throbber
FUNDAMENTALS
`Oli
`TELECOMMUNICATIONS.
`
`IBM EX. 1024
`
`1 of 95
`
`
`
`ROGER L. FREEMAN
`
`IBM EX. 1024
`
`

`

` The texts extracted from the ITU material have been reproduced with the prior authorization of the
`
`Union as the copyright holder. The sole responsibility for selecting extracts for reproduction lies
`with the author alone and can in no way beattributed to the ITU. The complete volumes of the ITU
`material from which the texts reproduced here are extracted, can be obtained from
`
`International Telecommunication Union
`General Secetariat-~Sales and Marketing Service
`Place de Nations
`CH-1211 GENEVA 20 (Switzerland)
`Telephone: +41 22 730 51 11
`Telex: 421 000 itu ch Telegram: ITU GENEVE
`730 51 94 X.400: S = Sales; P = itu; A = Arcom: C = ch Intermet: Sales@itu.ch
`
`Fax: +41 22
`
`Asreferenced, some figures and tables throughout this text are copyrighted by The Institute of
`Electrical and Electronics Engineers, Inc. The IEEE disclaims any responsibility or liability resulting
`from the placement and use in this publication. All figures are reprinted with permission.
`As referenced, some figures and tables are copyrighted by Bellcore and are reprinted with permission.
`
`This book is printed on acid-free paper.
`
`€&
`
`Copyright © 1999 by Roger L. Freeman
`
`Published by John Wiley & Sons, Inc.
`Published simultaneously in Canada.
`Nopart of this publication may be reproduced, stored in a retrieval system or transmitted in any
`form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
`except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
`either the prior written permission of the Publisher, or authorization through payment of the
`appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA
`01923, (9783750-8400, fax (978)750-4744. Requests to the Publisher for permission should be
`addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York,
`NY 10158-0012, (212)850-6011, fax (212)850-6008, E-Mail: PERMREQ @ WILEY.COM.
`
`For ordering and customer informationcall, 1-800-CALL-WILEY.
`
`Library of Congress Cataloging-in-Publication Data:
`Freeman, Roger L.
`Fundamentals of telecommunications / Roger L. Freeman.
`p.
`cm.
`“A Wiley-Interscience publication.”
`Includes index.
`ISBN 0-471-29699-6 (cloth : alk. paper)
`1. Telecommunication,
`I. Title.
`TK5101.F6595
`1999
`621.382—dc21
`
`Printed in the United States of America.
`10987654
`
`98-4272
`CIP
`
`2 of 95
`2 of 95
`
`
`
`

`

`
`
`
`
`INTRODUCTORY CONCEPTS
`
`1.1. WHAT IS TELECOMMUNICATION?
`
`Manypeople call telecommunication the world’s most lucrative industry. If we add cel-
`lular and PCS users,! there are about 1800 million subscribers to telecommunication
`services world wide (1999). Annual expenditures on telecommunications may reach
`900,000 million dollars in the year 2000.2
`Prior to divestiture, the Bell System wasthe largest commercial company in the United
`States even though it could not be found on the Fortune 500listing of the largest com-
`panies. It had the biggestfleet of vehicles, the most employees, and the greatest income.
`Every retiree with any sense held the safe and dependable Bell stock. In 1982, Western
`Electric Co., the Bell System manufacturing arm, was number seven on the Fortune 500.
`However,if one checked the Fortune 100 Utilities, the Bell System was up on the top.
`Transferring this information to the Fortune 500, again put Bell System as the leader
`on thelist.
`We know telecommunication is big business; but whatis it? Webster's (Ref. 1) calls it
`communications at a distance. The IEEE dictionary (Ref. 2) defines telecommunications
`as “the transmission of signals over long distance, such as by telegraph,radio ortele-
`vision.” Another term we often hear is electrical communication. This is a descriptive
`term, but of somewhat broader scope.
`‘Some take the view that telecommunication deals only with voice telephony, and
`the typical provider of this service is the local telephone company. We hold with a
`wider interpretation. Telecommunication encompasses the electrical communication at
`a distance of voice, data, and image information (e.g., TV and facsimile). These media,
`therefore, will be major topics of this book. The word media (medium,singular) also is
`used to describe what is transporting telecommunication signals. This is termed trans-
`mission media. There are four basic types of medium: (1) wire-pair, (2) coaxial cable,
`(3) fiber optics, and (4) radio.
`
`1.2 TELECOMMUNICATION WILL TOUCH EVERYBODY
`
`In industrialized nations, the telephoneis accepted as a way oflife. The telephone is con- °
`nected to the public switched telecommunications network (PSTN) for local, national,
`
`IPCS, personal communication services, is a cellular-radiolike service covering a smaller operational area.
`2We refrain from using billion because it is ambiguous. Its value differs, depending on where you come
`from.
`
`3 of 95
`3 of 95
`
`
`
`

`

`INTRODUCTORY CONCEPTS
`
`_
`
`and international voice communications. These same telephone connections may also
`carry data and image information (e.g., television).
`The personal computer (PC) is beginning to take on a similar role as the telephone,
`that of being ubiquitous. Of course, as we know, the two are becoming married. In
`most situations, the PC uses telephone connectivity to obtain internet and e-mail ser-
`vices. Radio adjuncts to the telephone,typically cellular and PCS, are beginning to offer
`similar services such as data communications (including internet) and facsimile (fax), as
`well as voice. The popular press calls these adjuncts wireless. Can we consider wireless
`in opposition to being wired?
`Count the number of devices one has at homethat carry out some kind of controlling
`or alerting function. They also carry out a personal communication service. Among
`these devices are television remote controls, garage-door openers, VCR and remote radio
`and CD playercontrollers, certain types of home security systems, pagers, and cordless
`telephones. We even take cellular radios for granted.
`In some countries, a potential subscriber has to wait months or years fora telephone.
`Cellular radio, in many cases, provides a way around the problem, where equivalent
`telephone service can be established in an hour—just enough time to buy a cellular
`radio in the local store and sign a contract for service.
`The PSTN has ever-increasing data communicationstraffic, where the network is
`used as a conduit for data. PSTN circuits may be leased or used in a dial-up mode for
`data connections. Of course, the Internet has given added stimulusto data circuit usage
`of the PSTN. The PSTN seesfacsimile as just another data circuit, usually in the dial-up
`mode. Conferencetelevision traffic addsstill another flavor to PSTNtraffic and is also
`a major growth segment.
`There is a growing trend for users to bypass the PSTN partially or completely. The
`use of satellite links in certain situations is one method for PSTN bypass. Another is
`to lease capacity from some other provider. Other provider could be a power company
`with excess capacity on its microwave orfiber optic system. There are other examples,
`such as a railroad with extensive rights-of-way that are used by a fiber optic network.
`Another possibility is to build a private network using any one or a combination of
`fiber optics, line-of-sight-microwave, and satellite communications. Some private net-
`works take on the appearance of a mini-PSTN.
`
`
`
`
`
` 2
`
`1.3
`
`INTRODUCTORYTOPICS IN TELECOMMUNICATIONS
`
`An overall telecommunications network (i.e., the PSTN) consists of local networks inter-
`connected by a long-distance network. The conceptis illustrated in Figure 1.1. This is
`the PSTN, which is open to public correspondence. It is usually regulated by a gov-
`ernment authority or may be a government monopoly,although there is a notable trend
`toward privatization. In the United States the PSTN has been a commercial enterprise
`since its inception.
`
`1.3.1 End-Users, Nodes, and Connectivities
`End-users, as the term tells us, provide the inputs to the network and are recipients of
`network outputs. The end-user empioys whatis called an I/O, standing for input/output
`(device). An I/O may be a PC, computer, telephone instrument, cellular/PCS telephone
`or combined device, facsimile, or conference TV equipment. It may also be some type
`
`4 of 95
`4 of 95
`
`
`
`

`

`
`
`1.3
`
`INTRODUCTORY TOPICS IN TELECOMMUNICATIONS
`
`3
`
` Local Network
`
`Local Network
`
` Long Distance Network
`
`
`
`Local Network
`Local Network
`
`Figure 1.1. The PSTN consistsof local networks interconnected by a long-distance network.
`
`of machine that provides a stimulus to a coder or receives stimulus from a decoderin,
`say, some sort of SCADA system.?
`End-users usually connect to nodes. We will call a node a point or junction in a
`transmission system wherelines and trunks meet. A node usually carries out a switching
`function. Jn the case of the local area network (LAN), we are stretching the definition.
`In-this case a network interface unit is used, through which one or more end-users may
`be connected.
`A connectivity connects an end-user to a node, and from there possibly through other
`nodes to some final end-user destination with which the initiating end-user wants to
`communicate. Figure 1.2 illustrates this concept.
`
`To/trom other nodes
`or end users
`
` End-user
`
`End-user
`
` End-user
`
`End-user
`
`Figure 1.2.
`
`I{lustrating the functions of end-users, nodes, and connectivity.
`
`3SCADAstands for supervisory control and data acquisition.
`
`5 of 95
`5 of 95
`
`
`
`

`

`INTRODUCTORY CONCEPTS
`
`The IEEE (Ref. 2) defines a connection as “‘an association of channels, switching sys-
`tems, and other functional units set up to provide means for a transfer of information
`between two or more points in a telecommunications network.” There would seem to
`be two interpretations of this definition. First, the equipment, both switching and trans-
`mission facilities, is available to set up a path from, say, point A to point B. Assume A
`and B to be user end-points. The second interpretation would be that not only are the
`circuits available, but they are also connected and ready to pass information orare in
`the information-passing mode.
`Atthis juncture, the end-users are assumed to be telephone users, and the path that
`is set up is a speech path (it could, of course, be a data or video path). There are three
`sequential stages to a telephonecall:
`
`1. Call setup;
`2. Information exchange; and
`3. Call take down.
`
` 4
`
`Call setup is the stage wherea circuit is established and activated. The setup is facilitated
`by signaling, which is discussed in Chapter 7.4 It is initiated by the calling subscriber
`(user) going off-hook. This is a term that derives from the telephony of the early 1900s.
`It means “‘the action of taking the telephone instrument out of its cradle.” Twolittle
`knobs in the cradle pop up, pushed by a spring action, causing an electrical closure. If
`we tum a light on, we haveanelectrical closure allowing electrical current to pass. The
`same thing happens with our telephone set; it now passes current. The current source
`is a “battery” that resides at the local serving switch. It is connected by the subscriber
`loop. This is just a pair of copper wires connecting the battery and switch out to the sub-
`scriber premises and thento the subscriber instrument. The action of currentflow alerts
`the serving exchange that the subscriber requests service. When the currentstarts to
`flow, the exchange returns a dial tone, which is audible in the headset (of the subscriber
`instrument), The calling subscriber (user) now knowsthat she/he may start dialing dig-
`its or pushing buttons on the subscriber instrument. Each button is associated with a
`digit. There are 10 digits, 0 through 9. Figure 1.3 shows a telephone end instrument
`connected through a subscriber loop to a local serving exchange. It also showsthatall-
`important battery (battery feed bridge), which provides a source of current for the sub-
`scriber loop.
`If the called subscriber and the calling subscriber are in the same local area, only
`
`Battery
`feed bridge
`
` Subscriber loop
`
`Subscriber
`subset
`
`Figure 1.3. A subscriber setis connected to a telephone exchange by a subscriberloop. Note the battery
`feed in the telephoneserving switch. Distance D is the loop jength discussed in Section 5.4.
`
`4Signaling may be defined as the exchange of information specifically concerned with the establishment and
`control of connections, and the transfer of user-to-user and management information in a circuit-switched
`(e.g., the PSTN) network.
`
`6 of 95
`6 of 95
`
`
`
`

`

`
`
`1.3.
`
`INTRODUCTORY TOPICS IN TELECOMMUNICATIONS
`
`5
`
`seven digits need be dialed. These seven digits represent the telephone number of the
`called subscriber (user). This type of signaling, the dialing of the digits, is called address
`signaling. The digits actuate control circuits in the local switch, allowing a connectivity
`to be set up. If the calling and called subscribers reside in the serving area ofthat local
`switch, no further action need be taken, A connection is made to the called subscriber
`line and the switch sends a special ringing signal down that loopto the called subscriber,
`and her/his telephonerings,telling her/him that someone wishesto talk to her/him on
`the telephone. This audible ringing is called alerting, another form of signaling. Once
`the called subscriber goes off-hook (i.e., takes the telephone out of its cradle), there is
`activated connectivity, and the call enters the information-passing phase, or phase 2 of
`the telephone call.
`Whenthe call is completed, the telephones at each end are retumedto their cradles,
`breaking the circuit of each subscriber loop. This, of course, is analogous to turning off
`a light; the current stops flowing. Phase 3 of the telephone call begins. It terminates the
`call, and the connecting circuit in the switch is taken down and freed-up for another
`user. Both subscriber loops are now idle. If a third user tries to call either subscriber
`during stages 2 and 3, she/he is returned a busy-back by the exchange (serving switch).
`This is the familiar “busy signal,” a tone with a particular cadence. The return of the
`busy-back is a form of signaling called call-progress signaling.
`Suppose now that a subscriber wishesto call another telephone subscriber outside the
`local serving area of her/his switch. The call setup will be similar as before, except that
`at the calling subscriber serving switch the call will be connected to an outgoing trunk.
`As shownin Figure 1.4, trunks are transmission pathways that interconnect switches. To
`repeat: subscriber loops connect end-users (subscriber) to a local serving switch; trunks
`interconnect exchanges or switches.
`The JBEE (Ref. 2) defines a trunk as “a transmission path between exchanges or
`central offices.” The word transmission in the IEEE definition refers to one (or several)
`transmission media. The medium might be wire-pair cable, fiber optic cable, micro-
`wave radio and, stretching the imagination, satellite communications. In the conven-
`tional telephone plant, coaxial cable has fallen out of favor as a transmission medium
`for this application. Of course, in the long-distance plant, satellite communication is
`
` Subscriber Loops
`
`Trunks
`
`Subscriber Loops
`
`Figure 1.4 Subscriber loops connect telephone subscribers to their local serving exchange; trunks inter-
`connect exchanges (switches).
`
`7 of 95
`7 of 95
`
`
`
`

`

`INTRODUCTORY CONCEPTS
`
`fairly widely employed, particularly for international service. Our preceding reference
`wasfor local service.
`
`1.3.2 Telephone Numbering and Routing
`Every subscriber in the world is identified by a number, which is geographically tied to
`a physical location.5 This is the telephone number. The telephone number, as we used
`it here, is seven digits long. For example:
`
` 6
`
`234 — 5678
`
`The last four digits identify the subscriberline; the first three digits (i.c., 234) identify
`the serving switch (or exchange).
`For a moment, let’s consider theoretical numbering capacity. The subscriber number,
`those last four digits, has a theoretical numbering capacity of 10,000. Thefirst telephone
`numberissued could be 0000, the second number,if it were assigned in sequence, would
`be 0001, the third, 0002, and so on. At the point where the numbers ran out, the last
`number issued would be 9999.
`The first three digits of the preceding example contain the exchange code(or central
`office code). These three digits identify the exchange or switch. The theoretical maxi~-
`mum capacity is 1000. If again we assign numbersin sequence,the first exchange would
`have 001, the next 002, then 003, andfinally 999. However, particularly in the case of
`the exchange code, there are blocked numbers. Numbers starting with 0 may not be
`desirable in North America because 0 is used to dial the operator.
`The numbering system for North America (United States, Canada, and Caribbean
`islands) is governed by the NANP or North American Numbering Plan. Jt states that
`central office codes (exchange codes) are in the form NXX where N can be any number
`from 2 through 9 and X can be any number from 0 through 9. Numbersstarting with 0
`or 1 are blocked numbers. This cuts the total exchange code capacity to 800 numbers.
`Inside these 800 numbers there are five blocked numbers such as 555 for directory
`assistance and 958/959 for local planttest.
`When long-distance service becomes involved, we must turn to using still an addi-
`tional three digits. Colloquially we call these area codes, In the official North American
`terminology used in the NANP is NPA for numbering plan area, and we call these area
`codes NPA codes. We try to assure that both exchange codes and NPA codes do not
`cross political/administrative boundaries. Whatis meant here are state, city, and county
`boundaries. We have seen exceptions to the county/city rule, but not to the state. For
`example, the exchange code 443 (in the 508 area code, middle Massachusetts) is exclu-
`sively for the use of the town of Sudbury, Massachusetts. Bordering towns, such as
`Framingham,will not use that number. Of course, that exchange code number is meant
`for Sudbury’s singular central office (local serving switch).
`Thereis similar thinking for NPAs(area codes). In this case it is that these area codes
`may notcross state boundaries. For instance, 212 is for Manhattan and may notbe used
`for northern New Jersey.
`Return now to our example telephonecall. Here the calling party wishes to speak
`
`5This will change. At least in North America, we expect to have telephone number portability. Thus,
`whenever one moves to a new location, she/he takes her/his telephone number with them. Will we see
`a day when telephone numbersare issued at birth, much like social security numbers?
`
`8 of 95
`8 of 95
`
`
`
`

`

`
`
`1.3
`
`INTRODUCTORY TOPICS IN TELECOMMUNICATIONS
`
`7
`
`
`Exchange
` 447
`
`
`Calling subscriber
`8765
`
`Figure 1.5 Example connectivity subscriber-to-subscriber through two adjacent exchanges.
`
`Called subscriber
`
`to a called party that is served by a different exchange (central office).6 We will assign
`the digits 234 for the calling party’s serving exchange: for the called party’s serving
`exchange we assign the digits 447. This connectivity is shown graphically in Figure 1.5,
`Wedescribed the functions required for the calling party to reach her/his exchange. This
`is the 234 exchange. It examines the dialed digits of the called subscriber, 447-8765.
`To route the call, the exchange will only work uponthe first three digits. It accesses
`its local look-up table for the routing to the 447 exchange and takes action upon that
`information. An appropriate vacant trunk is selected for this route and the signaling for
`the call advances to the 447 exchange. Here this exchange identifies the dialed number
`as its own and connectsit to the correct subscriber loop, namely, the one matching the
`8765 number. Ringing current is applied to the loop to alert the called subscriber. The
`called subscriber takes her/his telephone off-hook and conversation can begin. Phases
`' 2 and 3 ofthis telephone call are similar to our previous description.
`
`1.3.3 Use of Tandem Switches in a Local Area Connectivity
`Routing through a tandem switch is an important economic expedient for a telephone
`company or administration. We could call a tandem switch a traffic concentrator. Up to |
`now wehavediscussed direct trunk circuits. To employa directtrunk circuit, there must
`be sufficienttraffic to justify such a circuit. One reference (Ref. 3) suggests a break point
`of 20 erlangs.’ For a connectivity with traffic intensity under 20 erlangs for the busy
`hour (BH), the traffic should be routed through a tandem (exchange). For traffic inten-
`sities over that value, establish a direct route. Direct route and tandem connectivities
`are illustrated in Figure 1.6.
`
`1.3.4 Busy Hour and Grade of Service
`The PSTNis very inefficient. This inefficiency stems from the numberof circuits and
`the revenue received per circuit. The PSTN would approach 100% efficiency if all the
`circuits were used all the time. The fact is that the PSTN approaches total capacity
`utilization for only several hours during the working day. After 10 P.M. and before 7
`A.M. capacity utilization may be 2% or 3%.
`The network is dimensioned (sized) to meet the period of maximum usage demand.
`
`6The term office or central office is commonly used in North America for a switch or an exchange, The
`terms switch, office, and exchange are synonymous.
`7The erlang is a unit oftraffic intensity. One erlang represents one hour ofline (circuit) occupancy.
`
`9 of 95
`9 of 95
`
`
`
`

`

`INTRODUCTORY CONCEPTS
`
`
`Exchange Direct route
`
`
` Exchange
`
`Exchange
`
` &
`
`Figure 1.6 Direct route and tandem connectivities,
`
`This periodis called the busy hour (BH). There are two periods wheretraffic demand on
`‘the PSTN is maximum-—one in the morning and onein the afternoon. This is illustrated
`in Figure 1.7.
`Note the twotraffic peaks in Figure 1.7. These are caused by business subscribers.If
`the residential and business curves were combined, the peaks would be much sharper.
`Also note that the morning peak is somewhat moreintense than the afternoon busy hour.
`In North America (i.e., north of the Rio Grande river), the busy hour BH is between
`9:30 A.M. and 10:30 A.M. Because it is more intense than the afternoon high-traffic
`period, it is called the BH. There are at least four distinct definitions of the busy hour.
`We quote only one: “That uninterrupted period of 60 minutes during the day when the
`traffic offered is maximum.” Other definitions may be found in (Ref. 4).
`BHtraffic intensities are used to dimension the numberoftrunks required on a con-
`nectivity as well as the size of (a) switches) involved. Now a PSTN company (admin-
`istration) can improve its revenue versus expenditures by cutting back on the number
`
`Traffic
`
`Time
`
`——————— Residential subscribers
`«mame Business subscribers
`
`Figure 1.7 The busy hour.
`
`10 of 95
`10 of 95
`
`
`
`

`

`1.3
`
`INTRODUCTORY TOPICS IN TELECOMMUNICATIONS
`
`9
`
`of trunks required and making switches “smaller.” Of course, network users will do a
`lot of complaining about poorservice. Let’s just suppose the PSTN does just that—cuts
`back on the numberofcircuits. Now, during the BH period, a user may dial a number
`andreceive either a voice announcementor a rapid-cadence tone telling the userthat all
`trunks are busy (ATB) andto try again later. Fromatechnical standpoint, the user has
`encountered blockage. This would be due to one of two reasons, or may be due to both
`causes. These are: insufficient switch capacity and not enough trunks to assign during
`‘the BH. There is a more in-depth discussion of the busy hour in Section 4.2.1.
`Networks are sized/dimensioned for a traffic load expected during the busy hour.
`The sizing is basedon probability, usually expressed as a decimalor percentage. That
`probability percentage or decimal is called the grade of service. The IEEE (Ref. 2)
`defines grade of service as “the proportion oftotal calls, usually during the busy hour,
`that cannot be completed immediately or served within a prescribed time.”
`Grade of service and blocking probability are synonymous. Blocking probability
`objectives are usually stated as B = 0.01 or 1%. This means that during the busy hour
`1 in 100 calls can be expected to meet blockage.
`
`
`
`1.3.5 Simplex, Half-Duplex and Full Duplex
`These are operational terms, and they will be used throughoutthis text. Simplex is one-
`way operation; there is no reply channel provided. Radio andtelevision broadcasting
`are simplex. Certain types of data circuits might be based on simplex operation.
`Half-duplex is a two-way service. It is defined as transmission overa circuit capable
`of transmitting in either direction, but only in one direction at a time.
`Full duplex orjust duplex defines simultaneous two-way independent transmission on
`a circuit in both directions. All PSTN-type circuits discussed in this text are considered
`using full duplex operation unless otherwise specified.
`
`1.3.6 One-Way and Two-Way Circuits
`Trunks can be configured for either one-way or two-way operation.’ A third option is
`a hybrid, where one-way circuits predominate and a number of two-way circuits are
`provided for overflow situations. Figure 1.8a shows two-way trunk operation. In this
`case any trunk can beselected for operation in either direction. The insightful reader
`will observe that there is somefair probability that the same trunk can be selected from
`either side of the circuit. This is called double seizure. It is highly undesirable. One way
`to reduce this probability is to use normal trunk numbering (from top down) on oneside
`of the circuit (at exchange A in the figure) and to reverse trunk numbering (from the
`bottom up) at the opposite side of the circuit (exchange B).
`Figure 1.86 shows one-way trunk operation. The upper trunk group is assigned for
`the direction from A to B and the lower trunk group for the opposite direction, from
`exchange B to exchange A. Here there is no possibility of double seizure.
`Figure 1.8c illustrates a typical hybrid arrangement. The upper trunk group carries
`traffic from exchange A to exchange B exclusively. The lowest trunk group carries traf-
`fic in the opposite direction. The small, middle trunk group contains two-way circuits.
`Switches are programmedto select from the one-waycircuitsfirst, until all these circuits
`become busy, then they may assign from the two-waycircuit pool.
`Let us clear up some possible confusion here. Consider the one-way circuit from A
`
`8Called both-way in the United Kingdom and in CCITT documentation.
`
`11 of 95
`11 of 95
`
`
`
`

`

`Exchange|<———————_—__> Exchange
`A
`:
`>
`B
`
`10
`
`INTRODUCTORY CONCEPTS
`
`
`
`
`
`
`
`Exchange |[*____________*| Exchange
`A
`<—_____-—_——>
`B
`
`Exchange |}«—_————_—____>| Exchange
`A
`<_ __ B
`
`(c) Hybrid Operation
`
`Figure 1.8 Two-way and one-waycircuits: two-way operation (a), one-way operation (6), and a hybrid
`scheme, a combination of one-way and two-way operation (c).
`
`to B, for example. In this case, calls originating at exchange A bound for exchange B
`in Figure 1.85 are assigned to the upper trunk group. Calls originating at exchange B
`destined for exchange A are assigned from the pool of the lower trunk group, Do not
`confuse these concepts with two-wire and four-wire operation, discussed in Chapter 4,
`Section 4.4.
`
`1.3.7 Network Topologies
`
`The IEEE (Ref. 2) defines topology as “the interconnection pattern of nodes on a net-
`work.” We can say that a telecommunication network consists of a group of intercon-
`nected nodes or switching centers. There are a numberof different ways we can inter-
`connect switches in a telecommunication network.
`If every switch in a network is connected to all other switches (or nodes) in the
`network, we call this “pattern” a full-mesh network. Such a network is shown in Figure
`1.9a. This figure has 8 nodes.?
`
`*The readeris challenged to redraw the figure adding just one node for a total of nine nodes. Then add a
`tenth and so on. The increasing complexity becomes very obvious.
`
`12 of 95
`12 of 95
`
`
`
`

`

`
`
`11
`
`1.3
`
`INTRODUCTORY TOPICS IN TELECOMMUNICATIONS
`
`
`
`Figure 1.92 A full-mesh network connecting eight nodes.
`
`In the 1970s, Madrid (Spain) had 82 switching centers connected in a full-mesh net-
`work. A full-mesh network is very survivable because of a plethora of possible alter-
`native routes.
`Figure 1.9b shows a star network. It is probably the least survivable. However, it
`is one of the most economic nodal patterns both to install and to administer, Figure
`1.9¢ shows a multiple star network. Of course weare free to modify such networks by
`adding direct routes. Usually we can apply the 20 erlang mule in such situations. If a
`certain traffic relation has 20 erlangs or more of BHtraffic, a direct route is usually
`justified. The term traffic relation simply meansthetraffic intensity (usually the BH
`traffic intensity) that can be expected between two knownpoints. For instance, between
`Albany, NY, and New York City there is a traffic relation.!° On that relation we would
`probably expect thousands of erlangs during the busy hour.
`Figure 1.9d showsa hierarchical network.It is a natural outgrowth ofthe multiple star
`network shown in Figure 1.9c. The PSTNsof the world universally used a hierarchical
`network; CCITT recommended such a network for international application. Today there
`is a trend away from this structure or, at least, there will be a reduction of the number
`oflevels. In Figure 1.9d there are five levels. The highest rank or order in the hierarchy
`
`B
`
`C
`
`E
`F
`Figure 1.95 A star network.
`
`‘Albany is the capital of the state of New York.
`
`13 of 95
`13 of 95
`
`
`
`

`

`12
`
`INTRODUCTORY CONCEPTS
`
`
`
`Figure 1.9¢ A higher-order or multiple star network. Note the direct route between 2B; and 282. There
`
`recommended network wasvery similar.
`is anotherdirect route between 345 and 34g.
`
`Figure 1.9d A typical hierarchical network. This was the AT&T network around 1988. The CCITT-
`
`14 of 95
`14 of 95
`
`
`
`

`

`
`
`1.3.
`
`INTRODUCTORYTOPICS IN TELECOMMUNICATIONS
`
`13
`
`is the class 1 center (shownas 1 in the figure), and the lowest rank is the class 5 office
`(shown as 5 in the figure). The class 5 office (switch), often called an end office, is the
`local serving switch, which was discussed previously. Remember that the term office is
`a North American term meaning switching center, node, or switch.
`In a typical hierarchical network, high-usage (HU) routes maybeestablished, regard-
`less of rank in the hierarchy, if the traffic intensity justifies. A high-usage route or con-
`nectivity is the same as a direct route. We tend to use direct route when discussing the
`local area and we use high-usage routes when discussing a long-distanceor toll net-
`work.
`
`1.3.7.1. Rules of Conventional Hierarchical Networks. One will note the back-
`‘bone structure of Figure 1.9d. If we remove the high-usage routes (dashed lines in the
`figure), the backbone structure remains. This backboneis illustrated in Figure 1.10. In
`the terminology of hierarchical networks, the backbone represents the final route from
`which no overflow is permitted.
`Let us digress and explain what we mean by overflow.It is defined as that part of the
`offered traffic that cannot be carried by a switch over a selected trunk group. It is that
`traffic that met congestion, what was called blockage earlier. We also can have overflow
`of a buffer (a digital memory), where overflow just spills, and is lost.
`In the case of a hierarchical network, the overflow can be routed over a different
`route. It may overflow on to another HU route or to the final route on the backbone
`(see Figure 1.10).
`A hierarchical system of routing leads to simplified switch design. A common expres-
`sion used-when discussing hierarchical routing and multiple star configurations is that
`lower-rank exchanges home on higher-rank exchanges. If a call is-destined for an
`exchange of lower rank in its chain, the call proceeds down the chain. In a similar
`
`Subscriber
`
`Subscriber
`
`Figure 1.10 The backbone of a hierarchical network. The backbone traces the final route.
`
`15 of 95
`15 of 95
`
`
`
`

`

`INTRODUCTORY CONCEPTS
`
`manner,if a call is destined for another exchange outside the chain (the opposite side of
`Figure 1.9d), it proceeds up the chain and across. When high-usageroutes exist, a call
`may be routed on a route additional or supplementary to the pure hierarchy, proceeding
`to the distant transit center and then descending to the destination.!! Of course, at the
`highest level in a pure hierarchy, the call crosses from one chain over to the other. In
`hierarchical networks only the order of each switch in the hierarchy and those

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket