0% found this document useful (0 votes)
22 views50 pages

Chapter Two

Chapter Two of the document discusses the basics of telecommunication networks, focusing on various types of networks, including public and private networks, and their components. It explains the principles underlying communication networks, such as digitization and service integration, as well as the mechanisms for traffic characterization and quality of service. Additionally, it covers network elements, call setup processes, and network load parameters, including the concept of busy hours in traffic management.

Uploaded by

Boonsaa Mulataa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views50 pages

Chapter Two

Chapter Two of the document discusses the basics of telecommunication networks, focusing on various types of networks, including public and private networks, and their components. It explains the principles underlying communication networks, such as digitization and service integration, as well as the mechanisms for traffic characterization and quality of service. Additionally, it covers network elements, call setup processes, and network load parameters, including the concept of busy hours in traffic management.

Uploaded by

Boonsaa Mulataa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 50

DillaUniversity

School of
Electrical and Computer Engineering

Telecommunication Networks (ECEg-4282)

Chapter Two
Basics of Telecom Networks
Network Load Parameters

1 Timing diagrams for landline to mobile and vice versa


Introduction
The basic purpose of a
telecommunications network is to
transmit user information in any form to
another user of the network.
User information may take many forms,
such as voice, data, and video which use
different access network technologies.

2
Communication Networks
Communication networks enable users to
transfer information in the form of: voice,
video, Data, and computer files.
Users request the communication service
they need by means of networked devices
using:
 a telephone handset or cellular phone ,
set-top T V box , o r
 through applications running on a host
computer such as a PC or workstation .

3
Communication Networks Types are:

1. Telecommunication Networks
2. Computer Networks
3. Cable Television Networks and
4. Wireless Networks

4
Telecommunication Networks
A telephone network comprises:
• Switching points,
• Communications lines, and
• Telephone sets.
The telephone network is actually one great
communication system which encompasses
many different networks.
 If we consider the customers of networks and
the availability of services, there are two broad
categories:
a. Public Networks and
b. Private or Dedicated Networks.
5
a. Public Networks
Public networks are owned and managed by
telecommunications network operators.
These network operators have a license to provide
telecommunications services.
1. Public Switched Telephone Network (PSTN): is the main public
network in use.
 PSTN is the main system which forms the world’s telephone network.
 The PSTN is the system which allows any phone in the world to
connect to any other phone in the world.
2. Public Land Mobile Telephone Networks (PLMN):
 They are regional or national access networks and
connected to the PSTN for long-distance and
international connections.
 The Cellular networks connect mobile phones to the
PSTN.
6
Public Networks continued …

3. Integrated Services Digital Network (ISDN)


4. Internet
5. Radio and Television Networks: are usually
unidirectional radio distribution networks
for mass communications.

7
Private or Dedicated
Networks
 Private networks are built and designed to serve the needs
of particular organizations.
 They usually own and maintain the networks themselves.
1. Voice Communication Networks: Examples of private dedicated
voice networks are those used by the police and other
emergency services.
2. PBX Networks
 Are private networks used by companies and
organizations
 If necessary, they can be connected to the fixed line
network to connect outside the organization
3. Data Communication Networks: Data communication networks are
dedicated networks especially designed for the
transmission of data between the offices of an
organization.
8
Private Network Continued…
3. Virtual Private Networks (VPN): provides a service similar to
an ordinary private network, but the systems in the
network are the property of the network operator.
 In effect, a VPN provides a dedicated network for the
customer with the help of public network equipment.
 A virtual private network that is established over, in
general, the Internet
 It is virtual because it exists as a virtual entity within a
public network
 From the user’s perspective, it appears as a network
consisting of dedicated network links
 These links appear as if they are reserved for the VPN
clientele
 Because of encryption, the network appears to be private

9
Networking Principles:
The four principles that underlie the growth
of communication network services are:
• Digitization,
• Economies of scale,
• Network externalities, and
• Economies of scope or Service integration.
• Economies of scope , or service integration ,
refers to the fact that a network that currently
provides one set of services may be expanded to
provide new services at an additional cost that is
much less than if a separate network were built
to provide those new services.

10
Service Integration Continued …
• Economies of service integration are
possible because communications
engineers now design services in a
modular and standardized way so that new
services can be introduced using existing
hardware and software modules .
 The widespread deployment of ATM, and broadband
access over cable TV and ADSL, will facilitate service
integration to such an extent that one can imagine a
single network that will provide all of the services
that today are provided by separate networks.
 These services include telephone, data, broadcast
TV and radio, and CATV.
11
Traffic Characterization and QOS:
 Traffic Characterization describe the traffic
that the applications generate as well as
the acceptable delays and losses by the
network in delivering that trafic.
The information that applications generate
can take many forms: Text, Voice, Audio
Data, Graphics, Pictures, and Videos
Moreover the information can be:
• One-way
• Two-way
• Broadcast or
• Multi-point

12
Continued …
We classify all traffic into three types.
That is a user application can generate:
• Constant bit rate (CBR)
• Variable Bit rate (VBR) or
• A sequence of Messages with different
temporal characters tics

13
Constant Bit Rate
To transmit a voice signal, the telephone network
equipment first converts it into a stream of bits
with a constant rate of 64Kbps.
Video compression standards convert a video
signal into a bit stream with a CBR.
For instance, MPEG1 produces a poor quality
video at 1.15Mbps and a good quality at 3 MBps.
For the voice or video application to be an
acceptable quality, the network must transmit
the bit stream with a short delay and corrupt at
most a small fraction of bits.
This fraction is called the bit error rate (BER)

14
Variable Bit Rate
Some signal compression techniques
convert a signal into a bit stream that
has a variable bit rate.
For instance, MPEG2 is a family of
standards for such variable bit rate
compression of video signals.
Messages
Many user applications on a network are
implemented by processes that
exchange messages.
15
Network (Communication) Services:
 AreConnection-Oriented Service and
Connectionless Service
Connection-Oriented Service
 Setup data transfer ahead of time
(through handshaking)
 It provides:
 Reliable, in-order byte delivery
 Flow control
 Congestion control.
 Internet’s connection-oriented service is
TCP (Transmission Control Protocol).
 Applications using TCP: Email (SMTP),
16 web browsing (HTTP), and file transfer
Connection-oriented versus
Connectionless

Connectionless Services
 It provides:
unreliable data transfer
no flow control
no congestion control
 Internet’s connectionless service is UDP
(User Datagram Protocol.
 Applications using UDP: streaming media,
video conferencing, and IP telephony.

17
Network Elements
A Communication Network is a collection of
network elements interconnected and
managed to support the transfer of
information from a user at one network
location or node to a user at another node.
There are two principal network elements:
 Transmission links and
 Switches

18
Continued …
A transmission link transfers a stream of bits from
one end to the other at a certain rate with a given
bit error rate and a fixed propagation time.
Transmission systems use four basic media for
information transfer from one point to another:
1. Copper cables, such as those used in LANs and
telephone subscriber lines
2. Optical fiber cables, such as high-data-rate
transmission in telecommunications networks;
3. Radio waves, such as cellular telephones and
satellite transmission;
4. Free-space optics, such as infrared remote
controllers.

19
Basic Network Mechanism
A network bearer services comprise
the end-to-end transport of bit
streams, in specific formats over a
set of routes.
These services are differentiated by
quality:
• Speed, delay, errors.
They are produced using five basic
mechanisms:
1. Multiplexing
20
• Multiplexing combines data streams of
Continued …
2. Switching
• Switching allows us to bring together the
data streams of dispersed users.
• In telephone networks, a switch is
located in the central office.
• A link between two switches is called a
trunk.
• A link between a subscriber telephone
and a switch is called an access line or
subscriber loop.

21
Fig 2.1. A Basic Telecommunications Network
22
Continued …
3. Error Control: All transmission links
occasionally corrupt the messages they
transmit. It is therefore important for the
network to control such errors.
4. Flow control: is a mechanism that
enables the receiver to pace the
transmission of the source.

23
Continued …
5. Congestion Control: is a generic name for a set
of mechanisms designed to limit the rate or number of
packets introduced into the network by a source or a
switch. If the congestion control mechanism does not
function properly, an excessive number of may
accumulate in the switch buffers causing unacceptable
delay or loss.
6. Resource Allocation:
Because network resources (link bandwidth and
switch buffers) are shared by many applications at the
same time, resource allocation mechanisms must be
designed to ensure that each application receives the
necessary resources to maintain its quality of service.

24
Layered Architecture
An architecture is a specific way of
organizing many functions performed by a
computer network when it provides services
such as: a file transfer, e-mail, directory
services, and terminal emulation.
When protocols are arranged into layers, the
protocol entities of adjacent layers exchange
messages.
Once it gets a message, a protocol entity
performs some operations before it
transmits the message to the next protocol
entity.
25
Telephone Numbering
An international telephone connection from
any telephone to any other telephone is made
possible by unique identification of each
subscriber socket in the world.
In mobile telephone networks, each telephone
set (or subscriber card) has a unique
identification number.
The numbering is hierarchical, and it has an
internationally standardized country code at
the highest level.
This makes national numbering schemes
independent from each other.
26
International prefix
 An international prefix or international access number
is used for international calls.
 It tells the network that the connection is to be routed
via an international telephone exchange to another
country.
 The country code contains one to four numbers that
define the country of subscriber. Country codes are not
needed for national calls because their purpose is to
make the subscriber identification unique in the world.
 A telephone number that includes the country
code is called an international number and it has a
maximum length of 12 digits.
 The country codes have been defined by the ITU.

27
00 or 251 046 2207051
+

Fig 2.2. The Structure of The Telephone Number Hierarchy

28
Call set-up and release
Figure 2.3 shows a small part of a
telecommunication network. It consists of
exchanges, trunks, and subscriber lines.
 Trunks are circuits between exchanges, and
the group of trunks between a pair of
exchanges is known as a trunk group (TG).
 Subscriber lines (SLs) are circuits between a
subscriber S and the local exchange (A, B, C).
 Exchanges D and E do not have subscriber
lines and are known as intermediate, tandem,
toll, or transit exchanges.

29
Call set-up and release

30 Fig 2.3:Exchanges, trunks, and subscriber


lines.
Call set-up and release

Fig 2.4: Connections involving subscriber Sp


31
Call set-up and release
Calls:
 A call requires a communication circuit (connection)
between two subscribers.
 Figure 2.4 shows a number of connections in the
network of Fig. 2.3 that involve subscriber Sp.
 In Fig. 2.4(a), Sp is on a call with Sq who is attached to
the same exchange. Calls of this type are known as
interexchange calls.
 The circuit in case (b) consists of a temporary
path across exchange A, trunk T1, a temporary
path across exchange B, and SLr .
 The connections of Fig. 2.4 are set up (switched “on”) at
the start of a call and released (switched “off”) when the
call ends.
32
Call set-up and release
Setup and Release:
 The setup and release of connections in
telecommunication networks are triggered by signals.
Starting and ending a call involve signalling between
the subscribers and their local exchanges and, for
interexchange calls, signalling between the exchanges
along the connection.
 Figure 2.5 shows the signalling for the setup of the
connection of Fig 2.4(b).
 Subscriber Sp sends a request-for-service signal to
exchange A (by lifting the handset of a telephone) and
then signals the digits of the telephone number of Sr (with
the dial or keyset of the telephone).
 From the received number, exchange A determines that Sr
is served by exchange B, and that the call is to be routed
out on a trunk in group TG1 (Fig. 2.3).
33
Call set-up and release

34 Fig 2.5: Setup of a connection


Call set-up and release
 It then Searches for an idle trunk in this group and finds
trunk T1. Exchange A now seizes the trunk and sends a
seizure signal, followed by signals that represent digits
of the called number, to exchange B. It then sets up a
path between SLp and T1 .
 When exchange B receives the seizure signal and the
called number, it checks whether Sr is idle.
 If this is the case,it sends a ringing signal on SLr, and a
ringing tone signal on T1, to inform Sp.
 When Sr lifts the handset of the telephone , an answer
signal is sent to exchange B, which then stops the
ringing signal and the ringing tone, sets up a path
between T1 and SLr, and signals to exchange A that the
call has been answered.

35
Timing Diagram: Landline to Mobile
connection set up

36
Timing Diagram: Mobile to Landline
connection set up

37
Network Load Parameters
 Busy hour: Continuous 1-hour period lying wholly in
the time interval concerned, for which the traffic
volume or the number of call attempts is greatest.
OR
 In a day ,the 60-minute interval in which the traffic is
the highest is called the busy hour.
 Peak busy hour: The busy hour each day; it is
usually varies from day to day, or over a number of
days.
 Time consistent Busy Hour: The 1-hour period
starting at the same time each day for which the
average traffic volume or the number of call attempts
is greatest over the days under consideration.

38
Network Load Parameters
 Call Completion rate (CCR): is defined as the ratio of
the number of successful calls to the number of call
attempts.
 Busy hour call attempts (BHCA): The number of call
attempt in the busy hour is called Busy hour call
attempts (BHCA), which is an important parameter in
deciding the processing capacity of a common control or
a stored program control system of an exchange.
 Traffic intensity: The traffic on the network may be
measured in terms of the occupancy of the servers in the
network. Such a measure is called the Traffic intensity.
 A0 =Period for which a server is occupied/total
period of observation
 A0 is dimensionless and is called earlang (E).

39
Network Load Parameters
Traffic intensity is also measured in another way. This
measure is known as centum call second (CCS) which
represents a call-time product.
One CCS may mean one call for 100 seconds duration
or 100 calls for one second duration each or any
other combination.
Sometimes, call seconds (CS) and call minutes (CM)
are also used as a measure of traffic intensity.
1E=36 CCS = 3600 CS =60 CM
Grade of Service: The amount of traffic rejected by
the network is an index of the quality of the service
offered by the network. This is termed grade of
service (GOS)

40
Network Load Parameters
 It is defined as the ratio of lost traffic to
offered traffic.
Offered traffic is the product of the average
number of calls generated by the users and
the average holding time per call.
The actual traffic carried by the network is
called the Carried traffic and is the average
occupancy of the servers in the network as
given by
GOS=A-A0/A
 Where A=offered traffic
41
A0=carried traffic
Telecommunication Services
 In general, telecommunication services can classified into three
broad categories.
i. Basic Services
 Are services that everyone needs
 Ask cost

ii. Supplementary Services


 Additional services for ease of communication
 Provided without cost

iii. Value-added Services


 Additional services for effective communication
 Ask some cost
42
ii.

Based on the service type provided by the network:

 Public Switched Telephone Network (PSTN)


 Public Land Mobile Network (PLMN)
 Internet Network
 Integrated Services Digital Network (ISDN)
 Circuit Switched Public Data Network (CSPDN)
 Packet Switched Public Data Network (CSPDN)

43
Telecommunication System
Components
 All telecommunication networks are made up of five basic
elements that are present in each network environment
regardless of type or use.
 These basic components include:
 Terminals,
 Telecommunications Processors,
 Telecommunications Channels,
 Computers and
 Telecommunications Control Software.

44
Components of Telecommunication Networks Cont’d….

 Terminals:
 Input / Output Devices

 Any input or output device that is used to transmit or receive data can be

classified as a terminal element.


 are the starting and stopping points in any telecommunication network

environment.
 Telecommunication processors:
 support data transmission and reception between terminals and computers
by providing a variety of control and support functions (i.e. convert data
from digital to analog and back).

45
Components of Telecommunication Networks Cont’d….

 Processors: modems, multiplexers, front-end


processors
Front- End Processor: minicomputer manages
communication for host computer
Concentrator: computer collects messages for
batch transmission to host computer
Controller: computer controls interface between
CPU and peripheral devices
Multiplexer: allows channel to carry multiple
sources simultaneously

46
Components of Telecommunication Networks Cont’d….

 Telecommunication (Communication) channels:


 are the way by which data is transmitted and received.
 are created through a variety of media of which the most popular

include copper wires and coaxial cables.


 Fiber-optic cables are increasingly used to bring faster and more robust
connections to businesses and homes.

47
Components of Telecommunication Networks Cont’d….

 Computers:
 In a telecommunication environment computers are connected
through media to perform their communication assignments.
 Early networks were built without computers, but late in the 20 th
century their switching centers were computerized or the networks
replaced with computer networks.
 Telecommunications control software:
 is present on all networked computers and is responsible for
controlling network activities and functionality.

48
Exercises:
1. An exchange serves 2000 subscribers. If the average
BHCA is 10,000 and the CCR is 60%, calculate the busy
hour calling rate.
2. In a group of 10 servers, each is occupied for 30
minutes in an observation interval of two hours.
Calculate the traffic carried by the group.
3. A group of 20 servers carry a traffic of 10 erlangs. If
the average duration of a call is three minutes, calculate
the number of calls put through by a single server and
the group as a whole in a one-hour period.
4. A Subscriber makes three phone calls of three
minutes, four minutes and two minutes duration in a
one-hour period. Calculate the subscriber traffic in
erlangs, CCS and CM.
49
Thank
You!
50

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy