Professional Documents
Culture Documents
TE
AM
FL
Y
book
Access Technologies:
DSL and Cable
Executive Briefings in
Key Technologies
McGraw-Hill
New York Chicago San Francisco Lisbon London
Mexico City Milan New Delhi San Juan Seoul
Singapore Sydney Toronto
Madrid
abc
McGraw-Hill
Copyright 2002 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured
in the United States of America. Except as permitted under the United States Copyright
Act of 1976, no part of this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the prior written permission
of the publisher.
ISBN 0-07-138247-X
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol
after every occurrence of a trademarked name, we use names in an editorial fashion only,
and to the benefit of the trademark owner, with no intention of infringement of the trademark.
Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales
promotions, or for use in corporate training programs. For more information, please contact
George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069.
TERMS OF USE
This is a copyrighted work and The McGraw-Hill Companies, Inc. (McGraw-Hill) and its
licensors reserve all rights in and to the work. Use of this work is subject to these terms.
Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one
copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify,
create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hills prior consent. You may use the work
for your own noncommercial and personal use; any other use of the work is strictly prohibited.
Your right to use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED AS IS. McGRAW-HILL AND ITS LICENSORS MAKE
NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR
COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK,
INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE
WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY
WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or
error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting
therefrom. McGraw-Hill has no responsibility for the content of any information accessed
through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for
any indirect, incidental, special, punitive, consequential or similar damages that result from
the use of or inability to use the work, even if any of them has been advised of the possibility
of such damages. This limitation of liability shall apply to any claim or cause whatsoever
whether such claim or cause arises in contract, tort or otherwise.
DOI 10.1036/007138247X
Contents
elecommunications networks have made some remarkable strides in the last few decades. Fiber-optic technology has revolutionized information transport, providing
enormous amounts of high-quality bandwidth that the older
transcontinental microwave network could not support. Highspeed routers and switches and new protocols have brought the
Internet to the masses, making it possible to obtain information
and communicate anywhere in the world for a flat monthly fee.
Despite these advances, a major bugbear remains. The highspeed backbone network is accessed over a copper cable local
loop that was designed for a nineteenth-century network. To be
sure, copper wire quality increased significantly during the
twentieth century, and local loop technology improved, but
local access remains the chokepoint for the vast majority of
Internet users.
1
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
For larger businesses, Internet access has become a necessity that falls just behind telephone service in importance.
These companies and agencies require full-time connections
to the Internet. In addition, most multilocation organizations
have a wide area network to tie all sites together for access to
corporate databases and e-mail. Residential subscribers and
small businesses, on the other hand, cannot justify the cost of
broadband access that most corporations enjoy, so they are
left with dial-up access. Once users become accustomed to
high-speed access at the office, however, the comparatively
interminable waiting time of dial-up access becomes so
painful that they are willing to pay for a better way.
Better alternatives are becoming available, but it is difficult
to know what to believe. Service providers advertisements
often make extravagant claims of access speed based on idealized conditions that most users will not experience. Horror
stories of lengthy delays and inept technicians abound, many
of which are unfortunately true. The objective of this book is
to provide users with information about the various access
technologies, what to expect from them, and where they fit.
Lets begin by looking at the default method that most users
employ, the public switched telephone network (PSTN).
Fax
Local Switch
AM
FL
Y
Local trunks
Access trunks
Telephone
Local Switch
Telephone
SONET/SDH Backbone
Toll Switch
Local trunks
TE
Local Switch
PBX
Customer Premise
Equipment
Figure 1-1
Local
Loop
Local
Switching
Local
Access
Trunks
Toll
Switch
Transmission
Equipment
fractional T1/E1 or T3/E3, but these are not generally available in the local loop. The problem is further aggravated in
North America and Japan by the fact that 64 kbps is not
available in the local loop. For reasons we will explain later,
a digital local loop in countries that use the T1 multiplexing
scheme has only 56 kbps of bandwidth.
Until recently, these constraints affected only businesses.
Residences needing access to information databases had no
choice but dial-up modems. Modems have become increasingly sophisticated and quite inexpensive over the years. A
V.90 modem is theoretically capable of up to 56 kbps of fullduplex transmission (meaning data is sent in both directions
simultaneously), but various constraints such as noisy loops
and ISP configuration limit the actual transmission speed to
something like 33.6 kbps in many cases. Dial-up modems do
an excellent job of cramming a lot of information into a
small amount of bandwidth, but the limits of the technology
have been reached. No further advances are likely.
Dial-up modems did a reasonably good job when the typical
database provider offered primarily textual information with
limited graphical content, but the World Wide Web changed
that forever. The essence of a Web page is bitmapped graphics,
which transfer slowly across a dial-up connection. The telecommunications industry, aware of the deficiencies of the analog
network, began to deploy digital circuits in the 1960s, and a few
years later began to develop the integrated services digital network (ISDN) to provide end-to-end digital connectivity. Basic
rate ISDN (BRI) provides two digital bearer channels of 64
kbps each. An external signaling channel of 16 kbps completes
the circuit, which is supported on a single copper cable pair.
Primary rate ISDN (PRI) provides full T1/E1 bandwidth. ISDN
is an improvement over an analog dial channel, but it has several drawbacks. First is the lack of general availability. Many
small LECs dont provide ISDN, and for those that do, the cost
is often high. Furthermore, the LECs do not support the service well. The same service representatives who handle plain old
telephone service (POTS) often cant take orders for ISDN, and
the customer either has to get assistance in applying ISDN or
learn a lot more about the service than most want to know.
10
Amplifiers
Splitter
Trunk Cable
Headend
Termination
Bridger Amplifier
Splitter
11
Feeder
Cables
Subscriber
Drops
Taps
12
Wireless Access
Wireless has long played a vital role in telecommunications,
primarily in the long-haul transmission network and in
mobile applications. Satellite services once wereand for
some countries still area way of bringing telecommunications services to locales that lack heavy enough demand to
justify undersea cable. Point-to-point terrestrial microwave
was once the primary means of intercontinental telecommunications service, and still is a convenient way of bypassing
obstructions that are expensive to cross with cable. In the
access market, however, wireless has been impaired by several factors. First is the fact that broadband demand didnt
really develop in the local network until fiber optics was
available and the quality of fiber is so much higher that is
always preferred if it is economically feasible.
The most limiting aspect of wireless has been the lack of
available frequencies. Microwave got its start from radar
technologies that were first employed in World War II and
then converted to commercial telecommunications service
13
16
TE
AM
FL
Y
Modulation Methods
Data is passed across a network by having its signal encoded
on the transmission medium through a process known as modulation. Baseband modulation applies the signal directly to the
physical facility. A telephone system, for example, applies the
17
000
111
10
10
00
11
18
01
Carriers
11
001
101
010
01
00
2B1Q
110
100
011
4-Level QAM
8-Level QAM
19
T1/E1 Carrier
The basic digital facility over which virtually all voice and
data signals pass is known as T1/E1 multiplex or carrier.
Data signals can be connected directly to a digital circuit
through a device known as a channel service unit (CSU).
Analog signals are digitized through a process known as
pulse code modulation (PCM). Nyquists law states that if the
amplitude of an analog signal is sampled at twice the highest
frequency it contains, the samples can be used to reconstruct
the original signal with a reasonable degree of fidelity. Since
the highest frequency in the audio pass band is 4 kHz, this
means that a telephone signal is sampled 8000 times per second. Each sample is scaled into an 8-bit word through a
process called quantizing. This signal, which is known as a
DS-0 in North America, comprises a 64-kbps signal, which
is derived from the product of 8000 samples per second 8
bits per sample. In North America, 24 DS-0s are time-division multiplexed into a T1 frame. The E1 frame in Europe
consists of 32 circuits, of which two are used for signaling
and 30 for information. Although the T1/E1 signal is channelized into 24 or 30 channels for voice, it can be obtained
unchannelized for wideband data. In ISDN terms, a
T1/E1signal is known as a PRI.
PCM is not a new process. It was developed in England in
1938, but it wasnt practical with vacuum tube technology
because of the problems of power drain and need for floor
space. A decade later, the invention of the transistor brought
PCM to the realm of practicality, but not until the 1960s did
20
Bit Rate
(Mbps)
OC-1
51.840
OC-3
155.520
OC-12
622.080
OC-48
2488.320
OC-192
9953.280
SONET
Capacity
28 DS-1s
or 1 DS-3
84 DS-1s
or 3 DS-3s
336 DS-1s
or 12 DS-3s
1344 DS-1s
or 48 DS-3s
5376 DS-1s
or 192 DS-3s
SDH
Signal
SDH
Capacity
STM-0
21 E1s
STM-1
63 E1s or 1 E4
STM-4
STM-16
STM-64
21
2B1Q
Level 2 -
Level 1 -
Level 1 +
Level 2 +
Bipolar
Unipolar
11
01
00
10
Superimposed
Sine Wave
22
23
Data Protocols
Data devices communicate with one another by using protocols, which are sets of programmed instructions that a
processor can execute. Protocols are used to set up sessions
between devices, determining such factors as which end controls the session, what participants are authorized, what
transmission speed and code set will be used, and myriad
other functions. Protocols handle other such functions as
addressing, error detection and correction, and recovery from
network failures. Before devices can communicate, they
24
must confirm that they are prepared to use the same protocols
and resolve how they will apply any optional features. Data
protocols are classified as connection-oriented or connectionless. In a connection-oriented protocol the path is established
at session setup and remains for the duration of the session.
The telephone network is a prime example. A connectionless
protocol launches data packets into the network, where they
are routed to the destination as an independent unit. Internet
Protocol (IP) is a connectionless protocol.
As with most computer programs, protocols are built in
modules or layers. Each module has a specific function and
has clearly identified application programming interfaces
(APIs) at the boundary so developers can write to and use the
functions of the protocol. Table 2.2 shows the layers and their
functions in the International Standards Organization (ISO)
Open Systems Interconnect (OSI) model. OSI is not intended
to be a complete protocol. Instead, it is a conceptual model
with descriptions of the functions that fit within each layer so
developers can build on its structure.
Table 2.2 shows a brief summary of the functions of each
layer in OSI. Each end of the session uses the same layer
definitions. The sending end of the session passes information
to the receiving end by appending records to the information
block. The receiving end receives the instructions in the block,
executes them, and strips the extra records until only the inforTable 2.2 The ISO Open Systems Interconnect Model
Layer Number
Layer Name
Unit
Function
7
6
5
Application
Presentation
Session
Packet
Packet
Packet
Transport
Packet
Network
Packet
Datalink
Frame
Physical
Bit
25
LAN Protocols
The operation of local area network (LAN) protocols illustrates in practical terms how the OSI model functions. This
will also aid in understanding the operation of 802.11b wireless, discussed in Chap. 7. The IEEE 802 Committee, which
developed the LAN protocols, designed the protocols to
operate within the first two layers of the OSI model. The
most popular LAN protocol, Ethernet, is used almost universally as a LAN protocol to connect to the Internet. Figure 2.3
shows the layered structure of the Ethernet protocol stack.
Ethernet drivers are available to connect to any of the popular transmission media. Early implementations used RG-8
and RG-58 coaxial cable, but unshielded twisted-pair wire
(UTP) is by far the most common medium. Drivers are also
available for fiber optics and wireless systems.
Ethernets link layer is divided into two portions; media
access control (MAC) and logical link control (LLC). The
MAC layer is responsible for controlling access to the mediumwhich, in the case of Ethernet, is based on contention.
A station with information to transmit listens to the network
to see if it is idle. When it determines that no other station is
sending, it launches an Ethernet frame, which is shown in
26
Logical
Link
Control
LLC
Data Link Layer
Media
Access
Control
MAC
Physical
Link
Signaling
PLS
Physical Layer
AM
FL
Y
Medium-Dependent Interface
Medium
(Wire, coax, fiber,
radio, etc.)
TE
Start of Frame
Delimiter
27
Preamble
(7)
(1)
Destination
Address
(2 or 6)
Source
Address
(2 or 6)
Length
(2)
Data
(0-1500)
Pad
(0-46)
CRC
(4)
28
exists. A network layer is not required in a LAN. If all communication is carried over a closed network such as a single
Ethernet segment, link layer communication is all that is
needed. Segments can also be interconnected at the link
layer. A bridge is a two-element device that can be used to
divide Ethernet networks into multiple segments. The bridge
listens to and learns MAC addresses on each segment and
keeps traffic confined to its home segment unless it is destined for an address on the other segment. An Ethernet switch
is a multiport bridge that connects segments together long
enough to pass a frame between them. If each station has its
own port on the Ethernet switch, collisions are eliminated.
Routing
Since a bridge is a two-port device, it lacks the ability to
make routing decisions. Some bridges may deliberately or
inadvertently develop more than one path between segments.
This condition is prohibited by the Ethernet protocol, and is
prevented by using a protocol known as spanning tree. More
frequently, a routing protocol such as IP is used and the network is connected through routers. The TCP/IP protocol falls
under the blanket of packet switching. The U.S. Department
of Defense initially conceived packet switching as a security
measure. If a message is broken into small packets and sent
through the core network over random patterns, it is difficult
to reassemble the message except at the access point. If the
access circuit is kept short, it is easy to secure. Furthermore,
if the core network has plenty of bandwidth, packets from
other sessions can be interleaved to use the excess capacity.
The problem with a connectionless network is that packets
can arrive with errors or out of sequence, and some method
must be used to preserve the integrity. Packet reassembly is
one function of data protocols such as TCP.
IP operates on top of the Ethernet LLC at layer 3 in the
OSI model, and introduces a second layer of addressing. The
MAC address is always the means by which a station can be
identified. It is permanently burned into the network inter-
29
30
31
Application Services
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
TELNET
Hypertext Transport Protocol (HTTP)
Transmission
Control
Protocol
(TCP)
User
Defined
Protocol
(UDP)
Internet Protocol
(IP)
Address
Resolution
Protocol
ARP
RARP
Datalink
Physical
Reverse
Address
Resolution
Protocol
32
so durable. Gigabit Ethernet delivers the speed that developers intended for ATM at a lower cost. Nevertheless, ATM has
developed a role for itself in the local loop. It is the most popular protocol for multiplexing services on DSL lines, and it
is also used in wireless and fiber.
ATM is a connection-oriented protocol that divides the
data stream into short cells. The cell payload is 48 bytes with
a 5-byte header that steers the cells over a virtual path to the
destination. There are two principal reasons for using short
fixed-length cells instead of the long variable-length packets
that TCP/IP employs. The first reason is that cells can be
switched in hardware, which is faster than routing. The fixed
cell length makes it easier to maintain a high degree of utilization. The second reason is that it is easier to control latency and jitter, which are critical quality of service (QoS) elements in real-time applications such as voice and video. If a
cell is lost in transmission, it has a minimal impact on quality because the amount of voice or video information contained in one cell is negligible.
An ATM header carries a virtual path indicator (VPI) and
a virtual channel indicator (VCI). These correspond to
ATMs two types of circuits: virtual paths and virtual channels. Virtual channels are groups of channels between ATM
devices, and virtual paths are groups of virtual channels. A
connection between end points can be provisioned as a permanent virtual circuit (PVC) or by switching and signaling to
establish a switched virtual circuit (SVC). A PVC is analogous to a private line. The carrier sets it up and it remains set
up until disconnected by service order. An SVC is set up by
the application and is charged like a telephone call.
Like all modern protocols, ATM is a layered protocol.
User applications communicate with the ATM adaptation
layer (AAL). The AAL is divided into two sublayers, the
segmentation and reassembly (SAR) and the convergence.
The SAR segments outbound traffic and reassembles
it inbound. The convergence sublayer protocols are different for the various types of information such as voice,
video, and data. The AAL supports five different classes of
traffic:
33
ships.
The ATM adaptation layer recognizes that different classes of traffic have different bit rates, and provides for four
classes: constant bit rate (CBR), variable bit rate (VBR),
available bit rate (ABR), and unspecified bit rate (UBR).
CBR is the highest class of service, providing the ATM
equivalent of a T1/E1 or T3/E3 dedicated line. It is connection-oriented and designed for time-sensitive applications
such as voice and video. VBR is also connection-oriented,
and is designed for any application, such as LAN interconnection and frame relay, that requires a variable amount of
bandwidth. ABR is offered as a discounted service to take
advantage of the bandwidth that is left over after CBR and
VBR traffic have been accommodated.
The industry has not settled the issue of whether ATM or
IP should be used as the information transport protocol in the
local loop. As we will discuss in Chap. 9, the passive optical
network (PON) has advocates for both protocols, and the
same is true of DSL. IP has the advantages of being less
complex and having a broad range of applications and software drivers to support it. ATM is more complex and expensive, but it has QoS built into the design, and many of the
ILECs use it as the backbone of their DSL networks.
Frame Relay
Toward the end of the 1980s, a new protocol known as frame
relay began getting attention. Unlike fixed circuits, frame relay
34
operates on the principle of access circuits from multiple customers that are statistically multiplexed into the carriers backbone. The service provider can oversubscribe the bandwidth
because users arent all transmitting simultaneously.
Oversubscription means that less bandwidth is available in the
network than the potential demand. Well have more to say
about frame relay in Chap. 10, but note that each subscriber
node on the network requires an access circuit. The access circuit is typically T1/E1 or 56/64 kbps and extends from the subscribers premises to the carriers nearest switch node. These
access circuits are distance- and bandwidth-sensitivethat is,
the faster the circuit and the longer the span, the more it costs.
As we mentioned earlier, fractional T1/E1 is generally
unavailable in the access network. Moreover, the carriers
switch nodes are usually in large metropolitan areas. In smaller cities, carriers often have a rating point of presence (POP)
and backhaul the traffic at their expense to the switch node.
Traffic is generally channelized time-division multiplexing
(TDM) and fed through a device such as a digital cross-connect system (DCS) so it can be concentrated into a wideband
circuit to the frame relay switch. A DCS is a digital switch in
which the connections are established in software and remain
connected until rearranged by the carriers provisioning
process. Carriers have considerable motivation to avoid channelized circuits, which, because of the bursty nature of most
data applications, are wasteful of bandwidth. Therefore, frame
relay is a major market for improved access service.
The architecture of frame relay is very much like that of a
predecessor protocol known as X.25 packet switching. The
principles of X.25 are similar to those of frame relay with
some notable exceptions. First, X.25 users often have analog
access circuits. These are dialed or dedicated, but the nature
of X.25 is such that its applications are rarely graphical
because the bandwidth is insufficient. However, X.25 establishes the principle of packet switching and virtual circuits. A
virtual circuit is one that is implemented over shared bandwidth as opposed to being dedicated to the session. Users
deliver their media to the edge of the network, where the carrier may packetize it.
35
TE
AM
FL
Y
broad understanding of how the PSTN, and particularly the local loop, functions is a prerequisite to
understanding access technologies. As mentioned in Chap. 1,
the PSTN consists of a network of switches that interconnect
circuits to form end-to-end connections that are exclusive to
the parties for the duration of a session. When one of the
users hangs up, the connection drops and the circuits are
returned to a pool of inactive circuits until they are seized by
the next session. All circuits and apparatus in the PSTN are
shared except for the local loop, which is the cable that
extends from the central office to the subscriber.
The telephone network was initially constructed with the
objective of line sharing. Party lines were once the norm,
particularly in rural areas where the cost of running a line to
each house was prohibitively expensive. When party lines
were prevalent, the cable plant was constructed so that the
37
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
38
same pair might appear on cable legs running down different streets, improving the chances of finding a vacant pair to
serve a subscriber. That architecture, which is known as
multiple plant, often resulted in bridged tap, a situation in
which dead wire is connected across an active cable pair.
Furthermore, the subscribers service is connected to a distribution cable pair by means of drop wire. Drop wire is
bridged across a pair, but the cable extending beyond is normally not trimmed off, also resulting in unterminated bridged
tap. The party line has gradually surrendered to the individual line, which relieves subscribers of the contention that
once characterized the telephone system. Some of the vestiges of multiple plant remain, however, and have an adverse
impact on high-frequency transmission.
At the heart of the local telephone network is the wire
center, which is the building in which copper cable and fiber
extending to the subscriber terminate. Copper cable starts
at a cross-connection point called a main disturbing frame
(MDF). The MDF includes protectors that prevent injury to
personnel and damage to equipment resulting from lightning
strikes or crosses with electrical power. The cable is composed of 50-pair groups that are known as binder groups or
cable complements. These are formed into large cables of
up to 3600 pairs. The wire gauge varies from 26 AWG (0.4
mm) to 19 AWG (0.9 mm). Fine gauge (26 AWG) is used
nearest the central office so that more pairs will fit in a 4-in
(10.2-cm) conduit. Each cable pair is constructed with precise twists and is twisted around its neighboring pairs. The
manufacturing objective is to expose each wire in the cable
to approximately the same amount of potential interference
from signals both within and outside the cable. When cable
pairs are carefully balanced in manufacturing, they are capable of carrying bandwidths well outside the voice frequency
range. For short distances, as in the EIA/TIA 568B structured cabling standards, precisely manufactured category 7
twisted-pair wire can carry bandwidths of 600 MHz for distances of up to 100 m.
Wire centers in most communities have existed in the same
location for decades. Wire centers are located to achieve a rea-
39
Serving
Area
Interface
Distribution
Cable
Feeder Cables
Central Office
Serving
Area
Interface
Distribution
Cable
Subscriber
Drops
Subscriber
Drops
40
41
current flow is directly proportional to the voltage or electrical pressure and inversely proportional to the resistance. In
mathematical terms this is denoted as I = E/R, where I is current, E is voltage, and R is resistance. When an alternating
current (AC) signal from a human voice or a high-speed
modem is applied to the circuit, the phenomenon of impedance arises. If we turn Ohms law around to express it as R =
E/I, we can see that resistance is the ratio of voltage to current. In alternating current terms we express resistance as
impedance, and denote it with the letter Z.
AC flows are affected by circuit elements of capacitance
and inductance that do not affect DC. Without going into
detail, suffice it to say that any transmission line has capacitive and inductive qualities that are distributed along its
length. Capacitance and inductance impose opposite effects
with respect to frequency. As shown in Fig. 3.2, the higher
the frequency, the greater the resistance to AC an inductor
imposes. (Its actually called reactance, but for our purposes
we can think of it as resistance). Capacitance, on the other
hand, offers less resistance as frequency increases. Since
capacitance is distributed along the length of the line between
the two wires of a pair, the higher the frequency, the more the
capacitance takes on the electrical effects of a short circuit,
which is a direct connection between the two sides of a cable
pair. If a transmission line is infinitely long, it begins to
assume a characteristic impedance, which is the ratio of voltage to current along the line. This characteristic impedance
is stated in ohms (), which is the same unit for DC resistance or AC impedance. For example, category 5 unshielded
twisted-pair wire used for LANs has a characteristic impedance of 100 .
Transmission lines are never infinitely long, but if they are
terminated in a circuit that has the same characteristic impedance, the line assumes uniform electrical characteristics. A
line with perfect impedance doesnt exist outside the laboratory. In the real world, many things happen to alter the impedance of lines. In twisted-pair cable, gauge changes, irregular
splices, and moisture are examples of things that can cause
impedance changes. The effects of some of these may be
42
In
Frequency
e
nc
ita
ac
ap
nc
ta
uc
Reactance
moderate, but an unterminated cable causes a severe irregularity, the effects of which are difficult to predict. When an
electrical wave reaches the end of an unterminated line, some
of the energy is reflected back to the source.
Although the architecture and transmission media of a
CATV network are completely different from those of the
PSTN, the same impedance considerations apply to coaxial
cable as well. Kinks and dents can cause impedance irregularities in the trunk cable, but the main issue is ensuring that
all subscribers are connected to the distribution coax in a
nondisruptive manner. The network must be constructed so
that nothing subscribers do on their premises affects the
integrity of the signal on the backbone. In other words, each
household must be electrically isolated from the network.
This is achieved by using high-impedance taps that allow the
video signal to pass to the subscriber, but that isolate each
subscriber from the rest of the network.
As a signal is applied to copper wire, it is attenuated over
distance. The amount of attenuation depends on the length of
the cable, its gauge, and several other factors of lesser importance such as temperature. A cable pair looks electrically like
a capacitor across the cable pair. Capacitors pass higher frequencies more readily than lower frequencies As a result, the
higher the frequency, the greater the tendency of the cable to
43
Crosstalk Considerations
The local loop was designed and constructed to support
voice-frequency signals. The use of one pair to serve one
subscriber does not begin to use the bandwidth capacity of a
cable pair. For short distances, plain copper wire is costeffective, but for longer subscriber loops or for large concentrations of loops into a single subscriber, multiplexing can
increase the capacity. Therefore, the ILECs sometimes use
multiplex equipment in the local loop. Several factors instigated this. One was the development of digital loop carrier
(DLC), which allows the ILECs to extend subscriber lines to
the outer reaches of the wire center using a system similar
to T1/E1. The DLC is housed in an environmentally controlled enclosure and fed from the CO with fiber optics. This
is a cost-effective alternative to using coarser cable gauges
44
and range extension. The latter amounts to electronic amplification of the voice signal and boosting the DC signaling
range of the switch. The second factor was demand for direct
IXC access. Divestiture took the ILECs out of the long-haul
toll business and gave this function to IXCs. When the ILEC
switches the call from the subscriber to the IXC, The IXC
pays time-sensitive access charges. To avoid access charges,
large users bypass the ILEC with dedicated lines. The most
economical way of providing toll bypass is with T1/E1.
As discussed in Chap. 2, T1/E1 was designed as a shorthaul interoffice trunk carrier. Interoffice trunks in a metropolitan network were originally provisioned on copper cable
that was usually loaded. T1/E1 was designed so that regenerators would fit in manholes, which are spaced at 6000-ft
(1830-m) intervals with 3000-ft (915-m) end sections. An
office repeater feeds power to midspan regenerators. Much
of this trunking network has been replaced by fiber optics.
When the demand began to develop for T1/E1 services in
the local loop, the logical approach was to use T1/E1 carrier
or DLC on a cable system that was designed for voice frequencies. Digital signals contain high-frequency components
that are subject to crosstalk, which is the reception of any
unwanted signal that is induced from another source.
Consider the diagram in Fig. 3.3. As a T1 signal is injected
into the transmit pair of a circuit, it is at a high level compared to the signal on the receive pair, which has been attenuated by the transmission loss from the previous regenerator.
Unless precautions are taken, an excessive amount of the
transmit signal radiates from the source and is coupled into
the receive path of its own circuit or others in the cable. This
path is known as near-end crosstalk (NEXT). Crosstalk is
also possible at the far end of the circuit, but, as we have
seen, the receive signal level is attenuated compared to the
transmit level, so the coupling from the receive pair into
the transmit pair is a minor concern.
The best way to eliminate NEXT is by separation. If separate transmit and receive cables are available, this is the
preferred method. Another method is by using so-called D
screen cable, in which transmit and receive complements are
Near End
Transmitter
Cable Pairs
45
Far End
Receiver
Far End
Transmitter
Near End
Receiver
Near End
Crosstalk
Far End
Crosstalk
46
Echo Considerations
TE
AM
FL
Y
4-wire Receive
Pair
Echo Path
2-wire Pair
Balancing
Network
4-wire Transmit
Pair
47
Hybrid
path, and where they are identical the echo signal is canceled
out. Echo cancelers are built into the IXCs network, and are
not needed in the local exchange.
T carrier is excellent in the trunking network where
crosstalk can be controlled by use of dual cables or shielded
cables. It is not an ideal medium for the subscriber loop, however, because of crosstalk limitations. The line-coding method
of 1 bit per symbol change is not as efficient as newer linecoding methods that are used in ISDN and other services.
Therefore, T carrier is generally replaced in the local loop by
one of several DSL technologies, which are the subject of the
next chapter.
SL is the prime prospect the ILECs have for capitalizing on the information age. The millions of miles
of cable that are in the ground and strung from poles are functionally obsolete, yet they are an asset that has enabled the
ILECs to preserve their monopoly in the face of incipient
competition. POTS has about run its course as a dynamic
growth business. Nearly every household in the developed
world has at least one line now, and cell phones are fulfilling
much of the demand for additional residential lines. Growth
in the telephone industry follows the trend of business and
residential development to a large degreesteady, reasonably
predictable, and only marginally profitable.
Although the revenues from local service are enormous
(estimated to be in excess of $70 billion per year in the
United States alone), the service is regulated. While profits
are all but guaranteed, regulation prevents the ILECs from
49
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
50
Voice Switch
Local Loop
PC
Bay Networks
51
LEC Frame
Relay or ATM
ISP
DSL Router
DSLAM
LEC Central Office
Telephone
Customer Premises
52
DSL Standards
One problem with DSL has been a glut of standards. The service comes in an alphabet soup of options going by the names
of HDSL, SDSL, IDSL, ADSL, RADSL, and VDSL, often
collectively described by the term xDSL. Each of these has
different characteristics and fits a different niche in the marketplace. To add to the confusion, two different modulation
methodsdiscrete multitone (DMT) and carrierless amplitude phase (CAP)are used. The muddle isnt quite as severe
as it seems at first. High-speed DSL (HDSL), and to some
degree single-pair DSL (SDSL), are used by the carriers themselves to provision point-to-point T1/E1, so the subscriber is
insulated from these. The industry itself drops the first letter in
its promotions, so users dont have to know what variety of
DSL they are getting. Table 4.1 lists the types of DSL and their
approximate transmission ranges.
The inability of ILECs to respond to service requests has
hampered DSLs growth. Many users have complained about
long delays in receiving services they have ordered and then
difficulties in getting the service to work. Technicians must
sometimes make multiple trips to get the PC and modem properly configured. To resolve these issues and to bring some
order to the chaos of multiple standards, the industry formed
the Universal ADSL Working Group in 1998 to develop a single standard. The carriers principal objective was to make it
easy for subscribers to purchase self-configuring modems and
Table 4.1
DSL Types
53
Type of
DSL
Acronym
Upstream
Bandwidth
Downstream
Bandwidth
Range in
ft (m)
Asymmetric
High-bit-rate
ISDN
Single-pair
Splitterless
Very-high-bit-rate
ADSL
HDSL
IDSL
SDSL
G.lite
VDSL
16640 kbps
1.544 or 2.048 Mbps
144 kbps
1.544 or 2.048 Mbps
16640 kbps
1.52.3 Mbps
1.59 Mbps
1.544 or 2.048 Mbps
144 kbps
1.544 or 2.048 Mbps
1.56 Mbps
1353 Mbps
18,000 (5,500)
12,000 (4,000)
18,000 (5,500)
12,000 (4,000)
18,000 (5,500)
1,0004,500 (3301,500)
54
55
DSL Technology
DSL lives in an environment that was originally designed for
voice transmissions. As discussed in Chap. 3, the principal
limiting factor is crosstalk. Since cable plant is called on to
carry high-speed signals that were not intended for copper
wire, care must be used to prevent interference from various
types of line signals. DSL can be categorized by two primary
criteria: the line coding and modulation methods.
Coding Methods
HDSL and ISDN DSL (IDSL) use the entire bandwidth of
the cable pair by applying a DC signal directly to the cable
pair. These types of DSL cannot coexist with a POTS line.
Other types of DSL separate voice from data with filters
and do permit the use of a POTS line. High-speed modems
encode information in symbols instead of a raw bit stream.
By using complex coding schemes, a single symbol can be
made to represent some number of consecutive bits.
As we have discussed, T1/E1 uses a simple coding scheme
that encodes only 1 bit per symbol. ISDN improves on that
by using 2B1Q line coding. Each pair of bits represents one
quaternary signal. Higher modem speeds are achieved with
QAM. With QAM, two carriers, each having the same frequency, are phase-shifted 90 with respect each other. One
signal is called the I signal and the other the Q. Each carrier
is amplitude-modulated with half the data. The two signals
are combined at the source and transmitted to the receiver,
where the signals are separated and demodulated to produce
the original data stream.
Early QAM modem systems used eight phases and two
amplitude levels to transmit 4 bits over each symbol. These
56
Modulation Methods
TE
AM
FL
Y
57
Spectral Compatibility
The degree to which DSL signals can coexist in the same
cable is a matter of concern to the ILECs. The limiting factor is usually near-end crosstalk. NEXT can be controlled by
limiting the nonvoice signals that are assigned to particular
groups of pairs. The NEXT problem is most severe nearest
the central office because the cable density is highest there.
DSL systems therefore use the lowest frequencies for the
upstream direction to compensate for the fact that the higher
the frequency, the greater the coupling from one pair to
another. To limit interference, each DSL standard includes a
power spectral density (PSD) mask that describes the PSD by
frequency in the upstream and downstream directions.
The degree of crosstalk that one DSL type imposes on
another defines their spectral compatibility. The degree of
compatibility depends on such issues as the spectrum the
DSL type uses and its placement in the cable.
Types of DSL
Each of the DSL types listed in Table 4.1 has a particular
function. This is usually not a matter of concern to the subscriber because the service provider determines which type
will be used. This section briefly discusses the characteristics
and applications of each type.
HDSL
T1/E1, which is designed as a trunk carrier, doesnt fit well
into exchange cables. Not only is repeater spacing critical, but
also, crosstalk considerations limit the number of systems that
can be installed in a 50-pair cable complement. HDSL is
designed to overcome these limitations. The ILECs have used
58
HDSL for years to provide T1/E1 service over two twistedpair wires up to 12,000 ft (4,000 m) long. This enables them
to avoid the regenerators that T1/E1 requires, which are
expensive and difficult to install on many loops. Terminating
equipment is installed both in the central office and at the subscribers premises. Unlike other DSL versions, HDSL does
not support regular telephone service on a cable pair.
SDSL
SDSL (also known as symmetrical DSL) serves the same
market as HDSL, with two important functional differences.
Instead of dual cable pairs, it provides T1/E1 service on a single cable pair and it also derives a POTS line under the data
signal. It transmits and receives in the same band of frequencies using an echo-canceling protocol, making it susceptible
to NEXT. SDSL uses 2B1Q line coding that is adopted from
basic rate ISDN.
IDSL
IDSL provides 128 kbps of bandwidth using the same protocol as BRI. The main difference is that IDSL terminates in a
router instead of an ISDN switch port. This precludes it from
carrying a voice signal. This technique has limited application
because its limited bandwidth cannot compete effectively
with other DSL technologies.
VDSL
VDSL was developed as a means of providing video on
demand in fiber-to-the-curb implementations. Fiber is used to
bring the video signal to an access node with twisted-pair wire
supporting the last span. VDSL supports data rates as high as
52 Mbps, which is enough to carry a DS3 over short spans of
copper wire. Rates of 52 Mbps can be supported over a 1000ft (330-m) range, but the rate drops to about 13 Mbps beyond
4500 ft (1500 m). The technology is asymmetric, with upstream
speeds of 1.5 to 2.3 Mbps. It can be overlaid over POTS lines.
ADSL
Asymmetric DSL (ADSL) can carry as much as 1.5 Mbps
downstream over a range of up to 18,000 ft (5,500 m). Data
59
60
DSLAM
The DSLAM separates voice-frequency signals from data at
the CO end. The DSLAM aggregates data traffic from several
loops into the backbone. In the case of ILEC-provided DSL,
the backbone is usually ATM. Competitive access providers
may use IP. ISPs and other network providers connect to the
network with PVCs.
A multiservice DSLAM can handle traffic from SDSL,
IDSL, and ADSL. It may also support video access in addition to Internet access. Multiservice capability may also
include multiple service types such as frame relay, ATM,
TDM, and IP running to the subscriber from a single platform. Frame relay is provisioned to the subscriber using
TDM or ATM.
VoDSL
DSL started out to keep voice and data separated by means
of splitters and filters, but several new protocols and products have been developed or are under development to merge
voice and data at the circuit level. The products compress
the voice signal down to a fraction of the 64-kbps bandwidth
of a conventional voice channel. Voice can be compressed to
8 kbps with only a small loss of intelligibility. The quality is
equivalent to a solid cell phone connection. The protocols
add some overhead, so the number of channels is less than a
straight multiple of the compressor output, but the voicecarrying capacity is substantial. Note, however, that faxes
and modems require an uncompressed channel.
The amount of bandwidth the voice channel occupies
depends on the protocol used. ATM is the most common protocol. With 5 bytes of header per cell, the overhead is approximately 10 percent. Equipment vendors claim from 16 to 20
voice channels per DSL line, but of course that depends
on the actual data rate the line can sustain and also on the
amount of bandwidth needed for data.
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
62
63
64
65
Two-Way Systems
Two-way cable systems are constructed on the same principles as one-way systems, but with bidirectional amplifiers.
Filters split the signal into the high band for downstream
transmission and the low band for upstream transmission.
The ratio of downstream to upstream bandwidth is heavily
weighted in the downstream direction. The 5- to 40-MHz
range is used for upstream bandwidth, with a guard band
about 15 MHz wide to separate the two directions of transmission. The upstream direction shares frequencies with
66
TE
AM
FL
Y
high-powered short-wave transmitters operating at frequencies of 5 to 30 MHz, so interference from these sources is a
potential problem. Cable and amplifiers must be adequately
shielded to prevent interference.
Headend equipment is more complex in a two-way than in
a one-way CATV system. The cable system is constructed as
a shared medium, which means that some method is required
to regulate access. The downstream direction is simple to
regulate. Communicating devices are assigned addresses and
programmed to respond only to their address, much in the
same way as Ethernet operates. Upstream is another matter.
User devices access the upstream cable by contention, token
passing, or being polled from the headend. Some systems use
a transponder at the user end to receive and execute orders
from the headend. For example, a polling message might
instruct the transponder to read utility meters and forward the
reading over the upstream channel. One solution to the twoway cable problem is using a telephony return. One of the 6MHz TV channels is devoted to downstream, while the
upstream direction uses a conventional modem on the telephone line. Although this method works for some services, it
has obvious disadvantages for any service requiring alwayson access.
67
68
69
just at the time other stations have data to send, the stations
wait until the network is idle.
The Aloha situation is similar to that in a cable network.
Stations can hear the transmissions of upstream stations, but
they cannot hear downstream stations. If stations simply listen to the channel and wait for an idle moment to transmit,
the upstream stations grab a disproportionate share of the
bandwidth and squeeze out the downstream stations. This
can be resolved by using a protocol known as slotted Aloha.
Stations are granted a time slot within which they can transmit. The headend is responsible for ensuring that bandwidth
is evenly distributed by assigning transmission timeslots to
active stations.
Proprietary methods were used for years on cable networks, but the result was that users could obtain only the
types of modems that the cable operator certified for its network. Proprietary equipment tends to be more expensive than
standard equipment, and also limits the growth of the technology, which led the cable industry to develop a protocol
that all could employ.
DOCSIS
DOCSIS was developed by CableLabs, Inc., a consortium of
equipment manufacturers that collaborated on creating a
standard for data transmission over cable. In Europe, DOCSIS is known as a Euro-DOCSIS, and is derived from the
U.S. version. The European cable community adopted the
standard in early 2000. DOCSIS consists of several components. The cable modem (CM) connects the subscribers PC
to the cable network. At the headend is the cable modem termination system (CMTS) and a variety of specialized
servers. This equipment operates with the subscribers
modem as either a bridge or router. In between is the HFC
plant, which forms the radio frequency (RF) link between the
CMTS and the CM. DOCSIS specifies the RF physical layer
with respect to modulation methods and symbol rates. It
specifies modem initialization procedures, security, and data
70
71
72
DOCSIS
Higher layers
Applications
Transport
TCP/UDP
Network
IP
Data link
IEEE 802.2
Link security (BPI, SSI, RSMI)
Media access control
Upstream
TDMA
540 MHz
QPSK/16-QAM
Physical
Downstream
MPEG-2
54850 MHz
64/256-QAM
73
188 bytes are MPEG header and information and the remainder are parity bits to correct errors. The purpose of forward
error correction is to reduce the number of frames that must
be retransmitted because errors occurred. Each frame starts
with a packet identifier (PID). Standard PIDs are assigned
for video, audio, clock, and other data such as the program
guide. MPEG-2 can multiplex multiple audio and video programs together on the same bit stream.
One feature of DOCSIS is the provision of various classes of service. Cable providers can offer priority to customers
who are willing to pay, just as the airlines offer first-class,
business class, and tourist seats. Although some compromises are required to use cable as an access medium, it is a reliable system that provides sufficient bandwidth to meet nearly all residential requirements. From the cable operators
standpoint, it is a profitable service. The main problem is that
as demand grows, response time slows. The only solution is
to segment the coaxial portion of the network, which is an
expensive proposition and not always practical.
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
76
AM
FL
Y
lular. New hand-held devices overcome the speed limitations of conventional cellular data.
Cellular digital packet data (CDPD): Makes use of idle
cellular channel capacity. TCP/IP connections at up to
19.2 kbps can be supported.
IEEE 802.11b wireless: Wireless LAN protocol used for
in-building applications and for fixed point-to-point connections at up to 54 Mbps.
Multipoint multifrequency distribution system (MMDS):
Delivers video bandwidth from a central transmitter to
multiple receivers in the 2.5-GHz band.
Local multipoint distribution system (LMDS): Uses the
25-GHz and higher spectrum to deliver point-to-point or
point-to-multipoint broadband services.
Satellite services: Both equatorial and low-orbiting satellite
services provide bandwidths ranging from voice circuit
to video.
TE
Wireless has much in common with cable in that the medium is shared. As with cable, sharing is no problem in the downstream direction. All that is needed is to program the receiving
device to respond to its address and ignore the others. The
upstream direction is a problem because multiple contenders
are vying for access to the same bandwidth. Upstream sharing
takes place by one of three multiple access methods: frequency
division, time division, or code division.
From a high-level standpoint, FDM is ultimately used in
every wireless technology. The available spectrum is divided
into frequency segments and allocated to the various services.
The radio division of ITU regulates bandwidth assignments
through international treaties, but the countries have considerable latitude, particularly in microwave bands where radio
waves can be confined within a countrys borders. An exception to this is satellite broadcasting, which cannot be confined
to national boundaries. Microwave frequencies used for satellite can be focused narrowly and reused many times, with terrestrial and satellite services often sharing the same frequency
spectrum. Within the assigned frequency segments, FDM is
77
often used to segregate channels. The earliest mobile and cellular services used FDM with analog modulation.
The second method of sharing is time-division multiple
access (TDMA), which is used in digital cellular and satellite uplinks. On wired media, Ethernet in LANs and DOCSIS in cable systems use this method. Each device receives
a share of the bandwidth. The key is to allocate bandwidth
so every station gets an equitable share. When stations can
hear one another as they do with Ethernet, they simply wait
for an idle moment. When they cannot hear one another, as
is the case with satellites, cable, and cellular, access is regulated by some other means such as assigning time slots from
a master station.
Code-division multiple access (CDMA), also known as
direct sequence spread spectrum (DSSS), is somewhat more
difficult to grasp. Instead of waiting for an available time
slot, stations simply launch their signals across a wide band
of frequencies. A code embedded in the transmission enables
the receiver to pick the desired signal from the jumble. A useful analogy is to visualize a crowded room filled with people
speaking many different languages. Each listener is able to
focus on his or her native language and pick out that one
conversation from a cacophony of voices.
Wireless has a lot to recommend it. In fact, for some applications it is the only alternative. Today, cruise ships and airlines offer their passengers telephone and Internet access.
Emergency vehicles and mobile services, even down to the
much-maligned cell phone in the restaurant, all rely on radio
waves for access to international voice and data networks.
The industry provides a variety of wireless alternatives, some
of which provide access options that cant be matched by
wired services.
78
79
80
Cellular Dial-up
Within limits, cellular dial-up can be an effective access
option. The first limitation is low data throughput, which
makes it unsatisfactory for Web surfing. Ordinary commercial modems may not work well with cellular, particularly at
high speeds. The modulation methods of these modems are
complex, and they do not gracefully handle interference,
fades, and signal dropout. Handoff between cells causes a
momentary interruption, and may cause the connection to
drop. Furthermore, many modems are designed to operate
only after they recognize dial tone, which cellular does not
provide. Therefore, special cellular modems that can adjust
speed to the signal conditions are required.
For occasional use such as mobile file transfer, cellular is a
satisfactory alternative, but it is expensive for short messages.
Most cellular operators levy a one-minute per-call minimum
charge, which makes cellular a poor choice for short transactions that may last only a few seconds. Also, the setup time is
long compared to other alternatives. Cellular has the advantage of good coverage. In general, its applications are similar
to those of the PSTN: it is acceptable for facsimile and file
transfers, but poor for short, bursty messages.
Next-Generation Cellular
The cellular industry is touting so-called third-generation
cellular as the solution for Web surfing from a hand-held
mobile device. The first cellular generation was analog frequency-division cellular, some of which is still in operation.
As the industry ran out of capacity in the cellular bands,
which are between 824 and 894 MHz, second-generation
digital cellular was introduced to make more efficient use of
the spectrum. Most of the world elected to use the global system for mobile communications (GSM) modulation method.
In the United States, the FCC elected to let the market determine the most effective method. As a result, two methods are
used, neither of which is compatible with GSM. AT&T uses
81
82
for no other reason than the fact that it occupies the same frequencies as 802.11b wireless and that coexistence may be
a problem.
CDPD
CDPD is a good alternative for obtaining wireless coverage in
metropolitan areas and along major highways because it offers
the same coverage area as cellular if the service provider has
elected to equip its cell sites for the service. CDPD is a packetswitched data service that rides on top of cellular and uses idle
analog channel time. It can be added to existing cell sites at a
moderate cost. Carriers charge by the packet or kilobyte
instead of by connect time, and the long call setup time and
minimum connect time charges are eliminated. This makes
CDPD good for short, bursty messages such as point of sale,
dispatch, package tracking, telemetry, and e-mail. CDPD is
available in most metropolitan areas.
CDPD operates at 19.2 kbps using a TCP/IP type of protocol, which raises the problem of IP addressing because the
subnet is mobile. For CDPD to be entirely effective for some
applications, a laptop user should be able to disconnect from
the LAN, travel to another location while remaining in contact with the network through a wireless connection, reconnect to the LAN at the distant location, and become part of
the network again. The process is possible today, but the user
needs to understand how to do it. Therefore, it is not yet feasible for the true mobile laptop or PDA application.
To implement CDPD, carriers install mobile database
stations (MDBSs), which retrieve packets from the wireless
network, and a mobile data intermediate system (MDIS),
which routes them. Frames are picked up by the MDBS and
handed off to the MDIS. Mobile stations use a protocol called
Digital Sense Multiple Access with Collision Detection
(DSMA/CD) for access to the network. The access method is
similar to Ethernets Carrier Sense Multiple Access with
Collision Detection (CSMA/CD). A station wishing to transmit listens to the outbound channel to determine if a carrier is
83
84
85
LMDS
In 1998 the FCC auctioned 1.3 GHz of spectrum in the 28to 31-GHz range for LMDS. In each geographical area, WLL
providers bid for the right to use frequencies known as the A
block, with 1150 MHz of bandwidth, and the B block, with
150 MHz of bandwidth. LMDS is intended for such services
as multichannel video, interactive gaming, streaming video,
telephone service, and Internet access. LMDS is a point-tomultipoint service. The service provider locates a hub in the
center of a serving area that may serve several thousand
homes. Subscribers are equipped with small rooftop antennas and transceivers and feed data into the pipeline using an
ATM-like protocol or IP. Multiple hubs are linked with fiber
optics. The bandwidths available to customers range from
one DS-1 to as much as OC-3. Figure 6.1 shows the architecture of a typical LMDS network. In Canada a similar service is called local multipoint communication systems, and
similar services are available in many European countries.
LMDS is intended to allow service providers to bypass the
copper local loop with an economical service that can be
deployed rapidly. There is no need to dig up the streets to
place cable, and the scalable nature of the service enables
providers to meet customer demand in a few days after the
hub is installed. A major objective is to defer the amount of
unused investment. With copper wire plant, the ILECs must
build initially for what they forecast will be the ultimate service demand because of the high cost of adding more. This
86
AM
FL
Y
PSTN
OC3 to 12
TE
Figure 6-1
Internet
87
results in unused investment sitting idle until demand develops. With LMDS, the major investment is the hub. The customer premises equipment can be installed only as needed.
The base station connects to the wide area network over a
fiber-optic link. The structure of the base station is up to the
service provider. It could include a telephone switch, highspeed routers for Internet access, backbone pipes to other service providers such as frame relay, and so on. The microwave
signal is fed into antennas with narrowly focused beams to
transmit the signal in multiple sectors of, perhaps, 30 degrees
beam width. Upstream access is typically allocated with
TDMA using PSK or QAM modulation. The customer premises configurations will include outdoor microwave equipment
connected to an internal distribution network that could be a
LAN, T1/E1, or whatever is required by the service the customer subscribes to.
A key issue with LMDS is availability, i.e., the percentage
of time the service is available for use. Availability figures
are quoted as a percentage of total uptime. An availability
figure of 99.9 percent would equate to 9 hours of downtime.
This is calculated from the following:
365 days 24 h per day = 8760 h per year
0.999
= 8751 h of uptime
= 9 h of downtime
The service provider must take into account factors that
cause the signal to fade. With factors such as transmitter
output power, receiver sensitivity, and antenna gain held
constant, availability will be a function of the distance from
the customers site to the hub. The longer the signal path, the
lower the availability. The maximum distance a subscriber
can be located from a cell site while still achieving acceptable service reliability is referred to as the link budget. A
link of 8.5 mi (14 km) may be achievable in some climates,
while in heavy rainfall areas the link budget may drop to
1.5 mi (2.5 km).
88
MMDS
MMDS was originally intended as a wireless replacement
for cable. For TV signals with 6 MHz of bandwidth, 33
channels can fit into the 200 MHz of spectrum that is allocated for MMDS use between 2.5 and 2.7 GHz. The architecture of MMDS is similar to that of LMDS, consisting of
headend equipment similar to that used in a CATV system
and receiving equipment at subscriber locations. For video
reception, a set-top converter demodulates the incoming signal to the frequency of a conventional television channel.
The MMDS signal is transmitted from an omnidirectional
antenna. Repeaters may be used to extend the range or to fill
dead areas caused by shadows in the coverage area.
Although MMDS was initially intended for one-way
video, it is now authorized for two-way service, making it
applicable to Internet access as well. Typical service offerings provide downstream transmission rates of 1 Mbps or
higher, scalable up to 10 Mbps, and upstream speeds up to
512 kbps, which makes MMDS competitive with DSL and
cable access. The MMDS spectrum is shared with instructional television fixed service (ITFS), which is intended for
distance-learning video. The 6-MHz video channels can be
modulated with data signals using the same concepts, and in
many cases the same hardware, as cable modems.
Satellite Service
One of the major attractions of satellite service has always
been the elimination of the local loop. Satellite is ideal for
broadcast applications where it is desirable to uplink a signal
from one location and downlink it to a vast area. This is the
nature of the direct broadcast satellite services that have been
competing with cable for the past few years. These services
are acceptable for Internet use as well, except that their oneway nature means that a telephone return is required, with its
attendant disadvantages.
89
f you could see a few decades into the future, what might
the access network look like? No one is certain at this
point because there are so many conflicting opinions. It
seems clear, however, that the twisted-pair wire and coaxial
cable of the past must give way to a medium with greater
bandwidth. Based on what is now known, fiber optics will be
that medium. Today, copper wire, coaxial, and wireless alternatives all rely on fiber trunking to bring information to
neighborhood nodes. There, depending on the service
provider, the information jumps on a short twisted-pair wire
run, coax, or a wireless link of some kind. The fiber stops at
the neighborhood node because carrying it all the way to the
subscriber is too costly.
As long as the infrastructure can be installed before streets
and sidewalks are installed, the cost of fiber is supportable,
but fiber still has to fit into the existing service providers
91
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
92
93
94
95
The PON
The PON is a logical physical structure for single-pipe information services in the local loop. Conceptually, the service is
not much different than cable except for the physical medium, which provides significantly more bandwidth. Figure 7.1
shows the PON architecture. It is typically installed with a
96
TE
AM
FL
Y
97
ONU
ONU
Optical
Line
Termination
Feeder
Fibers
ONU
ONU
Passive
Splitters
ONU
ONU
Central Office
ONU = Optical
Network Unit
ONU
ONU
Application Considerations
100
Application Considerations
101
102
packets do not arrive evenly spaced. This variation in spacing between packets is called jitter. If allowed to remain,
jitter distorts the voice and further affects intelligibility.
Buffering packets and releasing them in a steady stream can
cure jitter, but this adds to delay, so it is effective only within limits. These factors are discussed in more detail in the
McGraw-Hill I-book Voice and Video over IP, available at
http://shop.mcgraw-hill.com/cgi-bin/pbg/indexebooks.html.
Another difference is that error correction is unnecessary
with voice. Bit errors that would render a data file unusable
are of no consequence in voice and video, and furthermore,
real-time services cannot tolerate the time delay involved in
retransmission. Therefore, VoIP runs under UDP instead of
TCP. Since data cannot tolerate errors, this makes it impractical to combine it with voice at the source.
Since the ILECs own the cable plant, they have little interest in deviating from their traditional architecture. The
CLECs, however, must lease cable pairs, so they have considerable interest in increasing the carrying capacity through
the use of VoDSL. Because of the nature of voice sessions,
one of the symmetrical DSL optionsgenerally SDSLis
used. As we have seen, the loop length is limited to about
10,000 ft (3,000 m) from the central office, which means that
VoDSL is not a universal alternative. It has an advantage over
cable, however, in that the upstream direction is not a shared
medium. Moreover, if the line protocol is ATM all the way to
the subscriber, the delays inherent in IP are avoided.
Voice over cable is feasible and is part of the serving plan
of large cable service providers. The latest version of DOCSIS supports voice over cable networks, but the service has
not yet been widely used.
Application Considerations
103
T1/E1 Access
If a full point-to-point T1/E1 can be justified to a branch office,
the same bandwidth is available in both the access circuit and
the backbone and the facility has plenty of stability to handle
both voice and data. T1/E1 is an ideal medium if the bandwidth
requirements justify the cost. This is often the case with branch
offices, but it is rarely justified for telecommuting.
DSL Access
If the branch or home office is within range, DSL can be an
ideal medium. Scalability problems that are typical of T1/E1
service are resolved, and the service providers architecture
104
may solve the QoS issue. As we have seen, most ILECs use
ATM in the access circuit and in their backbone. If a single
carrier provides the service end-to-end, the quality should be
controllable within tight limits and could be enough to support both voice and data. Many PBX manufacturers provide
a proprietary IAD that works with their digital telephone.
Security is tight, and the telecommuter or branch office
worker should have facilities equivalent to a station collocated with the PBX.
Quality is less predictable when more than one service
provider is involved. In a metropolitan area with two ILECs,
if each one has an ATM network with a network-to-network
interface, the service may be equivalent to the ATM network
of a single provider. When the network extends between two
metropolitan areas, it may be necessary to connect them over
an IXCs IP or ATM backbone. Some IXCs provide service
level agreements (SLAs) that may be high enough in quality
to support a branch office or telecommuting application. Be
aware, however, that many IXCs quote their SLAs as an average over 30 days. To obtain satisfactory quality of service,
you must know the worst-case delay and jitter figures to
determine whether quality will be satisfactory to support the
application.
Application Considerations
105
Dial-up access
For some access applications, dial-up is the only feasible
alternative. Despite the bandwidth limitations of the PSTN, it
is almost universally available, although not necessarily at a
low cost. Many ISPs provide dial access to the Internet as
well as e-mail. A premium price may be charged, and access
is available almost anywhere, but it is almost precluded as a
telecommuting medium because of lack of bandwidth. Some
PBX manufacturers provide devices to enable the use of a
digital telephone over an analog loop, but these are not highly effective for full-time telecommuting.
If bandwidth limitations prevent the use of dial-up, then
ISDN may be an alternative. Basic rate ISDN suffers from
the same problems as DSL, however, in that it has an 18,000ft (5,500 m) limitation. Furthermore, unless the channels are
bonded, the bandwidth may not be enough of an improvement over analog to justify the extra cost. BRI is often
metered, even in locations where flat-rate analog is available,
and an always-on connection to the Internet or headquarters
can be prohibitively expensive. Finally, BRI suffers from a
general lack of availability in the United States. Many
European countries have much better ISDN availability, but
many central offices in the United States have not been
equipped for BRI. Some multioffice wire centers have ISDN
available in one switching system, but a number change may
be required to switch from analog to ISDN service.
One promising service, always-on dynamic ISDN
(AO/DI), uses the D channel for a full-time connection to the
Internet. If more bandwidth is needed for Web surfing or to
transfer an e-mail file attachment, the service brings a B
channel online long enough to provide the necessary bandwidth, after which it disconnects. The theory of AO/DI is
106
TE
AM
FL
Y
Application Considerations
107
ly a simple question of what is available. A significant percentage of users will go no further than a POTS line with a
V.90 modemnot because it is ideal, but just because it is
available and affordable.
For many users, dial-up is not an acceptable option
because of the nature of the application. Data wide area networks will require some form of dedicated access. If DSL is
not available or if it has insufficient bandwidth, then the
choice turns to T1/E1 or a 56/64-kbps access loop. The latter
will normally be of interest only for business applications.
Dedicated 56/64-kbps connections lack the necessary bandwidth and T1/E1 is prohibitively expensive. Exceptions to
these general comments will occur, but they are rare.
Except for telecommuting, most residential data applications are confined to Internet access. If DSL and cable are
both available, and if the prices are competitive, the deciding
factor is performance. It is impossible to generalize which
will provide the best performance. The answer is that it
depends on a variety of factors including distance, number of
users sharing the medium, time of day, and the ISPs service
quality. The best way to evaluate the service is to ask questions of other users. Unfortunately, what they tell you today
may not be valid tomorrow.
Appendix 1: Glossary
109
Copyright 2002 by The McGraw-Hill Companies, Inc. Click here for Terms of Use.
110
Appendix 1: Glossary
111
attempting to send and detects the presence of a collision by monitoring for a distorted pulse.
CATV: community antenna television.
CBR: constant bit rate.
CDPD: cellular digital packet data.
central office (CO): a switching center that terminates and interconnects lines and trunks from users.
channel service unit (CSU): an apparatus that terminates a T1
line providing various interfacing, maintenance, and testing
functions.
CLEC: see competitive local exchange carrier.
CM: cable modem.
CMTS: see cable modem termination system.
CO: see central office.
competitive local exchange carrier (CLEC): a company offering local service in competition with an incumbent local
exchange carrier.
complement: a group of 50 cable pairs (25 pairs in small cable
sizes) that are bound together and identified as a unit.
CRC: cyclical redundancy checking.
cross-connect: a wired connection between two or more elements
of a telecommunications circuit.
crosstalk: the unwanted coupling of a signal from one transmission path into another.
CSMA/CA: Carrier Sense Multiple Access with Collision
Avoidance.
CSMA/CD: see Carrier Sense Multiple Access with Collision
Detection.
CSU: see channel service unit.
CTS: clear-to-send.
Data over Cable Interface Specification (DOCSIS): an industry
specification for providing data and voice communications over
CATV.
DC: direct current.
D channel: the ISDN 16-kbps data channel that is used for outof-band signaling functions such as call setup.
DCS: digital cross-connect system.
112
Appendix 1: Glossary
113
114
Appendix 1: Glossary
115
116
AM
FL
Y
TE
Appendix 1: Glossary
117
118