throbber
T H E
`
`1 • •
`
`EDITORS -IN -CHIEF
`Kornel Terplan
`Patricia Morreale
`
`Cg.0 CRC PRESS
`
`Q IEEE PRESS
`
`A CRC Handbook Published in Cooperation with IEEE Press
`
`s
`
`-~
`~ ~~
`~~t ,,~~
`
`~,
`~~
`
`3g
`
`~I
`~'~ ~~,
`
`Bright House Networks - Ex. 1047, Page 1
`
`

`
`Library of Congress Cataloging-in-Publication Data
`
`The telecommunications handbook /edited by Kornel Terplan, Patricia Morreale.
`p, cm.
`Includes bibliographical references and index.
`ISBN 0-8493-3137-4 (hc.: alk. paper)
`1. Telecommunication —Handbooks, manuals, etc.
`I. Terplan, Kornel. II. Morreale, Patricia.
`TK5101.T355 1999
`384--dc21
`
`99-044580
`CIP
`
`This book contains information obtained from authentic and highly regarded sources. Reprinted material is
`quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts
`have been made to publish reliable data and information, but the author and the publisher cannot assume
`responsibility for the validity of all materials or for the consequences of their use.
`
`Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or
`mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval
`system, without prior permission in writing from the publisher.
`
`All rights reserved. Authorization to photocopy items for internal or personal use, or the personal or internal
`use of specific clients, may be granted by CRC Press LLC, provided that $.50 per page photocopied is paid
`directly to Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923 USA. The fee code for
`users of the Transactional Reporting Service is ISBN 0-8493-3137-4/00/$0.00+$.50. The fee is subject to
`change without notice. For organizations that have been granted a photocopy license by the CCC> a separate
`system. of payment has been arranged.
`
`The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating
`new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such
`copying.
`
`Direct all inquiries to SRC Press LLC> 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431.
`
`'I~aderr►ark I~totice: Product or corporate names may be trademarks or registered trademarks, and are used
`only for identification and explanakion, without intent to infringe.
`
`O 2000 by CRC Press LLC
`
`No claim to original U.S. Government works
`International Standard Book Number Q-8493-3137-4
`Libz•ary of Congress Card Number 99-044580
`Printed in the Unitefl States of America 2 3 A 5 6 7 8 9 0
`Printed on acid-free paper
`
`Bright House Networks - Ex. 1047, Page 2
`
`

`
`1-2
`
`The Telecommunications Handbook
`
`• Deregulation and privatization
`• Communication convergence
`• Customer orientation
`
`Growth of the Global Telecommunications Market
`
`Explosive expansiozi driven by internal growth and acquisition is forcing telecommunications providers
`to increase the productivity of their current support systems. Growth and acquisition mean that the
`number of subscribers grows for existing services, new services are provisioned on existing intrastructures,
`and completely new services on new infrastructures are deployed or acquired. Several support systems
`vendors have worked to capitalize on this opportunity with solutions that reduce complexity. These
`support systems vendors do not usually replace existing systems, but add functionality to accommodate
`new services, such as:
`
`• Internet, intranets, and extranet
`• Special data services on top of voice networks
`• Wireless services and fixed wireless services
`• Cable and video services
`• Voice services on top of data networks
`
`Adding functionalitiesthat intemperate with each other opens new business opportunities for support
`systems vendors. The coming years will experience a bitter competition between circuit- and packet-
`switched services. Tradition, stability, and quality of existing services will compete against new technol-
`ogies with easier maintenance and reduced operating expenses. The transition from circuit-switched to
`packet-switched technologies may take decades.
`
`Increasing Network Complexity
`
`As a result of customer expectations, the time-to-market of new services is extremely short. Incumbent
`and new telecommunications service providers do not have the time to build all new infrastructure, but
`combine existing and new infrastructures, such as copper, fiber, and wireless. They deploy emerging
`services on the basis of a mixture of infrastructures as an overlay. New services use emerged and emerging
`technologies, such as:
`
`Emerged technologies: voice networks, ISDN, circuit switching, packet switching, message switch-
`ing, frame relay, Fast Ethernet, Fast Token Ring, and FDDI/CDDI.
`• Emerging technologies: ATM, mobile and wireless, SMDS, Sonet/SDH, cable, xDSL, and B-ISDN.
`
`Each of these technologies has its own support system solutions. The only elements in Public Switched
`Telephone Networks (PSTN) that should be managed are the switches themselves. On average, the ratio
`of managed elements to subscriber lines is around 1:10,000. The advent of distributed, software-based
`switchizlg and transmission has created a large number of additional managed elements, about one for
`each S00 subscriber lines. Moreover, multiple elements per subscriber in digital loop carrier systems,
`digital cellular networks, or hybrid fiber/coax systems may cause an explosion in terms of managed
`elements. As a result, the size of configuration databases and event messages generated by more intelligent
`network elements have grown exponentially over the last 2U years.
`Growth in the ntmzber of network elements has been accompanied by an increase in the complexity
`of items to be managed. Sonet/SDH, ATM, and digital wireless are highly complex, with a high degree
`of interdependence among network elements. This in turn snakes service activation and fault isolation
`a challenge, especially as the number of service providers increases. As networks shift from lower-speed,
`dedicated-rate, and inflexible services to mobile, fully configurable, bandwidth-on-demand, and high-
`speed services, support systems must adapt to this new situation.
`
`Bright House Networks - Ex. 1047, Page 3
`
`

`
`ications Handbook
`
`Telecommunications Services, Regulation, and Standardization
`
`~-3
`
`When services are offered in combination, support systems should be modified, re-engineered, and
`connected to each other. This opens new business opportunities for support systems vendors.
`The introduction of standards for support systems is accelerating the demand for third-party support
`systems. Legacy systems are primarily proprietary systems not integrated across functional areas. Service
`providers depend upon custom development by internal development staff and outside integrators to
`connect various support systems. The introduction of technology standards, such as Telecommunication
`Management Network (TMN), Distributed Communication Object Model (DCOM), Common Object
`Request Broker Architecture (COBRA), Telecommunications Information Networking Architecture
`(TINA), and Web-Based Enterprise Management (WBEiVI) have begun to gain critical support by new
`support systems vendors.
`The implementation of standard gateways enables interaction between newer client/server solutions
`and existing legacy systems, easing interoperability among all support systems. In particular, TMN may
`help to streamline support system processes and to position support systems.
`
`Deregulation and Privatization
`Telecommunications service corripetition began in the 1980s in the U.S., led by MCI with three operating
`support systems playing a key role. The AT&T divestiture in 1984 marked a major breakthrough. The
`second significant milestone was the Telecom Act of 1996. As telecom deregulation continues, with
`Regional Bell Operating Companies (RBOCs) actively pursuing the long-distance market and long-
`distance carriers moving into local services, major support systems re-engineering efforts are expected.
`Under the pressure of the European Commission (EC), Europe is in the process of deregulation and
`privatization. It is a much slower process than in the U.S., because multiple countries are involved with
`their own agenda. InteroperaUility of support systems is more difficult than in the U.S.; but at the same
`time, it offers opportunities for support systems vendars. It is assumed that Asia/Pacific, South America,
`Eastern Europe, and Africa will follow this deregulation and privatization trend.
`Competition is everywhere —long distance, local exchange, ISP, cable, and wireless. In many cases,
`support systems are the differentiators. The best opportunities are seen with Competitive Local Exchange
`Carriers (CLECs). Suppart systems requirements vary quite substantially from carrier to carrier. As a
`result, CLECs support system strategies are ranging from internal development, to outsourcing, to systems
`integrators, and to third-party software/service providers. CLECs could be small or medium sired, with
`or without facilities. In all cases, they must intemperate with Incumbent Local Exchange Carriers (ILECs)
`by opening the support systems to permit access by CLECs in various phases of provisioning and artier
`processing and service activation. Key issues are:
`
`• Local Number Portability (LNP): This allows customers to retain their telephone numbers even if they
`change service providers. It is not only the telephone number that is impartant; customers also typically
`want to retain access to advanced features they have come to expect from an intelligent network.
`Extranets connecting support systems of ILECs and CLECs: II.,ECs are required to provide access
`to information on five classes of support systems. They are preordering, ordering, provisioning,
`repair, and maintenance.
`•Directory services: Real-time service processing requires additional customer-related data. The
`expanded directory role includes end-user authoz•ization and authentication. It also includes the
`real-time allocation of network resources according to a user's class of service and other policy-
`basedvariables. Directory Enabled Networks (DEN) promise to increase momentum for directary
`services by bringing physical infrastructures under the directory umbrella and tackling the stan-
`dardization of directory information.
`•Fraud management: Offering multiple services that are accessible by user-friendly interfaces
`increases the risks of penetration. Service providers agree that up to 5% of their revenues is lost
`as a result of fraud. Real-time surveillance systems combined with customer• analysis features of
`billing systems may help redcice fraud risks to a reasonable minimum.
`
`nunications providers
`isition mean that the
`:istingintrastructures,
`veral support systems
`ice complexity. These
`ality to accommodate
`
`~ortunities for support
`circuit- and packet-
`against new technol-
`>m circuit-switched to
`
`nely short. Incumbent
`iew infrastructure, but
`Chey deploy emerging
`emerged and emerging
`
`thing, message switch-
`
`le, sDSL, and B-ISDN.
`
`:nts in Public Switched
`>. On average, the ratio
`buted, software-based
`lements> about one for
`1 loop carrier systems,
`in terms of managed
`ited by more intelligent
`
`-ease in the complexity
`lex, with a high degree
`:ion and fault isolation
`shift from lower-speed,
`on-demand, and high-
`
`Bright House Networks - Ex. 1047, Page 4
`
`

`
`C~;
`
`~~
`
`1-8 The Telecommunications Handbook
`
`In reality, there may be multiple parties (and supplier—customer relationships) at each layer of the
`service value model. Also, some regulatory environments in countries use the term enhanced services,
`rather than value-added services. What exactly is meant by enhanced services depends on the country.
`Since the regulatory Environments for enhanced services are often more relaxed than for basic data
`transfer services, there is an incentive for sLippliers of teleconununications services to by to categorize
`as many services as possible in the enhanced services category. That ~vay the regulation for providing
`that service would be much less strict. An example of such a loophole in the legislation is the use of
`different protocols, such as Internet Protocol, to send voice over a private line. The resulting voice-
`connection service looks exactly the same to the end usez-s, but the transmission protocol is different.
`Soz1~e regulatory environments see the translatioxi of acircuit-oriented connection into packets, giving
`each of the packets its own path for transport, as an enhancement and therefore call it (e.g., in the U.S.)
`"enhanced service:'
`
`1.1.1.4 Examples of Services
`The service value model already shows several examples of services in the rightmost column. Some
`services are addressed here in more detail as they are often used in industry. First of all, the standard
`telephone service is addressed. A more precise name for that service is Public Switched Telephone Network
`(PSTN). The PS'I'N is the most extensive in the world and allows people with a telephone set to speak
`with each other. In recent years, the PSTN has also been used for transmission of faxes (images from
`paper converted into data) and data (via modems). Btiit, in essence, the PSTN service still transmits
`sounds between PSTN connections in the world. 'These connections are highly standardized and various
`kinds of telephone sets can be used ii1 almost all parts of the world. Tn the service value model, we regard
`PSTN as a basic data transfer service.
`Integrated Services Digital Network (ISDN) is a service that is less ubigtritous, and one that has become
`popular in recent years. The most important difference is that the circuit between the parties that are
`connected is digital rather than analog. It can therefore transmit more than just sotmds and is much
`more efficient in transporting data signals. In one view it replaces Che existing PSTN service, bLit in other
`views it adds a series of services to PSTN, which are quite different from anything that PSTN can offer.
`The new services are based nn transport of data. Not only can data be transported very fast (t~asic rate
`ISDN is 144 kb/s), but data can also be sent while the ISDN circuits are in use, and therefore additional
`end-user services can be performed, such as call waiting, calling line identification, ai d transmittal of
`packet-oriented data (such as Internet traffic). Most regulatory environments stIll do not characterize
`ISDN as a value-added service and therefore it fits in the "basic data transfer service" category of our
`model.
`An example of a value-added service would be the virtual private network service, which connects
`users in different locations with each other, so thlt they seem to work in a "closed user group:' Working
`in a dosed user group, they can call each other with short extension numbers and t11ey can use different
`features of telephones, that are usually available for the users of phone extensions in businesses connected
`to a private branch exchange (PBX). There is also a "data version" of flee virtual private network, which,
`just like that described in the voice example, forms a closed user group exchanging data.
`Other examples of basic data transfer services are the services meant for the transport of pure data,
`such as leased lines (supplying a permanent circuit) or packet-switched service (supplying transport of
`packets of information).
`An example of an infrastructure service is dark fiber service. This service is not yet widely offered, but
`gives operators the capability of completely controllizig the transmission technology on both ends of a
`fiber and also reaches efficiencies by using types of equipment that make maximum use of the fibers.
`Figure 1.3 shows an example of actual supplier—customer relationships, mapped on the service value
`model. Chosen is an example of a multiple country situation, to make it clear that operatars can operate
`across borders. Infrastructure operators are most often active across international borders, as they have,
`for a long time, formed an actual bottleneck for communication and had to supply service across borders
`
`Bright House Networks - Ex. 1047, Page 5
`
`

`
`nicntions Handbook
`
`Telecommunications Services, Kegulntion, and Stnndnrdization
`
`1-9
`
`~s) at each layer of the
`erm enhanced services,
`spends on the country.
`~d than for basic data
`yes to try to categorize
`gulation for providing
`~gislation is the use of
`~. The resulting voice-
`n protocol is different.
`~n into packets, giving
`gall it (e.g., in the U.S.)
`
`htmost column. Some
`rst of all, the standard
`led Telephone Network
`telephone set to speak
`of faxes (images from
`service still transmits
`ndardized and various
`value model, we regard
`
`id one that has become
`en the parties that are
`t sounds and is much
`N service, but in other
`g that PSTN can offer•.
`ed very fast (basic rate
`id therefore additional
`on, and transmittal of
`ill do not characterize
`~rvice" category of our
`
`~rvice, which connects
`t user group." Working
`t they can use different
`1 businesses connected
`rivate network, which,
`ag data.
`z•ansport of pure data,
`supplying transport of
`
`yet widely offered, but
`ogy on both ends of a
`um use of the fibers.
`'d on the service value
`operators can operate
`borders, as they have,
`service across borders
`
`Gad uses
`
`International
`organization
`field office (a
`
`,______
`
`_
`
`VPN
`Servic s
`
`Country A
`
`Country B
`
`International organiz~Iion (b) _~
`
`V lue Added Services ~
`
`— —
`
`"I'clec~m,
`Operators,
`Value i\tided
`Service I rovider Operator!
`or resellers
`Value Added
`Service
`rove er ~c)— ~
`sei ices
`
`Value Added
`Service Provider d
`
`Internet
`Service Provider (i)
`
`Basic D to Transfer Services
`
`Operator (e)
`
`Operator (f)
`
`Infrastructure Services
`Infrastructure operator (g) ~ Infrastructure operator (h)
`
`7~clecom
`Operata~s
`
`lntrastructtu c
`operatcns
`
`FIGURE 1.3 Example of supplier-customer relationships anappecl on the service value model.
`
`as a mandate by their governments. Infrastructure operators are at the bottom of the service value model
`for the actual owner and manager of the border, crossing links. Some value-added service pz•ovideis ti•y
`to become "international" by offering "managed services," e.g., at the value-added services level, such as
`the value-added service provider (d) that operates in both country A and country B and therefore
`maintains relationships with both infrastructure operators (g) and (h). ~Che service value model hez~e
`helps to understand the relationships between the parties that enable the operation of the international
`network. In Figure 1.3, both the end-customer organization (the multinational organization, b) and
`value-added service provider operate across international borders.
`
`Standardization of Services
`Telecominunicatious services cazi be categorized by their use (e.g., video sez-vices, voice services, and data
`services). The function of the service is sometimes even used to describe the service, but that can lead
`to various misinterpretations, Telephone service, for instance, is ~ term that is often used, but when looking
`at different countries quid networks, many services cai~ be identified that could be mined telephone
`service. This includes telephone service with a certain technical interface between the telephone (an often-
`used typz of terniinal) and the central office location of the providEr of the services. Telephone services
`could be provided using, for izistance, an IST~N network, or a TCP/IP` network Some services are
`standardized and named such that a wide audience knows what the service is exactly at~d may use it with
`standardized equipment and peripherals that connect well with the networks. More on standardization
`foIlows in Sectiozi 1,3 of the Handbook.
`
`1.11.5 Quality of Service
`
`Quality of service is an important aspect of a telecommunications service. Quality of service [Cole, 1991;
`Frieden, 1996] was measured the very first time that networks were made available, Uut as there was
`often only a single supplier in the country, quality of service was measured and reported to the government
`organization responsible for the network, and that was it. Of course, there were certain quality of service
`levels that were required in many countries, because of the importance of the network for, e.g., emergenry
`calls. During the 1980s and 1990s, a more detailed system for measuring quality of service was established
`
`"TCP/IP =Transaction Control Protocol/Internet Protocol.
`
`Bright House Networks - Ex. 1047, Page 6

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket