical Medium Attachment (PMA) Specification. The PMA couples messages from the PMA service interface onto the
twisted-pair physical medium. The PMA provides communications, at 100
Mbps, over four pairs of twisted-pair wiring up to 100 m in length.
The PMA transmit function, shown in Figure 9.35, comprises three independent ternary data transmitters. Upon receipt of a PMA UNITDATA.request message, the PMA synthesizes one ternary symbol on each of the three
output channels TX D1, BI D3, and BI D4.. Each output driver has a
ternary output, meaning that the output waveform can assume any of three
values, corresponding to the transmission of ternary symbols CS0, CS1, or
CS-1. A CS0 is a ternary symbol 0 with an output voltage of 0 volts, CS1 is a
ternary symbol 1 with a nominal peak voltage of q3.5 V, and a CS-1 conveys
the ternary symbol y1 and has a nominal peak voltage of y3.5 volts., on
each of the twisted pairs.
The PMA receive function comprises three independent ternary data
receivers. The receivers are responsible for acquiring clock, decoding the
start of stream delimiter SSD. on each channel, and providing data to the
PCS in the synchronous fashion defined by the PMA UNIDATA.indicate
message. The PMA also contains functions for PMA carrier sense and link
integrity.
9.7.4 Physical Coding Sublayer (PCS) and Physical Medium
Attachment (PMA) Sublayer, Type 100BASE-X
9.7.4.1 Objectives. The following are the objectives of 100BASE-X:
a. Support the CSMArCD MAC in the half-duplex and the full-duplex
modes of operation.
b. Support the 100BASE-T MII, repeater, and optional autonegotiation.
c. Provide 100-Mbps data rate at the MII.
d. Support cable plants using Category 5 UTP, 150 STP, or optical
fiber, compliant with ISOrIEC 11801.
e. Allow for a nominal network extent of 200400 m, including:
1. Unshielded twisted-pair links of 100 m
2. Two repeater networks of approximately 200 m span
3. One repeater network of approximately 300 m span using fiber.
4. DTErDTE links of approximately 400 m half-duplex mode using
fiber. and 2 km full-duplex mode using multimode fiber.
f. Preserve full-duplex behavior of underlying PMD channels.
9.7.4.2 Functional Requirements. The PCS comprises the transmit, receive, and carrier sense functions for 100BASE-T. In addition, the collisionDetect signal required by the MAC COL on the MII. is derived from the
265
PMA code-bit stream. The PCS shields the reconciliation sublayer and
MAC. from the specific nature of the underlying channel. Specifically for
receiving, the 100BASE-X PCS passes to the MII a sequence of data nibbles
derived from incoming code groups, each comprised of five code bits,
received from the medium. Code-group alignment and MAC packet delimiting is performed by embedding special nondata code groups. The MII uses a
nibble-wide, synchronous data path, with packet delimiting being provided by
separate TX EN and RX DV signals. The PCS provides the functions
necessary to map these two views of the exchanged data. The process is
reversed for transmit.
The following provides a detailed specification of the functions performed
by the PCS, which comprise five parallel processes transmit, transmit bits,
receive, receive bits, and carrier sense.. Figure 9.38 includes a functional
block diagram of the PCS.
The receive bits process accepts continuous code bits via the
PMA UNITDATA.indicate primitive. Receive monitors these bits and generates RXD 3 : 0:, RX DV and RX ER on the MII, and the internal flag,
receiving, used by the carrier sense and transmit processes.
The transmit process generates continuous code groups based upon the
TXD 3 : 0:, TX EN, and TX ER signals on the MII. These code groups
are transmitted by transmit bits via the PMA UNITDATA.request primitive.
The transmit process generates the MII signal COL based on whether a
reception is occurring simultaneously with transmission. Additionally, it generates the internal flag, transmitting, for use by the carrier sense process.
The carrier sense process asserts the MII signal CRS when either transmitting or receiving is TRUE. Both the transmit and receive processes
monitor link status via the PMA LINK.indicate primitive, to account for
potential link failure conditions.
Code Groups. The PCS maps 4-bit nibbles from the MII into 5-bit code
groups, and vice versa, using a 4Br5B block coding scheme. A code group is
a consecutive sequence of five code-bits interpreted and mapped by the PCS.
Implicit in the definition of a code-group is an establishment of code group
boundaries by an alignment function within the PCS receive process. It is
important to note that, with the sole exception of the SSD, which is used to
achieve alignment, code groups are undetectable and have no meaning
outside the 100BASE-X physical protocol data unit, called a stream.
The coding method used provides the following:
a. Adequate codes 32. to provide for all data code groups 16. plus
necessary control code-groups
b. Appropriate coding efficiency 4 data bits per 5 code bits; 80%. to
effect a 100-Mbps physical layer interface on a 125-Mbps physical
channel as provided by FDDI PMDs
266
Figure 9.38. Functional block diagram, 100BASE-X. (From Figure 24-4, page 615, IEEE Std.
802.3, Ref. 3.)
267
268
the MII. The 32 code groups are divided into four categories, as shown in
Table 9.11.
DATA CODE GROUPS.
START-OF-STREAM DELIMITER
INVALID CODE GROUPS. The rHr code group indicates that the PCSs client
wishes to indicate a transmit error to its peer entity. The normal use of this
indicator is for repeaters to propagate received errors. Transmit error code
groups are emitted from the PCS, at the request of the PCSs client through
the use of the TX ER signal.
The presence of any invalid code group on the medium, including rHr,
denotes a collision artifact or an error condition. Invalid code groups are not
intentionally transmitted onto the medium by DTEs. The PCS indicates the
reception of an invalid code group on the MII through the use of the
RX ER signal.
Encapsulation. The 100BASE-X PCS accepts frames from the MAC through
the reconciliation sublayer and MII. Due to the continuously signaled nature
of the underlying PMA, and the encoding performed by the PCS, the
269
Figure 9.39. PCS encapsulation. (From Figure 24-5, page 619, IEEE Std. 802.3, Ref. 3.)
270
Figure 9.40. PCS reference diagram. (From Figure 24-6, page 620, IEEE Std. 802.3, Ref. 3.)
271
Similarly, the PCS deserializes code bits received from the PMA, in
accordance with Figure 9.40. After alignment is achieved, based on SSD
detection, the PCS converts code groups into MII data nibbles, according to
the code group description paragraphs.
272
273
Figure 9.42. Multiple bit rate capacity, multiple-collision-domain topology using a multiport
bridge.
TABLE 9.12
Media Type
Balanced Cable Link Segment 100BASE-T
Fiber Link Segment
a
Maximum
Number of Maximum
Maximum Medium
PHYs per
Segment Round-Trip Delay per
Segment Length (m)
Segment (BT) a
2
2
100
412
114
412
274
TABLE 9.13
Component
Two TX r FX DTEs
Two T4 DTEs
Two T2 DTEs
One T2 or T4 and one TX r FX DTE a
Cat. 3 cabling segment
Cat. 4 cabling segment
Cat. 5 cabling segment
STP cabling segment
Fiber-optic cabling segment
Class I repeater
Class II repeater with all ports TX r FX
Class II repeater with any port T4
Class II repeater with any port T2
Round-Trip Delay
in Bit Times per Meter
Maximum Round-Trip
Delay in Bit Times
1.14
1.14
1.112
1.112
1.0
100
138
96
127
114 (100 m)
114 (100 m)
111.2 (100 m)
111.2 (100 m)
412 (412 m)
140
92
67
90
Worst-case values are used (TX r FX values for MAC transmit start and MDI input to collision
detect; T4 value for MDI input to MDI output).
Source: Table 29-3, page 741, Ref. 3.
275
276
277
Figure 9.45. Relationship of data bundles to MAC serial bit stream. (From Figure 35-16,
page 909, IEEE Std. 802.3, Ref. 3.)
278
279
following functions:
a. Mapping of transmit and receive code groups between the PCS and
PMA via the PMA service interface
b. Serialization deserialization . of code groups for transmission reception. on the underlying serial PMD
c. Recovery of clock from the 8Br10B-coded data supplied by the PMD
d. Mapping of transmit and receive bits between the PMA and PMD via
the PMD service interface
e. Data loopback at the PMD service interface
Physical Medium-Dependent (PMD Sublayer. 1000BASE-X physical layer
signaling for fiber and copper media is adapted from ANSI X.320-1994 FC
and PH., Clauses 6 and 7, respectively. These clauses define 1062.5-Mbps,
full-duplex signaling systems that accommodate single-mode optical fiber,
multimode optical fiber, and 150- balanced copper cabling. 1000BASE-X
adapts these basic physical layer specifications for use with the PMD sublayer
and mediums specified in Sections 38 and 39 of the reference document.
The MDI,* logically subsumed within each PMD subsection, is the actual
medium attachment, including connectors, for the various supported media.
Figure 9.46 depicts the relationship between 1000BASE-X and its associated PMD sublayers. Figure 9.47 is a functional block diagram of the
1000BASE-X PHY.
9.8.3.4 Physical Coding Sublayer (PCS). The PCS service interface allows the 1000BASE-X PCS to transfer information to and from a PCS client.
PCS clients include the MAC via the reconciliation sublayer. and repeater.
In the reference specification the GMII variables are set to true or false.
This is equivalent to, respectively, asserting or de-asserting them.
Functions Within the PCS. The PCS comprises the PCS transmit, carrier
sense, synchronization, PCS receive, and autonegotiation processes for
1000BASE-X. The PCS shields the reconciliation sublayer and MAC. from
the specific nature of the underlying channel. When communicating with the
GMII, the PCS uses an octet-wide, synchronous data path, with packet
delimiting being provided by separate transmit control signals TX EN and
TX ER. and receive control signals RX DV and RX ER.. When communicating with the PMA, the PCS uses a 10-bit-wide, synchronous data path,
which conveys 10-bit code groups. At the PMA service interface, code-group
alignment and MAC packet delimiting are made possible by embedding
special nondata code groups in the transmitted code-group stream. The PCS
provides the functions necessary to map packets between the GMII format
and the PMA service interface format.
*MDI, medium-dependent interface.
280
281
Figure 9.47. Functional block diagram of the 1000BASE-X PHY. (From Figure 36-2, page
926, IEEE Std. 802.3, Ref. 3.)
The PCS transmit process continuously generates code groups based upon
the TXD7 : 0:, TX EN, and TX ER signals on the GMII, sending them
immediately to the PMA service interface via the PMA UNITDATA.request
primitive. The PCS transmit process generates the GMII signal COL based
on whether a reception is occurring simultaneously with transmission. Additionally, it generates the internal flag, transmitting, for use by the carrier
sense process. The PCS transmit process monitors the autonegotiation process xmit flag to determine whether to transmit data or reconfigure the link.
The carrier sense process controls the GMII signal CRS see Figure 36-8
of the reference document..
282
The PCS synchronization process continuously accepts code groups via the
PMA UNITDATA.indicate primitive and conveys received code groups to
the PCS receive process via the SYNC UNITDATA.indicate primitive. The
PCS synchronization process sets the sync status flag to indicate whether the
PMA is functioning dependably as well as can be determined without
exhaustive error-rate analysis..
The PCS receive process continuously accepts code groups via the
SYNC UNITDATA.indicate primitive. The PCS receive process monitors
these code groups and generates RXD7 : 0:, RX DV, and RX ER on the
GMII and generates the internal flag, receiving, used by the carrier sense and
transmit processes.
The PCS autonegotiation process sets the xmit flag to inform the PCS
transmit process to either transmit normal idles interspersed with packets as
requested by the GMII or to reconfigure the link. The PCS autonegotiation
process is specified in Clause 37 of the reference document.
8Br10B Transmission Code. The PCS uses a transmission code to improve
the transmission characteristics of information to be transferred across the
link. The encodings defined by the transmission code ensure that sufficient
transitions are present in the PHY bit stream to make clock recovery possible
at the receiver. Such encoding also greatly increases the likelihood of
detecting any single or multiple bit errors that may occur during transmission
and reception of information. In addition, some of the special code groups of
the transmission code contain a distinct and easily recognizable bit pattern
that assists a receiver in achieving code-group alignment on the incoming
PHY bit stream. The 8Br10B transmission code specified for use in this
standard has a high transition density, is a run-length-limited code, and is
dc-balanced. The transition density of the 8Br10B symbols ranges from 3 to
8 transitions per symbol.
The definition of the 8Br10B transmission code is identical to that
specified in ANSI X3.230-1994, Clause 11. The relationship of code-group bit
positions to PMA and other PCS constructs is illustrated in Figure 9.48.
Notation Conventions. 8Br10B transmission code uses letter notation for
describing the bits of an unencoded information octet and a single control
variable. Each bit of the unencoded information octet contains either a
binary zero or a binary one. A control variable, Z, has either the value D or
the value K. When the control variable associated with an unencoded
information octet contains the value D, the associated encoded code group is
referred to as a data code group. When the control variable associated with
an unencoded information octet contains the value K, the associated encoded code group is referred to as a special code group.
The bit notation of A, B, C, D, E, F, G, H for an unencoded information
octet is used in the description of the 8Br10B transmission code. The bits
A, B, C, D, E, F, G, H are translated to bits a, b, c, d, e, f, g, h, j of 10-bit transmission code groups. 8Br10B code-group bit assignments are illustrated in
283
Figure 9.48. PCS reference diagram. (From Figure 36-3, page 928, IEEE Std. 802.3, Ref. 3.)
Figure 9.48. Each valid code group has been given a name using the following
convention: rDx. yr for the 256 valid data code groups and rKx. yr for
special control code groups, where x is the decimal value of bits EDCBA and
y is the decimal value of bits HGF.
Transmission Order. Code group bit transmission order is shown in Figure
9.48.
Code groups within multi-code-group ordered sets as specified in Table
36-3 of the reference document. are transmitted sequentially beginning with
the special code group used to distinguish the ordered set e.g., rK28.5r.
and proceeding code group by code group from left to right within the
definition of the ordered set until all code groups of the ordered set are
transmitted.
9.8.4 System Considerations for Multisegment
1000-Mbps Networks
9.8.4.1 Overview. The 1000-Mbps technology is designed to be deployed
in both homogeneous 1000-Mbps networks and 10r100r1000 Mbps mixed
networks using bridges andror routers. Network topologies can be developed
within a single 1000-Mbps collision domain, but maximum flexibility is
achieved by designing multiple-collision-domain networks that are joined by
bridges andror routers configured to provide a range of service levels to
284
Figure 9.49. Multiple data rate, multiple-collision-domain topology using multiport bridge.
(From Figure 42-2, page 1067, IEEE Std. 802.3, Ref. 3.)
DTEs. For example, a combined 1000BASE-Tr100BASE-Tr10BASE-T system built with repeaters and bridges can deliver dedicated or shared service
to DTEs at 1000 Mbps, 100 Mbps, or 10 Mbps.
Figure 9.41 outlines a 100-Mbps multiple-collision-domain topology using
a multiport bridge. This figure serves equally as well for a 1000-Mbps
multiple-collision-domain topology, and it shows how individual collision
domains can be linked by single devices or by multiple devices from any of
several transmission systems. Also see Figure 9.49.. The design of multiplecollision-domain networks is governed by the rules defining each of the
transmission systems incorporated into the design.
9.8.4.2 Single-Collision-Domain Multisegment Networks. The proper
operation of a CSMArCD network requires the physical size of the collision
domain to be limited in order to meet the round-trip propagation delay
requirements defined by the slot time discussed in Section 9.6.5.1. It also
requires that the number of repeaters be limited so as not to exceed the
interframe shrinkage given in Tables 9.3 through 9.6 and discussed in Section
9.6.7.2.
As in the previous section, there are two transmission models: Transmission System Model 1 and Model 2. Model 1 is the more conservative,
whereas Model 2 provides a set of calculation aids that allow those configuring a network to test a proposed configuration against a simple set of criteria
that allows it to be qualified. Transmission System Model 2 validates an
TABLE 9.14
Media Type
Category 5 UTP link segment (1000BASE-T)
Shielded jumper cable link segment (1000BASE-CX)
Optical fiber link segment (1000BASE-SX,
1000BASE-LX)
a
285
Maximum
Maximum
Number of Maximum Medium RoundPHYs per Segment Trip Delay per
Segment Length (m) Segment (BT)
2
2
2
100
25
316 a
1112
253
3192
additional broad set of topologies that are fully functional and do not fit
within the simpler, but more restrictive rules of Model 1.
The physical size of a CSMArCD network is discussed in Section 9.7.5.1.
Table 9.14 summarizes the delays, measured in bit times BTs., for 1000-Mbps
media segments.
Repeater Usage. Repeaters are the means used to connect segments of a
network medium together into single collision domain. Different physical
signaling systems e.g., 1000BASE-CX, 1000BASE-SX, 1000BASE-LX,
1000BASE-T. can be joined into a common collision domain using a repeater. Bridges can also be used to connect different signaling systems.
However, if a bridge is so used, each LAN connected to the bridge will
comprise a separate collision domain.
9.8.4.3 Transmission System Model 1. The following network topology
constraints apply to networks using Transmission System Model 1:
a. Single repeater topology maximum
b. Link distances not to exceed the lesser of 316 m or the maximum
transmission distance of the link
9.8.4.4 Transmission System Model 2. Transmission System Model 2 is
a single repeater topology with the physical size limited primarily by round-trip
collision delay. A network configuration must be validated against collision
delay using a network model for a 1000-Mbps collision domain. The modeling process is quite straightforward and can easily be done either manually or
with a spreadsheet.
Key elements in the calculation are two: round-trip collision delay and
interpacket gap shrinkage. The validation for each of these must be done
separately. The model consists of a series of segments consisting of a left-end
segment, mid-segments, and a right-end segment. The model consists of the
worst-case path through the network for that particular calculation.
Round-Trip Collision Delay. For a network to be valid, it must be possible
for any two DTEs on that network to properly arbitrate for the network.
When two or more stations attempt to transmit within the slot time interval,
286
287
TABLE 9.15
Maximum Round-Trip
Delay in Bit Times (BT)
11.12
10.10
10.10
864
1112 (100 m)
253 (25 m)
1111 (110 m)
976
Two DTEs
Category 5 UTP cable segment
Shielded jumper cable segment
Optical fiber cable segment
Repeater
Source: Table 42-3, page 1071, Ref. 3.
TABLE 9.16
Speed Relative to c
nsrm
BTrm
Speed Relative to c
nsrm
BTrm
0.4
0.5
0.51
0.52
0.53
0.54
0.55
0.56
0.57
0.58
0.5852
0.59
0.6
0.61
8.34
6.67
6.54
6.41
6.29
6.18
6.06
5.96
5.85
5.75
5.70
5.65
5.56
5.47
8.34
6.67
6.54
6.41
6.29
6.18
6.06
5.96
5.85
5.75
5.70
5.65
5.56
5.47
0.62
0.63
0.64
0.65
0.654
0.66
0.666
0.67
0.68
0.69
0.7
0.8
0.9
5.38
5.29
5.21
5.13
5.10
5.05
5.01
4.98
4.91
4.83
4.77
4.17
3.71
5.38
5.29
5.21
5.13
5.10
5.05
5.01
4.98
4.91
4.83
4.77
4.17
3.71
Note 1: Length is the sum of the cable lengths between the PHY
interfaces at the repeater and PHY interfaces at the farthest DTE. All
measurements are in meters.
Note 2: Cable delay is the delay specified by the manufacturer or the
maximum value for the type of cable used as shown in Table 9.15. For
this calculation, cable delay must be specified in bit times per meter
BTrm.. Table 9.16 can be used to convert values specified relative to
the speed of light %c. or nanoseconds per meter nsrm..
Note 3: When actual cable lengths or propagation delays are not
known, use the Max delay in bit times as specified in Table 9.15 for
copper cables. Delays for fiber should be calculated, as the value
found in Table 9.15 will be too large for most applications.
Note 4: The value found in Table 9.15 for shielded jumper cable is the
maximum delay for cable with solid dielectric. Cables with foam
dielectric may have a significantly smaller delay.
b. Sum together the LSDVs for all segments in the path.
288
c. Determine the delay for the repeater. If model specific data is not
available from the manufacturer, enter the appropriate default value
from Table 9.15.
d. Use the DTE delay value shown in Table 9.15 unless the equipment
manufacturer defines a different value. If the manufacturers supplied
values are used, the DTE delays of both ends of the worst-case path
should be summed together.
e. Decide on appropriate safety margin0 to 40 bit timesfor the PDV
calculation. Safety margin is used to provide additional margin to
accommodate unanticipated delay elements, such as extra-long connecting cable runs between wall jacks and DTEs. A safety margin of
32 BT is recommended..
f. Insert the values obtained through these calculations into the following formula to calculate the PDV. Some configurations may not use
all the elements of the formula..
PDV s link delays LSDV . q repeater delay
q DTE delay q safety margin
g. If the PDV is less than 4096, the path is qualified in terms of
worst-case delay.
h. Late collisions andror CRC errors may be indications that path delays
exceed 4096 BT.
REFERENCES
1. The IEEE Standard Dictionary of Electrical and Electronic Terms, 6th ed., IEEE Std.
100-1996, IEEE, New York, 1996.
2. Information Processing SystemsLocal Area Networks, Part 2, Logical Link Control,
ANSIrIEEE Std. 802.2, 1998 edition, IEEE, New York, 1998.
3. Information TechnologyTelecommunication and Information Exchange Between
SystemsLocal and Metropolitan Area NetworksSpecific Requirements, Part 3:
Carrier Sense Multiple Access with Collision Detection (CSMA r CD) Access Method
and Physical Layer Specification, IEEE Std. 802.3, 1998 edition, IEEE, New York,
1998.
4. Information TechnologyTelecommunications and Information Exchange Between
SystemsLocal and Metropolitan Area NetworksSpecific Requirements, Part 6:
Distributed Queue Dual Bus (DQDB) Access Method and Physical Layer Specifications, ANSIrIEEE 802.6, 1994 edition, IEEE, New York, 1994.
10
DATA COMMUNICATIONS IN THE
OFFICE ENVIRONMENT, PART 2
10.1
10.1.1
Introduction
Token bus
Token ring
Fiber distributed data interface FDDI.
289
290
The token-bus method is covered by only a brief overview because its market
penetration has dropped to just several percent of the total LAN market.*
Token ring and FDDI are discussed in greater detail. The IEEE 802.4 i.e.,
token-bus. committee has a current specification available. Token ring was
backed by IBM and is covered by the IEEE 802.5 committee. FDDI is an
ANSI initiative.
10.1.2
Token-Passing Bus
Figure 1.1 shows a simple example of a bus network. Figure 10.1 illustrates a
logical ring on a physical bus. It should be noted that the token medium
access method is always sequential in a logical sense. That is, during normal
steady-state operation, the right to access the medium passes from station to
station in a sequential manner i.e., station 1 to station 2, to station
3 . . . to station n in the logical ring.. In addition, the physical connectivity
has little impact on the order of the logical ring, and stations can respond to
the token holder even without being part of the logical ring. For example,
Stations H and F in Figure 10.1 can receive frames and could respond but
cannot initiate a transmission because they will never be sent the token.
The MAC sublayer provides sequential access to the shared bus medium
by passing control of the medium from station to station in a logically circular
fashion. The MAC sublayer determines when the LAN station has the right
to access the shared medium by recognizing and accepting the token from the
predecessor station, and it determines when the token will be passed to the
successor station.
The MAC sublayer carries out the following general functions:
1.
2.
3.
4.
5.
*In contrast, Ethernet Section 9.5. has over 75% market share year 2000..
291
292
Slot time is the maximum time any station need wait for an
immediate MAC level response from another station. Slot time is measured
in octet times and is defined as
slot time s INTEGER 2)transission path delay q station delay
qsafety margin . rMAC-symbol time q 7 4 r8 .
The slot time, along with the stations address and several other management parameters, is known to the station before it attempts to transmit on
the network. If all stations on the network are not using the same value for
slot time, the MAC protocol may not operate properly.
RIGHT TO TRANSMIT.
TOKEN PASSING. After each station has completed transmitting any data
frames it may have and has completed other maintenance functions, the
station passes the token to its successor by sending a token MAC control
frame.
After sending the token frame, the station listens for evidence that its
successor has heard the token frame and is active. If the sender hears a valid
frame following the token within one slot time, it assumes that its successor
has the token and is transmitting. Otherwise the token-sending station
attempts to assess the state of the network.
If the token-sending station hears a noise burst e.g., an unidentifiable
sequence or a frame with an incorrect FCS., it cannot be sure which station
sent the transmission. The MAC protocol treats this condition in a way which
minimizes the chance of the station causing a serious error.
Because a station on a broadband network should always hear its own
frames, if the token-sending station hears a single noise burst without
hearing its own token frame, the station assumes that it heard its own token
293
that had been garbled and continues to listen. If a second noise burst is
heard or if a noise burst is heard after the station hears its own token frame,
the token-sending station continues to listen in the CHECK TOKEN PASS
state for up to four more slot times. If nothing more is heard, the station
assumes that the noise burst it heard was not a garbled frame from the
successor station and so it repeats the token transmission. If anything is
heard during the four-slot time delay, the station assumes that its successor
successfully received the token.
RESPONSE WINDOW. New stations are added to the logical ring through a
controlled contention process using response windows. A response window
is a controlled interval of time equal to one slot time. after transmission of
a MAC control frame in which the station sending the frame pauses and
listens for a response. If a station hears a transmission start during the
response window, the station continues to listen to the transmission, even
after the response window time expires, until the transmission is complete.
Thus, the response windows define the time interval during which a station
will hear the beginning of a response from another station Ref. 1..
10.1.3
Token-Passing Ring
294
295
Figure 10.6. Relationship between data stations, servers, and system manager.
Figure 10.7. Relating the OSI reference model to the LAN model.
10.1.3.2 Token-Ring Frame Formats. Figure 10.8 shows the token format, and Figure 10.9 illustrates the frame format. The frame format is used
for transmitting both MAC and LLC messages to the destination stations.. A
frame may or may not have an information field.
Abort Sequence. The abort sequence consists of two fields: the starting
delimiter 1 octet. and the ending delimiter 1 octet.. This sequence is not
used for the purpose of terminating the transmission of a frame prematurely.
296
Figure 10.9. Token-ring frame format. *Maximum length only limited by the token-holding
time.
The abort sequence may occur anywhere in the bit stream; that is, receiving
stations are able to detect an abort sequence even if it does not occur on
octet boundaries.
Fill. When a LAN station is transmitting as opposed to repeating., it
transmits fill preceding or following frames, tokens, or abort sequences to
avoid what would otherwise be an inactive or indeterminate transmitter state.
Fill may be either 1s or 0s or any combination thereof and may be any
number of bits in length.
Starting Delimiter (SD). A frame or token is started with these eight symbols.
If otherwise, the sequence is not considered valid.
J K 0 J K 0 0 0
where
J s nondata J
K s nondata K
0 s zero bit
Access Control (AC). The access control sequence is one octet and consists
of the following bits:
PPP T M RRR
where
PPP s priority bits
T s token bit
M s monitor bit
RRR s reservation bits
297
PRIORITY BITS.
TOKEN BIT.
MONITOR M. BIT.
Frame Control (FC). The FC field defines the type of the frame and certain
MAC and information frame functions. It consists of one octet as follows:
FF ZZZZZZ
where
FF s frame-type bits
ZZZZZZ s control bits
Frame-type bits indicate the type of frame as follows:
00 s MAC frame i.e., contains a MAC PDU .
01 s LLC frame i.e., contains an LLC PDU .
1X s undefined format reserved for future use .
MAC FRAMES. If the frame-type bits indicate a MAC frame, all stations on the
ring shall interpret and, based on the finite state of the system, act on the
ZZZZZZ control bits.
298
LLC FRAMES. If the frame-type bits indicate an LLC frame, the ZZZZZZ bits
are designated as rrrYYY. The rrr bits are reserved and are transmitted as 0s
in all designated frames and ignored upon reception. The YYY bits may be
used to carry the priority Pm. of the PDU from the source LLC entity to the
target LLC entity or entities. Note that P, the priority of the AC field of a
frame, is less than or equal to Pm when the frame is transmitted onto
the ring.
UNDEFINED FORMAT.
299
0 s individual address
1 s group address
Individual addresses identify a particular station on the LAN and are distinct
from all other individual station addresses on the same LAN in the case of
local administration ., or from individual addresses of other LAN stations on
a global basis in the case of universal administration ..
A group address is used to address a frame to multiple destination
stations. Group addresses may be associated with zero or more stations on a
given LAN. In general, a group address is an address associated by convention with a group of logically related stations.
BROADCAST ADDRESS.
NULL ADDRESS.
300
FRAME CHECK SEQUENCE FCS.. The FCS is a 32-bit sequence based on the
following standard generating polynomial of degree 32:
G X . s X 32 q x 26 q X 23 q X 22 q X 16 q X 12 q X 11 q X 10 q X 8 q X 7
q X5 q X4 q X2 q X q 1
The FCS is the 1s complement of the sum modulo 2. of the following: a. the
remainder of X k = X 31 q X 30 q X 29 q qX 2 q X q 1. divided modulo
2. by G X ., where k is the number of bits in the FC, DA, SA, and INFO
fields, and b. the remainder after multiplication by X 32 and then division
modulo 2. by G X . of the content treated as a polynomial. of the FC, DA,
SA, and INFO fields. The FCS is transmitted commencing with the coefficient of the highest term.
Ending Delimiter (ED)
J K 1 J K 1 I E
where
J s nondata J
K s nondata K
1 s binary 1
I s intermediate frame bit
E s error-detected bit
The transmitting station transmits the delimiter as shown. Receiving stations
consider the ED valid if the first six symbols J K 1 J K 1 are received
correctly.
INTERMEDIATE FRAME BIT I BIT.. If the I flag is used to determine the end of
a stations transmission, the I bit is transmitted as a 1 in intermediate or
first. frames of a multiple-frame transmission. The I bit in the last or only
frame of the transmission is sent as a 0.
301
302
303
one, the algorithm is reversed and the polarity of the leading signal element
is the same as that of the trailing signal element of the previous bit. Here
there is no transition at the bit symbol boundary.
The nondata symbols J and K depart from this rule in that a signal
element of the same polarity is transmitted for both signal elements of the
symbol and there is, therefore, no mid-bit transition. A J symbol has the same
polarity as the trailing element of the preceding symbol. The transmission of
only one nondata symbol introduces a DC component, and thus nondata
symbols are normally transmitted as a pair of J or K symbols. By its nature, a
K symbol is opposite polarity of the preceding symbol..
Data Signaling Rates. The data signaling rates should be within "0.01% of
4 and 16 Mbps.
Symbol Timing. The PHY recovers the symbol timing information inherent
in the transitions between levels of the received signal. It minimizes the
phase jitter in this recovered timing signal to provide suitable timing at the
data signaling rate for internal use and for the transmission of symbols on
the ring. The rate at which symbols are transmitted is adjusted continuously
in order to remain in phase with the received signal.
In normal operation there is one station on the ring that is the active
monitor. All other stations on the ring are frequency- and phase-locked to
this station. They extract timing from received data by means of a phaselocked loop design based on the requirement to accommodate a combined
total of at least 250 stations and repeaters on the ring.
10.1.3.4 Symbol Decoder. Received symbols are decoded using an algorithm that is the inverse of that used for symbol encoding Section 10.1.3.3..
The station monitors the received data for the signal element pattern
corresponding to a starting delimiter SD. and ending delimiter ED. as
shown in Figure 10.12.
Starting delimiters SD. and ending delimiters ED. shall be detected even
if they do not occur on a symbol boundary. If an ending delimiter is detected
that does not occur on the symbol boundary established by the previous SD,
then an ED alignment error is indicated to the MAC the MAC uses this
signal to verify that the ending delimiter falls exactly on an octet boundary..
Once a delimiter has been detected, it shall establish the symbol and octet
boundary for the decoding of the received signal elements until another
delimiter is detected.
10.1.3.5 Latency. Latency is the time, expressed in number of symbols, it
takes for a signal element to pass through a ring component. Two latency
buffers are specified: a fixed buffer and an elastic buffer, which are inserted
in the ring signal path as requested by the MAC protocol. To ensure that
stations do not introduce excessive latency, the specification recommends
304
Figure 10.12. Starting and ending delimiter patterns. (From Figure 28, page 110, ANSIrIEEE
Std. 802.5, Ref. 2.)
that the average PHY latency should not exceed 6.25 ms to prevent the
expiration of the timer, return to repeat TRR ., which is set between 4.0 and
4.1 ms. It is further recommended that this time should not exceed 2.5 ms for
performanceraccess reasons.
Ring Latency. Ring latency, defined as the time it takes for a signal element
to travel around the entire ring, is equal to the cumulative latency of the ring
plus the latency of the active monitor. Cumulative latency is the time it takes
for a signal element to travel from the active monitors transmitter output to
its receiver input. The latency of the active monitor consists of two buffers,
elastic buffer and fixed latency buffer, in addition to the normal station
latency. The active monitor station uses the elastic buffer to compensate for
variations in cumulative latency and uses the fixed latency buffer to provide
the required latency to ensure ring operation even when only one station is
on the ring.
When the ring is in a normal operating state, the MAC protocol ensures
that only one station, the active monitor, will have Crystal transmit asserted,
which inserts the fixed latency and elastic latency buffers in the ring path.
The active monitor transmits data to the ring timed from its local clock,
which provides the master timing for the ring. Although the mean data
signaling rate around the ring is established by the active monitor, segments
of the ring can, for short periods of time, operate at a slightly higher or lower
305
signaling rate than the signaling rate of the active monitor. The cumulative
effect of these signaling rate variations may cause variations in the cumulative latency.
The elastic buffer in the active monitor compensates for the variation in
the cumulative latency as follows. When the frequency of the received signal
at the active monitor is slightly faster than the crystal clock, the elastic buffer
will expand, as required, to maintain a constant ring latency. Conversely, if
the frequency of the received signal is slightly slower, the elastic buffer will
contract to maintain a constant ring latency. Constant ring latency is a
requirement to avoid adding or dropping signal elements from the data
stream. The elastic buffer compensates for dynamic variations in latency due
to jitter. The elastic buffer does not compensate for some changes such as
step changes in latency caused by stations becoming or ceasing to be stacking
stations.
The fixed latency buffer is provided by the active monitor to provide the
latency required for token circulation.
In order for the token to continuously circulate around the ring, the ring
must have a minimum ring latency of at least 24 symbols the number of
symbols in a token.. To ensure this minimum ring latency, a fixed latency
buffer of at least 24 symbols is inserted into the data path of the station when
MAC asserts Crystal transmit.
Cumulative latency variations are handled by the elastic buffer. These
variations are due to jitter. The elastic buffer accommodates without error a
minimum cumulative latency variation of positive or negative B symbols
where
Data rate
s 4
16
Mbps
s 3
15
symbols
The elastic buffer in the active monitor is initialized to the center of the
elastic latency range whenever the MAC indicates Token received station is
repeating token..
10.1.3.6 Station Organization and Basic PMC Requirements. Figure
10.13 shows station functional organization and data flow. The PMC physical medium components. feeds the TCU trunk coupling unit. concentrator.
Two transmission parameters are specified for both active and passive
channels. These are attenuation and differential impedance. Figure 10.14
gives an example of station-to-TCU connection.
The channel attenuation of a passive channel consists of the loss of all
channel components between a ring station medium interface connector
MIC. and the MIC of the next downstream station. The channel attenuation
of an active channel consists of the loss between a station MIC and its
respective active concentrator port MIC, or the loss between an active RO
306
Figure 10.13. Station functional organization and data flow. (From Figure 2, page 16,
ANSIrIEEE Std. 802.5, Ref. 2.)
307
Figure 10.14. Example of station-to-TCU connection. (From Figure 29, page 145, ANSIrIEEE
Std. 802.5, Ref. 2.)
ring out. port MIC of one concentrator and the active RI ring in. port MIC
of a second concentrator. Table 10.1 gives the maximum attenuation values.
These loss values are based on the channel terminated in 100 ohms for UTP
cable and 150 ohms for STP cable.
The magnitude of the channel differential input and output impedance for
both passive and active channels using STP and UTP media will meet the
specifications given in Table 10.2.
Error Performance. The token-ring transmission system provides a communication channel that consists of a transmitter, receiver and channel with an
equivalent BER of less than or equal to 1 = 10y9 with a ring equivalent BER
of 1 = 10y8.
Section 10.1.3 is based on ANSIrIEEE Standard 802.5, 2nd ed., December 29, 1995, Ref. 2.
308
TABLE 10.1
Channel Type
Only 4 Mbps
16 r 4 Mbps
Passive
Active
- 19 dB @ 4 MHz
- 19 dB @ 4 MHz
- 19 dB @ 16 MHz
- 16 dB @ 16 MHz
TABLE 10.2
Media Type
Differential
Impedance
Only 4 Mbps
16r4 Mbps
UTP
STP
100 " 15
150 " 15
112 MHz
112 MHz
125 MHz a
125 MHz
Category 3 is only specified to 16 MHz but it is assumed that it can be extrapolated to 25 MHz.
10.1.4
Token-Ring Comparison
FDDI
Token Ring
Full-duplex architecture and bit-level
manipulation
Token sent only after source address
has returned
Traffic regulated through priority and
reservation bits on each packet
Uses differential Manchester coding,
no DC component
Centralized control with active monitor
clock, allowing very long packets
Wire-pair medium
309
or stations: single attachment and dual attachment. FDDI trunk rings are
composed of dual attachment stations and have two physical-layer mediumdependent PMD. entities. Single attachment stations are connected to the
trunk ring via concentrators.
Two kinds of data service can be provided in a logical ring: packet service
and circuit-connected service. The more common application today is the
packet service, where a given station or node. transmits information on to
the ring as a series of data packets or frames, where each packet circulates
from one station to the next. Each station copies the packet or frame header
as the packet passes. The addressed stations. passes. the packet internally
to the SMT station management. or LLC. Finally, the station that transmitted the packets effectively removes them from the ring. For circuit service,
some of the logical bit rate capacity is allocated to independent channels.
Two or more stations can simultaneously communicate via each channel.
FDDI provides packet service via a token ring in a similar manner as
described in Section 10.1.3. With FDDI a station gains the right to transmit
frames or packets on to the medium when it detects a token passing on the
medium. A token is a unique sequence consisting of four fields, which is
illustrated in Figure 10.16. The token follows each series of transmitted
packets. Any station, upon detection of a token, may capture the token by
removing it from the ring. That station may then transmit one or more data
packets that it has in queue.
310
TABLE 10.4
311
Code Group
Decimal
Symbol
Binary
Name
Assignment
00000
00100
11111
Q
H
I
Quiet
Halt
Idle
11000
10001
J
K
00101
Binary
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
11110
01001
10100
10101
01010
01011
01110
01111
10010
10011
10110
10111
11010
11011
11100
11101
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
01101
Terminate
00111
11001
R
S
Ending Delimiter
13
Control Indicators
07
25
Note the 4Br5B code.
Source: Extracted from Ref. 3. X3.231-1994.
generate patterns that can violate run length or duty cycle requirements. The
invalid code points are 01, 02, 03, 06, 08, 12, and 16.
In FDDI, information is signaled as a stream of fixed-length code groups,
each containing 5 bits see Table 10.4.. Each valid code group represents a
symbol. The first level code performed by PHY is the conversion of symbols
from the data-link layer MAC or HRC. to code groups. Each symbol is
mapped to its corresponding code group and consists of a sequence of five
NRZ code bits. The second level of coding performed by the PHY is the
312
conversion of NRZ code bits to NRZI* code bits. Each NRZ code bit 1
generates a transition in polarity of the NRZI signal, while an NRZ code bit
0 maintains the previous NRZI signal polarity. For the incoming pulse
stream, NRZI code bits are first decoded to equivalent NRZ code bits and
then decoded to symbols for delivery to the data-link layer DLL..
10.1.4.3 Protocol Data Units. Two protocol data unit PDU. formats are
used by the FDDI MAC: tokens and frames. Figure 10.16 illustrates the
token and Figure 10.17 shows the FDDI frame. The token is the means by
which a station gains the right to transmit MAC SDUs as opposed to the
normal process of repeating .. The token is passed from one MAC to another.
The frame format is used for transmitting MAC SDUs between peer MAC
entities and for transmitting MAC recovery information.
Frame Length. In the basic mode as opposed to the HRC., the physical
layer PHY. of FDDI requires limiting the maximum frame length to 9000
symbols, including four symbols of the preamble. The hybrid mode does not
have a limit on frame length, but it is recommended that it also limit its
frame length to 9000 symbols.
Frame Format. Refer to Figures 10.16 and 10.17. The preamble PA. of a
frame is transmitted by the frame originator as a minimum of 16 symbols of
idle pattern only 4 symbols in the hybrid mode.. This sequence allows for
station synchronization and frame alignment. PHYs of subsequent repeating
stations may change the length of the idle pattern consistent with PHY
clocking requirements. Thus, repeating stations may see a variable-length
preamble that may be shorter or longer than the originally transmitted
preamble. Stations in the basic mode are not required to be capable of
copying frames with preambles of less than 12 symbols.
The starting delimiter SD. consists of a J and K symbol see Table 10.4..
No frame or token is considered valid unless it starts with this explicit
*NRZI stands for non-return-to-zero, invert on ones.
313
sequence. After the SD there is a frame control FC. field which defines the
C bit, an
type of frame and associated control functions. It contains a class "
address length L. bit, format bits FF., and four control bits ZZZZ.. For
example, the C bit tells us whether the operation is asynchronous or synchronous; the address length L. bit tells us whether the address is 16 or 48
bits in length; frame format bits indicate whether a token is restricted or
nonrestricted, whether the frame is a station management frame, a MAC
frame, or an LLC frame, among others.
Destination and source addresses DA and SA. follow the FC. These
addresses may be 16 or 48 bits long. However, all stations must have a 16-bit
address capability as a minimum. A station with only a 16-bit address
capacity must be capable of functioning in a ring with stations concurrently
operating with 48-bit addresses.
The routing information RI. field is included in the frame when there is a
48-bit address field. In this case the RII bit is set to 1. The RI field contains 2
to 30 octets symbol pairs. whose format and meaning are specified in the
ISOrIEC 10038 standard on bridging.
The information INFO. field contains zero, one, or more data symbol
pairs whose meaning is determined by the FC field and whose interpretation
is made by the destination entity e.g., MAC, LLC, or SMT*.. The length of
the INFO field is variable. It does have a maximum length restriction based
on a maximum frame length of 9000 symbols, including the four symbols of
the preamble.
The frame check sequence FCS. is used to detect bits in error within the
frame as well as erroneous addition or deletion of bits to the frame. The
fields covered by the FCS include FC, DA, SA, INFO, and FCS
fields. The FCS generating polynomial is the ANSI 32-bit standard algorithm
given in Section 10.1.3.2.
The ending delimiter ED. is the symbol T, which ends tokens and frames.
Ending delimiters and optional control indicators form a balanced symbol
sequence. These are transmitted in pairs so as to maintain octet boundaries.
This is accomplished by adding a trailing symbol T as required. The ending
delimiter of a token consists of two consecutive T symbols; the ending
delimiter of a frame has a single T symbol.
The frame status FS. field consists of an arbitrary length sequence of
control indicator symbols R and S.. The FS field follows the ending delimiter of a frame. It ends if any symbol other than R and S is received. A
trailing T symbol, if present, is repeated as part of the FS field. The first
three control indicators of the FS field are mandatory. These indicators
indicate error detected E., address recognized A., and frame copied C..
The use of additional trailing control indicators in the FS field is optional
and may be defined by the user.
314
10.1.4.4 FDDI Timers and Timing Budget. There are three timers used
to regulate the operation of the FDDI ring: token-holding timer THT., valid
transmission timer TVX., and the token rotation timer TRT.. The values of
these timers are locally administered. They may vary from station to station
on the ring, provided that the applicable ring limits are not violated.
Definitions. Token time is the time required to transmit a token 6 symbols.
and a nominal length preamble 16 symbols.. Token time token length. in
basic mode: 0.00088 ms; in hybrid mode, 0.00089 ms to 0.11458 ms.
D max is the maximum latency circulation delay. for a starting delimiter
to travel around the logical ring. It includes node delay and propagation
delay.
D max s 1.7745 ms default . s maximum ring latency with hybrid mode
disabled.
D max s 2.8325 ms default . s maximum ring latency with hybrid mode
enabled.
10.1.4.5 FDDI Ring Operation. Access to the ring is controlled by passing
the token around the ring as in standard token-ring practice. The token gives
the downstream station the receiving station relative to the station passing the token. the opportunity to transmit a frame or sequence of frames. If a
station has frames. in queue for transmission, it strips the token from the
ring before the frame control field of the token is repeated. After the
captured token is completely received, the station begins transmitting
the eligible queued frames. After completion of transmission, the station
issues a new token for use by a downstream station.
Stations that have nothing to transmit at a particular time merely repeat
the incoming symbol stream. While in the process of repeating the incoming
symbol stream, the station determines whether the information is intended
for that station. This is done by matching the downstream address to its own
address or a relevant group address. If a match occurs, subsequent received
symbols up to the FCS are processed by the MAC or sent to the LLC.
Frame stripping is an important concept. Each transmitting station is
responsible for stripping frames from the ring that it originated. This is
accomplished by stripping the remainder of each frame whose source address
matches the stations own address from the ring and replacing it with idle
symbols symbol I Table 10.4..
It will be noted that the process of stripping leaves remnants of frames
consisting of the PA, SD, FC, DA, and SA fields, followed by idle symbols.
This happens because the decision to strip a frame is based on the recognition of the stations own address in the SA field. This cannot occur until after
the initial part of the frame has already been repeated and passed on to the
next downstream station. These remnants cause no ill effects. This is because
of the various specified criteria, including recognition of an ending delimiter
315
ED., which must be met to indicate that a frame is valid. To the level of
accuracy required by statistical purposes, the remnants cannot be distinguished from errored or lost frames because they are always followed by an
idle I. symbol pattern. Such remnants are removed from the ring when they
encounter the first transmitting station.
The FDDI specification distinguishes asynchronous from synchronous
transmission. In this context, asynchronous transmission is a class of data
transmission service whereby all requests for service contend for a pool of
dynamically allocated ring bandwidth and response time. Synchronous transmission is a class of data service whereby each requester is preallocated a
maximum bandwidth and guaranteed a response time not to exceed a specific
delay.
Clocking. A local clock is used to synchronize both the internal operation of
the PHY and its interface to the data-link layer DLL.. The clock is derived
from a fixed frequency reference. This reference may be created internally
within the PHY implementation or supplied to the PHY. Often a crystal
oscillator is used for this purpose.
Characteristics of the local clock are as follows:
a.
b.
c.
d.
e.
f.
316
10.1.5
10.1.5.1 Introduction. A wireless LAN WLAN. offers a flexible alternative to the wired LAN. In many cases a WLAN is an extension to a wired
LAN, augmenting the resources of an enterprise network. Using radio
frequency RF. technology, wireless LANs transmit and receive data by
means of radiated RF or light signals, minimizing or negating the need for
wired connections. WLANs are particularly attractive in the factory and
office environment where repeated rearrangement of communication facilities can be expected.
The following are some of the advantages of wireless LANs:
10.1.5.2 Definitions
Access Point (AP). Any entity that has station functionality and provides
access to the distribution services via the wireless medium WM. for
associated stations.
Association. The service used to establish APrSTA mapping and enable
STA invocation of the distribution system services.
Basic Service Area (BSA). The conceptual area within which members of a
basic service set may communicate.
Basic Service Set (BSS). A set of stations controlled by a single coordination
function.
Coordination Function (CF). The logical function that determines when a
station operating within a BSS is permitted to transmit and may be able to
receive PDUs via the wireless medium. The CF within a BSS may have
one PCF and shall have one DCF.
Distributed Coordination Function (DCF). A class of coordination function
where the same coordination function logic is active in every station in the
BSS when ever the network is in operation.
317
Distribution. The service which by using the association information. delivers MSDUs within the DS.
Distribution System (DS). A system used to interconnect a set of basic
service sets and integrated LANs to create an extended service set.
Distribution System Medium (DSM). The medium or set of media used by a
distribution system for communications between access points and portals
of an ESS.
Distribution System Services (DSS). The set of services provided by the
distribution system which enable the MAC to transport MSDUs between
stations that are not in direction communication with each other over a
single instance of the WM. These services include transport of MSDUs
between the APs of BSSs within an ESS, transport of MSDUs between
portals and BSSs within an ESS, and the transport of MSDUs between
stations in the same BSS in cases where the MSDU has a multicast or
broadcast destination address or where the destination is an individual
address, but the station sending the MSDU chooses to involve DSS. DS
services are provided between pairs of 802.11 MACs.
Extended Service Area (ESA). The conceptual area within which members of
an extended service set may communicate. An extended service area is
larger or equal to a basic service area and may involve BSSs in overlapping, disjoint, or both configurations.
Extended Service Set (ESS). A set of one or more interconnected basic
service sets and integrated LANs which appear as a single basic service set
to the LLC layer at any station associated with one of those BSSs.
Infrastructure. The infrastructure includes the distribution system medium,
access point, and portal entities, as well as being the logical location of
distribution and integration service functions of an ESS. An infrastructure
contains one or more access points and zero or more portals in addition to
the distribution system.
MAC Management Protocol Data Unit (MMPDU). The unit of data exchanged between two peer MAC entities using the services of the PHY.
MAC Protocol Data Unit (MPDU). The unit of data exchanged between two
peer MAC entities using the services of the PHY.
MAC Service Data Unit (MSDU). The MAC service data unit is information
that is delivered as a unit between MAC service access points.
Net Allocation Vector (NAV). An indicator, maintained by each station, of
time periods when transmission onto the WM shall not be initiated by the
station whether or not the stations CCA function senses the WM as being
busy.
Point Coordination Function (PCF). A class of possible coordination functions where the coordination function logic is active in only one station in
a BSS at any given time that the network is in operation.
318
Figure 10.18. WLAN MAC frame format. (From Figure 12, page 34, ANSIrIEEE Std. 802.11,
Ref. 8.)
Figure 10.19. Frame control field. (From Figure 13, page 35, IEEE Std. 802.11-1997, Ref. 6.)
TYPE AND SUBTYPE FIELDS. The Type field consists of 2 bits, and the Subtype
field is 4 bits long. These two fields identify the function of the frame. There
are three frame types: control, data, and management. Each of the frame
types has several defined subtypes. Type value binary 00 indicates a management frame, type value binary 01 indicates the frame is a control frame, and
binary value 10 for Type indicates that the frame is a data frame. For the
Subtype field, an example is the binary value 0100 which indicates a probe
request.
319
MORE FRAGMENTS. The More Fragments field is 1 bit in length and is set to
binary 1 in all frames which have another fragment of the current MSDU or
current MMPDU to follow. It is set to binary 0 in all other frames.
RETRY. The Retry subfield is 1 bit in length and is set to binary 1 in a Data or
Management type frame that is a retransmission of an earlier frame. A
receiving station uses this indication to aid in the process of eliminating
duplicate frames.
WEP FIELD.
ORDER FIELD.
ADDRESS FIELDS. There are four address fields in the MAC frame format.
These fields are used to indicate the BSSID Basic Service Set Identification .
source address, destination address, transmitting station address and receiving station address. The usage of the four address fields in each frame type is
indicated by the abbreviations BSSID, DA, SA, RA, and TA indicating BSS
Identifier, Destination Address, Source Address, Receiver Address, and
Transmitter Address, respectively. Certain frames may not contain some of
the address fields.
Certain address field usage is specified by the relative position of the
address field 14. within the MAC header, independent of the type of
address present in that field. For example, receiver address matching is
always performed on the contents of the Address 1 field in received frames,
and the receiver address of CTS clear to send. and ACK frames is always
obtained from the Address 2 field in the RTS request to send. frame, or
from the frame being acknowledged.
Each Address field contains a 48-bit address.
320
321
Receier Address (RA) Field. The RA field contains an IEEE MAC individual or group address that identifies the intended immediate recipient wSTSs.,
on the WM wireless medium.x for the information contained in the frame
body field.
Transmitter Address (TA) Field. The TA field contains an IEEE MAC
individual address that identifies the STA that has transmitted, onto the
WM, the MPDU contained in the frame body field. The IndividualrGroup
bit is always transmitted as a zero in the transmitter address.
SEQUENCE CONTROL AND SEQUENCE NUMBERS FIELDS.
FRAME BODY FIELD. The frame body is a variable length field that contains
information specific to individual frame types and subtypes. The minimum
frame body is 0 octets. The maximum-length frame body is defined by the
maximum length MSDU q ICV q IV., where ICV and IV are the WEP
fields defined in Section 8.2.5 of the reference publication.
THE FCS FIELD. The FCS field is a 32-bit field containing the standard 32-bit
CRC defined in Section 10.1.3.2.
322
Figure 10.21. RTS frame. (From Figure 16, page 41, ANSIrIEEE Std. 802.11, Ref. 8.)
RTS REQUEST TO SEND. AND CTS CLEAR TO SEND. FRAME FORMATS. The
format for the RTS frame is defined in Figure 10.21.
The RA receiver address . of the RTS frame is the address of the station,
on the wireless medium, that is the intended immediate recipient of the
pending directed Data or Management frame. The TA is the address of the
station transmitting the RTS frame.
The Duration value is the time, in microseconds, required to transmit the
pending Data or Management frame, plus one CTS frame, plus one ACK
frame, plus three SIFS short interframe space. intervals. If the calculated
duration includes a fractional microsecond, that value is rounded up to the
next higher integer.
The format of the CTS frame is shown in Figure 10.22.
The RA of the CTS frame is copied from the Transmitter Address TA.
field of the immediately previous RTS frame to which the CTS is a response.
The Duration value is the value obtained from the Duration field of the
Immediately previous RTS frame, minus the time, in microseconds, required
to transmit the CTS frame and its SIFS interval. If the calculated duration includes a fractional microsecond, it is rounded up to the next higher
integer.
323
If the More Fragment bit was set to 0 in the Frame Control field of the
immediately previous directed data or management frame, the duration value
is set to 0. If the More Fragment bit was set to 1 in the Frame Control field
of the immediately previous directed data or management frame, the duration value is the value obtained from the Duration field of the immediately
previous data or management frame, minus the time, in microseconds,
required to transmit the ACK frame and its SIFS interval. If the calculated
duration includes a fractional microsecond, that value is rounded up to the
next higher integer.
10.1.5.4 Overview of the WEP. Eavesdropping is a familiar problem of
other types of wireless technology. IEEE 802.11 specifies a wired LAN
equivalent data confidentiality algorithm. Wired equialent priacy WEP. is
defined as protecting authorized users of a wireless LAN from casual
eavesdropping. This service is intended to provide functionality for the
wireless LAN equivalent to that provided by the physical security attributes
inherent to a wired medium. The use of the WEP algorithm is optional.
10.1.5.5 MAC Access
MAC Architecture. One way of illustrating the WLAN MAC architecture is
illustrated in Figure 10.24. It is shown as providing the PCF point coordination function. through the services of the DCF distributed coordination
function..
DISTRIBUTED COORDINATION FUNCTION DCF..
324
Figure 10.24. MAC architecture. (From Figure 47, page 70, ANSIrIEEE Std. 802.11, Ref. 8.)
325
Figure 10.25. Fragmentation. (From Figure 48, page 71, IEEE Std. 802.11-1997, Ref. 6.)
326
are sent as a burst during the CP, using a single invocation of the DCF
medium access procedure. The fragments of a single MSDU or MMPDU are
sent during a CFP as individual frames obeying the rules of the PC medium
access procedure.
MAC DATA SERVICE. The MAC data service translates MAC service requests
from an LLC into input signals utilized by the MAC state machines. The
MAC data services also translates output signals from the MAC state
machines into service indications to an LLC. The translations are given in the
MAC data service state machine defined in Annex C of the reference
document.
DCF. The basic medium access protocol is a DCF that allows for automatic
medium sharing between compatible PHYs through the use of CSMArCA
and a random backoff time following a busy medium condition. In addition,
all directed traffic uses immediate positive acknowledgment ACK frame.
where retransmission is scheduled by the sender if no ACK is received.
The CSMArCA protocol is designed to reduce the collision probability
between multiple STAs accessing a medium, at the point where collisions
would most likely occur. Just after the medium becomes idle following a busy
medium as indicated by the CS function. is when the highest probability of a
collision exists. This is because multiple STAs could have been waiting for
the medium to become available again. This is the situation that necessitates
a random backoff procedure to resolve medium contention conflicts.
Carrier sense shall be performed both through physical and virtual
mechanisms.
The virtual carrier-sense mechanism is achieved by distributing reservation
information announcing the impending use of the medium. The exchange of
RTS and CTS frames prior to the actual data frame is one means of
distribution of this medium reservation information. The RTS and CTS
frames contain a DurationrID field that defines the period of time that the
medium is to be reserved to transmit the actual data frame and the returning
ACK frame. All STAs within the reception range of either the originating
STA which transmits the RTS. or the destination STA which transmits the
CTS. shall learn of the medium reservation. Thus an STA can be unable to
receive from the originating STA, yet still know about the impending use of
the medium to transmit a data frame.
Another means of distributing the medium reservation information is the
DurationrID field in directed frames. This field gives the time that the
medium is reserved, either to the end of the immediately following ACK, or
in the case of a fragment sequence, to the end of the ACK following the next
fragment.
The RTSrCTS exchange also performs both a type of fast collision
inference and a transmission path check. If the return CTS is not detected by
the STA originating the RTS, the originating STA may repeat the process
after observing the other medium-use rules. more quickly than if the long
327
data frame had been transmitted and a return ACK frame had not been
detected.
Another advantage of the RTSrCTS mechanism occurs where multiple
BSSs utilizing the same channel overlap. The medium reservation mechanism
works across the BSA boundaries. The RTSrCTS mechanism may also
improve operation in a typical situation where all STAs can receive from the
AP, but cannot receive from all other STAs in the BSA.
The RTSrCTS mechanism cannot be used for MPDUs with broadcast and
multicast immediate address because there are multiple destinations for the
RTS, and thus potentially multiple concurrent senders of the CTS in response. The RTSrCTS mechanism need not be used for every data frame
transmission. Because the additional RTS and CTS frames add overhead inefficiency, the mechanism is not always justified, especially for short
data frames.
The use of the RTSrCTS mechanism is under control of the
dot11RTSThreshold attribute. This attribute may be set on a per-STA basis.
This mechanism allows STAs to be configured to use RTSrCTS either
always, never, or only on frames longer than a specified length.
An STA configured not to initiate the RTSrCTS mechanism shall still
update its virtual carrier-sense mechanism with the duration information
contained in a received RTS or CTS frame, and shall always respond to an
RTS addressed to it with a CTS.
The medium access protocol allows for STAs to support different sets of
data rates. All STAs shall receive all the data rates in aBasicRateSet and
transmit at one or more of the aBasicRateSet data rates. To support the
proper operation of the RTSrCTS and the virtual carrier-sense mechanism,
all STAs shall be able to detect the RTS and CTS frames. For this reason the
RTS and CTS frames shall be transmitted at one of the aBasicRateSet rates.
See Section 9.6 of the reference document for a description of multirate
operation..
Data frames sent under the DCF shall use the frame type Data and
subtype Data or Null Function. STAs receiving Data type frames shall only
consider the frame body as the basis of a possible indication to LLC.
CARRIER SENSE MECHANISM. Physical and virtual carrier-sense functions are
used to determine the state of the medium. When either function indicates a
busy medium, the medium is considered busy; otherwise, it is considered idle.
A physical carrier-sense mechanism is provided by the PHY. See Section
12 of the reference document for how this information is conveyed to the
MAC. The details of physical carrier sense are provided in the individual
PHY specifications.
A virtual carrier-sense is provided by the MAC. The mechanism is referred to as the network allocation ector NAV.. The NAV maintains a
prediction of future traffic on the medium based on duration information
that is announced in the RTSrCTS frames prior to actual exchange of data.
328
The duration information is also available on the MAC headers of all frames
sent during the CP other than PS-POLL Control frames.
The carrier-sense mechanism combines the NAV state and the stations
transmitter status with the physical carrier sense to determine the busyridle
state of the medium. The NAV may be thought of as a counter which counts
down to zero at a uniform rate. When the counter is zero, the virtual
carrier-sense indication is that the medium is idle; when nonzero, the
indication is busy. The medium is determined to be busy whenever the
station is transmitting.
MAC-LEVEL ACKNOWLEDGMENTS. The reception of some frames requires the
receiving station to respond with an acknowledgment, generally an ACK
frame, if the FCS of the received frame is correct. This technique is known as
positive acknowledgment.
Lack of reception of an expected ACK frame indicates to the source STA
that an error has occurred. Note, however, that the destination station may
have received the frame correctly and that the error may have occurred in
the reception of the ACK frame. To the initiator of the frame exchange, this
condition is indistinguishable from an error occurring in the initial frame.
INTERFRAME SPACE IFS.. The time interval between frames is called the IFS.
A station determines that the medium is idle through the use of the
carrier-sense function for the interval specified. Four different IFSs are
defined to provide priority levels for access to the wireless media; they are
listed in order, from the shortest to the longest. Figure 10.26 illustrates some
of these relationships.
1.
2.
3.
4.
SIFS
PIFS
DIFS
EIFS
The different IFSs shall be independent of the STA bit rate. The IFS
timings shall be defined as time gaps on the medium, and they shall be fixed
Figure 10.26. Some IFS relationships. (From Figure 49, page 74, ANSIrIEEE Std. 802.11,
Ref. 8.)
329
for each PHY even in multirate-capable PHYs.. The IFS values are determined from attributes specified by the PHY.
Short IFS (SIFS). The SIFS is used for an ACK frame, a CTS frame, and
the second or subsequent MPDU of a fragment burst, as well as by a station
responding to any polling by the PCM. It may also be used by a PC for any
types of frames during the CFP. The SIFS is the time from the end of the last
symbol of the previous frame to the beginning of the first symbol of the
preamble of the subsequent frame as seen at the air interface.
The SIFS timing is achieved when the transmission of the subsequent
frame is started at the TxSIFS Slot boundary as specified in Section 9.2.10 of
the reference document. An IEEE 802.11 implementation does not allow the
space between frames that are defined to be separated by a SIFS time, as
measured on the medium, to vary from the nominal SIFS value by more than
"10% of aSlotTime for the PHY in use.
SIFS is the shortest of the interframe spaces. SIFS is used when stations
have seized the medium and need to keep it for the duration of the frame
exchange sequence to be performed. Using the smallest gap between transmissions within the frame exchange sequence prevents other stations which
are required to wait for the medium to be idle for a longer gap. from
attempting to use the medium, thus giving priority to completion of the frame
exchange sequence in progress.
PCF IFS (PIFS). The PIFS is used only by stations under the PCF to gain
priority access to the medium at the start of the CFP. A station using the
PCF is allowed to transmit contention-free traffic after its carrier-sense
mechanism determines that the medium is idle at the TxPIFS slot boundary
as defined in Section 9.2.10 of the reference document. Section 9.3 of this
document describes the use of the PIFS by stations operating under the PCF.
DCF IFS (DIFS). The DIFS is used by stations operating under the DCF
to transmit data frames MPDUs. and management frames MMPDUs.. A
station using the DCF is allowed to transmit if its carrier-sense mechanism
determines the medium is idle at the TxDIFS slot boundary as defined in
Section 9.2.10 of the reference document after a correctly received frame,
and its backoff time has expired. A station using the DCF does not transmit
within an EIFS after it determines that the medium is idle following reception of a frame for which the PHYRXEND.indication primitive contained an
error or a frame for which the MAC FCS value was not correct. A station
may transmit after subsequent reception of an error-free frame, resynchronizing the station. This allows the station to transmit using the DIFS following
that frame.
Extended IFS (EIFS). The EIFS is used by the DCF whenever the PHY
has indicated to the MAC that a frame transmission has begun that did not
result in the correct reception of a complete MAC frame with a correct FCS
value. The duration of an EIFS is defined in Section 9.2.10 of the reference
330
document. The EIFS interval begins following indication by the PHY that the
medium is idle after detection of the erroneous frame, without regard to the
virtual carrier-sense mechanism. The EIFS is defined to provide enough time
for another station to acknowledge what was, to this station, an incorrectly
received frame before this station commences transmission. Reception of an
error-free frame during the EIFS resynchronizes the station to the actual
busyridle state of the medium, so the EIFS is terminated and normal
medium access using DIFS and, if necessary, backoff. continues following
reception of that frame.
RANDOM BACKOFF TIME.
where
Random . s Pseudorandom integer drawn from a uniform distribution over the interval w0, CWx, where CW is an integer
within the range of values of the PHY characteristics
aCWmin and aCWmax, aCWmin F CW F aCWmax. It
is important that designers recognize the need for
statistical independence among the random number
streams among stations
aSlotTime s Value of the correspondingly named PHY characteristic.
The contention window CW. parameter shall take an initial value of
aCWmin. Every STA shall maintain an STA short retry count SSRC. as well
as an STA long retry count SLRC., both of which shall take an initial value
of zero. The SSRC shall be incremented whenever any short retry count
associated with any MSDU is incremented. The SLRC shall be incremented
whenever any long retry count associated with any MSDU is incremented.
The CW shall take the next value in the series every time an unsuccessful
attempt to transmit an MPDU causes either station retry counter to increment, until the CW reaches the value of aCWmax. A retry is defined as the
331
Figure 10.27. An example of exponential increase of CW. (From Figure 50, page 76, IEEE
Std. 802.11-1997, Ref. 6.)
332
PC or in the CP of the PCF access method, when the station determines that
the medium is idle for greater than or equal to a DIFS period, or an EIFS
period if the immediately preceding medium-busy event was caused by
detection of a frame that was not received at this station with a correct MAC
FCS value. If, under these conditions, the medium is determined by the
carrier-sense mechanism to be busy when a station desires to initiate the
initial frame of one of the frame exchanges described in Section 9.7 of
the reference document, exclusive of the CF period, the random backoff
algorithm described in Section 9.2.5.2 of the reference document is followed.
There are conditions, specified in Sections 9.2.5.2 and 9.2.5.5 of the reference
document, where the random backoff algorithm is followed even for the first
attempt to initiate a frame exchange sequence.
In a station having a frequency hop FH. PHY, control of the channel is
lost at the dwell time boundary and the station has to contend for the
channel after that dwell boundary. It is required that the stations having an
FH PHY complete transmission of the entire MPDU and associated acknowledgment if required. before the dwell time boundary. If, when transmitting or retransmitting an MPDU, there is not enough time remaining in
the dwell to allow transmission of the MPDU plus acknowledgment if
required., the station defers the transmission by selecting a random backoff
time, using the present CW without advancing to the next value in the
series.. The short retry counter and long retry counter for the MSDU are not
affected. The basic access mechanism is illustrated in Figure 10.28.
10.1.5.6 Overview of the Air Interface. The data rates presently offered
by the 802.11 specification are 1.0 and 2.0 Mbps.
There are three different modulation plans: Two of these plans use a form
of spread spectrum, and the third uses radiated light in the IR region. The
spread spectrum types are frequency hop FH. and direct sequence DS..
The hopping rate for FH systems is 2.5 or more hopsrs.
Frequency Hopping Spread Spectrum Operation. Section 15.247 of the
FCC Rules and Regulations CFR 47, Ref. 7. states that the dwell time is not
Figure 10.28. Basic access method. (From Figure 51, page 77, IEEE Std. 802.11-1997,
Ref. 6.)
333
greater than 0.4 hopsrs in any 30 hopsrs period. This type of operation is
permitted in two frequency bands: 2400 to 2483.5 MHz and 5725 to 5850
MHz. The IEEE 802.11 specification only allows operation in the former.
The FCC has assigned 79 specific hop frequencies in the 2.4-GHz band
beginning at 2402 MHz and extending to 2483 MHz. These frequencies are
valid for North America and Europe, not including France and Spain.
Maximum transmitter output power FCC Part 15.247. is 1.0 watt q30
dBm.. Transmit antennas may have gains as high as q6 dBi before there is a
power penalty. For example, if a transmit antenna has a gain of q10 dBi, the
transmit output power must be reduced 4 dB. Thus, the maximum EIRP is
q36 dBm or q6 dBW.
If we were to allow a receive threshold of y80 dBm Section 14.6.15.4 of
IEEE 802.11, Ref. 8., what kind of line-of-sight range could we expect?
Based on Radio System Design for Telecommunications, Ref. 9., the free
space loss FSL. equation is
FSL s 36.58 q 20 log D q 20 log F in dB .
where D is in miles and F is in MHz.
Let F s 2483 MHz, what is D?
FSL s 36.58 q 20 log 2483 . q 20 log D
s 36.58 q 67.9 q 20 log D
At 1 mile, FSL s 104.48 dB.
With q36-dBm EIRP, the isotropic receive level IRL. would be
IRL s q36 dBm y 104.48 dB
s y68.48 dBm
If we assume that the gain of the receive antenna is 0 dBi and that the
transmission line to the receiver input is lossless, then there is a margin on
the link of y80 dBM* y y68.48 dBm. or 11.52 dB. This is at 1-mile
distance. At half a mile, the margin will be 6 dB greater, or 17.52 dB; at one
quarter-mile, there is another 6-dB improvement giving a 23.52-dB margin.
Because of the complex propagation conditions inside a building, link margin
is at a premium. Remember, every time we reduce to half of its value, the
free space loss decreases 6 dB Ref. 9..
The modulation employed for the radio systems is a form of frequency
shift keying FSK. called Gaussian FSK. For 1-Mbps systems it is binary
GFSK, and for the 2-Mbps systems it is 4-ary GFSK with a theoretical
channel occupancy of 2 bitsrHz of bandwidth. The channel occupancy for
either 1 or 2 Mbps is 1 MHz.
One concern of a system designer is the maximum permissible input level
to the receiver and its dynamic range. The maximum input signal is y20
dBm, and the dynamic range should extend to y8 dBm.
*Input threshold for a frame error ratio FER. 8 = 10y2 at 2-Mbps operation.
334
335
LAN BRIDGESOVERVIEW
There are a number of types of bridges. Well start with the transparent
bridge, the learning bridge, and then discuss the spanning tree algorithm.
Figure 10.29. Conceptual drawing illustrating the functions of repeaters, bridges, and routers.
336
337
338
10.3.1.1 Application of the 802.1 Bridge. IEEE 802 LANs of all types,
including FDDI, may be connected together with MAC bridges. Each individual LAN has its own independent MAC. The bridged local area network
created allows the interconnection of stations attached to separate LANs as
if they were attached to a single LAN. A MAC bridge operates below the
MAC service boundary, and is transparent to protocols operating above this
boundary, in the logical link control LLC. sublayer or the network layer.
A bridged local area network may provide the following:
a. The interconnection of stations attached to 802 LANs of different
MAC types.
b. An effective increase in the physical extent, the number of permissible
attachments, or the total performance of a LAN.
c. Partitioning of the physical LAN support for administrative or maintenance reasons.
This section describes the operation of the IEEE 802.1 MAC bridge and
highlights a selected group of its operational parameters Ref. 10..
10.3.1.2 Principles of Operation. The principal elements of 802.1 bridge
operation are the relay and filtering of frames. It includes the maintenance of
the information required to make frame filtering and relaying decisions.
A typical 802.1 MAC bridge is shown in Figure 10.31.
339
A MAC bridge relays individual MAC user data frames between the
separate MACs of the bridged local area networks connected to its ports.
The order of frames of given user priority received on one port and transmitted on another is preserved.
An IEEE 802.1 bridge carries out the following functions: It forwards
received frames to other bridge ports. It discards frames in error and discards
frames to ensure that a maximum bridge transit delay is not exceeded. It
selects outbound access priority and discards frames following the application
of filtering information. The bridge maps service data units and recalculates
the frame check sequence of a frame.
The bridge carries out a filtering function. It eliminates the possibility of
end-less routing loops. This is done by eliminating frame duplication. Thus
frames transmitted between a pair of end stations can be confined to LANs
that form a path between those end stations.
340
The bridge calculates and configures a bridged local area network topology. It automatically learns dynamic filtering information through observation of bridged LAN traffic. Filtering information that has been automatically
learned is deleted. It explicitly configures static filtering information and
permanently configures reserved addresses. The bridge ages out filtering
information that has been automatically learned.
The bridge protocol entity and other higher layer protocol users, such as
bridge management, make use of the logical link control procedures. These
procedures are provided separately for each port, and they use the MAC
service provided by the individual MAC entities.
Model of Operation. Frames are accepted for transmission and delivered on
reception to and from processes and entities that model the operation of the
MAC relay entity in a bridge. These are as follows:
1. The forwarding process, which forwards received frames that are to
be relayed to other bridge ports, filtering frames on the basis of information contained in the filtering database and on the state of the
bridge ports.
2. The learning process, which by observing the source addresses of
frames received on each port, updates the filtering database conditionally on the state of the port on which frames are observed.
3. The filtering database, which holds filtering information either explicitly configured by management action or automatically entered by the
learning process, and which supports queries by the forwarding process
as to whether frames with given values of the destination MAC address
field should be forwarded to a given port.
Each bridge port also functions as an end station providing the MAC service
to LLC that supports:
1. The bridge protocol entity, which operates a MAC sublayer configuration protocol between bridges, which determines, in part, the state of
each bridge port and its participation in the active topology of the
bridged local area network.
2. Other users of LLC, such as protocols providing bridge management.
Figure 10.32 illustrates the relaying of a single frame between ports of a
bridge with two ports. Figure 10.33 shows the inclusion of information
carried by a single frame, received on one of the ports of a bridge with two
ports, in the filtering database. The bridged protocol entity operation is
illustrated in Figure 10.34. This entity operates the spanning tree algorithm
and protocol. It includes its modification of port state information as part of
determining the active topology of the bridged local area network.
341
Figure 10.32. Relaying MAC frames. (From Figure 3-4, page 33, ANSIrIEEE Std. 802.1D,
Ref. 10.)
Figure 10.33. Observation of network traffic. (From Figure 3-5, page 33, ANSIrIEEE Std.
802.1D, Ref. 10.)
342
Figure 10.34. Operation of the interbridge protocol. (From Figure 3-6, page 34, ANSLrIEEE
Std. 802.1D, Ref. 10.)
343
344
*The IEEE Ref. 12. defines Spanning tree as: A bridging technique where a network of
randomly interconnected bridges can automatically build a logical tree structure so as to
guarantee a unique path between any pair of stations on the network. In this scheme, the
transmitter does not have to know how to route the frame to the destination; that is the job of
the bridges.
345
Figure 10.35. Spanning tree (example). (From Figure 4-2, page 46, ANSIrIEEE Std. 802.1D,
Ref. 10.)
346
*We call cost a routing parameter that determines shortest path route.
347
Root Path Cost. The cost of the path to the root from this bridge. It is equal
to the sum of the values of the designated cost and path cost parameters
held for the root port. When the bridge is the root, this parameter has the
value zero. The parameter is used to test the value of the root path cost
parameter conveyed in received configuration BPDUs; it is also used as
the value of the root path cost parameter offered in all configuration
BPDUs transmitted by the bridge.
Root Port. The port identifier of the port that offers the lowest cost path to
the root i.e., that port for which the sum of the values of the designated
cost and path cost parameters held for the port is lowest..
Max Age. The maximum age of received protocol information before it is
discarded.
Hello Time. The time interval between the transmission of configuration
BPDUs by a bridge that is attempting to become the root or is the root.
Bridge Hello Time. The value of the hello time parameter when the bridge is
the root or is attempting to become the root. The time interval between
348
Figure 10.36. Port states. (From Figure 4-3, page 48, ANSIrIEEE Std. 802.1D, Ref. 10.)
349
1.0 s
1.0 s
1.0 s
4.0 s
4.0 s
4.0 s
32,768
128
range 065535.
range 0255.
350
351
ENCODING OF ROOT PATH COST. Root path cost is encoded as four octets,
taken to represent an unsigned binary number, a multiple of arbitrary cost
units. Recommendations for these values are given in Section 10.3.1.3 herein.
352
Sections 10.3.1 through 10.3.4 consist of abstracts of IEEE Std. 802.1D, 1993, edition,
Ref. 10.
10.3.2
The basic concept behind source routing is that a frame header contains
routing information that has been inserted by the source of the frame. How
must a source end station know its route? It does not. So it must discoer a
route. It can do this by transmitting a special kind of frame. This frame
replicates itself at each node where the route splits i.e., where there are two
or more routing choices for onward delivery.. As a frame travels the route
toward its destination, it accumulates routing information such that upon its
arrival, future routing can be selected. This routing information is stored in
cache so it can serve subsequent frames.
Source Routing Header and the Routing Information (RI) Field. The generic
MAC frame for a LAN contains, as a minimum, a destination address field, a
source address field, and a payload, variously called info field, text, data, and
so on. This simplified header is
353
The RI field contains the following source routing information Ref. 11.:
Type
Length
Direction
Largest
frame
Route
3 bits
5 bits
1 bit
3 bits
16 bits
Type 3 bits.. The type of source routing may be one of the following:
a. Specifically routed the route appears in the header.
b. All paths explorer the route information accumulates as a frame
traverses the network.
c. Spanning tree explorer the route information accumulates as frame
copies traverse the network just as with all path explorers, but the
frame only travels along branches of the spanning tree.
Length 5 bits.. Specifies the number of octets in the RI field.
Direction 1 bit.. Specifies whether the route should travel from right to
left or left to right.
Largest Frame LF. 3 bits.. A value representing one of a few popular
frame sizes 516, 1500, 2052, 4472, 8144, 11407, 17800, or 65535 octets..
Route. A sequence of 2-octet-long fields which are called route designators, each of which consists of a 12-bit LAN number followed by a 4-bit
bridge number as illustrated:
LAN
Bridge
12 bits
4 bits
354
10.3.3
Remote Bridges
Remote bridges are used to connect two geographically distant LANs. In this
case, a bridge is installed on each LAN and a wide area network WAN.
connects the two bridges. It is generally assumed that these two bridges will
be bought in pairs to avoid interface problems.
The simplest way of implementing a remote bridge configuration is to
entirely encapsulate the LAN data frame with the WAN header and trailer,
often an FCS..* The remote bridge encapsulation concept is shown in
Figure 10.38. Here an entire CSMArCD frame is encapsulated in a frame
relay leader. Note that the CSMArCD preamble has been stripped off. It is
added back on at the remote bridge at the other side of the WAN link.
The spanning tree works well with the point-to-point WAN, and the two
bridges on each side consider the WAN link as another LAN. One of the
two bridges will be the designated bridge on the point-to-point link. The
second bridge, then, considers the port onto that link as its root port.
10.4
10.4.1
The original idea of a hub was to centralize equipment, usually in the wiring
closet on a floor. We think of a LAN as a set of operational workstations
PCs. connected to some sort of wire or cable stretching around the floor. It
355
Figure 10.39. The star topology idea of a hub. The hub, of course, sits in the center. The
lines connecting workstations to the hub represent wire twisted pairs or a continuous length
of coaxial cable tapped at the workstation.
was found to be more practical to steal a page from the book on telephony in
that each telephone is terminated on a floors mainframe located in the
wiring closet. Why couldnt we do the same for each computer or workstation? Thus we ended up with a star topology illustrated in Figure 10.39.
One advantage of the hub concept was centralization; another was that
LAN equipment could be locked up in a room, away from unauthorized
hands. To improve performance, each hub port termination was a repeater.
In the case of CSMArCD, the problem of collisions remained unchanged.
10.4.2
356
One also may note the delay incurred in the store of store and forward
switching. One cure for the delay is to use cut-through forwarding. All this
means is that the layer 2 switch can forward as soon as it has made a
forwarding decision. This happens sometime after all the bits of the destination address are received. Another name for a layer 2 switch is a smart hub.
10.5
ROUTERS
As with telephone numbering, the addressing at layer 3 can have geographical or other. significance. In other words, the addressing scheme is hierarchical. All this means that a network address is broken down in identifiable
chunks. This can mean that a chunk or piece of the address tells us where
the address resides.
Worldwide telephone numbering is based on pieces. In North America,
telephone numbering is a mixed bag. Certainly, area codes have geographical
significance. Exchange codes the 3-digit number group following the area
code. do not; nor do the 4-digit subscriber codes, the last 4 digits of a
telephone number that identify an individual subscriber. In other countries,
the exchange code can have geographical significance.
ROUTERS
357
Figure 10.40. The subnet address field in relation to the total IP address.
All network layer addresses are hierarchical. However, for the purpose of
routing, IEEE 802 addresses are not hierarchical, even though they seem so.
The IEEE uses a block of 3 octets in its 802 series addressing for the OUI
organizationally unique identifier .. It is not geographically hierarchical.
Certain network types, such as ISDN and frame relay, mix voice calls with
data calls. They may be governed by one of two ITU-T Recommendations:
E-164, which is more inclined to the voice telephone world, and X.121 for the
data world. For example, X.121 addressing numbering. consists of two
chunks or pieces: the Data Network Identification Code DNIC., where the
first three digits of the DNIC is the DCC data country code.. The second
part consists of the remaining 10 or 11 digits maximum. which contains the
network terminal number or the national number which is part of the
national numbering scheme. Of course, this addressing will be used for wide
area networks.
IP has its own addressing scheme, and there is a scheme for IP4* and
another for IP6. For this discussion we will stick with IP4 or just IP. It has a
source address and a destination address, and each is 32 bits long 4 octets..
Its address, whether source or destination, consists of two pieces or chunks:
network address and host address. Some texts refer to the host address as the
local address. Refer to this simple drawing:
Link
Host
32 bits
The link in the field indicates a link number, and the second subfield
indicates a system on the link. IP people call the second piece or chunk
a host. The actual number of bits in the link and host fields is not actually
fixed Ref. 11.. However, the total address length is 32 bits IP4.. See
Section 11.4.3.
Another way of looking at an IP address is shown in Figure 10.40. This
shows the subnet address structure in relation to the total address field.
Assignments for the local address is left up to the local network administrator. For instance, for the 16 bits assigned to the local address, half may be
assigned to the subnetwork and half to the host; or 12 bits can be assigned to
the subnetwork and only 4 bits assigned to the host.
*IP4 is currently the most widely used version of IP. It is so widely used that many people just
call it IP, where they assume everybody knows it is IP4.
358
10.5.2
Subnet Masks
For each link in an IP network, the network planner decides the value of the
link number and which bits in the address will correspond to the link
number. A link a LAN, for example. has a link number and a mask
indicating which bits correspond to the link number. The purpose of the
mask is to determine which part of the IP address pertains to the subnet and
which pertains to the host.
According to Black Ref. 13., the convention used for subnet masking is to
use a 32-bit field in addition to the IP address. The contents of the mask field
are set as follows:
Binary 1s: Identify the network address portion of the IP address.
Binary 0s: Identify the host address portion of the IP address.
A bitwise AND function is used to extract the fields of the IP address as
follows.
A bitwise AND is performed on the IP address and subnet mask. The
results of this operation are matched against a destination address in a
routing table. If the results are equal, the next hop IP address relative to the
destination address . is used to determine the next hop on the route. Therefore, the last octet all 0s. identifies the host on the subnet.
The mask becomes part of the routing algorithms conditional statement:
If the destination IP address and the subnet mask equal my IP address and
subnet mask, then send the datagram to local network; otherwise, send
datagram to gateway corresponding to destination address. Black comments
that, indeed, the use of masks handles routes to direct conventions, hostspecified routes, and default routes. The reference suggests that the implementor should note the following guidelines for subnetting:
10.6
359
separate LANs among ports on the same switch. It breaks a switch up into
two or more bridges. where ports 141 belong to VLAN X and ports 4273
to VLAN Y. In this case, the switch would be broken up into two separate
bridges: one that forwarded between the first 41 ports, and one that covers
the remainder of the ports. A router would be employed to forward traffic
from one VLAN to the other. Of course the separate router connecting the
two VLANs requires one port from each bridge. Some switches are capable
of acting as routers between VLANs.
When two switches are involved in a VLAN environment with a connecting link between the switches, frames can belong to either VLAN if there
are only two.. To solve this situation, additional information is provided
called a VLAN tag, which is added to the frame packet. so that switches can
know to which VLAN frame or other frame is intended. A station would be
confused if it received the frame with a VLAN tag. So switches must be
configured to know which ports connect to switches and which ports connect
to stations. A switch removes the VLAN tag from the frame before forwarding the frame to a non-switch-neighbor port.
A VLAN tag contains 2 octets where 3 bits are assigned a priority
function, 12 bits for a VLAN ID, and 1 bit indicating the addresses are in
canonical format. In IEEE 802.3 LANs, the VLAN tag is inserted just before
the length field.
10.7
10.7.1
A serer is a data device that facilitates. The IEEE Ref. 12. calls it a device
or computer system that is dedicated to providing specific facilities to other
devices attached to the network. There are many examples. A network serer
provides special network applications to all users at the network level; that is,
it allows all users to share files more easily and have larger file storage areas
available for their use. Commonly, network servers also carry out a policing
function where all users check in through the server that validates passwords
and establishes firewall. It often is the heart of a LAN, such that when the
server is down, the network is down.
Other servers are more specialized for example, client serer, where the
client is the requesting device, and the server is the supplying device.
Another example, is where the user interface could reside in the client
workstation while the storage and retrieval functions could reside in the
server database. Another case is the terminal serer which is a device that
permits users to access a central mainframe computer. Still another example
360
is the print serer. This is a device that is dedicated to queueing and sending
printer output from the networked computers to a shared printer.
We also have database servers, disk servers, file servers, and mail servers.
10.7.2
REFERENCES
1. Information Processing SystemsLocal Area NetworksPart 4: Token-Passing Bus
Access Method and Physical Layer Specification, ANSIrIEEE Std. 802.4-1990,
IEEE, New York, 1990.
2. Information TechnologyTelecommunications and Information Exchange Between
SystemsLocal and Metropolitan Area NetworksSpecific RequirementsPart 5:
Token Ring Access Method and Physical Layer Specifications, ANSIrIEEE Std.
802.5, 1995 edition, IEEE, New York, 1995.
3. Fiber Distributed Data Interface FDDI . Physical Layer Protocol PHY-2 ., ANSI
X3.231-1994, ANSI, New York, 1994.
4. Fiber Distributed Data Interface FDDI . Token Ring Physical Layer Medium
Dependent, ANSI X3.166-1990, ANSI, New York, 1990.
5. Fiber Distributed Data Interface FDDI . Token Ring Media Access Control2
MAC-2 ., ANSI X.239-1004, ANSI, New York, 1994.
6. Information TechnologyTelecommunications and Information Exchange Between
SystemsLocal and Metropolitan Area NetworksSpecific RequirementsPart 11:
Wireless LAN Medium Access Control MAC . and Physical Layer PHY . Specifications, IEEE Std. 802.11-1997, IEEE, New York, 1997.
7. Code of Federal Regulations: CFR 47Telecommunication, Part 15, U.S. Government Printing Office, Washington DC, October 1996.
8. Information TechnologyTelecommunication and Information Exchange Between
SystemsLocal and Metropolitan Area NetworksSpecific Requirements: Part 11:
REFERENCES
9.
10.
11.
12.
13.
361
Wireless LAN Medium Access Control MAC . and Physical Layer PHY . Specifications, ANSIrIEEE Std. 802.11, IEEE, New York, August 1999.
Roger L. Freeman, Radio System Design for Telecommunications, 2nd edition,
John Wiley, New York, 1997.
Information TechnologyTelecommunications and Information Exchange Between
Systems Local Area Networks Media Access Control MAC . Bridges,
ANSIrIEEE Std. 802.1D, 1st edition, IEEE, New York, July 1993.
Radia Perlman, Interconnections, 2nd ed., Addison-Wesley, Longman, Reading,
MA, 2000.
The IEEE Standard Dictionary of Electrical and Electronic Terms, 6th ed., IEEE
Std. 100, IEEE, New York, 1996.
Uyless Black, TCPrIP and Related Protocols, McGraw-Hill, New York, 1992.
11
WIDE AREA NETWORKS (WANs)
11.1
363
364
the authors decision to cover TCPrIP under wide area networks. It could
have just as well been included in Chapter 10. IP version 6 is then reviewed,
followed by two transport protocols: TCP and User Datagram Protocol
UDP.. This is followed by a short discussion of CLNP Connectionless
Network Protocol.. The concept of VSAT very small aperture terminal.
satellite data networks is covered, as well as a short discussion of the ITU-T
Hypothetical Reference Connection.
11.2
11.2.1
BASIC APPROACHES
Point-to-Point Links
BASIC APPROACHES
365
366
If there are several users on one line, contention might serve using CSMA
carrier sense multiple access, meaning listen before use.. Polling* is
another alternative. Some scheme of error control would also probably be in
order. A link-layer protocol such as HDLC described in Chapter 3 would
solve most of these issues.
Frame relay, which is covered in Chapter 12, might be another alternative
if we were concerned with speeding this up. Such an alternative become
viable if the leased service provides 64 kbps and multiples thereof. channelization. This type of channelization is described in Chapter 7. Care must be
taken here in that T1 DS1. PCM in North America may only provide a clear
56-kbps channel due to the signaling bit appearing in every sixth frame.
Often clear 64-kbps channels must be specially ordered. European E1
systems do not suffer this shortcoming because signaling for an entire
30-channel group appears on a separate channel i.e., Channel 31..
11.2.2
367
Figure 11.4. Time division multiplexing of data. Only 12 users are shown.
fact, Doll Ref. 1. states that often individual time-slot utilization is not much
more than 10%.
A statistical multiplexer statmux. improves utilization by dynamically
assigning time-slot duration to active users. As one would imagine, some
overhead is required to provide the distant end with status information and
time-slot assignment in nearly real time. A notable increase is required in
buffering to avoid overflows, especially when several incoming traffic bursts
coincide. A queueing regime is also required.
Doll Ref. 1. reports the number of users can be increased from two to
four times compared to the equivalent fixed time-slot TDM device. It is
assumed with such increases that the typical user has a bursty traffic profile.
11.3
11.3.1
In Section 11.2 we found that point-to-point and often multipoint links have
periods of inactivity and that they tended to be underutilized. The circuitswitched public telephone network is a prime example of a network that is
underutilized and inefficient. It is sized or dimensioned for the busy hour, a
1-hour period, usually in the morning of a workday, when the network has
the highest traffic activity. After the workday is over, traffic starts to really
368
drop off, and at 2 A.M. it may be 1r500 of what it was during the busy hour.
The design criterion is a 99% probability that a user can successfully
complete a call during the busy hour.
Store-and-forward systems, typically Telex, are very efficient with excellent
utilization factors, even at 2 A.M. However, when a message is submitted
there is no guarantee when it will arrive. Prioritization schemes help. Generally, links connecting store-and-forward nodes can boast nearly 100% utilization, even in off-peak hours.
Packet networks attempt to reach a happy medium: to be efficient with a
high utilization factor and have a good delivery time record, providing nearly
as good service as circuit switching can provide. They were also designed to
better accommodate bursty traffic, typical of a data connectivity.
With the packet concept, data messages are broken down into fixed-length
packets through the process of segmentation on one end of the circuit and
reassembly on the other end. On a particular circuit, packets of many
different users may be transported. Each packet is individually addressed and
transits the network in a store-and-forward fashion. When a packet is
transmitted, the circuit is immediately available for allocation of packets from
other users.
Each node is a packet network has quasi-real-time information on the
status of the network and, in theory, will route a packet on an optimum route
toward its destination. Packets are routed around failed nodes and sectors of
congestion.
Virtual Circuits and Logical Channels. When dealing with a packet network,
we must understand the terms irtual circuit and logical channel. When a
request is received to enter packets into the network, a virtual call is
established. It is something like a dialed switched connection in the telephone network. The connection exists only for the duration of the call. For
that period the network behaves as though there were a fixed path from the
source to the destination. However, in an ideal packet network, each packet
may follow a different route through the network.
For users with high traffic volumes, a permanent virtual circuit PVC. can
be established. This path is similar to a dedicated circuit, eliminating repeated call setup and release procedures.
The concept of a irtual circuit versus a real circuit. we could say derives
from the digital network which is a TDM network. For example, in a DS1
configuration Chapter 7., a caller has use of a circuit for only 1r24th of the
time; for an E1 configuration, 1r32nd of the time. In the analog network, a
user has a physical connectivity 100% of the time.
For packet networks and for ATM networks, logical channel numbers are
used as a quasi-routing tool. Each packet entering the network is assigned a
logical channel number that indicates the session or conersation to which it
belongs. The network can then associate the logical channel number of one
end user and the logical channel number of another. CCITT notes in their
369
definition that a number of logical channels may be derived from a data link
by packet interleaving.
Certainly the most well-known and popular specification for a packet data
network is based on ITU-T Rec. X.25. A general overview of the Recommendation is given in Section 11.3.2.
11.3.2 Packet-Switched and Virtual Connection Based
on ITU-T Rec. X.25
11.3.2.1 Introduction. The X.25 protocol Ref. 2. specifies the rules for
communication between the data user the DTE. and the entry to the public
switched network serving node.. In practice, the electrical interface between
the user and the network is located between the DTE and DCE. The DCE
may be a modem or digital service unit DSU. which connects to the nearest
network node by a transmission line or other media.. The intelligent part of
the X.25 protocol is handled by the DCE and the DSE data switching
equipment. of the node to which the DTE is connected.
The X.25 protocol does not define the internal operation of the data
network i.e., how the packets are routed between various nodes of the
network.. X.25 does precisely define the interface between the network and
the user in such a way as to permit all X.25 DTEs to be connected to any
public data network that conforms to the protocol. X.25 defines three
protocol layers that correspond approximately to the first three layers of the
open system interconnection OSI. reference model. The X.25 architecture is
shown in Figure 11.5.
370
Figure 11.6. X.25 packet embedded in the LAPB frame information field.
371
Figure 11.7. LAPB frame formats. (a) Basic (modulo 8) operation, (b) extended (modulo 128)
operation, and (c) super (modulo 32,768) operation. (From Tables 2-1, 2-2, and 2-3r X.25,
page 8, ITU-T Rec. X.25, Ref. 2.)
372
Figure 11.8. Multilink functional organization. SLP, single-link procedure; MLP, multilink
procedure. (From Figure 2-2r X.25, page 36, ITU-T Rec. X.25, Ref. 2.)
373
Figure 11.9. Multilink frame formats. MLC, multilink control field. (From Table 2-15r X.25,
page 36, ITU-T Rec. X.25, Ref. 2.)
Figure 11.10. Multilink control field format. (From Table 2-16r X.25, page 37, ITU-T Rec.
X.25, Ref. 2.)
374
375
TABLE 11.1
X
X
X
X
X
X
0
1
1
1
0
0
X
X
X
0
0
0
0
1
1
1
0
1
0
0
0
0
0
0
0
1
1
1
0
1
X
X
X
X
X
X
0
1
1
1
0
1
Undefined.
Note 1. A bit that is indicated as X may be set to either 0 or 1, as discussed in the text.
Note 2. When the general format identifier field is contained in the first octet of a packet, this value
is reserved for other applications. When the first octet of a packet is the protocol identifier octet, then
this value is reserved for general format identifier extension.
Source: From Table 5-1r X.25, page 59, Ref. 2.
376
For virtual calls, a logical channel group number and a logical channel
number are assigned during the call setup phase. The range of logical
channels used for virtual calls is agreed upon with the administrations or
service companies at the time of subscription of the service. A similar
procedure is used for permanent virtual circuits.
Packet-Type Identifier. The packet-type identifier is carried in octet number
3 for modulo 8 and modulo 128 operation, and in octet number 4 for super
modulo 32,678 operation. Each packet is identified in accordance with
Table 11.2.
TABLE 11.2
Packet-Type Identifier
Packet Type
Bit Position
From DTE to DCE
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
0
0
0
1
0
1
1
1
1
1
1
1
1
1
X
0
0
X
0
0
X
1
1
X
0
0
X
0
0
X
0
1
X
1
1
0
1
1
X
0
0
X
0
0
X
0
0
0
0
X
0
0
X
0
0
X
0
0
0
0
X
0
0
X
0
0
X
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
1
1
1
1
1
0
0
0
1
1
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
0
1
1
1
1
1
Call request
Call accepted
Clear request
DTE clear confirmation
DTE data
DTE interrupt
DTE interrupt confirmation
DTE RR (modulo 8)
DTE RR (modulo 128) a
DTE RR (modulo 32,768) a
DTE RNR (modulo 8)
DTE RNR (modulo 128) a
DTE RNR (modulo 32,768) a
DTE REJ (modulo 8) a
DTE REJ (modulo 128) a
DTE REJ (modulo 32,768) a
Reset request
DTE reset confirmation
Restart
Restart indication
DCE restart confirmation
Restart request
DTE restart confirmation
Diagnostic
Diagnostic a
a
377
11.3.2.5 A Typical X.25 Packet. Figure 11.12 shows the format of a DTE
and DCE data packet. This is the packet that carries the revenue-bearing
data payload. All the other packet types would be listed as service packets.
Qualifier (Q) Bit. In some operational situations, an indicator bit may be
needed with the user data field to distinguish between two types of informationfor example, user data and control information. When such a mechanism is required, the qualifier Q. bit is used. When the Q bit is not needed,
it is set to binary 0.
Delivery Confirmation Bit. The setting of the delivery confirmation bit D bit.
is used to indicate whether or not the DTE wishes to receive end-to-end
acknowledgment of delivery, for data it is transmitting, by means of the
packet receive sequence number PR..
Sequence Numbering: P(R) and P(S). Each data packet transmitted at the
DTErDCE interface for each direction of transmission in a virtual call or
permanent virtual circuit is sequentially numbered. The sequence numbering
scheme of the packets is performed using modulo 8. The packet sequence
numbers cycle through the entire range of 0 to 7. There are optional
extended packet sequence numbering facility providing a numbering scheme
in modulo 128 and 2 15 in modulo 32,768. For example, for packet send
sequence number P S ., bits 4, 3, and 2 of octet 3, or bits 8 through 2 of octet
3 when extended, or bits 8 through 2 of octet 4 and bits 8 through 1 of octet 5
when superextended are used for indicating the packet send sequence
number P S .. P S . is binary coded and bit 2 is the low-order bit. When
superextended, bit 2 of octet 4 is the low-order bit, and bit 8 of octet 5 is the
high-order bit. Whatever the modulo scheme, the packet sequence numbering scheme is the same in both directions of transmission and is common for
all logical channels at the DTEDCE interface.
Only data packets have the send sequence number P S .. The send
sequence number P S . maintains the integrity of the data because it is a
basic mechanism for the detection of lost packets. The receive sequence
number P R . is used to acknowledge correct receipt of packets and authorize transmission of additional packets.
Flow Control. There are three flow control packets: receive ready RR.,
receive not ready RNR., and reject REJ.. Each of these packets is 3 octets
long in the modulo-8 case; 4 octets long when modulo-128 extended sequence
numbering is used; and six octets long when super modulo 32,768 is used.
The received sequence number P R . acknowledges receipt of packets numbered P R . y 1.
There is also a flow control window defined for each direction of data
transmission of a logical channel used for a virtual call or a permanent virtual
378
Figure 11.12. DTE and DCE data packet formats showing modulo 8 sequence numbering
(upper panel), modulo 128 (middle panel), and modulo 32,678 (lower panel). (From Figure
5-8r X.25, page 75, ITU-T Rec. X.25, Ref. 2.)
379
circuit. The window has a size, W, ranging from 1 to 7. The window size
specifies the number of sequentially numbered packets that a DTE may have
outstanding i.e., unacknowledged .. The standard window size W is 2 for
each direction of transmission. Other window sizes can be negotiated through
the flow control parameter negotiation facility.
When the sequence number P S . of the next data packet to be transmitted is within the window, the DCE is authorized to transmit this data packet
to the DTE. When the sequence number P S . of the next data packet to be
transmitted is outside of the window, the DCE will not transmit the data
packet to the DTE. The DTE follows the same procedure.
When the sequence number P S . of the data packet received by the DCE
is the next in sequence and is within the window, the DCE will accept this
data packet. A received data packet containing a P S . that is out of
sequence i.e., there is a duplicate or gap in the P S . numbering., outside the
window, or not equal to 0 for the first data packet after entering the flow
control ready state d1. is considered by the DCE as a local procedure error.
The DCE will reset the virtual call or permanent virtual circuit. The DTE
follows the same procedure.
The packet receive sequence number P R . conveys across the DTErDCE
interface information from the receiver for the transmission of data packets.
When transmitted across the DTErDCE interface, a P R . becomes the
lower window edge. In this way, additional data packets may be authorized
by the receiver to cross the DTEDCE interface.
The packet receive sequence number P R . is conveyed in data, receive
ready RR., and receive not ready RNR. packets.
The value of P R . received by the DCE must be within the range from
the last P R . received by the DCE up to and including the packet send
sequence number of the next data packet to be transmitted by the DCE.
Otherwise, the DCE will consider the receipt of this P R . as a procedure
error and will reset the virtual call or permanent virtual circuit. The DTE
follows the same procedure.
The receive sequence number P R . is less than or equal to the sequence
number of the next expected data packet and implies that the DTE or DCE
transmitting P R . has accepted at least all data packets numbered up to and
including P R . y 1.
User Data Field Length. The standard maximum user data field length is 128
octets. In addition, other maximum user data field lengths may be offered by
administrations from the following list: 16, 32, 64, 256, 512, 1026, 2048, and
4096 octets. The user data field of data packets transmitted by a DTE or
DCE may contain any number of bits up to the agreed maximum. Rather
than bits, some networks will use octets.
More Data Mark, the M Bit. If a DTE or DCE wishes to indicate a sequence
of more than one packet, it uses a more data mark M bit.. The M bit can be
380
TABLE 11.3 Definition of Two Categories of Data Packets and Network Treatment
of the M and D Bits
Data Packet Sent by Source DTE
Category
Full
0 or 1
No
No
0 (Note 1)
No
No
No
No
Yes
No
Yes
No
Yes
Yes (Note 2)
Yes
No
0
1
Refers to the delivered data packet whose last bit of user data corresponds to the last bit of user data, if
any, that was present in the data packet sent by the source DTE.
Note 1. The originating network will force the M bit to 0.
Note 2 If the data packet sent by the source DTE is combined with other packets, up to and including a
category B packet, the M and D bit settings in the data packet received by the destination DTE will be
according to that given in the two right-hand columns for the last data packet sent by the source DTE that
was part of the combination.
Source: Table 4-1r X.25, page 51, Ref. 2.
381
Figure 11.13. X.25 call setup (upper) and call clearing (lower) state diagrams. (From Figure
B.2r X.25, page 123, ITU-T Rec. X.25, Ref. 2.)
382
383
Figure 11.14. Call request and incoming call packet format. The upper diagram deals with
modulo 8 and modulo 128 operation; the lower diagram deals with modulo 32,768 operation.
(From Figure 5-4r X.25, page 67, ITU-T Rec. X.25, Ref. 2.)
384
Figure 11.15. Format of the address block when the A bit is set to 0, non-TOAr NPI
addressing. Note: The figure is drawn assuming the number of semi-octets present in the
called DTE address field is odd and the number of semi-octets in the calling DTE address field
is even. (From Figure 5-1r X.25, page 62, ITU-T Rec. X.25, Ref. 2.)
Figure 11.16. Format of the address block when the A bit is set to 1, TOAr NPI addressing.
Note: The figure is drawn assuming the number of semi-octets present in the called DTE
address field is odd and the number of semi-octets in the calling DTE address field is even.
(From Figure 5-2r X.25, page 63, ITU-T Rec. X.25, Ref. 2.)
In either case, we see that there are four basic elements to the addressing
broken down into two groups: address length fields and address fields. There
is one each for the calling DTE and the called DTE. Address length fields
are each 4 bits long, occupying the first octet in the address block see
Figures 11.15 and 11.16..
In these address formats, the ITU-T Organization has had to turn to using
the term semi-octet, an octet of less than 8 bits, in this case 4 bits. The length
indicators are binary encoded, and bit 1 is the low-order bit of the indicator.
The address fields themselves have three subfields: type of address TOA.
subfield, numbering plan identification NPI. subfield, and the address digits
subfield. The first two subfields are at the beginning of the address and are
binary-encoded. These provide information such as whether the number is
international, network-dependent, national, or alternative address and
whether it is based on ITU-T Rec. E.164 or X.121.
When the type of address subfield indicates an address other than an
alternative address, the other semi-octets of a DTE address are digits, coded
385
Figure 11.17. Logical channel assignment diagram. LCN, logical channel number; LIC,
lowest incoming channel; HIC, highest incoming channel; LTC, lowest two-way channel; HTC,
highest two-way channel; LOC, lowest outgoing channel; HOC, highest outgoing channel.
(From Figure A.1r X.25, page 120, ITU-T Rec. X.25, Ref. 2.)
in binary-coded decimal with bit 5 or 1 being the low-order bit of the digit.
Starting from the high-order digit, the address digits are coded in semioctets. In each octet, the higher-order digit is coded in bits 8, 7, 6, and 5.
When present, the calling DTE address field starts on the first semi-octet
following the end of the called DTE address field. Consequently, when the
number of semi-octets of the called DTE address field is odd, the beginning
of the calling DTE address field, when present, is not octet-aligned.
When the total number of semi-octets in the called and calling DTE
address field is odd, a semi-octet with zeros in bits 4, 3, 2, and 1 is inserted
after the calling DTE address field in order to maintain octet alignment.
11.3.2.8 Assignment of Logical Channels. Logical channel assignment is
based on the coding of the second semi-octet of the first field of the X.25
packet format see Figure 11.12. and the second octet, for a total of 12 binary
digits or 4096 binary digit combinations. The assignment is carried out in a
manner similar to that of telephone trunks in the way it is handled at each
end of a connection. This is shown in Figure 11.17. One end of the
connection selects channels from the low end of the channel assignment,
starting with channel 0, then 1, 2, 3 and so forth. The other end of the circuit
selects starting from the highest-numbered channelin this case channel
number 4095, then 4094, and then 4093 and so on.
386
r INTERNET
11.4 TRANSMISSION CONTROL PROTOCOLr
r IP)
PROTOCOL (TCPr
11.4.1
Figure 11.18. How TCPr IP and associated DoD protocols relate to the OSI reference model.
387
Figure 11.19. Connecting one LAN to another via a WAN, employing IP.
11.4.2
TCPr
r IP and Data-Link Layers
388
Figure 11.20. The incorporation of upper-layer PDUs into a data-link layer frame showing the
relationship of TCP and IP.
number of popular data-link layer protocols. Among these we find the IEEE
802 series, Ethernet, ARCNET for LANs, and X.25 for WANs.
Typical IP encapsulation is shown in Figure 11.20. The figure illustrates
how upper OSI layers are encapsulated with TCP and IP header information
and then incorporated into the data-link layer frame.
For the case of IEEE 802 series LAN protocols, advantage is taken of the
LLC common to all 802 protocols. The LLC extended header contains
the subnetwork access protocol SNAP. such that we have 3 octets for the
LLC header and 5 octets in the SNAP. The LLC header has its fields fixed
as follows:
DSAP s 10101010
SSAP s 10101010
Control s 00000011
The 5 octets in the SNAP have three assigned for protocol ID or organizational code and two for EtherType. Typical EtherType assignments are
shown in Table 11.4. EtherType refers to the general class of LANs based on
CSMArCD.
Figure 11.21 shows how OSI relates to TCPrIP and IEEE 802, and Figure
11.22 illustrates an IEEE 802 frame incorporating TCP, IP, and LLC.
Addressing is resolved by a related TCPrIP protocol called address
resolution protocol ARP., which, typically, performs the mapping of the
32-bit IP4 internet address into a 48-bit IEEE 802 address.
Another interface problem may be the recommended minimum and absolute maximum IP datagram lengths. The total length is the length of the
datagram, measured in octets, including internet header and data. The total
length field in the IP header allows the length of a datagram to be up to
TABLE 11.4
389
EtherType Assignments
Ethernet Decimal
Hex
Description
512
513
1,536
2,048
2,049
2,050
2,051
2,052
2,053
2,054
2,055
4,096
21,000
24,577
24,578
24,579
24,580
24,582
24,583
32,773
32,784
32,821
32,824
32,823
0200
0201
0600
0800
0801
0802
0803
0804
0805
0806
0807
1000
5208
6001
6002
6003
6004
6005
6006
8005
8010
8035
8038
8098
XEROX PUP
PUP Address Translation
XEROX NS IDP
DOD Internet Protocol (IP)
X.75 Internet
NBS Internet
ECMA Internet
Chaosnet
X.25 level 3
Address Resolution Protocol (ARP)
XNS Compatibility
Berkeley Trailer
BBN Simnet
DEC MOP Dump r Load
DEC MOP Remote Console
DEC DECnet Phase IV
DEC LAT
DEC
DEC
HP Probe
Excelan
Reverse ARP
DEC LANBridge
Appletalk
Source: Reference 8.
Figure 11.21. How TCPr IP working with IEEE 802 relates to OSI. ULP, upper-layer protocol.
390
Figure 11.22. An IEEE 802 frame showing LLC and TCPr IP functions.
65,535 octets. Such long datagrams are impractical for most hosts and
networks. All hosts should be prepared to accept datagrams up to 576 octets
whether they arrive whole or in fragments.. It is recommended that hosts
only send datagrams larger than 576 octets if they have assurance that the
destination is prepared to accept larger datagrams.
The number 576 was selected to allow a reasonable-sized data block to be
transmitted in addition to the required header information. For example, this
size allows a data block of 512 octets plus 64 header octets to fit in a
datagram. The maximum internet header is 60 octets, and a typical internet
header is 20 octets, allowing a margin for headers of higher level protocols.
11.4.3
391
User data from upper-layer protocols are passed to the IP layer. The IP
layer examines the network address IP address . for a particular datagram
and determines if the destination node is on its own local area network or
some other network. If it is on the same network, the datagram is forwarded
directly to the destination host. If it is on some other network, it is forwarded
to the local IP router gateway.. The router, in turn, examines the IP address
and forwards the datagram as appropriate. Routing is based on a lookup
table residing in each router or gateway. See Section 11.4.4.2 for a more
detailed discussion of IP routing..
11.4.4
Detailed IP Operation
392
octets. Thus its length is 5 or simply 20r4 32 bits or 4 octets per unit;
5 = 4 s 20..
Type of Service. TOS is rarely used and usually set to 0 8 bits.. The TOS,
when employed, is used to identify several QoS parameters provided by IP.
The 8-bit field is broken down into four active groupings, and the last
two bits are reserved. The first is precedence, which consists of three bits
as follows:
000
010
100
110
Routine
Immediate
Flash override
Internetwork control
001
011
101
111
Priority
Flash
CEITICrECP
Network control
The three bits for precedence are followed by three 1-bit fields:
D delay:
T throughput:
R Reliability:
0 s normal, 1 s low
0 s normal, 1 s high
0 s normal, 1 s high
For example, if there is more than one route to a destination, the router
could read this field to pick a route. This becomes important in open shortest
path first OSPF. routing protocol, which was the first IP protocol to take
advantage of this.
393
Total Length. The total length field specifies the total length of an IP
datagram not packet. in octets. It includes the length of the header. There
are 16 bits in the field. Therefore the maximum length of a datagram is
2 16 y 1 or 65,535 octets; the default length, as we know, is 576 octets. IP6
allows a concept known as the jumbogram to manage very long files.
The IP folks call segmentation fragmentation. It allows for the breaking up
of long files into fragments. The next three fields in the IP header deal
with fragmentation. These are:
Identifier: 16 bits
Flags: 3 bits
Fragment offset: 3 bits
The term fragment suggests part of a whole; the identifier field identifies a
fragment as part of a complete datagram, along with the source. It indicates
which datagram fragments belong together so datagrams do not get mismatched. The receiving IP layer uses this field and the source IP address to
identify which fragments belong together.
Flags 3 bits.. Flags indicate whether more fragments are to arrive or no
more data is to be sent for that particular datagram. They are coded in
sequence as follows:
Bit 0 s reserved
Bit 1 s 0 s fragment; 1 s do not fragment
Bit 2 s M bit . s 0 s last fragment; 1 s more fragments to follow
It should be noted that as a fragment datagram passes through the network it
can be further fragmented. If a router receives a packet that must be
fragmented and the dont fragment bit is set to 1, then it will discard the
packet and send an error message via the ICMP protocol.
Fragment Offset (or just offset). The fragmentation offset field contains a
value that specifies the relative position of the fragment in the original
datagram. The value is initialized at 0 and subsequently set to the proper
number whenrif the router fragments the data. The offset value is measured
in units of 8 octets 64 bits..
Using the total length and the fragment offset fields, IP can reconstruct a
fragmented datagram and deliver it to the upper-layer software. The total
length field indicates the total length of the original packet, and the offset
field indicates to the node that is reassembling the packet the offset from the
beginning of the packet. It is at this point that the data will be placed in the
data segment to reconstruct the packet.
394
Time to Live TTL. 8 bits.. This indicates the amount of time that a
datagram is allowed to stay in the network. Each router in the network
through which the datagram passes is required to check this field and discard
it if the TTL values equals 0. A router is also required to decrement this field
in each datagram it processes. In actual implementations, the TTL field is a
number of hops value. Therefore, when a datagram proceeds through a
router, it has completed one hop and the field value is decremented by one.
Implementation of IP may use a time counter in this field and decrement the
value in 1-s decrements.
The TTL field can be used by routers to prevent endless loops. It can also
be used by hosts to limit the lifetime that segments have in the network.
Network management facilities employing, say, SNMP* might wish to set the
TTL values for diagnostic purposes.
Protocol 8 bits.. The protocol field identifies the next-level protocol above
the IP that is to receive the datagram at the final host destination. It is
similar to the type field found in EthernetrCSMArCD. Table 11.5, taken
from RFC 1060 Ref. 10. shows the protocol decimal numbering scheme and
the corresponding protocol for each number. It identifies the most widely
used upper-layer protocols. The most common protocols we would expect
above the IP layer are TCP and UDP.
Header Checksum 16 bits.. This detects errors in the header by means of
cyclic redundancy check. CRC is described in Sections 4.4 and 4.5. If an error
does occur in the header, the router notifies the originating host via an
ICMP message.
Source Address, Destination Address. Each of these fields is 32 bits long.
There are two types of network addressing schemes used with IP Ref. 9. see
RFC 1918.:
Classless. The full address range all 32 bits. can be used without regard to
bit reservation classes. This type of addressing scheme is basically not
used in direct host assignment. The scheme is directly applied to the
routing tables used on the Internet and ISPs.
Classful. Where the 32-bit address is segmented into specific classes
denoting networks and hosts.
The IP address structure is shown in Figure 11.24. It shows four address
formats in which the lengths of the component fields making up the address
field change with each of the different formats. These component fields are
*SNMP stands for simple network management protocol, a member of the TCPrIP family of
protocols. See Chapter 18.
ICMP stands for internet control message protocol. See Section 11.4.4.3.
TABLE 11.5
Decimal
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
3460
61
62
63
64
65
66
67
68
69
70
71
7275
76
77
78
79
80254
255
CFTP
SAT-EXPAK
MIT-SUBN
RVD
IPPC
SAT-MON
IPCV
BRSAT-MON
WB-MON
WB-EXPAK
Protocol
Reserved
Internet Control Message Protocol
Internet Group Management Protocol
Gateway-to-Gateway Protocol
Unassigned
Stream
Transmission Control Protocol
UCL
Exterior Gateway Protocol
Interior Gateway Protocol
BBN-RCC Monitoring
Network Voice Protocol
PUP
ARGUS
EMCON
Cross Net Debugger
Chaos
User Datagram Protocol
Multiplexing
DCN Measurement Subsystems
Host Monitoring Protocol
Packet Radio Monitoring
XEROX NS IDP
Trunk-1
Trunk-2
Leaf-1
Leaf-2
Reliable Data Protocol
Internet Reliable TP
ISO Transport Class 4
Bulk Data Transfer
MFE Network Services
MERIT Internodal Protocol
Sequential Exchange
Unassigned
Any host internal protocol
CFTP
Any local network
SATNET and Backroom EXPAK
MIT Subnet Support
MIT Remote Virtual Disk
Internet Plur. Packet Core
Any distributed file system
SATNET Monitoring
Unassigned
Packet Core Utility
Unassigned
Backroom SATNET Monitoring
Unassigned
Wideband Monitoring
Wideband EXPAK
Unassigned
Reserved
Source: RFC 1060 (Ref. 10 ) and Internet Protocol Transition Workbook (Ref. 11 ).
395
396
Figure 11.24. Internet protocol address formats. (RFC 791). Note that an IP address has
three sections from left to right: Class (1, 2, 3, or 4 bits), Network ID, and Host ID. This holds
for both destination and source addresses. ( Note: This is basis of classful addressing.)
397
398
399
There are two routing protocols used with IP. These are RIP routing
information protocol. and OSPF open shortest path first..
RIP is known as a distance ector protocol. As one might imagine, it uses a
database that we call a routing table. It contains two fields needed for
routing: a vector a known IP address . and distance, meaning how many
routers away is the destination. There are other fields in the table, but these
are the basic ones which provide the essential concept of the protocol. In
other words, RIP simply builds a table or database . in memory that contains
all the routes that it has learned and the distance to that network. A router
associates a cost with those interfaces. The cost is initially set to 1. As other
routers report their topology and connectivity regarding locally attached
subnets, all the information needed will be stored in each routers database
routing table.. Routing will then be based on cost, which really equates to
hop count.
OSPF Ref. 13. is a link state protocol. It maintains the state of every link
in the domain. Information is flooded to all routers in the domain. Flooding
is discussed in Chapter 10. Flooding is the process of receiving information
on one port and retransmitting to all other active ports of a router. This is
how routers receive the same information. The information is stored in a
router database that is called a link-state database. This database is identical
on every router in an autonomous system. Based on information from the
database, the Dykstra algorithm Ref. 9. is employed which seeks the
shortest-path tree based on metrics. It uses itself as the root of the tree. It is
able to build a routing table based on shortest-path routing.
11.4.4.3 Internet Control Message Protocol (ICMP). ICMP Ref. 14. is
used as an adjunct to IP when there is an error in datagram processing.
ICMP uses the basic support of IP as if it were a high-level protocol.
However, ICMP is actually an integral part of IP and is implemented in every
IP module.
ICMP messages are sent in several situationsfor example, when a
datagram cannot reach its destination, when a gateway does not have the
buffering capacity to forward a datagram, and when the gateway can direct
the host to send traffic on a shorter route.
ICMP messages typically report errors in the processing of datagrams. To
avoid the possibility of infinite regress of messages about messages, and so
on, no ICMP messages are sent about ICMP messages. Also ICMP messages
are only sent about errors in handling fragment zero of fragmented datagrams. Note: Fragment zero has the fragment offset equal to zero..
Message Formats. ICMP messages are sent using the basic IP header see
Figure 11.23.. The first octet of the data portion of the datagram is an
ICMP-type field. The data portion is the last field at the bottom of Figure
11.23. The ICMP-type field determines the format of the remaining data.
Any field labeled unused is reserved for later extensions and is fixed at zero
400
when sent, but receivers should not use these fields except to include them
in the checksum.. Unless otherwise noted under individual format descriptions, the values of the internet header fields are as follows:
Version: 4.
IHL internet header length.: length in 32-bit words.
Type of service: 0.
Total length: length of internet header and data in octets.
Identification, flags, and fragment offset: used in fragmentation, as in
basic IP described previously.
Time to live: in seconds; as this field is decremented at each machine in
which the datagram is processed, the value in this field should be at
least as great as the number of gateways which this datagram will
traverse.
Protocol: ICMP s 1.
Header checksum: The 16-bit ones complement of the ones complement sum of all 16-bit words in the header. For computing the checksum, the checksum field should be zero. The reference RFC Ref. 14.
RFC 792. states that this checksum may be replaced in the future.
Source address: The address of the gateway or host that composes the
ICMP message. Unless otherwise noted, this is any of a gateways
addresses.
Destination address: The address of the gateway or host to which the
message should be sent.
401
Figure 11.26. A typical ICMP message format: destination unreachable message. Note: The
relevant RFC for ICMP is RFC 792 (Ref. 14).
ICMP Fields
Type 3
Code: 0 s net unreachable
1 s host unreachable
2 s protocol unreachable
3 s port unreachable
4 s fragmentation needed and DF set
5 s source route failed
Checksum: as above
Internet header q 64 bits of data datagram
The Internet Header Plus the First 64 Bits of the Original Datagrams Data.
These data are used by the host to match the message to the appropriate
process. If a higher-level protocol uses port numbers, they are assumed to be
in the first 64 data bits of the original datagrams data.
Description. If, according to the information in the gateways routing
tables, the network specified in the internet destination field of a datagram is
unreachable e.g., the distance to the network is infinity., the gateway may
send a destination unreachable message to the internet source host of the
datagram. In addition, in some networks the gateway may be able to
determine if the internet destination host is unreachable. Gateways in these
networks may send destination unreachable messages to the source host
when the destination host is unreachable.
If, in the destination host, the IP module cannot deliver the datagram
because the indicated protocol module or process port is not active, the
destination host may send a destination unreachable message to the source
host.
Another case is when a datagram must be fragmented to be forwarded by
a gateway, yet the Dont Fragment flag is on. In this case the gateway must
discard the datagram and may return a destination unreachable message.
It should be noted that Codes 0, 1, 4, and 5 may be received from a
gateway; Codes 2 and 3 may be received from a host.
Section 11.4.4.3 is based on RFC 792 Ref. 14..
402
Figure 11.27. Protocol layers showing the relationship of TCP with other layered protocols.
11.4.5
11.4.5.1 TCP Defined. TCP Refs. 15 and 16. was designed to provide
reliable communication between pairs of processes in logically distinct hosts
on networks and sets of interconnected networks. TCP operates successfully
in an environment where network congestion and the loss, damage, duplication, or misorder of data can occur. This robustness in spite of unreliable
communications media makes TCP well-suited to support commercial, military, and government applications. TCP appears at the transport layer of the
protocol hierarchy. Here, TCP provides connection-oriented data transfer
that is reliable, ordered, full-duplex, and flow-controlled. TCP is designed to
support a wide range of ULPs.* The ULP can channel continuous streams of
data through TCP for delivery to peer ULPs. The TCP breaks the streams
into portions which are encapsulated together with appropriate addressing
and control information to form a segmentthe unit of exchange between
TCPs. In turn, the TCP passes the segments to the network layer for
transmission through the communication system to the peer TCP.
As shown in Figure 11.27, the layer below the TCP in the protocol
hierarchy is commonly the IP layer. The IP layer provides a way for the TCP
to send and receive variable-length segments of information enclosed in
internet datagram envelopes. The internet datagram provides a means for
addressing source and destination TCPs in different networks. The IP also
deals with fragmentation and reassembly of TCP segments required to
*ULP stands for upper layer protocol. Typically, there are three ULPs: file transfer protocol
FTP., simple mail transfer protocol SMTP., telnet protocol. See Figure 11.18.
403
achieve transport and delivery through the multiple networks and interconnecting gateways. The IP also carries information on the precedence, security
classification, and compartmentation of the TCP segments, so this information can be communicated end-to-end across multiple networks.
11.4.5.2 TCP Mechanisms. TCP builds its services on top of the network
layers potentially unreliable services with mechanisms such as error detection, positive acknowledgments, sequence numbers, and flow control. These
mechanisms require certain addressing and control information to be initialized and maintained during data transfer. This collection of information is
called a TCP connection. The following paragraphs describe the purpose and
operation of the major TCP mechanisms.
PAR Mechanism. TCP uses a positive acknowledgment with retransmission
PAR. mechanism to recover from the loss of a segment by the lower layers.
The strategy with PAR is for a sending TCP to retransmit a segment at timed
intervals until a positive acknowledgment is returned. The choice of retransmission interval affects efficiency. An interval that is too long reduces data
throughput, whereas one that is too short floods the transmission media with
superfluous segments. In TCP, the timeout is expected to be dynamically
adjusted to approximate the segment round-trip time plus a factor for
internal processing; otherwise performance degradation may occur. TCP uses
a simple checksum to detect segments damaged in transit. Such segments are
discarded without being acknowledged. Hence, damaged segments are treated
identically to lost segments and are compensated for by the PAR mechanism.
TCP assigns sequence numbers to identify each octet of the data stream.
These enable a receiving TCP to detect duplicate and out-of-order segments.
Sequence numbers are also used to extend the PAR mechanism by allowing a
single acknowledgment to cover many segments worth of data. Thus, a
sending TCP can still send new data although previous data have not been
acknowledged.
Flow Control Mechanism. TCPs flow control mechanism enables a receiving
TCP to govern the amount of data dispatched by a sending TCP. The
mechanism is based on a window which defines a contiguous interval of
acceptable sequence-numbered data. As data are accepted, TCP slides the
window upward in the sequence number space. This window is carried
in every segment, enabling peer TCPs to maintain up-to-date window
information.
Multiplexing Mechanism. TCP employs a multiplexing mechanism to allow
multiple ULPs within a single host and multiple processes in a ULP to use
TCP simultaneously. This mechanism associates identifiers, called ports, to
ULP processes accessing TCP services. A ULP connection is uniquely identified with a socket, the concatenation of a port and an internet address. Each
connection is uniquely named with a socket pair. This naming scheme allows
404
405
406
407
8. ULP A passes 20 octets of data to TCP A for transfer across the open
connection to ULP B.
9. TCP A packages the data in a segment marked with current A
sequence number.
10. After validating the sequence number, TCP B accepts the data and
delivers it to ULP B.
11. TCP B acknowledges all 20 octets of data with the ACK set to the
sequence number of the next data octet expected.
12. ULP B passes 125 bytes of data to TCP B for transfer to ULP A.
13. TCP B packages the data in a segment marked with the B sequence
number.
14. TCP A accepts the segment and delivers the data to ULP A.
15. TCP A returns an ACK of the received data marked with the sequence number of the next expected data octet. However, the segment
is lost by the network and never arrives at TCP B.
16. TCP B times out waiting for the lost ACK and retransmits the
segment. TCP A receives the retransmitted segment, but discards it
408
because the data from the original segment have already been accepted. However, TCP A re-sends the ACK.
17. TCP B gets the second ACK.
Turn to Figure 11.30.
18. ULP A closes its half of the connection by issuing a CLOSE to TCP A.
19. TCP A sends a segment marked with a CLOSE control flag, called a
FIN, to inform TCP B that ULP A will send no more data.
20. TCP B gets the FIN and informs ULP B that ULP A is closing.
21. ULP B completes its data transfer and closes its half of the connection.
22. TCP B sends an ACK of the first FIN and its own FIN to TCP A to
show ULP Bs closing.
23. TCP A gets the FIN and the ACK, then responds with an ACK to
TCP B.
24. TCP A informs ULP A that the connection is closed. Not pictured. .
TCP B receives the ACK from TCP A and informs ULP B that the
connection is closed.
11.4.5.6 TCP Header Format. The TCP header format is shown in Figure
11.31. It should be noted that TCP works with 32-bit segments.
Figure 11.31. TCP header format. Note that one tick mark represents one bit position.
409
Source Port. The port represents the source ULP initiating the exchange.
The field is 16 bits long.
Destination Port. This is the destination ULP at the other end of the
connection. This field is also 16 bits long.
Sequence Number. Usually, this value represents the sequence number of
the first data octet of a segment. However, if an SYN is present, the
sequence number is the initial sequence number ISN. covering the SYN;
the first data octet is then numbered SYN q 1. The SYN is the syncrhonize control flag. It is the opening segment of a TCP connection. SYNs
are exchanged from either end. When a connection is to be closed, there is
a similar FIN sequence exchange.
Acknowledgment Number. If the ACK control bit* is set bit 2 of the 6-bit
control field., this field contains the value of the next sequence number
that the sender of the segment is expecting to receive. This field is 32 bits
long.
Data Offset. This field indicates the number of 32-bit words in the TCP
header. From this value the beginning of the data can be computed. The
TCP header is an integral number of 32 bits long. The field size is 4 bits.
Reserved. This is a field of 6 bits set aside for future assignment. It is set to
zero.
Control Flags. The field size is 6 bits covering six items 1 bit per item.:
1.
2.
3.
4.
5.
6.
Window. The number of data octets beginning with the one indicated in the
acknowledgment field which the sender of this segment is willing to
accept. The field is 2 octets in length.
Checksum. The checksum is the 16-bit ones complement of the ones complement sum of all 16-bit words in the header and text. The checksum also
covers a 96-bit pseudo-header conceptually prefixed to the TCP header.
This pseudo-header contains the source address, the destination address,
the protocol, and TCP segment length.
*ACK is a control bit acknowledge. occupying no sequence space, which indicates that the
acknowledgment field of this segment specifies the next sequence number the sender of this
segment is expecting to receive, thereby acknowledging receipt of all previous sequence
numbers.
410
Urgent Pointer. This field indicates the current value of the urgent pointer
as a positive offset from the sequence number in this segment. The urgent
pointer points to the sequence number of the octet following the urgent
data. This field is only to be interpreted in segments with the URG control
bit set. The urgent point field is two octets long.
Options. This field is variable in size; and, if present, options occupy space at
the end of the TCP header and are a multiple of 8 bits in length. All
options are included in the checksum. An option may begin on any octet
boundary. There are two cases of an option:
1. Single octet of option kind
2. An octet of option kind, an octet of option length, and the actual
option data octets
Options include end of option list, no-operation, and maximum
segment size.
Padding. The field size is variable. The padding is used to ensure that the
TCP header ends and data begin on a 32-bit boundary. The padding is
composed of zeros.
11.4.5.7 TCP Entity State Diagram. Figure 11.32 summarizes TCP operation. It shows a TCP state diagram.
Section 11.4 is based on various RFCs, MIL-STD-1778, and Refs. 9, 15, and 16.
11.4.6
411
identify a host. The routing prefix is a tool for building routing tables. End
stations make the prefix similar to the mask described in Chapter 10.
Existing protocols may use IPv6 addresses as well. However, they will have
to change to understand 128-bit addressing as one might imagine.
11.4.6.2 IPv6 Header. Figure 11.33 illustrates the IPv6 header. Compare
this to Figure 11.23, which shows the IPv4 header. All the fields have been
changed except the Vers version. field.
The following is a description of the IPv6 header fields:
412
413
The service interface to the IPv6 service within a node must provide a
means for an upper-level protocol to supply the value of the Traffic
Class bits in packets originated by that upper-layer protocol. The default
value must be zero for all 8 bits.
Nodes that support a specific experimental or eventual standard . use of
some or all of the Traffic Class bits are permitted to change the value of
those bits in packets that they originate, forward or receive, as required
for that specific use. Nodes should ignore and leave unchanged any bits
of the Traffic Class field for which they do not support a specific use.
An upper-layer protocol must not assume that the value of the Traffic
Class bits in a received packet are the same as the value sent by the
packets source.
Flow Labels. The 20-bit Flow Label field in the IPv6 header may be used by
a source to label sequences of packets for which it requests special handling
by IPv6 routers, such as nondefault QoS or real time service. This aspect of
IPv6 is still experimental and subject to change as the requirements for flow
support in the Internet become clearer. Hosts or routers that do not support
the functions of the Flow Label field are required to set the field to zero
when originating a packet, pass the field on unchanged when forwarding a
packet, and ignore the field when receiving a packet.
IPv6 Addressing. There are three types of addresses:
Unicast. An identifier for a single interface. A unique address delivered to
a single notation.
Anycast. New for IP, an anycast address is an identifier for a set of
interfaces typically belonging to different nodes.. This is similar to
multicast, but a packet sent to an anycast address is delivered to one of
the interfaces identified by that address the nearest one, according
to the routing protocols measure of distance ..
Multicast. An identifier for a set of interfaces typically belonging to
different nodes.. A packet sent to a multicast address is delivered to all
interfaces identified by that address.
The broadcast address is not defined in IPv6. It was superseded by the
multicast address Ref. 9..
IPv6 is based on RFC 2460 Ref. 17..
414
11.5
11.5.1
The UDP datagram header format is shown in Figure 11.34. The following is
a description of the fields in Figure 11.34.
Source Port is an optional field, when meaningful, that indicates the port
of the sending process. It may be assumed to be the port to which a reply
should be addressed in the absence of any other information. If not used, a
value of zero is inserted.
Destination Port has a meaning within the context of a particular IP
destination address.
Length is the length in octets of this user datagram including this header
and the data field. There is minimum value of length of eight octets..
Checksum is the 16-bit ones complement of the ones complement sum of
a pseudo-header of information from the IP header, the UDP header, and
the data, padded with zero octets at the end if necessary . to make a multiple
of 2 octets.
The pseudo-header conceptually prefixed to the UDP header contains the
source address, the destination address, the protocol, and the UDP length. It
is shown in Figure 11.35. This information gives protection against misrouted
datagrams. The checksum procedure is the same as used in TCP.
If the computed checksum is zero, it is transmitted as all ones the
equivalent in ones complement arithmetic .. An all-zero transmitted check-
Figure 11.34. UDP datagram header format. (From RFC 768, Ref. 18.)
415
sum value means that the transmitter generated no checksum for debugging
or for higher level protocols that dont care..
User Interface. A user interface allows the creation of new receive port. It
also allows receive operations on the receive ports that return the data octets
and an indication of source port and source address, and an operation that
allows a datagram to be sent, specifying the data, source, and destination
ports and addresses to be sent.
IP Interface. The UDP module must be able to determine the source and
destination internet addresses and the protocol field from the internet
header. One possible UDPIP interface would return the whole internet
datagram including all of the internet header in response to a receive
operation. Such an interface would also allow the UDP to pass a full internet
datagram complete with header to the IP to send. The IP would verify
certain fields for consistency and compute the internet header checksum.
Protocol Application. The major uses of this protocol is the Internet Name
Server and the Trivial File Transfer. This is protocol number 17 21 octal.
when used in the internet protocol. Other protocol numbers are listed in
RFC 762.
Section 11.5 consists of abstracts from RFC 768.
11.6
416
Figure 11.36. CLNP frame format, DT PDU. (From Figure 10, page 21, ISO-8473, Ref. 19.)
There are two different frame types used with CLNP. These are Data DT .
PDU and Error Report PDU. The formats for these frames are illustrated in
Figures 11.36 and 11.37. Each consists of a fixed part and a variable part. The
fixed part consists of those fields from the Network Layer Protocol Identifier
through the Checksum.
11.6.2
Network Layer Protocol Identifier 1 octet.. The value of this field is set to
binary 1000 0001 to identify this network layer protocol as ISO 8473. The
value of this field is set to binary 0000 0000 to identify the inactive layer
protocol subset.
417
Figure 11.37. CLNP frame format, Error Report PDU. (From Figure 12, page 22, ISO-8473,
Ref. 19.)
Length Indicator. The length is indicated by a binary number, with a maximum value of 254 binary 1111 1110.. The length indicated is the length in
octets of the header. The value 255 1111 1111. is reserved for possible future
extensions.
Version r Protocol Identifier Extension 1 octet.. The value of this field is
binary 0000 0001, which identifies the standard Version 1 of ISO 8473.
PDU Lifetime 1 octet.. The PDU Lifetime field is encoded as a binary
number representing the remaining lifetime of the PDU, in units of 500 ms.
Flags
Segmentation Permitted (SP) 1 bit.. The Segmentation Permitted flag indicates whether segmentation is permitted. Its value is determined by the
originator of the PDU and cannot be changed by any other network entity for
the lifetime of the Initial PDU and any Derived PDUs.
418
419
Address Part
Destination and Source Address Variable length.. The Destination and
Source Address used by this protocol are Network Service Access Point
address as defined in ISO 8348rAdd.2. The Destination and Source Addresses are of variable length. The Destination and Source Address fields are
encoded as Network Protocol Address Information using the Preferred
Binary Encoding defined in Section 8.3.1 of ISO 8348rAdd.2.
The field consists of a subfield 1 octet long which is the Destination
Address Length Indicator, then the Destination Address itself of variable
length. Then there is the Source Address Length Indicator subfield that is
1 octet long. This is followed by the Source Address itself of variable
length.
Segmentation Part. If the Segmentation Permitted Flag in the Fixed Part of
the PDU Header is set to 1, the segmentation part of the header will be
present. If the Segmentation Permitted flag is set to 0, the segmentation part
is not present the nonsegmenting protocol subset is in use..
The Segmentation part consists of three fields, each 2 octets long. These
are Data Unit Identifier, Segment Offset, and Total Length. These three
fields are described as follows.
Data Unit Identifier 2 octets.. The Data Unit Identifier identifies an Initial
PDU and hence, its Derived PDUs. so that a segmented data unit may be
correctly reassembled.
Segment Offset 2 octets.. For each Derived PDU, the Segment Offset field
specifies the relative position of the segment contained in the Data Part of
the Derived PDU with respect to the start of the Data Part of the Initial
PDU. The offset is measured in units of octets. The offset of the first
segment and hence the initial PDU. is 0, an unsegmented Initial . PDU has
a segment offset value of 0. The value of this field is a multiple of 8.
PDU Total Length 2 octets.. The Total Length Field specifies the entire
length of the Initial PDU in octets, including both the header and data. This
field is not changed for the lifetime of the Initial PDU and hence its Derived
PDUs..
Options Part. If the options part is present, it may contain one or more
parameters. The number of parameters that may be contained in the options
part is constrained by the length of the options part, which is determined by
the formula
Options part length s PDU header length
y length of fixed part q length of address part
q length of segmentation part .
and by the length of the individual optional parameters.
420
TABLE 11.6
Octets
Field
n
nq1
nq2
to
nqmq1
Parameter Code
Parameter Length (e.g., m )
Parameter Value
Parameters defined in the options part may appear in any order. Duplication of options is not permitted. Receipt of a Protocol Data Unit with a
duplicated option should be treated as a protocol error. The rules governing
the treatment of protocol errors are described in Section 6.10 Error Reporting Function. of the reference document.
The encoding parameters contained within the options part are listed in
Table 11.6.
The Parameter Code field 1 octet. is encoded in binary and provides for
a maximum of 255 different parameters. No parameter code uses bits 8
and 7 with the value 00, so the actual maximum number of parameters is
lower. A parameter code of 255 binary 1111 1111. is reserved for possible
extensions.
The Parameter Length 1 octet. field indicates the length, in octets, of the
Parameter Value field. The length is indicated by a positive binary number, m,
with a theoretical maximum value of 254. The practical maximum value of m
is lower. For example, in the case of a single parameter contained within the
options part, 2 octets are required for the parameter code and the parameter
length indicators. Thus, the value of m is limited to
m s 252 y length of fixed part q length of address part
qlength of segmentation part .
Accordingly, for each successive parameter the maximum value of m decreases.
The parameter field contains the value of the parameter identified in the
parameter code field. The following parameters are permitted in the options
part.
Parameters Permitted
Padding. The padding parameter is used to lengthen the PDU header to a
convenient size as described in Section 6.12 of the reference document.
Parameter Code:
Parameter Length:
Parameter Value:
1100 1100
variable
any value is allowed
421
1100 0101
variable
The high-order 2 bits of the first octet specify the
Security Format Code where:
The rest of the first octet is reserved and is set to 0. The remainder of
the Parameter Value field specifies the security level.
Source Address Specific and the Destination Address Specific fields are
coded 01 and 10, respectively, as indicated in the above table. The
Security Format Code values of 01 and 10 indicate that the remaining
octets of the parameter value field specify a security level which is
unique and unambiguous in the context of the security classification
system employed by the authority responsible for assigning the source
NSAP network service access point. Address and the destination
NSAP Address, respectively.
Globally Unique is coded 11 and is similar to the above. However, in this
case the security classification system is not specified.
Source Routing. Source routing, which is another parameter, specifies,
either completely or partially, the route to be taken from Source Network
Address to Destination Network Address.
Parameter Code:
Parameter Length:
Parameter Value:
1100 1000
variable
2 octets of control information followed by a concatenation of network-entity title entries ordered from
source to destination
The first octet of the parameter value is the type code, and has the
following significance:
0000 0000 partial source routing
0000 0001 complete source routing
all other values are reserved.
422
The second octet indicates the octet offset of the next network-entity title
entry to be processed in the list. It is relative to the start of the parameter,
such that a value of 3 indicates that the next network-entity title entry begins
immediately after this control octet. Successive octets are indicated by
correspondingly larger values of this indicator.
The third octet begins the network-entity title list. The list consists of
variable length network-entity title entries. The first octet of each entry gives
the length of the network-entity title which comprises the remainder of the
entry.
Recording of Route. The recording of route parameter identifies the intermediate systems traversed by the PDU.
Parameter Code:
Parameter Length:
Parameter Value:
1100 1011
variable
2 octets of control information followed by a concatenation of network-entity title entries ordered from
source to destination
The first octet of the parameter value is the type code and has the
following significance:
0000 0000 Partial Recording of Route progress
0000 0001 Complete Recording of Route progress
The second octet identifies the first octet not currently used for a recorded
network-entity title, and, therefore, also the end of the list. It is encoded
relative to the start of the parameter value, such that a value of 3 indicates
that no network-entity titles have yet been recorded. A value of all 1s is used
to indicate that route recording has been terminated.
The third octet begins the network-entity title list. The list consists of
variable length network-entity title entries. The first octet of each entry gives
the length of the network-entity title comprising the remainder of the entry.
Network-entity title entries are always added to the end of the list.
Other Parameters. There is a Quality of Service QoS. Maintenance parameter which conveys information about quality of service requested by the
originating Network-Service user. Another parameter is the Priority parameter that indicates the relative priority of the PDU. Intermediate systems that
support this option make use of this information in routing and ordering
PDUs for transmission.
11.6.3
423
The format of the Error Report PDU is shown in Figure 11.37. This format,
similar to the Data PDU, contains a fixed part group of fields and a variable
part. The only difference in the fixed parts is that the flag bits SP, MS, and
ErR. are always set to binary 0. The Destination Address specifies the
network-entity title of the originator of the discarded PDU. The Source
Address specifies the title of the intermediate-system or end-system
network-entity initiating the Error Report PDU.
11.6.3.1 Reason for Discard. This parameter is valid only for the Error
Report PDU.
Parameter Code:
Parameter Length:
Parameter Value:
1100 0001
2 octets
type of error encoded in binary
TABLE 11.7
Parameter
Value
Class of
Error
Meaning
0000
0000
0001
0010
0011
0100
0101
0110
0111
General
1000
0000
0001
0000
0001
0010
0011
Address
1010
0000
0001
Lifetime
1011
0000
0001
0010
0011
0100
PDU
Discarded
1100
0000
Reassambly
Reassembly Interference
1001
Source
Routing
424
The first octet of the parameter value contains an error type code. If the
error in the discarded Data PDU can be localized to a particular field,
the number of the first octet of that field is stored in the second octet of the
reason for discard parameter field; or if the error is a checksum error, then
the value 0 is stored in the second octet of the reason for discard field.
Error Report Data Part. This field contains the entire header of the discarded
Data PDU and may contain none, some, or all of the Data Part of the
discarded PDU.
Section 11.6 has been abstracted from ISO 8473, 1988 Ref. 19..
11.7
11.7.1
425
facility. In many cases such circuits are two-way. They are particularly
attractive for large, dispersed industries and sales organizations. These networks completely bypass local telephone companies that otherwise might
have provided such service.
In underdeveloped nations the rationale for VSAT networks is less economic and more service-oriented. In these areas the local telephone companies or administrations provide such poor service that owning ones own
network becomes very attractive. Specialized data protocols developed to
optimize usage are commonly used on hub-and-spoke configurations.
The hub-and-spoke architecture of Figure 11.38 is the most common
topology. However, another topology is gaining popularity, especially in
developing nations. This is a full mesh network where each and every VSAT
terminal has connectivity to all other terminals in the network. There is no
hub. Their antennas are larger and provide greater RF power to accommodate higher bit rates, often DS1 or E1 configurations see Chapter 7.. They
provide both voice and data connectivity. We can expect to find the more
common type of data protocols applied on these circuits.
11.7.2
The most common type of VSAT network has the hub-and-spoke configuration* as shown in Figure 11.38. There are three elements to the network: 1.
the hub, which is a rather large facility, 2. the VSAT terminals, which are
small, and 3. the satellite. The satellite will be in geostationary orbit. The
round-trip delay, some 500 ms, may pose a problem.
The term VSAT contains the expression very small aperture, meaning a
terminal with a small antenna. Most satellite terminal antennas are dishes.
A dish means a parabolic antenna. VSAT antennas have diameters of the
parabolic dish. ranging from 0.8 m to 2.0 m. Hub stations have antenna
diameters ranging from 5 m to 8 m. Aside from the hub, everything is small in
a VSAT network. There seems to be no limit in the number of VSAT
terminals a hub can service. One case we are familiar with has over 2000
accesses. Because the multiplier is 2000, to keep the system viable economically, the cost of a VSAT terminal must be reduced just as much as possible.
Of course, all terminals in the network must be within line-of-sight of the
satellite being used. In fact, the terminals must have elevation angles greater
than 5 degrees for C-band i.e., 6r4 GHz. operation and greater than 10, or
even 15, degrees of Ku-band i.e., 14r12 GHz. operation. The definition of
elevation angle is shown in Figure 11.39.
11.7.3
426
Figure 11.39. Definition of elevation angle for satellite communications. D, distance to the
satellite; , elevation angle.
single-point failure locations. The first is the satellite. If we lose the satellite,
the network goes down. The second is the hub. If we lose the hub for
whatever reason, the network also goes down.
One alternative is to lease standby transponder space on another nearby
satellite. This is fraught with danger. By nearby, we mean a satellite in a
position such that antennas do not have to be slewed far to acquire the
standby satellite. This reacquiring is not as easy as it seems. To keep costs
low, we have no automatic pointing and tracking capability on the VSAT
terminal antennas. Thus a well-trained technician must visit each site to go
through the reacquisition exercise. Some terminals may be kept down for
days because of this.
By regarding the hub as a single-point failure, we can build or lease a
standby hub. Either way, it implies added cost.
The third drawback is that on conventional VSAT networks, for one
VSAT to communicate with another requires routing through the hub involving a double hop i.e., from VSAT1 up to satellite and down to hub, and from
hub up to satellite and down to VSAT2.. This is not done for voice
operations, if that is what we want. It is not done because of excessive delay.
If we use the proper protocols, the delay will have little effect on data
connectivities. Seldom, however, is there a requirement for one VSAT to
direct traffic to another. Nearly always the direction of traffic is from VSAT
to hub, from hub to VSAT, or both. For instance, if it is a hotel chain
installing a system, the hub will be located with the main reservation
computer and service desk.
11.7.4
427
428
is carried out at the distant end. Of course the receive interleaver must be in
synchronism with the transmit interleaver. In such a way burst errors can be
made to look like random errors. With this type of operation we can
drastically reduce burst errors and pick up several decibels of coding gain
as well.
11.7.4.1 Definitions. The term inbound means circuits and traffic from a
VSAT terminal toward the hub. The converse of this is outbound, meaning
circuits or traffic from the hub toward one or more related VSAT terminals.
11.7.4.2 Optimizing Bandwidth Usage. Here we are dealing with multiple access protocols. In Chapters 9 and 10 we dealt with multiple access
protocols such as CSMArCD, contention and polling, and token passing.
Conventional satellite systems use frequency division multiple access
FDMA. or time division multiple access TDMA.. FDMA is where a
satellite transponder frequency slot is leased. These slots are typically less
than 1 MHz up to the full bandwidth of a transponder e.g., 36, 72 MHz..
Here we have the bandwidth and have to pay for it whether we use it or not.
TDMA is where we are assigned a time slot rather than a frequency slot. We
may have to pay for it whether we use it or not. Demand assignment multiple
access DAMA. is where we are assigned a frequency slot for only the time
we will use it. When we are finished, it is returned to the pool of free
channels, ready for someone else to use.
Almost universally, outbound traffic is carried on a TDM link. A time
division multiplex TDM. link is one where frames, packets, or blocks are
transmitted in one continuous serial bit stream and are received by all
VSATs or all members of a particular VSAT family. Framerblockrpacket
message headers are examined by each receiving terminal, and only those
frames with a terminals address are delivered to the end-user. That same
serial bit stream can also carry control information to control inbound traffic.
One of the most common TDM bit rates is 56 kbps. If system traffic
warrants, 128 and 384 kbps may be used. Some systems use 1.544 Mbps on
the outbound link. Remember, as the bit rate increases, the antenna aperture
will have to increase accordingly. If not, the hub may have to increase its
radio-frequency power output assuming that the satellite transponder will act
accordingly i.e., it will also be able to increase downlink power..
For uplink traffic, a VSAT system may have a calling frequency and then a
working frequency. When a VSAT terminal has traffic, it calls the hub and
asks for a channel to pass its traffic downstream to the hub.. Often the
calling channel is a common channel for all to use. To access the channel,
some form of contention is used, such as pure ALOHA similar to
CSMArCD, Chapter 10.. Collisions are more probable here and their
resolution more difficult because of the large delays involved.
Other approaches use a common channel for all inbound traffic and do
not resort to a calling channel and working channel s.. Certainly as the user
429
Figure 11.40. Hypothetical reference connections for public synchronous data networks. Link
A is the data link between two adjacent data switching exchanges in a national network; link
A1 is the data link between two adjacent gateway data switching exchanges in an international connection; link B is the data link between a source DSE and a destination DSE; link B1
is the data link between a local DSE and a gateway DSE; link G1 is the data link between a
source gate DSE and a destination gateway DSE in an international connection; link C is the
data link between source DTE and destination DTE; link D is the data link between source
DTE and the source local DSE or the data link between destination DTE and destination local
DSE; link E is the data link between communicating processes. (From Figure 1r X.92, page
296, CCITT Rec. X.92, Ref. 21.)
430
Figure 11.41. Variants to logical link D. Link D1 is the data link between data terminal
equipment in user class of service 17 and PAD equipment; link D2 is the data link between
data terminal equipment in user class of service 811 or PAD equipment and a local data
switching exchange. Note 1: A user may see two different types of logical interfaces with the
network (links D1 and D2). Note 2: Link D2 could provide an interface for a single-access
terminal as well as for a multiple-access terminal. (From Figure 2r X.92, page 270, CCITT
Rec. X.92, Ref. 21.)
REFERENCES
431
route as the data connection. Logical links in the case of packet switching are
indicated in Figure 11.40 by dashed lines.
Figure 11.41 illustrates the variants to logical link D of Figure 11.40 to
allow incorporation of packet assemblyrdisassembly PAD. facilities.
REFERENCES
1. Dixon R. Doll, Data Communications: Facilities, Networks and Systems Design,
John Wiley & Sons, New York, 1978.
2. Interface Between Data Terminal Equipment DTE . and Data Circuit-Terminating
Equipment DCE . for Terminals Operating in the Packet Mode and Connected to
Public Data Networks by Dedicated Circuit, ITU-T Rec. X.25, ITU Geneva,
October 1996.
3. Interface Between Data Terminal Equipment DTE . and Data Circuit-Terminating
Equipment DCE . for Synchronous Operation on Public Data Networks, CCITT
Rec. X.21, ITU Geneva, September 1992.
4. Support of Packet Mode Terminal Equipment by an ISDN, ITU-T Rec. X.31, ITU
Geneva, March 1993.
5. Uyless Black, TCPrIP and Related Protocols, McGraw-Hill, New York, 1992.
6. Packet-Switched Signaling System Between Public Networks Proiding Data Transmission Serices, CCITT Rec. X.75, Fascicle VIII.3, CCITT Plenary Assembly,
Melbourne, 1988.
7. Internet Protocol, RFC 791, DDN Network Information Center, SRI International, Menlo Park, CA, September 1981.
8. A Standard for the Transmission of IP Datagrams Oer IEEE 802 Networks, RFC
1042, DDN Network Information Center, SRI International, Menlo Park, CA,
1988.
9. Mathew Naugle, Illustrated TCPrIP, John Wiley & Sons, New York, 1999.
10. Assigned Numbers, RFC 1060, DDN Network Information Center, SRI International, Menlo Park, CA, March 1990.
11. Internet Protocol Transition Workbook, SRI International, Menlo Park, CA, March
1982.
12. Reerse Address Resolution Protocol, RFC 903, DDN Network Information Center,
SRI International, Menlo Park, CA, June 1984.
13. Open Shortest Path First OSPF ., RFC 1131, DDN Network Information Center,
SRI International, Menlo Park, CA, 1991.
14. Internet Control Message Protocol, RFC 792, DDN Network Information Center,
SRI International, Menlo Park, CA, September 1981.
15. Transmission Control Protocol, RFC 793, DDN Network Information Center, SRI
International, Menlo Park, CA, September 1981.
16. Military Standard, Transmission Control Protocol, MIL-STD-1778, U.S. Dept. of
Defense, Washington DC, August 1983.
17. Internet Protocol Version IP6, RFC-2460, from the Internet Internet Society.,
December 1998.
432
18. User Datagram Protocol UDP ., RFC-768, DDN Network Information Center,
SRI International, Menlo Park, CA, September 1981.
19. Information Processing SystemsData CommunicationsProtocol for Proiding
Connectionless-Mode Network Serice, International Standards Organization, ISO8473, 1st edition, Geneva, December 1988.
20. Roger L. Freeman, Radio System Design for Telecommunications, 2nd edition,
John Wiley & Sons, New York, 1997.
21. Hypothetical Reference Connections for Public Synchronous Data Networks, CCITT
Rec. X.92, Fascicle VIII.3, IXth Plenary Assembly, Melboune, 1988.
12
FRAME RELAY
12.1
434
FRAME RELAY
TABLE 12.1
X.25 in ISDN
(X.31)
Frame
Relay
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
435
Figure 12.1. A typical frame relay network. FRS, frame relay switch.
Frame relay derives from the Integrated Services Digital Networks. ISDN.
link access procedure for the D-channel LAPD., or D-channel layer 2.
LAPD is discussed in Section 13.7. Its importance has taken on such a
436
FRAME RELAY
magnitude that the ITU-T Organization has formulated Rec. I.122, Framework for Proiding Additional Packet-Mode Bearer Serices Ref. 1., and Rec.
I.233, ISDN Frame Mode Bearer Serices Ref. 2.. Even the term LAPD,
although modified in certain cases, continues to be used for frame relay
applications.
Frame relay has become an ANSI initiative. There is also the Frame Relay
Forum, consisting of manufacturers and users of frame relay equipment,
which many feel is leading this imaginative initiative. So when we discuss
frame relay, we must consider what specifications a certain system is designed around:
There are also equivalent ANSI specifications directly derived from ITU-T
recommendations such as ANSI T1.617-1991 Ref. 3.. The term core aspects
of ISDN LAPD, or DL-CORE, refers to a reduced subset of LAPD found in
Annex A of ITU-T Rec. Q.922 Ref. 4.. The basic body of Q.922 presents
CCITTrITU-T specification for frame relay. This derivative is called LAPF
rather than LAPD. For all intents and purposes, the material found in ANSI
T1.618 Ref. 5. is identical to that found in Annex A of Q.922.
To properly describe frame relay from our perspective, we briefly give an
overview of the ANSI T1.618-1991 and T1.606-1990 Ref. 6.. This is followed
by some fairly well identified variants.
12.2
437
1.544r2.048 Mbps. We may also map the frame relay bits into a SONET or
SDH configuration Chapter 15.. The final bearer channel may require more
or less bandwidth than that indicated by the bit rate. This is particularly true
for such bearer channels riding on radio systems, and to a lesser extent on a
fiber-optic medium or other transmission media. The reader should be aware
of certain carelessness of language used in industry publications.
Frame relay works well in the data rate range from 56 kbps up to
1.544r2.048 Mbps. It is being considered for the 45-Mbps DS3 rate for still
additional speed.
ITU-Ts use of the ISDN D channel for frame relay favors X.25-like
switched virtual circuits SVCs.. However, ANSI recognized that the principal application of frame relay was interconnection of LANs, and not to
replace X.25. Because of the high data rate of LANs megabit range.,
dedicated connections are favored. ANSI thus focused on permanent virtual
connections PVCs.. With PVCs, circuits are set up by the network,* not by
the endpoints. This notably simplified the signaling protocol. Also, ANSI
frame relay does not support voice or video.
As mentioned above, the ANSI frame relay derives from ISDN LAPD
core functions. The core functions of the LAPD protocol that are used in
frame relay as defined here. are as follows:
In other words, ANSI has selected features from the LAPD structurerprotocol, rejected others, and added some new features. For instance, the control
field was removed, but certain control functions have been incorporated as
single bits in the address field. These are the CrR bit commandrresponse.,
DE bit discard eligibility., FECN bit, and BECN bit forward explicit
congestion notification and backward explicit congestion notification..
12.2.1
438
FRAME RELAY
Figure 12.2. Frame relay ANSI frame format with 2-octet addressing. Note: The default
address field length is 2 octets. By bilateral agreement, it may be extended to either 3 or 4
octets by using the address field extension bit ea. From ANSI T1.618-1991, Fig. 1, page 3,
(Ref. 5.)
262 octets and a recommended length ANSI. of at least 1600 octets when
the application is LAN interconnectivity. The minimum information field is
1 octet.
Figure 12.2 shows the overall frame relay frame structure. As mentioned
above, it uses HDLC opening and closing flags 01111110.. The closing flag
may also serve as the opening flag of the next contiguous frame; however,
receivers must be able to accommodate reception of one or more consecutive
flags on a bearer channel.
Address Field. The address field consists of at least 2 octets, but may be
extended to 3 or 4 octets as shown in Figure 12.3. There is no control field as
there is in HDLC, LAPD, or LAPB.
In its most reduced version, there are just 10 bits allocated to the address
field in 2 octets of bit positions. The remainder of the bits serve as control
functions. . The 10 bits can support up to 1024 logical connections i.e.,
2 10 s 1024..
It should be noted that the number of addressable logical connections is
multiplied because they can be reused at each nodal switch. interface. That
439
Figure 12.3. Address field formats. Source: ANSI T1.619-1991, Fig. 6, page 6, (Ref.5).
440
FRAME RELAY
441
Frame Abort. Frame abort consists of seven or more contiguous 1 bits; upon
receipt of an ABORT, the data-link layer ignores the frame currently being
received.
12.2.2
Figure 12.3 shows the ANSI-defined address field formats. Included in the
field are the address field extension bits; a reserved bit to support a
commandrresponse CrR. indication bit; forward and backward explicit
congestion indicator FECN and BECN. bits; discard eligibility indicator
DE.; a data-link connection identification DLCI. field; and, finally, a bit to
indicate whether the final octet of a 3- or 4-octet address field is the
low-order part of the DLCI or DL-CORE control information. The minimum
and default length of the address field is 2 octets. However, the address field
length may be extended to 3 or 4 octets. To support a larger DLCI address
range, the 3- or 4-octet address fields may be supported at the usernetwork
interface or networknetwork interface based on bilateral agreement.
12.2.2.1 Address Field Variables
Address Field Extension Bit (EA). The address field range is extended by
reserving the first transmitted bit of the address field octets to indicate the
final octet of the address field. If there is a 0 in this bit position, it indicates
that another octet of the address field follows this one. If there is a 1 in the
first bit position, it indicates that this octet is the final octet of the address
field. As an example, for a 2-octet address field, bit 1 of the first octet is set
to 0 and bit one of the second octet is set to 1.
It should be understood that a 2-octet address field is specified by ANSI.
It is a users option whether a 3- or 4-octet field is desired.
CommandrResponse Bit (CrR). The CrR bit is not used by the DL-CORE
protocol, and the bit is conveyed transparently.
Forward Explicit Congestion Notification (FECN) Bit. This bit may be set by
a congested network to notify the user that congestion avoidance procedures
should be initiated, where applicable, for traffic in the direction of the frame
carrying the FECN indication. This bit is set to 1 to indicate to the receiving
end-system that the frames it receives have encountered congested resources.
The bit may be used to adjust the rate of destination-controlled transmitters.
While setting this bit by the network or user is optional, no network shall
ever clear this bit i.e., set to 0.. Networks that do not provide FECN shall
pass this bit unchanged.
442
FRAME RELAY
Backward Explicit Congestion Notification (BECN) Bit. This bit may be set
by a congested network to notify the user that congestion avoidance procedures should be initiated, where applicable, for traffic in the opposite
direction of the frame carrying the BECN indicator. This bit is set to 1 to
indicate to the receiving end-system that the frames it transmits may encounter congested resources. The bit may be used to adjust the rate of
source-controlled transmitters.
While setting this bit by the network or user is optional according to the
ANSI specification, no network shall ever clear i.e., set to 0. this bit.
Networks that do not provide BECN shall pass this bit unchanged.
Discard Eligibility Indicator (DE) Bit. This bit, if used, is set to 1 to indicate a
request that a frame should be discarded in preference to other frames in a
congestion situation. Setting this bit by the network or user is optional. No
network shall ever clear i.e., set to 0. this bit. Networks that do not provide
DE capability shall pass this bit unchanged. Networks are not constrained to
only discard frames with DE equal to 1 in the presence of congestion.
Data-Link Connection Identifier (DLCI). This is used to identify the logical
connection, multiplexed within the physical channel, with which a frame is
associated. All frames carried within a particular physical channel and having
the same DLCI value are associated with the same logical connection.
The DLCI is an unstructured field. For 2-octet addresses, bit 5 of the
second octet is the least significant bit. For 3- and 4-octet addresses, bit 3 of
the last octet is the least significant bit. In all cases, bit 8 of the first octet is
the most significant bit.
The structure of the DLCI field may be established by the network at the
usernetwork interface subject to bilateral agreements.
In order to allow for compatibility of call control and layer management
between BrH and D channels, the following ranges of DLCIs are reserved
and preassigned see Table 12.2.. The DLCIs have local significance only.
DLCI on the D Channel. The six most significant bits bits 8 to 3 of the first
octet. correspond to the service access point identifier SAPI. field in ANSI
standard . T1.602 Ref. 7..
The DLCI subfield bits 8 to 3 of the first octet. values that apply on a D
channel are reserved for specific functions to ensure compatibility with
operation of the D channel that may also use ANSI T1.602 protocols.
A 2-octet address format for the DLCI is assumed when used on the D
channel. Note: For frame relay in the D channel, only DLCI values in the
range 512991 SAPI s 3161. will be assigned.
Table 12.3 gives DLCI values for D channel.
DLCI or DL-CORE Control Indicator (DrC). The DrC indicates whether the
remaining six usable bits of that octet are to be interpreted as the lower
DLCI bits or as DL-CORE control bits. This bit is set to 0 to indicate that
TABLE 12.2
443
DLCI Range
Function
10 bits DLCIs (Note 1)
0 (Note 2)
115
16511
512991
9921007
10081022
1023 (Note 2)
0 (Note 2)
11023
102432,767
32,76863,487
63,48864,511
64,51265,534
65,535 (Note 2)
0 (Note 2)
12047
204865,535
65,536126,975
126,976129,023
129,024131,070
131,071 (Note 2)
0 (Note 2)
1131,071
131,0724,194,303
Note 1. These DLCIs apply when a 2-octet address field is used or when a 3-octet address field is
used with DrC s 1.
Note 2. Only available within non-D channel.
Note 3. These DLCIs apply for non-D channels when a 3-octet address field is used with DrC s 0.
Note 4. These DLCIs apply for non-D channels when a 4-octet address field is used with DrC s 1.
Note 5. These DLCIs apply for non-D channels when a 4-octet address field is used with DrC s 0.
Note 6. The use of semipermanent frame mode connections may reduce the number of DLCIs
available from this range.
Source: Table 1rQ.922, page 7, CCITT Rec. Q.922, ITU Geneva, 1992 (Ref. 4 ).
444
FRAME RELAY
Function
512991
Source: Ref. 5.
the octet contains DLCI information. When this bit is set to 1, it indicates
that the octet contains DL-CORE control information. The DrC is limited
to use in the last octet of the 3- or 4-octet-type address field. The use of this
indication for DL-CORE control is reserved as there have not been any
additional control functions defined that need to be carried in the address
field. Thus this indicator has been added to provide possible future expansion of the protocol.
12.3
DLCI VALUE parameter conveys the DLCI agreed to be used between core
entities in support of DL-CORE connection. Its syntax and usage are
described above.
DL-CORE connection endpoint identifier CEI . uniquely defines the DLCORE connection.
Physical connection endpoint identifier ph-CEI . uniquely identifies a physical connection to be used in support of a DL-CORE connection.
12.3.1
Procedures
445
not already done so, it begins to transmit flags on the physical connection
except on the D channel.
Connection Release. When it is necessary to notify the DL-CORE sublayer
entity either because of release of a demand frame relay call or because of
notification of failure of a permanent frame relay bearer connection. that a
DL-CORE connection is to be released, the DL-CORE layer management
entity signals the MC-REMOVE request primitive to the DL-CORE sublayer
entity.
12.4
Figure 12.4. Typical traffic profile of a public switched telephone network. (From Ref. 8.
Courtesy of Hewlett-Packard.)
*I prefer the use of the expression bit rate capacity.
446
FRAME RELAY
Figure 12.5. Typical bursty traffic of frame relay. Note the traffic levels indicated. (From Ref. 8.
Courtesy of Hewlett-Packard.)
Note that on the right-hand side of Figure 12.5 there is the guaranteed
transmission bit rate equivalent to the CIR. Depending on the traffic load
and congestion, during short periods a user may exceed the CIR. However,
there is a point where the network cannot sustain further increases in traffic
without severe congestion resulting. Traffic above such levels is arbitrarily
discarded by the network without informing the originator.
12.5
Most frame relay service providers offer permanent virtual circuits PVCs. to
transport the frame relay traffic. Many frame relay standards describe PVCs
as dedicated circuits whereas they often really mean proisioned circuits.
Provisioned has a slightly different connotation than dedicated. Provisioned means that a particular frame relay port accesses a preselected route,
the end points being known. Once the circuit becomes live wi.e., the
originating FRAD frame relay access device. has frames to transmitx, the
contracted bit rate capacity is allocated on that route. With many service
providers, there is an alternative backup route assigned in addition to the
primary route. PVCs require no circuit setup signaling procedures, only
verification that the route is alive and healthy.
An SVC is a switched virtual circuit. In this case the circuit is not
provisioned but set up by signaling procedures when there are frames to be
delivered to a particular location. wRefer to ITU-T Rec. X.76, Amendment 1
08r97. Ref. 16.x.
12.6
447
Figure 12.6. Illustration of interfaces: UNI and NNI. (From Figure 2rI.372, page 2, ITU-T Rec.
I.372, Ref. 15).
448
FRAME RELAY
notification i.e., optional but highly desirable .. Users that are not able to act
on explicit congestion notification should have the capability to receive and
ignore explicit notification generated by the networks.
Congestion recovery and the associated implicit congestion indication due
to frame discard are used to prevent network collapse in the face of severe
congestion. Implicit congestion detection involves certain events available to
the protocols operating above the core function to detect frame loss e.g.,
receipt of a REJECT frame, timer recovery.. Upon detection of congestion,
the user reduces the offered load to the network. Use of such reduction by
users is optional.
12.7.1
Explicit congestion signals are sent in both forward toward frame destination. and backward toward frame source. directions. Forward explicit congestion notification is provided by using the FECN bit in the address field.
Backward explicit congestion notification is provided by one of two methods.
When timely reverse traffic is available, the BECN bit in an appropriate
address field may be used. Otherwise, a single consolidated link layer
management message may be generated by the network. The consolidated
link layer management CLLM. message travels on the U-plane physical
path. The generation and transport of CLLM by the network are optional.
All networks shall transport the FECN and BECN bits without resetting.
12.7.2
12.7.3
449
The CLLM uses XID frames for the transport of functional information. We
may remember in the discussion of HDLC Section 3.5. that an XID frame
was an exchange identification frame. It was used for reporting station identification. In frame relay, CLLM uses XID frames for network management as
an alternative for congestion control. CLLM messages originate at network
nodes to the frame relay interface usually housed in a router near or
incorporated with the user equipment.
As we mentioned, BECNrFECN bits in frames must pass congested nodes
in the forward or backward direction. Suppose for a given user no frames
pass in either direction; thus that user has no knowledge of network congestion because at that moment the user is not transmitting or receiving frames.
Frame relay standards do not permit a network to generate frames with the
DLCI of the congested circuit. CLLM covers this contingency. It has a
DLCI s 1023 reserved.
The use of CLLM is optional. If it is used, it may or may not operate in
conjunction with BECNrFECN. The CLLM frame format dedicates 1 octet
for the cause of congestion such as excessive traffic, equipment or facility
failure, preemption, or maintenance action.
The CLLM message is based on the ISO 8885 definition of XID frames
for transport of function information. The frame format of a CLLM message
is illustrated in Figure 12.7. Each parameter is described in the CLLM using
sequence-type-length value. The functional fields for CLLM are described
450
FRAME RELAY
Figure 12.7. Frame format of a CLLM message, with 2-octet address field. IA5, International
Alphabet No. 5 (Ref.12) (see Section 5.3). (From Figure C.1rX.36, page 33, ITU-T Rec. X.36,
Ref. 10.)
below with reference to the figure. The CLLM message may be transmitted
whenever a congestion control procedure is being performed as a result of
network congestion, line or equipment failure, or the performance of maintenance functions. All fields are binary coded unless otherwise specified.
Field Descriptions, CLLM Message Format, Figure 12.7
Fields 1 and 2. Addressing, self-explanatory.
Field 3, XID Control Field. For a CLLM frame, coded 10101111 in binary.
Field 4, Format Identifier. Coded 130 decimal and 10000010 in binary.
Field 5, Group Identifier Field. Coded decimal 15 and 00001111 in binary.
Fields 6 and 7, Group Length Octets. This 16-bit field describes the length,
in octets, in the remainder of the group field. The maximum value of
the group field is 256.
Field 8, Group Field Value Field. Consists of two or more parameter fields.
The parameter set identification with a parameter value of 0. identifies
a set of private parameters within the group field in accordance with
TABLE 12.4
451
Bits
87654321
00000010
00000011
00000110
00000111
00001010
00001011
00010000
00010001
Cause
Network congestion due to excessive trafficshort term
Network congestion due to excessive trafficlong term
Facility or equipment failureshort term
Facility or equipment failurelong term
Maintenance actionshort term
Maintenance actionlong term
Unknownshort term
Unknownlong term
All other values are reserved
Source: Table C.1rX.36, page 35, ITU-T Rec. X.36, ITU Geneva 4r95 (Ref. 10 ).
452
FRAME RELAY
12.7.4
453
12.8.1
FECN Usage
User Behavior on Receipt FECN Bit. ANSI recommends Ref. 5. that users
compare the number of frames in which the FECN bit is set with the number
of frames in which the FECN bit is cleared over a measurement interval %.
If the number of set FECN bits a set bit in this context is a bit set to 1
indicating some form of congestion. is equal to or exceeds the number of
clear FECN bits bits set to 0. received during this period, then the user
should reduce its throughput to 78 0.875. of its previous value. If the number
of set FECN bits is less than the number of clear FECN bits, then the user
may increase the information rate by 161 of its throughput.
The suggested measurement interval % is approximately equal to four
times the end-to-end transit delay. However, other mechanisms not dependent on timers may be used by the terminal if the effect is similar.
A slow-start mechanism is recommended, so as to cause convergence
toward equilibrium on the connection. ANSI suggests that the initial data
rate should be set to the throughput value agreed at the time of call
establishment, or less, in order to avoid an impulse load on the network at
the time the user begins transmitting. If the connection has been idle for a
long period of time in the order of tens of seconds., the offered rate or less
should be returned to the throughput.
Use of Windows as an Approximation to Rate-Based Control. For some
implementations, it may be convenient to use a window-based mechanism as
an approximation to rate-based control. Such implementations may or may
not be able to measure their offered rate, or to relate to the throughput
negotiated with the network during connection establishment. The actual
offered rate is limited by end-to-end transit delay, access rate, window size,
and frame size.
In the event that a windowed protocol is in use, then the user, in
responding to the FECN bit, compares the number of frames received with
the FECN bit set with the number of frames with the FECN bit clear. The
measurement interval for this shall be twice the interval during which the
number of frames equal to the current working window size is transmitted
and acknowledged i.e., two window turns.. If the number of set FECN bits is
equal to or exceeds the number of clear FECN bits received during this
454
FRAME RELAY
period, then the user will reduce its working window size variable to 78 0.875.
of its previous value. However, it need never reduce its working window
below the size of one frame. If the number of FECN bits is less than the
number of clear FECN bits, then the user increases its window size variable
by the size of one frame, not to exceed the maximum window size for that
virtual circuit. After the adjustment is made, the set and clear FECN bit
counters are reset to zero and the comparison begins again.
The working window is initialized at a small value, such as one frame, in
order to avoid impulse load upon the network at the time a user begins
transmitting. If the connection has been idle for a long period of time, in the
order of tens of seconds, it may be appropriate to again reduce the window
size to its initial value. There may be a maximum window size or information
rate that a connection can accommodate, as limited by the end-system
policies; the working window should not be adjusted beyond such a value. It
should also be observed that this algorithm is relatively insensitive to the loss
of acknowledgments carried in the user data when they are used to carry
window adjustment information back to the source.
12.8.2
BECN Usage
455
Network Procedures for Setting the BECN Bit. The network should, if
possible, set the BECN bit before it becomes necessary to discard frames.
The network should continue to set the BECN bit whenever it is in such
condition, and it may elect to provide some hysteresis to prevent oscillation.
If the congestion condition deteriorates, the network should discard frames
sent in excess of throughput at the access node, as well as discard those
marked with the DE bit, in preference to other frames. At this stage, the
network is in a moderately congested state, and BECN bits should continue
to be set in frames that are not discarded.
If the congestion condition further deteriorates to the point that frames
that are neither in excess of throughput nor are marked with the DE bit are
being discarded, a severe congestion condition exists. The network should
continue to use the BECN to encourage users to reduce their transmission
rates andror take further action such as clearing or rerouting calls to restore
control.
12.9
12.9.1
Frame relay switches may carry out a policing function on accessing users.
The result of such action is discarded frames. Similar policing actions are
employed on ATM circuits Chapter 16..
12.9.2
Definitions
Access Rate (AR). The data rate, expressed in bits per second, of the user
access channel D, B, or H channel .. The rate at which users can offer
data to the network is bounded by the access rate.
Excess Burst Size ( B e ). The maximum amount of uncommitted data in bits.
that the network will attempt to deliver over the measurement interval
T .. These data may or may not be contiguous i.e., may appear in one
frame or in several frames, possibly with interframe idle flags.. Be is
negotiated at call establishment for demand establishment of communication. or at service subscription time for permanent establishment of
communication.. Excess burst data may be marked for discard eligibility
with the DE bit. by the network.
Measurement Interval ( T ). The time interval over which rates and burst
sizes are measured. In general, the duration of T is proportional to the
burstiness of the traffic. Except as noted below, T is computed as T s
BcrCIR or T s BerAR.
Committed Information Rate (CIR). The rate, expressed in bits per second,
at which the network agrees to transfer information under normal conditions. This rate is measured over the measurement interval T. CIR is
456
FRAME RELAY
12.9.3
Figure 12.8 illustrates the relationship of access rate, excess burst, committed
burst, committed information rate, discard eligibility indicator, and measurement interval parameters. The CIR, Bc , and Be parameters are negotiated at
call establishment time for demand establishment of communication or
established by subscription for permanent establishment of communication.
Access rate is established by subscription for permanent access connections
or during demand access connection establishment. Each end-user and the
network participate in the negotiation of these parameters to agreed-upon
values.
These negotiated values are then used to determine the measurement
interval parameter, T, and when the discard eligibility indicator if used. is
set. These parameters are also used to determine the maximum allowable
end-user input levels. The relationship among parameters can be used at any
instant of time, T0 , to measure the offered load over the interval T0 , Tc q T ..
Similarly, the offered load over any interval t y T, t . may be measured at
any instant of time t, as long as the measurement function retains memory of
user activity over the previous interval T. One way of doing this is by use of a
leaky bucket algorithm described below.
The measurement interval is determined as shown in Table 12.5. The
network and the end-users may control the operation of the discard eligibility
indicator DE. and the rate enforcer functions by adjusting at call setup the
CIR, Bc and Be parameters in relation to the access rate. If both the CIR
457
Figure 12.8. Illustration of relationships among parameters. Note 1: Number of frames and
size of frames are for illustrative purposes only. Note 2: Frame may be discarded at ingress
node. This is a region of rate enforcement. Note 3: Frame marked as discard eligible. (From
Figure 7, page 9, ANSI T1.606a, Ref. 9.)
TABLE 12.5
CIR
Bc
Be
)0
)0
s0
)0
)0
s0
)0
s0
)0
Measurement
Interval ( T )
T s Bc rCIR
T s Bc rCIR
T is a networkdependent value
458
FRAME RELAY
Notes
1. The ingress and egress access rates do not have to be equal; however,
when the ingress access rate is substantially higher than the egress
access rate, continuous input of Be frames at the ingress interface may
lead to persistent congestion of the network buffers at the egress
interface, and a substantial amount of the input Be data will be
discarded.
2. When a frame, entering the ingress node, consumes the remaining
capacity of Be or Bc , reducing it to zero, the action taken on that frame
is network-dependent.
Figure 12.8 is a static illustration of the relationship among time, cumulative
bits of user data, and rate. In this example, the user sends four frames during
the measurement interval T0 q T .. The slope of the line marked CIR is
BcrT. Bits are received at the access rate by the ingress node. of the access
channel. Because the sum of the number of bits contained in frames 1 and 2
is not greater than Bc , the network does not mark these frames with the
discard eligibility indicator DE.. The sum of the number of bits in frames 1,
2, and 3 is greater than Bc , but not greater than Bc q Be ; therefore frame 3
is marked discard eligible. Because the sum of the number of bits received by
the network in frames 1, 2, 3, and 4 exceeds Bc q Be , frame 4 is discarded at
the ingress node. This figure does not address the case in which the end-user
sets the DE bit.
This section is based on Ref. 9, paragraph 10.2.
12.10
Throughput
Transit delay
Information integrity
Residual error rate
Delivered errored. frames
Delivered duplicated frames
Delivered out-of-sequence frames
Lost frames
Misdelivered frames
Switched virtual call established delay
NETWORK RESPONSIBILITIES
459
12.11
NETWORK RESPONSIBILITIES
The frame are routed through the network on the basis of an attached label
i.e., the DLCI value in the frame.. This label is a logical identifier with local
significance. In the virtual call case, the value of the logical identifier and
other associated parameters such as layer 1 channel delay may be requested
and negotiated during call setup. Depending on the value of the parameters,
the network may accept or reject the call. In the case of the permanent
virtual circuit, the logical identifier and other associated parameters
are defined by means of administrative procedures e.g., at the time of subscription..
The usernetwork interface structure allows for the establishment of
multiple virtual calls or permanent virtual circuits, or both, to many destinations over a single access channel.
Specifically, for each connection, the bearer service:
1. Provides bidirectional transfer of frames.
2. Preserves their order as given at one usernetwork interface if and
when they are delivered at the other end. Note: No sequence numbers
are kept by the network. Networks are implemented in such a way that
frame order is preserved. .
3. Detects transmission, format, and operational errors such as frames
with an unknown label.
4. Transports the user data contents of a frame transparently. Only
frames address and FCS fields may be modified by network nodes.
5. Does not acknowledge frames.
At the usernetwork interface, the FRAD, as a minimum, has the following responsibilities:
1. Frame delimiting, alignment, and transparency provided by the use of
HDLC flags and zero-bit insertion.
2. Virtual circuit multiplexingrdemultiplexing using the address field of
the frame.
3. Inspection of the frame to ensure that it consists of an integer number
of octets prior to zero-bit insertion or following zero-bit extraction.
4. Inspection of the frame to ensure that it is not too short or too long.
5. Detection of transmission, format, and operational errors.
460
FRAME RELAY
12.12
Frame relay SVC circuits require setup procedures. PVC circuits require
periodic health and welfare checks. These functions are carried out by OSI
layer 3 signaling actions. In the case of PVC, the signaling functions are
reduced to a set of management processes. No setup or release procedures
are necessary. On the other hand, SVC operation requires circuit setup and
release processes and utilizes a somewhat extended group of management
action messages.
12.12.1
These procedures are based on periodic transmission of a STATUS ENQUIRY message by the DTE and a STATUS message by the DCE. These
messages are principally used to make a provisioned circuit active; if it is not,
then to determine the general health of the circuit. This includes link
integrity verification of the DTErDCE interface, notification to the DTE of
the status of a PVC, notification of the addition of a PVC, and the detection
by the DTE of the deletion of a PVC. These messages are transferred across
the bearer channel using layer 2 unnumbered information UI. frames.
12.12.1.1 Message Definition. Both messages are transferred on DLCI
s 0. The FECN, BECN, and DE bits are not used and set to 0. The 3 octets
following the address field have fixed values. Figure 12.9 illustrates the PVC
management frame format.
461
Figure 12.9. PVC management frame format with 2-octet addressing. (From Figure 7rX.36,
page 14, ITU-T Rec. X.36, Ref. 10.)
The first octet is the control field of a UI frame with P bit set to 0.
The second octet is the protocol discriminator information element of
the message.
The third octet is the dummy call reference information element of the
message.
TABLE 12.6
Length in octets.
Direction: Both
Direction
Type
Length a
Both
Both
Both
Mandatory
Mandatory
Mandatory
1
3
4
462
FRAME RELAY
TABLE 12.7
Direction: Both
Direction
Type
Length a
Both
Both
Both
Both
Mandatory
Mandatory
Optional r Mandatory (Note)
Optional r Mandatory (Note)
1
3
4
57
STATUS Message. This message is sent in response to a STATUS ENQUIRY message to indicate the status of PVCs or for a link integrity
verification. Optionally, it may be sent at any time to indicate the status of a
single PVC. Message-specific information elements for this message are given
in Table 12.7, and they are given in the order indicated in the table.
Moreover, the PVC status information element may occur several times.
Message Type Coding (Octet 7)
STATUS ENQUIRY message:
STATUS message:
0111 0101
0111 1101
463
464
FRAME RELAY
465
Periodic Polling
General. The DTE initiates the polling as described below.
1. The DTE sends STATUS ENQUIRY message to the DCE and starts
polling timer T391. When T391 expires, the DTE repeats the above
action.
The STATUS ENQUIRY message typically requests a link integrity
verification exchange only report type 0000 0001.. However, every N391
polling cycle, the DTE requests full status of all PVCs report type 0000
0000..
2. The DCE responds to each STATUS ENQUIRY message with a
STATUS message and starts or restarts the polling verification timer
T392 used by the network to detect errors. The STATUS message sent
in response to a STATUS ENQUIRY contains the link integrity verification and Report Type information elements. If the content of the
Report Type information element specifies full status, then the STATUS message must contain one PVC status information element for
each PVC configured on the DTEDCE interface.
3. The DTE shall interpret the STATUS message depending upon the
type of report contained in this STATUS message. The DCE may
respond to any poll with a full status message in case of a PVC status
change or to report the addition or deletion of PVC on the DTEDCE
interface. If it is a full status message, the DTE should update the
status of each configured PVC.
Link Integrity Verification. The purpose of the link integrity verification
information element is to allow the DTE and the DCE to determine the
status of the signaling link DLCI s 0.. This is necessary since these procedures use the unnumbered information UI. frame. Figure 12.11 shows the
normal link integrity verification procedure.
The DTE and DCE maintain the following internal counters:
The send sequence counter maintains the value of the send sequence
number field of the last link integrity verification information element
sent.
The receive sequence counter maintains the value of the last received
send sequence number field in the link integrity verification information
element and maintains the value to be placed in the next transmitted
received sequence number field.
466
FRAME RELAY
Figure 12.11. Link integrity verification. (From Figure 11rX.36, page 20, ITU-T Rec. X.36,
Ref. 10.)
467
Note: The value zero in the receive sequence number indicates that the
field contents are undefined; this value is normally used after initialization.
The value zero is not to be used in the send sequence number field so that
the receive sequence number will never contain the value zero to differentiate the undefined condition from the normal modulo round-off.
Signaling the Actiity Status of PVCs. In response to a STATUS ENQUIRY
message sent by the DTE containing a Report Type information element sent
to full status, the DCE reports in a STATUS message to the DTE the
activity status of each PVC configured on the DTEDCE interface with PVC
status information elements one per PVC..
The Report Type information element in this STATUS message is set to
full status. Also in response to a STATUS ENQUIRY message set by the
DTE containing a Report Type information element set to link integrity
verification only, the DCE may respond with a STATUS message containing
a Report Type information element set to full status in case of a PVC
status change. Each PVC status information element contains an Active bit
indicating the activity status of that PVC.
The action that the DTE takes based on the value of the Active bit is
independent of the action based on the New bit. The DTE could get a PVC
status information element with the New bit set to 1 and the Active bit set
to 0.
If the DTE receives a PVC status information element with the Active bit
set to 0, the DTE shall stop transmitting frames on the PVC until it receives
a PVC status information element for that PVC with the Active bit set to 1.
When the Active bit is set to 1, the Delete bit must be set to 0 on
transmission. The Delete bit is not interpreted in the full status reporting
STATUS message. When the Delete bit set to 1 in the optional asynchronous
status message, the active bit has no significance. Other action taken by the
DTE is implementation-dependent.
Since there is a delay between the time the network makes a PVC active
and the time the DCE transmits a PVC status information element notifying
the DTE, there is a possibility of the DTE receiving frames on a PVC
marked as inactive. The action the DTE takes on receipt of frames on an
inactive PVC is implementation-dependent.
Since there is a delay between the time the network detects that a PVC
has become inactive and the time the DCE transmits a PVC status information element notifying the DTE, there is a possibility of the DCE receiving
frames on an inactive PVC. The action the DCE takes on receipt of frames
for an inactive PVC is network-dependent and may include the dropping of
frames on the inactive PVC.
The DCE will signal that a PVC is active if the following criteria are met:
The PVC is configured and available for data transfer in the network
from the local DCE to the remote DCE.
468
FRAME RELAY
Note that in the case bidirectional procedures are used at the local DTEDCE
interface, this indication is independent of the indication received from the
local DTE.
This section is based on Ref. 10.
12.12.2
Switched virtual circuits SVCs. at the UNI require call setup and release
procedures. Certain link maintenance messages, similar to those discussed in
Section 12.12.1, are also required for SVC operation. Table 12.8 lists call
control messages employed in the various connection control procedures.
Note that the entries in Table 12.8 are presented in alphabetical order,
not in chronological operational. order. The readers attention is called to
the fact that STATUS ENQUIRY and STATUS messages that are described
here differ from those given in Section 12.12.1. They are not interchangeable.
The most important message in the Call Establishment group is the
SETUP message. This message is sent by the calling user to the network and
by the network to the called user to initiate the actual call establishment
procedure. Its 23 information elements in sequential order are shown in
Table 12.9.
The first three information elements of all call control messages listed in
Table 12.9 have some commonality. The first octet is the protocol discriminator. This simply tells the receiving device that this is a call control message. It
distinguishes it from other message types. It is identical for all the call control
messages listed in Table 12.8 and is coded 00001000. It should be noted that
these call control messages are valid for UNI and are not necessarily valid for
the NNI.
TABLE 12.8
Message Type
ALERTING
CALL PROCEEDING
CONNECT
CONNECT ACKNOWLEDGE
PROGRESS
SETUP
DISCONNECT
RELEASE
RELEASE COMPLETE
Miscellaneous Messages
STATUS
STATUS ENQUIRY
TABLE 12.9
469
Direction: Both
Direction
Type
Length
Both
Both
Both
Both
Both
Both
Both
Both
nu
Both
Both
Both
Both
Both
Both
Both
Both
Both
un
Both
Both
Both
Both
M
M
M
M
O (Note 1)
O (Note 2)
O (Note 3)
O (Note 4)
O (Note 5)
O (Note 7)
O (Note 8)
O (Note 9)
O (Note 10)
O (Note 11)
O (Note 12)
O (Note 13)
O (Note 14)
O (Note 15)
O (Note 16)
O (Note 17)
O (Note 18)
O (Note 19)
O (Note 20)
1
2*
1
45
2*
26
24
2*
(Note 6)
211
23
227
29
28
2*
223
2*
223
2*
1
216
24
(Note 21)
470
FRAME RELAY
The second part of every message is the call reference. It has a minimum
length of 2 octets. Its purpose is to identify the call or facility
registrationrcancellation at the local UNI to which the particular message
applies. The call reference does not have end-to-end significance across the
network.
Bits 8, 7, 6, and 5 of the first octet of the call reference are coded 0000;
bits 4, 3, 2, and 1 provide the length of the call reference values. The second
octet, bit 8, is a flag; the remainder of the octet and octets 3 onwards, if
required, carry the actual call reference value.
The third information element is message type. Its intent is to identify the
purpose of the message being sent. The coding of the message is shown in
Table 12.10. Note that bit 8 the first bit of an octet as shown. is coded binary
0 and is reserved for future use as a possible extension bit.
TABLE 12.10
471
Bits
8765 4321
0000 0000
Miscellaneous messages:
SEGMENT
STATUS
STATUS ENQUIRY
Note: When used, the message type is defined in the following octet (s ), according to
national specification. The extension mechanism (bit 8 of the message type) is
independent of the escape mechanism for the message.
Source: Table 4-1rQ.933, page 15, Ref. 11.
472
FRAME RELAY
TABLE 12.11
8765 4321
1:::: ---000 ---001 ---101 ---0::: ::::
000 0000
000 0100
000 1000
001 0100
001 1000
001 1001
001 1110
010 0000
010 1000
100 0010
100 0100
100 1000
100 1001
100 1100
100 1101
101 0000
101 0001
101 0011
101 0111
110 1100
110 1101
111 0000
111 0001
111 1000
111 1100
111 1101
111 1110
111 1111
1
1
5
32
3
(Note 4)
6
4
(Note 4)
82
11
3
27
9
(Note 4)
23
8
3
4
5
(Note 4)
23
(Note 4)
23
(Note 4)
14
4
131
473
Figure 12.12. Format of the Link Layer Core Parameters information element. (From Figure
4-4rQ.933, page 21, ITU-T Rec. Q.933, Ref. 11.)
Note 1. All the parameters are optional and position independent. If certain parameters are
not included, the network default value will be used. The term outgoing is defined in the
direction from calling user to called user. The term incomingis defined in the direction from
called user to calling user.
Note 2. When octet 4 is present, octet 4a and octet 4b shall also be present. Additionally,
octet group 4c and 4d may be included.
Table notes continued on page 474.
474
FRAME RELAY
Called party number, Figure 12.13, can be based on either ITU-T Rec.
E.164 numbering or ITU-T Rec. X.121 numbering. Table 12.13 describes
octet 3 Figure 12.13., bits 4, 3, 2, and 1. If they are coded 0001, the E.164
numbering plan applies; if coded 0011, the X.121 numbering plan applies.
Octets. 4 onwards gives the applicable number digits. IA5 refers to CCITT
International Alphabet No. 5. Refer to CCITT Rec. T.50 Ref. 13..
12.13
COMPATIBILITY ISSUES
COMPATIBILITY ISSUES
TABLE 12.12
475
Maximum frame mode information field (FMIF) (octets 3, 3a, 3b, 3c, and 3d)
The frame mode information field size is the number of user data octets after the address field
and before the FCS field in a frame mode frame. The count is done either before zero-bit
insertion or following zero-bit extraction. If the frame mode information field is symmetrical,
octets 3a and 3b indicate the size in both directions, and octets 3c and 3d are absent. The
maximum size of the frame mode information field is a system parameter and is identified as
N203.
Outgoing maximum FMIF size (octets 3a and 3b)
The outgoing maximum FMIF size is used to indicate the maximum number of end user data
octets in a frame for the calling user to the called user direction. The size is in octets and is
encoded in binary.
Incoming maximum FMIF size (octets 3c and 3d)
The incoming maximum FMIF size is used to indicate the maximum number of end user data
octets in a frame for the called user to the calling user direction. The size is in octets and is
encoded in binary.
Note 1. The maximum frame mode information field size allowed for the D-channel is 262
octets. For B- and H-channels a larger FMIF size is allowed (e.g., up to 4096 octets). The
default value of the frame mode information field size is defined in Recommendation Q.922.
The users may negotiate a maximum FMIF size that is lower than the maximum FMIF size that
the network can deliver. The network is not required to enforce the negotiated FMIF value.
Throughput (octets 4, 4a, 4b, 4c, and 4d)
The purpose of the throughput field is to negotiate the throughput for the call. Throughput is
the average number of frame mode information field bits transferred per second across a
user-network interface in one direction, measured over an interval of duration T.
This field, when present in the SETUP message, indicates requested throughput, which is the
lesser of the throughput requested by the calling user and throughput available from the
network(s), but is not less than the minimum acceptable throughput. When present in the
CONNECT message, it indicates the agreed throughput, which is the throughput acceptable
to the calling user, the called user, and the network(s).
If the throughput is asymmetrical (i.e., the values in the incoming and outgoing directions are
different), octets 4a and 4b indicate throughput in the outgoing direction (from the calling
user) and octets 4c and 4d indicate throughput in the incoming direction (to the calling user).
If the throughput is symmetrical, octets 4a and 4b indicate throughput in both directions, and
octets 4c and 4d are absent.
Throughput is expressed as an order of magnitude (in powers of 10) and an integer multiplier.
For example, a rate of 192 kbps is expressed as 192 = 10 3 .
Magnitude (octets 4a and 4c)
This field indicates the magnitude of the throughput. This is expressed as a power of 10.
Bits
7 6 5
0 0 0 10 0
0 0 1 10 1
0 1 1 10 2
0 1 1 10 3
1 0 0 10 4
1 0 1 10 5
1 1 0 10 6
All other values are reserved.
Table continued on page 476
476
FRAME RELAY
TABLE 12.12
( Contined )
Note 2. To ensure that various implementations will encode particular rates in a consistent
fashion, the coding of the magnitude and multiplier shall be such that the multiplier is as small
as possible; i.e. the multiplier shall not be evenly divisible by 10. For example, a rate of 192
kbps shall be expressed as 192 = 10 3 , not as 1920 = 10 2 .
Multipler (octets 4a, 4b, 4c, and 4d)
This field indicates, in binary, the value by which the magnitude shall be multiplied to obtain
the throughput.
Minimum acceptable throughout
The purpose of the minimum acceptable throughput field is to negotiate the throughput for
the call. Minimum acceptable throughput is the lowest throughput value that the calling user is
willing to accept for the call. If the network or the called user is unable to support this
throughout, the call shall be cleared.
This field, which is present only in the SETUP message, is carried unchanged through the
network(s). Its value may not be greater than the requested throughput.
If the minimum acceptable throughput is asymmetrical (i.e., the values in the incoming and
outgoing directions are different), octets 5a and 5b indicate minimum acceptable throughput
in the outgoing direction (from the calling user) and octets 5c and 5d indicate minimum
acceptable throughput in the incoming direction (to the calling user). If the minimum
acceptable throughput is symmetrical, octets 5a and 5b indicate throughput in both directions, and octets 5c and 5d are absent.
Minimum acceptable throughput is expressed as an order of magnitude (in powers of 10) and
an integer multiplier. For example, a rate of 192 kbps is expressed as 192 = 10 3 .
Magnitude (octets 5a and 5c)
Same as octets 4a and 4c coding.
Multiplier (octets 5a, 5b, 5c, and 5d)
This field indicates, in binary, the value by which the magnitude shall be multiplied to obtain
the minimum acceptable throughput.
Committed burst size
This field indicates the maximum amount of data (in bits) that the network agrees to transfer,
under normal conditions, over a measurement interval ( T ). This data may or may not be
interrupted (i.e., may appear in one frame or in several frames, possibly with interframe idle
flags). T is calculated using the following combinations:
Throughput
Committed burst
size ( Bc )
(Note 3)
Excess burst
size ( Be )
Measurement interval
(T )
)0
)0
)0
T s Bc rThroughput
)0
)0
s0
T s Bc rThroughput
s0
s0
)0
Default (Note 4)
T s Be rAccess rate
Note 3. The coding of this field is in octets. Therefore, the committed burst size is 8 = the
contents of this field. If the committed burst size is symmetrical, octets 6a and 6b indicate the
size in both directions, and octets 6c and 6d are absent.
COMPATIBILITY ISSUES
TABLE 12.12
477
( Continued )
Note 4. However, the ingress and egress Access Rate (AR) do not have to be equal.
However, when the ingress AR is substantially higher than the egress AR, continuous input of
Be frames at the ingress interface may lead to persistent congestion of the network buffers at
the egress interface, and a substantial amount of the input Be data may be discarded.
Networks may define the interval T to be less than Be rAR in which case the default is not
used.
Outgoing committed burst size (octets 6a and 6b)
The outgoing committed burst size (in octets) is binary coded.
Incoming committed burst size (octets 6c and 6d)
The incoming committed burst size (in octets) is binary coded.
Excess burst size
This field indicates the maximum amount of uncommitted data (in bits) that the network will
attempt to deliver over measurement interval ( T ). This data may appear in one frame or in
several frames. If the data appears in several frames, these frames can be separated by
interframe idle flags. Excess burst may be marked Discard Eligible (DE) by the network.
Note 5. The coding of this field is in octets. Therefore, the excess burst size is 8 = the
contents of the field.
If the excess burst size is symmetrical, octets 7a and 7b indicate the size in both directions,
and octets 7c and 7d are absent.
Outgoing excess burst size (octets 7a and 7b)
The outgoing excess burst size (in octets) is binary coded.
Incoming excess burst size (octets 7c and 7d)
The incoming excess burst size (in octets) is binary coded.
Committed burst size magnitude (octets 8 and 8a)
The purpose of the Committed burst size magnitude is to indicate the magnitude of the
Committed burst size. It is expressed as a power of 10. It is multiplied by the Committed burst
size value (octet group 6) to give the actual value of the Committed burst size. When the
incoming Committed burst size field is not included (in octet group 6), the incoming
magnitude has no significance.
The outgoing and incoming Bc magnitudes are coded as follows:
Bits
3r6
2r5
1r4
10 0
10 1
10 2
10 3
10 4
10 5
10 6
478
FRAME RELAY
TABLE 12.12
( Continued )
2r5
1r4
10 0
10 1
10 2
10 3
10 4
10 5
10 6
Figure 12.13. Called party number information element. (From Figure 4-14rQ.931, page 75,
ITU-T Rec. Q.931, ITU, Ref. 13.)
COMPATIBILITY ISSUES
TABLE 12.13
479
Unknown (Note 2)
0 0 1
0 1 0
0 1 1
1 0 0
1 1 0
1 1 1
Unknown (Note 6)
0 0 0 1
0 0 1 1
0 1 0 0
1 0 0 0
1 0 0 1
1 1 1 1
480
FRAME RELAY
TABLE 12.13
( Continued )
Note 6. The numbering plan unknown is used when the user or network has no knowledge
of the numbering plan. In this case the number digits field is organized according to the
network dialing plan; for example, prefix or escape digits might be present.
Number digits (octets 4, etc.)
This field is coded with IA5 characters, according to the formats specified in the appropriate
numberingrdialing plan.
Note that the E.164 and X.121 numbering plans may be found in the 3rd ed., Reference Manual for
Telecommunication Engineering, 3rd edition, John Wiley & Sons, June 2001.
Source: Table 4-9, page 76, ITU-T Rec. Q.931, ITU Geneva, May 1998, Ref. 13.
REFERENCES
1. Framework for Frame Mode Bearer Serices, ITU-T Rec. I.122, ITU, Geneva,
March 1993.
2. Frame Mode Bearer Serices, CCITT Rec. I.233, ITU Geneva, 1992.
3. ISDN Signaling Specification for Frame Relay Bearer Serice for Digital Subscriber
Signaling System Number 1 DSS1., ANSI T1.617-1991, ANSI, New York, 1991.
4. ISDN Data Link Layer Serice for Frame Mode Bearer Serices, CCITT Rec. Q.922,
ITU Geneva, 1992.
5. Integrated Serices Digital Network ISDN . Core Aspects of Frame Protocol for
Use with Frame Relay Bearer Serice, ANSI T1.618-1991, ANSI, New York, 1991.
6. ISDNArchitectural Framework and Serice Description for Frame Relaying Bearer
Serice, ANST T1.606-1990, ANSI, New York, 1990.
7. Telecommunications: Integrated Serices Digital Network ISDN . Data Link Layer
Signaling Specification for Application at the UserNetwork Interface, ANSI T1.6021989, ANSI, New York, 1989.
8. Frame Relay & SMDS, a seminar, Hewlett-Packard Co., Burlington, MA, October
1993.
9. Integrated Serices Digital Network ISDN . Architectural Framework and Serice
Description for Frame-Relaying Bearer Serice Congestion Management and Frame
Size ., ANSI T1.606a, ANSI, New York, 1992.
10. Interface Between Data Terminal Equipment DTE . and Data Circuit-Terminating
Equipment DCE . for Public Data Networks Proiding Frame Relay Data Transmission Serice by Dedicated Circuit, ITU-T Rec. X.36, ITU Geneva, October 1995.
11. Integrated Serices Digital Network ISDN . Digital Subscriber Signaling System No.
1 DSS 1. Signaling Specifications for Frame Mode Switched and Permanent
Virtual Connection Control and Status Monitoring, ITU-T Rec. Q.933, ITU Geneva,
October 1995.
REFERENCES
481
13
INTEGRATED SERVICES
DIGITAL NETWORKS (ISDNs)
13.1
INTRODUCTION
Voice
TelexrTeletext
Telemetry
Data: circuit- and packet-switched
Conference TV, slow scan TV
Facsimile, including CCITT Group 4
ISDN is based on the public switched digital network, namely, the familiar
PCM network discussed in Chapter 7. In other words, the principal vehicle
for signal transport is the 64-kbps digital channel. When ISDN is implemented at a user premise, it assumes that access is available for 64-kbps
channels at the local serving exchange and that CCITT signaling system No. 7
is in place and operational for the intervening network end-to-end.
ISDN integrates services. It does so by providing a 64-kbps bearer channel
for all the services listed. In North America the digital channel may be a
56-kbps channel.
13.2
13.2.1
ISDN STRUCTURES
ISDN User Channels
At the ISDN usernetwork interface, the two most common structures for
user access transmission links are the B channel at 64-kbps transmission rate
483
484
and the D channel at 16 kbps. The B channel is the basic user channel and
serves any one of the traffic types listed in Section 13.1.
The D channel is a 16-kbps channel primarily used for signaling. Secondarily, if capacity permits, it may be used for lower-speed data connectivity to
the network.
Note: The D channel, when used for primary rate service, is a 64-kbps
channel. In this case, it is used exclusively for signaling.
There are also H channels for higher transmission rates. The H0 channel
is 384 kbps; there is an H1 group of transmission rates where H11 is 1536
kbps and H12 is 1920 kbps.
The H channels do not carry signaling. Their purpose is to serve the
higher data rate user for such things as conference television, digitized
program channels for broadcasters ., fast facsimile, and higher data rate
service for computer data.
13.2.2
485
channel 16., 2025, and 2631. Any time slot not used for H0 channels can
be used for B channels. Of course, channel 16 in the E-1 configuration is the
signaling channel.
There are two categories of H1 channels: H11 and H12. H11 is the
1.536-Mbps rate, and H12 is the 1920-kbps rate. This may be carried on the
DS1 1.544-Mbps configuration, but a signaling channel, if required, would
have to be carried on a separate DS1 configuration. For E-1, H1 would be
carried in time slots 125 excluding 16. of the 2.048-Mbps primary rate
interface.
The industry often uses the acronym PRI to designate the primary rate
interface.
13.3
13.3.1
486
3.
4.
5.
6.
Usernetwork protocols
Maintenance and operation
Performance
Services
487
488
13.4
When fully implemented, ISDN will provide both circuit and packet switching. For the circuit-switching case, now fairly broadly available in North
America, the B channel is fully transparent to the network, permitting the
user to utilize any protocol or bit sequence so long as there is end-to-end
agreement on the protocol that will be used. Of course the protocol itself
should be transparent to any bit sequence.
It is the D channel that carries the circuit-switching control function for its
related B channels. Whether it is the 16-kbps D channel associated with BRI
or the 64-kbps D channel associated with PRI, it is that channel which
transports the signaling information from the users ISDN terminal from NT
to the first serving telephone exchange of the telephone company or administration. Here the D-channel signaling information is converted over to
CCITT No. 7 signaling data employing ISUP ISDN user part. of signaling
system No. 7. Thus it is the D channels responsibility for call establishment
setup., supervision, termination takedown., and all other functions dealing
with network access.
The B channel in the case of circuit switching is serviced by NT1 or NT2
using OSI layer 1 functions only. The D channel carries out OSI layers 1, 2,
and 3 functions such that the B-channel protocol established by a family of
ISDN end users will generally make layer 3 null in the B channel where the
networking function is carried out by the associated D channel.
With packet switching, two possibilities emerge. The first basically relies
on the B channel to carry out OSI layers 1, 2, and 3 functions at separate
packet-switching facilities PSFs.. The D channel is used to set up the
connection to the local switching exchange at each end of the connection.
This type of packet-switched offering provides 64-kbps service. The second
method utilizes the D channel exclusively for lower data rate switched service
489
where the local interface can act as a CCITT ITU-T. X.25 data communication equipment DCE. device.
Figure 13.3 is a simplified conceptual diagram of ISDN circuit switching. It
shows the B channel riding on the public digital network and also shows the
D channel, which is used for signaling. Of course, the D channel is a separate
channel. It is converted to a CCITT No. 7 signaling structure and in this form
may traverse several signal transfer points STPs. and may be quasi-associated or disassociated from its companion B channel s.. Figure 13.4 is a
detailed diagram of the same ISDN circuit-switching concept. The reader
should note the following in the figure: a. Only users at each end have a
peer-to-peer relationship available for all seven OSI layers of the B channel.
As the call is routed through the system, there is only layer 1 physical layer.
interaction at each switching node along the call route. b. The D channel
requires the first three OSI layers for call setup to the local switching center
at each end of the circuit. c. The D-channel signaling data are turned over
to CCITT signaling system No. 7 SS No. 7. at the near- and far-end local
switching centers. d. SS No. 7 also utilizes the first three OSI layers for
circuit establishment, which requires the transfer of control information. In
SS No. 7 terminology this is called the message transfer part. There is a fourth
layer called the user part in SS No. 7. There are three user parts: telephone
user part, data user part, and ISDN user part ISUP. depending on whether
the associated B channel is in telephone, data, or ISDN service for the user.
490
Figure 13.5. ISDN packet service for lower data rates using the D channel. TA, terminal
adaptor; NT, network termination 2 andror 1; ET, exchange termination; TE1, terminal
equipment 1; PH, packet handling function. Note 1: This figure is only an example of many
possible configurations and is included as an aid to the text describing the various interface
functions. Note 2: In some implementations, the PH functions logically belonging to the ISDN
may reside physically in a node of the PSPDN. The service provided is still the ISDN virtual
circuit service. Note 3: See Recommendation X.325. Note 4: See Recommendation X.320.
Note 5: This connection is either on demand or semipermanent, but has no relevance with the
user network procedures. Only internal procedures between the ET and the PH are required.
(From Figure 2-3 r X.31, page 6, ITU-T Rec. X.31, Ref. 2.)
Figure 13.5 shows packet service for lower data rates where the D channel
is involved.
13.5
ISDN NETWORKS
ISDN NETWORKS
491
Figure 13.6. The basic architectural model of ISDN. TE, terminal equipment; BLLF, basic
low-layer functions; ALLF, additional low-layer functions; BHLF, basic high-layer functions;
AHLF, additional high-layer functions. Note a: In certain national situations, ALLF may also be
implemented outside the ISDN, in special nodes or in certain categories of terminals. Note b:
The ISDN local functional capabilities correspond to functions provided by a local exchange
and possibly including other equipment, such as electronic cross-connect equipment,
muldexes, and so on. Note c: These functions may either be implemented within ISDN or be
provided by separate networks. Possible applications for basic high-layer functions and for
additional high-layer functions are contained in Recommendation I.210. Note d: For signaling
between international ISDNs, CCITT signaling system No. 7 shall be used. (From Figure
1rI.324, page 3, CCITT Rec. I.324, Ref. 3.)
Figure 13.7. Reference configuration of public ISDN connection type. IRP, internal reference
point; CRF, connection-related functions; CE, connection element. (From Figure 3rI.324,
page 8, CCITT Rec. I.324, Ref. 3.)
492
Figure 13.8. Access connection element model. NT1, network termination 1; S, 64-kbps
circuit switch; C, signaling handling and exchange control functions; Mpx, (remote) multiplexer; RSU, remote switching unit andror concentrator; CRF, connection-related function.
(From Figure 4rI.324, page 9, CCITT Rec. I.324, Ref. 3.)
Figure 13.9. National tandem r transit connection element model. S, 64-kbps circuit switch;
C, signaling handling and exchange control functions; CRF, connection-related function.
(From Figure 5rI.324, page 10, CCITT Rec. I.324, Ref. 3.)
Figure 13.10. Private ISDN access connection element. S, 64-kbps circuit switch; CH,
signaling handling and private ISDN exchange control function; CRF, connection-related
function. (From Figure 8rI.324, page 11, CCITT Rec. I.324, Ref. 3.)
493
13.6
13.6.1
Figure 13.11 shows the ISDN relationship with OSI. OSI was discussed in
Chapter 2.. As is seen in the figure, ISDN concerns itself with only the first
three OSI layers. OSI layers 4 to 7 are peer-to-peer connections and the
end-users responsibility. Remember that the B channel is concerned with
OSI layer 1 only. We showed the one exception; that is, when the B channel
is used for packet service, it will have those first three OSI layers to interface.
The D channel with its signaling and control functions is the exception to
the previous statement. The D channel interfaces with CCITT Signaling
System No. 7 at the first serving exchange. D channels handle three types of
information: signaling s., interactive data p., and telemetry t..
The layering of the D channel has followed the intent of the OSI
reference model. The handling of the p and t data can be adapted to the OSI
Figure 13.11. A generic communication context showing ISDNs relationship with the
seven-layer OSI model. Note that the end-system protocol blocks may reside in the subscribers TE or network exchanges or other ISDN equipment.
494
Figure 13.12. Correspondence among the ISDN D channel, CCITT SS No. 7, and the OSI
model. MTP, message transfer part; UP, user part. (From Ref. 4. Copyright IEEE, New York,
1985.)
model; the s data, by its very nature, cannot.* Figure 13.12 shows the
correspondence between D-channel signaling protocols, SS No. 7 levels, and
the OSI seven-layer model.
13.6.2
The SrT interface of the reference model, Figure 13.2 or layer 1 physical
interface ., requires a balanced metallic transmission medium i.e., copper
pair. for each direction of transmission four-wire. capable of supporting 192
kbps. Again, this is the NT interface of the ISDN reference model.
Layer 1 provides the following services to layer 2 for ISDN operation:
1. The transmission capability by means of an appropriately encoded bit
stream of the B and D channels and any timing and synchronization
functions that may be required.
2. The signaling capability and the necessary procedure to enable customer terminals andror network terminating equipment to be deactivated when required and reactivated when required.
3. The signaling capability and necessary procedures to allow terminals to
gain access to the common resource of the D channel in an orderly
fashion while meeting the performance requirements of the D-channel
signaling system.
*CCITT No. 7 signaling system, like any other signaling system, has the primary quality of
service measure as post-dial delay. This is principally the delay in call setup. To reduce the
delay time as much as possible, it is incumbent upon system engineers to reduce processing time
as much as possible. Thus SS No. 7 truncates OSI to 4 layers, because each additional layer
implies more processing time, thus more post-dial delay.
TABLE 13.1
495
Generic
L1 l L2
PH-DATA
PH-ACTIVATE
PH-DEACTIVATE
M l L1
MPH-ERROR
MPH-ACTIVATE
MPH-DEACTIVATE
MPH-INFORMATION
Parameter
Priority
Indicator
Message
Unit
X
X
X
X
(Note 2)
X
X
X
Request
Indication
X
(Note 1)
X
Message Unit
Content
Layer 2 peer-to-peer
message
Type of error or
recovery from a
previously reported
error
Connectedr
disconnected
Note 1: PH-DATA request implies underlying negotiation between layer 1 and layer 2 for the acceptance
of the data.
Note 2: Priority indication applies only to the request type.
Source: Table 1rI.430, ITU-T Rec. I.430, 11r95, page 2 (Ref. 6 ).
496
Figure 13.13. Frame structure at reference points S and T. This is the frame structure of the
multiplexed bit stream for a 2B q D configuration, ITU-T interface, level 1. (From Figure
3rI.430, page 7, ITU-T Rec. I.430, Ref. 6.)
The functions covered at the interface include bit timing at 192 kbps to
enable the TE and NT to recover information from the aggregate bit stream.
This timing provides 8-kHz octet timing for the NT and TE to recover the
time division multiplexed channels i.e., 2B q D multiplexed .. Other functions include D-channel access control, power feeding, deactivation, and
activation.
Interchange circuits are required of which there is one in either direction
of transmission i.e., from the local switching point to and from the NT..
They are used to transfer digital signals across the interface. All of the
functions described above, except for power feeding, are carried out by
means of a digitally multiplexed signal. The format of this signal is shown in
Figure 13.13 and described in the next section.
It should be noted that NT1 in Europe is considered to be owned by the
network, meaning the local telephone company or administration. In the
United States, NT1 is owned by the customer. Transmission between
the network and the customer is 2-wire. 2-wire to 4-wire conversion takes
place in NT1. Echo suppressors at each end of the 2-wire transmission line
allow two-way data to pass without harmful interference one to the other.
13.6.2.3 Frame Structure. In both directions, the bits are grouped into
frames of 48 bits each. The frame structure is identical for all configurations,
whether point-to-point or point-to-multipoint. However, the frame structures
497
Group
1 and 2
3 to 11
12 and 13
14 and 15
16 to 24
25 and 26
27 to 35
36 and 37
38 to 46
47 and 48
Group
Framing signal with balance bit
B1 channel (first octet)
E-, D-echo channel bit
D-channel bit
Bit A used for activation
FA auxiliary framing bit
N bit (coded as defined in 6.3 of I.430)
B2 channel (first octet)
E-, D-echo channel bit
D-channel bit
M, multiframing bit
B1 channel (second octet)
E-, D-echo channel bit
D-channel bit
S
B2 channel (second octet)
E-, D-echo channel bit
D-channel bit
Frame balance bit
Note: The use of the S bit is optional, and when not used it is set to binary
ZERO.
Source: Table 3rI.430, page 8 (Ref. 6 ).
are different for each direction of transmission. These structures are shown
in Figure 13.13, where the upper half of the figure shows the bit format
direction NT to TE; the lower half, TE to NT. Table 13.2A gives explanatory
notes for the direction TE to NT, and Table 13.2B, the direction NT to TE.
Allow that NT refers to the network side of the circuit and TE refers to the
terminal side. Note that each group is DC balanced by the last bit, the L bit.
498
499
500
Figure 13.14. LT to NT1 2B1Q superframe technique and overhead bit assignments.
NT1-to-LT superframe delay is offset by LT-to-NT1 superframe by 60 " 2 quats (about 0.75
ms). All bits other than the Sync word are scrambled. 1, reserved bit for future standard
(set s 1); ( )m and ( )s, magnitude bit and sign bit for given quat; act, activation bit; crc,
cyclic redundancy check: covers 2B q D and M4; dea, deactivation bit; eoc, embedded
operations channel; a, address bit; dm, datarmessage indicator; i, information (datarmessage); febe, far-end block error bit. (From Figure 3.1a, page 3-9, Ref. 7.)
between states, and convenient integer magnitudes. The block synchronization word SW. contains nine quaternary elements repeated every 1.5 ms:
q3,q 3,y 3,y 3,y 3,q 3,y 3,q 3,q 3
Line Configurations. One basic access is provided by a single, 2-wire DSL
interface. Operation on this 2-wire line is full-duplex. To avoid interface
between transmitted and received signals on the same line, an echo canceler
is used. Echo cancellation involves adaptively forming a replica of the echo
signal arriving at the receiver from its local transmitter and subtracting it
from the signal at the input of the receiver.
13.6.3
501
Figure 13.15. NT1 to LT 2B1Q superframe technique and overhead bit assignment. NT1-to-LT
superframe delay is offset by LT-to-NT1 superframe 60 " 2 quats (about 0.75 ms). All bits
other than the Sync word are scrambled. 1, reserved bit for future standard (set s 1). ( )m
and ( )s, magnitude bit and sign bit for given quat; act, activation bit; crc, cyclic
redundancy check: covers 2B q D and M4; cso, cold start only bit; dea, deactivation bit; febe,
far-end block error bit; eoc, embedded operations channel; a, address bit; dm, data r message
indicator; i, information (data r message); ntm, NT1 in Test Mode bit; nib, network indicator
bit from LULT and LUNT to LT; ps 1 and ps 2 , power status bits (s 1 from NT1 to LT). (From
Figure 3-1b, page 3-10, Ref. 7.)
502
TABLE 13.3
Bit rate
Pair(s) in each direction of transmission
Code
Test load impedance
Nominal pulse shape
Signal level
(Notes 2 and 3)
1544 kbps
One symmetrical pair
B8ZS (Note 1)
100 ohm resistive
See pulse mask (Note 2) a
q12 dBm to q19 dBm
At least 25 dB below the
power at 772 kHz
Note 1: B8ZS is modified AMI code in which eight consecutive binary ZEROs are replaced with
000 q y 0 y q if the preceding pulse was positive (q ) and with 000 y q 0 q y if the preceding
pulse was negative (y ).
Note 2: The pulse mask and power level requirements apply at the end of a pair having a loss at
772 kHz of 0 to 1.5 dB.
Note 3: The signal level is the power level measured in a 3-kHz bandwidth at the output port for an
all binary ONEs pattern transmitted.
a
503
TABLE 13.4
Multiframe Structure
F Bits
Assignments
Multiframe
Frame Number
Multiframe
Bit Number
FAS
Control r Maintenance
CRC Bits
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
1
194
387
580
773
966
1159
1352
1545
1738
1931
2124
2317
2510
2703
2896
3089
3282
3475
3668
3861
4054
4247
4440
e1
e2
e3
e4
e5
e6
Frame Structure. The frame structure is shown in Figure 13.16. Each time
slot consists of consecutive bits, numbered 1 through 8. Each frame is 193
bits long and consists of an F bit framing bit. followed by 24 consecutive
time slots. The frame repetition rate is 8000 frames per second.
Table 13.4 shows the multiframe structure called extended superframe in
the United States . which is 24 frames long. It takes advantage of the more
advanced search algorithms for frame alignment. There are 8000 F bits
504
frame alignment bits. transmitted per second i.e., 8000 frames a second, 1 F
bit per frame.. In 24 frames, with these new strategies, only 6 bits are
required for frame alignment as shown in Table 13.4. The remaining 18 bits
are used as follows; There are 12 m bits used for control and maintenance,
and the 6 e bits are used for CRC6 error checking.
Time Slot Assignment. Time slot 24 is assigned to the D channel, when this
channel is present.
A channel occupies an integer number of time slots and the same time slot
positions in every frame. A B channel may be assigned any time slot in the
frame, an H0 channel may be assigned any six slots in a frame in numerical
order not necessarily consecutive., and an H11 channel may be assigned
slots 1 to 24. The assignments may vary on a call-by-call basis.
CODES FOR IDLE CHANNELS, IDLE SLOTS, AND INTERFRAME TIME FILL. A pattern
including at least three binary 1s in an octet is transmitted in every time slot
that is not assigned a channel e.g., time slots awaiting channel assignment on
a per-call basis, residual slots on an interface that is not fully provisioned,
etc.. and in every time slot of a channel that is not allocated to a call in both
directions. Interframe layer 2. time fill consists of contiguous HDLC flags*
transmitted on the D channel when its layer 2 has no frames to send.
505
506
Figure 13.17. Entities, service access points (SAPs), and endpoints. (From Figure 2rQ.920,
page 2, ITU-T Rec. Q.920, Ref. 11.)
Figure 13.18. Data-link connections between two or more SAPs. (From Figure 3rQ.920,
page 3, ITU-T Rec. Q.920, Ref. 11.)
Between the data-link layer and its adjacent layers there are four types of
service primitives:
1.
2.
3.
4.
Request
Indication
Response
Confirm
507
Figure 13.19. Functions of service primitives. Note: The same principle applies for
data-link-layerphysical-layer interactions. (From Figure 4rQ.920, page 4, ITU-T Rec. Q.920,
Ref. 11.)
508
Figure 13.20. Data-link-layer reference model. (From Figure 5rQ.920, page 5, ITU-T Rec.
Q.920, Ref. 11.)
509
13.7.1
Figure 13.21. Frame formats for layer 2 frames. (From Figure 1rQ.921, page 20, ITU-T Rec.
Q.921, Ref. 12.)
510
Frame Check Sequence (FCS) Field. The FCS field is a 16-bit sequence and
is the 1s complement of the modulo 2 sum of:
1. The remainder of X raised to the k power:
X 15 q X 14 X 1 q 1
divided by the generating polynomial
X 16 q X 12 q X 5 q 1
where k is the number of bits in the frame existing between but not
including the final bit of the opening flag and the first bit of the FCS,
excluding bits inserted for transparency, and
2. The remainder by modulo 2 division by the generating polynomial given
above of the product of X 16 by the content of the frame defined above.
Transparency, mentioned above, ensures that a flag or abort sequence is
not imitated within a frame. On the transmit side the data-link layer
examines the frame content between the opening and closing flag sequences
and inserts a 0 bit after all sequences with five contiguous 1 bits including
the last 5 bits of the FCS.. On the receive side the data-link layer examines
the frame contents between the opening and closing flag sequences and
discards any 0 bit that directly follows five contiguous 1 bits.
511
Figure 13.22. LAPD address field format. EA, address field extension bit; CrR, commandrresponse field bit; SAPI, service access point identifier; TEI, terminal endpoint identifier. (From
Figure 5rQ.921, page 23, ITU-T Rec. Q.920, Ref. 12.)
Address Field Format. The address field is shown in Figure 13.22. It contains address field extension bits EA., commandrresponse indication bit
CrR., a data-link-layer service access point identifier SAPI. subfield, and a
terminal endpoint identifier TEI. subfield.
ADDRESS FIELD EXTENSION BIT EA.. The address field range is extended by
reserving the first transmitted bit of the address field to indicate the final
octet of the address field. The presence of a 1 in the first bit position of an
address field octet signals that it is the final octet of the address field. The
double-octet address field for LAPD operation has bit 1 of the first octet set
to a 0 and bit 1 of the second octet set to a 1.
COMMANDrRESPONSE FIELD BIT CrR.. The CrR bit identifies a frame as
either a command or a response. The user side sends commands with the
CrR bit set to 0 and responses with the CrR bit set to 1. The network side
does the opposite; that is, commands are sent with the CrR bit set to 1, and
responses are sent with the CrR bit set to 0.
In keeping with HDLC rules,* commands use the address of the peer
data-link entity while responses use the address of their own data-link-layer
entity. In accordance with these rules, both peer entities on a point-to-point
data-link connection use the same DLCI composed of a SAPITEI where
SAPI and TEI conform to the definitions contained as follows.
Service Access Point Identifier (SAPI). The SAPI identifies a point at which
data-link services are provided by a data-link-layer entity to a layer 3 or
management entity. Consequently, the SAPI specifies a data-link-layer entity
that should process a data-link-layer frame. The SAPI allows 64 SAPs to be
specified, where bit 3 of the address field octet containing the SAPI is the
least significant binary digit and bit 8 is the most significant. The SAPI values
are allocated as shown in Table 13.5.
*LAPD, as we know, is a derivative of HDLC. See Chapter 3.
512
TABLE 13.5
SAPI
Value
0
1
16
63
All Others
Terminal Endpoint Identifier (TEI). The TEI for a point-to-point link connection may be associated with a single terminal equipment TE.. A TE may
contain one or more TEIs used for point-to-point data transfer. The TEI for
a broadcast data-link connection is associated with all user-side data-link-layer
entities containing the same SAPI. The TEI subfield allows 128 values where
bit 2 of the address field octet containing the TEI is the least significant bit
and bit 8 is the most significant bit. The following conventions apply for
assignment of these values:
1. TEI for broadcast data-link connection. The TEI subfield bit pattern
111 1111 s 127. is defined as the group TEI. The group TEI is
assigned to the broadcast data-link connection associated with the
addressed SAP.
2. TEI for point-to-point data-link connection. The remaining TEI values
are used for point-to-point data-link connections associated with the
addressed SAP. The range of TEI values are as follows:
Values 063:
Nonautomatic TEI assignment user equipment
Values 64126: Automatic TEI assignment user equipment
Control Field Formats. Control field formats are shown in Table 13.6. The
control field identifies the type of frame, either a command or a response.
The control field contains sequence numbers, where applicable. Three types
of control field formats are specified: numbered information transfer I
format., supervisory functions S format., and unnumbered information
transfers and control functions U format..
Further discussion of control field formats may be found in Section 3.4.
LAPD Primitives. The following comments clarify the semantics and usage of
primitives. Primitives consist of commands and their respective responses
associated with the services requested of a lower layer. The general syntax of
a primitive is:
XX-generic name-type: parameters
513
TABLE 13.6
N(S)
I format
N(R)
S format
N(R)
U format
M
PrF
X
1
Octet 4
Octet 4
PrF
PrF
5
Octet 4
TABLE 13.7
Generic
Name
Parameters
Priority Message
Request IndicationResponse Confirm Indicator
Unit
L3 l L2
DL-ESTABLISH
DL-RELEASE
DL-DATA
X
X
X
X
X
X
X
X
DL-UNIT DATA
M l L2
MDL-ASSIGN
MDL-REMOVE
MDL-ERROR
X
X
X
X
X
MDL-UNIT DATA
MDL-XID
L2 l L1
PH-DATA
X
X
X
X
X
PH-ACTIVATE
PH-DEACTIVATE
M l L1
MPH-ACTIVATE
MPH-DEACTIVATE
MPH-INFORMATION
L3 l L2:
L2 l L1:
M l L2:
M l L1:
Message
Unit
Contents
Layer 3
peer-to-peer message
Layer 3
peer-to-peer message
TEI value, CES
TEI value, CES
Reason for error
message
Management function
peer-to-peer message
Connection
management
information
Data-link-layer
peer-to-peer message
Connectedr
disconnected
514
13.8
OVERVIEW OF LAYER 3
The layer 3 protocol of course deals with the D channel and its signaling
capabilities. It provides the means to establish, maintain, and terminate
network connections across an ISDN between communicating application
entities. A more detailed description of the layer 3 protocol may be found in
ITU-T Rec. Q.931, Ref. 14..
Layer 3 utilizes functions and services provided by its data-link layer, as
described in Section 13.7 under LAPD functions. These necessary layer 2
support functions are listed and briefly described as:
OVERVIEW OF LAYER 3
515
516
13.8.1
Layer 3 Specification
TABLE 13.8
OVERVIEW OF LAYER 3
TABLE 13.9
Information Element
Protocol discriminator
Call reference
Message type
Sending complete
Repeat indicator
Bearer capability
Channel identification
Facility
Progress indicator
Network specific facilities
Display
Keypad facility
Signal
Switchhook
Feature activation
Feature indication
Calling party number
Calling party subaddress
Called party number
Called party subaddress
Transit network selection
Low layer compatibility
High layer compatibility
Useruser
Direction
Type
Length
Both
Both
Both
Both
Both
Both
Both
Both
Both
Both
nu
un
nu
un
un
nu
Both
Both
Both
Both
un
Both
Both
Both
M
M
M
O (Note 1)
O (Note 2)
M (Note 3)
O (Note 4)
O (Note 5)
O (Note 6)
O (Note 7)
O (Note 8)
O (Notes 10, 12)
O (Note 11)
O (Note 12)
O (Note 12)
O (Note 12)
O (Note 13)
O (Note 14)
O (Note 15)
O (Note 16)
O (Note 17)
O (Note 18)
O (Note 19)
O (Note 20)
1
2*
1
1
1
413
2*
2*
24
2*
Note 9
234
23
23
24
25
2*
223
2*
223
2*
216
24
Note 21
517
518
Protocol discriminator
Call reference
Message type
Other information elements, as required
Information elements 1, 2, and 3 are common to all messages and are always
present, while information element 4 is specific to each message type. This
organization is illustrated in the example shown in Figure 13.23.
The term default implies that the value defined should be used in the
absence of any assignment, or in the negotiation of alternative values. When
a field, such as the call reference value, extends over more than 1 octet, the
order of bit values progressively decreases as the octet number increases. The
least significant bit of the field is represented by the lowest-numbered bit of
the highest-numbered octet field.
Protocol Discriminator. The purpose of the protocol discriminator is to
distinguish messages for usernetwork call control from other messages to
be defined . within ITU-T Rec. Q.931. It also distinguishes messages of
ITU-T Rec. Q.931 from those OSI network layer protocol units which are
coded to other ITU-T Recommendations and other standards.
Call Reference. The purpose of the call reference is to identify the call or
facility registrationrcancellation request at the local usernetwork interface
to which the particular message applies. The call reference does not have
end-to-end significance across ISDNs.
OVERVIEW OF LAYER 3
519
Figure 13.23. General message organization example. (From Figure 4-1rQ.931, page 67,
ITU-T Rec. Q.931, ITU-T Rec. Q.931, Ref. 14.)
520
13.9
13.9.1
Two main services for packet-switched data transmission are defined for
packet-mode terminals connected to the ISDN:
Case A: Access to a PSPDN PSPDN services. PSPDN s packet-switched
public data network.
Case B: Use of an ISDN virtual circuit service
13.9.2
This configuration is shown in Figure 13.24 and refers to the service of Case
A, thus implying a transparent handling of packet calls through an ISDN.
Only access via the B channels is possible. In this context, the only support
that an ISDN gives to packet calls is a physical 64-kbps circuit-mode semipermanent or demand transparent network connection type between the appropriate PSPDN port and the X.25 DTE q TA or TE1 at the customer
premises.
In the case of semipermanent access, the X.25 DTE q TA or TE1 is
connected to the corresponding ISDN port at the PSPDN AU.. The TA,
when present, performs only the necessary physical channel rate adaption
Figure 13.24. Case A: Configuration when accessing PSPDN services. AU, ISDN access unit
ports; TA, terminal adaptor; NT, network termination 2 and r or 1; ET, exchange termination;
TE1, terminal equipment 1. (From Figure 2-1rX.31, page 3, ITU-T Rec. X.31, ITU-T Rec. X.31,
Ref. 2.)
521
between the user at the R reference point and the 64-kbps B-channel rate.
D-channel layer 3 messages are not used in this case.
In the case of demand access to the PSPDN, which is shown in the upper
portion of Figure 13.24, the X.25 DTE q TA or TE1 is connected to an
ISDN port at the PSPDN AU.. The AU is also able to set up 64-kbps
physical channels through the ISDN.
In this type of connection, an originating call will be set up over the B
channel toward the PSPDN port using the ISDN signaling procedure prior to
starting X.25 layer 2 and layer 3 functions. This is done by using either
hot-line e.g., direct call. or complete selection methods. Moreover, the TA,
when present, performs user rate adaption to 64 kbps. Depending on the
data rate adaption technique employed, a complementary function may be
needed at the AU of the PSPDN.
In the complete selection case, two separate numbers are used for outgoing access to the PSPDN:
The ISDN number of the access port of the PSPDN, given in the
D-channel layer 3 SETUP message Q.931.
The address of the called DTE indicated in the X.25 call request packet
This configuration refers to the case where a packet handling PH. function
is provided within the ISDN. The configuration in Figure 13.25 relates to the
case of X.25 link and packet procedures conveyed through the B channel. In
this case, the packet call is routed, within an ISDN, to some PH function
where the complete processing of the X.25 call can be carried out.
The PH function may be accessed in various ways depending on the
related ISDN implementation alternatives. In any case, a B-channel connection set up torfrom a PH port supports a. the necessary processing for
522
Figure 13.25. Case B: Configuration for the ISDN virtual circuit service (access via B
channel). TA, terminal adaptor; NT, network termination 2 andror 1; ET, exchange termination; TE1, terminal equipment 1; PH, packet handling function. Note: 1: This figure is only an
example of many possible configurations and is included as an aid to the text describing the
various interface functions. Note 2: In some implementations the PH functions logically
belonging to the ISDN may reside physically in a node of the PSPDN. The service provided is
still the ISDN virtual circuit service. Note 3: See Recommendation X.325. Note 4: See
Recommendation X.320. (From Figure 2-2rX.31, page 5, ITU-T Rec. X.31, Ref. 2.)
B-channel packet calls, b. standard X.25 functions for layer 2 and layer 3,
and c. possible path setting-up functions for layer 1 and possible rate
adaption.
The configuration shown in Figure 13.5 in Section 13.4. refers to the case
of X.25 packet layer procedures conveyed through the D channel. In this case
a number of DTEs can operate simultaneously through a D channel by using
connection identifier discrimination at ISDN layer 2. The accessed port of
PH is still able to support X.25 packet layer procedures.
It should be pointed out that the procedures for accessing a PSDTS
public switched data transmission service. through an ISDN usernetwork
interface over a B or D channel are independent of where the service
provider chooses to locate PH functionsthat is, in either a. a remote
exchange or packet-switching module in an ISDN or, b. the local exchange.
However, the procedures for packet access through the B channel or the D
channel are different.
In both cases of B- and D-channel accesses, in the service of Case B, the
address of the called DTE is contained in the X.25 call request packet. The
establishment of the physical connection from the TArTE1 to the packet
handling functions is done on the basis of the requested bearer service ISDN
virtual circuit service.; therefore, the user does not provide any addressing
information in the layer 3 procedures D channel, Q.931..
13.9.4
523
Service Aspects
524
REFERENCES
1. ISDN UserNetwork InterfacesInterface Structures and Access Capabilities, CCITT
Rec. I.412, Fascicle III.8, IXth Plenary Assembly, Melbourne, 1988.
2. Support of Packet Mode Terminal Equipment by an ISDN, ITU-T Rec. X.31, ITU
Geneva, November 1995.
3. ISDN Network Architecture, CCITT Rec. I.324, ITU Geneva, 1991.
4. William Stallings, ed., Tutorial: Integrated Serices Digital Network ISDN ., IEEE
Computer Society Press, Washington DC, 1985.
5. IEEE Standard Dictionary of Electrical and Electronic Terms, 6th edition, IEEE
Press, New York, 1996.
REFERENCES
525
6. Basic UserNetwork Interface Layer 1 Specification, ITU-T Rec. I.430, ITU Geneva,
November 1995.
7. ISDN Basic Access Transport System Requirements, Technical Reference TR-TSY000397, Issue 1, October 1988, Morristown, NJ.
8. Roger L. Freeman, Telecommunication Transmission Handbook, 4th edition, John
Wiley & Sons, New York, 1998.
9. Primary Rate UserNetwork InterfaceLayer 1 Specification, ITU-T Rec. I.431,
ITU Geneva, March 1993.
10. Frame Alignment and Cyclic Redundancy Check Procedures Relating to Basic Frame
Structures Defined in Rec. G.704, CCITT Rec. G.706, ITU Geneva, April 1991.
11. Digital Subscriber Signaling System No. 1 DSS1. : ISDN UserNetwork Interface
Data Link LayerGeneral Aspects, ITU-T Rec. Q.920, ITU Geneva, March 1993.
12. ISDN UserNetwork InterfaceData Link Layer Specification, ITU-T Rec. Q.921,
ITU Geneva, September 1997.
13. ISDN UserNetwork Interface, Layer 3, General Aspects, ITU-T Rec. Q.930, ITU
Geneva, March 1993.
14. ISDN UserNetwork Interface, Layer 3For Basic Call Control, ITU-T Rec.
Q.931, ITU Geneva, May 1998.
15. Interface Between Data Terminal Equipment DTE . and Data Circuit Terminating
Equipment DCE . for Terminals Operating in the Packet Mode and Accessing the
Packet-Switched Public Data Network through a Switched Telephone Network or an
Integrated Serices Digital Network or a Circuit-Switched Public Data Network,
ITU-T Rec. X.32, ITU Geneva, October 1996.
16. The International Public Telecommunications Numbering Plan, ITU-T Rec. E.164,
ITU Geneva, May 1998.
17. Roger L. Freeman, Reference Manual for Telecommunications Engineering, 3rd
edition, John Wiley & Sons, New York, to be published.
14
BUILDING AND CAMPUS WIRING
AND CABLING FOR DATA
COMMUNICATIONS
14.1
The enterprise network has come of age. Its performance is only as good as
its underlying building wiring and cabling. The principal signal lead is the
twisted pair and will remain so for quite some time. Longer runs are based
on fiber-optic cable.
Ideally, a wiring and cabling plan for signal and ground leads and cabling
should be incorporated in a building design layout prior to construction or
renovation. Included in the plan is the strategic placement of
wiringrequipment closets, signal entry locations, and convenient cross-connects Ref. 1..
The principal objective of this chapter is to describe and suggest layouts of
structured cabling systems for commercial buildings. Both single-tenant and
multitenant structures are covered. Our concern, of course, is the cabling
that will carry telecommunication signals with emphasis on data and enterprise networks.
Two subsidiary topics are also covered: 1. the effects of electromagnetic
interference EMI. and their mitigation and 2. grounding, bonding, and
shielding. The chapter leans heavily on information provided by EIArTIA568A, Commercial Building Telecommunications Cabling Standard Ref. 2..
Issues dealing with survivability and improved availability are flagged
where appropriate.
The following is a list of common services and systems that should be
considered in the design of a commercial building cabling system:
1. Voice communications and associated PABX
2. Data communications including LANs and WANs
527
528
HORIZONTAL CABLING
HORIZONTAL CABLING
529
Figure 14.1. Campus wiringrcabling, interbuilding backbone cabling. (From Figure 1-1,
EIArTIA-568A, Ref. 2.)
14.3.1
Selection of Media
530
14.4
BACKBONE CABLING
BACKBONE CABLING
531
Figure 14.2. Backbone hierarchical star topology. (From Figure 5-1, EIArTIA-568A, Ref. 2.)
532
TABLE 14.1
Cable Type
Category 3 UTP multipair
Category 4 UTP multipair
Category 5 UTP multipair
150- STP-A
Spectral Bandwidth
Maximum Distance
516 MHz
1020 MHz
20100 MHz
20300 MHz
90 m (295 ft)
90 m (295 ft)
90 m (295 ft)
90 m (295 ft)
14.5
TELECOMMUNICATION CLOSETS
The principal function of a telecommunication closet is to terminate horizontal cable distribution. It also is the location for the termination of backbone
cable. The cross-connection of horizontal and backbone cable terminations
using jumpers or patch cords allows flexible connectivity when extending
various services to telecommunication outletrconnectors. Connecting hardware, jumpers, and patch cords used for this purpose are collectively referred
to as horizontal cross-connect.
A telecommunication closet may also contain the intermediate cross-connect or the main cross-connect for different portions of the backbone cabling
system. Sometimes backbone-to-backbone cross-connections in the telecommunications closet are used to tie different telecommunication closets together in a ring, bus, or tree configuration as discussed above.
A telecommunication closet also provides a controlled environment to
house telecommunication equipment, connecting hardware, and splice closures serving a portion of the building.
14.5.1
Cabling Practices
533
14.6
ENTRANCE FACILITIES
An entrance facility serves as the entry points for cables, connecting hardware, protection devices, and other equipment needed to connect the outside
plant facilities to the premises cabling. Such components may be used for
public network services, private network customer premises services, or both.
The demarcation point between regulated carriersrservice providers and
customer premise cabling may be part of the entrance facility. The entrance
facilities include connections between cabling used in the outside environment and cabling authorized for in-building distribution. The connections
may be accomplished via splices or other means.
14.7
14.7.1
534
14.7.2
Conductor Identification
TABLE 14.3
Color Code
Abbreviation
Pair 1
White-blue, Note 1;
Blue, Note 2
(W-BL) (BL)
Pair 2
White-orange, Note 1;
Orange, Note 2
(W-O) (O)
Pair 3
White-green, Note 1;
Green, Note 2
(W-G) (G)
Pair 4
White-brown, Note 1;
Brown, Note 2
(W-BR) (BR)
Transmission Characteristics
Parameter
DC resistance
DC resistance unbalance
Mutual capacitance at 1 kHz
Value
9.38 per 100 m (328 ft)
No more than 5% between any two conductors
Not to exceed 6.6 nFr100 m (328 ft) for Category 3;
5.6 nFr100 m for Category 4 and Category 5
At 1 kHz any pair, not to exceed 330
pFr100 m (328 ft)
TABLE 14.4
535
Frequency
(MHz)
Category 3
(dB)
Category 4
(dB)
Category 5
(dB)
110
1016
1620
20100
12
12 y 10 log( fr10)
21
21 y 10 log( fr10)
21 y 10 log( fr10)
23
23
23
23 y 10 log( fr20)
TABLE 14.5
Frequency
(MHz)
Category 3
(dB)
Category 4
(dB)
Category 5
(dB)
0.064
0.256
0.512
0.772
1.0
4.0
8.0
10.0
16.0
20.0
25.0
31.25
62.5
100.0
0.9
1.3
1.8
2.2
2.6
5.6
8.5
9.7
13.1
0.8
1.1
1.5
1.9
2.2
4.3
6.2
6.9
8.9
10.0
0.8
1.1
1.5
1.8
2.0
4.1
5.8
6.5
8.2
9.3
10.4
11.7
17.0
22.0
14.8
Backbone UTP cabling consists of cables in pair sizes greater than four pairs
made up of 24 AWG thermoplastic insulated copper conductors that are
formed into one or more units of unshielded twisted pairs. The units are
assembled into binder groups of 25 pairs or part thereof following standard
industry color code. It should be noted that multipair 22 AWG cables that
meet the transmission requirements listed below are also acceptable for
backbone UTP application. The diameter over the insulation will be 1.22 mm
0.048 in.. maximum.
14.8.1
536
Category 3
(dB)
Category 4
(dB)
Category 5
(dB)
0.150
0.772
1.0
4.0
8.0
10.0
16.0
20.0
25.0
31.25
62.5
100.0
53
43
41
32
27
26
23
68
58
56
47
42
41
38
36
74
64
62
53
48
47
44
42
41
39
35
32
14.8.2
537
Connection hardware for the 100- UTP cabling system is installed at the
following:
a.
b.
c.
d.
e.
Main cross-connect
Intermediate cross-connect
Horizontal cross-connect
Horizontal cabling transition points
Telecommunication outletrconnectors
Category 3
(dB)
Category 4
(dB)
Category 5
(dB)
1.0
4.0
8.0
10.0
16.0
20.0
25.0
31.25
62.5
100.0
0.4
0.4
0.4
0.4
0.4
0.1
0.1
0.1
0.1
0.2
0.2
0.1
0.1
0.1
0.1
0.2
0.2
0.2
0.2
0.3
0.4
538
TABLE 14.8
Frequency
(MHz)
Category 3
(dB)
Category 4
(dB)
Category 5
(dB)
1.0
4.0
8.0
10.0
16.0
20.0
25.0
31.25
62.5
100.0
58
46
40
38
34
65
58
52
50
46
44
65
65
62
60
56
54
52
50
44
40
DC Resistance. The DC resistance between the input and output connections of the connecting hardware not including the cable stub, if any. used
for 100- cabling should not exceed 0.3-.
14.9
This section covers the requirements for 150- STP-A inside cable for use in
the horizontal cabling system. The cable is restricted to two-pair size consisting of 22 AWG thermoplastic insulated solid conductors enclosed by a shield
and an overall thermoplastic jacket. The pair twist lengths are selected by the
manufacturer to ensure compliance with the crosstalk requirements of
EIArTIA-568-A. The pair 1 color code is red-green, and for pair 2 it is
orange-black.
14.9.1
539
Maximum Attenuation
[dBr100 m (328 ft)]
0.0096
0.0384
4.0
8.0
10
16
20
25
31.25 a
62.5
100
300
0.30
0.50
2.2
3.1
3.6
4.4
4.9
6.2
6.9
9.8
12.3
21.4
f
50
dBrkm,
14.10
540
Rationale
541
Figure 14.3. Bonding and grounding layout for a large commercial building. (From Figure
2.1-1, EIArTIA-607, Ref. 3.)
542
Figure 14.4. Connectivity to the service equipment (power) ground. (From Figure 5.2-1,
EIArTIA-607, Ref. 3.)
All bonding conductors should be insulated and of copper. Bonding conductors should not be placed in ferrous metallic conduit. Bonding conductors
should be marked green in color.
The bonding conductor for telecommunications bonds the TMGB to the
service equipment power. ground as shown in Figure 14.4. As a minimum,
the bonding conductor should be the same size as the TBB.
14.11.2
A TBB is a conductor that interconnects all TGBs with the TMGB. A TBBs
basic function is to reduce or equalize potential differences between telecommunication systems bonded to it. A TBB is not intended to serve as the only
conductor providing a ground fault return path.
A TBBs. originates at the TMGB, extends throughout the building using
the telecommunication backbone pathways, and connects to the TGBs. in all
telecommunication closets and equipment rooms. The interior water piping
system of the building should not be used as a TBB, nor should the metallic
cable shield.
543
Bonding and Sizing the TBB. A TBB is an insulated copper conductor. Its
minimum conductor size is No. 6 AWG; a larger diameter is preferable, even
3r0 AWG.
Whenever two or more vertical TBBs are used within a multistory building, the TBBs are bonded together with a TBB interconnecting bonding
conductor TBBIBC. at the top floor and at a minimum of every third floor
in between. A TBB may be spliced, provided that all applicable requirements
of Section 5 of EIArTIA-607 are met. The TBB is connected to the TMGB
as specified in Section 5.4.7.1 of EIArTIA-607.
The TBB conductors are installed without splices, where practicable. If
splices are necessary, there should be a minimum number which are accessible and located in telecommunication spaces. Joined segments of a TBB
should be connected using irreversible compression-type connectors, exothermic welding, or the equivalent.
14.11.3
544
whether the grounding and bonding conductors are routed in an access floor
or overhead cable tray.
14.11.4
The TGB is the common central point of grounding connection for telecommunication systems and equipment in the location served by that telecommunication closet or equipment.
Description of the TGB. The TGB consists of a predrilled copper busbar
provided with standard NEMA bolt hole sizing and spacing for the type of
connectors to be used. It will have the minimum dimensions of 6 mm
thick = 50 mm wide and vary in length to meet the applications requirement
with consideration for future growth.
The TGB should be electrotin-plated for reduced contact resistance. If not
plated, the busbar should be cleaned prior to fastening the conductors to the
busbar.
Bonds to the TGB. TBBs and other TGBs within the same space are bonded
to the TGB by means of at least a No. 6 AWG conductor, preferably with a
3r0 AWG conductor. The bonding conductor between a TBB and a TGB
should be continuous and routed in the shortest possible straight-line path.
Where a panelboard for telecommunications is located within the same
room or space as the TGB, the panelboards ACEG bus when equipped. or
the enclosure should be bonded to the TGB. The TGB should be as close to
the panelboard as practicable and should be installed to maintain clearances
required by applicable electrical codes.
Where a panelboard for telecommunications is not located within the
same room or space as the TGB, consideration should be given to bonding
the panelboards ACEG bus when equipped. or the enclosure to the TGB.
The TGB should be bonded to the TBBIBC as required. All metallic
raceways for telecommunication cabling located within the same room or
space as the TGB should be bonded to the TGB.
Connections of TBBs to the TGB should use listed 2-hole compression
connectors.
A practical location for the TGB is to the side of the panelboard where
provided.. The vertical location of the TGB should take into consideration
whether the grounding and bonding conductors are routed in an access floor
or overhead cable tray.
14.11.5
All bonding conductors and connectors for bonding the metal frame of a
building will be listed for the purpose intended and approved by an NRTL.
In buildings where metal frames structural steel. are effectively grounded,
545
each TGB should be bonded to the metal frame within the room using a No.
6 AWG conductor. Where the metal frame is external to the room and
readily accessible, the metal frame should be bonded to the TGB and TMGB
separately with a No. 6 AWG conductor.
When practical because of shorter distances and other considerations, and
where horizontal steel members are permanently bonded to vertical column
members, TGBs may be bonded to these horizontal column members in lieu
of vertical column members.
14.11.6
546
14.11.7
OSP Topology
547
Figure 14.5. An example of a campus star topology showing outside plant installation. (From
Figure 3, TIArEIA-758, Ref. 4.)
548
14.12.3
Customer-owned OSP cabling must support a wide range of services and site
sizes. Therefore, more than one transmission medium is recognized. This
standard specifies recognized transmission media that may be used individually or in combination. The recognized media include:
REFERENCES
549
REFERENCES
1. Fred J. McClimans, Communications Wiring and Interconnection, McGraw-Hill,
New York, 1992.
2. Commercial Building Telecommunications Cabling Standard, ANSIrEIArTIA-568A,
Telecommunication Industry Association, Washington DC, October 1995.
3. Commercial Building Grounding and Bonding Requirements for Telecommunications,
ANSIrEIArTIA-607, Telecommunication Industry Association, Washington DC,
August 1994.
4. Customer-Owned Outside Plant Telecommunications Cabling Standard,
ANSIrEIArTIA-758, Telecommunication Industry Association, Washington DC,
April 1999.
15
BROADBAND DATA
TRANSPORT TECHNIQUES
15.1
CHAPTER OBJECTIVE
Data is one of several binary media that is transmitted electrically. Voice and
video can also be represented in a binary format for electrical transmission.
The demand for bandwidth* to accommodate these media with ever-increasing transmission rates needed to be satisfied. The general theme is transmission over long distances. Long-distance may be just across the street or
around the world.
The chapter covers three methods of data transport:
551
552
The former was developed and is widely deployed in North America, whereas
the latter is a European development and is deployed to some lesser degree
in Europe and in those countries of European hegemony.
SONET was developed in the United States, and its standards are issued
by Telcordia and ANSI. SDH is of European origin and its standards are
issued by the ITU-T Organization and by ETSI European Telecommunication Standardization Institute .. The second part of this chapter covers these
advanced digital multiplexing schemes.
We hasten to add that there is an implication in terminology that these
two formats are only compatible with optical fiber transmission. This statement is patently untrue. Given the necessary operational bandwidth, SONET
and SDH operate with LOS microwave and satellite communications just as
well as with optical fiber. With a 40-MHz bandwidth assignment, the 622Mbps rates may be transported. This rate is denominated STS-12 by SONET
and STM-4 by SDH. Even higher rates can be accommodated in the higher
frequency bands such as 28 and 40 GHz. However, the length of these links is
severely limited by rainfall considerations. Typical link lengths may be in the
range of 35 km depending on the desired time availability Ref. 1..
Some fiber-optics applications implement links from less than 1 m to 10 m
or more. We should expect to find these extremely short links inside digital
switches, for example. On the other side of the coin, nearly all transoceanic
communication is done by optical fiber today. It is the medium of choice.
Such transport systems as discussed in this chapter carry immense amounts
of data. The data are in the formats discussed in previous chapters such as IP
and frame relay. They may also have an ATM format, which is covered in
Chapter 16.
15.2
15.2.1
553
waveguide, we should expect to see dramatic improvements in the performance of transmitting data. For example, early tests have shown reductions
in loss per unit length of at least one order of magnitude, possibly two
Ref. 2..
I tell my students in seminars that optical fiber has nearly an infinite
bandwidth. If we consider the operational band between 1550 and 1635 nm,
the available bandwidth is around 10 THz teraHz. or 10,000 GHz. The
usable radio-frequency spectrum is from about 10 kHz to 100 GHz, or,
rounded off, 100 GHz of bandwidth for the total spectrum. So we can fit
about 100 total RF spectrums in the 1550 nm band. Thats pretty close to
infinity in my book.
Another point is the optical fiber needs no equalization as coaxial cable
does.
When we discuss light, we will be using wavelength rather than frequency
to describe a certain emission location in the frequency spectrum. Chronologically, as fiber development proceeded, we started with the shorter wavelengths of around 820 nm 0.820 m. and then progressively moved to longer
wavelengths of around 1330 nm 1.330 m. and 1550 nm 1.550 m.. We can
convert frequency F in Hz. to wavelength in meters., and vice versa, with
the following formula:
F s 3 = 10 8 mrs
Remember, F is measured in Hz and is measured in meters. For example,
1550 nm s 1550 = 10y9 m. If you wish to convert this to frequency, which
you may be a bit more familiar with, use this formula. For example, using
1550-nm wavelength:
FHz s 3 = 10 8r1550 = 10y9
s 1.93548 = 10 14 Hz or 193.548 = 10 12 Hz s 193.548 THz
15.2.2
Light and Small. Fiber cable is very light and small in size. Over 200 fibers
can be placed in 0.5-in. cable. Compare this to copper pair or coaxial tube
cables. Another example is the wiring in a large U.S. aircraft carrier. It is
estimated that if all signal leads were changed over from copper to fiber, a
200-ton saving of topside weight would accrue.
Repeater Spacing. One of the greatest impairments to digital transmission is
jitter. Jitter accumulation is a function of the number of regenerative repeaters there are in tandem on a certain connectivity. Fiber-optic systems
require about 1r100th the number of repeaters compared to comparable
coaxial cable systems.
554
555
556
Figure 15.3. Reflection, refraction, and critical angle. Note that the critical angle is where the
light ray just grazes the surface as shown in part B.
imaginary line perpendicular to the interface of the two materials; in the case
of fiber, it is perpendicular to the interface between the core and cladding.
The angle of incidence is the angle between the normal and the incident ray.
Referring to Figure 15.3 for the definition of angles 1 and 2 , Snells
law states
n1 sin 1 s n 2 sin 2
where n1 and n 2 represent media of higher and lower indices of refraction,
respectively.
The refracted ray entering the lower index area is bent away from the
normal, as shown in Figure 15.3A. At the critical angle, the refracted ray is
bent 90 from the normal and just grazes the interface 2 s 90., as
illustrated in Figure 15.3B. The critical angle of incidence can be described
by
sin c s n 2rn1 ,
n1 ) n 2
When the angle of incidence exceeds the critical angle, the light ray is totally
reflected at the interface, a characteristic called total internal reflection see
Figures 15.3C and 15.4.. At angles less than the critical angle, most of the
energy of the light ray escapes, as shown in Figure 15.3A. The discussion that
follows concerns only rays passing through the axis of the fiber meridional
rays.. Skew rays propagate without passing through the axis of the fiber and
are not dealt with here, due to the mathematical complexity of their behavior. For most purposes, it is sufficient to assume that skew rays will behave in
much the same way as meridional rays Ref. 2..
557
558
1r2
Note: Rays of light are shown entering the center of the fiber in Figure
15.5. Similar light cones obeying the same analysis are incident at an infinite
number of points on the coreair interface. This does not affect the calculation of NA Ref. 3..
15.2.4.2 Distortion and Dispersion
Distortion and Dispersion Differentiated. Distortion is an inherent property
of all optical fibers. It causes pulse broadening in digital transmission as
shown in Figure 15.6. When pulses broaden to the point where they begin to
merge, intersymbol interference isi. begins to occur. The upper limit of
bandwidth-distance factor is a function of distortion.
559
560
Figure 15.7. Effect of source spectral width and fiber index variations on material dispersion.
of a fiber material with reduced variation of index with wavelength will lessen
the effects of material dispersion. Material dispersion is a major contributor
to total dispersion on fiber-optic systems using light-emitting diodes LEDs.
for the light source transmitter . because of the wide spectral width LEDs
display.
Waeguide Dispersion. Waveguide dispersion is attributed to the dependence of phase and group velocities on the geometric characteristics of the
waveguide. Because light wave peaks occur at different locations in the
waveguide with changing frequency, intensity differences occur when all
reflections are added together. This causes broadening, but waveguide dispersion usually has much less effect than material dispersion and can be
ignored in most cases.
Chromatic Dispersion. Chromatic dispersion affects only fiber-optic links
carrying very high rate digital systems e.g., ) 1 Gbps.. Such systems will use
laser diode sources with monomode fiber. A laser diode has a narrow
emission line width, perhaps several nanometers wide. With distributed
feedback lasers, this line width can be narrowed to 0.5-nm widths and less.
Even this narrow width carries many emission wavelengths. Some of these
wavelengths travel slightly faster than others. As the bit rate increases, the
pulse width decreases, as one might expect. We are interested in half-pulse
width where the detector will make a 1 or 0 decision. The durations of these
half-pulse widths start approaching the time difference of arrival of signal
energy giving rise to chromatic dispersion. Again it is the problem of the
slower signal energy spilling into the subsequent bit position confusing the
receiver.
Zero Dispersion Near 1300 Nanometers. In fused-silica single-mode fibers,
there is sometimes an operating wavelength at which material dispersion and
waveguide dispersion are equal in amplitude but opposite in sign. This results
561
Figure 15.8. Optical fiber attenuation versus wavelength. (From Figure 11.3, page 723,
Ref. 2.)
562
15.2.5
563
15.2.6
Fiber-Optic Cable
The delicate optical fibers are cabled for protection against mechanical and
environmental abuse during installation and operation. Fibers are cabled
using many of the same materials used to cable metallic media, but employing different cabling techniques. Unlike metallic conductors, optical fibers do
not contribute to the strength of the cable. In fact, the fiber itself must be
decoupled from tensile, thermal, and vibrational loads.
15.2.6.1 Cable Composition. Strengthened fiber-optic cables are used in
all outdoor and most indoor applications. Unstrengthened cables are used in
low-cost multiple-line links in controlled environments, such as within a rack.
The following is a list of typical components of fiber-optic cable. It should be
564
pointed out that not every cable will contain each constituent, and configurations will vary.
1. Coated optical fiber with plastic or silicon elastomer coating to protect
the fiber from scratches and microbending.
2. Single-fiber buffer tubes or multifiber ribbons to cushion fibers and
isolate them from longitudinal stresses during installation and from
microbending during operation. Buffer tubes are not to be confused
with the protective plastic or silicon fiber coating, also called a fiber
jacket.
3. Central and distributed strength members composed of either metallic
or dielectric materials to ensure adequate tensile strength during installation and to resist kinking and crushing of the cable.
4. Polyester binder tape to hold buffer tubes in place.
5. Moisture-barrier compounds.
6. Outer and inner nonconducting jackets composed of low-density
polyethylene resistant to abrasion, chemicals, fungus, moisture, and
decomposition by ultraviolet radiation. High-density polyethylene is
used in armored cable.
7. Corrugated steel tape for protection from rodents.
8. Messenger cable for support of some aerial cables.
15.2.7
Fiber-Optic Transmitters
565
Figure 15.12. Typical spectral linewidths for LED and LD. Note that the peak intensities have
been normalized to the same value. The actual peak intensity of an LD is much greater than
that of an LED.
566
TABLE 15.1
Characteristic
LED
LD
) 50
3000
20
30 to 90
1550
10 to 200
1
10 5 to 10 6
Lower
20
- 1 to 5
1550
10 to 200
10
10 4 to 10 5
Higher
Power remaining after coupling losses have been taken into account.
Source: Reference 1.
15.2.7.2 Laser Diodes. Laser diodes LDs. are used for light sources
when a fiber-optic link requires a higher-performance transmitter. Because
of fast risetime, LDs are capable of higher modulation rates. They have
narrower spectral linewidths than do LEDs, as shown in Figure 15.12. As a
result, an LD produces less material dispersion within the fiber than does an
LED. However, LDs require an auxiliary high-voltage power supply for
external biasing to achieve the lasing effect. LDs have a shorter life, are
temperature sensitive, and are less stable than LEDs. They are best suited
for digital transmission. In links where the LD light source overloads the
detector, an attenuator neutral density filter. can be placed between the
light source and the fiber to lessen the light coupled into the fiber, yet allow
the light source to operate within optimum range.
15.2.8
Receivers
567
TABLE 15.2
Characteristic
Sensitivity (dBm for BER or SNR)
Spectral response range (nm)
Noise, equivalent power (Wr'Hz )
Cost
PIN Photodiode
APD
y30 to y45
200 to 1700
y40 to y50
200 to 1700
1 = 10 y 10 to 27 = 10 y 14
Lower
1 = 10 y 14
Higher
Source: Reference 1.
568
Repeaters
Fiber-Optic Amplifiers
The most common type of amplifier found in fiber-optic systems today is the
erbium-doped fiber amplifier EDFA.. These amplifiers operate in the 1550nm band, which is propitious because it is the band of lowest loss. The
amplifiers bandwidth is on the order of 100s to 1000s of GHz range, which
can support most WDM wavelength division multiplex. operation. Typical
569
amplifier gains are from 30 to 50 dB, and power output gains are from q10
to q20 dBm.
EDFA amplification is based on a pumping principle, where the most
common pumping wavelengths are 1480 or 980 nm. The pump output of from
50 to 100 mW is coupled into a length of fiber from 25 to 100 m in length,
where the longer length displays the greatest gain. Over 100 m, the gain
starts to tail off. For a more detailed description of EDFAs, consult Refs. 1
and 2.
EDFAs are usually installed at a light source output and at the light
detector input. In such a situation with two amplifiers, the gain accrued,
assuming 40 dB per amplifier, is an 80-dB net gain. If we allowed just 0.35
dBrkm including splice loss on a link without amplifiers, and now installed
two amplifiers as we have indicated with a net gain of 80 dB, we can add to
the distance between repeaters some 80r0.35 km or an additional 228 km.
This provides many benefits: less active devices with improved reliability i.e.,
less probability of failure., fewer repeaters thus reduced jitter, some improvement in error performance, and so on. Amplifiers make DWDM dense
wavelength division multiplex. feasible on fiber-optic systems. The amplifiers
compensate for the rather large insertion losses of DWDM systems.
15.2.11
570
Digital Signals
Polarity. This section covers bipolar signals only which some call just polar ..
Bipolar signals have two nonzero polarities and are usually symmetrical
about the zero axis.
Coding. Digital signals are also classified according to whether the line
signal state returns to or maintains the zero level during each bit interval, or
uses polarity changes to signify a designated logic element. This is referred to
as coding. Signal codes commonly used in fiber-optic communication systems
are illustrated in Figure 15.15.
15.2.12.2
571
Coding. RZ return-to-zero . bipolar and bipolar AMI alternate mark inversion. are ternary, three-state electrical signals. The optical regime in digital
applications, however, supports only binary, two-state signals. Therefore, the
ternary signals must be converted to binary for applications to optical
transmitters. This is done by assigning a two-digit binary code i.e., 00, 01, 10.
to each of the three states. NRZ non-return-to-zero . polar, biphase level,
and conditioned diphase are binary signals and can be applied directly to the
optical transmitter.
Rate. Each data unit interval in ternary coding can contain a maximum of
two states. Because each state is represented by two digits after conversion to
optical line code, the optical line rate is four times the electrical code bit
rate. Biphase level and conditioned diphase coding depend on mid-interval
transitions. Consequently, the optical line rate is twice the electrical code bit
rate. NRZ is the only code of those treated here for which the optical line
rate is the same as the electrical bit rate Ref. 3..
15.3 HIGHER-ORDER DIGITAL MULTIPLEXING FORMATS:
SONET AND SDH
15.3.1
572
TABLE 15.3
OC Level
OC-1
OC-3
OC-9
OC-12
OC-18
OC-24
OC-36
OC-48
OC-192
51.840
155.520
466.560
622.080
933.120
1244.160
1866.240
2488.320
9953.28
SONETs basic modular signal is called STS-1 with its 51.840-Mbps data
rate. STS-1s optical counterpart is called OC-1 OC stands for optical
carrier.. OC-1 is directly converted from STS-1 after frame synchronous
scrambling.
Higher-level SONET signals are obtained by synchronously multiplexing
lower-level signals. Higher-level signals are integer multiples of the basic
STS-1 rate and are denoted STS-N and OC-N, where, again, N is an integer.
The current values of N are 1, 3, 9, 12, 24, 36, 48, and 192 Ref. 5.. These
data rates are shown in Table 15.3.
15.3.1.3 STS-1 Frame Structure. The STS-1 frame is shown in Figure
15.16. It consists of 90 columns and 9 rows of 8-bit bytes for a total of 810
bytes. With a frame length of 125 microseconds derived from 8000 frames
per second., STS-1 has a bit rate of 51.840 Mbps. The order of transmission
573
of bytes is row-by-row, from left to right. The most significant bit is transmitted first, and the bits are numbered 18 Ref. 6..
As shown in Figure 15.16, the first three columns are the transport
overhead, containing overhead bytes of sections and line layers. Of the 27
bytes assigned, 9 are assigned to line overhead and 18 to section overhead.
The remaining capacity, consisting of 87 columns, constitutes the STS-1
envelope capacity.
Figures 15.17, 15.18, and 15.19 show the STS-1 synchronous payload
envelope SPE.. It consists of 87 columns and 9 rows of bytes for a total of
783 bytes. Column 1 is called the STS path overhead POH. and contains 9
bytes with the remaining 774 bytes available for payload. The path overhead
provides the facilities, such as alarm and performance monitoring, required
to support and maintain the transportation of the SPE between end locations
known as path terminations. where the SPE is either assembled or disassembled. The STS-1 SPE may begin anywhere in the STS envelope capacity.
Typically, it begins in one frame and ends in the next or can be wholly
contained in one frame. A key innovation in SONET is the payload pointer.
The STS-1 payload pointer is contained in the transport overhead. It designates the location of the byte where the STS-1 SPE begins.
SPE Assembly Process. The concept of a tributary signal such as a DS3
signal being assembled into an SPE, to be transported end-to-end across a
574
Figure 15.18. STS-1 SPE with STS-1 POH and STS-1 payload capacity. Based on Ref. 6.
Figure 15.19. STS-1 SPE in the interior of an STS-1 frame. Based on Ref. 6.
575
Figure 15.20. SPE assembly process. (From Ref. 7. Courtesy of Hewlett-Packard Company.)
576
577
Figure 15.23. Transport overhead assignment, OC-3 carrying an STS-3c SPE. (From Telcordia GR-253-CORE, Issue 2, Revision 2, Figure 3-8, page 3-9. Copyright Telcordia, Jan. 1999.)
578
Figure 15.24. STS-Nc SPE. (From Telcordia GT-253-CORE, Issue 2, Revision 2, Figure 3-7,
page 3-8. Copyright Telcordia, Jan. 1999.)
579
Figure 15.25. VT sizes. (From Ref. 6. Figure 3-9, page 3-4. Copyright Bellcore, reprinted with
permission.)
580
581
582
Figure 15.28. Simplified diagram defining section, line, and path. (From Ref. 7. Courtesy of
Hewlett-Packard Company.)
Figure 15.29. More detailed section, line, and path definitions. DCS, digital cross-connect
system; ADM, add-drop multiplex; REG, regenerator; TM, terminal multiplex. (From Figure
2-2, page 2-2, Ref. 6. Copyright Telcordia, reprinted with permission.)
583
584
TABLE 15.4
SDH Level
1
4
16
64
155,520
622,080
2,488,320
9,953,280
Figure 15.30. Generalized SDH multiplexing structure. C-n stands for container-n. (From
Figure 2-1rG.708, page 3, ITU-T Rec. G. 708, Ref. 9.)
585
Figure 15.31. Multiplexing method directly from container 1 using AU-4. Note: Unshaded
areas are phase-aligned. Phase alignment between the unshaded and shaded areas is
defined by the pointer (PTR) and is indicated by the arrow. (From Figure 6-2rG.707, page 7,
ITU-T Rec. G.707, Ref. 8.)
586
Figure 15.32. SDH multiplexing method directly from container 1 using AU-3. Note: Unshaded areas are phase-aligned. Phase alignment between the unshaded and shaded areas
is defined by the pointer (PTR) and is indicated by the arrow. (From Figure 6-3rG.707, page
8, ITU-T Rec. G.707, Ref. 8.)
Figure 15.33. Multiplexing method directly from container 3 using AU-3. Note: Unshaded
areas are phase-aligned. Phase alignment between the unshaded and shaded areas is
defined by the pointer (PTR) and is indicated by the arrow. (From Figure 6-4rG.707, page 9,
ITU-T Rec. G.707, Ref. 8.)
587
Lower-order irtual container-n, to VC-n n s 1, 2.. This element comprises a single C-n n s 1, 2., plus the basic virtual container POH
appropriate to that level.
Higher-order irtual container-n, to VC-n n s 3, 4.. This element comprises a single C-n n s 3, 4., an assembly of tributary unit groups TUG2s., or an assembly of TU-3s, together with virtual container POH appropriate to that level.
Administrative Unit-n (AU-n ). An administrative unit is the information
structure which provides adaptation between the higher-order path layer
and the multiplex section. It consists of an information payload the
higher-order virtual container. and an administrative unit pointer which
indicates the offset of the payload frame start relative to the multiplex
section frame start. Two administrative units are defined. The AU-4
consists of a VC-4 plus an administrative unit pointer which indicates the
phase alignment of the VC-4 with respect to the STM-N frame. The AU-3
consists of a VC-3 plus an administrative unit pointer which indicates the
phase alignment of the VC-3 with respect to the STM-N frame. In each
case the administrative unit pointer location is fixed with respect to the
STM-N frame Ref. 9..
One or more administrative units occupying fixed, defined positions in
an STM payload are termed an administratie unit group AUG.. An AUG
consists of a homogeneous assembly of AU-3s or an AU-4.
Tributary Unit-n, TU-n. A tributary unit is an information structure which
provides adaptation between the lower-order path layer and the higherorder path layer. It consists of an information payload the lower-order
virtual container. and a tributary unit pointer which indicates the offset of
the payload frame start relative to the higher-order virtual container frame
start.
The TU-n n s 1, 2, 3. consists of a VC-n together with a tributary unit
pointer.
One or more tributary units occupying fixed, defined positions in a
higher-order VC-n payload are termed a tributary unit group TUG.. TUGs
are defined in such a way that mixed-capacity payloads made up of
different-sized tributary units can be constructed to increase flexibility of
the transport network.
A TUG-2 consists of a homogeneous assembly of identical TU-1s or a
TU-2. A TUG-3 consists of a homogeneous assembly of TUG-2s or a
TU-3.
Container-n ( n s 14). A container is the information structure which forms
the network synchronous information payload for a virtual container. For
each of the defined virtual containers there is a corresponding container.
Adaptation functions have been defined for many common network rates
into a limited number of standard containers. These include standard
E-1rDS-1 rates defined in ITU-T Rec. G.702.
588
Figure 15.34. STM-N frame structure. (From Figure 6-6rG.707, page 11, ITU-T Rec. G.707,
Ref. 8.)
589
590
Figure 15.35. Administrative units in the STM-1 frame, X denotes AU-n pointer; AU-n denotes
AU-n pointer q VC-n. (From Figure 6-7rG.707, page 12, ITU-T Rec. G.707, Ref. 8.)
Figure 15.36. Two-stage multiplex. X denotes AU-n pointer; denotes TU-n pointer; AU-n
denotes AU-n pointer q VC-n; TU-n denotes TU-n pointer q VC-n. (From Figure 6-8rG.707,
page 12, ITU-T Rec. G.707, Ref. 8.)
The AU-3 may be used to carry, via the VC-3, a number of TU-ns
n s 1, 2. forming a two-stage multiplex. An example of this arrangement is
illustrated in Figures 15.35b and 15.36b. The VC-n associated with each
TU-n does not have a fixed-phase relationship with respect to the start of the
VC-3. The TU-n pointer is in a fixed location in the VC-3, and the location
of the first byte of the VC-n is indicated by the TU-n pointer.
15.3.2.4 Interconnection of STM-1s. The SDH has been designed to be
universal, allowing transport of a layer variety of signals such as those
specified in ITU-T Rec. G.702, including North American 1.544-Mbps and
European 2.048-Mbps regimes. However, different structures can be used
for the transport of virtual containers. The following interconnection rules
591
Figure 15.37. SDH multiplexing structure. Note: G.702 tributaries associated with containers
C-x are shown. Other signals (e.g., ATM) can also be accommodated. (From Figure
6-1rG.707, page 6, ITU-T Rec. G.707, Ref. 8.)
are used:
1. The rule for interconnecting two AUGs based upon two different types
of administrative unit, namely AU-4 and AU-3, is to use the AU-4
structure. Therefore, the AUG based upon AU-3 is demultiplexed to
the TUG-2 or VC-3 level according to the type of the payload, and then
it is remultiplexed within an AUG via the TUG-3rVC-4rAU-4 route.
2. The rule for interconnecting VC-11s transported via different types of
tributary unit, namely TU-11 and TU-12, is to use the TU-11 structure.
VC-11, TU-11, and TU-12 are described in ITU-T Rec. G.709.
15.3.2.5 Basic SDH Multiplexing Structure. The SDH multiplexing
structure is shown in Figure 15.37.
Radio systems operating in frequency ranges of 3.7 GHz and above generally
are assigned some 500 MHz of bandwidth. There are several reasons why one
user cannot use the entire 500-MHz pipe.In most circumstances, full-duplex
operation is required. Leaving aside interference considerations, this drops
the usage pipe width in half to 250 MHz i.e., 250 MHz in each direction..
Further, there is a high probability that there will not be uniform behavior
across bandwidths as wide as 250 MHz. In addition, such frequency bands
592
must be shared with other nearby users. Thus usable bandwidths are reduced
to 30 or 40 MHz per radio-frequency carrier for line-of-sight microwave and
100 MHz or less for satellite radio systems. Systems operating above 28 GHz
have bandwidths of 2.5 GHz, with some bandwidths in the mid-millimeter
range over 5 GHz wide. The problem with these higher-frequency systems is
cost. There is available technology, but production runs are low because of
low demand.
Why use radio at all when fiber-optic systems have almost unlimited
coherent bandwidths? Again it is cost. If it is cheaper, with equal performance and equally dependable, then use it. This proves out very often for
line-of-sight microwave radio systems in heavily urbanized areas and in areas
of difficult terrain. Typically, the area for the first application would be New
York City, and that for the second would be the jungled mountains of
Venezuela.
Satellite radio systems can have much broader applications, especially for
private networks. Again the driving factor is cost, performance, and dependability. In this regard, space segment charges become a cost factor; furthermore, the space segment can be a point failure if network availabilityrsurvivability is a primary consideration, and it may be a drawback.
15.4.2
15.4.2.1 Line of Sight. A microwave terminal consists of a radio transmitter, a receiver, and an antenna subsystem. The antenna is mounted on a
tower and is connected to the transmitter and receiver by means of a
transmission line, usually waveguide. Economic factors limit tower height to
some 100-m 300-ft. maximum.
This leads to the so-called line-of-sight LOS. concept. The maximum
distance from one microwave terminal to the next is limited by LOS, which is
a function of tower height. Radio waves at such high frequencies do not bend
around obstacles in the conventional sense; they are either diffracted or
blocked entirely. There is, however, some bending which we will explain.
The term line of sight gives the connotation that microwave radio rays
behave exactly like light waves. One difference is that radiowaves at these
microwave frequencies are somewhat bent because of variations in the
refractive index of the atmosphere through which they progress. In about
80% of circumstances we can get some 15% more range between microwave
terminals than we would get using light as the transmission medium.
A microwave radio ray beam is either diffracted or blocked by an obstacle
as we mentioned above. The most common obstacle is the horizon. If there
are no other obstacles, which microwave engineers call smooth earth, then
the distance to the radio horizon can be calculated for a given antenna tower
height h. by the following formulas:
d mi s
' 2 h .
593
'
d km s 2.9 2 h .
where d is in kilometers and h is measured in meters Ref. 2..
If a tower is 100 m high, the radio distance to the horizon is 41 km. This
concept is shown in Figure 15.38. If we build a second tower directly in line
also 100 m high, the link would be 2 = 41 km long i.e., 82 km*., there would
be smooth earth, and there would be no other intervening obstacles with
standard refraction.
Of course, we can achieve much greater distances if we take advantage of
natural and man-made high spots. Use tops of mountains, ridges, cliffs, and
tops of high buildings, or lease space on high towers typically TV towers..
Such techniques can notably extend LOS distances.
15.4.2.2 Typical Line-of-Sight Microwave Installation. Figure 15.39 is a
simplified conceptual block diagram of a microwave terminal. The transmitter emits an analog carrier wave that, in our case, is modulated digitally. We
might transmit an OC-3 configuration SONET. or STM-1 bit rate of 155
Mbps. How can we get 155 Mbps in a 30- or 40-MHz bandwidth? The trick is
similar to those we described in Section 6.3.2, where we squeezed much
greater data rates into a voice channel than it appeared it could accommodate. In essence we converted to a higher-level digital signal using what is
called M-ary modulation techniques often of a hybrid nature. Typical of
*This calculation is only good to a first approximation.
594
Figure 15.39. A functional block diagram of a digital LOS microwave terminal. Typical PCM
line codes: AMI, polar, BNZS, HDB3rCMI. BB, baseband; , optional feature. (From Ref. 2.)
595
Also, ray beamwidths get progressively smaller as antenna gains increase, further magnifying the
twist and sway situation; it gets easier and easier for the transmit ray beam to fall out of the
capture range of the receive antenna, and vice versa.
596
There are several high-absorption bands due to the gaseous content of the
atmosphere. There is one particularly severe absorption band between 58
and 62 GHz. If we stay away from these absorption bands, then we can either
live with the rainfall problem or overbuild a link to mitigate. In this regard,
channel coding and interleaving can be very effective, if properly designed.
Thus these higher frequencies will be particularly attractive even for
STS-3rSTM-1 and higher SONETrSDH configurations.
15.4.3
Satellite Communications
15.4.3.1 Concept and Applications. Satellite communications is an extension of LOS microwave. In fact, in nearly every case it uses the same
frequency bands as LOS microwave. In other words, both services share the
same bands, which can be a drawback. Again we deal with 500-MHz
bandwidths. This means that the total allocation for the service in a particular band is 500 MHz. One exception to the 500-MHz rule is the 30r20-GHz
band which allocates 2.5 GHz of bandwidth.
The nominal 500 MHz of bandwidth is usually broken down into segments
of 36 MHz; however, in some cases the segments are 72 MHz and in a few
cases they are 100 MHz or slightly greater. A satellite is an RF repeater as
shown in Figure 15.40. The RF repeating device is called a transponder, and
there is a transponder tuned to the center frequency of each frequency
segment and with sufficient amplitude response frequency response. to
cover the 36-MHz or 72-MHz. bandwidth. A typical satellite might have 24
such transponders.
To increase satellite capacity, frequency reuse is implemented. Satellite
capacity can be doubled or tripled by this technique, reusing the same
frequencies. If there is doubling of capacity by frequency reuse, there is a
doubling of the number of transponders. Spot beam antennas with low
sidelobes plus good polarization isolation permit frequency reuse, cutting
interference from one system into the other down to a reasonable level.
597
15.4.3.2 Uplinks and Downlinks. An uplink carries the digitalrdata signal from an earth station to the satellite. In the satellite it is converted in
frequency and returned to a distant earth station on a downlink. With only
few exceptions, the downlink is always the weak link. There are several
reasons why, and these reasons give us insight into satellite communications.
On an uplink there are few limitations. We can easily spew all the RF
power necessary up into space, provided it is confined to reach only the
satellite of interest. There is no limitation on prime power generation and
little chance of causing interference, provided that earth station sidelobes are
held in check and the angular spread of the ray beam is contained. RF power
not used by the satellite in its receiving system spreads out into space, which
harms no one.
Quite different conditions hold for the downlink. The downlink power
must be limited for two important reasons. First, the satellite spews RF
power onto the earths surface in a band shared by LOS microwave. If the
power level is too great, harmful interference will occur on LOS links
encompassed by the satellite ray beam. Thus downlink power must be limited
to limit interference on LOS microwave service. Second, downlink power is
also very expensive for three reasons: i. Prime power on the satellite is
generated by solar cells; that is, more power requires more solar cells. ii. If
more power is required, larger batteries are needed for darkness periods and
solar eclipse. iii. If more power is needed, larger components such as power
supplies . are required on the satellite, and thus more weight is implied. The
cost of launching a satellite is really a function of its weight Ref. 2..
Figure 15.41 illustrates a satellite connectivity with uplinks and downlinks.
15.4.3.3 Satellite Orbits. Satellites are in elliptical orbits. As we remember, a circle is a special form of an ellipse, and most satellites used for
commercial communications in the western world are in circular orbits 35,786
km approximately 22,254 miles. above the equator. These orbits are called
598
geostationary where the satellite appears fixed over a point on the earths
surface. The primary advantage of such an orbit is that earth station antenna
tracking in many cases is not required. The major drawback is the resulting
propagation delay up to the satellite and down again, some 125 ms each way.
Secondarily is the increased free space loss incurred by the large distance.
Another class of satellites used for telecommunication are the low earth
orbit LEO. satellites such as the Iridium system operated by Motorola. Here
the altitude of the satellite is around 500 km, vastly reducing the delay and
reducing free space loss accordingly. Such satellites ordinarily would require
tracking from earth stations; however, quasi-omnidirectional antennas are
used on the satellites as well as on the earth terminals. The primary market
for Iridium is worldwide cellular and personal communication services PCS..
Another is the TELEDESIC system with hundreds of LEO satellites to be
used for the specialized fixed-service data transport market.
15.4.3.4 Digital Satellite System Operation and Access. There are three
generic access techniques available for satellite communications. By access
we mean how we can use these satellite resources. Such generic techniques
are:
REFERENCES
599
Figure 15.42. Conceptual drawings of ( a ) FDMA, ( b ) TDMA, and ( c ) CDMA in the timefrequency plane. (From Ref. 1.)
CDMA. Code division multiple access uses one of two forms of spread
spectrum wave form: frequency hop FH. or direct sequence DS.. Direct
sequence is also called pseudo-noise. In either case, users can be stacked one
on the other using the same center frequency. For FH each user has a
different hopping pattern; for DS each user has a different sequence determined by a key ariable. It can be argued that spread spectrum systems allow
more users per unit bandwidth than does TDMA or FDMA. Figure 15.42c is
a conceptual diagram of CDMA. Spread spectrum systems are ideally suited
for digital data transmission.
VSAT Networks. There is one very special and particularly attractive application of satellite communications for the data end user for a wide area
network WAN.. This is the very-small-aperture terminal VSAT. approach.
VSAT networks were discussed in Chapter 11, Section 11.7.
REFERENCES
1. Roger L. Freeman, Reference Manual for Telecommunications Engineering, 3rd
edition, John Wiley & Sons, New York, 2001.
2. Roger L. Freeman, Telecommunications Transmission Handbook, 4th edition, John
Wiley & Sons, New York, 1998.
3. Design Handbook for Fiber Optic Communications Systems, MIL-HDBK-415, U.S.
Dept. of Defense, Washington DC, 1985.
600
4. The IEEE Standard Dictionary of Electrical and Electronics Terms, 6th edition,
IEEE, New York, 1996.
5. Synchronous Optical Network SONET . Common Generic Criteria, GR-253-CORE,
Issue 1, TelcordiarBellcore, Morristown, NJ, 1994.
6. Synchronous Optical Network SONET . Transport Systems: Common Generic Criteria, TR-TSY-GR-253-CORE, Issue 2, Revision 2, TelcordiarBellcore, Morristown, NJ, Jan. 1999.
7. Introduction to SONET, an H-P seminar, Hewlett-Packard Company, Burlington,
MA, October 1993.
8. Synchronous Digital Hierarchy Bit Rates, ITU-T Rec. G.707, ITU Geneva, March
1996.
9. Network Node Interface for the Synchronous Digital Hierarchy, ITU-T Rec. G.708,
ITU Geneva, March 1993.
10. Curtis A. Siller and Mansoor Shafi, SONETrSDH A Sourcebook of Synchronous
Networking, IEEE Press, New York, 1996.
16
BROADBAND ISDN (B-ISDN)
AND THE ASYNCHRONOUS
TRANSFER MODE (ATM)
16.1
Frame relay Chapter 12. was the beginning of the march toward an optimized* format for multimedia transmission voice, data, video, facsimile..
There were new and revolutionary concepts in frame relay. There was a
trend toward simplicity where the header was considerably shortened. A
header is pure overhead, so it was cut back as much as practically possible.
A header also implies processing. By reducing the processing, delivery time
could be speeded up. Frame relay is a low-latency system.
In the effort to speed up delivery, operation was unacknowledged at least
at the frame relay level.; there was no operational error correction scheme. It
was unnecessary because it was assumed that the underlying transport system
had excellent error performance better than 1 = 10y9 .. There was error
detection for each frame, and a frame found in error was thrown away. Now
that is something that we never did for those of us steeped in old-time data
communication. It is assumed that the higher OSI open system interconnection. layers would request repeats of the few frames missing i.e., thrown
away..
Frame relay also moved into the flow control arena with the BECN and
FECN bits and the CLLM. The method of handling flow control has a lot to
do with its effectiveness in this case. It also uses a discard eligibility DE. bit
that set a type of priority to a frame. If the DE bit were set, the frame would
be among the first to be discarded in a time of congestion.
The distributed queue dual bus DQDB. developed by the IEEE 802.6
committee provides a simple and unique access scheme. Even more impor*Compromise might be a more appropriate word.
601
602
tant, its data transport format is based on the cell that the IEEE calls a slot.
The DQDB slot or cell has a format very similar to that of the ATM cell,
which we discuss at length in this chapter. It even has the same number of
octets i.e., 53., 48 of which is the payload capacity. This is identical to ATM.
Also enter a comparatively new concept of the header check sequence HCS.
for detecting errors in the header. The DQDB has no error detection for the
body or info portion of the slot or cell. There is a powerful CRC32 in the
trailer of the IMPDU initial MAC protocol data unit., an upper layer of
DQDB. It also employs the BOM, COM, and EOM beginning of message,
continuation of message, and end of message, respectively . as well as the
message identifier MID. in the segmentation and reassembly SAR. process.
These fields are particularly helpful in message reassembly.
Switched multimegabit data service SMDS. came on the scene using
DQDB as its access protocol. DQDB uses a 5-octet ACFrheader and a
48-octet payload with no trailer, which is very similar to the ATM cell. SMDS
has a 44-octet payload, a 7-octet header, and a 2-octet trailer, for a total of 53
octets in what we will call a cell. Many of the strategies of DQDB followed
on down to SMDS. However, SMDS has a credit manager at the switching
system SS. which polices users. This policing concept came from frame relay.
It is carried onward into ATM.
We consider ATM to be a prime candidate to transport data. Data traffic
is bursty, and the short cells, which are the basic transport format for ATM,
can handle short bursts very efficiently. IP and frame relay, because of their
comparatively long frames, are less amenable to short burst traffic. It is most
attractive to the user when comparatively high speed circuits are available
such as DS3 or E3 see Chapter 7.. Service can also be provided down to DS1
and E1 circuits. Reference 1 states that ATM tends to be expensive.
Broadband-ISDN B-ISDN. provides the framework for the transport of
ATM cells. Its nomenclature is similar to that of ISDN Chapter 13..
Broadband is not a very well-defined term. In this context it is any digital
channel with a data rate greater than DS0 56 or 64 kbps. or E0 64 kbps..
Certainly the ISDN H0 channel falls in this category with its 384-kbps date
rate. We like to think of B-ISDN being that transport framework starting at
the ITU primary rate of 1.544 and 2.048 Mbps.
16.2
INTRODUCTION TO ATM
ATM is based on a 53-octet cell. A typical cell has a 5-octet header and a
48-octet information field. All traffic is transported in the information field
of that cell, whether voice, data, or image.
As we discussed, ATM is an outgrowth of the several data transmission
format systems covered previously. Admittedly, some may argue this point.
ATM cells can be mixed and matched as shown in Figure 16.1, where a cell
carrying a data payload may be contiguous with another cell carrying voice.
ATM cells can be transported on SONET, SDH Chapter 15., E1rDS1
INTRODUCTION TO ATM
603
Figure 16.1. ATM links simultaneously carry a mix of voice, data, and image information.
Chapter 7., and other popular digital formats. Cells can also be transported
contiguously without an underlying digital network format.
Philosophically, voice and data must be handled differently regarding time
sensitivity. Voice cannot wait for long processing and ARQ delays. Most
types of data can. So ATM must distinguish the type of service such as
constant bit rate CBR. and variable bit rate VBR. services. Voice service is
typical constant bit rate or CBR service.
Signaling is another area of major philosophical difference. In data communications, signaling is carried out within the header of a data frame or
packet.. As a minimum the signaling will have the destination address and
quite often the source address as well. And this signaling information will be
repeated over and over again on a long data file that is heavily segmented.
On a voice circuit, a connectivity is set up, and the destination address, and
possibly the source address, are sent just once during call setup. There is also
some form of circuit supervision to keep the circuit operational throughout
the duration of a telephone call. ATM is a compromise, stealing a little from
each of these separate worlds.
Like voice telephony, ATM is fundamentally a connection-oriented
telecommunication system. Here we mean that a connection must be established between two stations before data can be transferred between them. An
ATM connection specifies the transmission path, allowing ATM cells to
self-route through an ATM network. Being connection-oriented also allows
ATM to specify a guaranteed quality of service QoS. for each connection.
By contrast, most LAN protocols are connectionless. This means that LAN
nodes simply transmit traffic when they need to, without first establishing a
specific connection or route with the destination node.
In that ATM uses a connection-oriented protocol, bandwidth is allocated
only when the originating end user requests a connection. This allows ATM
604
605
until we fill to rated capacity. Again we have the unfortunate use of the word
bandwidth, because our capacity will be measured in octets, not hertz. For
example, SONETs STS-1 has a payload capacity of 87 = 9 octets see
Chapter 15., not 87 = 9 Hz.
Figure 16.2. B-ISDN usernetwork interface (UNI) configuration. The reference model is at
the top of the drawing. Note its similarity to the ISDN model, Figure 13.2. The R reference
point is where nonstandard ISDN equipment is made B-ISDN-compatible via B-TA. In this
case, the TA functionality is limited to physical layer conversion.
606
C-Plane. The control plane protocols deal with call establishment and call
release and other connection control functions necessary for providing
switched services. The C-plane structure shares the physical and ATM
layers with the U-plane, as shown in Figure 16.3. It also includes ATM
adaptation layer AAL. procedures and higher-layer signaling protocols.
M-Plane. The management plane provides management functions and the
capability to exchange information between the U-plane and the C-plane.
The M-plane contains two sections: layer management and plane management. Layer management performs layer-specific management functions,
while the plane management performs management and coordination
functions related to the complete system.
We return to Figure 16.3 and B-ISDNrATM layering and layer descriptions in Section 16.6.
16.4
16.4.1
The ATM cell consists of 53 octets; 5 of these make up the header, and 48
octets carry the payload or info portion of the cell. The basic structure is
shown in Figure 16.4, where contiguous cells flow on a circuit from left to
right. Figure 16.5 shows the detailed structure of the cell header at the UNI.
607
Figure 16.4. Basic ATM cell structure is shown where a stream of contiguous cells flow from
left to right.
Figure 16.5. Header structure at the UNI (left); header structure at the NNI (right). GFC,
generic flow control; VPI, virtual path identifier; VCI, virtual channel identifier; PTI, payload
type; CLP, cell loss priority, HEC, header error control.
Now let us examine each of the bit fields that make up the ATM cell
header.
Generic Flow Control (GFC). These first 4 bits are either part of the VPI, if
the cells is traveling between two switches, or make up a reserved field if the
cell is traveling between an end-node and a switch. In this case it has local
significance only and can be used to provide standardized local flow control
function on the customer site.
VPI r VCI Fields (Routing Field). Twenty-four bits are available for routing a
cell from a customer site. There are 8 bits for virtual path identifier VPI.
and 16 bits for virtual channel identifier VCI.. Preassigned combinations of
VPI and VCI values are given in Table 16.1. The VCI value of zero is not
available for user virtual channel identification. The bits within the VPI and
608
TABLE 16.1
Combinations of Preassigned VP, VCI, PT, and CLP Values at the UNI
Use
Unassigned cell
Invalid
Metasignaling
(see Rec. I.311)
General broadcast signaling
(see Rec. I.311)
Point-to-point signaling
(see Rec. I.311)
Segment OAM F4 flow cell
(see Rec. I.610)
End-to-end OAM F4 flow cell
(see Rec. I.610)
VP resource management cell
(see Rec. I.371)
Reserved for future VP functions
(Note 6)
Reserved for future functions
(Note 7)
Reserved for future functions
(Note 7)
Segment OAM F5 flow cell
(see Rec. I.610)
VPI
00000000
Any VPI value
other than 0
XXXXXXXX
(Note 1)
XXXXXXXX
(Note 1)
XXXXXXXX
(Note 1)
Any VPI value
Any VPI value
Any VPI value
Any VPI value
Any VPI value
Any VPI value
Any VPI value
VCI
(Note 8)
PTI
CLP
00000000 00000000
00000000 00000000
Any value
Any value
0
B
00000000 00000001
(Note 5)
00000000 00000010
(Note 5)
00000000 00000101
(Note 5)
00000000 00000011
(Note 4)
00000000 00000100
(Note 4)
00000000 00000110
(Note 10)
00000000 00000111
(Note 10)
00000000 000SSSSS
(Notes 2 and 10)
00000000 000TTTTT
(Note 3)
Any VCI value other than
00000000 00000000,
00000000 00000011,
00000000 00000100,
00000000 00000110, or
00000000 00000111
Any VCI value other than
00000000 00000000,
00000000 00000011,
00000000 00000100,
00000000 00000110, or
00000000 00000111
Any VCI value other than
00000000 00000000,
00000000 00000011,
00000000 00000100,
00000000 00000110, or
00000000 00000111
Any VCI value other than
00000000 00000000,
00000000 00000011,
00000000 00000100,
00000000 00000110, or
00000000 00000111
0AA
0AA
0AA
0A0
(Note 11)
0A0
(Note 11)
110
(Note 9)
0AA
(Note 11)
0AA
0AA
100
101
110
111
A
A
A
The GFC field is available for use with all of these combinations.
A Indicates that the bit may be 0 or 1 and is available for use by the appropriate ATM layer function.
B Indicates the bit is a dont care bit
C Indicates the originating entity shall set the CLP bit to 0. The value may be changed by the
network.
Tables notes continued on page 609
609
VCI fields used for routing are allocated using the following rules:
Comment: Consider a very high-speed backbone carrying millions of messages. The split between VPI and VCI saves routers in the backbone from
requiring that their call-mapping database keep track of millions of individual
calls. In this situation, the backbone routers use only the VPI portion of the
call identifier. Because thousands of VCs might be going on the same VP,
switches inside can treat all the VCs for that VP as a unit.
Outside the backbone, the switches treat the VPIrVCI together as one
combined field. The term VP-switching refers to switches that are looking at
610
only the VPI portion of the field. VC-switching refers to switches that are
looking at the entire field.
Payload Type (PT) Field. The first bit s 0 indicates data rather than ATM
control information. For data, the middle bit indicates congestion experienced, and the last bit is used by AAL5 see Section 16.6.2.2. to indicate last
cell of a packet. Payload Type Identifier PTI. values are given in Table 16.2.
The main purpose of the PTI is to discriminate between user cells i.e., cells
carrying user information. and nonuser cells. The first four code groups in
the table 000-011. are used to indicate user cells. Within these four, 2, and 3
010 and 011. are used to indicate congestion experienced. The fifth and sixth
code groups 100 and 101. are used for VCC-level management functions.
Any congested network element, upon receiving a user data cell, may
modify the PTI as follows: Cells received with PTI s 000 or PTI s 010 are
transmitted with PTI s 010. Cells received with PTI s 001 or PTI s 011 are
transmitted with PTI s 011. Noncongested network elements should not
change the PTI.
Cell Loss Priority (CLP) Field. Depending on network conditions, cells where
the CLP is set i.e., CLP value is 1. are subject to discard prior to cells where
the CLP is not set i.e., CLP value is 0.. The concept here is identical with
that of frame relay and the DE bit. ATM switches may tag CLP s 0 cells
detected by the usage parameter control UPC. to be in violation of the
traffic contract by changing the CLP bit from 0 to 1.
Header Error Control (HEC) Field. The HEC is an 8-bit field, and it covers
the entire cell header. The code used for this function is capable of either
TABLE 16.2
PTI Coding
PTI Coding
Bits
4 3 2
0 0 0
0 0 1
0 1 0
0 1 1
1
1
1
1
0
0
1
1
0
1
0
1
Interpretation
User data cell, congestion not experienced.
ATM-user-to-ATM-user indication s 0
User data cell, congestion not experienced.
ATM-user-to-ATM-user indication s 1
User data cell, congestion experienced.
ATM-user-to-ATM-user indication s 0
User data cell, congestion experienced.
ATM-user-to-ATM-user indication s 1
OAM F5 segment associated cell
OAM F5 end-to-end associated cell
Resource management cell
Reserved for future functions
Source: Table appearing on page 6 in Section 2.2.4, ITU-T Rec. I.361 (11r95 ),
Ref. 4.
611
single-bit error correction or multiple-bit error detection. Briefly, the transmitting side computes the HEC value. The receiver has two modes of
operation, as shown in Figure 16.6. In the default mode there is the
capability of single-bit error correction. Each cell header is examined; if an
error is detected, one of two actions takes place. The action taken depends
on the state of the receiver. In the correction mode, only single-bit errors can
be corrected and the receiver switches to the detection mode. In the detection mode, all cells with detected header errors are discarded. When a
header is examined and found not to be in error, the receiver switches to the
correction mode. The term no action in Figure 16.6 means that no
correction is performed and no cell is discarded.
Figure 16.7 is a flow chart showing the consequences of errors in the ATM
cell header. The error protection function provided by the HEC provides for
a. recovery from single-bit errors and b. a low probability of delivery of cells
with errored headers under bursty error conditions. ITU-T Rec. I.432.1 Ref.
5. states that error characteristics of fiber-optic transmission systems appear
to be a mix of single-bit errors and relatively large burst errors. Thus, for
some transmission systems the error correction capability might not be
invoked.
16.4.2
The transmitter calculates the HEC value across the entire ATM cell header
and inserts the result in the appropriate header field.
The notation used to describe header error control is based on the
property of cyclic codes. For example, code vectors such as 1000000100001
it has 13 elements or bits, count them. can be represented by a polynomial
P x . s X 12 q X 5 q 1. The elements of an n-element code word are thus
the coefficients of a polynomial of the order n y 1. In this application,
these coefficients can have the value 0 or 1 and the polynomial operations
are performed using modulo 2 operations. The polynomial representing the
612
Figure 16.7. Consequences of errors in an ATM cell header. (From Figure 4rI.432.1, page 4,
ITU-T Rec. I.432.1, Ref. 5.)
content of a header excluding the HEC field is generated using the first bit of
the header as the coefficient of the highest-order term.
The HEC field is an 8-bit sequence. It is the remainder of the division
modulo 2. by the generator polynomial X 8 q X 2 q X q 1 of the product
X 8 multiplied by the content of the header excluding the HEC field.
At the transmitter, the initial content of the register of the device computing the remainder of the division is preset to all 0s and is then modified by
division of the header excluding the HEC field by the generator polynomial
as described above.; the resulting remainder is transmitted as the 8-bit HEC.
To improve the cell delineation performance in the case of bit-slips, the
following is recommended:
The check bits calculated by the use of the check polynomial are added
modulo 2. to an 8-bit pattern before being inserted in the last octet of
the header.
The recommended pattern is 01010101 the left bit is the most
significant bit..
TABLE 16.3
Header
pattern
613
Octet 2
Octet 3
Octet 4
Octet 5
00000000
00000000
00000000
00000001
The receiver must subtract equal to add modulo 2. the same pattern
from the 8 HEC bits before calculating the syndrome of the header.
16.4.3
Idle Cells
Idle cells cause no action at a receiving node except for cell delineation
including HEC verification. Idle cells are inserted and discarded for cell rate
decoupling. Idle cells are identified by the standardized pattern for the cell
header shown in Table 16.3.
16.5
16.5.1
614
Figure 16.8. Cell delineation state diagram. Note: The correct HEC means that the header
has no bit error (syndrome is zero) and has not been corrected. (From Figure 5rI.432.1, page
6, ITU-T Rec. I.432.1, Ref. 5.)
16.5.2
615
Figure 16.9. In-sync time versus bit error probability. (From Figure I.1rI.432.1, page 13,
ITU-T Rec. I.432.1, Ref. 5.)
16.6
The B-ISDN reference model is given in Figure 16.3, and its several planes
are described therein. We reiterate that B-ISDN layering has no relationship
whatsoever with the OSI reference model.
616
Figure 16.10. Acquisition time versus bit error probability. (From Figure I.2rI.432.1, page 14,
ITU-T Rec. I.432.1, Ref. 5.)
16.6.1
Figure 16.11 illustrates B-ISDNrATM layering and sublayering of the protocol reference model. It identifies the functions of the physical layer, the ATM
layer and the AAL and related sublayers.
16.6.1.1 Physical Layer. The physical layer consists of two sublayers. The
physical medium PM. sublayer includes only PM-dependent functions. The
transmission convergence TC. sublayer performs all functions required to
transform a flow of cells into a flow of data units i.e., bits. which can be
transmitted and received over a physical medium. The service data unit
SDU. crossing the boundary between the ATM layer and the physical layer
is a flow of valid cells. The ATM layer is unique meaning independent of the
underlying physical layer.. The data flow inserted in the transmission system
payload is PM-independent and self-supported. The physical layer merges
the ATM cell flow with the appropriate information for cell delineation,
according to the cell delineation mechanism described above, and carries the
operations and maintenance OAM. information relating to this cell flow.
617
Figure 16.11. B-ISDNrATM functional layering. CS, convergence sublayer; PM, physical
medium; SAR, segmentation and reassembly (sublayer); TC, transmission convergence.
The physical medium sublayer provides bit transmission capability including bit transfer and bit alignment as well as line coding and electrical optical
transformation. Of course, the principal function is the generation and
reception of waveforms suitable for the medium, the insertion, and extraction
of bit timing information and line coding where required. The primitives
identified at the border between the PM and TC sublayers are a continuous
flow of logical bits or symbols with this associated timing information.
Transmission Convergence Sublayer Functions. Among the important functions of this sublayer are the generation and recovery of the transmission
frame. Another function is transmission frame adaptation which includes the
actions necessary to structure the cell flow according to the payload structure
of the transmission frame transmit direction. and to extract this cell flow out
618
Functions
Multiplexing among different
ATM connections
Cell rate decoupling
(unassigned cells)
Cell discrimination based on
predefined header field values
Payload type discrimination
Loss priority indication and
selective cell discarding
Traffic shaping
Parameters
VPI r VCI
Preassigned header field values
Preassigned header field values
PT field
CLP field,
network congestion state
Traffic descriptor
619
In a switch, the ATM layer determines where the incoming cells should be
forwarded to, resets the corresponding connection identifiers for the next
link, and forwards the cell. The ATM layer also handles traffic management
functions and buffers incoming and outgoing cells. It indicates to the next
higher layer the AAL. whether or not there is congestion during transmission. The ATM layer monitors both transmission rates and conformance to
the service contract; this is called traffic shaping and traffic policing.
Cell Rate Decoupling. Cell rate decoupling includes insertion and suppression of idle cells in order to adapt the rate of valid ATM cells to the payload
capacity of the transmission system Ref. 6, ITU-T Rec. I.321.. According to
the ITU, this function is carried out in the TC transmission convergence.
portion of the physical layer. The ATM Forum provides the following
statement: The cell rate decoupling function at the sending entity adds
unassigned cells to the assigned stream i.e., cells with valid payloads. to be
transmitted, transforming a noncontinuous stream of assigned cells into a
continuous stream of assigned and unassigned cells. At the receiving entity
the opposite operation is performed for both unassigned and invalid cells.
The rate at which the unassigned cells are insertedrextracted depends on the
bit rate and rate variation. of the assigned cell andror the physical layer
transmission rate. The ATM Forum carries out the function in the ATM
layer and uses different terminology i.e., assigned and unassigned cells.,
whereas ITU-T carries out the function in the TC sublayer and uses the term
idle cells. Note the possible incompatibility here. Also note the unassigned cell coding in Table 16.1, and note idle cell coding in Table 16.3.
Physical layers that have synchronous cell time slots generally require cell
rate decoupling typically SONETrSDH, DS3rE3, etc.., whereas physical
layers that have asynchronous cell time slots do not require this function
because no continuous flow of cells need to be provided.
Cell Discrimination Based on Predefined Header Field Values. Certain
predefined header field values at the UNI are given in Table 16.1. The
functions of several of these are described as follows:
Meta-Signaling cells are used by the meta-signaling protocol for establishing and releasing signaling virtual channel connections. For virtual
channels allocated permanently PVC., meta-signaling is not used.
General Broadcast signaling cells are used by the ATM network to broadcast signaling information independent of service profiles.
F4 OAM cells. The virtual path connection VPC. operation flow F4 flow.
is carried via specially designated OAM cells. F4 flow OAM cells have
the same VPI value as the user-data cells transported by the VPC but
are identified by two unique preassigned virtual channels within this
VPC. At the UNI, the virtual channel identified by a VCI value of 3 is
620
The basic purpose of the AAL is to isolate the higher layers see Figure 16.3.
from the specific characteristics of the ATM layer by mapping the higher-layer
protocol data units PDUs. into the information field of the ATM cell and
vice versa.
16.6.2.1 Sublayering of the AAL. To support services above the AAL, a
number of independent functions are required of the AAL. These functions
are organized in two logical sublayers: the convergence sublayer CS. and the
segmentation and reassembly sublayer SAR.. The principal functions of
these sublayers are:
SAR. Here the functions are a. segmentation of higher-layer information
into a size suitable for the information field at an ATM cell and b.
reassembly of the contents of ATM cell information fields into higherlayer information.
CS. Here the prime function is to provide the AAL service at the
AAL-SAP. This sublayer is service-dependent.
16.6.2.2 Service Classification for the AAL. The service classification is
based on the following parameters:
TABLE 16.5
Parameters
Timing
compensation
Bit rate
Connection
mode
Example
AAL Type
621
Class A
Class B
Class C
Class D
Required
Required
Not required
Not required
Constant
Connectionoriented
Circuit emulation,
voice, video
Variable
Connectionoriented
Variable bit rate
video or audio
Variable
Connectionless
Type 1
Type 2
Variable
Connectionoriented
Connectionoriented
data transfer
Type 3, Type 5
Connectionless
data transfer
Type 4
Figure 16.12. SAR-PDU format for AAL-1. SN, sequence number; SNP, sequence number
protection.
622
cells with odd sequence numbers. The residual time stamp is transmitted
over 8 cells. Alarm indication in this adaptation layer is via a check of the
ones density. When the ones density of the received cell stream becomes
significantly different from the density used for the particular PCM line
coding scheme in use, it is determined that the system has lost signal and
alarm notifications are given Ref. 7..
AAL-2. AAL-2 handles the VBR scenario such as MPEG* video. Functions
performed by AAL-2 include:
Figure 16.13. Example of an SAR-PDU format for AAL-2. The need of each of these fields, the
position of these fields, and their size require further study by the ITU-T Organization. SN is
the sequence number, used to detect lost or misinserted cells. A specific value of the
sequence number may indicate a specified purpose. IT is information type, used to indicate
beginning of message (BOM), continuation of message (CM), and end of message (EOM),
provides timing information, and also is a component of the audio or video signal; LI is length
indicator, checks to indicate that the number of octets of the CS-PDU are included in the
SAR-PDU payload field. CRC is cyclic redundancy check, used to correct up to two correlated
bit errors. (From Figure 1rI.363, page 4, ITU-T Rec. I.363, Ref. 8; see also Ref. 9.)
*MPEG is a set of digital video compression schemes. MPEG stands for Motion Picture Experts
Group.
623
624
Figure 16.14. Formation of an ATM cell from a user frame, showing terminology used.
With the message mode, a CPCS-PDU is passed across the CPCS interface in its entirety in exactly one CPCS-IDU IDU, interface data unit.. In
other words, it handles a complete user frame as one piece. In the case of the
streaming mode, parts of a user frame can be sent at different points in time,
or a long frame may be sent on to a receiver before the entire frame has been
received by the transmitter Ref. 11..
Figure 16.14 depicts the steps required to accept a variable length user
data frame or packet and to develop ATM cells for transmission. These steps
are numbered 1 through 4:
1. Variable length packets, typically from frame relay, are padded to an
integral word length and encapsulated with a header and a trailer to
form what is called the conergence sublayer PDU CPCS..
2. Padding is added to make sure that fields align themselves to 32-bit
boundaries, allowing the efficient implementation of the operations in
625
16.15
AND
16.16
626
counting units for the values specified in the BAsize and Length fields may
be indicated; other users are under study by the ITU-T Organization.
Beginning Tag (Btag) Field 1 octet.. This field allows the association of the
CPCS-PDU header and trailer. The sender inserts the same value in the
Btag and the Etag in the trailer for a given CPCS-PDU and changes
the values of each successive CPCS-PDU. The receiver checks the value of
the Btag in the header with the value of the Etag in the trailer. It does not
check the sequence of the BtagrEtags in successive CPCS-PDUs.
As an example, a suitable mechanism is as follows: The sender increments
the value placed in the Btag and Etag field for each successive CPCS-PDU
sent over a given MID value. Btag values are cycled up to modulo 256.
Buffer Allocation Size (BAsize) Indication Field 2 octets.. This field indicates to the receiving peer entity the maximum buffering requirements to
receive the CPCS-SDU. In message mode, the BAsize value is encoded
equal to the CPCS-PDU payload length. In streaming mode, the BAsize
value is encoded equal to or greater than the CPCS-PDU payload length.
The buffer allocation size is binary encoded as number of counting units.
The size of the counting units is identified by the CPI field.
Padding (PAD) Field 0 to 3 octets.. Between the end of the CPCS-PDU
payload and the 32-bit aligned CPCS-PDU trailer, there will be from 0 to
3 unused octets. These unused octets are called the Padding PAD. field.
They are strictly used as filler octets and do not convey any information. It
may be set to 0, and its value is ignored at the receiving end. This
padding field complements the CPCS-PDU payload to an integral multiple
of 4 octets.
Alignment (AL) Field 1 octet.. The function of the alignment field is to
achieve 32-bit alignment in the CPCS-PDU trailer. The alignment field
complements the CPCS-PDU trailer to 32 bits. This unused octet is strictly
used as a filler octet and does not convey any information. The alignment
field is set to zero.
End Tag (Etag) Field 1 octet.. For a given CPCS-PDU, the sender inserts
the same value in this field as was inserted in the Btag field in the header
to allow the association of the trailer with its header.
Length Field 2 octets.. The length field is used to encode the length of the
CPCS-PDU payload field. This field is also used by the receiver to detect
the loss or gain of information. The length is binary encoded as number of
counting units. The size of the counting units is identified by the CPI field.
Note: The length of the CPCS-PDU payload is limited to the maximum
value of the length field multiplied by the value of the counting unit.
627
628
Nonassured data transfer of user data frames with any length measured
in octets from 1 to 65,535 octets
The CPCS connection is established by management or by the control
plane
Error detection and optional indication bit error and cell loss or gain.
CPCS-SDU sequence integrity on each CPCS connection
629
630
Padding PAD. Field. Between the end of the CPCS-PDU payload and
the CPCS-PDU trailer, there will be from 0 to 47 unused octets. These
unused octets are called the padding PAD. field. They are strictly used
as filler octets and do not convey any information. Any coding is
acceptable. This padding field complements the CPCS-PDU including
CPCS-PDU payload, padding field, and CPCS-PDU trailer . to an
integral multiple of 48 octets.
CPCS User-to-User Indication CPCS-UU . Field. The CPCS-UU field is
used to transparently transfer CPCS user-to-user information.
Common Part Indicator CPI . Field. One of the functions of the CPI field
is to align the CPCS-PDU trailer to 64 bits. Other functions are for
further study by the ITU-T Organization. When only the 64-bit alignment function is used, this field is coded as zero.
Length Field. The length field is used to encode the length of the CPCSPDU payload field. The length field value is also used by the receiver to
detect the loss or gain of information. The length is binary encoded as
number of octets. A length field coded as zero is used for the abort
function.
CRC Field. The CRC-32 is used to detect bit errors in the CPCS-PDU.
The CRC field is filled with the value of a CRC calculation which is
performed over the entire contents of the CPCS-PDU, including the
CPCS-PDU payload, the PAD field, and the first 4 octets of the
CPCS-PDU trailer. The CRC field shall contain the 1 complement of
the sum modulo 2. of:
1. The remainder of x k x 31 q x 30 q qx q 1. divided modulo 2. by
the generator polynomial, where k is the number of bits of the
information over which the CRC is calculated and
2. The remainder of the division modulo 2. by the generator polynomial
of the product of x 32 by the information over which the CRC is
calculated.
The CRC-32 generator polynomial is
G x . s x 32 q x 26 q x 23 q x 22 q x 16 q x 12 q x 11 q x 10 q x 8
q x7 q x 5 q x 4 q x 2 q x q 1
The result of the CRC calculation is placed with the least significant bit
right justified in the CRC field.
As a typical implementation at the transmitter, the initial content of the
register of the device computing the remainder of the division is preset to all
631
Figure 16.18. SAR-PDU format for AAL-5. (From Figure 4rI.363.5, page 9, ITU-T Rec. I.363.5,
Ref. 13.)
632
Figure 16.19. Segmentation and reassembly of a CPCS user PDU. (From Figure B.3rI.363.5,
page 20, ITU-T Rec. I.363.5, Ref. 13.)
16.7
633
The issues such as routing decisions and architectures have a major impact
on connection-oriented services, where B-ISDNrATM end nodes have to
maintain or get access to lookup tables which translate destination addresses
into circuit paths. These circuit path lookup tables that differ at every node
must be maintained in a quasi-real-time fashion. This will have to be done by
some kind of routing protocol.
One way to resolve this problem is to make it an internal network problem
and use a connectionless service as described in ITU-T Rec. I.364 Ref. 14..
We must keep in mind that ATM is basically a connection-oriented service.
Here we are going to adapt it to provide a connectionless service.
16.7.1
Functional Architecture
634
Figure 16.20. Reference configuration for connectionless data service in the B-ISDN. CLSF,
connectionless service functions. P, M, S, and T are reference points. (From Figure 1rI.364,
page 2, ITU-T Rec. I.364, Ref. 14.)
Figure 16.21. General protocol structure for connectionless data service in the B-ISDN.
CLNAP, connectionless network access protocol; CLSF; connectionless service functions.
635
16.7.2
636
Figure 16.23. Structure of the CLNAP-PDU. ( nb is the length of a field, n, in bits.) (From
Figure 5rI.364, page 7, ITU-T Rec. I.364, Ref. 14.)
637
the header extension is structured into information entities. An information entity element. consists of in this order. element length, element
type, and element payload, described as follows:
Element Length. This is a 1-octet field and contains the combined lengths
of the element length, element type, and element payload in octets.
Element Type. This is also a 1-octet field and contains a binary coded
value which indicates the type of information found in the element
payload field.
Element Payload. This is a variable-length field and contains the information indicated by the element type field.
User Information. This is a variable-length field up to 9188 octets and is
used to carry the CLNAP-SDU.
PAD. This field is 0, 1, 2, or 3 octets in length and is coded as all zeros.
Within each CLNAP-PDU the length of this field is selected such that the
length of the resulting CLNAP-PDU is aligned on a 32-bit boundary.
CRC. This optional 32-bit field may be present or absent as indicated by the
CIB field. The field contains the result of a standard CRC-32 calculation
performed over the CLNAP-PDU with the reserved field always treated
as if it were coded as all zeros.
16.8
16.8.1
ASPECTS OF A B-ISDNr
r ATM NETWORK
ATM Routing and Switching
An ATM transmission path supports VPs virtual paths., and inside VPs are
VCs virtual channels . as shown in Figure 16.26.
As we discussed in Section 16.4.1, each ATM cell contains a label in its
header to explicitly identify the VC to which the cell belongs. This label
consists of two parts: a virtual channel identifier VCI. and a virtual path
identifier VPI.. See Figure 16.5.
16.8.1.1 Virtual Channel Level. Virtual channel VC. is a generic term
used to describe a unidirectional communication capability for the transport
of ATM cells. A VCI identifies a particular VC link for a given virtual path
Figure 16.26. Relationship between the VC, VP, and the transmission path.
638
639
Figure 16.27. Representation of the VP and VC switching hierarchy. (From Figure 4rI.311,
page 5, ITU-T Rec. I.311, Ref. 16.)
640
16.9
SIGNALING REQUIREMENTS
16.9.1
The setup and release of VCCs at the UNI can be performed in various ways:
16.9.2
16.9.2.1 Requirements for Signaling Virtual Channels. For a point-topoint signaling configuration, the requirements for signaling virtual channels
are as follows:
1. One virtual channel connection in each direction is allocated to each
signaling entity. The same VPIrVCI value is used in both directions. A
standardized VCI value is used for point-to-point signaling virtual
channel SVC..
2. In general, a signaling entity can control, by means of associated
point-to-point SVCs, user-VCs belonging to any of the VPs terminated
in the same network element.
3. As a network option, the user-VCs controlled by a signaling entity can
be constrained such that each controlled user-VC is in either upstream
or downstream VPs containing the point-to-point SVCs of the signaling
entity.
SIGNALING REQUIREMENTS
641
For point-to-multipoint signaling configurations, the requirements for signaling VCs are as follows:
1. Point-to-Point Signaling Virtual Channel. For point-to-point signaling,
one VC connection in each direction is allocated to each signaling
entity. The same VPIrVCI value is used in both directions.
2. General Broadcast Signaling Virtual Channel. The general broadcast
signaling virtual channel GBSVC. may be used for call offering in all
cases. In cases where the point does not implement service profiles
or where the multipoints do not support service profile identification,
the GBSVC is used for call offering. The specific VCI value for general
broadcast signaling is reserved per VP at the UNI. Only when metasignaling is used in a VP is the GBSVC activated in the VP.
3. Selectie Broadcast Signaling Virtual Channels. Instead of the GBSVC, a
VC connection for selective broadcast signaling SBS. can be used for
call offering, in cases where a specific service profile is used. No other
uses for SBSVCs are foreseen.
16.9.3
Metasignaling
16.9.3.1 Metasignaling Functions at the User Access. In order to establish, check, and release point-to-point and selective broadcast signaling
virtual channel connections, metasignaling procedures are provided. For each
direction, metasignaling is carried in a permanent virtual channel connection
having a standardized VCI value. This channel is called the metasignaling
virtual channel. The metasignaling protocol is terminated in the ATM layer
management entity.
The metasignaling function will be required to:
642
SIGNALING REQUIREMENTS
16.9.4
643
There are several network interfaces, each with its own signaling variant. The
following interfaces must be taken into account:
Great care must be taken when specifying interfaces. There are two
recognized standards-making bodies:
ITU
ATM Forum
644
ing scheme. An address consists of two parts: network prefix 13 bytes. and
the user part 7 bytes.. The addressing formats are shown and compared in
Figure 16.28. Some of the standards involved use other terminology. The first
part is called the international domain identifier IDI., and the second part is
the domain-specific part DSP..
The AFI is the first octet digit. and is common to all three. AFI stands for
Authority and Format Identifier and indicates which address format is being
used. The DCC data country code. specifies the country to which the
address is registered as defined in ISO 3166.
Within each one of these domains, there is the domain-specific part or
DSP i.e., the remainder of the address .. The remaining formats are identical
for both NSAP address types whether DCC or ICD. The DSP format
identifier DFI. specifies the meaning of the remainder of the address. The
Administrative Authority field identifies the organization that is responsible
for administering the remainder of the address. This may be a carrier U.S.
terminology., private network, or manufacturer. The remainder of the DSP is
identical for all domains.
The routing domain RD. identifies a unique domain within the IDI
format. This is further subdivided using a 2-octet AREA field. The end
system identifier ESI. and SELector SEL. portions of the DSP are identical
for all IDI Ref. ISO 10589.. The ESI can be globally unique such as an
IEEE 802 MAC address 48 bits.. The SELector SEL. field is not used for
routing but may be used by end-users or end systems ES..
The E.164 numbering plan is in BCD code and is padded with zeros on
the left-hand side to the standard 15 digits to correspond to the standards
Figure 16.28. ATM addressing plans, comparison. AFI, authority and format identifier; DCC,
data country code; IDI, international domain identifier; DFI, DSP format identifier; RD, routing
domain; ESI, end system identifier; SEL, SELector; DSP, domain-specific part. derived from
ATM Forum, version 3.0 specification (Ref. 22.)
SIGNALING REQUIREMENTS
645
646
AAL parameters: AAL type, CBR bit rate, CPCS-SDU size, source
clock frequency
Broadband bearer capability: traffic type, timing requirements, CBR, or
VBR
Called party number: addressing information described above. NSAP or
E.164
Calling party number using ATM address of user originating the call
End-to-end transit delay: indicates nominal maximum delay acceptable
Quality of service QoS.: indicates QoS class backwards and forwards
Transit network selection: indicates the requested public carrier network
for call e.g., Sprint, MCI, BT, AT & T, etc...
16.10
16.10.1
647
16.10.2
Definitions
Cell Event
1. A cell exit event occurs when the first bit of an ATM cell has
completed transmission out of an end-user device to a private ATM
network element across the private UNI measurement point, or out of
a private ATM network element to a public ATM network element
across the public UNI measurement point, or out of an end-user device
to a public ATM network across the public UNI measurement point.
2. A cell entry event occurs when the last bit of an ATM cell has
completed transmission into an end-user device from a private ATM
network element across the private UNI measurement point, or into a
private ATM network from a public ATM network element across the
public UNI measurement point, or into an end-user device from a
public ATM network element across the public UNI measurement
point.
ATM Cell Transfer Outcome. The following are possible cell transfer outcomes between measurement points for transmitted cells ITU-T definitions .:
1. Successful Cell Transfer Outcome. The cell is received corresponding to
the transmitted cell with a specified time Tmax . The binary content of
the received cell conforms exactly to the corresponding cell payload,
648
2.
3.
4.
5.
and the cell is received with a valid header field after header error
control procedures are completed.
Errored Cell Outcome. The cell is received corresponding to the transmitted cell within a specified time Tmax . The binary content of the
received cell payload differs from that of the corresponding transmitted
cell or the cell is received with an invalid header field after the header
error control procedures are completed.
Lost Cell Outcome. No cell is received corresponding to the transmitted
cell within a specified time Tmax examples: never showed up or
late..
Misinserted Cell Outcome. This involves a received cell for which there
is no corresponding transmitted cell.
Seerely Errored Cell Block Outcome. This is when M or more lost cell
outcomes, misinserted cell outcomes, or errored cell outcomes are
observed in a receiver cell block of N cells transmitted consecutively on
a given connection.
16.10.3
Cell transfer delay is defined as the elapsed time between a cell exit event at
measurement point 1 e.g., at the source UNI. and the corresponding cell
entry event at measurement point 2 e.g., the destination UNI. for a particular connection. The cell transfer delay between two measurement points is
the sum of the total inter-ATM node transmission delay and the total ATM
node processing delay between MP1 and MP2 .
In addition to the normal delay that one would expect for a cell to traverse
a network, extra delay is added in the ATM network at each ATM switch.
One cause of this delay is asynchronous digital multiplexing. Where this
method is employed, two cells directed toward the same output port of an
ATM switch or cross-connect can result in contention.
One or more cells are held in a buffer until the contention is resolved.
Thus the second cell suffers additional delay. Delay of a cell depends on the
traffic intensity within a switch which influences the probability of contention.
The asynchronous path of each ATM cell also contributes to cell delay.
Cells can be delayed one or many cell periods, depending on traffic intensity,
switch sizing, and the transmission path taken through the network.
16.10.4
649
Cell loss may not be uncommon in an ATM network. There are two basic
causes of cell loss: error in cell header or network congestion.
Cells with header errors are automatically discarded. This prevents misrouting of errored cells, as well as the possibility of privacy and security
breaches.
Switch buffer overflow can also cause cell loss. It is in these buffers that
cells are held in prioritized queues. If there is congestion, cells in a queue
may be discarded selectively in accordance with their level of priority. Here
enters the cell loss priority CLP. bit discussed in Section 16.4. Cells with this
bit set to 1 are discarded in preference to other, more critical cells. In this
way buffer fill can be reduced to prevent overflow.
Cell loss ratio is defined for an ATM connection as
650
The severely errored cell block ratio for an ATM connection is defined as
16.11
16.11.1
651
Figure 16.31 shows the time scales over which various traffic control and
congestion control functions can operate. The response time defines how
quickly the controls react. For example, cell discarding can react on the order
Figure 16.30. Reference configuration for traffic control and congestion control. Note: NPC
may apply as well at some intranetwork NNIs, and the arrows indicate the direction of the cell
flow. UPC, usage parameter control; CAC, connection admission control; PC, priority control;
NPC, network parameter control; RM, resource management; Others, for further study. (From
Figure 1rI.371, page 7, ITU-T Rec. I.371, Ref. 23.)
652
Figure 16.31. Control response times. (From Figure 2rI.371, page 8, ITU-T Rec. I.371,
Ref. 23.)
of the insertion time of a cell. Similarly, feedback controls can react on the
time scale of round-trip propagation times. Because traffic control and
resource management functions are needed at different time scales, no single
function is likely to be sufficient.
16.11.3 Quality of Service, Network Performance,
and Cell Loss Priority
QoS at the ATM layer is defined by a set of parameters such as cell delay,
cell delay variation sensitivity, cell loss ratio, and so forth.
A user requests a specific ATM layer QoS from the QoS classes which a
network provides. This is part of the traffic contract at connection establishment. It is a commitment for the network to meet the requested QoS as long
as the user complies with the traffic contract. If the user violates the traffic
contract, the network need not respect the agreed-upon QoS.
A user may request at most two QoS classes for a single ATM connection,
which differ with respect to the cell loss ratio objectives. The CLP bit in the
ATM header allows for two cell loss ratio objectives for a given ATM
connection.
Network performance objectives at the ATM SAP are intended to capture
the network ability to meet the requested ATM layer QoS. It is the role of
653
upper layers, including the AAL, to translate this ATM layer QoS to any
specific application requested QoS.
16.11.4
654
16.11.5
655
656
657
not respect the agreed QoS class. The conformance definition that defines
conformity at the public UNI of the cells of the ATM connection uses a
GCRA configuration in multiple instances to apply to particular combinations of the CLP s 0 and CLP s 1 q 0 cell streams with regard to the peak
cell rate and to particular combinations of CLP s 0, CLP s 1, and CLP s 0
q 1 cell streams with regard to the sustainable cell rate and burst tolerance.
For example, the conformance definition may use the GCRA twice, once for
peak cell rate of the aggregate CLP s 0 q 1. cell stream and once for the
sustainable cell rate of the CLP s 0 cell stream. The network operator may
offer a limited set of alternative conformance definitions all based on
GCRA. from which the user may choose for a given ATM connection.
16.11.5.5 Generic Cell Rate Algorithm (GCRA). The GCRA is a virtual
scheduling algorithm or a continuous-state leaky bucket algorithm as defined
by the flow chart in Figure 16.33. The GCRA is used to operationally define
the relationship between peak cell rate PCR. and the CDV tolerance and
the relationship between sustained cell rate SCR. and the burst tolerance.
In addition, for the cell flow of an ATM connection, the GCRA is used to
specify the conformance at the public or private UNI to declared values of
the above two tolerances, as well as declared values of the traffic parameters
PCR and SCR and burst tolerance.
For each cell arrival, the GCRA determines whether the cell is conforming
with the traffic contract of the connection, and thus the GCRA is used to
provide the formal definition of traffic conformance to the traffic contract.
Although traffic conformance is defined in terms of the GCRA, the network
provider is not obligated to use this algorithm or this algorithm with the
same parameter values. for the UPC. Rather, the network provider may use
any UPC as long as the operation of the UPC does not violate the QoS
objectives of a compliant connection.
The GCRA depends only on two parameters: the increment I and the
limit L. These parameters have been denoted by T and , respectively, and
in ITU-T Rec. I.371 Ref. 23., but have been given more generic labels by
the ATM Forum. herein because the GCRA is used in multiple instances.
We will now use the ATM Forum notation GCRA I, L., which means
the GCRA with the value of the increment parameter set equal to I and the
value of the limit parameter set equal to L.
The GCRA is formally defined in Figure 16.33, which the ATM Forum
took as a generic version of Figure 1 in Annex A of I.371. The two algorithms
in Figure 16.33 are equivalent in the sense that for any sequence of cell
arrival times w t a k ., k G 1x, the two algorithms determine the same cells to be
conforming and thus the same cells to be nonconforming. The two algorithms
are easily compared if one notices that at each arrival epoch, t a k ., and after
the algorithms have been executed, TAT s X q LCT see Figure 16.33..
The virtual scheduling algorithm updates a theoretical arrival time TAT.,
which is the nominal arrival time of the cell assuming equally spaced cells
658
Figure 16.33. Equivalent versions of the generic cell rate algorithm (GCRA). (From Figure
A-1rI.371, page 62, ITU-T Rec. I.371, Ref. 23.)
when the source is active. If the actual arrival time of a cell is not too early
relative to the TAT, in particular if the actual arrival time is after TAT-L,
then the cell is conforming; otherwise the cell is nonconforming.
The continuous-state leaky bucket algorithm can be viewed as a finitecapacity bucket whose real-valued content drains out at a continuous rate of
1 unit of content per time unit and whose content is increased by the
increment I for each conforming cell. Equivalently, it can be viewed as the
work load in a finite-capacity queue or as a real-valued counter. If at a cell
arrival the content of the bucket is less than or equal to the limit value, L,
then the cell is conforming; otherwise the cell is nonconforming. The capacity
of the bucket i.e., the upper bound on the counter. is L q I.
659
For switched ATM connections, the PCR for CLP s 0 q 1 and the QoS
class must be explicitly specified for each direction in the connection-establishment SETUP message.
The CDV tolerance must be either explicitly specified at subscription time
or implicitly specified.
The SCR and burst tolerance comprise an optional traffic parameter set in
the source traffic descriptor. If either SCR or burst tolerance is specified,
then the other must be specified within the relevant traffic contract.
16.12
16.12.1
660
Figure 16.34. Format of DS3 PLCP frame. (From Ref. 25. Courtesy of Hewlett-Packard
Company.
DS3 has to contend with network slips addedrdropped frames to accommodate synchronization alignment.. Thus PLCP is padded with a variable
number of stuff justification . bits to accommodate possible timing slips. The
C1 overhead octet indicates the length of padding. The bit interleaved parity
BIP. checks the payload and overhead functions for errors and performance
degradation. This performance information is transmitted in the overhead.
Figure 16.35 illustrates a 680-bit DS3 frame transporting ATM cells. The
figure also shows 84 bits being grouped into 21 nibbles. Remember a nibble is
half an octet or byte; it is a group of 4 bits.
ATM cells can also be mapped into a DS3 frame by what is called
HEC-based mapping. In this case the ATM cells are mapped into the
payload with the octet structure of the cells aligned with the nibble structure
of the multiframe. The multiframe is organized such that 84 bits of payload
follow every overhead bit. The 84 bits can be assumed to be organized into 21
consecutive nibbles. The ATM cell is placed such that the start of cell always
coincides with the start of nibble. As in most ATM cell mapping situations,
the cells may cross multiframe boundaries. See Figure 16.35.
16.12.2
DS1 Mapping
One approach to mapping ATM cells into a DS1 frame is to use a similar
procedure as used on DS3 with PLCP. In this case only 10 cells are bundled
into a frame, and two of the Z overheads are removed. The padding in the
frame is set at 6 octets. The entire frame takes 3 ms to transmit and spans
661
662
Figure 16.36. DS1 mapping with PLCP. (From Ref. 25. Courtesy of Hewlett-Packard
Company.)
Figure 16.37. Frame structure for 1.544 Mbps (DS1) used to transport ATM cells. (From
Figure 2-1rG.804, page 8, ITU-T Rec. G.804, Ref. 26.)
E1 Mapping
663
664
TS0 and TS16 are reserved. TS0 is used for synchronization of the frame and
TS16 is used for signaling. The E1 frame is shown in Figure 16.38. Bit
positions 9128 and 137256 may be used for ATM cell mapping. ATM cells
can also be directly mapped into special E3 and E4 frames. The first has 530
octets available for cells thus it fits 10 cells. and the second has 2160 octets
not evenly divisible..
Figure 16.39. Mapping ATM cells into the 155.520 Mbps frame structure of SDH-based UNI.
(From Figure 8rI.432.1, page 13, ITU-T Rec. I.432.1, Ref. 5.)
16.12.4
665
Figure 16.40. Mapping ATM cells into the 622.080-Mbps frame structure for SDH-based UNI.
(From Figure 8rI.432.1, page 13, ITU-T Rec. I.432.1, Ref. 5.)
666
Figure 16.41. Mapping ATM cells into a SONET STM-1 frame at the UNI.
aligned with STM-4 octet boundaries. Because the C-4-4c capacity 9360
octets. is not an integer multiple of the cell length 53 octets., a cell may
cross a C-4-4c boundary. The AU pointers are used for finding the first octet
of the VC-4-4c.
16.12.5
ATM cells are mapped directly into the SONET payload 49.54 Mbps.. As
with SDH, the payload in octets is not an integer multiple of the cell length,
and thus a cell may cross an STS frame boundary. This mapping concept is
shown in Figure 16.41. The H4 pointer indicates where the cells begin inside
an STS frame. Another approach is to identify cell headers and, thus, identify
the first cell in the frame.
16.12.6
Table 16.6 shows connection cell rates for various familiar user information
bit rate capacities. By choosing appropriate cell rate values for the traffic
parameters associated with a connection, a user defines the bit rate capacity
associated with an ATM connection. The cell rates listed in the table include
an allowance for the AAL header and operations, administration, and
maintenance OAM. cell overhead.
These rates are used to assign the peak cell rate PCR. and sustainable
cell rate SCR. traffic parameters defined in the ATM Forum UNI Specification Version 3.1.
TABLE 16.6
667
User Information
Bandwidth
N = 64 Kbps (DS0)
N = 384 Kbps
N = 1.544 Mbps (DS1)
N = 44.736 Mbps (DS3)
N = 1 Mbps
DS3 PLCP
DS3 direct mapping
Full STS-3c
Full STS-12c
Cell Rate
(Cells r Second)
N = 173
N = 1035
N = 4140
N = 119,910
N = 2689
96,000
104,268
353,207
1,412,828
Comments
N s 1 to 23 (i.e., sub-DS1 rates)
N s 1 to 31 (i.e., up to 12 Mbps)
N s 1 to 85 (i.e., up to 131 Mbps)
N s 1, 2 (i.e., 1 or 2 = DS3 rate)
N s 1 to 131 (i.e., up to 131 Mbps)
DS3 line rate, PLCP option
DS3 line rate, direct mapping (HEC)
STS-3c line rate
STS-12c line rate
Source: Table 9-1, page 9-1, Bellcore Special Report, SR-3330, Ref. 27.
TABLE 16.7
Level
F5 Virtual channel level: Extends between network elements performing virtual channel
connection termination functions and can extend through one or more path
connections.
F4 Virtual path level: Extends between network elements performing virtual path connection termination functions and may extend through one or more transmission paths.
F3 Transmission path level: Extends between network elements assemblingrdisassembling the payload of a transmission system and associating it with its OAM
functions. Cell delineation and header error control (HEC) functions are required at
the endpoints of each transmission path. The transmission path is connected
through one or more digital sections.
F2 Digital section level: Extends between section endpoints and comprises a maintenance entity according to the definition in ITU-T Rec. M.20, Section 3.
F1 Regenerator section level: A regenerator section is a portion of a digital section and as
such is a maintenance subentity.
668
OAM functions related to OAM levels are independent from the OAM
functions of other layers and have to be provided at each layer.
Each layer, where OAM functions are required, is able to carry out its own
processing to obtain quality and status information. OAM functions are
performed by the layer management. These results may be provided to the
plane management or to the adjacent higher layer. Higher-layer functions are
not necessary to support the OAM of the lower layer.
16.13.2
The mechanisms to provide OAM functions and to generate OAM flows F1,
F2, and F3 depend on the format of the transmission system as well as on the
supervision functions contained in B-NT1 and B-NT2 for the section crossing
the TB reference point. There are three types of transmission for customer
access: SDH-based, cell-based, and PDH-based.
SDH-Based Transmission Systems. Flows F1 and F2 are carried on bytes in
the section overhead SOH.; flow F3 is carried in the path overhead POH.
of the transmission frame.
Cell-Based Transmission Systems. Such transmission systems may use an
interface structure as specified in Section 4.2 of ITU-T Rec. I.432.1. OAM
flows F1 and F3 are carried through maintenance cells for the physical layer
using a specific pattern in the header for F1 and F3. F2 flows are not
provided, but the associated functions are supported by F3 flows. These cells
are not passed to the ATM layer. The occurrence of a PLOAM* cell is
determined by the requirements of the supported OAM functions. For each
type F1 and F3. of PL-OAM cell, maximum spacing is applied. If maximum
spacing is exceeded, loss of OAM flow LOM. will occur.
PDH -Based Transmission Systems. These systems may only be used on the
network side of the B-NT1. Specific means to monitor the section performance e.g., violation code counting CRC, etc.. are specified for these
systems. The capability to carry OAM information other than bit-oriented
messages is very limited.
*PLOAM or PL-OAM stands for physical layer OAM.
PDH stands for plesiochronous digital hierarchy e.g., E1, DS1, DS3, etc...
16.13.3
669
The ATM layer contains the two highest OAM levels shown in Table 16.7.
These are:
F4:
F5:
These OAM flows are provided by cells dedicated to ATM layer OAM
functions for both virtual channel connections VCC. and virtual path connections VPC.. In addition, such cells are usable for communication within
the same layers of the management plane.
16.13.3.1 F4 Flow Mechanism. The F4 flow is bidirectional. OAM cells
for the F4 flow have the same VPI value as the user cells of the VPC and are
identified by one or more preassigned VCI values. The same preassigned
VCI value shall be used for both directions of the F4 flow. The OAM cells
for both directions of the F4 flow must follow the same physical route so that
any connecting points supporting that connection can correlate the fault and
performance information from both directions.
There are two kinds of F4 flows, which can simultaneously exist in a VPC.
These are as follows:
670
671
OAM Functions Supported Solely by the Flows F1 to F3. Table 16.8 gives an
overview of the OAM functions and the related OAM flows. It also lists the
different failures to be detected together with the failure indications for
the SDH-based physical layer. Table 16.9 illustrates the same information
for the cell-based physical layer Ref. 28..
16.13.5
The F4 flow relates to the irtual path and the F5 flow relates to the irtual
channel. In both cases the fault management functions consist of monitoring
of the pathrchannel for availability and other, overall performance monitoring. A path or channel is either not available or has degraded performance.
16.13.5.1 VP-AIS and VP-FERF Alarms. The VP-AIS virtual pathalarm
indication signal. and the VP-FERF virtual pathfar-end reporting failure.
alarms are used for identifying and reporting VPC virtual path connection.
failures.
VP-AIS. VP-AIS cells are generated and sent downstream to all affected
VPCs from the VPC connecting point e.g., ATM cross-connect. which
detects the VPC failure. VP-AIS results from failure indications from the
physical layer as shown in Tables 16.8 and 16.9.
VP-AIS Cell Generation Condition. VP-AIS cells are generated and transmitted as soon as possible after failure indication, and transmitted periodically during the failure condition in order to indicate VPC unavailability. The
generation frequency of VP-AIS cells is nominally one cell per second and is
the same for each VPC concerned. VP-AIS cell generation is stopped as soon
as the failure indications are removed.
VP-AIS Cell Detection Condition. VP-AIS cells are detected at the VPC
endpoint and VP-AIS status is declared after the reception of one VP-AIS
cell. VP connecting points may monitor the VP-AIS cells.
VP-AIS Release Condition. The VP-AIS state is removed under either of
the following conditions:
672
673
674
675
676
TABLE 16.10
677
OAM Type
Fault management
Performance management
Activationrdeactivation
4-bit
Function Type
4-bit
0001
0001
0001
0010
0010
0010
1000
AIS
FERF
Continuity check
Forward monitoring
Backward reporting
Monitoringrreporting
Performance monitoring
Continuity check
0000
0001
0100
0000
0001
0010
0000
0001
To eliminate forced insertions when monitoring VPC segment performance, the actual monitoring block size may be extended until a free cell is
available after the insertion request. However, in this case, the actual
monitoring block size may not average out to N cells. Forced insertion at the
segment level remains as an option.
16.13.5.2 OAM Functions for the VCC (F5 Flows). VCC F5 functions are
similar to the VPC F4 functions.
16.13.6
The ATM layer OAM cells contain fields common to all types of OAM cells,
as well as specific fields for each specific type of OAM cell. See Table 16.10.
The coding for unused common and specific fields is as follows:
Unused OAM cell information field octets are coded 0110 1010 6AH.
Unused cell information field bits incomplete octets. are coded all
zeros
16.13.6.1 Common OAM Cell Fields. All ATM layer OAM cells have the
following five common fields: see Figure 16.42..
Figure 16.42. Common OAM cell format. (From Figure 8rI.610, page 18, Ref. 28.)
678
1. Header. Details of this field are in Rec. I.361. For F4 flow identification, two preassigned VCIs are used to distinguish OAM cells for VPCs
and VPC segments. These two values are defined in Rec. I.361. For F5
flow identification, two PTI values are used to distinguish OAM cells
for VCCs and VCC segments. These two values are defined in Rec.
I.361.
2. OAM Cell Type (4 bits). This field indicates the type of management
function performed by this cell, e.g., fault management, performance
management, and activationrdeactivation.
3. OAM Function Type (4 bits). This field indicates the actual function
performed by this cell within the management type indicated by the
OAM Cell Type field.
4. Resered Field for Future Use (6 bits). Default value coded all zero.
5. Error Detection Code (EDC) (10 bits). This field carries a CRC-10 error
detection code computed over the information field of the OAM cell.
The CRC-10 generating polynomial is
G x . s 1 q x q x 4 q x 5 q x 9 q x 10
REFERENCES
1. John Atkins and Mark Norris, Total Area Networking, John Wiley & Sons,
Chichester, UK, 1995.
2. Broadband Aspects of ISDN, CCITT Rec. I.121, CCITT Geneva, 1991.
3. ATM UserNetwork Interface Specification, Version 3.1, The ATM Forum,
Prentice-Hall, Englewood Cliffs, NJ, 1996.
4. B-ISDN ATM Layer Specification, ITU-T Rec. I.361, ITU Geneva, November
1995.
5. B-ISDN UserNetwork InterfacePhysical Layer Specification: General Characteristics, ITU-T Rec. I.432.1, ITU Geneva, August 1996.
6. B-ISDN Protocol Reference Model and Its Application, CCITT Rec. I.321, ITU
Geneva, April 1991.
7. B-ISDN ATM Adaptation Layer Specification: Type 1 AAL, ITU-T Rec. I.363.1,
ITU Geneva, August 1996.
8. B-ISDN ATM Adaptation Layer AAL. Specification, CCITT Rec. I.363, ITU
Geneva, 1991.
9. B-ISDN ATM Adaptation Layer Specification: Type 2 AAL, ITU I.363 para 3.
Geneva, March 1993.
10. Radia Perlman, Interconnections, 2nd edition, Addison-Wesley, Reading, MA,
2000.
11. B-ISDN ATM Adaptation Layer Specification: Type 43 AAL, ITU-T Rec. I.363.3,
ITU Geneva, August 1996.
12. David E. McDysan and Darren L. Spohn, ATM: Theory and Application, McGraw-Hill, New York, 1995.
REFERENCES
679
13. B-ISDN ATM Adaptation Layer Specification: Type 5 AAL, ITU-T Rec. I.363.5,
ITU Geneva, August 1996.
14. Support of the Broadband Connectionless Data Bearer Serice by the B-ISDN, ITU-T
Rec. I.364, ITU Geneva, November 1995.
15. The International Public Telecommunication Numbering Plan, ITU-T Rec. E.164,
ITU Geneva, May 1997.
16. B-ISDN General Network Aspects, ITU-T Rec. I.311, ITU Geneva, August 1996.
17. Digital Subscriber Signaling System No. 2 DSS2 . UserNetwork Interface UNI .
Layer 3 Specification for Basic Call r Connection Control, ITU-T Rec. Q.2931, ITU
Geneva, February 1995.
18. Interim Inter-Switch Signaling Protocol IISP . Specification, Version 1.0, ATM
Forum, Mt. View, CA, December 1994.
19. Functional Description of the B-ISDN User Part B-ISUP . of Signaling System No.
7, ITU-T Rec. Q.2761, ITU Geneva, February 1995.
20. Signaling System No. 7 B-ISDN User Part B-ISUP . Basic Call Procedures, ITU-T
Rec. Q.2764, ITU Geneva, February 1995.
21. B-ISDN Inter-Carrier Interface B-ICI . Specification, Version 2.0, ATM Forum, Mt.
View, CA, December 1995.
22. ATM UserNetwork Interface UNI . Signaling Specification, Version 4.0, ATM
Forum, Mt. View, CA, July 1996.
23. Traffic Control and Congestion Control in B-ISDN, ITU-T Rec. I.371, ITU Geneva,
August 1996.
24. B-ISDN ATM Layer Cell Transfer Performance, ITU-T Rec. I.356, October 1996.
25. Broadband Testing Technologies, an H-P seminar, Hewlett-Packard Company,
Burlington, MA, October 1993.
26. ATM Cell Mapping into Plesiochronous Digital Hierarchy PDH ., ITU-T Rec.
G.804, ITU Geneva, February 1998.
27. Cell Relay Serice Core Features, Bellcore Special Report SR-3330, Issue 2,
Bellcore, Red Bank, NJ, 1996.
28. B-ISDN Operation and Maintenance Principles and Functions, ITU-T Rec. I.610,
ITU Geneva, March 1993.
17
LAST-MILE DATA
DISTRIBUTION SYSTEMS
17.1
Outside plant is a term used to describe all the equipment involved in taking a
telephone signal from the local serving exchange local switch . and delivering
it to the subscriber. In a traditional sense, this equipment mostly encompassed wire-pair distribution systems. Outside plant represented as much as
one-third of the total investment in plant and equipment of telephone
companies. Historically and through the present, it is wire-pair systems that
served the last mile to the subscriber.
Twisted wire pair is an excellent transmission medium when employed in
some kind of controlled environment. In this last-mile application it transported a simple, band-limited analog signal that interfaced with a telephone
handset on the customer premises. On most of its lay from the local switch to
its termination in a telephone subset, it was encased in a multipair cable
often carrying many hundreds of such pairs. There was access to the cable
along its lay route in distribution boxes and at a pedestal outside the
customer location or at a small distribution frame in an office building.
In nearly all cases, the telephone company could not afford to pamper or
doctor the cable: Here it is, take it as you find it. We find that some pairs
did a better job than others; and as time went by, the cable tended to
deteriorate due to simple aging, splicing, and the effects of the environment
e.g., freezing, flooding, and drying out. Ref. 1..
We take these same pairs from a cable and put them in a laboratory, and
we can demonstrate the ability of carrying megabits of digital data. Still and
yet, it can easily be shown that bit rate on a wire pair varies with
682
Place that pair back in its cable sheath, bury it and leave it some years and it
just will not work as well as it did in the laboratory.
Now in this day and age of the Internet, we would like to deliver some
megabitsrsecond to the customer premise on that wire pair downstream..
However, because of their condition, some of the pairs force us to reduce the
bit rate to the 128-kbps range or even less. Of course, the longer the
subscriber line, the lower the bit rate that is achievable.
The category of system we describe here is the digital subscriber line DSL..
Early on we had ISDN BRI Chapter 13. which provided 64-kbps full-duplex
access to the serving exchange from a subscriber on one logical line.* Placing
the two available logical lines together in the BRI, 128 kbps was achievable
with only some constraints. Then HDSL high-speed digital subscriber line.
appeared, providing 784 kbps or a full DS1 rate 1.544 Mbps.. To achieve this
transmission rate requires two pair, each carrying 784 kbps in each direction.
The specified reach of HDSL was 12,000 ft 3700 m..
Up to this point we have described symmetrical operation. All this means is
that there is the same bit rate operating in each direction. Then asymmetrical
operation came along. This is where the bit rate in one direction is different
than in the other direction. Consider the Internet. Where wed like the high
bit rate is from the ISP internet service provider. toward the customer. The
difficult part of this connectivity is from the local serving switch to the
customer. The connection provided from the ISP to the local serving switch
often is at the DS1 rate 1.544 Mbps. or greater. The connectivity from the
customer to the ISP need not have a bit rate any greater than 56 kbps or even
28 kbps. Thus we have asymmetrical service: megabits downstream from
the switch to the customer. and kilobits of bit rate in the other direction
i.e., toward the ISP or upstream..
17.2
683
684
Figure 17.1. A sketch of an idealized spectra of three DSL waveforms. (From Paradyne,
Figure 6, page 14, Ref. 2.)
line coding technique that allows multiple bits per hertz of bandwidth, up to
9 bits per hertz. CAP further reduces bandwidth requirements on a wire pair
providing considerably greater range or bit rate. than a 2B1Q system
provides.
Figure 17.1 is an idealized sketch of the occupied spectrum on a wire-pair
subscriber line of three transmission techniques: 2B1Q HDSL, CAP T1
HDSL, and conventional T1 AMI.* This latter waveform is described in
Section 7.2.4.
Crosstalk is a dominant factor in the performance of many DSL systems.
Crosstalk is the coupling of signals from adjacent wire pairs in a cable bundle
into the signal bit stream of the individual desired pair under consideration.
Crosstalk can seriously degrade bit error rate.
In a fully configured, traditional DSL installation, data traffic bypasses the
local serving switch. The data traffic derived from the DSL network is
concentrated and handed off to an interswitch digital cross-connect DACS..
A better way of handling this data aggregate is to use a digital subscriber
line access multiplexer DSLAM.. This device groups data channels before
handoff. It uses packet and cell multiplexing technology in addition to
conventional T1DS1.rE1 introduced into the DSLAM, which results in a
more efficient use of bit stream flow resources.
In the local serving switch which houses the DSLrDSLAM equipment we
will expect to find transport system resources such as T1rE1, T3rE3, OC-1,
OC-3, STS-1, and STS-3 facilities being used to support the switch. These
*AMI stands for alternate mark inversion. This is the specialized waveform used in the
transmission on wire pair of T1 DS1. PCM.
685
resources interface the switch to produce interswitch trunks. They will also
interface the DSLAM facilities.
The local access network utilizes the local carrier interswitch network as a
foundation for services. Additional equipment may be required in order to
provide connectivity between multiple service providers and multiple service
users. This equipment may involve frame relay switches, ATM switches
andror routers and digital data cross-connects.
We consider the DSLAM the cornerstone of the DSL solution. Functionally, the DSLAM concentrates data traffic from multiple DSL loops onto the
backbone network for connection to the rest of the network. The DSLAM
provides backhaul services for packet, cell, andror circuit-based applications
through concentration of DSL lines onto T1rE1, T3rE3, or ATM outputs.
The DSLAM facility may be called upon to carry out routing functions such
as supporting dynamic IP address assignment using dynamic host control
protocol see Section 11.4.3..
Figure 17.2 shows a DSL system reference model for full service deployment. ADSL terminology is used throughout. On the left side of the drawing
are the network service providers NSPs.. These could represent frame relay
Figure 17.2. A fully provisioned DSL model. (After Paradyne Figure 32, page 35, Ref. 2.)
686
service provider, ISP internet service provider., ATM service provider, and
so forth. The edge device may be a switch.
ATU stands for ADSL transceiver unit. One is called an ATU-C and is
usually housed in the DSLAM facility which is located in the local service
switch complex with access to its MDF main distribution frame.. Of course
C stands for central office, a distinctly North American term for a telephone switching center. The ATU-C has a companion remote unit called an
ATU-R, which is located on the user premises. The DSL connects the two.
In the center of the drawing is the network access provider NAP.. The
NAP may belong to the local telephone company or LEC or to the CLEC or,
possibly, to an independent operator that provides a DSL service. Often the
DSLAM houses the ATU-C devices. It will have at least one port for N64
services to its associated local switch. Otherwise, it bypasses the local switch
accessing the appropriate networks for service such as a. a SONET network
or b. a PSTN PDH digital network.
There is another aspect to last-mile connectivity. This is a North
American phenomenon. Historically, the outside plant distribution system,
better defined as last-mile delivery, was a monopoly, held by the local
telephone company. That has now changed in the United States. The local
telephone company is officially known as a local exchange carrier or LEC. The
monopoly has been broken and now appearing on the scene is the CLEC or
competitive local exchange carrier. A CLEC may share the outside plant,
probably originally installed and maintained by the LEC; install their own
wire-pair distribution system, or use some other means to provide an electrical signal to the subscriber.
Cable Television CATV.* is a last-mile delivery system of entertainment,
principally television. It is a broadband system that is already in place. We
reiterate those important points: CATV is a broadband system, and it is
already in place in the United States and other nations. With some modifications, it has the potential to be an excellent broadband delivery system for
voice POTS., datarinternet, and conventional television entertainment. It
can provide 10-Mbps or greater data rates for downstream internet for many
users simultaneously as well as be a transporter of ATM, frame relay at
E1rDS1 rates. It can create VPNs and set up IP connectivity. It is much
more versatile than DSL and suffers few of its shortcomings. CATV is
discussed in Section 17.3.
A second very viable other means is to transport and distribute wideband signals via LMDS, which stands for Local Multipoint Distribution
System. This is a wireless or radio system that operates in the 28 to 31-GHz
band and provides better than 1 GHz of bandwidth. LMDS is described in
Section 17.4. It provides straight, head-on competition with CATV.
*CATV stands for community antenna television, the more formal name for cable television.
INTRODUCTION TO CATV
17.3
687
INTRODUCTION TO CATV
688
Figure 17.4. The radio-frequency spectrum as seen by a TV set, whether off-the-air or off the
cable. Note: The familiar channel numbers are in parentheses. Frequencies are in megahertz.
The CATV system designer deals with a broadband system based on coaxial
cable for signal transport. The frequency response of coaxial cable is nonlinear, more approaching the quadratic. On the other hand, from our perspective, fiber-optic cable presents a flat response to the user. Figure 17.5 shows a
typical frequency response curve of coaxial cable. For viable TV signal
distribution we would like as flat a response as possible. A hypothetical
frequency response curve for a section of fiber-optic cable is shown in Figure
17.6. Note that the curve is flat. We can flatten the frequency response
INTRODUCTION TO CATV
689
Figure 17.6. A length of hypothetical fiber-optic cable showing flat frequency response.
690
between 800 and 1000 MHz. This gives us a transmission medium nearly
1 GHz wide.
To distribute CATV TV signals to customer premises, we need to flatten
the medium with equalizers and present a signal of sufficient level to the TV
receiver input to achieve acceptable picture quality. The TV picture must
also have a signal-to-noise ratio SrN . of at least 40 dB, preferably ) 46 dB.
Now remember that we end up with a system with some number X of
wideband amplifiers in tandem. Each amplifier adds noise to the system. The
number X therefore must be limited or we will not achieve our SrN
objective. This puts a definite limit on the CATV coverage area of customer
premises.
17.3.2
INTRODUCTION TO CATV
691
Figure 17.7. CATV spectrum assigned for upstream and downstream operation. The frequency assignment is somewhat arbitrary but probably will be encountered in practice. The 5to 42-MHz segment for upstream operation is specified by DOCSIS. (See Section 17.3.3.)
Table 17.1 shows DOCSIS downstream operation is in 6-MHz segments from 88 MHz
upwards.
contained in one or two 6-MHz segments way up at the top of the band, in
what are called roll-off channels. This is where filter roll-off occurs. The
channel response will not support conventional TV, but will support downstream data. If more bandwidth is required, the CATV operator can assign
one or several of the top 6-MHz TV segments to provide additional downstream service. Here we have 40 MHz available upstream and 6, 12, and 18
MHz or more. for downstream datarvoice.
Curing the Ills of Bandwidth Scarcity. If we were to implement the CATV
plant as we describe, where the entire plant is served by one coaxial cable
configuration, we would never be able to serve the demand for Internet
service. This is so, leaving aside other desirable data services. Probably the
first shortage would show up on the downstream side. If we were to allow 5
Mbps per user for internet downstream, including guardband, each simultaneous user would take up about 1 TV channel i.e., 6 MHz. of bandwidth.
Either we cut back the bandwidth per user in periods of high demand, thus
cutting bit rate, or we may look to another method of signal distribution.
One method being adopted widely is to bring the serving node closer to
the customer. CATV users are grouped in units of 50 to 200. The group is
served by a node. The node takes the downstream frequency segment from
an FDM configuration on the fiber of some 1000 MHz in bandwidth say in
the band 7 to 8 GHzand translates the signals to the 54- to 750-MHz band.
Note that some additional bandwidth is used for guard band. A nearby nodes
downstream configuration is in the band 6 to 7 GHz, and so forth, for each
serving node. Note that the same fiber strand is used for each node. A
passive optical signal splitter delivers the downstream signal for grooming
and downconversion at each node.
The nodal processing for the upstream direction is shown in Figure 17.8.
Here the frequency band of 5 to 30 MHz is used for upstream traffic, a
25-MHz bandwidth. Three active groupings of 50 to 200 residences are shown
in the figure. In this direction we call the device residing in the node a
coax-to-fiber translator. Because of the richness of bandwidth availability on
692
Figure 17.8. Upstream concept breaking up a user community into groups of from 50 to 200
end-user stations. This figure relates to Figure 17.7, where frequency band assignments are
somewhat arbitrary. The upstream band will carry POTS, data, and internet carriers. The last
mile of operation will be on coaxial cable. Downstream internet, POTS, and data service are
provided on separate frequency segments as well. The downstream frequency assignment is
in 6-MHz segments from about 50 MHz upward to 750 MHz, and in some plants to 860 MHz.
Expect to find the data, internet, and POTS channels at the top of the band for downstream.
the fiber, only every other 25-MHz segment carries upstream traffic where
the other segments are guardbands. Of course these fiber strands derive
from the head-end via supertrunks.
For internet application, upstream operation will be the direction from
end-user to the ISP. In the case of POTS, operation will be symmetrical;
assume 64 kbps per voice channel. The CATV operator will probably also
offer data network connectivity, possibly IP, frame relay, or ATM at differing
bit rates. One common approach is to turn to DOCSIS Data-over-Cable
Service Interface Specifications . developed by Cable Labs and SCTE.
Modems designed to meet DOCSIS requirements are available from the
principal CATV equipment vendors such as GI Jerrold and Motorola.
17.3.3
Figure 17.9 shows the reference architecture for the data-over-cable specification. The following acronyms and abbreviations are defined to assist the
reader in understanding DOCSIS operation.
MCNS. Multimedia Cable Network System consortium..
HFC. Hybrid fiber-coax described above..
IP. Internet Protocolsee Section 11.4.
INTRODUCTION TO CATV
693
694
Two-way transmission.
A maximum opticalrelectrical spacing between the CMTS and the most
distant customer terminal of 100 miles, although typical maximum
separation may be 1015 miles 1624 km..
A maximum differential opticalrelectrical spacing between CMTS and
the closest and most distant modems of 100 miles 161 km., although
this would typically be limited to 15 miles 24 km..
17.3.3.1 RF Channel Assumptions. The Data-over-Cable system, configured with at least one set of defined physical-layer parameters e.g.,
modulation, forward error correction, symbol rate, etc.. from the range of
configuration settings described in that specification, must be capable of
operating with a 1500-byte packet where the packet loss rate will be less than
1% while forwarding at least 100 packets per second on cable networks
having characteristics defined in this section.
Transmission Downstream. The RF channel transmission characteristics of
the cable network in the downstream direction assumed for the purposes of
minimal operating capability are described in Table 17.1. This assumes
nominal analog video carrier level peak envelope power. in a 6-MHz
channel bandwidth. All conditions are present concurrently.
Transmission Upstream. The RF channel transmission characteristics of the
cable network in the upstream direction assumed for the purposes of minimal
operating capability are described in Table 17.2. All conditions are present
concurrently.
Transmission Levels. The nominal power level of the downstream CMTS
64-QAM* signals. within a 6-MHz channel is targeted to be in the range of
y10 dBc to y6 dBc relative to analog video carrier level. The nominal
power level of the upstream CM signals. will be as low as possible to achieve
*Note that 64-QAM will give us theoretically 6 bitsrHz of bit packing 2 6 s 64..
INTRODUCTION TO CATV
695
696
the required margin above noise and interference. Uniform power loading
per unit bandwidth is commonly followed in setting upstream signal levels,
with specific levels established by the cable network operator to achieve the
required carrier-to-noise and carrier-to-interference ratios.
17.3.3.2 Communication Protocols. The CM and CMTS operate as forwarding agents and also as end-systems hosts.. The protocol stacks used in
these modes differ as described below.
The principal function of the cable modem system is to transmit Internet
Protocol IP. packets transparently between the head-end and the subscriber
location. Several management functions also ride on IP, so that the protocol
stack on the cable network is as shown in Figure 17.10. These management
functions include, for example, supporting spectrum management functions
and the downloading of software.
INTRODUCTION TO CATV
697
Figure 17.10. The protocol stack on the DOCSIS RF interface. (From Figure 3-1, page 11,
DOCSIS Specification, Ref. 3.)
The CMs and CMTSs will operate as IP and LLC hosts in terms of IEEE
Standard 802 for communication over the cable network. The protocol stack
at the CM and CMTS RF interfaces is shown in Figure 17.10.
The CM and CMTS function as IP hosts. As such, the CM and CMTS
support IP and ARP over DIX link-layer framing. The CM and CMTS may
also support IP and ARP over SNAP framing.
CM and CMTS as Hosts. The CM and CMTS also function as LLC hosts. As
such, the CM and CMTS respond appropriately to TEST and XID requests
per ISO 8802-2 LLC..
Data Forwarding Through CM and CMTS
General. Data forwarding through the CMTS may be transparent bridging, or may employ network-layer forwarding routing, IP switching. as shown
in Figure 17.11.
698
Figure 17.11. Data forwarding through CM and CMTS. (From Figure 3-2, page 12, DOCSIS
Specification, Ref. 3.)
In Figure 17.13, the LLC sublayer and link security sublayers of the upstream
and downstream channels on the cable network terminate at the MAC
Forwarder.
INTRODUCTION TO CATV
699
Figure 17.13. MAC Forwarder. (From Figure 3-4, page 15, DOCSIS Specification, Ref. 3.)
The MSAP interface user may be the NSI-RFI Forwarding process or the
CMTSs host protocol stack.
Delivery of frames may be based on data-link-layer bridging. semantics,
network-layer routing. semantics, or some combination thereof. Higher-layer
semantics may also be employed e.g., filters on UDP port numbers.. The
CMTS should provide IP connectivity between hosts attached to cable
modems, and it must do so in a way that meets the expectations of Ethernetattached customer equipment. For example, the CMTS must either forward
ARP packets or must facilitate a proxy ARP service. The CMTS MAC
Forwarder may provide service for non-IP protocols.
Note that there is no requirement that all upstream and downstream
channels be aggregated under one MSAP as shown above. The vendor could
just as well choose to implement multiple MSAPs, each with a single
upstream and downstream channel.
700
Network Layer. As stated at the outset, the purpose of the DOCSIS system
is to transport IP traffic transparently through the system. The network layer
protocol is the Internet Protocol IP. version 4, as defined in RFC-791, and
migrating to IP version 6. The DOCSIS specification imposes no requirements for reassembly of IP packets.
Above the Network Layer. Users of DOCSIS will be able to use the transparent IP capability as a bearer of higher-layer services. Use of these services
will be transparent to the CM.
In addition to the transport of user data, there are several network
management capabilities that depend upon the network layer. These include:
17.3.3.3 Logical Link Control. The LLC sublayer is provided in accordance with Chapter 9 IEEE Std. 802.2.. Address resolution is used as
defined in Chapter 11 and RFC-826. The MAC-to-LLC service definition is
specified in ISOrIEC-10039.
17.3.3.4 Link-Layer Security Sublayer. Link-layer security is provided in
accordance with specifications MCNS2 DOCSIS. and MCN8.
17.3.3.5 MAC Sublayer. The MAC sublayer defines a single transmitter
for each downstream channelthe CMTS cable modem termination system.. The CMs cable modems. listen to all frames transmitted on the
downstream channel upon which they are registered and accept those where
the destinations match the CM itself or CPEs reached via the CMCI cable
modem-to-customer interface . port. CMs can communicate with other CMs
only through the CMTS. See Figure 17.9..
INTRODUCTION TO CATV
701
702
INTRODUCTION TO CATV
703
704
TABLE 17.3
Ir
rQ Mapping
QAM Mode
QPSK
I1 Q 1
16-QAM
I1 Q 1 I 0 Q 0
INTRODUCTION TO CATV
705
Figure 17.15. 16-QAM Gray coded symbol mapping. (From Figure 4-3, page 23, DOCSIS
Specification, Ref. 3.)
Figure 17.16. 16-QAM differential-coded symbol mapping. (From Figure 4-3, page 23,
DOCSIS Specification, Ref. 3.)
706
TABLE 17.4
Current Input
Bits I1 Q 1
Quadrant Phase
Change
00
MSBs of Previously
Transmitted Symbol
11
11
00
01
01
00
00
00
00
10
10
01
90
11
01
01
90
01
00
01
90
00
10
01
90
10
11
11
180
11
00
11
180
01
10
11
180
00
11
11
180
10
01
10
270
11
10
10
270
01
11
10
270
00
01
10
270
10
00
Spectral Shaping. The upstream PMD layer shall support 25% Nyquist
square root cosine shaping. The occupied spectrum shall not exceed the
channel widths shown in Table 17.5. Note that the DOCSIS specification
defines the channel width as the y30 dB bandwidth. .
Upstream Frequency Agility and Range. The upstream PMD sublayer supports operation over the frequency range of 542 MHz edge to edge. Offset
frequency resolution should be supported with a range of "32 kHz increment s 1 Hz; implement within "10 Hz..
TABLE 17.5
160
200
320
400
640
800
1280
1600
2560
3200
INTRODUCTION TO CATV
707
Spectrum Format. The upstream modulator must provide operation with the
format s t . s I 9t .* cos t . y Q t .* sin t ., where t denotes time and
denotes angular frequency.
FEC Encode
FEC Encode Modes. The upstream modulator must be able to provide the
following selections: ReadSolomon codes over GF256. with T s 1 to 10 or
no FEC coding.
The following ReedSolomon generator polynomial must be supported:
g x . s x q 0 . x q 1 . x q 2Ty1 .
where the primitive element alpha is 0 = 02 hex.
The following ReedSolomon primitive polynomial must be supported:
p x . s x8 q x 4 q x 3 q x 2 q 1
The upstream modulator must provide codewords from a minimum size of 18
bytes 16 information bytes w k x plus two parity bytes for T s 1 error correction. to a maximum size of 255 bytes k-bytes plus parity-bytes .. The uncoded
word size can have a minimum of one byte.
In Shortened Last Codeword mode, the CM must provide the last codeword of a burst shortened from the assigned length of k data bytes per
codeword as described in Section 4.2.10.1.2 of the reference document.
The value of T must be configured in response to the Upstream Channel
Descriptor from the CMTS.
FEC Bit-to-Symbol Ordering. The input to the ReedSolomon Encoder is
logically a serial bit stream from the MAC layer of the CM, and the first bit
of the stream is mapped into the MSB of the first ReedSolomon symbol
into the encoder. The MSB of the first symbol out of the encoder is mapped
into the first bit of the serial bit stream fed to the Scrambler.
Note: The MAC byte-to-serial upstream convention calls for the byte LSB
to be mapped into the first bit of the serial bit stream per Section 6.2.1.3 of
the reference document.
Scrambler. The upstream modulator will implement a scrambler shown in
Figure 17.17. where the 15-bit seed value should be arbitrarily programmable.
At the beginning of each burst, the register is cleared and the seed value is
loaded. The seed value should be used to calculate the scrambler bit that is
combined in an XOR with the first bit to data of each burst which is the
MSB of the first symbol following the last symbol of the preamble..
708
Figure 17.17. Scrambler block diagram. (From Figure 4-4, page 26, DOCSIS Specification,
Ref. 3.)
Figure 17.18. Functional block diagram showing signal processing sequence. (From Figure
4-8, page 35, DOCSIS Specification, Ref. 3.)
INTRODUCTION TO CATV
709
Configuration Settings
Modulation
QPSK, 16 QAM
Diff Enc
OnrOff
Preamble length
0 to 1022
Scrambler seed
15 bits
0 to 255
Guard time
5 to 255 symbols
Fixed, shortened
Scrambler onroff
On r Off
A burst length of 0 mini-slots in the channel profile means that the burst length is variable on that
channel for that burst type. The burst length, while not fixed, is granted explicitly by the CMTS to the
CM in the MAP.
Source: Table 4-4, page 27, Ref. 3.
710
For symbol rate, offset frequency, and ranging offset, the CM transmits
consecutive bursts as long as the CMTS allocates at least 96 symbols in
between the last symbol center of one burst and the first symbol center of the
following burst. The maximum reconfiguration time of 96 symbols should
compensate for the rampdown time of one burst and the rampup time of the
next burst as well as the overall transmitter delay time including the pipeline
delay and optional pre-equalizer delay. For modulation-type changes, the
CM transmits consecutive bursts as long as the CMTS allocates at least 96
symbols in between the last symbol center of one burst and the first symbol
center of the following burst. Output power, symbol rate, offset frequency,
channel frequency, and ranging offset should not be changed until the CM is
provided sufficient time between bursts by the CMTS. Transmitted output
power, symbol rate, offset frequency, channel frequency, and ranging offset
are not changed while more than y30 dB of any symbols energy of the
previous burst remains to be transmitted, or more than y30 dB of any
symbols energy of the next burst has been transmitted, excluding the effect
of the transmit equalizer if present in the CM.. Negative ranging offset
adjustments will cause the 96 symbol guard to be violated. The CMTS assures
INTRODUCTION TO CATV
711
that this does not happen by allowing extra guard time between bursts that is
at least equal to the amount of negative ranging.
If the channel frequency is to be changed, then the CM changes between
bursts as long as the CMTS allocates at least 96 symbols plus 100 ms between
the last symbol center of one burst and the first symbol of the following burst.
The output transmit power is maintained constant within a TDMA burst to
within less than 0.1 dB excluding the amount theoretically present due to
pulse shaping, and amplitude modulation in the case of 16-QAM..
Burst Timing Convention. Figure 17.19 illustrates the nominal burst timing.
Figure 17.20 shows worst-case burst timing. In this example, burst N
arrives 1.5 symbols late, and burst N q 1 arrives 1.5 symbols early, but
separation of 5 symbols is maintained; 8-symbol guardband is shown.
At a symbol rate of Rs, symbols occur at a rate of one each Ts s 1rRs
seconds. Rampup and rampdown are the spread of a symbol in the time
domain beyond Ts duration owing to the symbol-shaping filter. If only one
symbol were transmitted, its duration would be longer than Ts due to the
shaping filter impulse response being longer than Ts. The spread of the first
and last symbols of a burst transmission effectively extends the duration of
the burst to longer than N = Ts, where N is the number of symbols in the
burst.
Frame Structure. Figure 17.21 shows two examples of frame structure: one
where the packet length equals the number of information bytes in a
codeword, and another where the packet length is longer than the number of
information bytes in one codeword, but less than two codewords. Example 1
illustrates the fixed codeword-length mode, and Example 2 illustrates the
shortened last codeword mode. These modes are defined below.
Codeword Length. The CM operates in a fixed-length codeword mode or
with the shortened codeword capability enabled. The minimum number of
information bytes in a codeword, for fixed or shortened mode, is 16 bytes.
Shortened codeword capability is available with k G 16 bytes, where k is the
number of information bytes in a codeword. With k - 16, shortened codeword capability is not available.
Upstream Demodulator Input Power Requirements. The maximum total
input power to the upstream demodulator should not exceed 35 dBmV in the
5- to 42-MHz frequency range of operation. The intended receive power in
each carrier should be within the values shown in Table 17.8. The demodulator operates within its defined performance specifications with received
bursts within "6 dB of the nominal commanded received power.
Upstream Electrical Output of the CM. The CM operates with an RF output
modulated signal with the characteristics given in Table 17.9.
712
INTRODUCTION TO CATV
713
Figure 17.20. Worst-case burst timing. (From Figure 4-6, page 30, DOCSIS Specification,
Ref. 3.)
Figure 17.21. Example frames structure with flexible burst length mode. (From Figure 4-7,
page 34, DOCSIS Specification, Ref. 3.)
714
160
y16 to q14
320
y13 to q17
640
y10 to q20
1280
y7 to q23
2560
y4 to q26
TABLE 17.9
Parameter
Value
Frequency
Modulation type
Bandwidth
Output impedance
75 ohms
) 6 dB (542 MHz)
Connector
INTRODUCTION TO CATV
715
716
TABLE 17.11
CM BER Performance
Adjacent
Channel
Item
BER
Image Reject
64-QAM
Implementation loss
such that CM achieves
a post-FEC BER better
than or equal to 10 y 8
when E b rN0 s 23.5
dB or better.
256-QAM
Implementation loss of
CM is such that CM
achieves a post-FEC
BER of equal or better
than 10 y 8 with an
E s rN0 of 30 dB or
more.
17.4
717
Bernard Bernie. Bossard whose company became Cellular Vision USA. Its
beta tests were carried out in a test bed in Brooklyn, New York in the period
1989 to 1995. The system carried 49 TV channels in an FDM-type configuration where the RF modulation was FM. By digitizing and then applying
MPEG compression techniques, it was found that the number of operational
TV channels was tripled over the original system for a given RF bandwidth
Ref. 4..
The operational frequency band was the 28- to 30-GHz band. In this band,
LMDS competes for usage with conventional LOS microwave and communication satellite feeder uplinks. The U.S. FCC broke up the band so all parties
would be satisfied. Keep in mind that LMDS was really a wireless CATV
technique. With implementations being fielded today it serves as a two-way
configuration. Here, of course, downstream means from an LMDS hub to
end-user, and upstream operation is from the end-user to the LMDS hub.
The specific LMDS frequency bands in the United States are 27.5 to 28.35
GHz 850-MHz bandwidth ., 29.1 to 29.25 GHz 150-MHz bandwidth ., and
31.075 to 31.225 GHz 150-MHz bandwidth .. The range from an LMDS hub
to the furthermost end-user depends on rainfall analysis. It can vary from
1 mile 1.6 km. to 5 miles 8.0 km. Refs. 9 and 10..
The LMDS concept is shown in Figure 17.22. In the figure a hub is a
facility that houses a radio wireless . transmitter and receivers. which
provide connectivity with end-users. The hub connects through a fiber-optic
cable or LOS microwave radiolink wireless . with a central processing and
routing unit. This unit may be colocated with a local switching center
providing interface with the PSTN.
The antenna at each hub will normally be omnidirectional with q10- to
q15-dBi gain, whereas the antenna at an end-user location will be directional with a q35-dBi gain. Cost and performance dictate that the RF front
end be colocated with the antenna. The antenna unit feeds and accepts IF
from an inside unit which may be likened to a CATV set-top box. The inside
unit accepts the IF signal from the antenna and provides, in the transmit
direction, an IF signal to the antenna unit.
LMDS provides different levels of services. A residence accepts a more
modest service capability, such as 1 Mbps of downstream internet, symmetric
upstream and downstream data in increments of 64 kbps, and from one to
eight POTS plain old telephone service. lines and equivalent CATV
downstream TV service using MPEG-2 frame video. Depending on requirements, a business may require one or more DS1 or E1 symmetric line
equivalents, several 1-Mbps downstream internet connections, or one 5-Mbps
connectivity to an on-premises server as well as several frame relay connectivities andror packet service based on TCPrIP. They may not need or want
the entertainment TV. Many of the configurations in North America have
turned to using a version of DOCSIS Section 17.3. providing POTS, TV,
data, and, of course, internet.
As we see from this discussion, the LMDS frequency band is split into
three segments. We could make the assignment highly asymmetrical with
718
Figure 17.22. Sketch illustrating the LMDS concept. Both residential and business services
are shown.
1000 MHz assigned for downstream and 150 MHz for upstream. For efficient
operation, frequency reuse is mandatory.
17.4.1
Frequency Reuse
The original LMDS attempted frequency reuse, with some success. It depended on free space loss, polarization isolation, and some frequency offset
of television radio carriers. Although the value of polarization isolation was
719
Figure 17.23. Cell B hub transmitter antenna faces the back of closest cell A end-user
antenna. Cell radius is 5 km. Gain at the back of receiving antenna is y10 dBi. (Note:
y10 dBi based on ITU-R model.)
.
Receive antenna discrimination back of antenna
y 10
dB
Total path losses
y175.9 dB
Transmit power is 1 watt for a 10-Mbps bitstream; transmit antenna gain
is q14 dBi, thus the EIRP is q14 dBW.
The isotropic receive level IRL. is the difference between two values
i.e., the EIRP and the FSL.: y161.9 dBW.
Add the receive antenna gain i.e., y10 dBi.. This is the RSL receive
signal level.: y171.9 dBW.
The receiver has a 6-dB noise figure. Its thermal noise threshold is
y198 dBWrHz N0 ..
*For a tutorial on the design of wireless radio. systems, consult Roger L. Freeman, Radio
System Design for Telecommunications, 2nd edition, John Wiley, New York, 1997 Ref. 5..
720
Figure 17.24. Interference level into receiver in cell A where cell Bs transmit antenna main
beam is oriented such that it directly enters cell A receive antenna main beam. Distance is
15 km.
TABLE 17.12
721
Calculation Table
Parameter
Wanted Signal
)a
Interference Signal
q14 dBW
y14 dBW
y135.97 dB
y145.51
y123.97 dBW
y131.5 dBW
Polarization loss
0.0 dB
y30 dB
Sum
y123.97 dBW
y161.5 dBW
Antenna gain
q35 dBi
q35 dBi
RSL
y88.97 dBW
y126.5 dBW
(1) E b , (2) I0
y158.97 dBWrbit
y196.5 dBWrHz
N0
y198 dBW
y198 dBW
39.03 dB
35.21 dB
Required E b r( N0 q I0 ), 16
QAM, BER s 1 = 10 y 8
Margin
16 dB
23.03 dB
Note that the EIRP is the sum in dB units of the transmit power and the antenna gain. Transmission
line losses have been neglected.
Other designers take a different position and divide the 800-MHz downstream band into four 200-MHz bands. One well call frequency family A, the
next one well call frequency family B, the next C, and the last D. They will
occupy a single group of adjacent cells with the same nomenclature i.e., A,
B, C, and D.. This concept is illustrated in Figure 17.25.
For improved isolation, 90-degree sectorized antennas are used which
would appear more or less as in Figure 17.26. Here we would have a
90-degree pattern group on the line between cells D and C.
Propagation is a most challenging problem in LMDS design. In the models
we used above, it is assumed that the receive antenna is oriented correctly
toward the transmit antenna, and they are in line-of-sight of each other. This
means that the two antennas are visible one-to-the-other, and there is
sufficient clearance of the ray beam to obstacles in its path. This feature
alone is difficult to achieve for all receive antennas being served by this nodal
transmit antenna. Verdure e.g., tree leaves. can block the signal; there will
be diffraction paths and signal reflections. These latter conditions can cause
multipath conditions and will disperse the signal.
Rainfall is yet another matter. In areas of heavy downpour rain such as in
Florida and Louisiana, path lengths can be severely limited, to about some
2-km maximum. In other areas of the country which do not consistently have
such conditions, maximum path lengths can be lengthened to up to 5 or 6 km
3.1 or 3.7 mi.., typically Los Angeles and Phoenix. When designing an
LMDS system, it is mandatory that a rainfall study be carried out. Methodology for these studies can be found in Radio System Design for Telecommunications, 2nd edition Ref. 5..
722
Figure 17.25. Splitting the downstream 800-MHz bandwidth into four 200-MHz bandwidths
for improved frequency reuse and to minimize co-channel interference. A 90-degree sectorized pattern is shown. Four transmitters, each with its own 90-degree sector antenna, sit at
the center of the pattern. (From Figure 5, page 4, H-P Application Note 1296, Ref. 7.)
Figure 17.26. A large grouping of frequency reuse cells using a family of four center
frequencies for downstream: A, B, C, and D. This is identical to a cellular radio pattern where
N s 4. For our model, the cells have a 5-km radius.
723
q14 dBW
y142 dB 30 GHz, 10 km.
q35 dBi
y93 dBW
724
1-watt HPA high power amplifier. now; increase this to 2 watts, and our
margin goes up 3 dB. A 2-watt amplifier costs something in the order of three
times the cost of a 1-watt amplifier. We can see that the price tends to go up
exponentially. There is a point where increasing amplifier power is not
cost-effective any more. If we were to cut the radius of the cell in half, we
would increase the margin about 6 dB.
As the cost of the system increases, the cost per CPE customer premise
equipment. goes up. One goal may be to limit the cost of CPE to $300 or
thereabouts. So every system design change has implications on CPE cost.
Suppose we increase antenna height and HPA power. This we find adds two
thousand more possible customers to the system. How does this system
change affect the cost per CPE?
Business customers most assuredly will be handled differently than residential customers. They will demand more telephone service, more data
service, and more internet ports. The $300 goal must be discarded. Other
cost goals should be established depending on the level of business.
For larger businesses say on the order of ) 200 FX telephone lines, ten
internet ports, a 45-Mbps frame relay port, and two 10-Mbps IP
portsthought must be given to the use of another service type such as LOS
microwave at 23 GHzfor example, with a link to the hub. This separate
radiolink would serve all the datartelephony requirements of the business in
question. It may also be shared with other larger businesses in the same
building, and other radio carriers can be added as required.
17.5
17.5.1
These systems originally operated in single, comparatively long-range pointto-point connections. Such simple architectures still predominate; however,
point-to-multipoint products are now appearing in the marketplace. ISPs
providing wireless last-mile connections have formed the largest market for
such systems. Some systems provide as much as 100-Mbps connectivities, and
many systems provide up to 30 Mbps. There is essentially no standardization.
Compliance with IEEE 802.11 wireless LAN, Section 10.1.5. is not even
contemplated by equipment manufacturers of these systems.
The 5.8-GHz ISM band is widely used for wireless bridge applications.
FCC Part 18.301 stipulates that operation shall be in the band 5.725 to 5.875
GHz, providing a 150-MHz bandwidth. Even with this wide bandwidth,
frequency reuse sectorized antennas is commonplace.
Point-to-multipoint systems are beginning to appear on scene using some
of the concepts discussed in Section 17.4. There are at least two manufacturers of multipoint-to-multipoint systems. The principal market addressed is
that of ISP connectivities. No base stations are used, and each node is a
REFERENCES
725
REFERENCES
1. Roger L. Freeman, Telecommunications Transmission Handbook, John Wiley &
Sons, New York, 1998.
2. The DSL Sourcebook, Paradyne Corporation, Lago, FL, 1997.
3. Data-Oer-Cable Serice Interface Specification, Revision 1, Radio Frequency
Interface Specification, SP-RFI-980202, SCTE, Exton, PA, February 1998.
4. Various private communications between Bernard Bossard and Roger Freeman
dealing with early design issues of LMDS as well as formulation of FCC Position
Papers for Cellular Vision New York and USA, February 1988 through December
1995.
5. Roger L. Freeman, Radio System Design for Telecommunications, 2nd edition,
John Wiley, New York, 1997.
6. Roger L. Freeman, Fundamentals of Telecommunications, John Wiley & Sons,
New York, 1999.
7. LMDSThe Wireless Interactie Broadband Access, HP Application Note 1296,
Hewlett-Packard Co., Englewood, CO, 1997.
8. Wireless Integration, Buyers Guide, Pennwell, Nashua, NH, 2000.
9. Peter B. Papazian et al., Study of the Local Multipoint Distribution Serice Radio
Channel, IEEE Transactions on Broadcasting, Vol. 43, No. 2, IEEE, New York,
June 1997.
10. Gene Heftman, LMDS Set to Challenge for Last-Mile Supremacy, Microwaes
and RF, April 1999.
*Telephone number portability can be extended to an entire area code, statewide, countrywide,
and even worldwide. It can take on this connotation.
18
NETWORK MANAGEMENT
FOR ENTERPRISE NETWORKS
18.1
18.2
728
cations. The underlying network will direct switch . and transport voice, data,
and image traffic. Each will have a traffic profile notably differing from the
other. Nevertheless, they should be managed as an entity. It is more cost
effective to treat the whole than to treat the parts.
There is a tendency in the enterprise scene to separate voice telephony
calling it telecommunications. and data communications. This is unfortunate
and a major error on the part of management. Perhaps that is why network
management seems to often operate on two separate planes. One is data and
very sophisticated, and the other is voice, which may have no management
facilities at all. This section will treat network management as a whole
consisting of its multimedia parts: voice, image, and data, which includes
facsimile, telemetry, and CADrCAM.
18.3
Fault management
Configuration management
Performance management
Security management
Accounting management
18.3.1
Fault Management
This is a facility that provides information on the status of the network and
subnetworks. The information on the status should not only display faults
i.e., failures . and their location, but should also provide information on
deteriorated performance. One cause of deteriorated performance is congestion. Thus, ideally, we would like to isolate the cause of the problem.
Fault management also includes the means to bypass troubled sections of
a networkthat is, the means to patch in new equipment for deteriorated or
failed equipment.
The complexity of modern telecommunication networks is such that as
many network management tasks as possible should be automated. All
displays, readouts, and hard copy records should be referenced to a network
time base down to 0.1 s. This helps in correlating events, an important
troubleshooting tool.
18.3.2
Configuration Management
729
collects data from, and provides data to the network for the purpose of
preparing for, initializing, starting, and providing for the operation and
termination of services. Configuration management deals with equipment
and services, subnetworks, networks, and interfaces. Its functions are closely
tied to fault management, as we have defined it previously.
18.3.3
Performance Management
Performance management is responsible for monitoring network performance to ensure that it is meeting specified performance. Some literature
references Ref. 1. add growth management. They then state that the
objective of performance and growth management is to ensure that sufficient
capacity exists to support end-user communication requirements.
Of course, there is a fine line defining network capacity. If too much
capacity exists, there will probably be few user complaints, but there is excess
capacity. Excess capacity implies wasted resources, thus wasted money.
Excess capacity, of course, can accommodate short-term growth. Therefore
performancergrowth management provides vital information on network
utilization. Such data provide the groundwork for future planning.
18.3.4
Security Management
Security management controls access to and protects both the network and
the network management subsystem against intentional or accidental abuse,
unauthorized access, and communication loss. It involves link encryption,
changes in encryption keys, user authentication, passwords, and unauthorized
usage of telecommunication resources.
18.3.5
Accounting Management
730
731
figure means that the network will be down i.e., out of operation. 0.1% of
the time or 0.001 = 8760 hours per year or 8.76 hours per year. This value
may be acceptable to a network operator, but for many it is unacceptable.
Suppose we require an availability of 99.999%. In this case the network will
be down 0.001% of the time or 0.0001. Multiply this value by 8760 hours, the
number of hours in a year, and it will be out of service 0.0876 hoursryear or
5.256 minutesryear. To achieve such an excellent availability will be expensive. No way can a fault be recognized, isolated, and repaired in 5 minutes if
we work on yearly increments. To achieve such an availability value, all
circuits must be redundant, all signal paths must also be redundant, and
redundant no-break power would be a requirement.
A well-designed network management system can notably reduce MTTR,
thus improving the availability value. The system can do this in two ways:
1. Warn of deterioration
2. Identify exact location of a fault down to the card level
Telephone companies use two values for MTTR; 2 hours when a fault occurs
in a facility with a craftsperson on duty e.g., at a switch. and 4 hours when a
fault occurs at a remote device such as at a fiber-optic repeater or at a
microwave relay site Ref. 2.. The U.S. Navy often uses 0.3 hours because of
the proximity of servicing personnel and the availability of spare parts.
It should be noted that much of the modern equipment is either equipped
with BITE built-in test equipment. or carries a software function to isolate
and report faults. The BITE information, which is commonly go no-go,
can usually be remoted to a network management facility.
Another approach, which is described later, is the use of software, such as
SNMP simple network management protocol., which carries out
a queryanswer regime automatically regarding equipment status and
performance.
An ideal network management system will advise the operator of one or
more events,* and will reveal where in the network they occurred, as well as
provide handy troubleshooting data. This should include the ability to pinpoint a fault down to the circuit board level. Ideally, the network management system should, in most cases, warn the operator in advance of impending faultrfaults. This is a boon to improving network availability and its
survivability during disaster. In the case of the latter, the network data
reporting system can quickly identify circuits that are still up and functional
and those that are down.
*I define an eent as something out of the ordinary that occurred. In the telecommunication
management arena an event might be a line dropout, switchover to backup power, loss of frame
alignment, and so on.
732
18.5.1
Troubleshooting
Observing symptoms
Developing a hypothesis
Testing the hypothesis
Forming conclusions
733
734
implemented, then congestion may not be the problem. Removing the frame
relay from the system and carrying out a bit error rate test BERT. over some
period of time would prove or disprove the noise problem.
A network analyzer is certainly an excellent tool in assisting in the
localization of faults. Some analyzers have preprogrammed tests which can
save the troubleshooter time and effort. Many networks today have some sort
of network monitoring equipment incorporated. This equipment may be used
in lieu of, or in conjunction with, network analyzers. Again we stress the
importance of separating cause and effects. Many times network analyzers or
network management monitors and testers will only show effects. The root
cause may not show at all and must be inferred, or separate tests must be
carried out to pinpoint the cause.
We might digress here to talk about what is often called in Spanish
tonterias. This refers to silly things. Such tonterias are often brought about
by careless installation or careless follow-up repair. Coaxial cable connectors
are some of my favorites. Look for intermittents and cold solder joints. A
good but not necessarily foolproof. tool is a time-domain reflectometer
TDR.. It can spot where a break in a conductor is down to a few feet or less.
It can do the same for an intermittent, when in the fault state. In fact,
intermittents can prove to be a nightmare to locate. An electrically noisy
environment can also be very troublesome.
Forming Conclusions. A conclusion or conclusions are drawn. As we say,
the proof of the pudding is in the eating. The best proof that we were right
in our conclusion is to fix the purported fault. Does it disappear? If so, our
job is done, and the network is returned to its normal baseline . operation.
What conclusions can we draw from this exercise? There are two basic
ingredients to network troubleshooting: 1. expertise built on experience of
the troubleshooter and 2. the availability of basic test equipment. Troubleshooting time can be reduced degraded operation or out-of-service time
reduction. by having on-line network management equipment. With ideal
network management systems, this time can be cut to nearly zero.
18.6
735
Figure 18.1. A typical multilevel network that employs a network management system. Note
the multiple convergences.
Modern E1 and DS1 digital systems are provided with a means of operational monitoring of performance. The monitoring is done in quasi-real time
and while operational i.e., in-traffic ..
736
737
Figure 18.2. E1 multiframe, CRC-4 structure, Notes: E s CRC-4 error indication bits. S a 4 to
S a 8 s space bits. May be used for maintenance (network management) data link. C 1 to
C 4 s cyclic redundancy check-4 (CRC-4) bits. A s remote alarm indication. (From Table
4brG.704, page 81, CCITT Rec. G.704, Ref. 5.)
At the receive end, the CRC remainder is recalculated for each SMF, and
the result is compared with the CRC-4 bits received in the next SMF. If they
differ, then the checked SMF is in error. What this is telling us is that a block
of 2048 bits had one or more errors. One thousand CRC-4 block error checks
are made every second. It should be noted that this in-service error detection
scheme does not indicate BER unless one assumes a certain error distribution random or burst errors. to predict the average errors per block. Rather
it provides a block error measurement.
This is very useful for estimating percentage of errored seconds %ES.,
which is usually considered the best indication of quality for data transmissionitself a block or frame transmission process. CRC-4 error checking is
fairly reliable, with the ability of detecting 94% of errored blocks even under
poor BER conditions see Ref. 6..
Another powerful feature of E1 channel 0 when equipped. is the provision of local indication of alarms and errors detected at the far end. When an
errored SMF is detected at the far end, one of the E bits see Figure 18.2. is
changed from a 1 to a 0 in the return path multiframe TS0.. The local end,
therefore, has exactly the same block error information as the far-end CRC-4
checker. Counting E-bit changes is equivalent to counting CRC-4 block
errors. Thus the local end can monitor the performance of both the go and
return paths. This can be carried out by the network equipment itself, or by a
test set such as the HP 37722A monitoring the E1 2.048-Mbps data bit
738
Figure 18.3. (a) Loopback of a DS0 channel with BERT test in place (intrusive or on a spare
DS0). (b) Loopback of 8-kbps data channel derived from ESF on DS1 or from channel 0 of E1
(nonintrusive testing).
stream. In the same way, the A bits return alarm signals for loss of frame or
loss of signal from the remote end.
Loopback testing is a fine old workhorse in our toolbox of digital data
troubleshooting aids. There are two approaches for DS1 T1. and E1 systems: intrusive and nonintrusive. Intrusive, of course, means that we interrupt traffic by taking one DS0 or E0 channel out of service, or the entire
aggregate. We replace the channel with a pseudorandom binary sequence
PRBS. or other sequence specifically designed to stress the system. Commonly we use conventional bit error rate test BERT. techniques when
looping back. The concept of loopback is illustrated in Figure 18.3. ESF and
Channel 0 data channel testing is nonintrusive. It does not interfere with
customer traffic. Trouble can also be isolated, whether in the go or
return channel of the loopback. Both intrusive and nonintrusive testing is
commonly automated in the network management suite.
Many frame relay equipment also have forms of in-service monitoring as
well as a system of fault alarms. In fact, most complex telecommunication
equipment has built-in monitoring and test features. The problem often is
that these features are proprietary, whereas our discussion of DS1rE1
systems reveals that they have been standardized by ITU-T and Telcordia
recommendations and publications. This is probably the stickiest problem
facing network management systemsthat is, handling, centralizing, and
controlling network management features in a multivendor environment.
739
740
The most mature and most implemented is the Simple Network Management
Protocol SNMP.. Certain weak points arose in the protocol, and a version
called SNMPv.2 has been developed and fielded.
The Common Management Information Protocol CMIP. has been developed for the OSI environment. It is more versatile but requires about five
times the memory of SNMP.
18.7.2
An Overview of SNMP
Figure 18.4 shows the classic clientserver model. The client runs at the
managing system. It makes requests and is typically called the network
management system NMS. or network operations center NOC.. The server is
in the managed system. It executes requests and is called the agent.
Structure of Management Information (SMI). This defines the general framework within which an MIB can be defined. In other words, SMI is the set of
rules which define MIB objects, including generic types used to describe
management information. The SNMP SMI uses a subset of Abstract Syntax
Notation One ASN.1. Ref. 7. specification language that the ISO International Standards Organization. developed for communications above the OSI
presentation layer. Layer 7, for example, may use ASN.1 standards and
ITU-T Recs. X.400 and X.500. It was designed this way so that SNMP could
Figure 18.4. SNMP basic management architecture. SMI, structure of management information; NOC, network operations center; MIB, management information base.
741
be aligned with the OSI environment. The SMI organizes MIB objects into
an upside-down tree for naming purposes.
Management Information Base (MIB). This is the set of managed objects or
variables that can be managed. Each data element, such as a node table, is
modeled as an object and given a unique name and identifier for management purposes. The complete definition of a managed object includes its
naming, syntax, definitions, and access method such as read-only or readwrite. which can be used to protect sensitive data and status. By allowing a
status of required or optional, the SNMP formulating committee allows
for the possibility that some vendors may not wish to support optional
variables. Products are obligated to support required objects if they wish to
be compliant with the SNMP standard Ref. 8..
Figure 18.4 also shows an agent in every equipment to be managed, and
Figure 18.5 illustrates how a management console manages agents.
SNMP utilizes an architecture that depends heavily upon communication
between one or a small number of managers and a large number of remote
agents scattered throughout the network. Agents use the MIB to provide a
view of the local data that are available for manipulation by the network
management station. In order for a variable, such as the CPU utilization of a
remote Sun workstation, to be monitored by the network management
station, it must be represented as an MIB object.
Yemini Ref. 9. introduces the MIB in an interesting manner; and as many
other authors in the field, he portrays it as a tree, as shown in Figure 18.6. It
is located in the expanded agents box. The MIB is organized as a directory
tree of managed data located at the leaves, and it is shown as shaded cells.
The internal nodes of the tree are used to group managed variables by
related categories. Dr. Yemini shows that all information associated with a
given protocol entity we.g., Internet Protocol IP., TCP, User Datagram
742
Figure 18.6. SNMP pictorial overview. Note the tree formation. (From page 29, Ref. 9,
reprinted with permission of the IEEE Press.)
743
744
Figure 18.8. An SNMP PDU structure for GetRequest, GetNextRequest, GetResponse, and
SetResponse. [From Managing Technology Overview, Chapt. 52, CISCO, June 1999 and
from RFC 1067 (J. Case, Univ. Tenn., Aug. 1988) and RFC 1157 (J. Case, Univ. Tenn., May
1990).]
Figure 18.9. SNMP V.1 trap PDU format. [From Internetworking Technology Overview,
Chapt. 52, CISCO, June 1999 and from RFC 1067 (J. Case, Univ. Tenn., Aug. 1988) and RFC
1157 (J. Case, Univ. Tenn., May 1990).]
TABLE 18.1
GetRequest
GetNextRequest
GetResponse
SetRequest
Trap
TABLE 18.2
Error Type
noError
tooBig
noSuchName
badValue
readOnly
genErr
745
0
1
2
3
4
Description
0
1
2
3
4
5
Success
Response too large to fit in single datagram
Requested object unknown r unavailable
Object cannot be set to specified value
Object cannot be set
Some other error occurred
The Error Status field is also an ASN.1 primitive type. It indicates normal
operation noError. or one of five error conditions as shown in Table 18.2.
When an error occurs, the Error Index field identifies the entry within the
variable bindings list that caused the error. If, for example, a readOnly error
occurred, the error index returned would be 4.
A Variable Binding pairs a variable name with its value. A VarBindList is a
list of such pairings. Note that within the Variable Bindings field of the
SNMP PDU, the word Object identifies the variable name OID encoding of
object type plus the instance . for which a value is being communicated.
A trap is an unsolicited packet sent from an agent to a manager after
sensing a prespecified condition such as a cold start, link down, authentication failure, or other such event. Agents always receive SNMP requests on
UDP port 161, and network management consoles always receive traps on
UDP port 162. This requirement means that multiple applications on the
same management station that wish to receive traps must usually pass control
of this port to an intermediate software process. This process receives traps
and routes them to the appropriate application. Figure 18.9 illustrates the
SNMP trap PDU structure. We must appreciate that the trap PDU structure
differs from the structure of the other four PDUs shown in Figure 18.8. Like
those other PDU structures, the first field, PDU type, will be in this case
PDU Type s 4. See Table 18.1..
The next field is called the Enterprise field and identifies the management
enterprise under whose registration authority the trap is defined. As an
example, the OID prefix 1.3.6.1.4.1234 would identify Newbridge Networks
Corporation as the address sending the trap. Further identification is provided in the Agent address field, which contains the IP address of the agent.
746
TABLE 18.3
Trap Type
coldStart
warmStart
linkDown
linkUp
authenticationFailure
egpNeighborLoss
enterpriseSpecific
Value
0
1
2
3
4
5
6
18.7.3
SNMP Version 2
SNMPv.2 design used the field experience gained by SNMP to sharpen and
simplify the mappings to different transports. The management protocol has
been separated from the transport environment, encouraging its use over
practically any protocol stack.
One of the weaknesses of SNMP is in the unreliable manner of handling
trap messages. Of course, management communications are most critical at
times when the network is least reliable. A managers communications with
agents are vital. The use of UDP by SNMP means potentially unreliable
transport. SNMP leaves the function of recovery from loss to the manager
application. The GET-RESPONSE frame confirms respective GET, GETNEXT, and SET. A network manager can detect the loss of a request when a
response does not return. For instance, it can repeat the request. Traps are
another matter. Trap messages are generated by the agent and are not
confirmed. If a trap is lost, the agent applications would not be aware that
there is a problem, nor would the manager for that matter. Because
747
18.7.4
748
Figure 18.10. A generic SNMPv.2 managed configuration. (From Chapter 3, Ref. 11, reprinted
with permission.)
749
Figure 18.11. A typical overall architecture of an OSI network management system. (From
Figure 2-12, page 48, Ref. 9.)
18.8
18.8.1
TMN provides a framework for telecommunications management. By introducing the concept of generic network models for management, it is then
possible to perform general management of diverse equipment using generic
information models and standard interfaces.
TMN was initially defined by the ITU in 1988. It is designed to facilitate
supplier independence for the customer regarding telecommunication management systems. The objective of TMNs architecture is to allow interoperable interfaces between managing and managed systems and between network
management systems themselves. TMN is a set of standards whose goal is to
provide unambiguous definitions for the information in support of management functions and how they are exchanged across an interface between
communicating parties. TMN is still in a stage of evolvement Ref. 13..
Figure 18.12 shows the relationship between TMN and the telecommunication network that it manages.
TMN uses concepts from OSI Systems Management architecture and
applies them in the context of telecommunications network management.
750
751
With the OSI system management regime we find the familiar manageragent
role that is to some degree at odds with the OSI peer-to-peer basic relationship, thus we have peer-to-peer versus master-slave.
There are five independent functional blocks comprising the TMN:
1.
2.
3.
4.
5.
752
Figure 18.13. Network management application entity. (From Figure 3.4, page 67, Ref. 15.)
753
The A-Abort is issued by the user of ACSE, whereas the Provider Abort
A-P-Abort. is issued by the protocol device because the event received is
invalid for the current state.
The ACSE only sets up and releases an association. The actual data
transfer is performed by the three ASEs described below.
Remote Operations Service Element (ROSE). ROSE is a simple protocol
that defines the structure for invoking operations remotely and responding to
the invokation. The services support correlation of responses to requests.
When a response is received, it can be correlated with the corresponding
request. ROSE is further augmented with CMISE and SMASE to achieve
the management data transfer.
Common Management Information Service Element (CMISE). CMISE supports ROSE in that it refines the structure offered by the requestrreply
framework of ROSE. Its specialization is in the context of operations
common to all management functions. Irrespective of the functional areas
and the resources managed, a basic set of operations is defined by CMISE.
CMISE offers services and features grouped together into functional units.
The requirements for both Q3 and X interfaces specified in ITU-T Rec.
Q.812 are specified in terms of profiles for network management.
Systems Management Application Service Element (SMASE). SMASE covers all management functions in a generic sense. This makes it different from
other service elements in its structure, and there is no singular document
providing protocol definition. SMASE represents a collection of one or more
System Management Functions SMFs. and, based on which functions are
used on an association, the corresponding services to be used. These SMFs
further refine the generic framework set by CMISE. Here, in this case,
CMISE is not complete until further refined by functions that define specific
event types. The generic event report service then is augmented by service
definitions and protocol specification. Thus each specific function has service
definitions and protocol specifications included.
TMN Management Message Structure Description. L. G. Raman, in
Ref. 15, describes the structure of a management message to appreciate the
basic differences between the TMN approach and existing message-based
approaches e.g., SNMP. in a high-level view.
In many current approaches, messages are specified in a readable format
using character strings. Formulating the message using the TMN interface is
different. The message itself is not completely laid out as a string of
characters; instead, using level abstractions, different parts of messages are
supplied by different application service elements.
Figure 18.14 shows how the flow of information occurs for this case. For
understanding the application level messages, assume that the lower layer
754
Figure 18.14. System management message components. (From Figure 3.5, page 70,
Ref. 15. Reprinted with permission.)
REFERENCES
755
Figure 18.15. Typical system management message. (From Figure 3.6, page 71, Ref. 15.
Reprinted with permission.)
REFERENCES
1. The IEEE Standard Dictionary of Electrical and Electronics Terms, 6th edition,
IEEE Std 100-1996, IEEE, New York, 1996.
2. Transport Systems Generic Requirements: Common Requirements, GR-499-CORE,
Issue 2, Bellcore, Piscataway, NJ, December 1998.
3. Steven M. Dauber, Finding Fault, BYTE Magazine, McGraw-Hill, New York,
March 1991.
4. Error Performance of an International Digital Connection Forming Part of an
Integrated Serices Digital Network, CCITT Rec. G.821, Fascicle III.5, IXth Plenary
Assembly, Melbourne, 1988.
5. Synchronous Frame Structures Used at Primary and Secondary Hierarchical Leels,
CCITT Rec. G.704, Fascicle III.4, IXth Plenary Assembly, Melbourne, 1988.
6. Frame Alignment and Cyclic Redundancy Check CRC . Procedures Relating to Basic
Frame Structures Defined in Recommendation G.704, CCITT Rec. G.706, CCITT
Geneva, 1991.
7. Information Processing Systems: Open Systems InterconnectionAbstract Syntax
Notation One ASN.1., ISO 8824, Geneva, 1987.
8. A Simple Network Management Protocol, RFC 1157, DDN Network Information
Center, STI International, Menlo Park, CA, 1990.
9. A Critical Survey of Network Management Protocol Standards, Yechiam
Yemini, Chapter 2, Telecommunications Network Management into the 21st Century, Edited by Salah Aidarous and Thomas Plevyak, IEEE Press, New York,
1994.
10. Mark A. Miller, Managing Internetworks with SNMP, M & T Books, New York,
1993.
11. William Stallings, Network Management, IEEE Computer Society Press, Los
Alamitos, CA, 1993.
756
APPENDIX
ADDRESSING CONVENTIONS
I.1 TRANSFORMING DECIMAL NUMBERS TO BINARY
NUMBERS AND TRANSFORMING BINARY NUMBERS
TO DECIMAL NUMBERS
When working with data transmission, more often than not we work with
octets or bytes. A byte in this book contains 8 bits. Unless we tell you
otherwise, we work from right to left. Then the rightmost digit is the zero
digit and will be the decimal number raised to the zero power. A decimal
number is often used as shorthand for a binary number..
Consider the decimal number 457,623. In these exercises we must take
into account the positional location of each digit starting with the 0
location. Thus we have a zero location, a one location, a two location, and so
on. Again, right-to-left, the first digit will be 10 to the zero power, the second
digit will be 10 to the one power, and the third digit will be 10 to the two
power i.e., squared., as follows, but write the number conventionally. To
assist in understanding what we are doing, the positional location is written
above each digit grouping in the line of digit calculations:
Positional
location:
5
4 = 10
4
5.
q 5 = 10
3
4.
q 7 = 10
2
3.
q 6 = 10
1
2.
q 2 = 10
0
1.
q 3 = 10 0 .
758
APPENDIX I
ADDRESSING CONVENTIONS
1 = 2 q 1 = 2 q 1 = 2 q 0 = 2 q 0 = 2 q 1 = 2 q 1 = 2 q 0 = 2 7 .
0.
1.
2.
3.
4.
5.
32
6.
64
0 s 103
In most situations the least significant bit is transmitted first. For example,
according to ITU-T Rec. X.25, serial bit stream derived from a data frame
based on LAPB, addresses, commands, responses, and sequence numbers
shall be transmitted with the low-order bit first, for example, the first bit of
the sequence number that is transmitted shall have the weight of 2 0 .. Be
careful, in some texts and protocol descriptions, the rightmost bit goes out
the pipe first, rather than the left.
To further add to this discussion, the Sixth edition of the IEEE Dictionary
defines most significant bit MSB . as the bit having the greatest effect on the
value of a binary numeral, usually the leftmost bit.Logic values expressed
759
in binary form are shown with their most significant bit on the left. In our
example above, namely 11100110, with the positional location as given, the
rightmost bit, the binary 0, is the most significant digit, not the leftmost.
We follow the IEEE convention in the remainder of this appendix with the
leftmost digit being the MSB.
Decimal Number to Binary Sequence. This is the reverse procedure as
above. In this case we are given a decimal number and we are to find the
binary sequence that matches that number.
For example, find the binary sequence that matches the decimal number
245. It would be helpful to remember 2 8 s 255, not 256, because our first
digit is 0.. We find the largest value of n so that 2 n F 245. It is 7. That is,
2 7 s 128. Thus, in the 7th bit position the 8th bit. there will be a 1. Subtract
128 from 245 and we have 117. Now again we find the largest value of n such
that 2 n F 117. The value of n will be 6, because 2 6 s 64. Thus, the 6th
position will be a 1. Subtracting 64 from 117 leaves 53. Still again we find the
largest value of 2 n such that 2 n F 53. Since 2 5 s 32, in the 5th bit position
we have a binary 1. Then, 53 y 32 s 21. Once again find the largest value of
2 n such that 2 n F 21. Since 2 4 s 16, in the 4th bit position, we have a 1,
then, 21 y 16 s 5. Still again find the value of 2 n such that 2 n F 5. Since
2 2 s 4, then, 5 y 4 s 1. 2 0 s 1.
By inspection we see that this is an 8-bit binary number. We know this
because 245 - 255 but is more than 127. If it were less than 127, it would be
a 7-bit binary number. Using a guide for positional notation to define our
equivalent binary number:
7
1
6
1
5
1
4
1
3
0
2
1
1
0
0
1
I.2
760
APPENDIX I
ADDRESSING CONVENTIONS
Each digit group is taken by itself and treated as any other decimal
number to be converted to binary. In other words, what 8-bit binary sequence
derives from decimal 241? We use the same methodology as in Section I.1.
What if 2 n is F 241? Then 2 7 s 128. This tells us that the first binary digit
of the 8-bit sequence is a 1. Subtract 241 y 128 s 113. If 2 n F 113, then
2 6 s 64. This tells us that the second place from the left is a binary 1.
Subtract again: 113 y 64 s 49. If 2 n F 49. Then, 2 5 s 32. This tells us
that in the third place from the left there is a binary 1.
Subtract still again. 49 y 32 s 17. If, 2 n F 17. Then, 2 4 s 16. This tells us
that the fourth place from the right contains a binary 1.
Where are we so far?: 1111xxxx.
Subtract still again. 17 y 16 s 1. If, 2 n F 1, then, 2 0 s 1.
This tells us that the 0 position from the right or the 8th position from
the left is a binary 1. Because we have no valid 2 n values for positions three,
two, and one, we then insert binary 0s in those positions. Thus we now have
11110001
Lets check it to see if we are right.
7 6 5 4 3 2 1 0 position number from the right
1 1 1 1 0 0 0 1
Add
2 7 s 128
2 6 s 64
2 5 s 32
2 4 s 16
2 3 s no value present
2 2 s no value present
2 1 s no value present
20 s 1
241 our original decimal value.
The largest decimal value we can have for an 8-bit binary sequence, of
course, is 11111111 or 255 decimal. The smallest value is 00000000 or decimal
0.
This addressing technique, so commonly found in IP, is called dotted
decimal notation system.
TABLE I.1
761
Decimal
Binary
Octal
Hexadecimal
4-Bit String
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
0
1
10
11
100
101
110
111
1000
1001
1010
1011
1100
1101
1110
1111
0
1
2
3
4
5
6
7
10
11
12
13
14
15
16
17
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
76543210
00001110
I.3
Most computer software that we deal with uses either the octal number
system, which has a base of 8, or the hexadecimal number system, which uses a
number base of 16. Table I.1 shows the decimal numbers 0 through 1 and
their binary, octal, and hexadecimal equivalents.
To convert a binary sequence to an octal sequence, starting from the left,
separate the binary digits into groups of three; to convert to a hexadecimal
sequence, starting from the left, separate the binary sequence into groups of
four digits. For example:
101011000110 s 101 011 000 110 2 s 5306 8
s 1010 1100 0110 2 s AC6 16
II
ACRONYMS AND ABBREVIATIONS
2B1Q
4B5B
8B6T
8B10T
A
AAL
ABM
AC
ACEG
ACF
ACK
ACSE
ADM
ADCCP
ADSL
AFI
AIS
ALBO
AM
AMI
AM-VSB
AMP
ANSI
AP
APD
AR
ARPA
ARPANET
ARM
ARP
764
APPENDIX II
ARQ
ASCII
ASE
ASK
ASN.1
ASTM
AT & T
AU
AUG
AUI
AutoVoN
AUU
AWG
B
B3ZS, B6ZS, B8ZS
BASE
BAsize
BBE, BBER
BCC
BCD
BECN
Bellcore
BEOFD
BER
BERT
BEtag
BICI
BIP
B-ISDN
BISUP
BITE
BIU
BLF
B-NT1, B-NT2
BNZS
BOM
BPDU
bsp
BPSK
BR
BRI
BROAD
APPENDIX II
BSA
BSS
BSSID
BT
C
CAC
CADrCAM
CAP
CAT
CATV
CBR
CBDS
CC
CCITT
CD
CDMA
CDV
CE
CEQ
CF
CFP
CI
CIB
CIR
CLEC
CLLM
CLNAP
CLNP
CLP
CLSF
CM
CMCI
CMI
CMIC
CMIP
CMISE
CMTS
COM
CONUS
CP
CPI
CPCS
765
766
APPENDIX II
CPE
CPI
CPU
CrR
CRC
CRF
CRS
CS
CSI
CSMA
CSMArCA
CSMArCD
CSU
CTS
CW
D
DA
DACS
DAMA
DARPA
dB
dB, dBm, dBW,
dBi, dBc, dBmV
DBPSK
DC
DCC
DCE
DCF
DDS
DE
DECnet
DIFS
DISC
DLCI
DLL
DM
DMPDU
DNHR
DNIC
DoD
DPTE
DQDB
DQPSK
Destination address
Digital automatic cross-connect system
Demand assignment multiple access
Defense Advanced Research Projects Agency
Decibel
Decibel-related terms
Differential binary PSK
Direct current
Data country code
Data communication equipment
Distributed coordination function
Digital data system
Discard eligibility
Digital Equipment Corporation network
DCF interframe space
Disconnect
Data-link connection identifier
Data-link layer
Disconnect mode
Derived MAC protocol data unit
Direct nonhierarchical routing
Data network identification code
Department of Defense, U.S.
Data processing terminal equipment s DTE.
Distributed queue dual bus
Differential quadrature phase shift keying
APPENDIX II
DS
DS0, DS1
DSAP
DSE
DSL
DSLAM
DSM
DSP
DSS
DSS1, DSS2
DSSS
DSU
DTE
DWDM
E
E0, E1
EA
EB
EBCDIC
ED
EDAC
EDC
EDD
EDFA
EFS
EIA
EIFS
EF
EIRP
EMC
EMI
eoc
EPO
ER
ES
ESA
ESF
ESI
ESR
ESS
ETD
ETSI
EUTP
767
768
APPENDIX II
F
FC
FCS
FDDI
FDM
FDMA
FEBE, febe
FEC
FECN
FER
FERF
FH
FHSS
FIFO
FM
FMIF
FR
FRAD
FRF
FRMR
FRS
FS
FSK
FSL
FTP
Frame control
Frame check sequence
Fiber distributed data interface
Frequency division multiplex
Frequency division multiple access
Far-end block error
Forward error correction
Forward explicit congestion notification
Frame error ratio
Far-end receive failure
Frequency hop
Frequency hop spread spectrum
First in, first out
Frequency modulation
Frame mode information field
Frame relay
Frame relay access device
Frame Relay Forum
Frame reject response
Frame relay switch
Frame status
Frequency shift keying
Free-space loss
File transfer protocol
G
Gbps
GBSVC
GCRA
GFC
GFSK
GHz
GMII
GTE
H
HC
HCS
HDB3
HDLC
HDR
HDSL
HE
HEC
Horizontal cross-connects
Header check sequence
High density binary 3
High-level data-link control
Header
High-speed digital subscriber line
Head-end
Header error control
APPENDIX II
HFC
HIC
HLPI
HOC
HPA
HRC
HRP
HRX
HTC
Hz
I
IA5
IBSS
ICD
ICMP
IDI
IDL, idl
IDU
IEC
IEEE
IFG
IrG
IHL
IISP
ILMI
IM
IMPDU
INFO
IrO
IP
IPX
IrQ
IR
IRC
IRL
IRP
ISDN
ISM
ISP
ISO
ISUP
769
770
APPENDIX II
ITA
ITU
IXC
K
kbps
kHz
km
L
LAN
LAPB
LAPD
LAPF
LCN
LCT
LD
LEC
LED
LEO
LI
LLC
LLCDU
LMDS
LNA
LO
LOC
LOS
LRC
LSAP
LSB
LSDU
LSDV
LSI
LTE
LX-PMD
M
MAC
MAN
MAP
M-ary
APPENDIX II
771
MAU
Mbps
MCNS
MDI
MDL
MF
MIB
MIC
MID
MIT
MLC
MLP
MMPDU
MO
MODEM
MNS.
MPDU
MPEG
ms
MSAP
MSB
MSDU
MSVC
MTP
mV
N
NA
NACK
NANP
NAV
NDC
NDM
NE
NEF
NEXT
NF
NHDR
nm
NMS
NMT
NNI
NOC
NPC
NPI
Numerical aperture
Negative acknowledgment
North American Numbering Plan
Net allocation vector
National destination code
Normal disconnect mode
Network element
Network element function
Near-end crosstalk
Noise figure
Network header
Nanometers.
Network management system
Network management
Networknetwork interface or networknode interface
Network operations center
Network parameter control
Numbering plan identification
772
APPENDIX II
N R.
NRM
NRZ
NRZI
N S.
ns
NSAP
NSDU
NSN
NSP
NT e.g., NT1, NT2.
NTSC
O
OAM, OA & M
OC
OSF
OSI
OSIE
OSP
OSPF
P
PABX
PAD
PAM
PAR
PC
PCF
PCI
PCM
PCR
PCS
PDH
PDU
PDV
PrF bit.
PH
PHY
PIFS
PIN
PLCP
PLL
APPENDIX II
773
PLOAM
PLS
PM
PMA
PMC
PMD
P-NNI
POH
POI
POTS
PPM, ppm
P R.
PRBS
PRI
P S.
PSC
PSDN
PSF
PSH
PSK
PSPDN
PSTN
PTI
PTR
PTT
PVC
Q
QAF
QAM
QoS
QPSK
Q adapter function
Quadrature amplitude modulation
Quality of service
Quadrature phase shift keying
R
RARP
REJ
REM
RF
RFC
RFI
RI
RIM
RIP
RM
rms
774
APPENDIX II
RNR
ROSE
RPS
RR
RSL
RSU
RTS
RTU
RX
RX BITS
RX CLK
RXD
RZ
S
SA
SABME
SAP
SAPI
SAR
SARM, SARME
SBS
SCR
SCSI
SCTE
SD
SDLC
SDH
SDP
SDU
SEAL
SES
SESR
SFD
SFS
SIFS
SIM
SIR
SLA
SLP
SMASE
SMDS
SMF
SMI
SMT
Source address
Set asynchronous balanced mode extended .
Service access point
Service access point identifier
Segmentation and reassembly
Set asynchronous response mode, extended
Selective broadcast signaling
Sustained cell rate
Small computer system interface
Society of Cable Telecommunication Engineers
Starting delimiter
Synchronous data-link control
Synchronous digital hierarchy
Severely disturbed period
Service data unit
Simple and. efficient AAL layer
Severely errored seconds.
Severely errored second ratio
Start frame delimiter
Start frame sequence
Short interframe space
Set initialization mode
Sustained information rate
Service level agreement
Single-link procedure
Systems management application service element
Switched multimegabit data service
Submultiframe; system management information
Structure of management information
Station management
APPENDIX II
SMTP
SN
SrN
SNAP
SNMP
SNP
SNRM
SOH
SOM
SONET
SPE
SREJ
SRL
SRTS
SS7, SSN7
SSAP
SSD
SSM
ST
STA
STE
STL
STM
STP
STS
SVC
SWP
SX-PMD
SYNC, sync
T
TA
TBB
TBBIC
TBI
TC
TCM
TCP
TCU
TDM
TDMA
TDR
TE
Tel, te2
775
776
APPENDIX II
TEF
TEI
Telex
TFTP
TGB
THDR
THT
THz
TIA
TMGB
TMN
TOA
TOS
TPDU
TS
TSI
TSN
TST
TTL
TU
TUG
TWT
TX
TX bits
TX clk
U
UA
UCD
UDP
UHF
UI
ULP
UMD
UNI
UPC
UPS
s
USAF
UTP
UU
V
VBR
VC
APPENDIX II
VCC
VCI
VHF
VHSIC
VLAN
VLSI
VP
VP-AIS
VPC
VPI
VPN
V R.
VRC
V S.
VSAT
VT
VTAM
W
WAN
WEP
WLAN
WDM
WSF
X
XDSL
XID
Generic DSL
Exchange identification command.
777
INDEX
779
780
INDEX
amplitude:
distortion, 160
frequency response, 97, 98
equalizer, 163
modulation AM., 96
-phase relationships with V.29 modem.
table, 169
and phase distortion, 159165
response, 596
shift keying ASK., 166
analog modem, 188, 198
ANSI ADSL, 683
ANSI American National Standards
Institute ., 77
CRC16, 63
-defined field formats, 441
frame relay, 436437
relay specifications, 474
T1.602 protocols, 442
antenna height ersus range calculation,
592593
anycast IPV6., 413
APD avalanche photodiode., 566
application entity, TMN, 751
application layer, 1920
apportionment rules, table, 106
APrSTA mapping WLAN., 316
architectural model of ISDN, 491
architectural positioning:
of 100BASE-T, 258
of gigabit Ethernet, 275
ARM asynchronous response mode., 43
ARP address resolution protocol., 386, 398
cache, 398
ARPANET, 386, 396
ARQ automatic repeat request., 47
-delays, 603
-function, 427
-type error correction, 68
artificial frame added, 148
ASCII American Standard Code for
Information Interchange ., 61, 77
character A, 89
ASE application service element., 751
ASK amplitude shift keying., 166
modulation, 96
aSlotTime, 329, 330
ASN.1 Abstract Syntax Notation.1., 740
primitive type, 745
assignment of logical channels, X.25, 385
association control service element ACSE.,
752753
asymmetric carrier frequencies, V.34, 180
INDEX
781
782
INDEX
balance:
bit to limit build up of DC component, 498
to ground, 122
balanced:
configuration, 42
digital interface circuit EIA-422, figure, 115
mode attenuation, 538
balancing network, 158
bandwidth, 605
allocated, 603
allocation, 595
controlled by CMTS, 701
data, how many bps fit?, 116
defined, 116
-distance factor, 558
500 MHz, 591, 596
parameter limits, table, 162
question, 116118
and redundant signals, 67
ersus bit rate, 116, 436
of voice channel, 95
1BASE5, 240
implementations, table, 238
10BASE5, 239
10BASE-FL, 10BASE-FP, 252
100BASE-FX, 252
100BASE-LX, 240
100BASE-T, 254
100 Mbps at CSMArCD MAC, 261
architectural positioning, figure, 258
full-duplex mode, 276
link segment, 254
MII, repeater and optimal autonegotiation,
264
100BASE-T4, 240
PCS and PMA, figure, 262
signaling, 263
100BASE-TX, 255
PCS, 265
100BASE-X:
block diagram, 266
PCS, 265
and PMA sublayers, 277
1000BASE-X:
block diagram, 266
PCS, PMA sublayers, 277
PHY, 269, 278
diagram, 281
and PMDs relationship, figure, 280
sublayers summary, 4278280
1000BASE-LX, 240
1000BASE-SX, figure, 280
baseband:
100 Mbps CSMArCD networks, 252274
INDEX
digit, 73
digital regenerator, figure, 82
GFSK, 333
NRZ, figure, 302
words, 66
binder groups, 535
bipolar waveform, 134,
AMI, 136
B-ISDN, 602
rATM functional layering, figure, 617
rATM network, 637640
protocol reference model, figure, 605, 606
reference model, 615
user-network interface UNI., figure, 605
BISUP broadband-ISUP ., 646
bit:
alignment, 616
binary transmission of information, 7375
error detection, 10
error interpreted as collision, 245
error performance, 102
error rate BER., 102, 103
VSAT, 427
integrity in a time slot, 150151
interval, 570
notation, 282
order, 212
packing, 165, 167, 595, 694
-parallel and -serial, 8586
parsing, 192
per Hz, getting more, 165166
period equals 1rbit rate, 161
rate, 6, 87
constant or variable, 620
capacity, 2, 436, 445, 551
on wire-pair varies with, 681
ersus antenna aperture, 428
stream flow resources, 684
stuffing, 138
synchronization, 225
time, 241
times BT. per meter, 287
shorter, 254
timing at 192 kbps, 497
slips, 612
symbols, 241
bitwise AND function, 358
block codes 6566
block diagram:
of fiber-optic repeater, 568
of fiber-optic transmitter, figure, 564
block error:
performance 102
rate, 103
783
784
INDEX
broadband Continued.
ISDN B-ISDN., and ATM, 601678
radio systems, 591592
ersus baseband LANs, 205
broadcast 57
address, 226, 299, 320
domain, 359
BSA boundaries, 327
BSSID basic service set identification ., 319
BT bit times. per meter, 287
Btag beginning tag.:
and Etag, 625
field, 626
buffer allocation size BAsize. indication field,
626
buffer storage, 65
building, campus wiring, cabling, data
communications, 524549
built-in clocking system, 91
burst and wait, 598
burst errors, 65, 611
burst noise:
downstream, 695
upstream, 696
burst profile attributes, table, 709
burst profiles, DOCSIS, 709716
burst timing convention, 711
bursty traffic, 445
of frame relay, figure, 446
figure, 446
bus network, 3, 5
busy hour, 367, 368
bypass in economically evolving nations, 152
bypass, local telephone service, 425
bypassing the local telephone company, 151
byte, 6, 9
interleaved, 571
interleaving, 576
ersus octet, 91
C-bit removed, 150
C-plane ATM., 606
cable:
balanced mode attenuation, horizontal
STP-A cable, table, 539
composition, fiber-optic cable, 563564
delay 287
budgets are smaller, 254
for segment, 286
conversion table, 287
television CATV., 686
plant, 682
terminations, 532
INDEX
case A:
configuration, accessing PSPDN services,
520521
figure, 521
CAT 5:
cable 533
UTP, 7
categories of UTP cabling, 533
category 5 UTP cable, 530
CATV, 531
distribution system, early, figure, 687
introduction, 687716
spectrum assigned upstream and
downstream, figure, 691
CBR constant bit rate., 603
CCITT:
error performance objectives, international
ISDN connections, table, 104
International Alphabet No. 5 IA5., figure,
80
ITU-T, CRC, 63
Signaling System No. 7, 148, 488, 489, 493,
494
slip criteria, 148
voice channel occupies, 116
CDMA code division multiple access., 599
CD0s and CD1s, 241, 242, 243
CDV tolerance, 653, 654
cell, 601
arrival event, 649
B hub transmitter, figure, 719
-based transmission systems, 668
block, 650
boundaries, ATM, 665
may cross a C-4 boundary, 665
conformance, connection compliance,
656657
delay variation CDV., 622, 647, 648, 659
impact on UPCrNPC resource allocation,
654655
origins, figure, 655
sensitivity, 652
delineation, 673
algorithm, 614615
performance improvement, 612
scrambling, 613615
state diagram, 614
discrimination, predefined header field
values, 619
entry event, 647, 648
error ratio, 647, 649650
event, 647
exit event, 647, 648
785
flow, 616
header extraction, 618
generationrextraction, 617
loss priority CLP., 649, 654
field, 610
ratio, 647, 649, 659
objective, 652
misinsertion rate, 647, 650
payload, 647
rate decoupling, 618, 619, 673
rates, various connections, 666667
sequence integrity, 638
structure, ATM, figure, 607
time slots, 619
transfer delay, 647, 648
cells transported contiguously, 603
Cellular Vision USA, 717
central bridge, 232
CEPT30q2 sE1, table, 139
CF period, WLAN, 332
channel attenuation specifications, table, 308
channel coding, 65
with interleaving, 427
channelization, 64-kbps, 493
character, 92
characteristic impedance, 158
check pointing, 47
checkpoint recovery, 53, 54
checksum, 409, 418
UDP, 414
CHECK TOKEN PASS, 293
chromatic dispersion, 560, 562
CIR committed information rate., 445
equals access rate, 457
circuit:
CI, 248
maintenance messages employed, 447
and packet switching, 488
setup signaling procedures, 446
using ATM signaling, 645646
supervision, 603
switched services, 430
-switched data call control, 430
switching, 67, 68
class A format, 396
class B addressing, 396
classful addressing, 396
classless vs. classful, 394
Claude Shannon, 117
clear FECN bits, 453
clear request, 382
CLEC competitive local exchange carrier., 686
client server, 359
786
INDEX
INDEX
companding, 129
compatibility interfaces, physical layer,
232235
illustrated, 234
compatibility issues, frame relay, 474480
complete packet sequence, 380
complete selection case, ISDN packet, 521
compliant ATM connection., 656
component delays, transmission system model
2, table, 287
concatenation indicator, 577
concentration and expansion, 144
concentrator trunk coupling unit, figure, 307
concept of frame, 131134
concept of the 3-dB power bandwidth, figure,
117
conceptual drawings: FDMA, TDMA and
CDMA, 599
conditioned diphase, 571
conditioning and equalization, 161162
configuration:
BPDU, 346, 347
parameters and format, figure, 350
bridge protocol data units BPDUs., 338
management, 728
messages., 337, 346, 347
confirm, primitive, 34, 209
conformance definition ATM., 656
conformance testing of cells, 653
conformant infrared devices, 334
conforming cell, 658
congested resources, 442
congestion:
avoidance, 446
control, 516
notification, 453
recovery, 448
CONNECT message, 646
connecting grounding bars, 545
connecting hardware for UTP cable, 536537
connection:
admission control CAC., 651, 653
cell rates, various familiar bit rate capacities,
table, 667
closed, 407
control, 10
establishment, figure, 645
ATM, 646
frame relay, 444445
flow control service, 210
management, 38
mode, 27, 620
opening, figure TCP., 405
release, 445
787
788
INDEX
control Continued.
flags, 409
functions incorporated, 437
memory, 142
response times, figure, 652
store, 144
controls the connection establishment, 514
conventional header, 70
convergence sublayer CS., 618, 620
PDU CPCS., 624
convolutional codes, 6566
core and cladding, 557
core-CEI, 444
core-cladding interface, 561
correction mode, 611
correlate fault, performance information, both
directions, ATM, 669
corrupted by noise, 80, 81
corrupted frame, 60
cost, a routing parameter, 346
counter-rotating ring, 308
coupling efficiency, 565
coupling of multi-vendor equipment, 204
couplings between pairs, 536
coverage of CRC in a data-link frame, figure,
63
CP sequences, 193
CPCS common part convergence sublayer.,
616
characteristics, 628
CPCS-PDU, 624
format for AAL-5, 629
payload, 630
structure and coding, 628
CPCS-SDU sequence integrity, 628
CPCS-UU CPCS user-to-user indication ., 629,
630
CPE customer premise equipment., 724
CrR bit, 437
CRC-4:
block errors, 737
remainder, 736
CRC-16, 49
CRC-32 calculation, 637
generator polynomial, 630
CRC cyclic redundancy check., 49, 62
check, ISDN U.S., 499
error, 288
error checking, 503
field, 627, 630
indication bit CIB., 635
procedures, 505
value, 227
critical angle, 556
cross-connect:
blocks, 536
facilities, typical, 537
jumpers, 526, 528, 549
cross-point:
array, figure, 143
gates, 144
matrix, 142
cross-points, 139
crosstalk, 100, 101, 684
energy, 536
and fiber optics, 554
crystal transmit asserted, 304
CSI convergence sublayer indicator., 621
CSMArCA distributed algorithm, 323
CSMArCD carrier sense multiple
accessrcollision detection., 3, 223232
1000 Mbps networks, 274288
basic operation 229232
LAN, 734, 735
MAC functions, figure, 236
sublayer, 230
relationship with OSI reference model,
figure, 224
system designation, 239240
CSUrDSU, 150
CTS clear to send., 319
frame, 331
figure, 322
cumulative latency, 304, 305
curing ills of bandwidth scarcity, 691692
customer-owned OSP cabling, 549
cut-through forwarding, 356
CW max, 331
cyclic redundancy check CRC., 49, 6264
D bits, inverted pointer, 588
D channel:
access control, 497
call establishment, 488
carries out OSI layers 1, 2, 3, 488
correspondence with CCITT SS No.7, OSI
model, figure, 495
failure, 514
ISDN, 484
signaling data, 489
information, 488
protocol, 523
DACS digital cross-connect ., 684
DAMA demand assignment multiple access.,
428, 429
DARPA Defense Advanced Research
Projects Agency., 39
data and PAD fields, 227
INDEX
789
data rate, 87
signaling rates, 198
for different K and S, table, 193
token ring, 303
data switching, 6771
methods, summary, table, 70
data terminal equipment DTE., 35
figure, 108
data transfer, 38
data transmission:
I, 7387
II, 89119
on digital network, 149151
data unit identifier, CLNP, 419
database management process, TCP, 404
datagrams., 387, 390, 391
format, IP, figure, 392
maximum length, 393
DC balanced by last bit, 497
DC baseband, 95
DC component, 302
DC resistance:
150-ohm STP, 538
unbalance, 538
DCC data country code., 644
DCE data communication equipment., 35, 108
pads information field, 371
DCF, 326
access method, 331
basic access procedure, 331332
IFS DIFS., 329
DDS digital data system., 150
DE discard eligibility. bit, 442, 455, 458
de-assertion, CRS carrier sense., 260
decimal digital representation, IP addresses,
759760
decimal number:
to binary number in addressing, 757762
to binary sequence, 758759
shorthand binary number, 757
decision, binary receiver, 82
decoding delay, 67
dedicated circuits., 365366
figure, 364
dedicated connecting hardware, 533
dedicated detection of unavailability state, 670
default:
address format, 463
mode, HEC, 611
operational parameters IEEE 802.1D, 348
routing, IP, 397
defer access, figure, 332
deferrals, 324
defragmentation, 325
790
INDEX
INDEX
distributed:
coordination function DCF., 323324
frame, 6
initialization, 290
queue dual bus DQDB., 601, 602
random integer, 231
DLCI data link connection identifier ., 70,
439, 440, 442, 506
of the congested circuit, 449
on the D Channel, 442
equal to 0, 465
field, 442
range, 443
value, 444, 460
table, 443
for D Channel, table, 444
DL:
CONNECT, 221
CORE:
frame relay, 436
connection endpoint identifier CEI., 444
control bits, 442, 444
parameters, 444
sublayer, 445
DISCONNECT, 221
DM disconnected mode., 52
DNHR dynamic nonhierarchical routing., 146
DOCSIS data over cable service interface
specification ., 692
reference model figure., 693
specification, 692716
dot fragment bit set, 393
flag, 401
dot11ShortRetryLimit, 331
dotted decimal notation system, 760
double current meaning polar, 83
downstream, 188, 682
frequency plan, 714
PMD sublayer, 714
RF channel transmission characteristics,
table, 695
transmission convergence sublayer, 701
DQPSK modulation, WLAN, 334
DS1:
coding, 131
configuration, separate, 485
connection, 150
ESF extended superframe . ATM., 662
family of waveforms, 128
mapping:
ATM, 660661
ATM cells with PLCP, 662
time slot, 155
DS3:
791
frame:
transporting ATM, 659660
structure used to transport ATM cells,
661
PLCP, 659
tributary, 575
DS series line rates, tolerances, line codes,
table, 138
DSAP destination service address point., 211
address, 217
and SSAP address field formats, figure, 212
DS0rE0 channels, 436
DSL digital subscriber line., 499, 682
modem router, 685
reference model, 685
technique, 485
DSLAM digital subscriber line access
multiplexer ., 684
facilities, 685
DSP domain-specific part., 644
DTE data terminal equipment., 35, 108
address field, 385
and DCE data packet formats modulo 8,
378
full media independence,
-DCE interface, 108116, 375, 377, 379
PVC, 463
X.25, 373
dual cable:
frequency allocations, table, 250
system, figure, 245
dumb bridges, 335, 336
dummy call reference, 461
durationrID field, 326
duty cycle, 138
DWDM dense wavelength division
multiplexing., 569
dwell time boundary, 332
Dykstra algorithm, 399
dynamic mix of contention-, reservation-based
upstream transmit opportunities, 701
dynamic range, 566
WLAN receiver, 333
E bit, 301
E1:
family:
of multiplex, 139
of waveforms, 128
mapping ATM cells, 662664
multiframe, figure, 737
E3, E4 frames, ATM cell mapping, 664
E.164:
addressing, 357
792
INDEX
E.164 Continued.
ATM address format, 644
or X.121 addressing, 384
earth station antenna sidelobes, 597
eavesdropping, 323
EBCDIC code, 90, 91
figure, 81
EBCDIC extended binary coded decimal
interchange code., 79
echo, 159
cancellation, 501
techniques, 178
suppressors at each end, 497
and singing: telecommunication network
impairments, 159
ED alignment error, 303
EDD envelope delay distortion., 165
EDFA erbium-doped fiber amplifier., 568
amplification, 569
effect of source spectral width, fiber index
variations on material dispersion, figure,
560
EFS end-of-frame sequence., 294
EFS error-free seconds., 103
EGP exterior gateway protocol., 398
EIA Electronic Industries Alliance., 35, 108
EIA-530 connector contact assignments, table,
113
EIArTIA:
-232, 85, 93, 108109
electrical interface, 110112
pin assignments, table, 109
-530, 108109
interchange circuits, table, 114
-568A, 531, 532, 534
-607, 543
circuits by category, table, 110
interface standards 530, 422 and 423,
114116
recommends, 528
EIFS extended interframe space., 328
medium idle time, 330
8-ary PSK, figure, 167
8Br10B transmission code, 282
8B6T coding, figure, 163
eight-level coding of North American DS1
system, table, 133
elastic buffer, 303, 305
elastic store, 147
elasticity buffer, FDDI, 315
electrical:
bit decisions, 7982
characteristics, interchange circuits, 181
communication, information, 73
noise, 79
output from CM, table, 714
representation, binary data, 8284
electromagnetic compatibility EMC., 554
Electronic Industries Alliance EIA., 35, 108
electronic mail, figure, 386
element length, type, payload ATM., 637
elements of a MAC frame, 225227
elevation angle, 426
eligibility indicator, 456
elliptical orbits, 597
E & M signaling, 157
embedded delimiter, 311
encapsulate, 387
encapsulation, 9, 10, 268269, 618
encoder, 186187, 199
block diagram, V.34, 186
encoding:
bridge identifiers, 351
decoding. GMII data octets, 278
port identifiers, 352
option parameters, table, 420
root path cost, 351
timer values, 352
end delimiter ED., 291
end of transmission delimiter ETD., 241
end tag Etag. field, 626
ending delimiter ED., 300, 303
FDDI, 313
figure, 304
ending flag, 92
endless loops, 394
endless routing loops, 339
end-of-frame sequence EFS., 294
end-of-stream delimiter ESD., 269270
TrR, 268
end-system function, 38
end-to-end:
connectivity, 68
data delivery, 38
F4 flow, 669
F5 flow, 670
flow control, 24
performance monitoring, ATM, 676
segmenting, 24
transit delay, 453
energy per interference bit, 720
enterprise field, 745
enterprise network, 1
environment, 139
entities:
service access points SAPs.:
and endpoints, figure, 506
and identifiers, figure, 34
INDEX
793
794
INDEX
fairness, 456
false delineation, 615
far-end fault generate, 266
far-end user, 58
fast collision interference, 326
fast select facility, 382
fault condition notification, 30, 31
fault down to card level, 731
fault management, 728
FC frame control. field, 298, 313
FCS frame check sequence., 36, 37,
62, 300
computation, 228
field, 48, 71, 227
WLAN, 321
processing, 6061
slot, 62
FDDI fiber data distributed interface ., 5, 6
code symbol set, table, 311
frame format, figure, 312
ring operation, 314315
timers, timing budget, 314
token format, 310
topology, figure, 309
FDMA frequency division multiple access.,
428, 598
FEBE bit far-end block error., 499
bit indicates, 500
FEC forward error correction., 6566, 177
bit-to-symbol ordering, 707
encode, DOCSIS, 707
encoder, 66
operation, simplified diagram, 66
FECN forward explicit congestion
notification., 437
bit, 441, 601
bit set, 453
and BECN bits set to 1, 452
indications, 448
usage, 453454
Federal Express, 59
feedback control, 651
FER frame error ratio., 334
FH PHY WLAN, 332
fiber distributed data interface FDDI., 6,
308315
fiber jacket, 564
fiber optic:
amplifiers, 568569
cable, 563564
link, block diagram, 554
receiver, block diagram, 567
transmitter block diagram, figure, 564
transmitters, 564565
transmission, 552571
field and frame boundaries, 148
field descriptions, CLLM message format, 450
field mapping conventions, 440
field number, IP Protocol, table, 395
file servers., 5
file transfer protocol FTP., figure, 386
fill, 296
fillridle patterns, 93
filter roll-off properties, 595
filtered, 337
filtering database, 340, 342
filtering information, 339
final bit, 47, 55, 213
final frame, 53
firewalls, 360
first, second bandwidth approximations,
116117
fixed equalizer, 136
fixed latency buffer, 304
fixed-phase relationship, 589
flags., 91
CLNP, 417418
fragment indication, 393
flag field, 36, 43
flag sequence, 44, 510
flat:
channel, 98
frequency response, fiber optic cable, figure,
689
power spectrum, 100
rate payment, 445
response, 688
floating and locked modes, 578
floating VT mode, 578579
flooded, 399
to all users, 399
flow control, 10, 25, 28, 38, 508, 601
and CLLM, 739
FECNrBECN bits, 453455
mechanism TCP., 403
none in IP, 391
parameter negotiation, 379
ready state, 379
user data, 516
window, 377378
flow label, IPV6, 411, 413
flows F1, F2 and F3, 670
FMIF size, 475
FOIRL, 256
forced insertions, 677
format, 551
effectors, 78
identifiers, 45
INDEX
795
796
INDEX
INDEX
797
798
INDEX
implementations:
10 Mbps, parameters, table, 238
1000 Mpbs, table, 239
impulse noise, 100, 102
spike, 82, 103
inbound, VSA, 428
in-building wireless telephone systems, 725
incoming:
call packet, 381
ISDN, 524
committed burst size, 477
time slots, 141
incompatible with voice channel, 155
incomplete:
frames, 10, 60
octets, 10
incorporation of upper layer PDUs into
data-link layer frame, figure, 388
independent mappers, 194
index, propagation profiles, modes, figure, 563
index-matching fluid, 569
indication, primitive, 34, 209
individual addresses identify, 299
individual and group addresses, 299
inductive loading, 122
infinite bandwidth, 553
INFO field, 299300
maximum size, 438
information bits, 66
information element, 462
unique identifier coding, table, 472
other, 520
information field, 36, 48
INFO, 299
ISDN, 510
minimum, 438
information:
modeled flow, 208
payload, SDH, 584, 588
throughput, 67
transfer commandrresponse, 213
transfer format, 214
control field bits. figure, 219
infrared IR. transmission, WLAN, 334
ingress:
and access rate, 477
and egress access rates, 458
node, 457
initial shaping sign bit, 194
initiation, metasignaling for SVCI assignment,
642
inputroutput IrO. devices, 108
insertion losses.:
INDEX
of connectorsrsplices, 569
of DWDM systems, 569
of a hybrid, 158
insertion time of a cell, 652
in-service monitoring, 736
insulation displacement contact IDC., 536
in-sync time ersus bit error probability, figure,
615
integrated services digital networks ISDN.,
483525
intensity modulation of light, 570
intensity range of voice signals, 126
interaction management, 22, 23
interbridge protocol operation, figure, 342
interbuilding backbone cabling, 546
cabling, figure, 529
interchange circuits, 199
V.90, table, 200
interconnect, 151
LANs at a distance, 445
interconnection:
data circuits within physical layer, figure, 30
examples of, figure, 32
STM-1s, 590591
interconnects and bypass, 11152
interface:
2.048 Mbps, 504505
existing North American plant, ISDN, 499
frame structure of SDH, 584587
functions, ISDN, 495497
layers, SONET, 581582
figure, 581
points at PMD sublayer, 702
requirements, CSMArCD, 236
UNI and NNI, 446447
interference level into receiver in cell A, figure,
720
interframe:
fill, 504, 505
idle flags, 455
period, 260, 276277
time fill, 52
interFrameGap, 251
interim interswitch signaling protocol IISP.,
643
interleaver, 427428, 428
intermediate cross-connect, 532
itermediate frame bit I bit., 300
intermodulation noise, 100, 101
intermodulation products, 101
International Alphabet No. 5 IA5. code, 78
international ISDN number, 645
International Telegraph Alphabet ITA. 2
799
code, 77
Internet:
control message protocol ICMP., 399400
datagram envelopes, 402
header and data, 388
plus first 64 bits, 401
protocol IP., 37
address formats, figure, 396
packets transparently, 696
internetworking equipment, 733
interpacket gap shrinkage, 285
due to repeater units, 271
interpreting serial stream of bits, 8993
interpreting AU-n pointers, 588
inter-repeater fiber segment, 2542
intersymbol interference ISI., 94, 100, 136,
177
impact on BER, 117
intra-, inter-building distances, table, 532
intranets and servers, 359360
introduction:
digital networks, 123139
frame relay, 436444
trellis-coded modulation, 177178
invalid:
code groups, 268
frames, 440
MAC Frame, 228
IP4, 357, 391
IP6, 391
IP Internet protocol.:
address, 358, 391, 394
algorithm, 358
connectivity, 686
datagram format, figure, 392
encapsulation, 388
fields, 400401
gateway, 391
header, basic, 399
inter-connect two LANs, figure, 387
operation, detailed, 391
protocol field numbering, table, 395
router, figure, 387
routing, 397398
function, 390391
table, figure, 397
telephony, 725
IPV6 Internet protocol version 6., 410413
addressing, 413
header, 411412
format, figure, 412
packets, 412
routing, 410411
800
INDEX
IPV6 Continued.
IPV4 DOCSIS, 700
IrQ mapping table, DOCSIS, 704
IR PHY, WLAN, 334, 335
ISDN integrated services digital networks.,
483525, 602
access connection element, 491
basic rate, 122
BRI, 682, 683
circuit-mode bearer services, 521
compatible, 487
D channel, 439
generic users, figure, 486
H4 channel, 576
LAPD core functions, frame relay, 437
networks, 490493
numbering plan, 523
and OSI, 493494
packet mode review, 520525
packet service, figure, 490
protocol:
structures, 493505
issues, 488
reference model, figure, 486
64-kbps digital channels, 149
structures, 483485
user channel, 483484
user connectivity to the network, 485
user part ISUP., 489
ISI intersymbol interference ., 94, 100
ISM band, 316
ISM in-service measurement., 104
ISO International Standards Organization., 9
8348, 37
8072, 39
8073, 39
Geneva, 13
isochronous data transfer, FDDI, 310
ISP:
connectivities, 724
to local serving exchange, 682
interexchange:
carrier IXC., 151
data, issues, requirements, 5861
ITA2 code, figure, 76
J and K symbol, 312
jabber function, 246
jam, 230
size, 231
jamming, 231
jamSize, 238
jitter:
accumulation, 553
INDEX
layer 2 Continued.
switch, 356
unnumbered information UI. frames, 460
layer 3:
entities, 506
ISDN Overview, 514520
specification, 516520
switching, 356
layer:
descriptions, 1932
interaction, SONET, 583
interface requirements, 236237
layered OSI model, 14
layering, 1415
in cooperating open systems, figure, 14
of D channel, 494
LCN logical channel number., 385
LD laser diode., 564
leaky bucket:
algorithm, 658
concept, 434
leaky modes, 562
learning, 348
bridge, 356
process, 342343
least or most significant bit transmitted first,
758
LEC local exchange carrier., 58, 146
LED light emitting diode., 564
transmitter, 540
and LDs, comparison, table, 566
length:
field, 626, 628, 630
indication LI.:
CLNP, 417
field, 627
type field, 226227
LEO satellites, 598
light and small, optical fiber, 553
light-emitting diodes LEDs., 560, 565
line:
code, 498
configurations, 501
layer, SONET, 583
modulation rate, FDDI, 308
overhead, 583
probing, 179
rates and codes, 139
signaling, 73
signals, V.34, 179180
line-of-sight, 592593
microwave, millimeter-wave transmission
systems, 591600
of each other, 721
801
link:
access procedure:
balanced LAPB., 41
D channel LAPD., 41, 505514
distances not to exceed, 285
encryption system, 175
integrity verification, 462, 466
frame relay, 465
only, 467
layer core parameters information element,
471
specific coding, table, 475
-layer security sublayer, 700
-layer transparent bridging, 698
margin, LMDS, 723
segment, 1000 Mbps, figure, 275
state:
-database, 399
protocol, 399
vector, 399
links, 147
in tandem, no more than 12, 122
LLC logical link control., 41, 206222, 291
commands, related responses, table, 216
control field format, 214
frame, 297, 298
format, 299300
information field, 211
and MAC sublayers, 294
PDU, 214, 229
format, figure, 211
structure, 211
relationship, LAN reference model, figure,
207
sublayer, 231
management:
function, 212
services, 207
services and primitives, 208211
LMDS local multipoint distribution system.
485, 683, 686, 716724
concept, figure, 718
frequency band, 717
IP router, 718
local:
address, 357, 396
area network LAN., 203
COLLISION DET, 248
exchange carrier LEC., 686
flow control, 607
multipoint distribution system LMDS., 485,
683, 686, 716724
locked VT Mode, 580581
logic gates., 142
802
INDEX
INDEX
803
804
INDEX
message Continued.
specific information elements, 462
in status enquiry message, table, 461
transfer part of CCITT SS No. 7, 489
type, 470
metallic cable installations, 528
metallic raceways, 543
metasignaling, 641642
cells, 619
network functions, 642
procedures, 640
protocol, 642
requirements, 642
VCI and VPI, 642
user access:
functions, 641
signaling configuration, 641642
metric IP routing table, 397
MIB management information base., 645
tree, 742
microwave:
LOS typical Installation, 593596
rmillimeter-wave links, 595
terminal block diagram, 594
MID message ID., 602, 604
value, 626
mid-bit transition, 302
MII:
attaches to any one, 255
cables for 100BASE-T, 272
clocking, 260
connector, 260
frame:
format, figure, 260
structure, 260261
location, protocol stack, figure, 259
nibble stream, 261
minFrameSize, 228
minimum acceptable throughput, 476
mini-slot stream in the upstream, 701
misalignment due to slip, 148
misinserted cells, 650
outcome, 648
mismatch in hybrid, 159
MIT management information tree., 748
MLP multilink procedure., 372
MMPDU, 331
model of operation, 802.1, 340341
modems., 9596, 155
mode-setting commands, 4951
modes of:
operation used with HDLC, 43
service, AAL-3r4, 623
modulation:
INDEX
805
national transit:
network, 491
rtandem connection element model, ISDN,
figure, 492
NAV state, 328
NDC national destination code., 645
NDF, set to 1001, 588
NDM normal disconnected mode., 54
nearest neighbors, 178
negative:
polarity voltage, 81
ranging offset, DOCSIS, 710
threshold, 136
negotiated parameters frame relay., 456
negotiated throughput, 452
NEMA bolt hole:
size, 544
sizing and spacing, 543
network:
200 m, 262
access:
overview, 67
provider, 685
addresses, 25
allocation vector NAV., 324, 327
applications, 733
capacity, 729
clock, 730
component delays, transmission system
model 2, 274
table, 287
congestion, 402
use, CLLM, 452
connection, 25
multiplexing, 515
defect, 105
-dependent value, 457
design considerations, initial, 7
hardware, 733
layer, 2426
DOCSIS, 700
layer 3, 37
management, 25
protocol identifier, 416
loops, example condition for, figure, 699
management:
application entity, figure, 752
breakout by tasks, 728729
definition of, 727
for enterprise networks, 727755
functions of upper OSI layers, 751755
provisioning, aids in, 735739
protocols, 739749
to network information transfer, 638
806
INDEX
network Continued.
performance issues, 656
procedures for setting BECN bit, 455
protocol software, 733
recovery, 294
resource management NRM., 650
responsibilities, 459460
server, 5, 6, 359
-service data units, 25
service provider, 685
signaling protocols, 29
synchronous information payload for virtual
container, 587
topology, 36, 7
traffic, observation of, figure, 341
-transport-layer boundary, 24
usage data, 729
utilization, 733
networking with VSATs, 424429
neutral and polar waveforms, 8283
waveforms compared, figure, 83
neutral ersus bipolar bit streams, figure, 134
new bit, 467
next NEXT.:
header, 412
hop, 398
router, 397
loss, 539
for connecting hardware, 537
sequence number expected, 406
nibble at a time, 260
nibble structure of multiframe, 660
NNI:
network-network interface, 447
network-node interface, 619
NOC network operations center., 740
nodal transmit antenna, 721
noise, 97
fiber-optic receivers, 567568
spike, 81
thresholds, 101
noise burst, 292, 293
nominal burst timing, figure, DOCSIS, 712
nonassured data transfer, 628
noncompliant connections ATM., 656
nondata:
J, 301
K, 301
symbol, 298
J and K, 303
nondefault QoS, 410, 413
noninformation bits, 138
nonlinear characteristics noise., 101
nonlinear encoding, 179
nonprinting characters, 76
nonpublic data network, 203
non-return-to-zero NRZ., 83
nonuniform attenuation, 98
normal response mode NRM., 43
normalized frequencies, V.34, 181, 182
North American PCM:
hierarchy and multiplexing plan, figure, 137
system, 128
notation:
conventions 8Br10B code, 282283
OSI model, 14
notes on:
bit positions:
groups, BRI frame direction:
NT to TE, table, 498
TE to NT, table, 497
crosstalk interference, 536
NRM normal response mode., 43
NRZ binary bipolar, 570
NRZ bit streams, 134
NRZ code bits, 312
NRZ code bits, FDDI, 311
NRZ non-return-to-zero ., 83
NRZ waveform, 149
NRZI code bits, 312
NSDU network service data unit., 418
NT network termination.:
derives its timing, 505
interface, ISDN, 494
to LT 2B1Q superframe, overhead, figure,
501
NT1 network termination 1., 486
in Europe, 497
in figure, 492
NT2 network termination 2., 487
NTSC National Television System
Committee., 690
null DSAP address, 218
null function, 327
numbered supervisory functions, 219
numbering of packets, frames, blocks, 10
numbering plan identification NPI., 382, 383,
479
numerical aperture, 557, 558
Nyquist, H., 117
Nyquist:
2-bit rule, 117
intersymbol interference, 117
rate, 133
rNyquist bandwidth, 117
sampling:
rate, 191
theorem, 124
INDEX
807
808
INDEX
outlet:
connectors, 529
ports, 142
time stage, 145
out-of-sequence frames, 60
output order, 142
overall loss, 561
overflow or underflow, 147, 148
overhead:
amortize, 92
bits, ISDN BRI, 495
information, 71
versus revenue-bearing traffic, 739
overview of WEP, 323
INDEX
multiplexing, 131
sign bits, 196
switching, 139146
advantages and issues, 139140
symbol magnitudes, 197
time slots., 107, 144
word, 130
PCR peak cell rate., 657
PCS physical coding sublayer.:
carrier sense, 262
deserializes code bits received from the
PMA, 271
encapsulation, figure, 269
error sense, figure, 262
reference diagram, 270, 283
transmit function, 262
PDH plesiochronous digital hierarchy ., 137
transmission systems, ATM, 668
PDU protocol data unit.: 17, 221222,
297
checksum CLNP., 418
lifetime, 417
segment length CLNP., 418
-type field values, table, 745
PDV path delay value., 286, 288
peak cell rate, 653, 656, 657, 659, 666
peak responsivity, 566
peak traffic conditions, 68
peers., 33
entities, 15
-level communications, 515
protocol data exchanges, 208
percent efficiency value, 92
performance:
802.1d, 348349
management, 729
monitoring, 671
period of a bit, 161
periodic polling, 465
periodic switching pattern SWP., V.34, 184,
185
perishability, 364
permanent virtual circuit PVC., 7, 374, 379,
380, 437
PrF bit, 213
bit set to 1, 214
frame, 53
PH-connection, 444
PH-DATA request, 496
phase distortion, 99100, 160161
Nyquist, 117
delay distortion, 97
phase encoding of V.29 modem, table,
69
phase-locked loop design, 303
809
810
INDEX
PMA Continued.
interface, 270
service interface, 262, 279, 283
specification, 264
requirements, 306
PMD physical medium dependent .:
includes, 702
sublayers., 279
overview, 701702
specification, 702704
1-point CDV, 649
2-point CDV, 649
32-point signal constellation, V.32 modem,
figure, 173
point coordination function PCF., 324
point-to-point:
connectivity, 3, 7
data connectivity, 107108
signaling virtual channel, 641
SVCs of signaling entity, 640
polar waveforms, 8283
polarity, 570
polarization isolation, 596, 719
isolation, LMDS, 723
policing actions, 455
policing a frame relay network, 455458
poll:
poll-based approach, SNMP, 743
command, 214
frame, 47
rfinal bit, 47, 213,
PrF bit, 215
polling, 366
and contention access schemes, 428
master, 324
verification timer T392, 465
port identifier, 346
port:
parameter, 348
state information, 340
states, 347
figure, 348
portal, 318
ports, TCP identifiers, 403
positive:
clock pulses, 136
constellation points, 194
-going voltage is a 0, 85
-intrinsic-negative PIN., 566
justification operation, 588
polarity voltage, 81
portion, segmented approximation, mu-law,
figure, 132
pulse, 80
INDEX
811
812
INDEX
quarantine service, 23
quasi-omnidirectional antennas, 598
quaternary:
elements, 501
symbols every 1.5 ms, 499
queue regime, 367
Radia Perlman, 336, 631
comments, 623, 624
radio:
distance to horizon, 593
frequency spectrum as seen by a TV set,
figure, 688
horizon, 592
line-of-sight ersus optical, figure, 593
rainfall:
fading, 427
study mandatory, 721
ramp:
down time, DOCSIS, 710
time, DOCSIS, 710
random access, 6
ersus controlled access, 7
rcontention method, MAC, 289
random backoff, 330
algorithm, 332
procedure, 326
random errors, 103
ranging offset, DOCSIS, 709
rate, 571
adaption is required, 149
-based control, 453
enforcer functions, 456
sequence exchange, 178
of operation MII., 260
ray beamwidths, 595
Rayleigh scattering, 561
RD request disconnect ., 51
RD routing domain., 644
reach of the system, 683
ready state, 381
real:
circuit, 57
connection, 69
time service, 410, 413
reason for discard:
CLNP, 423
parameter values, table, 423
reassembly, 9
of fragments, 391
receive:
function, MAU, 246
Manchester-encoded, 246
INDEX
813
frame, 47
PDU, 215, 216
window, 293
to unnumbered commands, 5152
restart, ISDN, 516
restart packets, 375
retard phase, 166
retransmission interval, TCP, 403
retry, 319
return:
channel, 65
loss:
connector, 537
structural, horizontal UTP cable, worst
pair, table, 535
to repeat TRR., 304
-to-zero, 83
revenue-carrying data payload, 377
reverse address resolution protocol RARP.,
398
reversing the sense, 84
RF radio frequency.:
bandwidth wasteful, 595
channel assumptions, 694696
collision enforcement, 246
RFC request for comment. 391, 792, 400, 401
1819, 410
791 for IP4 specification, 391
RFI-NSI forwarding process, figure, 699
RI routing information., 352
field, 352353
right to transmit token bus., 292
ring:
latency, 304305
maintenance functions, 289
network, 4
transmission, FDDI, 310311
RIP routing information protocol., 399
builds table, 399
risetime, fast, 566
RNR receive not ready. frame, 47
root:
bridge, 345
designated bridge, 345
identifier, 350, 351
mean square rms. signal-to-peak impulse
amplitude ratio, 102
path cost, 346, 347
port, 338, 347, 348, 354
ROSE remote operations service element.,
TMN, 751
round-trip:
collision delay, 274, 285286
814
INDEX
round-trip Continued.
delay, 159, 425
route:
age, 398
designators, 353
routers., 356358
functions as gateway, 37
or gateway, 391
and hubs, 335
routing:
algorithms conditional statement, 358
based on cost, 399
function, 25, 397
of virtual channels, 638
information protocol RIP., 399
with IP, 398
information RI. field, FDDI, 313
loops, endless, 339
mask, 398
parameter, 346
prefix, 411
protocol, 398
and relaying, 2526, 27, 29, 515
tables, 394, 411
RR receive ready., 47
RTS request to send., 319
rCTS:
exchange, 326
frames, 327
mechanism, 327
frames, 324
figure, 322
RXD:
and GXD data bundles, 260
7:0 bundle of 8 data signals, 277
RX ER, 268
RZ return-to-zero ., 83
1s density, 175
S consecutive frames, 454
S format control field, 45
S frame supervisory frame., 45
S-format, 214
S and T functions, BRI consist of, 495
SA field, 301
SABM set asynchronous balanced mode., 49
rSABME command, 509
sampling:
rate, 133
sequence, 131
the voice channel, 124
SAP service access point., 16, 33, 34, 206, 208
identifier SAPI. 442, 512
-TEI, 512
INDEX
815
sequence errors, 47
sequence-length value, 449
sequence number SN., 65, 409
field, 321, 627
PR. and PS., 377
processing, 623
sequence numbering, 378
in HDLC, 4546
list, 46
sequenced information, 509
sequencing, 30, 31, 515
sequential write, random read, 141
serial:
bit stream, 91
format of data, 85
incoming CPCS-PDU, 631
quotient, 63
server;
intranet, 359360
managed system, 740
service:
access point SAP., 16, 206, 356, 505506,
618
identifier SAPI., 442, 512
aspects, ISDN packet service, 523525
classification for AAL, 620632
table, 621
connection-oriented, connectionless,
633637
equipment power. ground, 540
level agreement SLA., 7, 58, 471
primitives, 507
figure, 208, 507
provided to:
data-link layer, 2930
network layer, 26
serving node closer to customer, 691
SES severely errored second.:
event, 107
ratio SESR., 105
session:
address, 22
connection, 22
establishment, 23
synchronization, 22
layer, 2223
set asynchronous balanced mode SABM., 49
command, 220221
set asynchronous response mode SARM., 49
SET changes data, 742
setting:
BECN bit, 455
this bit, 441
set-top box, 717
816
INDEX
INDEX
817
818
INDEX
switching, 67
systems, 68, 368
techniques, 355
STP shielded twisted pair., 528
-A, 532
stream of alternating 1s and 0s, 80
streaming mode, 623
service, 628
strictly ordered service class, 319
stripping, 301
structure:
cell flow, 618
CLNAP-PDU, figure, 636
virtual tributary, 577581
STS space-time-space .:
switch, 146
architecture, figure, 146
STS synchronous transport symbol.:
-1 envelope capacity, 573
-1 frame structure, 572573
figure, 572
-1 path overhead POH., 574
-1 SPE:
interior, STS-1 frame. figure, 574
-1 SPE with STS-1 POH, payload capacity,
figure, 574
-3c transport overhead assignment, figure,
577
frame boundary, 666
-N frame:
figure, 576
structure, 576577
-N signal, 583
-Nc, 576
-Nc SPE, figure, 578
-Ne SPE, 577
path overhead, 581
stuffing:
bits, 575
equals justification, 138
sublayering:
AAL, 620
OSI layer 3, internetting, figure, 38
subnet:
address field, figure, 358
masks, 358
subnetwork, 24
connections, 25
independent convergence protocol SNICP.,
415
subtree, 742
subvector 1, 300
successful cell transfer outcome, 647
successive OAM cells, 650
INDEX
819
820
INDEX
INDEX
821
822
INDEX
transport Continued.
overhead, 573
channels, 576
protocols, 23
of virtual containers, 591
transporting ATM cells, 659667
transversal equalizer, 163
transversal filter, figure, 164
traps., 742
format, 743
manager, 747
transmit function requirements, CSMArCD,
figure, 247
traveling-wave tube TWT., 595
tree network extension of bus network, 3, 4
trellis:
-coded modulation TCM., 174, 177178
coding:
all data rates, 178
V.32 modem, 170
diagram, figure, 197
encoding, 179
tributary:
information, 580
signal, 573
unit group TUG., 587
unit-n, TU-n., 587
trivial file transfer, 415
troubleshooting, 732734
truncated binary exponential backoff, 231232
trunk coupling units, figure, 306
TSI time slot interchanger ., 144
TST switches., 140 144, 145
TTL time to live., 394
on routers to prevent endless loops, 394
TUBA, see CLNP, 415
TU-n pointer, 589
TV signal distribution, CATV system, 688690
twist and sway maximum, 595
2BqD, 483, 484, 485
configuration, figure, 496
customer data, 500
frames, 499
23BqD, 484, 485
30BqD, 484, 485
2B1Q, 683
coding, 499
waveform, 501
2D symbol intervals, 183
two:
contiguous bits, 74
network management protocols, 739740
-stage multiplex, figure, 590
-state information, 73
-way:
data transfer, 405
two examples of, figure, 406
digital service, 690
window turns, 453
-wire transmission, 156
ersus four-wire operation, 156158
TX EN transmit enable., 260
TX ER signal, 268
type 1:
operation commands, responses, 216217
operation parameters, 214
operation response, 218
control field bit assignments, figure, 218
type 2:
operation, 211
and parameters, 214215
types.:
code CLNP., 418, 422
field, 394
and instance, 15
optical fiber, 562563
of service, 392
and subtype field, 318
timing distortion, figure, 94
typical differential delay across voice channel,
figure, 100
typical X.25 transmissions exchange of packets,
381382
U chord, 188
U format, 214
control field, 45
U frame unnumbered frame., 45, 48
U interface, 499
ISDN, 487
U-plane, ATM, 605
UA unnumbered acknowledgement., 51, 220
Ucode, 188, 194
UDP user datagram protocol., 414415
DOCSIS, 699
datagram header, figure, 414
header, 414
-IP interface, 415
port 161, 162, 747, 745
numbers, 699
UI unit interval.:
command, 217
frame, 48, 461, 508
ULP upper layer protocol., 389, 404
connection, TCP, 403
modes, TCP, 404
INDEX
823
upstream, 682
channel characterized, 701
CM signals, 694
concept, figure, 692
demodulator input power requirements, 711
direction, 191
features, 702
electrical output, CM, 711
frequency agility, range, DOCSIS, 706
modulator must provide, 707
PMD sublayer, 706
QPSK symbol mapping, 704
RF channel transmission characteristics,
table, 696
urgency, 5960
urgent pointer, 410
usage network parameter control UPCrNPC.,
651
usage parameter control UPC., 610
use of:
DLCIs, 443
Windows, to rate-based control, 453454
useful bits, 103
user access capabilities, ISDN packet, 524
user behavior, receipt of FECN bit, 453
user congestion in popular RF bands, 595
user-data cells, 619
user data field length, 379
user datagram protocol UDP., 414415
user information, 637
ISDN, 516
user interface, UDP, 415
user-network:
access, ISDN, 484
interface UNI., 442, 459, 643
configuration and architecture, 605606
interfaces, 487
traffic contract, 654656
-to-network signaling procedures, 640
user part, CCITT SS No. 7, 489
user plane, ATM, 605
user reaction to BECN and FECN, 448
user response to congestion frame relay., 448
user unique burst parameters, DOCSIS, table,
710
user-to-user signaling configuration, 642
user-VCs belonging to, 640
utilization factor, 368
UTP unshielded twisted pair., 528
category definitions, 533
V.24 circuit nomenclature, 110
V.29 modem, 168170
824
INDEX
V.34:
definitions, 179
mode, 198
modem, 178187
operation, 179181
V.90 modem, 187200
V.110 techniques, 150
validating, sequence number, 407
variable:
binding, 745
bit rate VBR.:
services, 603
support, 631
depth interleaver, downstream, 702
-length frames, 623
size data units, 633
variants, CSMArCD, table, 233
VBR variable bit rate., 603
scenario, 622
VC-4 container, 665
VC-4-4c:
boundary, 666
path overhead, ATM cell mapping, 665
VC virtual channel .:
cross-connect, 638
-n associated with each TU-n, 590
-switching, 609
VCC endpoints, 638
VCI virtual channel identifier ., 607
fields, 609
identifies, 637, 638
ver version., 391
vertical redundancy checking VRC., 6162
virtual call, 375, 379, 459
virtual carrier sense, 326
virtual channel, 637
connection, 640
level, 637638
virtual circuit, 58, 67, 381, 446
frame relay, 435
and logical channels, 368369
virtual connection, 67, 69
virtual container VC.:
-N VC-N., 585
POH appropriate to level, 587
virtual local area network VLAN., 369
virtual path VP., 638
rvirtual channel, 671
connection VPC. operation flow F4 flow.,
619
identifier VPI., 637
level, 638639
virtual scheduling algorithm, 657
VLAN virtual local area network., 359
tag, 359
VLSIrVHSIC, 67
voice channel, 95
defined, North American, figure, 99
impairments to data transmission, 97102
limited bandwidth, 155
traversing telecommunication network,
figure, 97
voice telephony, 531
voltage level, 125
measurement, 130
VP virtual path.:
-AIS:
alarms, 671
cell detection condition, 671
cell generation conditions, 671
cells, 671
release condition, 671
performance management functions,
676677
switchrcross-connect, 638, 639
-switching, 609
and VC switching hierarchy, 640
figure, 639
VCI, PT and CLP values at the UNI, table,
608609
VPC virtual path connection.:
continuity check, 676
endpoints, 638
-FERF, 671
alarms, 671
cell detection condition, 676
cell generation condition, 676
release condition, 676
field, 609
value equals zero, 642
and VCI values, 607
VPI virtual path identifier ., 607
rVCI:
fields routing field., 607608
value used in both directions, 640
values, 646
VRC vertical redundancy checking., 61
rLRC used in tandem, 62
VSAT very small aperture terminal., 424
network, 151, 599
description, 425
disadvantages, 425426
networking, 424429
VT :
group, 577
payload:
capacity, 578
pointer, 578
INDEX
825