Professional Documents
Culture Documents
Manager
Application Support and Training (IADP/ISTP)
Mail Stop 20B
INTELSAT
3400 International Drive, NW
Washington, DC 20008-3098, USA
Contents
Chapter 1 - Overview
3.1 Modulation.................................................................................................................. 63
3.2 Network Line Codes................................................................................................... 68
3.3 User Interfaces........................................................................................................... 74
3.4 Echo Control .............................................................................................................. 81
3.5 Synchronization.......................................................................................................... 83
3.6 Digital Impairments..................................................................................................... 92
3.7 Errors ....................................................................................................................... 106
3.8 Error Detection and Correction................................................................................. 112
Chapter 4 - Applications
Glossary
Technology Handbook
Revision 3
&+$37(5
$129(59,(:
,17(/6$7 INTELSAT is an acronym for International Telecommunications
2YHUYLHZ Satellite Organization. INTELSAT is an organization that belongs to
more than 142 countries, and owns and operates the most extensive
global communications satellite system. Many customers around the
world use INTELSAT’s communications satellite system for high-
quality, reliable, and cost-effective international telecommunications
services. Many countries also use INTELSAT satellites for domestic
public communications. INTELSAT is the major provider of international
voice and data communications traffic whose global satellite system
carries much of the international television transmissions.
When INTELSAT was first formed, all satellite telephone traffic was
'LJLWDO carried over the system using analog modulation . In the early 1960s,
5HYROXWLRQ an alternative to analog modulation became a reality, and soon found
its place among the range of services offered by INTELSAT. The
alternative technique, known as Pulse Code Modulation (PCM), was
digital technology, offering many advantages over the earlier analog
transmissions.
Advantages of digital over analog systems are, by now, too well known
:K\'LJLWDO to be repeated here. Digital systems have superior quality of reception
,QVWHDGRI and regeneration capabilities, and offer highly cost-effective solutions in
$QDORJ" addition to better network management capabilities.
&+$37(5
',*,7$/%$6,&6
At the receiver the digits are decoded and reformed into an analog
signal.
Figure 2.1 shows the basic process. For reasons of clarity, only one
regenerator is shown.
TRANSMIT TERMINAL
ENCODE
Analog R
input
Noise
REMOTE REGENERATOR
REGEN
Noise
x10
DECISION
LEVELS
PCM is the classical and PCM is the classical and most widely used
form of digital transmission. It converts the quantized samples into
code groups of binary pulses using fixed amplitudes. It allows only
certain discrete values of sample size, rather than transmitting the
exact amplitude of the sampled signal. When the signal is sampled in a
PAM system, a discrete value closest to the true one is transmitted. At
the receiving end, the signal level will have a value slightly different
from any one of the specified discrete steps due to noise and
distortions encountered in the transmission channel. If the disturbance
is negligible, it will be possible to tell accurately which discrete value
was transmitted, and the original signal can be almost accurately
reconstructed.
For a linear codec with “n” binary digits per sample, the ratio of the signal
power to quantizing-distortion power (S/D) is given by the equation:
S/D = 6n + 1.8 dB
This relationship shows that each added binary digit increases the S/D
ratio by 6 dB.
/LQHDU
4XDQWL]DWLRQ Figure 2.2 illustrates linear quantization coding and decoding processes.
Let the actual amplitude of the signal be +1.7V. This is assigned decision
level 2, the same for any voltage between 1V and 2V, and is transmitted
to the line as code 101. At the receiving end, the sample with code 101 is
converted to a pulse of +1.5V, the middle value of the decision level at the
encoder. This results in an error of 0.4V between the input and the output
signals. This type of error will occur in every sample except when the
sample size exactly coincides with the mid-point of a decision level.
Encoder characteristics
Decoder characteristics
+4 +4 111 111
3 3 110
input code
quantizing
(decision) 2 2 101
levels
1 +1 100
-1 000
o/p
1 input volts volts
2 001
2 3 010
3 -4 011 011
-4
samples output
original signal
signal
quantizing
input
error
signal
Two separate coding systems are in use, A-Law and µ-Law. Figure 2.3
shows the A-Law companding characteristics for positive signal amplitude
adopted by the ITU-T for 30-channel PCM systems. As the negative part
is identical, it follows that the complete characteristics consist of 8 positive
and 8 negative segments. Each segment consists of 16 equal quantizing
steps giving a total of 256 steps (0 to +127 and 0 to -127), but as the
slope of adjacent segments (except 0 and 1) changes in the ratio 2:1, the
steps of segment 7, for instance, cover twice the range of signal
amplitude as those in segment 6. It is possible to relate input levels
(measured in dBmO) to the highest quantizing level. The highest signal
level allowed is about +3dBmO, corresponding to a highest quantizing
level (or "peak code") of ±128. Lower signal levels correspond to lower
peak codes.
$OLDVLQJ Earlier, a reference was made about the relationship between the highest
input frequency and the sampling rate. If this relationship is not
maintained, the frequency of the output signal will be incorrect. This error,
or distortion, is called “aliasing”. To prevent it from occurring, a low pass
filter, cutting off at 4 kHz, is fitted at the analog input to every PCM
multiplexer. The filter is known as the anti-aliasing filter.
(128)
(Level 128 is a virtual decision level and
cannot be signalled in practice)
112 16 steps each of range
64 amplitude units
- +
0x x xx x x x input
64 16 steps each of range 8 amplitude units
Quantizing level
'HOWD
0RGXODWLRQ Delta modulation is an alternative method to encode an analog signal
into a digital bit-stream. There are several alternatives to conventional
PCM. Most of these result in bit rates lower than 64 Kb/s that
conventional PCM requires for each voice channel, and are commonly
known as Low Rate Encoders (LREs). One such example is delta
modulation. Figure 2.4 shows the principal components used in the
encoding process, and Figure 2.5 shows the process.
The audio signal is band limited by a low pass filter and is applied to a
comparator. Here, it is compared with the output of an integrator whose
voltage level is dictated by the preceding bit pattern that was transmitted
to the line.
6DPSOHUDQG The sampler (shown as a switch) opens and closes at the output bit rate,
6TXDUHU typically 32 Kb/s. The bits transmitted to line depend on the state of the
squaring circuit:
positive = 1
negative = 0
Simultaneously, the output bit pattern is fed into the integrator.
,QWHJUDWRU In its simplest form, the integrator can be a capacitor charged via a
resistor, where a "1" charges the capacitor in a positive direction. The
charge on the capacitor is fed to the comparator. As the audio input level
continues to rise, it will be at a higher level than the integrator and another
"1" will be transmitted to the line. This positive voltage charges the
capacitor, which is again compared with the audio input.
While the audio input rises rapidly, it will keep ahead of the charging
capacitor in the integrator and a string of "1"s will be transmitted at 32
Kb/s. (Refer to Figure 2.5.) When the audio input falls to a level which is
below that of the integrator, a "0" is transmitted which, in turn, charges the
capacitor in the opposite direction, i.e., the positive charge is reduced.
From Figure 2.5, it can be seen that the integrator voltage approximately
follows the input waveform, the shape of the integrator variations being
controlled by the transmitted bit pattern.
Similarly, the output bit pattern oscillates between "1" and "0" during flat
portions of the input waveform; hence, the charge on the integrator varies
giving rise to quantizing error.
SAMPLER
SQUARER
INTEGRATOR
TRANSMIT SECTION
INTEGRATOR
RECEIVE SECTION
Analog
input
Sampling
periods
Digital Line
Code 1 1 1 1 0 0 0 0 1 1
Signal building
auto receive
integrator
Smoothed
Analog
Output
$GDSWLYH
3&0$3&0 In ordinary PCM, S/D performance can be made more satisfactory over a
wide range of signal powers and the quantizer step size is made roughly
proportional to the signal amplitude. Adaptive PCM (APCM) systems, in
contrast, use a linear quantizer in which the step size is adjusted in time
to match the short-term statistics of the signal. The coder is effectively
operated at its instantaneous peak S/D point.
3ULQFLSOHRI
$'3&0 The principle of ADPCM, shown in Figure 2.6, is to take conventionally
produced 8-bit words that represent coded samples of analog signals,
and compare each with an estimate of what that 8-bit word will be. The
difference between these two signals, the real and the estimate, is
transmitted. Provided that the estimate is good enough, there will be no
difference between the two 8-bit words. Consequently, less than 8 bits are
needed to represent the signal.
COMPARATOR
ESTIMATE
(8-BIT WORDS)
$Q,OOXVWUDWLRQ
RIWKH3ULQFLSOH If the actual incoming traffic sample to have ADPCM applied is:
RI$'3&0 10110101 (= quantizing level +53)
:KHUH'RHVWKH Because the estimate was quite close, the difference between the two 8-
(VWLPDWH&RPH bit words is so small that the leading four zeros can be dropped, and the
)URP" 4-bit word:
0111
is transmitted in place of the original 8 bits.
:LWK$'3&0 This is true for one type of ADPCM, and providing that a similar decoder
(DFKELW is present at the receiving end of the circuit, a surprisingly good quality
:RUG%HFRPHV telephone circuit can be obtained. A diagram showing the basic
DELW:RUG components of an ADPCM encoder is shown in Figure 2.7, where the
estimator circuit is a little more complex than described above.
64 DIFFERENCE
kbit/s NON-UNIFORM SIGNAL
INPUT TO UNIFORM + ADAPTIVE
LEVEL 32 KBIT/S
PCM OUTPUT
QUANTIZER
CONVERTER -
SIGNAL
ESTIMATE INVERSE
ADAPTIVE
QUANTIZER
QUANTIZED
DIFFRENCE
SIGNAL
RECONSTRUCTED
ADAPTIVE SIGNAL
PREDICTOR
+
+
ADPCM provides such a good quality on each voice circuit that it was
developed further to take account of the possibility of using circuits for
"Voice Frequency Data" (VF data), which is more difficult to predict.
,78
There are four different ITU-T recommendations for ADPCM algorithms.
5HFRPPHQ ITU-T G.721 was the first ADPCM recommendation to use 4 bits per
GDWLRQVRQ sample. The process reduced the digital rate from 64 Kb/s to a fixed rate
$'3&0 of 32 Kb/s. This algorithm had two drawbacks: voice band data rates
higher than 4.8 Kb/s could not be transmitted and low speed voice band
data rates (< 1.2 Kb/s with FSK modulation) were affected by high BER.
ITU-T G.723 introduced the variable bit rate concept to cope with the
voice band data limitation. The bit rate can be 3/4/5 bits per sample; 3 or
4 bits for speech (24 and 32 Kb/s respectively), and 4 or 5 bits (32 and 40
Kb/s) for voice band data up to 9.6 Kb/s. Moreover 3 bits per sample can
also be used for overload channels carrying voice in DCME.
ITU-T G.726, the last enhancement to ITU-T G.723, recommends the use
of 2 and 3 bits per sample (16 and 24 Kb/s) for overload channels
carrying voice in DCME. The overload channels are created by a ’bit
robbing’ method.
:KDWDUHWKH
GLIIHUHQFHV The differences between ADPCM and Embedded ADPCM are the way
the predictor operates and how the quantized signal is encoded. Review
EHWZHHQ* the steps to convert a PCM signal into an ADPCM.
DQG*"
*3URFHVV
The 64 Kb/s PCM (refer to Figure 2.8) is first converted from A-law or µ-
law to uniform PCM signal (S). A difference signal (D) is obtained by
subtracting the input signal (S) from the estimated signal (E).
The difference signal (D) is quantized in the adaptive quantizer where the
signal is scaled and converted to a base 2 logarithmic representation. An
adaptive 31-, 15-, 7-, or 4-level quantizer is used to assign 5, 4, 3 or 2 bits
respectively to the value of the difference signal for transmission to the
decoder.
INPUT DIFFERENCE
64 kbit/s CONVERT TO SIGNAL SIGNAL
+ ADAPTIVE
PCM UNIFORM
PCM S
+ D
QUANTIZER
- ADPCM
OUTPUT
SIGNAL
ESTIMATE
E
RECONSRUCTED
+
ADAPTIVE
SIGNAL
S1
+ INVERSE
ADAPTIVE
PREDICTOR +
D1 QUANTIZER
ENCODER QUANTIZED
DIFFERENCE
SIGNAL
QUANTIZED RECONSRUCTED
DIFFERENCE SIGNAL
SIGNAL
ADPCM INVERSE CONVERT SYNCHRONOUS
INPUT ADAPTIVE
QUANTIZER
+ TO
PCM
CODING
ADJUSMENT
64 kbit/s
PCM
SIGNAL
ESTIMATE
ADAPTIVE
PREDICTOR
DECODER
*
3UHGLFWLRQ In G.727, a 32-, 16-, 8-, or 4-level nonuniform adaptive quantizer is used
3URFHVV to quantize the difference signal for 40, 32, 24, or 16 Kb/s rates
respectively. (See Figure 2.9.)
Various quantizer tables are embedded within each other so that the
decision levels are forcibly aligned to ensure that the decision levels for
16, 24, and 32 Kb/s quantizers are subsets of those for the 40 Kb/s
quantizer. This contrasts with the algorithm for G.726 where the decision
levels are not aligned.
INPUT DIFFERENCE
64 kbit/s SIGNAL SIGNAL
CONVERT TO + ADAPTIVE ADPCM
PCM UNIFORM
PCM
+ QUANTIZER
OUTPUT
-
SIGNAL
ESTIMATE BIT
MASKING
+
ADAPTIVE
RECONSRUCTED
SIGNAL + INVERSE
PREDICTOR + ADAPTIVE
QUANTIZER
ENCODER QUANTIZED
DIFFERENCE
SIGNAL
RECONSRUCTED
SIGNAL
DECODER
FEED-
FORWARD CONVERT SYNCHRONOUS
INVERSE
ADAPTIVE
+ TO
PCM
CODING
ADJUSMENT
QUANTIZER
64 kbit/s
SIGNAL
ESTIMATE
PCM
FEED-BACK
BIT INVERSE ADAPTIVE
MASKING ADAPTIVE + PREDICTOR
QUANTIZER
ADPCM QUANTIZED
INPUT DIFFERENCE
SIGNAL
Bit masking is another difference with G.726. Through this process the
enhancement bits are discarded by logically right-shifting the ADPCM
codeword. The remaining bits are the core bits.
MSB LSB
CORE ENHANCEMENT
BITS BITS
$GYDQFHVLQ Several speech coding techniques are available that will enable speech
coding at low bit rates. The advantage of low bit rate speech coding is
6SHHFK&RGLQJ obvious. It will require less bandwidth, and hence a service provider
can multiplex an additional number of voice channels in a given
bandwidth.
High bit rate coders, such as 64 Kb/s PCM and 32 Kb/s ADPCM
provide very good quality speech. Nowadays, several coding
techniques, such as Linear Predictive Coding (LPC), Adaptive
Predictive Coding (APC), Adaptive Transform Coding (ATC), and Code-
Excited Linear Prediction (CELP) are available that can provide good
speech quality at 16 Kb/s. However, these coding techniques produce a
large coding delay, typically up to 60 ms. This delay is undesirable in
many applications. Current ITU-TU standards require very low delay.
An important requirement is that one-way encoder/decoder delay
should not exceed 5 ms, with the objective being less than 2 ms.
6SHHFK&RGLQJ
DW.EV
This section describes speech coding at 16 Kb/s using Low Delay-Code
8VLQJ Excited Linear Prediction (LD-CELP) that ITU-T Recommendation
/'&(/3 G.728 recommends. The LD-CELP uses a backward adaptation of
7HFKQLTXH predictors and gain to achieve an algorithmic delay of 0.635 ms.
64 Kb/s
A-law or
1 -law PCM input Convert to
Vector
uniform
buffer
PCM
VQ weighting
filter MSE
codebook filter 16 Kb/s output
Backward Backward
gain predictor
adaptation adaptaion
VQ
index Excitation
VQ Convert to
Gain
codebook Synthesis filter Postfilter
16 Kb/s PCM
input
64 Kb/s
1 -
A-law or
law
PCM output
Backward
Backward gain
predictor
adaptation
adaptaion
'LJLWDO
After learning about how analog signals are converted into digital streams
0XOWLSOH[LQJ through filtering, sampling, quantizing, and coding,and alternative coding
%DVLFV techniques, such as delta modulation that produce lower bit rates, this
section studies the principles of multiplexing.
3ULQFLSOHRI The primary multiplexer, sometimes called the first order multiplexer, is
0XOWLSOH[LQJ the first stage in the multiplexing process. The multiplexer combines
either 24 or 30 voice channels into a digital stream, and does roughly the
same job as the Channel Translating Equipment (CTE) in FDM
technology.
'LJLWDO/LQH
Primary multiplexers were first used to upgrade the capacity of existing
6\VWHPV line plant, particularly multi-pair cables. Two pairs of wires that were
earlier capable of carrying only one two-way conversation were now able
to carry 24 or 30 conversations. Thus these links were used to provide
trunk connections between exchanges.
Many systems around the world still operate this way, except that
nowadays it is usual to find specially manufactured cable, “Transverse
Screened Cable". In several locations, this forms the backhaul route from
Earth station to the International Telephone Exchange.
3ULPDU\
Most primary order multiplexers are either fitted in the International
0XOWLSOH[LQJLQ Transmission Maintenance Center (ITMC) or combined with the
WKH(DUWK international exchange, or "switch". There will probably be one or two
6WDWLRQ primary multiplexers for service channels to the ITMC or Main Office.
(QYLURQPHQW
The 2 Mb/s, or 1.5 Mb/s signal consists of all the channels from that
multiplexer into one digital stream. In most cases, the 2 Mb/s signals are
received from the ITMC, and fed into the IDR channel modems at the
Earth station.
7LPH'LYLVLRQ
In Time Division Multiplexing, many channels can share the same
0XOWLSOH[LQJ medium by "taking turns", each being connected to the line very briefly,
then replaced by the next. This is repeated again and again so swiftly
that there is no loss of data from any channel.
At the receive end of the link, a matching demultiplexer carries out the
reverse action. It receives a digital stream and feeds it out, 8 bits at a
time, first to one channel then to another, like dealing playing cards to
each player in a game of cards. It is apparent that to work properly, the
distant demultiplexer must be "locked" to the transmit multiplexer.
6\QFKURQL]DWLRQ The receive demultiplexer, must "know" the sequence to "deal out" the 8
bit words it receives. This is done by inserting a synchronizing "word" into
the traffic at the transmitting multiplexer that can be recognized at the
distant end, and is used as a reference by the demultiplexer.
Several extra words are added to the traffic. This extra information is often
referred to as "overhead", because it is carried along with the traffic, and
has nothing to do with the traffic information.
The 2 Mb/s rate is actually 2.048 Mb/s and not 1.92 Mb/s because of
these overheads.
2.048 Mbit
Input
Traffic
Decoders
Recovered
Timing
1 0 1 0 1 0 1 0
1 cycle = 2 bits
Figure 2.13 Clock Recovery
7LPLQJ It is not just sufficient for the receiver to recognize a particular starting
point in the digital sequences; the receiver actually has to work at the
same speed as the transmitter. The way in which this is usually achieved
is through clock recovery.
3OHVLRFKURQRXV
:RUNLQJ The multiplexer usually transmits signals at a rate controlled by a very
accurate oscillator located within the network. Figure 2.14 shows the
oscillators located at both ends of the network. Their frequencies are
nearly, but not exactly, the same, and thus, the rates will not be same at
both the ends. This type of system, where traffic in opposite directions is
nearly synchronized, is called a plesiochronous system [Greek : "Plesio" =
"nearly"].
f1
PRIMARY
MUX
PRIMARY
MUX
f
2
$Q,QWURGXFWLRQ There will be rate discrepancies if two ends of a network operate with
WR&ORFN6OLS even slightly different clock speeds. The network will experience a
problem because one of two situations is possible:
There are ways to minimize the error rate. This will be the subject of a
later section (3.5) and involves the use of a buffer, which is often installed
at the Earth station.
bit 1
bit 1 bit 1
bit 2 bit 1
bit 2 bit 2
bit 2
bit 3
ERROR
bit 3 bit 3 bit 3 ERROR
bit 4
bit 5 bit 3
bit 5 bit 4
bit 4
bit 6
bit 6 bit 5
bit 5
bit 7
bit 7
Interface
Interface
'LJLWDO In the same way that groups are combined into supergroups in analog
+LHUDUFKLHV systems to carry more traffic over a single carrier system, outputs from
the primary multiplexers are combined into higher bit rate blocks for
onward transmission in digital systems.
There are three different hierarchies, which are recognized by the ITU-T
in G.702.
(XURSHDQ Commonly called the CEPT hierarchy, the European hierarchy is built on
the basic building block of 2.048 Mb/s primary multiplexers, and is
+LHUDUFK\ illustrated in Figure 2.16.
1st Order 2nd Order 3rd Order 4th Order 5th Order
(Primary)
1
Audio
only G732
1
30
2.048 Mbit/s G742
1
1 1 1
4
Audio 34.368 Mbit/s 139.264 Mbit/s 564.992
&/or Mbit/s
64 Kbit/s G735 8.448 Mbit/s
G751 G751 G954
30
4 4 4
64 Kbit/s
only G736
31
1RUWK$PHULFDQ The NAS has, as its basic building block, a 1.544 Mb/s multiplexer,
6\VWHP1$6 illustrated in Figure 2.17. Four primary streams of 1.544 Mb/s are
combined to produce a 6 Mb/s stream by a second order multiplexer.
+LHUDUFK\ The next stage combines seven 6 Mb/s tributaries into a 45 Mb/s stream.
Note: Often, one single piece of equipment will do all of this, taking up to
28 1.544 Mb/s systems, and multiplexing them to produce 45 Mb/s.
-DSDQHVH Japan uses a slightly different version of the NAS. The basic building
+LHUDUFK\ block, as before, is a 1.544 Mb/s stream, and is illustrated in Figure 2.18.
It starts with the NAS hierarchy, using µ-Law coders, but changes as the
hierarchy develops.
T1 T1 T3 T2
LINES LINES LINES LINES
1.544 6.312 44.736 274.176
Mbit/s Mbit/s Mbit/s Mbit/s
1
SPEECH DS - 1
& /or channel
56 Kbit/s 24 bank
1
G 733(2)
DS - 2 DS - 3 DS - 4
MUX MUX MUX
1 7
DS - 1 (G 743) (G 752)
SPEECH (Fe)
& /or channel
64 Kbit/s 24
bank
G 733(1)
,QWHUQDWLRQDO
As one can easily notice, different hierarchies are incompatible, and the
:RUNLQJ ITU-T recommends that, whenever possible, international traffic should be
exchanged using the CEPT hierarchy because it is used in more
countries. Hence, some conversion may be necessary at Earth stations.
However, when both ends of an international link use the NAS hierarchy,
administrations can exchange the traffic in the NAS.
'LJLWDO This is the first of three sections that will discuss details of multiplexing
0XOWLSOH[LQJ and multiple access.
0XOWLSOH$FFHVV
&(37)UDPH The European (CEPT) system will be described first. The NAS will be
6WUXFWXUH introduced later. The primary stages of Japanese hierarchy are identical
to the NAS.
The CEPT Frame Structure and Timing are shown in Figure 2.19. The 8-
bit words are produced every 125msec, using the anti-aliasing filter,
sampler, quantizer, and encoder.
In the CEPT system, 30 channels are multiplexed together onto the same
line by transmitting an 8-bit word from each channel in turn - the
technique is known as Time Division Multiplexing (TDM). The 8-bit words
are produced from each channel at the rate of 8000 samples every
second. In a time period of 125msec between two words from channel 1,
an 8-bit word from each of the channels 2-30 will be transmitted. This
period of 125msec is called a frame.
samples
amplitude
time
125us
- magnitude
sign
1 0 1 0 0 0 1 1
time
slot 0 1 15 1617
no.
Time slots for telephone Time slots for telephone
channels 1-15 channels 16-30
125us
X0011011
The bit marked “X” could be either 1 or 0. Although the bit marked “X” is
part of the FAW, it plays no part in the synchronization - it is reserved for
another purpose.
)UDPH'DWD To introduce alarm and telemetry systems into the frame structure, the
:RUG FAW is alternated with a data signal, known as the Frame Data Word
(FDW), or sometimes as the NOT Frame Alignment Word. Although this
is its main purpose, one bit is permanently set to a 1, to assist with initial
synchronization.
Each 8-bit word, whether FAW, FDW, or encoded audio, occupies a time
slot (TS). The first time slot in a frame is called time slot zero, or TS0, and
contains alternately the FAW or FDW. The encoded audio for channel 1
is in TS1 and for channel 2 is in TS2.
&RPSOHWH
Figure 2.20 shows a complete frame structure that is made up of 32 time
)UDPH6WUXFWXUH slots, each containing an 8-bit word. There are therefore 32 x 8 = 256 bits
making up each frame.
The first time slot TS0 contains alternately the FAW or FDW. The next
time slot TS1 contains an 8-bit word from channel 1; TS2 contains an 8-
bit word from channel 2, and so on, until 15 8-bit words have been sent,
one from each of the first 15 channels. The next time slot, TS16, is
reserved for signaling purposes, and the remaining time slots, TS17-31,
contain 8-bit words from channels 16-30.
As the duration of each frame is 125msec, the bit rate can be calculated
to be 2.048 Mb/s.
sample periods
amplitude
time
1 0 1 0 0 0 1 1
time
slot 0 1
no.
Time slots for telephone Time slots for telephone
channels 1-15 channels 16-30
telephone
frame synch slot sig slot
(FAW or FDW)
125us
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
2 ms
1RUWK$PHULFDQ The NAS differs from the CEPT system in the makeup of the frame
6\VWHP1$6 structure. The process by which each 8-bit word is produced from each
sample 8000 times a second is identical, although the encoder used is
the T-Law.
1$6)UDPH Figure 2.21 shows a sequence of 12 frames in the NAS structure. Each
frame starts with one single alignment bit, followed by an 8-bit word from
6WUXFWXUH each channel in turn. As there are 24 channels in each frame, plus the
alignment bit, each frame contains 193 bits (24 x 8 + 1 = 193). The
duration of each frame is 125ms, so the bit rate is 1.544 Mb/s. The
alignment bits at the start of each frame build up into the frame alignment
word and multiframe alignment word as shown.
6LJQDOLQJ8VLQJ When channel -associated signaling systems (such as ITU-T R1) are
WKH1$6 used, a process known as bit stealing often carries signaling
requirements. In bit stealing, the least significant bit of each 8-bit word in
each 6th and 12th frame is used to carry the signaling for that channel
(i.e., bit 8 of channel 2 in frame 6 carries signaling information for channel
2).
$ODUP'DWD
8VLQJWKH1$6 Alarm information is transmitted by changing the status of the alignment
bit of the 12th frame or by setting one bit of each 8-bit word to a 1.
/LPLWDWLRQVRI There are various restrictions in using the frame structure just described.
WKH1$6 The most significant is the absence of any useful telemetry channel, and
absence of provision for extra bits reserved for development. An
alternative structure, called the "extended superframe" has been
introduced to deal with these limitations.
([WHQGHG The extended superframe has been developed from the standard NAS by
extending the frame structure to include 24 frames. Figure 2.21 shows a
6XSHUIUDPH full frame structure, and the use of the alignment bits is given below.
)UDPH In the irregular pattern 001011, the first bits of the frames indicated make
$OLJQPHQW%LWV up the frame alignment bits. The fact that the pattern is irregular avoids
the necessity of a multiframe alignment signal.
7HOHPHWU\ The 12 telemetry alignment bits, marked “D”, of the frames indicated
,QIRUPDWLRQ provide a data link for control purposes. Because 8 bits are available in
every 24 frames (3 msec), the usable data rate is 4 Kb/s.
(UURU&KHFNLQJ The six alignment bits marked “E”, associated with the frames indicated,
,QIRUPDWLRQ provide the capability to check the presence of errors. This system is
known as cyclic redundancy checking (CRC) and will be discussed later.
alignment bit
Frame chan 1 chan 2 chan 3 chan 22 chan 23 chan 24
1 1 1 81 1 81 81 8
2 0 1 81 1 81 81 8
3 0 1 81 1 81 81 8
4 0 1 81 1 81 81 8
5 1 1 81 1 81 81 8
6 1 1 7s 1 7s1 7s1 7 s1 7s
7 0 1 81 1 81 81 8
8 1 1 81 1 81 81 8
9 1 1 81 1 81 81 8
10 1 1 81 1 81 81 8
11 0 1 81 1 81 81 8
12 1 1 7s 1 7s1 7s1 7 s1 7s
alignment bit
D = Telemetry Data
E = Error Checking Bit
Bell Telephone Laboratories Inc., which developed the NAS, called the
primary multiplexing equipment DS1. To transmit the 1.5 Mb/s signals,
they used lines called T1 lines. Over the years, the two terms have
become synonymous, and these days the multiplexer itself is often called
a T1 MUX. CEPT primary multiplexers are called E1 MUX.
&(37DQG1$6 Table 2.2 shows a list of the important differences between the CEPT and
NAS Primary Multiplexers.
Alarms Either Alignment bit frame 12 or one Bit Carried in frame data word
of each > ’1’
Digital channel data rate 56 Kb/s, although 64 Kb/s available with 64 Kb/s
B8ZS*
3&06LJQDOLQJ A number of signaling systems are in use worldwide, and they fall into two
6\VWHPV main groups:
- Common Channel Signaling (CCS)
- Channel Associated Signaling (CAS)
Figure 2.23 tabulates these two groups, and gives a breakdown of the
various types.
&KDQQHO CAS systems are systems where the signaling for each channel is either
$VVRFLDWHG sent on that channel, or in a specially dedicated signaling link.
6LJQDOLQJ&$6
An analog example of CAS is VF, either “in band” using a single
frequency (SF) tone, or “out of band” using a frequency of 3825 Hz that
falls outside the normal audio channel frequency band.
DASS* 2
CCITT No.6 ** CCITT No.6
Bell D1 (T1) CEPT 30
chan system * UK Systems
,QWHUSUHWDWLRQ
RI1HWZRUN Problems can arise because the signaling link might fail, leaving the
telephone trunks unusable. For this reason, wherever possible, the
7HVWV:KHQ signaling link is duplicated over another route.
&&6LVLQ8VH
Another problem source is that the 64 Kb/s data channel is sometimes
carried in TS16, in which this case, it is important to differentiate between
the use of TS16 as a carrier of CAS or of CCS. If this is not clear, then a
good indication of which type is in use can be obtained from examining
TS16 of frame 0 to see whether a multiframe structure exists. If such a
structure exists, then it is likely that CAS is in use.
$/DZT/DZ
&RQYHUVLRQ The direct conversion from A-Law to T-Law is straightforward. The
shapes of the two curves are almost identical; so, the ITU-T has prepared
two "look up" tables (ITU-T Recommendation G.711) to convert
quantizing levels of one law to the other.
$ODUPVLQ Alarms in the analog (FDM-FM) environment have been based mainly on
'LJLWDO pilot monitoring systems. A pilot is always associated with each group and
(QYLURQPHQW supergroup, and it becomes an integral part of that group until it is
$QDORJ6\VWHP disassembled. It is possible to recognize whether that group is being
received or not by monitoring the pilot.
$ODUPV
3UREOHPVZLWK Some problems with pilot monitoring systems exist which make it unclear
3LORW where exactly the failure is, particularly if one is monitoring a pilot that has
0RQLWRULQJ transited through another country.
$ODUP ITU-T has recommended an alarm system for the digital environment that
2EMHFWLYHV will help identify the exact location of faults. This will ensure that:
'LJLWDO$ODUP
3KLORVRSK\ ITU-T has established two alarm categories, called “PROMPT” and
$ODUP “DEFERRED”.
&DWHJRULHV
3ULQFLSOHRI
There will be one prompt alarm for one fault that affects traffic, located at
2SHUDWLRQ a point which will enable service personnel to logically identify the faulty
equipment or section without any ambiguity. This normally means that a
prompt alarm is displayed close to the actual source of the fault.
Note: Other faults may be added. These are the minimum requirements
suggested by the ITU-T. Refer to Table 2.3 for an example of alarms at a
third order multiplexer.
Multiplexer Loss of
incoming signal YES YES
only on a tributary
Loss of incoming
signal at 34 Mb/s YES YES YES
Examples:
Consider the section of a digital network illustrated in Figure 2.24.
A B C D
8 34 8 2
2 8 34 8
Consider the case of a break in the 34 Mb/s line between B and C such
that C does not receive any signal from B, but the opposite direction is
operating satisfactorily.
The way in which any multiplexer can inform its counterpart of a problem
is by using a bit in the frame structure specially reserved for this purpose,
called the alarm bit.
In case 1, where C does not receive any signal from B, the equipment at
C will automatically alter the state of the alarm bit in its transmitted frame
structure at 34 Mb/s from a 0 to a 1. Multiplexer B constantly scans the
34 Mb/s incoming signals, and if the alarm bit is seen to be a 1, it realizes
that multiplexer C has a problem. In this way, we have achieved the
objective of automatically informing our counterpart of a problem.
$ODUP
The second consequential action is called the Alarm Indication Signal
,QGLFDWLRQ (AIS) that is automatically inserted to take the place of a traffic stream,
6LJQDO which is lost, or degraded. This signal is unique because it is a series of
"1"s, without any frame structure whatsoever, although a different unique
signal is used at 45 Mb/s.
Any multiplexer receiving this series of 1s will recognize the pattern. It will
not only realize that there is a fault somewhere between the signal source
and the multiplexer input port, but will also be assured that the link directly
incoming is operating satisfactorily - the very fact that something is
received means that something is transmitting the signal.
Referring to the examples and Figure 2.24 again, if the 34/8 multiplexer at
C does not receive any signal from B (case 1), then multiplexer C will
automatically feed the AIS to each of its four tributaries. Multiplexer D will
recognize this and indicate a “Receipt of AIS” condition on its alarm
display unit. Multiplexer D, in turn, will feed the AIS to each of its 2 Mb/s
tributaries, where a similar indication will be displayed. Figure 2.25 shows
the complete set of alarms activated in this case.
PROMPT
DEFERRED
ALARM
ALARM
A B BREAK C D
AIS
8 34 8 2
2 8 34 8
ALARM BIT IN
34 Mbit/s
FRAME
DEFERRED
ALARM DEFERRED
ALARM
ALARM BIT IN
8 Mbit/s FRAME
'HIHUUHG Faults, which will cause a deferred alarm on a high order multiplexer, are
$ODUPV in general:
• Receipt of AIS at higher order (e.g., the 34 Mb/s incoming signal has
been replaced by the AIS); and,
• Receipt of a distant alarm from far end (e.g., the distant 8/34
multiplexer is experiencing a problem at its end).
3ULPDU\0X[ ITU-T alarms around a primary order multiplexer are different because
$ODUPV their operation includes aspects of analog-to-digital conversion. If, for
example, a primary order multiplexer receives a large number of errors in
the incoming digital signal, these must be suppressed, otherwise they will
be decoded (digital to analog), and fed into the customer’s telephone
earpiece as a burst of noise. Table 2.4 from ITU-T Recommendation
G.732, shows the alarms and consequential actions of a 2 Mb/s primary
order multiplexer, and a comparison with Table 2.3 will make the
differences clear.
Loss of incoming
signal at 2048 yes yes yes yes yes
Kbit/s
Loss of frame
alignment yes yes yes yes yes
Demultiplexer
only -3
Error ratio 10 yes yes yes yes yes
on the frame
alingment signal
Alarm indication
received from the
yes
remote end (bit 3
of time slot 0)
• Receipt of Distant Alarm from far end (i.e., the distant primary
multiplexer is experiencing a problem at its end).
• Receipt of Distant Multiframe Alarm (i.e., the distant end is having
trouble receiving multiframe alignment word (MFAW)).
5HGXQGDQF\ Present-day equipment offers many varieties of redundancy switching
6ZLWFKLQJ capabilities that permit very reliable remote control of digital
communications facilities. Reliable remote control and monitoring is
usually based on a central monitor facility that monitors remote equipment
units, circuit cards, and equipment configurations.
The desired ratio of online to backup equipment is for the user to decide.
The reliability of modern digital equipment now permits one backup unit
for several online units. New digital communications equipment
purchasers are well advised to research the latest market developments
based upon system requirements. If a user has an extensive network,
introduction of new network control and monitor facilities may also warrant
consideration.
+LJKHU2UGHU Earlier sections described the detailed operation of a primary order
'LJLWDO multiplexer, and the need to synchronize the multiplexer with the network.
This section studies details of higher order multiplexing equipment.
0XOWLSOH[LQJ
/RFDWLRQDQG Higher order multiplexers are used to combine received traffic from
$SSOLFDWLRQRI several destinations with any local traffic onto a common backhaul. This
+LJKHU2UGHU can be seen in Figure 2.26 where two 2 Mb/s IDR channels from different
destinations are combined with a single 2 Mb/s system for local traffic
0XOWLSOH[HUV (Earth station phones, fax, etc.) onto an 8 Mb/s radio backhaul. Some
large Earth stations will require higher order multiplexing towards the
satellite.
IDR
Modems
International 1
8 2
Exchange 2
RAD RAD
2 8
Digital
Radio
Backhaul
Local P Local
1 P 1
Traffic Traffic
7UDIILF The lower order traffic inputs are called tributaries. One bit at a time is
+DQGOLQJ taken from each tributary input and transmitted into the line at a higher
bit rate. This process is known as bit interleaving, and is shown in
Figure 2.27.
1 1 1 1
2 2 2 2
1 2 3 4
3 3 3 3
4 4 4 4
MULTIPLEXER DEMULTIPLEXER
3OHVLRFKURQRXV Although the principle is the same in each hierarchy, the details differ. In
2SHUDWLRQ the CEPT hierarchy, for example, the frame alignment word is transmitted
as a block of 10 bits at the start of each 8 Mb/s frame. In the NAS and
Japanese hierarchies, the frame alignment word is scattered through the
frame structure.
-XVWLILFDWLRQRU Figure 2.26 shows an Earth station that combines traffic originating from
%LW6WXIILQJ three sources: two via satellite, probably from different countries, and one
locally derived. Because each of these traffic streams originates from a
different place, they will all be operating at slightly different rates. ITU-T
Recommendation G.703 states that the output of a primary multiplexer
may vary by ± 50 parts per million, i.e., about ± 100 Hz at 2 Mb/s. To
combine all four tributaries, each operating at a different rate, a process
known as justification, or bit stuffing is adopted. These inputs are called
plesiochronous inputs, because they are operating near the nominal rate.
%LW6WXIILQJ$Q To ensure that any tributary operating within a certain degree of the
([DPSOH nominal tributary rate can be carried over a higher order system, the rate
of each tributary is increased by the multiplex equipment to a common
speed which is higher than that normally envisaged. This is achieved by
occasionally adding an extra bit into each traffic stream.
5HFRYHU\RI If the rate of each tributary is to be raised to 2.052 Mb/s, then for any
7UDIILF tributary running at exactly 2.048 Mb/s, 4000 bits will have to be added
every second (2052000 - 2048000 = 4000). For any tributary running at
2.0481 Mb/s, 3900 bits will have to be added every second, and for any
running at 2.0479 Mb/s, 4100 bits must be added each second.
From these examples, it is clear that a range of tributary rates that vary
from nominal rates can be carried over a higher rate system.
5HWLPLQJ Because a number of extra bits are added to each tributary, some method
5HFHLYHG of removing them at the receiver has to be adopted. A control signal is
7UDIILF added by the transmit multiplexer to each frame to indicate whether or not
stuffing has taken place. This control signal is called the justification
control word, or stuffing indicator, and is transmitted three times each
frame to ensure correct interpretation of the stuffing indicator, in case of
errors.
It has been mentioned earlier that the output traffic should be the same as
the input traffic. This applies to the bit rate as well as to the actual traffic
content. Figure 2.28 shows how this is achieved. The amount of bit
stuffing varies according to the speed of the traffic entering the transmit
multiplexer, is monitored at the receiver, and produces a control voltage
that serves to finely adjust the frequency of a VCO operating normally at
the nominal output rate.
To use the example quoted earlier, if 4000 extra bits are added each
second to any one tributary, the control voltage would be that is
necessary to produce an output of 2.048 MHz from the VCO. For 3900
extra bits, the control voltage produced causes the VCO to run at a
slightly higher frequency so that the output traffic is at 2.0481 Mb/s. For
4100 extra bits, the output rate would be 2.0479 Mb/s.
control voltage
VCO
CR
Tributary Output
)UDPH The frame alignment signal is a 10-bit word transmitted at the start of
$OLJQPHQW each frame:
1111010000
6HUYLFH'LJLWV Two service digits follow the frame alignment signal and are used in the
following ways.
• Distant alarm
The first service digit is used to inform the distant second order
multiplexer of a problem at the local multiplexer. This is the remote or
distant alarm. Refer to Section 2.8.
• National bit
The second service digit is available for national use. One of the possible
uses is an error-checking system, but when not in use, it is set to a 1. On
international systems, this bit is set to 1.
Bit
1 1 1 1 0 1 0 0 0 0 0/1 N 1 2 3 4 1 2 3 4 1 2 etc. 3 4 1 2 3 4
J J J J 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 etc. 3 4 1 2 3 4
JCW
213 1 52 bits from each of 4 inputs 424
J J J J 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 etc. 3 4 1 2 3 4
JCW
425 2 52 bits from each of 4 inputs 636
J J J J J J J J 1 2 3 4 1 2 3 4 1 2 3 4 1 2 etc. 3 4 1 2 3 4
JCW Justifiable
637 3 bits 848
51 bits from each of 4 inputs
No. of bits in frame: 848 frame repitition rate 9962/s
7UDIILF Fifty bits of traffic are transmitted from each tributary, using the principle of
bit interleaving.
)LUVW%ORFN
-XVWLILFDWLRQ The next four bits make up the first justification control word (JCW). By
&RQWURO:RUG this time, a decision has been taken whether or not to add an extra bit in
-&:RU the frame, and the JCW is set for each tributary: a 1 indicates bit stuffing
6WXIILQJ will take place, and a 0 indicates it will not.
,QGLFDWRU
As an example, if the JCW or stuffing indicator is 1 0 0 1, it would indicate
that in this frame, tributaries 1 and 4 have extra bits added, and tributaries
2 and 3 do not.
7UDIILF6HFRQG Traffic continues from each tributary, for two more blocks, carrying 52 bits
DQG7KLUG from each tributary in each block.
%ORFNV
5HSHDWHG The same JCW is repeated two more times. This is done to help the
-XVWLILFDWLRQ receive multiplexer correctly decide whether bit stuffing takes place or not.
&RQWURO:RUG If one JCW contains an error, a correct decision can be deduced by
comparing all three JCWs.
As an example:
Tributary 1234
1st JCW 1001
2nd JCW 1101
3rd JCW 1001
Correct output 1001
The correct output is deduced by taking the majority decision. In the first
JCW, tributary 2 is 0, in the second it is a 1, and in the third it is a 0.
Because there are more 0s than 1s, the receiver interprets the portion of
the JCW associated with tributary 2 as a 0.
-XVWLILDEOH%LWV The next four bits are those reserved for possible bit stuffing. If the three
JCWs are 1001, bits 641 and 644 in the frame are stuffed bits, inserted
because tributaries 1 and 4 are running a little slow, while bits 642 and
643 are bits of real traffic, and will be fed to the outputs in the normal way.
5HPDLQGHURI The remaining bits in the frame are used to transmit more traffic, bit-
WKH)UDPH interleaved, as earlier.
0EV)UDPH The 8 Mb/s frame is made up of 848 bits, and has a duration of 100.38
msec. Each frame contains:
Five JCWs are used at 140 Mb/s so that extra security can be applied to
the interpretation of the justifiable bits. An incorrect decision will lead to
loss of frame synchronization at lower orders, hence degrading the
performance of the network as a whole.
2SHUDWLRQRI Operation of the NAS second order (1.5/6 Mb/s) system in the NAS will
1$6+LJKHU be studied. Refer to Figure 2.30.
2UGHU0XOWLSOH[
)UDPH6WUXFWXUH
The 6 Mb/s frame is made up of four subframes, comprising 1176 bits.
)UDPH Alignment of the frames is achieved by four bits marked F0 and four bits
$OLJQPHQW marked F1 (F0 = binary 0 and F1= binary 1). Subframe alignment is
achieved by the four bits M1 to M4 (M1=0, M2 = 1, M3 = 1, and M4 =
alarm bit).
6HUYLFH'LJLWV The only service digit in the NAS higher order system is the M4 bit, which
may be used for distant alarm indication.
7UDIILF Traffic is carried using bit interleaving, as shown in Figure 2.30. Each
subframe carries 288 bits of traffic, 72 from each tributary, including one
justifiable bit.
6WXIILQJ The stuffing indicator for tributary 1 is carried as bits C11, C12 , and C13
,QGLFDWRU in subframe 1. The stuffing indicator for tributary 2 is carried as bits C21,
C22 , and C23 , in subframe 2. Tributaries 3 and 4 are carried in
subframes 3 and 4 in a similar manner.
No. of tributaries 4 4 4
Tributary bit rate 2.048 8.448 34.368
SEQUENCE:
Frame Alignment Signal 10 10 12
Service Digits 2 2 4
-XVWLILDEOH%LWV The justifiable bit for tributary 1 is the first tributary 1 bit after F1 in
subframe 1. The justifiable bit for tributary 2 is the first tributary 2 bit after
F1 in subframe 2. The justifiable bits for tributaries 3 and 4 are the first
bits for tributaries 3 and 4 in subframes 3 and 4. These bits are indicated
in Figure 2.30.
M1 48 DATA BITS C11 48 DATA BITS F0 48 DATA BITS C12 48 DATA BITS C13 48 DATA BITS F1 12 3 4
M1 SUBFRAME
M2 C 21 F0 C22 C23 F
1 12 3 4
M2 SUBFRAME
M3 SUBFRAME
M4 SUBFRAME
0XOWLSOH$FFHVV In the INTELSAT system, two main Multiple-Access schemes are in
7HFKQLTXHV operation.
RB2
BEL HOL F G I
&+$37(5
02'(0%$6,&6
0RGXODWLRQ Modulation is a process by which some characteristics of the waveform is
varied in accordance with another signal. For example, a sinusoidal wave
has three features that can distinguish it from other sinusoidal waves,
namely amplitude, frequency, and phase. For radio transmission,
modulation is essentially varying amplitude, frequency, or phase of a
radiofrequency (RF) carrier in accordance with the information to be
transmitted. Figure 3.1 shows examples of digital modulation formats for
Phase Shift Keying (PSK), Frequency Shift Keying (FSK), Amplitude Shift
Keying (ASK), and a combination of ASK and PSK, also known as
Quadrature Amplitude Modulation (QAM). Figure 3.1 also shows the so-
called M-ary PSK (MPSK) signaling case, where the processor accepts k
source bits at a time, and instructs the modulator to produce one of an
available set of M = 2k waveform types. In practice, M is usually a non-
zero power of 2 (2, 4, 8, 16, ....)
I = 1,2....M T
0 < t < T
Ψ2(t)
S2
Μ=3
Ψ1(t)
FSK Si(t) = 2E/T Cos (ωit)
t S1
Ψ3(t) S3
T
Μ=2
Ψ1(t)
Ei
ASK Si(t) = 2 /T Cos (ωot)
t S2 S1
Μ=8 Ψ2(t)
ASK/PSK
or Ψ1(t)
Si(t) = 2Ei/T Cos (ωot + φi) t
QAM
T
QPSK modulation encodes each pair of bits into one of the four phases
as described above. A typical PSK modulator is shown in Figure 3.3.
The input streams are converted into two analog multilevel signals at the
D/A converter that also performs signal encoding. The two signals have
amplitudes varying with Ak Sin Qk and Ak Cos Qk and so that they are
mapped to vector point K. The signals pass through a low pass filter and
are filtered for cosine roll-off shaping. They modulate carriers that are
arranged to have a quadrature phase relationship. The two modulated
carriers are summed to get a modulated carrier. This process converts
the baseband digital signal into a modulated Intermediate Frequency (IF)
signal.
1) 2 Phase PSK
’0’
64 kbit/s
180 0
1 0 1 1 1 0
’1’
2) 4 Phase PSK
’11’
’00’
b2 90o 5
D/A Modulated
signal
& IF PHASE
OSCILLATOR SPLITTER
1 SIGNAL
PROCESSOR
0o
bn
2 3 4
LOW-PASS
FILTER
AK Cos (θK)
LOW-PASS
A K Sin ( θK)
FILTER b1
3 5
90 o b2
2 A/D
SYMBOL
BAND PASS PHASE CARRIER TIMING &
1
FILTER SPLITTER RECOVERY & 6
RECOVERY SIGNAL
PROCESSO
0o
bn
3 5
LOW-PASS
FILTER
4
A K Cos ( θK)
(LJKW3KDVH In eight-phase shift keying, eight phase states are used. Adjacent phase
6KLIW.H\LQJ states are separated by 45 degrees. Each phase state represents a
36. symbol consisting of a sequence of three bits: 000, 001, 010, 100, etc.
Thus a representation for three bits is sent each time the transmitter is
keyed. Hence this technique provides a theoretical limit of 3 bits/s per Hz.
The relationship between the bits to be transmitted and the carrier phase
of the modulator output is given in Table 3.1.
Table 3.1
Relationship Between Transmitted Bits and
Carrier Phase of the Modulator Output
i1(t)
4-level modulator
i2(t)
Transmit Logic Circuits Power Combiner Amplifier
i3(t)
4-level modulator
90 degree
IF Local Oscillator
Phase Splitter
$OWHUQDWH0DUN
,QYHUVLRQ$0, A most straightforward code is the one that produces pulses of alternate
polarity, called Alternate Mark Inversion (AMI). Whenever a binary “1” is
applied to the input of the coder, the output alternates between a positive
and a negative voltage. (A binary "0" applied, leaves the output at zero
volts.)
5HTXLUHPHQWVRI
/LQH&RGHV One of the requirements of line codes is to ensure efficient working of the
clock recovery circuits.
&ORFN5HFRYHU\ In Section 2, the need for clock recovery was discussed. It was explained
that the system relies on tuned circuits being able to recover energy from
the signals present on the line. To do this, there have to be a relatively
large number of transitions transmitted.
&ORFN5HFRYHU\ The NAS ensures that there are a sufficient number of transitions present
ZLWK$0, by adopting the T-Law encoding characteristic. A low-level signal, or no
signal, is allocated a small quantizing level, e.g., level 1 or 2 of 128.
The binary codes produced by these quantizing levels using the A-Law
characteristic would be:
Level 1 (positive) - 10000001, or
Level 2 (positive) - 10000010.
Along with the T-Law code, the binary signal is inverted; the mathematical
term is to say that the 2’s complement was taken, so that the low-level
signals just considered would become:
Level 1 (positive) - 11111110, or
Level 2 (positive) - 11111101.
'DWD6HUYLFHV
ZLWK$0,
The theory is that it is very unlikely that the highest possible peak codes
will be present on several encoded voice channels simultaneously, and
consequently a long sequence of zeros will be naturally avoided.
&ORFN5HFRYHU\
LQ&(37 Although it is quite unlikely that several encoded voice channels will join
+LHUDUFK\ together to produce a long sequence of 1s, this may not be the case in
data channels. In the NAS and AMI, this is avoided by changing a long
sequence of zeros into a maximum of 15 zeros, followed by a 1.
+'%/LQH
&RGH
Long sequences of zeros are likely to occur naturally in the CEPT
hierarchy. This is particularly likely during nighttime when all the 30
channels might well be idle. To counteract this problem and still allow
data customers to operate, an alternative line code was adopted by the
CEPT, called HDB-3.
Rule 3: Every V pulse must be of the same polarity as the last transmitted
pulse.
LINE CODER
ALARM
1 0 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 1 0 0
0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0
AMI
1 1 1
0 0 0 0 1 0 0 0 1 0 0 0 v 0 0 0
1 v 1 1
HDB-3
HDB-3 EXAMPLE A
CONSIDER 0 1 0 0 0 0 0 1 0 1 0 0
1 0 0 1 0 0 0 0 0
LINE
CODER
INPUT 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0
SIGNAL
1 v 1 1 v
CORRECT
HDB-3
OUTPUT 1 B v
0 0 0 0 0 0 0 0 1 0 0 0 0 0
1 v 1 1
HDB-3 EXAMPLE B
$OWHUQDWLYH1$6 An alternative line code, used in the NAS, has been developed that
/LQH&RGH allows 64 Kb/s to be offered to customers in the US environment. This is
achieved by replacing a sequence of eight zeros by a unique code,
recognizable by the receiver, and which is capable of being converted
back into a sequence of eight zeros.
/LQH&RGHVDW
The line codes discussed all apply to the primary order of multiplexing,
+LJKHU2UGHUV CEPT and NAS.
&(37+LJKHU The CEPT higher order line code is HDB-3 for 2, 8, and 34 Mb/s,
2UGHU&RGHV whenever an interface point appears on cable.
At bit rates above this, the interface is generally not on copper cable, and
other line codes, such as Coded Mark Inversion (CMI) are used.
1$6+LJKHU The NAS higher order line codes are variations of the B8ZS code
2UGHU&RGHV described above. ITU-T Recommendation G.703 provides complete
details.
$6XPPDU\RI ITU-T Recommendation G.703 specifies the line codes used in the CEPT,
/LQH&RGHV NAS, and Japanese hierarchies. Table 3.2 provides a summary of these
codes.
LINE 1 0 1 0 0 0 0 0 0 0 0 1
CODER
OUTPUT
B8ZS
OUTPUT
B8ZS - Case 1
LINE
1 1 1 0 0 0 0 0 0 0 0 1
CODER
OUTPUT
B8ZS
OUTPUT
B8ZS - Case 2
&RGHG0DUN CMI is a two-level code and is ideal for optical fiber communication,
,QYHUVLRQ&0, where a laser would be either on or off.
1 0 0 1 1 0
LINE
CODER
INPUT
CMI 0
OUTPUT
0 0 0 1 0 1 1 1 0 0 0 1
8VHU,QWHUIDFHV This section examines how the user interfaces with the network
particularly at the FDM/digital interface, the data users interface, and
the way an analog user interfaces with the network.
)'0'LJLWDO
Some Earth stations around the world still operate FDMA systems over
,QWHUIDFH satellite links. A problem arises when converting the networks to digital
regarding how to connect FDM satellite traffic to a digital backhaul. Two
possible ways of achieving this are:
([DPSOHVRI7 Typical T-Mux equipment in the CEPT network accepts one basic
0X[&RQYHUVLRQ supergroup (312-552 kHz) and converts it into two 2.048 Mb/s digital
blocks. It also performs the reverse conversion. Typical T-Mux
equipment in the NAS network accepts two basic groups (60-108 kHz)
and converts them into one 1.544 Mb/s digital block. There is no loss of
traffic in either case- a supergroup carries the same number of
channels as two 2 Mb/s blocks, and two groups carry the same as one
1.5 Mb/s block.
There is also logic to the conversion. For example, in the CEPT system,
Channel 1 of group 1 becomes channel 1 of the first digital block;
Channel 12 of group 5 becomes the last channel of the second digital
block, and all the other channels are allocated as shown in the table in
Table 3.3.
6LJQDOLQJ The signaling systems used in FDM networks are different from those
&RQYHUVLRQ used in PCM networks. The T-Mux is capable of automatically
converting between many of these. For example, in many FDM
networks the telephone circuit, busy/idle condition is transmitted by
means of a 3825 Hz “out-of-band” frequency. The T-Mux can be
configured to detect this tone in each channel, and convert it into
appropriate signaling bits of the TS16 associated with individual
circuits.
One of the signaling systems that T-Mux can not support is ITU-T
system Number 7 because it depends on a continuous 64 Kb/s data
circuit between switches.
FDM DIGITAL
GROUP CHANNEL TS DIGITAL BLOCK
1 1 1
2 2 1
1 . . .
. . .
12 12 1
1 13 1
2 14 1
2 . . .
. . .
12 24 1
1 25 1
2 26 1
. . .
3 6 31 1
7 1 2
. . .
12 6 2
1 7 2
2 8 2
4 . . .
. . .
12 19 2
1 20 2
2 21 2
5 . . .
. . .
12 31 2
)'03LORWVDQG The CTEs or GTEs normally produce pilot frequencies, but when a T-
'LJLWDO$ODUPV Mux replaces this equipment, the pilots are generated by the T-Mux. An
alarm indication from the digital to the FDM network is achieved by
removing a pilot if the digital network becomes faulty, thus alerting the
distant end. In the opposite direction, loss of a supergroup into the T-
Mux would result in an AIS being sent forward.
FDM
SATELLITE
LINK 2x2 Mbit/s Blocks
T-MUX
FDM BASIC
NETWORK SUPERGROUP
8VHRI Sometimes, an analog signal has to be carried between two places that
:LGHEDQG are connected by an existing digital system. This situation can be
&RGHFV overcome by using a coder/decoder system. A common example is in
handling analog TV over a digital backhaul.
TV 34 Mbit/s 34 Mbit/s TV
VIDEO CODEC microwave microwave CODEC TV GCE
S Q C
ANALOG TV DIGITAL TV
BASEBAND BASEBAND
0 - 5.5 MHz 34 Mbit/s
DC
KEY:
S = SAMPLER
Q = QUANTIZER
C = CODER
DC = DECODER
'DWD,QWHUIDFLQJ For many years, data customers used FDM network channels to carry
traffic at bit rates up to 9.6 Kb/s, or 13.2 Kb/s occasionally. If the user
wanted to operate at higher rates, they used a complete basic group
(60-108 kHz) to transmit traffic up to 64 Kb/s. This was, of course,
expensive, but did follow a set of rules developed by the ITU - i.e., ITU-
T Recommendation V.35. Although this recommendation has been
superseded by more recent ITU-T recommendations, it is still
sometimes referred to for the physical and electrical interfaces between
the customer equipment (FAX, PCs, etc.) and the network.
,QWHUIDFH The usual interface between the DCE and the network is a system
%HWZHHQ'&( known as Codirectional Interface, from ITU-T Recommendation G.703.
DQG1HWZRUN This type of channel is sometimes called “Isochronous” or
“Synchronous”. This interface combines data and timing information.
'7('&( There are many protocols at this level, but one of the most commonly
,QWHUIDFLQJ used protocols is known as V.24. The main interconnections are listed
below along with their standard names (circuit numbers).
9
%DVLF'DWD
Circuit Use
([FKDQJH 102 Signal Earth: a reference for signal measurement.
103 Transmit Data: from DTE to DCE.
104 Receive Data: from DCE to DTE.
$QDORJ8VHU The connection between analog user input and the network relies on
,QWHUIDFHV the correct use of levels, and the conventional interface between two
and four wire lines. ITU-T Recommendation G.711 defines the
application of A-Law and T-Law coding to analog levels and allows
them to be related to peak codes. For example, an input signal of +3
dBm will produce a peak code of ±127. This will only hold true if the
dBr points are correctly set. Echo control must also be taken into
consideration.
(FKR&RQWURO Echo is not a new problem to telecommunications staff: a poor match at
a 2-wire/4-wire conversion point causes it. Echo is discussed in greater
detail in Appendix 1. The traditional solution is to install an echo
suppressor at each end of the analog circuit, which allows transmission
in just one direction at a time. There are problems with this.
3ULQFLSOHRI Refer to Figure 3.11. A portion of the receive path is fed into a variable
2SHUDWLRQ delay circuit where the delay can be adjusted so as to be the same as
the delay of the signal in the local echo path. The delayed signal is
then modified in amplitude and phase to form a replica of the echo. This
signal is then combined with the transmit path in such a way as to
cancel out the echo signal. The time taken for the initial setting up is
less than 500 ms.
4-WIRE
TRANSMIT
NLP
2-WIRE USER
Echo
Control
Replica
4-WIRE
NLP - Non Linear RECEIVE
Processor
If the echo is severe enough, its effects can prevent a talker from
continuing with conversation. The tolerance of an average subscriber to
echo has been subjectively measured. It is found to depend upon two
things: level of the received echo compared to the transmitted power,
i.e., echo path loss, and the time taken for the echo to return to the
talking end, echo path delay. For example, a subscriber can tolerate a
high level of echo provided the delay is short, or, a low-level echo if the
delay is long.
The point in a circuit that gives most trouble is the 2W-4W interface-
terminating unit. It is impossible for the balance to accurately match the
wide range of impedance presented by a variety of 2-wire lines in the
switched network, and this, in turn, gives rise to poor balance return
loss at some frequencies. The result is that some power is reflected into
the terminating unit from the 2-wire system, and this is returned to the
subscriber and will appear as echo. Echo path loss under such
conditions will be about 10 dB.
6\QFKURQL]DWLRQ This section discusses synchronization and focuses on practical
aspects on how the various subsystems of an overall end-to-end
network are kept in perfect synchronization with one another.
This section has three parts. The first part will discuss how the primary
multiplexers keep in synchronization, the second part on how the
customers synchronize with the primary multiplexers, and the third part
will provide an overview of network synchronization.
)UDPH
It is not sufficient to operate the two terminals at the same speed. They
6\QFKURQL]DWLRQ could be operating at exactly the same speed, but 180 degrees out of
phase, for example. It is essential that the traffic is also synchronized
between receiving and transmitting equipment. This is achieved by use
of a Frame Alignment Word (FAW).
8VHRIWKH)$: FAW is a specially defined word that is inserted in the frame structure
at regular intervals. In the CEPT frame structure, it is composed of one
8-bit word inserted into every alternate time slot zero (TS0). The ITU-T
defines this word in Recommendation G.704, and it is illustrated below.
X0011011
The receiving equipment detects this word so that it can recognize the
start of the new frame. The problem is that this word can occur in
random data. Hence, to reduce the possibility of false synchronization
in the CEPT system, a different word is transmitted in the remaining
TS0s. This word, illustrated below, the FDW, is defined in ITU-T
Recommendation G.704.
The bit which is used to help with initial synchronization is the "1" in the
CEPT FDW above. As it is not the same as the second bit in the FAW,
it can be used to check that the FAW has been replaced by something
else.
X1ATTTTT
- for the first time, the presence of the correct frame alignment
signal;
6SHHGRI The process described above may seem complex, but in practice it
$FKLHYLQJ appears to be almost instantaneous when the equipment is plugged in.
6\QFKURQL]DWLRQ It could take just the reception of two complete frames to verify
synchronization. This could take 125msec x 2 = 250ms, although
normally it will take slightly longer.
SCAN
IN C O M IN G
DATA
NO YES
FAW
PRESET?
(1 2 5 u s e c la te r)
NO YES
FDW
PRESET?
(1 2 5 u s e c la te r)
NO FAW YES
PRESET?
IN S Y N C
a) S Y N C H R O N IZ A T IO N L O G IC
IN
S Y N C H R O N IZ A T IO N
CHECK FDW
F O R D IS T A N T A L A R M
YES
NO CHECK FO R CLEAR
CO UNTER
FAW
ADD ONE TO
COUNTER
YES NO
COUNTER
= 3?
LO SS O F
SYNC
b) L O G IC F L O W F O R L O S S O F S Y N C H R O N IZ A T IO N
1$6([WHQGHG The six alignment bits making up the frame alignment signal are
6XSHUIUDPH irregular in pattern and serve the double purpose of frame and
6\QFKURQL]DWLRQ multiframe alignment. Once these six bits have been detected at the
receiver in the correct sequence, frame alignment is achieved. Loss of
frame alignment should be recognized if the frame alignment signal has
been missing for a maximum of 12 msec.
'DWD For data transmission, the receiver must be in synchronization with the
7UDQVPLVVLRQ transmitter, and this can be achieved in one of two ways.
$V\QFKURQRXV This is the type of synchronizing process used by, for example, a
7UDQVPLVVLRQ teleprinter. Each letter typed is represented by a five-bit code, and the
code is preceded by a start bit, and followed by a stop bit. It is
commonly called a "START/STOP" system, and although it is relatively
simple, it is rather inefficient. This system is used for relatively low-
speed circuits (say up to some 9.6 Kb/s).
CHAN CHAN
i/p o/p
DIGITAL
NETWORK
CHAN CHAN
o/p i/p
2WKHU'DWD There are a number of other data applications, each requiring different
8VHUV levels of synchronization. They are:
Fax: Fax, or Facsimile transmission has been in use for many years,
and its use is increasing. Many fax machines operate digitally, although
the telephone lines in use are analog. Recent developments have
produced a new breed of machine, called Group 4 fax. This machine is
intended to operate at 64 Kb/s and offer, for example, a 3-second
transmission time for an A4 document. The earlier machines’
“handshake” at the beginning and end of transmission, is similar to the
start/stop system discussed earlier. Group 4 fax machines are
designed to operate in a synchronous mode.
&HQWUDO&ORFN This system, illustrated in Figure 3.14, uses a very accurate and highly
stable clock source, which is centrally located in the network. This clock
in the network is called a Stratum 1 clock in ITU-T G.811, although the
term normally used is LEVEL 1 CLOCK.
LEVEL ACCURACY
STRATUM 1
1 MINIMUM 1 in 10 11
USUAL (Caesium Beam) 7 in 10 12
LEVEL
STRATUM 2 STRATUM 2 1 in 109
2
LEVEL 1 in 107
STRATUM 3 STRATUM 3 STRATUM 3
3
LEVEL
STRATUM 4
4
Figure 3.14 Distribution of Clocks
0XWXDOO\ The level 1 clock is distributed to a number of less stable clocks, known
6\QFKURQRXV as level 2 clocks, which in turn control level 3 clocks. The level 2 and
level 3 sources are used to ensure that primary multiplexers, switches,
Earth station plesiochronous buffers, etc., are all synchronous.
SYNC
SYNC SYNC
STRATUM 1 STRATUM 1 STRATUM 1 LEVEL 1
P S P S P S P S
2 2 2 2 LEVEL 2
P S P S P S P S P S P S
3 3 3 3 3 3 LEVEL 3
P = PRIMARY PATH
S = SECONDARY
:KROO\
6\QFKURQRXV This system, illustrated in Figure 3.16, could be used to synchronize all
multiplexers, switches, etc., but it is not commonly used.
6\VWHP
0HWKRGVRI There are two basic methods of distributing the synchronization signals.
'LVWULEXWLRQ These are discussed below.
CLK 140 34
2 8
P
EXCHANGE
8 2
34 8
8 P
2 8 34
2 EXCHANGE
8 34 140
P
'LJLWDO Previous sections discussed how a digital signal is produced from an
,PSDLUPHQWV analog input, and how a number of channels can be combined into one
data stream. This section considers what can go wrong with a digital
stream, how to count errors, whether the errors can be corrected, and
how.
The only thing that can happen to a digital signal is that a 1 is received
instead of 0, or 0 instead of 1, i.e., errors are introduced. There are three
causes of error- Clock Slip, Jitter, and Noise. We will examine them in
turn.
&ORFN6OLS Clock Slip is a timing problem that occurs when two networks meet. This
situation exists in every Earth station, where one country’s network
interfaces with several others. To control this situation, it is necessary to
use buffer stores (plesiochronous or Doppler).
(IIHFWVRI&ORFN Slips will cause errors to data circuit users, “clicks” to audio circuit users,
6OLS streaks on fax printouts, and other problems to users. The ITU
recommends maximum tolerable slip rates for various types of service.
They are:
([FHVVLYH&ORFN In practical end-to-end connections, the actual slip rate may considerably
6OLS exceed recommended targets. Whether or not it will affect the service can
be deduced from the above Table 3.4 and ITU-T Recommendation
G.822. In the Earth station environment, there are three potential sources
of excessive clock slip:
-LWWHU Jitter is defined as the displacement in time of a signal from its ideal
position.
6RXUFHVRI-LWWHU Three main causes of jitter in a transmission system are the process of
multiplexing, particularly in higher order multiplexers, regeneration, and
the transmission path itself.
-LWWHU6RXUFH Earlier sections discussed how overheads are added to digital signals for
+LJKHU2UGHU various purposes, e.g., synchronization. These overheads should exist
0XOWLSOH[HUV only when the signal is passing between corresponding multiplexers, and
must be removed before the digital signal is fed to the end user. The
output signals are not regular and, therefore, pauses occur while the
overheads are removed. These pauses are smoothed out in the final
stages of the multiplexer, but some unsteadiness remains as jitter.
-LWWHU6RXUFH A regenerator has the job of receiving a degraded signal, extracting timing
5HJHQHUDWRUV information, and retransmitting a new signal, recreated from what has
been received, at the recovered clock rate. The main problem lies with
the recovered clock rate that tends to be pattern-dependent. Problems
also arise in regenerators due to equalizer misalignments, component
aging, and mistuning of the clock recovery circuits.
:DQGHU Wander is best described as "slow jitter", because the timing varies at a
slow rate. The two main causes already mentioned are now explained in
greater detail.
Both copper and fiber cable systems with regenerators may be affected
by temperature, especially if there are large daily temperature changes or
seasonal variations. Propagation time will alter at a low rate. This might
apply to a backhaul, especially if regenerators are included in overhead
plant (i.e., installed on poles).
0HDVXUHPHQWRI There are two parameters associated with the measurement of jitter - the
-LWWHU amplitude and the frequency of the jitter.
-LWWHU$PSOLWXGH The amplitude of the jitter is measured in unit intervals, abbreviated as UI.
A unit interval is the duration of each bit period. At 2.048 Mb/s, the
duration of each bit is 488 nsec. If that signal were to arrive early or late
by, say, 244 nsec, the amplitude of the jitter would be described as:
3UREOHPV If excessive jitter is present on a digital system, errors will occur. Signals
5HVXOWLQJIURP are expected by the receiving equipment at specific times, e.g., every 488
ns, for a 2 Mb/s signal. If those signals arrive early or late they will be
([FHVVLYH-LWWHU missed, and errors will be introduced. To limit errors, the ITU-T quotes
maximum figures for jitter anywhere in a network. These are measured
using a jitter receiver, and maximum jitter amplitudes are defined over
specific ranges of frequency.
-LWWHU7HVWVIURP Because an excessive jitter at the output of a network can cause errors, it
D1HWZRUN is necessary to define the maximum amount allowable at any point. There
are several sources of jitter, all acting on the same digital signal.
Consequently, a signal is not jittered by one frequency, but by several
frequencies simultaneously. To take this into account, jitter measurement
measures the maximum jitter amplitude over a range of frequencies.
0D[LPXP When measuring jitter in the manner described above, the figures for the
$FFHSWDEOH-LWWHU maximum acceptable jitter at any point in the digital hierarchy can be
found in ITU-T Recommendations G.823 for CEPT hierarchy, or G.824 for
the NAS hierarchy. INTELSAT specifies these targets in IESS-308,
paragraph 10.7, and the most useful figures are reproduced here in
Figures 3.18 and 3.19.
B1 UNIT
INTERVALS
MEASURED
JITTER JITTER
DETECTOR AMPLITUDE
(A)
f1 f3 f4 JITTER FREQUENCY
(B)
B1 unit
Band pass filter intervals
cut-off f1 and f4
Jitter Measured
Detector jitter amplitude
Band pass filter
Hierarchical Interface cut-off f3 and f4 B2 unit
or equipment intervals
output port
Digital rate f1 f3 f4
(Kb/s) B 1 B 2
(Hz) (kHz) (kHz)
B 1 unit
Band pass filter intervals
cut-off f1 and f4
Jitter Measured
Detector jitter amplitude
Band pass filter
Hierarchical cut-off f3 and f4 B 2 unit
or equipment intervals
output port
0D[LPXP Read the table for the amount of jitter measured at 2.048 Mb/s in Figure
$FFHSWDEOH 3.18, which refers to the CEPT hierarchy. Drawing a line under 2.048
-LWWHU Mb/s, the filter frequencies range from 20 Hz to 100 kHz (f1 to f4) for the
wider filter, and 18 kHz to 100 kHz (f3 to f4) for the higher part of the band.
$Q([DPSOH By referring to the drawing, a maximum of 1.5 UIs (B1) is tolerable over
the wider band, while 0.2 UI is the maximum tolerable between 18 kHz
and 100 kHz.
6HOHFWLRQRI Most jitter measuring sets will automatically select the correct filter
frequencies when the speed is selected, so the only figures usually
)LOWHUV needed are for B1 and B2 UIs.
5XQQLQJWKH As jitter tends to occur randomly, it is normal to run a test for a few
minutes, noting the maximum jitter amplitude during that time. Most test
7HVWV instruments will do this automatically. Tests will typically be performed
over a satellite link or over a backhaul, and may be performed while in
service. Refer to Figure 3.20.
-LWWHU7ROHUDQFH The above tests have specified the maximum jitter that may be apparent
7HVWV at the output of a network or at any hierarchical interface. Because there
may be a certain amount of jitter present at the output of the network, it is
possible that there may be a jittered signal into your receiver. The jitter
tolerance test, therefore, tests the receiver to ensure that it will handle a
jittered input up to a certain extent.
-LWWHU7ROHUDQFH The arrangement for testing the input jitter tolerance of transmission
7HVW3URFHGXUH equipment is shown in Figure 3.21. An unjittered input signal is
deliberately jittered by a specific amount. At the system output, the signal
is fed into an error detector. The equipment operates satisfactorily if no
errors occur.
Last Updated: 12 March 1999 Page 100 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
DIGITAL
DIGITAL
RX FROM
TX EQPT
BACKHAUL
(1)
JITTER
RECEIVER
(2)
DIGITAL
DIGITAL
TX FROM
RX EQPT
BACKHAUL
Pattern Jitter
Generator Generato 8
Pattern
Generator 8
Jitter Tolerance
Jitter for receive section
T
Generator multiplexe
f
Error
Detector
2
Last Updated: 12 March 1999 Page 101 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
-LWWHU7ROHUDQFH
Figure 3.22, taken from ITU-T Recommendation G.823, lays down the
7HVW7DUJHWV objectives for this test. Using 2.048 Mb/s as an example, and relating the
figures in the table to the graph adjacent to it, one will notice a certain
degree of agreement between this test and the maximum output jitter test.
Between frequencies f1 and f2, 20 Hz and 2.4 kHz, the transmission
equipment should operate with A1 (1.5) UIs of jitter. Between the
frequencies f3 to f4, 18 kHz to 100 kHz, the equipment should operate with
A2 (0.2) UIs of jitter. Similar graphs and tables can be found in G.824 for
the NAS.
-LWWHU0DUJLQ Although the test just described checks that the equipment operates
correctly, it is unclear just how much better it is than the graph. For
example, at 30 Hz, the equipment may be able to handle 1.5 UI, but not
1.6 UI of jitter. There is very little margin for equipment aging. It is usual,
especially when commissioning new equipment, to test a few spot
frequencies to check how much margin exists. The same test set up as
earlier is used. One frequency is selected, say 30 Hz, and the amplitude
of jitter is increased from 1.5 UI until errors occur. This is repeated at
several frequencies to determine the margin. Refer to Figure 3.23.
Although no figure for margin is specified, any narrow margin should be
investigated, especially when testing new equipment.
-LWWHU7UDQVIHU The test setup is shown in Figure 3.24. A signal with a known jitter
7HVWV amplitude is inserted into transmission equipment, and the amplitude of
jitter present at the output is measured. The jitter transfer is calculated
from the formula:
Last Updated: 12 March 1999 Page 102 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Peak-to-peak
Parameter amplitude Pseudo-random
value unit Frequency
interval test signal
Recs 0.151
Digit rate A 0 A 1 A 2 f 0 f 1 f 2 f 3 f 4 and 0.152
Kbit/s
Slope equivalent
1.15 0.25 0.05 20 Hz 600 Hz 11 A 0 to 20 dB/decade
64 3 kHz 20 kHz 2 -1
-5
1.2 x 10 Hz
2 048 36.9 1.5 0.2 20 Hz 2.4 Hz 18 kHz 100kHz 2 15- 1
an
Pe
d A 1
-5 ak-
wa
8 448 152 1.5 0.2 1.2 x 10 Hz 20 Hz 400 Hz 3 kHz 400kHz 2 15- 1 to-
nd
pe
er
ak
am
jitt A 2
plit
er
ud
34 368 * 1.5 0.15 * 100 Hz 1 kHz 10 kHz 800kHz 2 23- 1 e
3500 f 0 f 1 f 2 f 3 f 4
139 264 * 1.5 0.075 * 200 Hz 500 Hz 10 kHz 2 23- 1
kHz
Jitter frequency
Slope equivalent to
20 dB/decade
JI T
TE
1.5 R MA
RG
I N
0.2
0
20 Hz 2.4 kHz 18 kHz 100 kHz
Jitter frequency
Last Updated: 12 March 1999 Page 103 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
JITTER JITTER
RECEIVER GENERATOR
dB
20 dB/decade
0.5
f0 f5 f6 f7
40 Hz 400 Hz 100 kHz
outin
J J
20 log
-19.5
T 1501590-88
Last Updated: 12 March 1999 Page 104 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
$FFXPXODWLRQRI As a network becomes more complex, the amount of jitter present will
-LWWHU increase. Much study has been performed on this, and computer models
have been produced. Jitter does not increase linearly, i.e., if there are two
digital processes instead of one, it does not double, but actually increases
at a slower rate. For details, refer to ITU-T study group documentation.
-LWWHU5HGXFWLRQ It is often necessary to remove any jitter present in a received signal. The
block diagram in Figure 3.26 illustrates the principles of a jitter reduction
circuit. The operation of this circuit is described below.
PHASE
COMPARATOR CONTROL VCO
VOLTAGE
C/R
CLOCK
RECOVERY
2SHUDWLRQRI The incoming jittered traffic signal is written into a first-in, first-out buffer
-LWWHU5HGXFWLRQ store, by a write signal recovered from the incoming signal. The Write
signal will be jittered by the same amount as the traffic signal. The traffic
&LUFXLW signal is read out from the store by using a Read signal, also derived from
the incoming traffic, but with the jitter removed.
Last Updated: 12 March 1999 Page 105 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
However, there is a low pass filter between the phase comparator and the
VCO. If the incoming signal varies at too high a rate, i.e., if the jitter
frequency is too high, the varying DC voltage will not pass through the low
pass filter, and the VCO will assume a rate approximating the average
incoming frequency. The VCO will therefore be a smoothened recovered
clock that can be used to read the traffic smoothly out of the buffer. This
type of circuit is built into every receive card on high-order multiplexers so
that excessive jitter is reduced automatically in the multiplexer.
(UURUV Previous sections discussed the various ways in which a digital signal can
be degraded as it passes through a system. This section describes
methods to measure the degree of degradation particularly in an Earth
station environment, and consider what is an acceptable limit. In this
section, the subject of errors will be examined in detail, and a method of
setting objectives introduced. A simple method of counting errors and
quoting error performance is the Bit Error Ratio, BER.
(IIHFWVRI(UURUV An ideal system will have no errors. If there are errors, something is
wrong. However, the matter of interest is whether the errors are
noticeable to circuit users. The effects of errors vary with the different
circuit users.
$XGLR&LUFXLW An audio circuit user - a telephone user, for example - will be listening to a
8VHUV decoded digital signal. Whether the user will notice the introduction of an
error depends on which bit of an 8-bit word is corrupted. Tests have
shown that the average user only notices 1 error in about 20. Even if an
error is noticed, it will not be noticed immediately.
Last Updated: 12 March 1999 Page 106 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
From the above description it can be seen that if all the errors occur in
bunches, they are more likely to be rejected by audio users than if they
are evenly spaced. The number of errors per second is of secondary
importance; it is the grouping that counts.
'DWD&LUFXLW Data users normally organize the data into blocks. The length of the
8VHUV blocks depends on the protocol in use, but some bits in each block are
usually reserved for error checking purposes. The method may vary from
simple parity checking to complex methods.
Once the data user has detected an error in the received traffic, it is a
common practice to request a retransmission of that and subsequent
blocks.
2WKHU&LUFXLW Other circuit users include FAX, TV, and VF data. Each use has its own
8VHUV requirements. A TV system can be quite forgiving because the human
eyes and brain can link from one good picture to the next, skipping over
the occasional degraded picture. FAX messages may have to be
completely re-sent if errors occur, but VF data users may tolerate a
surprisingly high concentration of errors.
(UURUHG6HFRQGV If any 1-second interval contains any error, that second is called an
errored second. The number of errored seconds in a data circuit is
normally expressed as a percentage of the total testing period hence:
Last Updated: 12 March 1999 Page 107 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
6HYHUHO\(UURUHG This term is used to refer to any 1-second interval where the bit error
6HFRQGV6(6 ratio, BER, is worse than 1 in 103. For a 64 Kb/s, a severely-errored
second is one that contains more than 64 errors. Hence the number of
error bursts can be measured. As with errored seconds, SES is normally
quoted as a percentage of the total testing period:
Severely-Errored Seconds =
Number of seconds with BER > 1 in 103 x 100%
Total testing period in seconds
'HJUDGHG This figure takes a longer measuring period of sixty seconds, and if the
0LQXWHV'0 BER is worse than 1 in 106, the period is counted as a degraded minute.
If measurements are performed at 64 Kb/s, any period of 60 seconds
containing more than 4 errors is counted as a degraded minute. This is
used to count the long term, background, distribution of errors, and is also
normally expressed as a percentage:
Degraded Minutes = Number of minutes with BER > 1 in 106 x 100%
Total testing period in minutes
Last Updated: 12 March 1999 Page 108 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
(UURU2EMHFWLYHV The ITU-T has set error objectives in the terms discussed above, and
related them to a standard reference circuit known as the Hypothetical
Reference Connection (HRX). Having set these objectives for the HRX,
the ITU-T then provides a method to calculate the objectives for any
circuit. This is a test mainly of interest to the data department of an
organization. INTELSAT’s interest is that the satellite link and backhaul
form part of the international connection, and should not, therefore,
contribute an excessive amount of errors. Consider the HRX to see
exactly where satellites fit in.
+5; Figure 3.27 shows an HRX with a total end-to-end length of 27500 km. It
is mainly made up of an international connection, which may pass
through up to three different countries at their ISCs. Each terminal
country will have a local connection between the 64 Kb/s users and their
nearest exchanges, remote line unit, switch, distribution node, etc., and
also a national trunk connection between the local exchanges and the
ISC.
27,500 km
+5;4XDOLW\ Figure 3.28 illustrates relative quality of each constituent part of the HRX,
'HPDUFDWLRQ and indicates distances. The international section, from one terminal ISC
to another terminal ISC, is considered to stretch 25,000 km and provides
a high grade of service.
Last Updated: 12 March 1999 Page 109 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
(DUWK6WDWLRQLQ The Earth station typically forms part of the international connection as
WKH+5; shown in Figure 3.29. Hence it contributes to the high-grade section of
any network. An Earth station-to-Earth station link is considered as being
equivalent to 12,500 km of the high-grade section, leaving up to 12,500
km for backhauls and/or international transit sections.
27,500 km
note 2 note 2
LE LE
T-
T-
reference
reference
point
point
(note 1)
NOTES:
2. This point may be at the LE, PC, SC, TC or ISC depending on country size.
3000 km 240 km
Last Updated: 12 March 1999 Page 110 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
,QLWLDO/LQHXS Table 3.5 shows digital error performance that ITU-T recommends in
Recommendation M.555, which states that tests can be performed on
loopback. The maximum acceptable error count would then be double
the figure mentioned above
500 15 5
1000 15 10
2000 15 20
4000 15 40
8000 15 80
12 500 15 125
18 000 15 180
25 000 15 250
'DLO\ Daily maintenance and operation in the digital environment are generally
0DLQWHQDQFH less tedious than in the analog environment. Nevertheless, care should
be taken to ensure that the BER and/or concentration of errors do not
DQG2SHUDWLRQ increase and that antenna tracking accuracy is maintained. If the carrier-
to-noise ratio worsens, so will the BER, resulting (initially) in worsening
errored seconds and degraded minutes figures. Propagation difficulties,
Sun interference, spurious carriers, etc., will increase severely-errored
seconds and degrade BER. In extreme conditions, there will be a
complete loss of service.
Last Updated: 12 March 1999 Page 111 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Example
3DULW\&KHFNLQJ Parity checking involves breaking the data stream into a series of blocks.
At the transmitter, the number of 1s in that block is counted, and if the
number is even, an extra parity 1 is added. At the receiver, each block is
checked to ensure that an odd number of 1s has arrived. An even number
of 1s indicates presence of error(s) and an ARQ is sent.
&RGH9LRODWLRQ Code violation involves coding each bit of information in a unique manner.
For example, each time a 1 is transmitted, the polarity or phase might be
inverted. If two signals of the same polarity were received consecutively,
an error might have occurred, and an ARQ is sent.
Last Updated: 12 March 1999 Page 112 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
The satellite transmission delay limits use of an ARQ system to low data
rates. This is because ARQ requires buffers capable of holding blocks of
data until a confirmation signal from the distant equipment is received.
As an example, a 10 Mb/s bearer would require a buffer capable of
holding a minimum of 5 Mb/s.
For the above reasons, FEC is used where the information for
transmission is coded using known patterns that will allow reliable
decoding at the distant end. On all coded systems, the bit rate to the
satellite is greater than information rate into the FEC encoder. Figure
3.31 shows the position of the FEC encoder and decoder in an IDR
channel unit.
Last Updated: 12 March 1999 Page 113 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
BER 10
-1
-2
10
-3
10
Typical Value
Ideal Value
Without FEC
-4
10
R = 3/4
-5
10
With
FEC
-6
10
-7
10 Eb/No (dB)
0 2 4 6 8 10 12 14
A D
TRANSMIT INTERFACES
a b SCRAMBLER c FEC d e
OVERHEAD ENCODER QPSK TO UP-
ADDITION CCITT REC. CONVERTER
(Rate 3/4) MODULATOR
V.35
a b c FEC d e
OVERHEAD DE- QPSK FROM DOWN
SCRAMBLER ENCODER
REMOVAL (Rate 3/4) DEMODULATOR CONVERTER
RECEIVE INTERFACES
H a INFORMATION RATE IR E
b/c COMPOSITE RATE CR = IR PLUS OVERHEAD
d TRANSMISSION RATE R = CR/C (C = Code Rate = 3/4)
e SYMBOL RATE SR = R/2
Last Updated: 12 March 1999 Page 114 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
0011
X1i Output
Input
1101 10, 00, 01, 11
1 2 3
X2i
1001
Last Updated: 12 March 1999 Page 115 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Referring to Figure 3.32 and assuming that the encoder starts in the all
zeros state, the first four bits 1011 produce an output of 11, 10, 00, and
01, respectively, as shown. Clearly, the output corresponding to each
new input bit depends on the previous 2 input bits that are stored in the
shift register.
The output bits can also be derived from the trellis diagram, shown in
Figure 3.33, which has been drawn to match the code generation for the
encoder in Figure 3.32. The trellis starts at the all zeros state, node a, at
time t = 0. Transitions are made corresponding to the input bit. These
transitions are denoted by a solid line for a 0 input, and a broken line for a
1 input. The output bits obtained are shown next to the transition.
The four states “a” to “d” equate to the conditions of stages 1 and 2 of the
shift register prior to the insertion of the next bit.
Last Updated: 12 March 1999 Page 116 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Two output bits represent each input bit to the above encoder. The
location of any two output bits within the trellis can be identified from the
preceding and the following bit pairs, which are dependent on the
preceding and following input bits. Obviously, the error correcting
performance of the encoder and the decoder are improved by increasing
the number of input bits which have an effect on the output bit pairs of the
encoder. This is achieved by increasing the constraint length of the
encoder. However, it can be shown that little improvement is achieved for
a constraint length greater than 8.
,'5(QFRGHU Figure 3.34 shows a Rate ¾ convolutional encoder. This code is known
as a punctured type of convolutional code and is constructed from a Rate
½ encoder by periodically deleting specific bits from the Rate ½ output bit
sequence. It has been shown that punctured codes operating at rates
higher than ½ rate result in a performance loss of only 0.1 dB to 0.2 dB,
but the main advantage is reduced circuit complexity. The encoder has a
constraint length of 7 and generates polynomials of 133 and 171 in octal
notation or binary 1011011 and 1111001, respectively.
Deleting Bit
Pattern = 110
Bit Selector P
Uncoded
Data Input Bit Selector Q
Deleting Bit
Pattern = 101
Figure 3.35 shows the four major processes associated with the operation
of a punctured code scheme. The data input at the transmit point (A) is
initially encoded by a rate ½ convolutional encoder implementing the
constraint length 7 code. The encoded output (B) consists of two
codewords, C0(n) and C1(n), for each input bit D(n). Certain codewords
are deleted from the data stream to be transmitted as shown in (B), and
the remaining codewords are regrouped into two-codeword symbols for
transmission over the IDR QPSK modulated channel (C).
Last Updated: 12 March 1999 Page 117 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Note that the result of this deletion of two codewords is that four
codewords are actually transmitted for every three information bits, thus
achieving a rate ¾ code scheme. At the receiver, the received symbols
are again regrouped to form the codeword pairing of the original rate ½
encoded output. Null information codewords that convey no information
to the decoder are inserted in place of the codewords that were deleted
by the symbol puncture circuit at the transmitter (D). The encoded data
stream with null symbols inserted is then decoded by a rate ½ Viterbi
decoder back to the original data stream (E).
The code used for the encoder in Figure 3.34 is, however, transparent to
180-degree carrier phase ambiguities when decoded. As a result, the
incoming data stream needs to be differentially encoded prior to being
passed to the FEC encoder.
Last Updated: 12 March 1999 Page 118 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
'LIIHUHQWLDO Differential encoding and decoding are used to remove phase ambiguities
(QFRGLQJ of the received phase modulated signal caused primarily by the methods
used within the demodulator to recover the carrier. By encoding the data
as differences between adjacent symbols, the effect of the ambiguity is
removed. Figure 3.36 shows a block diagram of a differential encoder,
and the output sequence.
Last Updated: 12 March 1999 Page 119 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
MODULO 2
ADDITION
EX OR
A Bn
Bn-1
DIFFERENTIAL ENCODER
Bn-1
A Bn
MODULO 2
ADDITION
DIFFERENTIAL DECODER
Last Updated: 12 March 1999 Page 120 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Assume Bn-1 = 1
Input (A) = 1011
Output (B) = 10010
With no ambiguity, the decoder output for the input from the above
encoder will be:
With a 180-degree phase ambiguity the output of the decoder will be:
7UHOOLV Considering the trellis structure code in Figure 3.37, Viterbi proposed a
simpler form of decoding which produces a metric algorithm for every
possible path. By comparing the incoming sequences with the possible
paths through the trellis, and giving an accumulated weight to each
possible transition, it is possible to obtain the path closest to the
transmitted sequence. Paths with higher weights at each node are
discarded after each transition, thus reducing the number of possible
paths to manageable levels. Although this is not Maximum Likelihood
Decoding in the true sense, the results obtained are identical.
+DPPLQJ From the trellis diagram in Figure 3.37, it can be seen that there are two
'LVWDQFH paths from each node. These two paths are each weighted by comparing
the received bit pair to the bit pairs produced by each path. The path with
the lowest accumulated weight at each node in the next level is selected
as the surviving path. For the present, we will consider only a binary
decoding technique, hard decision, in which the weight will be the
Hamming Distance.
Last Updated: 12 March 1999 Page 121 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
The Hamming Distance is calculated by comparing the two bit pairs, i.e.,
the incoming data pair and one of the transition data pairs. For every bit
that is different, a value of 1 (decimal) is given, as shown in Figure 3.37.
00 00 00 00 00 00 00
a
11 11 11 11 11 11 11 11 11 11 11 11
b 10 10 00 10 00 10 00 10 00 10 00
01 01 01 01 01 01 01 01 01 01 01
d
10 10 10 10 10
t=0 t=1 t=2 t=3 t=4 t=5 t=6 t=7
00 00 0
01 00 1
01 01 0
01 10 2
01 11 1
Last Updated: 12 March 1999 Page 122 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
The weights are accumulated for each path. At each node the path with
the lowest value, Hamming Distance, is selected as the surviving path,
while the other is rejected. In the case of two paths yielding the same
weight, the survivor is chosen at random. There is no benefit from
retaining both paths. Hence, at each step, the extensions increase the
number of paths by a factor of 2, while the comparisons reduce that
number by a factor of 2 resulting in a constant number of surviving paths.
Refer to Figure 3.38.
Input
11 10 00 01 01 11 00
Data
(3)
a
2
(5)
b
0
(4)
c
3
(4)
d
3
t=0 t=1 t=2 t=3 t=4 t=5 t=6 t=7
After a number of steps through the trellis, it will be noted that all the
surviving paths have a common root. This root has the most likelihood of
being the transmitted sequence as shown in Figure 3.39, and as such is
decoded. The recovered data are passed to the output port.
Last Updated: 12 March 1999 Page 123 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
11 01 00 10 10 8
(5) 11 (8)
0 3
01 00
10 10
(7)
01
2
t=0 t=1 t=2 t=3 t=4 t=5
The operation of the Viterbi decoder is always forward without backing up.
A decoding step involves only the determination of the branch weight, the
total accumulated weight and the pairwise comparison and proper path
selection. These operations are identical from level to level, and as they
must be performed at every state, the complexity of the decoder is
proportional only to the number of states, and hence grows exponentially
with constraint length. This provides a practical limit for Viterbi decoding
to convolutional codes of short constraint length (k<8).
Last Updated: 12 March 1999 Page 124 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
([DPSOHVRI As an illustration, consider Viterbi decoding for the K=3, rate 1/2 code
9LWHUEL previously given. Let the input sequence be 1, 0, 1, 1, 0, 0, 0. The
corresponding output sequence will be 11, 10, 00, 01, 01, 11, 00. This is
'HFRGLQJ shown in bold lines through the Trellis in Figure 3.39.
Figure 3.39 traces the states up to the time interval t=5. The Hamming
Weights for each path are shown. The path with minimum Hamming
Distance (bold line) is retained and the others are omitted. The minimum
Hamming Distance traces out the received data stream of:
11 10 00 01 01.
Figure 3.38 shows the decoding sequence to t=3. It has been assumed
that the coder was in the all-zero’s state initially. The nonsurvivor paths
are shown as dotted lines. The accumulated weights for each path are
shown. Those for the nonsurvivor paths are shown in brackets.
Transmit Data 11 10 00 01 01
Receive Data 11 10 10 01 01
Last Updated: 12 March 1999 Page 125 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
ERROR
Input 11 01 10 10 10
1 3
Data 00 00
11 11 11
(4)
01 3
11 1
0 (4)
00
00 01
4
10 10 10
1
10
(3)
01
(3)
t=0 t=1 t=2 t=3 t=4 t=5
Last Updated: 12 March 1999 Page 126 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 3 – Modem Basics
Due to the presence of white noise at the demodulator input, the output
bits will not appear as clearly defined 1s or 0s, but will be at some
arbitrary level in between. It is normally assumed that should the output
signal be above a preset level, it is treated as a 1, and below that level as
a 0. Thus, the signal has been quantized using two-level quantization,
which is known as the hard decision case.
Last Updated: 12 March 1999 Page 127 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
&+$37(5
$33/,&$7,216
Any modern office uses some type of digital equipment. As the office
1HWZRUN expands, the requirements increase, and sooner or later the office will
$UFKLWHFWXUH need to communicate with another office. We can provide a digital
3ULQFLSOHVDQG network among offices using either existing line plant or installing new line
$SSOLFDWLRQV plant. A direct point to point connection between two users is relatively
easy to organize. Interfacing the user to the network requires signaling
and timing compatibility, which is typically achieved by G.703 interfacing
at 64 Kb/s.
&RQFHSWRI When more than two users wish to communicate to each other, there is
1HWZRUN an added problem: does the line go from A to B, then on to C, or is there
$UFKLWHFWXUH something better? Network architecture is a term used to describe the
ways to arrange the interconnection of more than two users. It can be
applied to a relatively modest connection, perhaps within one office
complex or to connections outside.
/RFDODQG:LGH When network users are fairly close together, typically up to 5 km, the
$UHD1HWZRUNV network is called a Local Area Network (LAN). A wider network is called
Wide Area Network (WAN). A third term is sometimes used to refer to
citywide systems: Metropolitan Area Network (MAN). There are
differences among these three. For example, LANs are usually privately
owned by a single organization. In some circumstances, a LAN in one
area might need to communicate with a LAN in another area; hence,
WANs and MANs have developed.
Satellite Earth stations are often involved as part of a WAN because they
carry traffic among distant locations. Often, small Earth stations are
installed at user locations in the IBS applications.
1HWZRUN Network topology refers to a physical connection among the users, and is
7RSRORJ\ like a network map. There are a number of basic layouts, each having its
own merits. We shall discuss five of them.
Last Updated: 12 March 1999 Page 129 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Star Network:
Figure 4.1 illustrates a Star network topology. Each user, or node, is
connected to a central point, and inter-user communication has to transit
through the central point. As each user operates independent of others, a
failure at one user would not cause a major network problem. The central
point is a critical area, and hence, it is normally provided with redundancy.
A star may be expanded either directly from the center, or in a
hierarchical manner from one or more nodes. The node selected would
then become the center point of another star.
Last Updated: 12 March 1999 Page 130 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 131 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Ring Network:
Figure 4.2 illustrates a Ring network, and is characterized by user-to-user
(node-to-node) connections forming a complete circle. Each user is
connected to two others. If one user fails, the whole ring may go out of
service, and a second ring may be needed to restore service. Despite this
disadvantage, ring topologies are popular in LANs, particularly for high-
speed networks.
Last Updated: 12 March 1999 Page 132 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Bus Network:
Figure 4.3 illustrates a Bus network. It is made up of a common medium,
to which each user is individually connected. One user temporarily
controls the bus and hence the control is often distributed. An alternative
method of control is to poll each user, who has a unique address, from a
central device. Advantages include the ease of adding new users and
minimal cable runs. This type of network is in wide use for LANs, and is
commonly used to control test equipment. Hewlett Packard Interface Bus
HPIB, GPIB, and IEEE 488 are some examples.
Tree Network:
Figure 4.4 illustrates a Tree network that is used on long distance
networks, such as WANs or MANs. It operates in a hierarchical manner,
and awards various users different levels of responsibility. Lower level
users are connected to higher level users who combine traffic from
several sources. Typical applications include a public telephone network,
or a synchronization hierarchy for PCM systems.
Last Updated: 12 March 1999 Page 133 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
,622SHQ The ISO Open Systems Interconnection (OSI) is a plan designed to deal
6\VWHPV with the problems related to interconnecting. The plan is largely a matter
,QWHUFRQQHFWLRQ of common sense, but is defined in rather formal terms. Each interfacing
problem is dealt with separately in what is known as network layers.
Seven discrete layers have been identified. Figure 4.6 illustrates this
concept.
'DWD/LQN/D\HU Data link layer provides the synchronization and error control for the
OD\HU information that is transmitted over the physical link. The data link layer’s
task is to take a raw transmission facility and transform it into a line that
appears free of transmission errors to the network layer. It accomplishes
this task by organizing the input data into data frames, transmitting the
frames sequentially, and processing the acknowledgement frames that
the receiver returns.
1HWZRUN/D\HU Network layer provides means to establish, maintain and terminate the
OD\HU switched connections between end-systems. Included are addressing
and routing functions. The network layer, sometimes called the
communication subnet layer, controls the operation of the communication
network.
Last Updated: 12 March 1999 Page 134 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
5. Handles coordination
5. SESSION between processes 5. SESSION
PHYSICAL MEDIUM
6HVVLRQ/D\HU Session layer is the point at which each separate call is set up, and
OD\HU terminated.
3UHVHQWDWLRQ Presentation layer is the stage where data are put into a usable form.
/D\HUOD\HU Code conversion, encryption, and text compression are examples of the
process that could occur here.
Last Updated: 12 March 1999 Page 135 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
$SSOLFDWLRQ Application layer is where the end user interfaces directly with the
/D\HUOD\HU network.
/D\HU Each layer in one organization works directly with the same layer in any
&RPSDWLELOLW\ other organization, and provides whatever interfacing is required to
connect between the higher layers and the network.
(DUWK6WDWLRQ INTELSAT provides a physical connection among the Earth stations, and
,QYROYHPHQW as such provides the level 1 layer of the OSI model. This is true for IDRs
and IBSs applications. In IBS applications, INTELSAT leaves it to users to
arrange higher levels themselves, whereas in IDR services, INTELSAT
becomes involved with number of layers. For example, layer 2, the data
link layer, may be a G.703 interface. Layer 3, the network layer, may be a
digital switch, setting up the paths as required. Layer 4, the transport
layer, would involve error checking, and layer 5 will actually start and
finish a call. INTELSAT supports the OSI model, and encourages users to
apply existing standards and protocols whenever possible.
,QWHUPHGLDWH Telecommunication services have been moving from analog towards to
'DWD5DWHV digital systems. INTELSAT has introduced several digital services, and
one of the widely used ones is IDR.
,'5&DUULHUV
IDR has the capability to handle both voice and non-voice information.
The data rates used are termed intermediate, and range between 64 Kb/s
and 44.736 Mb/s. INTELSAT has approved IDR operation with Standard
A, B, C, E3, E2, F3 and F2 Earth stations in C-band as well as standards
E1 and F1 in Ku-band.
$GYDQWDJHVRI Operating IDR services has many advantages; some are specific to IDR
2SHUDWLQJ,'5 while others result from the fact that IDR is directly compatible with most
digital multiplex equipment. Some of the advantages are:
&DUULHUV
a. Improved equipment reliability and flexibility, and reduced
equipment cost in terms of both purchase and maintenance.
Last Updated: 12 March 1999 Page 136 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
7UDQVPLVVLRQ Figure 4.7 shows a block diagram of an IDR link that includes an IDR
&KDUDFWHULVWLFV modem. As mentioned earlier, IDR data rates range from 64 Kb/s to
44.736 Mb/s. This is the information rate and is the bit rate entering the
channel unit. Engineering Service Circuit/Channel (ESC) information is
then added to the carrier prior to applying FEC. It should be noted,
however, that the ESC is not mandatory on carriers smaller than 1.5
Mb/s. On carriers between 1.5 and 44.736 Mb/s, an overhead (OH) of 96
Kb/s for the ESC is mandatory.
INTELSAT V, VA, VA (IBS) and VI, IDR carriers employ FEC Rate 3/4
convolutional encoding with Viterbi decoding. For INTELSAT VII, VIIA,
VIII, 1X and K satellite series, it is mandatory for all Earth station modems
to be equipped to work with either Rate 1/2 or Rate 3/4. It should be
possible to independently select either the same or different FEC code
rates for the IDR modulator and demodulator. INTELSAT determines the
FEC code rate to be used for the purpose of maximizing transponder
capacity.
Last Updated: 12 March 1999 Page 137 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
TERRESTRIAL
INTERFACE
- PROPAGATION
STATISTICS
CHANNEL UNIT IF/RF SYSTEM
OVERHEAD ADDITION UP
MULTIPLEX SCRAMBLER, FEC CONVERTER,
CODER, MODULATOR HPA
- E.I.R.P.
- UP LINK MARGIN - BO 1
- MUX FRAMING - MODULATION
STRUCTURE - OUTPUT SPECTRUM
- MULTI-DESTINATIONAL (FILTERING)
CAPABILITY - FEC CODING
- BUFFER CAPACITY - BER VS. Eb / No SATELLITE TRANSPONDER
G/T, SATURATION FLUX
- SLIP RATE - SCRAMBLING DENSITY, E.I.R.P.
- CLOCK ACCURACY - ORDERWIRES
- ALARMS
- PROPAGATION - BO 0
STATISTICS
CHANNEL UNIT
DEMODULATOR IF/RF SYSTEM
BUFFER DEMUX DECODER LNA, DOWN
DESCRAMBLER CONVERTER - CHANNEL
OVERHEAD CAPACITY
REMOVAL
- BER - G/T
- AVAILABILITY - DOWN LINK MARGIN
TERRESTRIAL
CLOCK
Notes:
Last Updated: 12 March 1999 Page 138 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
)RUZDUG(UURU
FEC is a method to correct errors by adding extra bits in a special code. It
&RUUHFWLRQ is required to achieve optimum use of satellite power and bandwidth to
)(& give the required Bit Error Rate (BER). FEC is discussed in Section 3.8.
0RGXODWLRQ Phase Shift has been chosen for IDR because of the necessity to
maintain a constant envelope on the transponder. Biphase, Two-Phase,
shift-keying modulation (BPSK) is the simplest form of PSK where the
phase shift changes with each new data bit. In this case, a binary source
code is mapped one bit at a time into a pair of phase states with 180
degrees phase difference.
Quadrature Phase Shift Keying (QPSK) encodes each pair of bits into
one of four phases. One of the principal advantages of QPSK over BPSK
is that QPSK achieves the same power efficiency as BPSK with only half
the bandwidth. QPSK is of particular importance for satellite data
transmission and therefore for IBS and IDR. The name “four phase” or
“quadriphase” refers to the fact that one carrier is modulated along a 0-
degree, 180-degree phase vector (the in-phase or cosine channel),
sometimes called the P channel or A channel. The other carrier is
modulated along a 90-degree, 270-degree phase vector (the quadrature
or sine channel), sometimes called the Q channel or B channel.
0RGXODWRUV A typical QPSK modulator is shown in Figure 4.8. The input data stream
(1) is converted into two analog multilevel signals, (2) by alternately
selecting each bit out of the D/A converter that also performs signal
processing. These two signals are mapped and correctly shaped at (3) to
modulate carriers, which are arranged to have a quadrature phase
relationship. These two-biphase shift-keyed modulated carriers (4) are
summed to get a four-phase shift key modulated carrier (5). This process
converts the baseband digital input signal into a modulated IF output
signal.
Last Updated: 12 March 1999 Page 139 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
PHASE SHIFTER
(RETARDS BY 90 o )
π CARRIER
2 OSCILLATOR
DATA A OUTPUT
1001 1 0 0 1
LOW-PASS MOD (d) (c) (b) (a)
FILTER 1 ’A’ PHASES 1,1 0,1
1
CONVERTER 0,0 1,0
AND SIGNAL 2 3 4
PROCESSOR
1 5
0
0 ’B’ PHASES
LOW-PASS MOD
1
FILTER 2 1,1
0
0
DATA B
1
1010
1 1 0 1 0
0,1 1,0
(e)
0,0
1. Input data 11001001 goes into the converter and signal processor.
2. Data are split into two streams of A data and B data, filtered at (3) and
applied to the A and B BPSK modulators. The output consists of two
phases of either 1 or 0.
4. The first pair of bits is “1” on the A data stream, and “0” on the B data
steam, giving two vectors at point (a), which combine by vectoral addition
to give a 1,0.
7. The next pair is 11 at point (d). These four vectors are combined as
shown at point (e), which is the vector diagram for the four-phase state.
Last Updated: 12 March 1999 Page 140 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
'HPRGXODWRUV Figure 4.9 shows a digital demodulator for the receive carrier. The
received signal (1) is band-limited at band pass filter (BPF) and divided
into two signals (2). These signals are low-pass filtered (3) and detected
by the local carrier recovery circuit, which provides two signals in a
quadrature relationship (4). The signals detected after low-pass filtering
are the demodulated signals, each having an amplitude corresponding to
the input signal vector position. The analog-to-digital converter changes
these signals back into the original data signals (5). Operation of the
demodulator requires the provision of a carrier recovery circuit to give
reference timing as well as a symbol timing recovery circuit.
0XOWLSOH$FFHVV The data blocks are configured in the satellite transponder in a Frequency
Division Multiple Access (FDMA) mode. Multiple operators radiating
carriers at the same time, each carrier being separated in frequency,
make multiple access possible. The system is thus the same type of
access method as the current analog multiple access systems with which
you should be familiar.
LOW-PASS
FILTER
DATA
A
1 2 o 3 4
90
A/D AND
BAND-PASS PHASE CARRIER SYMBOL TIMING SIGNAL
FILTER SPLITTER RECOVERY & RECOVERY PROCESSING
0 o
DATA
B
LOW-PASS
FILTER
(DUWK6WDWLRQ The conversion of an existing Earth station from analog operation to IDR
(TXLSPHQW must be carefully planned. An important consideration is the stringent
frequency stability requirement for digital carriers.
One problem is that the phase demodulator can detect other phase
signals as data, thus introducing errors in the receive data. A major
cause of this is due to the use of Analog-Up/Down Converters for IDR,
that have poor phase noise performance.
Last Updated: 12 March 1999 Page 141 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
AMPLITUDE
CARRIER
DISCRETE
SIGNAL NOISE PHASE NOISE
FREQUENCY
Figure 4.11 shows a typical "in station" phase noise test setup. The setup
includes the transmit side as well as the receive side.
Last Updated: 12 March 1999 Page 142 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
25 dBW
PATH UNDER TEST
SYNTHESISED HPA
SIGNAL UP-CONVERTER
GENERATOR
RF. MON 0dBm
40
dB
-40 dBm
SPECTRUM DOWN 30 dB
CONVERTER SPLITTER LNA FROM
ANALYSER
Rx
FEED
PORT
Last Updated: 12 March 1999 Page 143 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
3. The shift register will step in and register 14/15 will become 00
to gate number 1. This gives a 0 output to gate number 2 that,
with a 1 in for input data, produces a 1 out.
4. The shift register clocks on, and the input to gate number 1 is
now 1,0, which will give 1 to the input of gate 2. If another 1 is
on gate 2, the output will be a 0.
5. Gate number 1 with 0,1 at its input will give 1 to gate number
2, and if the second input of gate 2 is a 1, then the output of
gate number 2 will be 0, and the action continues, dependent
on the incoming data.
INPUT A
DATA B A C
1
INITIALIZATION B
SEQUENCE
2 SYMBOL
C 0 0 1 0 0 1 0 0 1 0 0 1 0 0 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 A
C
B
LOGIC TABLE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 A B C
0 0 1 0 0 1 0 0 1 0 0 1 0 0 1 0 0 0
0 1 1
INITIALIZATION 1 0 1
SEQUENCE C 1 1 0
A
B 1 B
A
2
OUTPUT
DATA
4XDOLW\RI IDR carriers have been designed to provide a service in accordance with
6HUYLFH ITU-R Recommendation 522-2, Recommendation 614, and
Recommendation 579-1. INTELSAT will provide sufficient power from the
satellite to ensure certain minimum BER performance. Refer to Tables
4.2, 4.3, and 4.4.
Last Updated: 12 March 1999 Page 144 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
(,53 Under clear sky conditions and light winds, the e.i.r.p. will be maintained
6WDELOLW\ to within ± 0.5 dB for Standard A, B, C, and F3 stations, and ± 1.5 dB for
Standard E2, E3, and F2 stations of the nominal value assigned by
INTELSAT. The tolerance includes all factors causing variation, such as
HPA output power instability, antenna transmitting gain instability,
antenna beam pointing error, and tracking error.
For 14 GHz, the drop in power flux density at the satellite may be
between 5 dB and 7 dB of the nominal setting between 0.01 and 0.04
percent of the year, depending on the satellite and the beam being used.
Last Updated: 12 March 1999 Page 145 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
-5
26 dB
-10
-15
-20
-25
-30
7LPLQJ The primary order 1.544 or 2.048 Mb/s digital signals in both directions of
$FFXUDF\ transmission shall be derived in one of three ways:
Last Updated: 12 March 1999 Page 146 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
%XIIHU&DSDFLW\ Buffers are required to perform two functions: Doppler shift and
plesiochronous buffering. The location and size of the buffers depend on
the system configuration and the satellite used, and should be selected
on a case-by-case basis. (Buffering is discussed in Section 3.5). A block
diagram of a plesiochronous and Doppler buffer is shown in Figure 4.14.
Buffers should be reset whenever the channel suffers loss of service, and
when they reach saturation or become empty. For primary order data
streams which form part of an international plesiochronous digital
network, slips should consist of integer multiples of one complete
multiframe, to avoid loss of synchronization of the multiplex equipment.
Last Updated: 12 March 1999 Page 147 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
CLOCK CLOCK
SYNCHRONOUS TO SYNCHRONOUS TO
SATELLITE NETWORK TERRESTRIAL
NETWORK
WRITE READ
COUNTER COUNTER
,'5 In recent years, many IDR carriers have been implemented in the
,PSOHPHQWDWLRQ INTELSAT system. Users generally find that the IDR carriers are no
more complex to introduce than additional FDM/FM carriers. Where
digital backhaul systems are available, or planned, the use of IDR carriers
,QWURGXFWLRQ is now simpler than the introduction of transmultiplexers that are needed
to connect such backhaul systems to analog carriers.
The advent of IDR carriers and other digital transmission systems for use
on international routes has raised the issue of interworking between
countries whose national networks are based on different digital
hierarchies and speech encoding laws.
Last Updated: 12 March 1999 Page 148 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
(,53 The selection of the RF and IF characteristics for IDR is guided by the
principle that the parameters and equipment would be similar to that used
5HTXLUHPHQWV in the SCPC and FDM/FM systems. This means that e.i.r.p. requirements,
5DLQ0DUJLQV rain margins, and HPA size should be equivalent to or less stringent than
DQG8SOLQN the SCPC or FDM/FM requirements, wherever possible. One item, which
3RZHU&RQWURO requires particular attention, is the phase noise characteristic of the Earth
station up and down chains.
Last Updated: 12 March 1999 Page 149 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Figure 4.16 shows a block diagram of an existing IDR system and the
QPSK modem needed to expand the system.
Figures 4.19, 4.20, and 4.21 show multidestination IDR 2.048 Mb/s carrier
applications with 64 Kb/s channels.
Figures 4.22, 4.23, and 4.24 show multidestination IDR higher order
carriers.
Last Updated: 12 March 1999 Page 150 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Diplexer
HPA LNA
Up Down
Converter Converter
FM/FDM IDR
Channel Unit Channel Unit
ESC Clock
DEMU MUX
X
From Radio To Radio
Relay Link Relay Link
Last Updated: 12 March 1999 Page 151 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Diplexer
HPA LNA
Up Down
Converter Converter
Expansion
QPSK QPSK QPSK QPSK
QPSK
Modulator Modulator Demodulator Demodulator
Modem
Last Updated: 12 March 1999 Page 152 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
IF/RF Chains
QPSK QPSK
Modulator IDR Demodulator
Channel Unit
Overhead Overhead
Addition Removal
Terrestrial
ESC
Interface Buffer
Last Updated: 12 March 1999 Page 153 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
IF/RF Chains
8.448 Mbit/s
Satellite Group
Primary Delay Equalizer
Level Carrier
(2.048 Mbit/s)
QPSK QPSK
Modulator Demodulator
8.448 Mbit/s
2.048 Mbit/s
DEMUX
2.048 Mbit/s
Last Updated: 12 March 1999 Page 154 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
10 -11 Backward
15 Clock alarms
Channels
2.048 2.048
From "B"
G.732 Mbit/s QPSK Mbit/s
Buffer
DEMUX DEMOD From
Not "B"
Used
10 -11
Clock
30
64 kbit/s
Channels 15
Channels
From "C"
2.048 2.048
G.732 Mbit/s QPSK Mbit/s
Buffer
DEMUX DEMOD From
Not "C"
Used
10 -11
Clock
Last Updated: 12 March 1999 Page 155 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
IF/RF Chains
Backward
Alarms
Overhead Overhead Overhead
Addition Removal Removal
ESC ESC
Buffer Buffer
Digital
Cross-Connect
Last Updated: 12 March 1999 Page 156 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
To To "A"
QPSK 2.048 Mbit/s G.732
(15-64 kbit/s Channels)
"A" MOD MUX
Not Used
10 -11 (Or to Other E/S)
Clock
Last Updated: 12 March 1999 Page 157 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
IF/RF Chains
ESC ESC
10 -11
To To Clock
Independent
E/S B E/S C
Buffers From
E/S B
Terrestrial Interface
DEMUX or MUX or
Cross-Connect Cross-Connect
1 Primary
Level Stream
From E/S B
To/From National Digital Network
Last Updated: 12 March 1999 Page 158 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Backward
From "B" Alarm
8.448
8.448
Three Mbit/s
From "B" G.742 Mbit/s QPSK
Indep.
DEMUX DEMOD From
From "B" Buffers
"B"
Not Used
10 -11
4 - 2048 kbit/s Clock
Streams
Backward
Alarm
2.048
2.048 Mbit/s
From "C" Mbit/s QPSK
Buffer DEMOD
From
10 -11 "C"
Clock
Last Updated: 12 March 1999 Page 159 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
8.448
Mbit/s 8.448 Not used
QPSK Mbit/s G.742 (To "B")
DEMOD DEMUX
From "A"
Buffers 1-2048 kbit/s
Stream
10 -11
Backward Clock
Alarm
2.048
Mbit/s
QPSK To "A" 1-2048 kbit/s
MOD Stream
To "A"
(QJLQHHULQJ To accommodate stations with operational IDR carriers, and those with
6HUYLFH&LUFXLWV advanced plans for operating such carriers, two sets of specifications
were formulated. The first set deals with carriers that were authorized
(6&IRU,'5 prior to June 1988, which are defined as previous equipment. The second
&DUULHUV deals with all carriers/equipment authorized after June 1988, defined as
new equipment.
3UHYLRXV For all data rates, previous equipment may continue to be used in the IDR
(TXLSPHQW system without modification under the conditions listed below. If it does
6SHFLILFDWLRQV not meet these conditions, the equipment would need modification to
meet the requirements defined for new equipment.
Last Updated: 12 March 1999 Page 160 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Where an Earth station operates only IDR carriers, but one of the
correspondents’ IDR Earth stations has access to the TDMA, DAMA,
FDM/FM or SCPC ESC network, communication between IOC and the
Earth station not having such access will be achieved via the Earth station
having such access. In the instances where none of the corresponding
Earth stations have access to the TDMA, DAMA, FDM/FM, or SCPC ESC
network, and no alternatives are available, communication will be
achieved via the public switched network.
SYSTEM
MANAGEMENT
SATELLITE
NETWORK
GATEWAY E/S
IOC DEDICATED TRAFFIC
4-W LINKS AOR E/S
ETAM
AOR
ROARING CREEK
AOR
IOC
ETAM
POR
= EARTH STATION
NOTE: THIS SYSTEM
BREWSTER CONFIGURATION IS
JAMESBURG SUBJECT TO FUTURE
= SATELLITE
IOR CHANGE
Last Updated: 12 March 1999 Page 161 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
&RPPXQLFDWLRQ When corresponding Earth stations have access to the TDMA, DAMA,
EHWZHHQ FDM/FM, or SCPC ESC network, such facilities shall be used. At Earth
&RUUHVSRQGLQJ stations equipped only for IDR carriers, it is necessary to provide two
voice channel units for engineering service circuits. These circuits must
(DUWK6WDWLRQV be available at the Earth station or at a designated control point capable
of communicating with the Earth station on a 24-hour basis. The two
voice circuits may either be provided as 64Kb /s or 32 Kb/s channels.
1HZ ESC facilities are not considered necessary on carriers with data rates of
(TXLSPHQW less than 1.544 Mb/s, because of their relatively small size. However, it is
6SHFLILFDWLRQV still mandatory that communication links between INTELSAT and the
corresponding Earth station be established in accordance with the
'DWD5DWHVOHVV specifications for Earth stations with previous equipment.
WKDQ0EV
'DWD5DWHV For data rates of 1.544 Mb/s and above, a 96 Kb/s, overhead-framing
JUHDWHUWKDQ structure has been formulated. The overhead structure has the capacity
0EV to carry two 32 Kb/s channels for digitized voice or voiceband data, one 8
Kb/s data channel, and four separate alarms. Each of these two voice
channels carries the combined speech plus five telegraph (S + 5Dx)
channels from the ESC equipment. The signaling conventions for the
voice and telegraph circuits are those used for current FDM/FM ESC
systems. The overhead unit on the transmit side takes the incoming data
and adds the overhead bits. No knowledge of the structure of the
incoming data is required for this process. On the receive side, the
reverse process occurs. The unit also detects faults within the system
and generates necessary alarm conditions.
,'5(6&8QLW Figure 4.26 shows a typical IDR ESC unit. The ESC unit accepts two
analog voice channels from the ESC console, digitizes the outgoing
signal at 32 Kb/s using ITU-T Recommendation G.721 ADPCM. It frames
the digital voice circuits, 8 Kb/s of data, backward alarms, and traffic data
into a single bit stream at a rate of 96 Kb/s over the traffic data rate. On
the receive side, the ESC unit deframes and separates these signals, and
delivers analog ESC voice to the ESC console. In addition, the receive
path includes an adjustable length buffer to accommodate plesiochronous
and Doppler clock shifts.
Last Updated: 12 March 1999 Page 162 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
2YHUKHDG The frame structure is derived by adding 12 bits every 125 microseconds
)UDPH6WUXFWXUH resulting in a 96-Kb/s overhead rate. The allocation of bits within the
overhead is as follows.
- 4 bits each per frame for the two ESC voice channels for a
total of 64 Kb/s
7LPLQJZLWKLQ Timing on the transmit side for the composite stream, information plus
WKH2YHUKHDG overhead, is derived from the incoming data. To protect the ESC circuits
against failure of the incoming data, a backup clock with a long-term
8QLW stability of 1 part in 105 must be available within the overhead unit. On the
receive side, the overhead unit derives its timing from a clock recovered
from the received data. Separate transmit and receive clocks at 32, 8,
and 1 kHz are generated by the unit for use by the ESC equipment.
TRAFFIC
DATA TRAFFIC +
ESC MOD OVERHEAD
Tx ESC DATA
TRANSMIT 96 kbit/s INTERFACE
CLOCK INTERFACE
MUX overhead RS-422
DATA
ESC ESC DEMOD
ESC DATA BUFFER INTERFACE
Rx INTERFACE RECEIVE
MEMORY MUX RS-422 TRAFFIC +
CLOCK
OVERHEAD
96 kbit/s
overhead
TRAFFIC
READOUT CLOCK
Last Updated: 12 March 1999 Page 163 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
FRAME PERIOD
125 Ts
FIRST BIT
TRANSMITTED
BIT
FRAME NO. 1 2 3 4 5* 6 7 8 9* 10 11 12
1 0 1 0 0 V 1 V 2
2 1 A 1 d 1 d 2 V 1 V 2
3 0 1 0 0 V 1 V 2
4 0 A 2 d 3 d 4 V 1 V 2
5 0 1 0 0 V 1 V 2
6 1 A 3 d 5 d 6 V 1 V 2
7 1 1 0 0 V 1 V 2
8 1 A 4 d 7 d 8 V 1 V 2
* Bits 5 and 9 in the Overhead Frame correspond to the first bits transmitted in
the ESC voice channels.
** d1 corresponds to the first bit transmitted in the ESC data channel.
Figure 4.27 Overhead Structure for 1.544 and 2.48 Mb/s IDR Carriers
Last Updated: 12 March 1999 Page 164 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
SUB-FRAME PERIOD
125/3 = 41 2/3 s)
4 BITS OH
263 BITS DATA SUB-FRAME 1
(FA.A.d)
4 BITS OH
263 BITS DATA SUB-FRAME 2
V1
4 BITS OH
263 BITS DATA SUB-FRAME 3
V2
SUB-FRAME PERIOD
125/3 = 41 2/3 s)
4 BITS OH
352 BITS DATA SUB-FRAME 1
(FA.A.d)
4 BITS OH
352 BITS DATA SUB-FRAME 2
V1
4 BITS OH
352 BITS DATA SUB-FRAME 3
V2
Last Updated: 12 March 1999 Page 165 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
)UDPHDQG Frame and multiframe alignment should be carried out using the
0XOWLIUDPH alignment signal that comprises of the 8-bit code inserted in the first bit of
$OLJQPHQW every frame, and the 3-bit code inserted in the second, third, and fourth
bits of every other frame. Frame and multiframe alignments are assumed
to have been lost when four consecutive alignment signals are received
with one or more errors. In this case, an appropriate alarm will be
generated, and a continuous alignment search will be initiated. Frame
and multiframe alignments are assumed to have been recovered when
the presence of a correct alignment signal is detected for the first time.
$ODUP&RQFHSWV IDR alarm concepts follow the alarm protocols formulated for digital
LQ,'5 multiplex equipment (ITU-T Recommendation G.732/G.733). Figure 4.30
shows the actions taken after detection of each specified fault condition.
The detection of faults and generation of alarms are handled by the
overhead unit.
IN TO
LOCATION CONDITION STATION TERRESTRIAL TO SATELLITE
LINK **
** Actions to be taken to the terrestrial link (i.e., AH1) are not mandatory.
Last Updated: 12 March 1999 Page 166 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
From Satellite
FE1 Loss of incoming signal.
FE2 Loss of overhead frame and multiframe alignment.
FE3 BER of 1 in 103 exceeded (measured on the overhead alignment
signal).
FE4 Alarm indication received from the distant Earth station (in bit 2 of
even frames in the overhead structure).
To the Satellite
AD1 AIS applied to the outgoing information bit stream to indicate that
a fault has been detected, and to be used as a service alarm at the
distant end.
AD2 Alarm indication to the remote Earth station (i.e., backward alarm).
It is transmitted as rate "1" in bit 2 of even frames. In the case of
multidestinational carriers, it is transmitted only in the frames of the
multiframe that has been assigned to that particular carrier.
Action When a fault alarm is detected, ensure that traffic is not lost by
taking the appropriate action to switch in standby equipment and isolate
the faulty equipment that needs to be repaired.
'LJLWDO(6& Most of the analog ESC equipment is over 10 years old and is no longer
supported by the original equipment manufacturers. Accordingly,
INTELSAT has developed a digital ESC network to replace the aging
analog EDSC equipment.
Last Updated: 12 March 1999 Page 167 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
7'0$DQG Detailed information of TDMA and Space Switched (SS-TDMA) theory is
667'0$ available in the INTELSAT training publication entitled Time Division
Multiple Access: INTELSAT’s Cost Efficient Community Service- TDMA.
,17(/6$7 The IBS, first introduced in 1983, provides a full range of international and
%XVLQHVV6HUYLFH domestic digital private network business communications. It can be
used by a variety of large and small Earth stations using teleports, or
,%6 customer premise Earth stations. Services can be simplex or duplex, and
include single channel or multiplexed data, voice, and digital video
applications. IBS may NOT be interconnected with the Public Switched
Telephone Network (PSTN).
,%6 The applications of IBS are many, varied, and continuously expanding.
$SSOLFDWLRQV They include:
Last Updated: 12 March 1999 Page 168 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Digital voice
Interconnecting corporate PABX’s and private networks
Dedicated private line networks
High quality audio or radio program distribution
Videoconferencing
Digital TV
Service Summary
Modulation
7UDQVPLVVLRQ Different sized carriers are defined for tariff and allocation purposes,
3DUDPHWHUV desired grade of service, and for the Earth station size. Carrier sizes are
defined in increments of 64 Kb/s. An allowance is made of 10 percent for
overhead, and either FEC Rate 1/2 or 3/4 may be specified. "Open
Network" operation is defined in IESS-309. "Closed Network" allows
users greater freedom than open network options for choosing
modem/framing unit equipment, and to design links with different grades
of service or data rates. Any Circuit Multiplication Equipment (CME) may
be used.
"Basic IBS" for C-band uplinks meets the error performance objectives of
ITU-R Recommendation 614 for ISDN connections. For Ku-band uplinks,
this meets an availability objective of 99 percent.
Last Updated: 12 March 1999 Page 169 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
(DUWK6WDWLRQV A wide variety of Earth stations is possible, and the small Standards E1
and F1 can be type-accepted. IBS Earth station characteristics are
summarized below.
,17(/1(7 INTELNET was first introduced in 1984 to provide business data
networks, and is now the most flexible of INTELSAT’s business services.
Each customer can define their network characteristics and implement
them within capacity allotments for 100 kHz to 72 MHz in 100 kHz
increments. The customer can choose between ground and space
segment costs trade-offs for either international or domestic voice and
data networks. There are no restrictions on antenna size which makes
the service ideal for VSAT and customer premise applications.
Last Updated: 12 March 1999 Page 170 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
• Voice/audio networks
• Audio and radio program channels
Video Communications:
Videoconferencing
Modulation
7UDQVPLVVLRQ Customers, who can design their own transmission plans, decide these.
3DUDPHWHUV INTELSAT assesses the plan to ensure that other customers are not
adversely affected. Parameters must meet those defined in IESS-410
(INTELSAT Leased Transponder Definitions and Associated Operating
Conditions.) CME may be used. The user determines service quality.
Any available satellite beam can provide coverage. Service can be
provided in the cross-strapped mode if the capacity has already been
configured for cross-strap operation.
(DUWK6WDWLRQV Earth stations must comply with the Standard G specifications for
international applications and Standard Z specifications for domestic
applications, or they must be approved by INTELSAT as nonstandard
Earth stations.
Standard G IESS-601
Standard Z IESS-602
Leases IESS-410
Last Updated: 12 March 1999 Page 171 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
&LUFXLW The first milestone in speech processing was achieved in the late 60’s
0XOWLSOLFDWLRQ through ITU-T Recommendation G.711 for PCM coding of telephone
(TXLSPHQW signals. PCM of 64 Kb/s has a high degree of robustness to transmission
errors and offers adequate performance to speech and voice band data.
'LJLWDO6SHHFK
Digital Speech Interpolation is used to concentrate a number of channels
,QWHUSRODWLRQ (trunks) onto a smaller number of output channels (bearers). The original
'6, number of trunk channels is then recovered at the distant end, using the
reverse process.
Last Updated: 12 March 1999 Page 172 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
During a normal telephone conversation the two partners will not talk at
the same time--one talks and the other listens. Moreover, the one
speaking will not only produce words and silence between words, he will
take time breathing or thinking after an inquiry while the other party simply
listens. DSI takes advantages of this phenomenon by disconnecting the
circuit during the silence periods and assigning the bearer channel to
another trunk with an active speech burst. (See Figure 4.31.) As a result,
DSI combines speech bursts from several trunk channels into a lower
number of bearer channels. If the number of trunks is large, the statistics
of the speech and silence distributions will permit a significantly smaller
number of bearer channels to be used.
Speech bursts
1.2 1.1
1 D
2.2 2.1 3.3 1.2 3.2 2.2 3.1 2.1 1.1
2 S
3.3 3.2 3.1 Assignment and control information
3 I
TRANSMIT SIDE
Front clipping
due to freezeout
1.2 1.1
D
3.3 1.2 3.2 2.2 3.1 2.1 1.1
1
2.2 2.1
S 2
3.3 3.2 3.1
Assignment and control information 3
I
BEARER SIDE TRUNK OUTPUT
RECEIVE SIDE
Figure 4.31 shows three trunk channels, each with a voice activity factor
of 33 percent. These three channels can, in theory, be accommodated
into one bearer. For the system to work, an additional channel containing
the assignment and control information must be created to inform the
receiver what circuit the speech burst belongs to. The assignment and
control information is actually transmitted in a separate bearer channel
not shown here. DSI, however, has one disadvantage that affects system
performance: that is ’freezeout’.
Last Updated: 12 March 1999 Page 173 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
)UHH]HRXW What will happen if a trunk channel becomes active and there is no
bearer capacity? In Figure 4.31, the first speech burst in trunk 3
appeared when trunk 2 was using the bearer. This condition will produce
a clipping in the front of the first speech burst of trunk 3. In the worst
case, if more speech bursts are generated and no more bearer capacity
is available, the entire speech burst will be dropped.
Figure 4.32 shows that the DSI function is based on a speech level
detection. Once the threshold is reached, a bearer assignment process is
initiated. A hangover time is provided at the end of every speech burst to
keep the detector ’ON’ after speech energy has ceased to improve the
freezeout fraction.
HI !! IS MARIO HOME ?
NOISE THRESHOLD
HANGOVER HANGOVER
TIME
TIME TIME
TURN ON DELAY
FOR BEARER
ASSIGNMENT
Last Updated: 12 March 1999 Page 174 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Bearer Frame
The DCME bearer frame output maintains the CEPT frame duration
(125µs) and the Frame Alignment Word structure (known as TS0) as
shown in Figure 4.33a. The following 31 (8 bits) time intervals are divided
into 4-bit nibble units to be used as Bearer Channels.
DCME Frame
DCME Multiframe
Last Updated: 12 March 1999 Page 175 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
a)
CEPT FRAME or BEARER FRAME = 125 µ Sec
CEPT
TRAFFIC
FAW
TS 0 BC BC BC BC BC BC
CC #1 #2 #3 #4 #5 #6
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. BC BC BC BC
#58 #59 #60 #61
8 Bits
b)
DCME FRAME = 2 m Sec
TS C
TRAFFIC
TS C
TRAFFIC
TS C
TRAFFIC .. .. .. .. .. .. .. .. TS C
TRAFFIC
0 C 0 C 0 C 0 C
c)
DCME MULTIFRAME = 128 m Sec
Last Updated: 12 March 1999 Page 176 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
TS
TRAFFIC
TS
TRAFFIC .. .. .. .. .. TS
TRAFFIC
0 0 0
48 CC bits
Sync bit delivered
3 bits of 1110101100100001 Unique word pattern DCME frame 1 to 63
encoded CC
0001010011011110 Unique word pattern DCME frame 0
,QWHUPHGLDWH The intermediate trunk (IT) word is used to identify the input IT
7UXQN,7 interconnected to the BC and related information, for example:
:RUG
Binary code Use
'DWD:RUG The data word is divided into synchronous data word and asynchronous
data word. Refer to Figure 4.35.
Last Updated: 12 March 1999 Page 177 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
• Channel checks
48 bits
Dummy bit Dummy bit
Info bits Check bits Info bits Check bits
1 2 3 11 12 13 14 22 23 24 1 2 3 11 12 13 14 22 23 24
Data word
BC word IT word Sync Async Normal assigment message
Bits Bits
MSB LSB MSB LSB 1 41 4
$V\QFKURQRXV The four Least Significant Bits (LSBs) of the data word will convey the
'DWD:RUG following types of DCME-to-DCME information not related to the BC and
IT assignments:
Last Updated: 12 March 1999 Page 178 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
BC word:
First bit 0 The channel is carrying voice.
Other bits 0011010 IT assigned to BC # 26.
Last Updated: 12 March 1999 Page 179 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
IT
LEVEL 1:
SIGNAL NO SIGNAL
VOICE LEVEL 2:
NON-VOICE
2, 3, 4 bits
ADPCM
V.21 G3
V.22
VOICE FAX
BAND LEVEL 3:
V.26
V.27 DATA
V.29
V.32
Assignment message
Implementation
The speech burst from the active IT goes through the DSI process and on
to the ADPCM encoder. The actual IT–to-BC connection is established
according to the Control Channel information. If the IT becomes idle, the
BC channel will be disconnected.
Last Updated: 12 March 1999 Page 180 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
9RLFH%DQG When an IT channel burst is declared as data, it will require 5-bit ADPCM
'DWD+DQGOLQJ encoding independent of the data speed. The channel itself will be
declared as a data channel and will not be subject to bit robbing.
Time
CC B D V V D V V V V V T V V V V V
slot 0
B = Bit bank
D = Data
V = Voice
T = Transparent
Normal BC range
Overload BC range
Last Updated: 12 March 1999 Page 181 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
)D[+DQGOLQJ
ZLWK)D[ The basic function of the facsimile module is to identify Group III fax calls,
demodulate the fax signal, and transmit the demodulated information to
'HPRGXODWLRQ the remote facsimile module via the DCME where the voice band signal is
5HPRGXODWLRQ reconstructed to its original format. If a call can not be demodulated, it is
routed through a 40 Kb/s ADPCM channel.
The fax module demodulates the image data of each fax call and
accumulates the information for 2 ms before transmission. Depending on
the fax data rate, the number of bits in 2 ms may be a non-integer
number. To compensate for this, and also to cope with timing differences
between the fax machine and the DCME fax frame clock, one stuffing bit
and a control bit are used. The resulting bit structures of the fax
demodulation and storage of 2 ms are referred to as Fax Data Channel
(FDC).
For example, in Figure 4.40, a fax call with a 9.6 Kb/s data rate is
transmitted. The number of bits accumulated in a 2 ms interval is slightly
in excess of 19 (19.2 to be exact), so that sometimes 19 and sometimes
20 data bits will be transmitted. The 20th bit of the FDC will, therefore, be
either a dummy bit or a data bit. The 21st bit of the FDC will indicate
which of the two cases applies.
Control bit
Dummy bit
or data bit
Data
1 bits 18 19 20 21
...
Figure 4.40 Fax Data Channel (FDC) Formed from a 9.6 Kb/s Fax Call
The number of bits in the FDC depends on the transmission rate of the
fax signal and is calculated as follows:
Last Updated: 12 March 1999 Page 182 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
where:
R Fax rate in Kb/s (2.4, 4.8, 7.2, 9.6, 12, and 14.4 Kb/s)
I( ) Integer part of the number
)D[&RQWURO The FCC, as shown in Figure 4.41, is provided for the transmission of
&KDQQHO)&& information related to frame description messages, fax call control codes,
and auxiliary information. The FCC structure consists of a 9-bit IT field
and a 12-bit message field. This 21-bit FCC is transmitted once per
DCME frame (2 ms).
The IT field value identifies the IT from which the fax call was
demodulated. The IT numbering ranges from 1 to 511. The numbering
ranges from 1 to 216 is the normal range used to designate the IT traffic
trunks. The special range from 500 to 511, is reserved for functions
within modules (0 and 217 to 499 are not used). The message field is
used to convey information, such as whether FEC coding is applied to the
demodulated information, demodulated fax rate, input level, etc., to
properly demodulate the signal at the receive side.
Last Updated: 12 March 1999 Page 183 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
)D[%ORFNV Once the FMF is formed, the bits are grouped in contiguous 32-bit blocks.
The 21 bits of the FCC are entirely contained in block 1 because FEC
(BCH coding) is always applied to the FCC. This action adds 10
additional FEC check bits plus a dummy bit to the FCC, resulting in a 32-
bit structure to conform block 1 (Figure 4.43).
Fax
Control
Channel
21 10 Dummy bit
Bits Bits
)D[7UDQVSRUW In every DCME frame, the facsimile data interface delivers m fax blocks to
&KDQQHOV)7& the DCME. Special 32 Kb/s BC channels called FTC or Fax Banks
transport the fax blocks. The fax block bits are inserted at a rate of 2 bits
per PCM frame so that all the bits of a block are transmitted in 16 PCM
frames (2 ms). Every FTC (or fax bank) conveys 2 fax blocks. Thus, the
number of FTCs required to transmit the m fax blocks is m/2. The FTC
number 1 is mapped in the bearer frame as the first nibble following the
control channel Figure 4.44).
Last Updated: 12 March 1999 Page 184 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
TS 0 BC BC BC BC BC BC
CC #1 #2 #3 #4 #5 #6 .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. BC BC BC BC
#58 #59 #60 #61
8 Bits
DCME control channel
* FTC #1 = FCC + Fax block 2
*the number of destinations and the traffic requirement on each route, and
*the capacity of the backhaul system.
6LQJOH This is the simplest concept of DCME applied to large and medium traffic
'HVWLQDWLRQ routes between two destinations over satellite bearers. Typical traffic
values of between 60 and 150 trunk channels (2 to 5 PCM frames) per
0RGH DCME would be normal. An example of system configuration is shown in
Figure 4.45A.
Last Updated: 12 March 1999 Page 185 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
1
1 2
2
D B 3
A
3 A C 4
4 C
1
2
B: MULTICLIQUE C 3
4
1 1
2 2
3 A B 3
4 4
1
C: MULTIDESTINATION 2
& C 3
MIXED MODE
4
1
2
C 3
4
1
2
D 3
4
Last Updated: 12 March 1999 Page 186 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
0XOWLFOLTXH In multiclique mode, the DCME output is split into two traffic streams with
0RGH the DCME generating a "Control Channel" for each stream or "Pool".
These two pools do not have to be the same size. Each interpolation
pool will contain all channels for a particular destination. Thus, there is a
maximum of two pools in any bearer frame. Each interpolation pool within
the bearer frame structure will carry the assignment information in a
control channel associated with the pool. The boundaries between the
pools are variable and operator controlled. Each pool can be
incremented in 8-bit bearer time slots.
0L[HG0RGH It must be noted that Mixed Mode operation, i.e., Multidestination together
with Multiclique, is also possible. In this mode, the DCME will correspond
with up to four destinations by means of a maximum of two interpolation
pools within the bearer frame. One of the interpolation pools may serve
up to three destinations and the other will serve one destination. As in the
case of multiclique, the boundaries between the pools will be variable,
under operator control, and in increments of 8-bit bearer time slots.
'&0(*DLQ The DCME gain is defined as the input trunk channel to output bearer
channel. Theoretically, this gain is calculated as 2.5 for the DSI and 2 for
ADPCM (5 for the DCME).
Last Updated: 12 March 1999 Page 187 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
The factor that has the greatest significance in the DCME gain is the
number of 64 Kb/s data channels required because each such channel
absorbs 2 x 32 Kb/s bearer channels. Figure 4.46 shows the DCME
traffic handling capability. A lesser, but still significant factor is the
percentage of voice-band data that varies according to the route and time
of day. This can be checked using a Digital Channel Occupancy
Analyzer (DCOA) which often shows data variations with peaks that may
or may not always coincide with speech.
Last Updated: 12 March 1999 Page 188 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
6.0
0% Data
5.0
10% Data
30% Data
2.0
TRUNK LINES
2YHUORDG The dynamic variation in the number of bearer channels available for the
&RQWURO interpolation process due to voice-band data and 64 kb/s data activity
requires action to be taken to safeguard speech quality. The following
solutions are feasible.
Last Updated: 12 March 1999 Page 189 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Due to better efficiency, “b” and “c” are the widely recommended
solutions.
0DSSLQJ Before any DCME operating mode is established, the users must agree
on how the system will be mapped. Taking Figure 4.47 as a reference, a
DCME map consists of the information given to the DCME to break down
the input trunk channels (TCs) into 64 Kb/s intermediate trunks (ITs).
These will then be processed by the DSI and ADPCM, and transported as
bearer channels (BCs).
Remember, the TCs are connected to the DCME from the ISC in PCM
frames (each with 30 or 24 channels), and the DCME handles not TCs
but ITs. The mapping reduces the CC size and allows the flexibility
required for multiclique and multidestination operation. The map is a
static arrangement that has to be agreed to between the users, and it can
be different for the transmit and receive sides.
1 1
2
2 .
.
3 . TX
I 30
4 31 RX 1
.
DSI
5 . &
S RX 2**
6 60 ADPCM
61
C 7 . PROCESSING RX 3**
M A. P PING
8 .
RX 4**
.
9* .
.
10* 216 DCME
Last Updated: 12 March 1999 Page 190 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
:KDW
VQH[WLQ
'&0(" We can anticipate expanded use of new speech processing techniques
such as LD-CELP, in which the voice is coded in 16 Kb/s without
sacrificing voice quality. LD-CELP is an attractive alternative to further
increase the DCME gain from the actual 5 to 1, to 10 to 1. This
alternative will be available with the advent of VLSI chips capable of
handling several voice channels.
3DFNHW&LUFXLW Packet switching has been thought of as a data communication
0XOWLSOLFDWLRQ technique. However, it was initially devised as a technique to avoid voice
communication circuit wiretapping by breaking a voice conversation into
(TXLSPHQW ’packets’ as depicted in Figure 4.48. A further enhancement of the
3&0( technique was its capability to mix pieces of a call with pieces of other
calls at each switch.
It was only at the destination that all the pieces could be collected and
reassembled in the original order so that the voice became intelligible.
Obviously, every ’packet’ needs a certain type of addressing information
(called header and trailer) such as destination, time stamp, and related
information to reconstruct the original message.
* User-to-user protocols
* User-to-packet switch protocols
* Packet switch-to-packet switch protocols.
These protocols apply to all data communications, to route the signal and
to assemble the information at the destination.
Packet switching operates like the mail. The letter (i.e., information) is
placed in an envelope (user-to-user protocol), the envelope is stamped
and addressed (user-to-packet switch protocol).
Last Updated: 12 March 1999 Page 191 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Once it is deposited in the mailbox, the post office routes the letter
according to the address, and delivers it to a partner post office (packet
switch-to-packet switch protocol). En route to its destination, the
envelope could be handled by intermediate post offices (intermediate
packet switches). Here the addresses of all the arriving envelopes will be
checked, local letters retained, and in-transit letters forwarded to the next
post office until they reach their destination, where the packet will be
delivered to the user.
for is =M
The secret formula is =M
E = M.C2
is
for
se se
mul
se
E
fo r
The
is
=
M
mul
cret
E se
cret is
E
C2
a
a
cret
m
ul mul
a
The C2
C2 The
Last Updated: 12 March 1999 Page 192 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Retransmission X5
X2
Error
1
Message 1
3 2 1 1 Reassembly
A X1 Acknowledgements X4 C
3 2 1
2
3
3
2
X3
X6
3DFNHWL]HG In the mid-1980s, there was renewed interest in packetized voice. The
9RLFH3URWRFRO goal was to integrate voice, voice band data, digital data, high-speed
data, video, signaling, and network control into packets of common
format. The result was ITU-T Recommendation G.764 for ’packetized
voice protocols’. With this approach, voice and data can be integrated
thanks to the networking advantage derived from packet-switched
networks.
Last Updated: 12 March 1999 Page 193 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
• The address octets are used to identify the data origin and
destination.
• An UIH control field is used when a management entity requests
unacknowledged information transfer. The two least significant bits
LSBs are reserved to perform cyclic redundancy checks over the
address octets.
• Protocol discrimination has a fixed value. It identifies the packet as a
voice packet.
• Block dropping indicators track the status of block dropping within the
packets.
• The time stamp is a record of the cumulative variable delays
experienced by a packet in a network with a 1 ms resolution.
• Coding type indicates the method used to code the speech samples
at the originating point before packetization.
• * A sequence number is used by the end point in the build-out
process to determine the first packet of a burst and whether a
packet has been lost. The sequence number and time stamp allow
for the removal of variability in the network delay.
• Noise level indicates the background noise level at the transmit side.
The receiving end uses the noise level information to determine the
noise level that may be played in the absence of voice
packets.
• Each information block has 16 octets.
• The check sequence is an algorithm to check the integrity of the
transmitted information.
Last Updated: 12 March 1999 Page 194 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
8 7 6 5 4 3 2 1
Octet 1
Address (upper subfield)
Octet 2
Address (lower subfield)
Octet 3
HEADER
UIH control field
Protocol discriminator Octet 4
Block dropping indicator Octet 5
Time stamp Octet 6
Coding type Octet 7
Sequence number Noise level Octet 8
Non-droppable 16
block Octets
INFORMATION
Non-droppable 16
block Octets
Optionally droppable 16
block Octets
Optionally droppable 16
block Octets
Check sequence
TRAILER
Check sequence
'URSSDEOHDQG Remember that G.727 ADPCM arranges the output information into core
1RQGURSSDEOH bits and enhancement bits. Now, as the packetized voice protocol
collects 128 ADPCM samples, the packet information is ordered in such a
%LW%ORFNV way that all the first 128 core bits of the 128 ADPCM samples are
grouped together to compose the first nondroppable block. (See Figure
4.51.) The second 128 core bits of the 128 ADPCM samples are also
grouped (composing the second nondroppable block). The same
procedure is performed on the third, fourth, and fifth 128 enhancement
bits of the 128 ADPCM samples to build the first, second, and third
droppable blocks. Figure 4.51 shows the bit blocks arrangement.
Last Updated: 12 March 1999 Page 195 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
16 msec
Sample Sample Sample Sample Sample Sample
Core 1 2 3 126 127 128
bits Enhancement
bits
..............
(* if required)
1 2 3 4 5 1 2 3 4 5 .............. 1 2 3 4 5 1 2 3 4 5
* * * *
Pre-packetized
bit format
(ADPCM output)
....... .......
Frame 1st most significant 2nd most significant Last 128 Second 128 First 128
Trailer
header non-droppable bits non-droppable bits droppable bits droppable bits droppable bits
1 . . . . . . . 128 1 . . . . . . . 128 1 . . . . . . . 128 1 . . . . . . . 128 1 . . . . . . . 128
Bit # 1 of the Bit # 2 of the Bit # 3 of the Bit # 4 of the Bit # 5 of the
128 samples 128 samples 128 samples 128 samples 128 samples*
3&0(9RLFH PCME uses the packetized voice protocol and ADPCM G.727 for voice
%DQG+DQGOLQJ band handling. Before any processing, the signal is classified in three
levels as shown in Figure 4.52. If the signal is classified as voice, it is
packetized according to the voice protocol already described. Note that
different ADPCM rates can be used for voice as a way to control
congestion.
3URFHVVLQJ)D[ An optional fax demodulation capability can be used to route incoming fax
&DOOV calls. In that case, calls will be routed to a fax demodulation module.
Every fax page will constitute a packet. The operation is as follows.
Last Updated: 12 March 1999 Page 196 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
VOICE
CHANNEL
LEVEL 1:
SIGNAL NO SIGNAL
VOICE LEVEL 2:
NON-VOICE
2, 3, 4 bits
ADPCM
LOW MEDIUM HIGH OTHER
SPEED SPEED SPEED > 9.6 kbit/s LEVEL 3:
< 1.2 kbit/s 1.2 to 4.8 7.2 to 9.6
kbit/s kbit/s
9RLFH%DQG The signal classification is performed in such way that the appropriate
'DWD3URFHVVLQJ ADPCM algorithm is selected to process the VBD with either 3, 4, 5, or 8
bits, as dictated by the modem speed. Because low-speed modems are
automatically handled at lower bit rates, no bandwidth is wasted.
'LJLWDO'DWD The PCME can interface digital data channels by using a Virtual Data Link
Capability (VDLC).
3URFHVVLQJ
• A special Digital Circuit Emulation (DICE) protocol is used to transport
special circuits in a bit transparent manner. The information is broken
into packets and transported.
• If the signal is based on the X.25 protocol or any other link access
protocol (already packetized from a packet switch network), the
frames will be relayed to the output without modification.
Last Updated: 12 March 1999 Page 197 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
• The idle codes and flags will be removed from signals containing the
High-Level Data Link Control (HDLC) procedure. This approach, plus
the burst nature of the signal, can give data compression ratios of
40:1 in interactive data applications.
• The Virtual Data Link Capability (VDLC) allows the PCME to transport
any digital data rate.
,17(/6$7 INTELSAT introduced Demand Assigned Multiple Access (DAMA)
'$0$ service in 1996 in Atlantic Ocean Region first, and extended it to all the
three ocean regions in 1997. The INTELSAT DAMA service for 16 Kb/s
telephony has been designated as “Thin Route-on-Demand” service.
This section discusses the service features briefly. The reader can refer
to the INTELSAT handbook DAMA: Your Global Thin Route on Demand
Connection for a detailed discussion on the subject.
Last Updated: 12 March 1999 Page 198 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
The DAMA Network platform is a flexible concept that can offer a wide
variety of services, such as:
Last Updated: 12 March 1999 Page 199 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 200 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 201 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 202 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
PSN
PSN
DAMA
INTER- DAMA
Terminal INTER-
NATIONAL Terminal
SWITCH NATIONAL
SWITCH
PSN PSN
DAMA DAMA
INTER- INTER-
Terminal Terminal
NATIONAL NATIONAL
SWITCH SWITCH
(DUWK6WDWLRQV A wide range of Earth station sizes can carry the service. Although the
service provides direct “mesh” connections, certain Earth station–to-
Earth station connections may not be allowed because of off-axis
emission constraints. To help users plan their Earth station facilities and
desired correspondents, matrices that identify the allowable
connectivities are available in IESS-311 (INTELSAT DAMA Carrier
Performance Characteristics) for different satellite and coverage
characteristics. Tables 4.5, 4.6 and 4.7 summarize typical Earth station
connectivity matrices for INTELSAT VI through INTELSAT VIII global
beam operation.
Last Updated: 12 March 1999 Page 203 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 204 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Last Updated: 12 March 1999 Page 205 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
'$0$6\VWHP The system has the capability to provide call-by-call mesh connections
2YHUYLHZ between Earth stations equipped with Traffic Terminals. On-demand
connections are under the control of a centralized NMCC, installed at a
"host" station, and under the supervision of the IOC. Two
geographically redundant NMCCs will ensure a high level of Network
availability. Figure 4.57 shows the concept.
On-Demand
Network
Redundant Network
Management and Control INTELSAT Operations
Centers Center, Washington DC
(INTELSAT Managed)
Last Updated: 12 March 1999 Page 206 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
$SSOLFDWLRQV Although the service has been initially conceived for international PSTN
%H\RQG applications, the attractive tariffs for small stations are expected to
,QWHUQDWLRQDO stimulate the demand for other applications. Customers will be able to
361 rapidly expand services with low-cost Earth stations that are easy to
install, maintain, and redeploy. A number of domestic, regional, and
international applications can be supported with the flexibility that the
DAMA platform can offer. Signatories and users will immediately be able
to offer these service applications both domestically and internationally in
a closed user group arrangement, without the expense of implementing
their own network management facilities.
The use of smaller Earth stations will permit rapid extension of PSTN
service to remote and less developed areas in a "star" topology, using
existing gateway Earth stations as star nodes as well as entry points
(hubs) into the PSTN. This scenario is particularly suited for rural
telephony applications.
Last Updated: 12 March 1999 Page 207 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
There are almost 300 Standard A and B Earth stations operating on the
satellites at 335.5 degrees E, 60 degrees E, and 174 degrees E, which
could be used as the gateways. Star topology for traffic is necessitated
by the global beam operation. However, future deployment of networks
with higher power and higher gain transponders would facilitate "mesh"
operation between small Earth stations.
6HUYLFH In addition to thin route telephony, the DAMA platform is also capable of
(QKDQFHPHQW providing data communications, including the provisioning of a dial-up 64
IRU'LDO8S Kb/s clear channel service that uses a subset of ISDN signaling. This
service is capable of facilitating narrowband multimedia applications (at
.EV user data rates of up to 128 Kb/s using two 64 Kb/s channels) via VSAT
terminals at hard-to-reach customer locations, and terminating the link
into the terrestrial infrastructure via large gateway Earth stations.
A number of Signatories have expressed interest in targeting the market
for business/specialized networks using this capability.
9HU\6PDOO VSATs are a class of Earth stations suitable for use on customer
$SHUWXUH premises, usually operating in conjunction with a large-size hub Earth
station, and capable of supporting a wide range of two-way services.
7HUPLQDO VSATs have evolved rapidly as a result of technical advances in
96$7 many areas including: packet transmission and switching, efficient
1HWZRUNV multiple-access protocols, powerful microprocessors, RF technology,
antenna miniaturization, protocol standardization and implementation of
FEC codecs and modems, and higher power satellites. INTELSAT
has published the INTELSAT VSAT Handbook, which is available to
Signatories and customers upon request.
96$7,%6 INTELSAT has recently extended IBS to VSAT terminals, and this service
is called VSAT IBS. VSAT IBS provides a preengineered solution to
enable business communications services using small Earth station
antennas.
Last Updated: 12 March 1999 Page 208 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
• Digital video-conference
• Real-time banking transactions
• Data and voice communications
• Internet Service Providers (ISPs) to Internet backbone connectivity
VSAT IBS extends IBS to VSAT terminals with small antennas, as small
as 1.8m in C- band, and 1.2m in Ku-band. Earlier, the smallest antenna
that IBS could use was 4.5m in C-band, and 3.7m in Ku-band. Details of
VSAT IBS are available in the following documents:
Antenna Standard F1 H4 H3 H2
Typical Antenna 3.5-5.0 3.5-3.8 2.4 1.8
Diameter (m)
Typical G/T dB/K 22.7 22.1 18.3 15.1
Antenna Standard E1 K3 K2
Typical Antenna 2.4-3.5 1.8 1.2
Diameter (m)
Typical G/T dB/K 25 23.3 19.8
Last Updated: 12 March 1999 Page 209 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
7UHOOLV&RGHG TCM IDR is INTELSAT’s newest, high-quality digital carrier service. This
0RGXODWLRQ is an improvement over the existing QPSK IDR service. INTELSAT offers
,QWHUPHGLDWH TCM IDR carriers in C- and Ku- bands through INTELSAT satellites VII,
VIIA, VIII, and IX satellites for operation with Standard A, B, C, E, and F
'DWD5DWH Earth stations. TCM technique is more bandwidth efficient than QPSK
7&0,'5 IDR, and will support a greater number of channels in a given bandwidth.
&DUULHUV Hence, TDM IDR will promote more efficient usage of the orbital
spectrum. Current technology also allows TCM IDR channel unit designs
to incorporate an option for switching between the TCM IDR and QPSK
IDR modes of operation. This will provide backward compatibility with
existing QPSK IDR channel units for information rates less than 10 Mb/s.
TCM IDR digital carriers in the INTELSAT system use coherent 8 PSK
modulation operating at information rates ranging from 64 Kb/s to 44.736
Mb/s. The information rate is defined as the bit rate entering the channel
unit, prior to the application of any overhead or FEC. For TCM IDR, the
FEC comprises an inner rate 2/3 Pragmatic TCM encoder/TCM decoder,
concatenated with a mandatory Reed-Solomon (219,201) outer code.
Pragmatic TCM encoding is a patented technique that uses the standard
k=7 convolutional code of rate 1/2 in conjunction with supplementary
circuitry to generate TCM encoded information.
7&0,'5 The TCM IDR service platform supports all voice and data applications,
$SSOLFDWLRQV but is particularly well suited to applications that require low BER/high
availability performance, such as:
Last Updated: 12 March 1999 Page 210 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
7UDQVPLVVLRQ
3DUDPHWHUV Though any information rate from 64 Kb/s to 44.736 Mb/s can be used,
INTELSAT has defined a set of recommended information rates. Table
4.11 shows INTELSAT-recommended TCM IDR information rates and
associated overheads for Rate 2/3 TCM 8 PSK with mandatory Reed-
Solomon coding (219, 201) outer coding.
7&0,'5 Performance of TCM IDR carriers will meet the requirements of Note 2 of
3HUIRUPDQFH Recommendation 3 of ITU R S.1062. Table 4.12 shows TCM IDR
performance figures.
• Modulator/Demodulator (modem)
• Pragmatic TCM encoder/TCM decoder
• Scrambler/descrambelr
• Overhead framing unit
• Reed-Solomon encoder/decoder
• Interleaver/deinterleaver
• Switchability to QPSK/IDR mode of operation (optional)
Last Updated: 12 March 1999 Page 211 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
The channel unit uses coherent 8 PSK modulation together with rate 2/3
pragmatic TCM encoding/decoding and Reed-Solomon (219,201) outer
coding. For TCM IDR carriers that have information rates less than 1.544
Mb/s, either no overhead framing or IBS overhead framing can be used.
For information rates equal to or greater than 1.544 Mb/s, an overhead
framing structure has been defined to facilitate the provision of ESCs and
maintenance alarms.
Switchability between the TCM IDR and QPSK IDR mode of operation is
an optional requirement that allows users to maintain backward
compatibility with existing QPSK IDR channel unit designs. Refer to
IESS 310 for detailed performance characteristics for TCM IDR
carriers.
%DQGZLGWK Compared to QPSK IDR, TCM IDR service typically uses about 20
(IILFLHQF\ percent less bandwidth per carrier, and almost the same satellite power
when used with Standard A antennas. Table 4.13 shows a typical
comparison between the two services.
Reed-Solomon
TCM Encoder
Synchronous Scrambler (219,201) 8 PSK Modulator
(Rate 2/3)
Encoder/Interleaver
To Upconverter
Information
Rate
Transmit
Channel Unit
RS Encoder
Reed-Solomon
TCM Decoder
Synchronous Descrambler (219,201) 8 PSK Demodulator
(Rate 2/3)
Decoder/Deinterleaver
From Downconverter
Information
Rate
RS Decoder
Receive
Channel Unit
Last Updated: 12 March 1999 Page 212 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Chapter 4 – Applications
Table 4.13 Typical Comparison between QPSK IDR and TCM IDR
Last Updated: 12 March 1999 Page 213 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
$33(1',;$
(&+2&21752/
,QWURGXFWLRQ This appendix provides information on:
(FKR3UREOHPV Telephones are 2-wire devices and are connected by a hybrid to a 4-wire
LQ6DWHOOLWH&RP connection that transmits and receives the signal along the rest of the
circuit path. Because of impedance mismatch at the hybrid, some of the
PXQLFDWLRQV signal is reflected back towards the speaker, causing echo.
Last Updated: 12 March 1999 Page 215 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
(FKR&RQWURO If echo in a telephone network is not controlled effectively, it interferes
with the desired signal and degrades the network’s transmission quality.
A strong echo may cause severe destabilization of a link making it
oscillate resulting in degradation of the signal due to multiple reflections.
Two types of echo control equipment are available:
• echo suppressor
• echo canceller
(FKR Echo suppressor is one of the early devices developed to control the
6XSSUHVVRU echo in satellite circuits. An echo suppressor is a voice-activated switch
that is set either to an “on” or an “off” position. The echo suppressor is
connected to the 4-wire side of a circuit. The suppressor terminates all
sound when it is in the “on” position, temporarily blocking the
communication link in one direction. When all communication is
suppressed in one direction, no echo, or new speech from the other end,
is transmitted.
Last Updated: 12 March 1999 Page 216 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
Suppression Switch
Send-in Send-out
Near End/
Talker 1
Received
Speech
6 dB
Rec-out Rec-in
Last Updated: 12 March 1999 Page 217 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
• Type A: Interfaces with analog signals, and uses analog circuit logic
and analog suppression
• Type B: Interfaces with analog signals, and uses digital circuit logic
and analog suppression
• Type C: Interfaces with digital signals, and uses digital circuit logic
and digital suppression
• Type D: Interfaces with analog signals, but uses digital circuit logic
and digital suppression
'RXEOH7DON If both the near-end and far-end talkers speak simultaneously (double-
talk), an enabled suppressor allows only one of the two talkers to be
heard. Because the suppressor cannot treat speech separately from
echo, echo spurts may be heard during double-talk because near-end
talker speech and far-end talker echo are simultaneously present in the
signal.
Last Updated: 12 March 1999 Page 218 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
3ULQFLSOHRI Demand for high quality long-distance telephone service and advances in
(FKR&DQFHOOHUV signal processing technology prompted researchers to develop a new
device that would improve the echo suppressor performance. The end
product was the echo canceller.
When echo cancellers were first introduced, their large size and high
costs discouraged widespread installation. However, digital signal
processing and improved manufacturing techniques have made echo
cancellers more attractive. Today, their many special advantages
including better performance, low-cost (especially in multichannel units),
self-testing ability, and adaptability to react to different circumstances in
the circuit have made echo cancellers the leading method of echo control
within the INTELSAT system.
Last Updated: 12 March 1999 Page 219 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
Echo cancellers are voice-activated devices, which remove echo from the
circuit without attenuating or suppressing the voice signal. Like
suppressors, cancellers are positioned in the 4-wire side of the network.
However, instead of blocking a voice signal to remove the echo and
everything else as well, the echo canceller subtracts an estimate of the
echo from the returning signal. Figure A.2 shows a typical echo canceller
block diagram and Figure A.3 shows a typical transmission path.
There are different types of cancellers, and the design may be based
upon a single channel or multichannel operation. ITU-T
Recommendation G.165 addresses both analog and digital echo
cancellers and provides for three different types of such devices.
There are very few Type A cancellers. Type D cancellers are usually
found in applications where fewer circuits are involved. The majority of
cancellers sold today are Type C. They are available for multichannel
operation in increments of 24 or 30 channels, corresponding to the
primary digital hierarchy, T-1 or E1. The following discussion applies to
all types of echo cancellers unless a reference is made to a specific type.
Customer Network
Echo Canceller
side Side
Send-in
Send-out
- Non-Linear
Near End/ Processor
Talker 1
Echo
Estimate
Received
Speech
Rec-out Rec-in
Last Updated: 12 March 1999 Page 220 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
ERL ERL
3 or 6 dB 3 or 6 dB
Talker 1 Normal Speech Path
x
Echo Return Path
A/D A/D
Long-Delay
Talker Talker
Terrestrial
Interface
Interface
/2 /4 /4 /2
Near 1’s 2’s Far
Hybrid Hybrid
Talker Echo Echo Talker
or Satellite
Canceller Canceller
Talker 1 Digital Network Talker 2
Note: An echo canceller al Talker 2’s end cancels echo only for Talker 1’s speech, and only Talker 1 can hear the
difference that Talker 2’s echo canceller makes in the quality of the connection
Refer to Figure A.3. In the transmission path when Talker 1 (the near-end
talker) speaks, the voice signal is transmitted through a hybrid, the point
where a 2-wire circuit becomes a 4-wire circuit, at the near-end. It is
transmitted through a channel bank or multiplexer. Talker 1’s speech
signal passes transparently through Talker 1’s echo canceller, the near-
end canceller, before being placed onto a long-distance terrestrial or
satellite network. After its journey through the network, Talker 1’s signal
passes through Talker 2’s echo canceller, into the channel bank
equipment that converts the signal from digital to analog so that it can be
heard. The analog signal is finally passed through a second hybrid to
Talker 2’s telephone.
When the voice signal reaches the end of the satellite or terrestrial
network, it passes through the echo canceller on its way to the intended
receiver (Talker 2’s telephone) before it is converted from a 4-wire to a 2-
wire. The far-end echo canceller performs a large number of samplings
and complex calculations within a short time, referred to as convergence
time. This parameter is a measure of the efficiency of the echo canceller
operation. The echo canceller estimates the voice signal pattern and
makes a model of that pattern. This process, called convergence, is the
process of dynamically developing a mathematical model of the voice
signal.
Last Updated: 12 March 1999 Page 221 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
When the reflected echo passes through the echo canceller on the echo
return path, the echo canceller subtracts the estimated echo from the
actual echo based on the convergence model. Any residual error signal
is used to improve the model for the next estimate. The digital echo
canceller employs digital signal processing to dynamically update the
model of the echo with variations in the incoming signal and network
response, allowing the model to adapt continuously to changing speech
pattern and circuit conditions.
ERL is the loss in signal level that occurs while the signal travels through
the network’s end-path. The end-path is the portion of the network from
the echo canceller’s receive-out port to the send-in port. The most
sensitive echo cancellers have ERL near zero, meaning that the canceller
can perform when there is almost no measurable difference between the
level of the original voice signal and that of the echo. A typical value of
ERL is 6 dB. The value of ERL is an important factor in determining the
overall performance of the echo canceller.
Echo Return Loss Enhancement (ERLE) indicates the level of echo the
speaker will hear after the voice signal has been processed through the
canceller. ERLE is the sum of the network’s end path ERL, and the
effects of the canceller with and without the NLP. Like ERL, ERLE is also
measured in decibels. ERLE and convergence time are two basic
measures of a canceller’s performance.
Last Updated: 12 March 1999 Page 222 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
The end-path, as stated earlier, is the portion of the network from the
receive-out port of the echo canceller to its send-in port. The echo
canceller’s end-path delay corresponds to the maximum length of time
that a signal may take in travelling around the network’s end-path, and still
be cancelled when it returns to the canceller through the send-in port.
Current designs of echo cancellers can typically accommodate end-path
delays ranging from 8 ms to 128 ms. For optimum performance, it is
necessary to have an echo canceller with an end-path delay capability
that is long enough to accommodate the longest end-path delay possible
in the network.
Last Updated: 12 March 1999 Page 223 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
0DLQWHQDQFH Maintenance costs are lower for multichannel cancellers. Single channel
units must be individually tested. By contrast, multichannel cancellers
provide terminal and remote access by means of an RS-232 v.24 port
with built-in automatic self-test and error reporting functions.
6XPPDU\ Over the last 25 years, subjective tests have been conducted to compare
the quality of satellite links with that of the terrestrial links. Tests have
shown that a primary cause of quality degradation is echo. Pure delays,
delays without any echo, up to a few hundred milliseconds do not
significantly degrade the communications quality of a voice circuit.
However, in some instances, a round-trip delay in excess of 30 ms may
cause the echo to become objectionable, and the communications quality
degraded unless these echoes are eliminated by suitable echo control
devices. Further, it is necessary that the circuits to which these devices
are connected be properly maintained for the echo control devices to
perform adequately.
Field trials in the United States by the Bell system clearly demonstrated
that echo canceller-equipped satellite circuits operating in the U.S.
domestic network performed as well as terrestrial circuits.
Last Updated: 12 March 1999 Page 224 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Appendix A - Echo Control
They also indicated that the echo suppressors, conforming with ITU-T
Recommendation G.161 for long propagation delay circuits, impair
speech transmission, and result in chopping, echo spurts, and a general
degradation of circuit performance. New ITU-T Recommendation G.164-
type digital echo suppressors, which operate with shortened hangover
times, improved logic for the control of echo suppression and break-in,
also improve performance, but not to the same extent as the echo
cancellers.
Results of many field trials have proven that even with the long
propagation delays of the satellite, echo cancellers can provide a circuit
quality comparable to that of terrestrial circuits. Unlike circuits using echo
suppression, echo cancellation makes it possible to permit full-duplex
communication without interruption. Advances in circuit miniaturization,
digital signal processing, and manufacturing techniques have made echo
cancellers cost effective. The cancellers’ self-testing capability and
audible performance characteristics make them superior to echo
suppressors from both technological and practical viewpoints. INTELSAT
recommends that echo cancellers conforming to or exceeding ITU-T
Recommendation G.165 requirements be placed on all voice circuits
transported over the system.
Last Updated: 12 March 1999 Page 225 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Glossary
Glossary
Last Updated: 12 March 1999 Page 227 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Glossary
Last Updated: 12 March 1999 Page 228 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1
Digital Satellite Communications Technology Handbook Glossary
Last Updated: 12 March 1999 Page 229 of 229 Doc. No.: DIGITECH-1998-HNDBK-102
Verify document currency before use. Pub. Rel. No.: 1