access network

135
1 ACCESS NETWORK By Mr. Muhammad Usman Senior Instructor Mr. Zahid Hussain Senior Instructor Mr. Tallat Siddique Senior Instructor

Upload: bilal-hassan

Post on 30-Sep-2015

6 views

Category:

Documents


3 download

DESCRIPTION

Access Network

TRANSCRIPT

  • ACCESS NETWORK

    By

    Mr. Muhammad Usman Senior Instructor

    Mr. Zahid Hussain Senior Instructor

    Mr. Tallat Siddique Senior Instructor

    UPSKILL TRAINING PROGRAM

  • WHAT IS TELECOMMUNICATIONS.

    To be able to communicate at long distance through electrical or optical signals.

    OR

    A long distance communication via integration of information sharing networks all tied together.

    TELECOMMUNICATION NET WORK.

    A set of nodes and links that provides connections b/w two or more defined points to carry out exchange of information b/w them

    UPSKILL TRAINING PROGRAM

    *

  • Access Network

    LE

    END USER

    EX

    EX

    AN is called the last mile of Telecom Network

    Access Network

    UPSKILL TRAINING PROGRAM

    *

    telecom network is consist of exchange network ,transmission network and access network,access network located the end of telecom network.as an end users oriented network ,access network is connected to the end users directly , access kind of services . so access network is called "the last mile of telecom network".

    1.unknown3.unknown4.unknown5.unknown
  • LE

    Central office

    user

    Limitation of Traditional Access Mode

    Connection

    Cabinet

    Distribution

    Box

    3~5km

    500m~1km

    10~300m

    Feeder layer

    Distribution layer

    Drop layer

    Small coverage Limited bandwidth Maintenance complexity Reliability cut down Enormous investment

    Traditional access mode has become the bottleneck

    of modern telecom network!

    Copper Cables Based

    UPSKILL TRAINING PROGRAM

    *

    6.unknown
  • How to Overcome the bottleneck

    Advantages:

    Wide Coverage

    Broad Bandwidth

    Easy Maintenance

    High Reliability

    Low Investment

    Optical Integrated Services

    Access Network

    ?

    !

    UPSKILL TRAINING PROGRAM

    *

  • TERMINOLOGIES

    BANDWIDTH:

    Range of frequenceies that any media(copper,optical fiber,Air Interface) that it can transmit from source to destination for communication.

    MODEM:(Modulation Demodulation

    Conversion of Analog signal to digital signal and vice versa.

    UPSKILL TRAINING PROGRAM

    *

  • Few Key Concepts

    ElectricalSignalCharacteristics

    Bandwidth

    Speedoftransfer

    Networks are to be designed to handle the

    customersrequirements

  • Telecommunication Networks

    A telecommunication network provides

    telecommunication services to the customers

  • The Internet

    A networks of networks or ISPs

    Architecture involves

    Home/Office (User) PCusing web, mail etc

    User PC Comm. eqpt e.g Modem, Ethernet

    card etc

    Local Loop carrier, may be POTS provider,

    wireless operator, Power line carrier

    ISPsetup

    ISPbackbone

    Online Contentitself

  • Access Network

    Consists the large part of the network

    Connects the end-user with the end-points

    of the core network

    Uses different technologies

    Different Access services possible

  • Media Types

    OpenWirePairs

    TwistedPair Wires

    CoaxialCable

    OpticalFiber

    Wireless

  • DSL

    Stands for DIGITAL SUBSCRIBER LINE

    DSL is a technologies that provide digital data transmission over the wires of a local telephone network.

    It transmits data and voice simultaneously without any interruption in voice signals

    A DSLAM is the device located at the central office (CO) of the provider and concentrates connections from multiple DSL subscribers.

    UPSKILL TRAINING PROGRAM

    *

  • BANDWIDTH

    The difference between the highest and the lowest frequencies of a composite signal. It also measure the information carrying capacity of a line or a network. the highest frequency that can be transmitted in analog operation. The information carrying capacity of a digital system.
  • SIGNAL TO NOISE RATIO
    (SNR)

    The ratio of signal to noise , an indication of signal quality in analog system.
  • TWISTED PAIR

    A twisted pair consists of two conductors each surrounded by an insulating material.

    Twisted pair cable comes in two forms.

    Unshielded twisted pair (UTP).

    Shielded twisted pair (STP).

  • CROSSTALK

    The noise on a line caused by signals traveling along another line.Electromagnetic interference from one pair can create a noise over others pairs. For the solution of this problem, the wire pairs are twisted around each other at regular intervals (between 2 and 12 twist per foot).
  • CROSSTALK

    twisting does not always eliminate the impact of noise, but it does significantly reduce it.
  • DECIBEL (db)

    To show that a signal has lost or gained strength, engineers use the concept of (db). The decibel (db) measures the relative strength of a signal at two different
  • DSL Line Qualification & Testing Parameters

    Noise Return loss Single-side Insertion loss Longitudinal balance Bit rate evaluation Crosstalk
  • EARTHING

    For earthing of cable to the earth bar the cabinet, use earth wire equipped with two earth clamps.Pass the included plastic guide under the aluminum screen of the cable.Pass the earth clamp onto the plastic guide and under the aluminum screen.Connect the other end of the earth wire, by connecting the earth clamp, to the earth bar in the cabinet.
  • Computer Accessories

    Computer with appropriate configuration.Windows 9x,XP,2000Network Adapter/ LAN Card

    UPSKILL TRAINING PROGRAM

    *

  • Connectors

    Connector typesR J - 11R J - 45

    UPSKILL TRAINING PROGRAM

    *

  • Cables

    Cable types STP & UTP Coaxial Ethernet Optical Fiber

    UPSKILL TRAINING PROGRAM

    *

  • Modem, Splitter & Rosette

    Modem is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information Splitter is a filter that that use to separate the voice and data. Rosette is a connector that use to connect the telephone wire with an output of RJ 11

    UPSKILL TRAINING PROGRAM

    *

  • Splitter

    MODEM

    MODEM

    SPLITTER

    UPSKILL TRAINING PROGRAM

    *

  • BROADBAND

    Next Generation Telecommunication Technology

    It can simultaneously accommodate voice, data & video, and other services (integrated Services)

    It contains High Data rates.

    UPSKILL TRAINING PROGRAM

    *

  • Applications

    Video, Voice Mail interactive

    Video Phone IP TV

    Video on Demand Data

    Video Conferencing

    UPSKILL TRAINING PROGRAM

    *

  • The Need For Broadband

    Changing user needs and demands

    competition in telecommunication Sector

    effective and better utilization of existing

    infrastructure

    Multimedia Applications, Video Telephony Imaging, low cost video conferencing and Computer-aided design

    Note: They all have very high bandwidth requirement.

    UPSKILL TRAINING PROGRAM

    *

  • DSL

    Stands for DIGITAL SUBSCRIBER LINE

    DSL is a technologies that provide digital data transmission over the wires of a local telephone network.

    It transmits data and voice simultaneously without any interruption in voice signals

    DSL connections are deployed in the "last mile" of a local telephone network of the local loop. The connection is setup between a pair of Modems on either side of copper wire extending between the customer premises equipment (CPE) and the DSL access multiplexer (DSLAM).

    A DSLAM is the device located at the central office (CO) of the provider and concentrates connections from multiple DSL subscribers.

    UPSKILL TRAINING PROGRAM

    *

  • DSL Variations

    UPSKILL TRAINING PROGRAM

    *

  • What is a DSL?

    DigitalSubscriberLineisamodern

    technology that enables broadband, digital data over twisted copper pairs, opening the most crucial bottleneck in the todays data stream.

  • The Demand for High Speed Access

    PCMarketcontinuesits tremendousgrowth

    Theinternetcontinuesits amazing growth

    The present information age has increased

    thedemandforbandwidth.

    ThetrendofTelecommutingisgetting

    populardaybyday.

    Even being encouraged bycompaniesto ease

    traffic andpollution.

  • Problem # 1 Bandwidth

    Residential users are demanding speeds

    thattheygetin work environment.

    Analog modem connections are limited to

    56kbps but typical connection speeds are evenlesser

    BasicRate ISDN is limited to 144kbps.

    7

  • 8

  • made problem worse since some users dontdisconnect.

    9

    Problem # 3 Switch Congestion

    Voice switched were sized to handle voice

    calls.

    Voicecalls are usually short (say5min.)

    Data calls are usually long (may be in

    hours)

    Flat charge pricing by some ISPs has

  • Problem # 1: Bandwidth blues

    xDSL can reach a speed up to

    52 Mbits/sec

    Problem # 2: Busy Signals

    xDSL MODEM is dedicated to each

    subscriber

    Problem # 3: Switch Congestion

    Data traffic is routed aroundthe voice switch

    Voice Switch

    10

    xDSL Solutions:

  • Types of DSL

    ADSL - Asymmetric Digital Subscriber Line (Most popular).

    ADSL Lite - A lower data rate version of Asymmetric Digital

    Subscriber Line.

    CDSL - Consumer Digital Subscriber Line.

    Either Loop - Ethernet Local Loop by Nortel.

    HDSL -High Bit-rate Digital Subscriber Line.

    IDSL - ISDN based DSL , Kbps.

    RADSL -Rate Adaptive Digital Subscriber Line.

    SDSL -Symmetric Digital Subscriber Line.

    VDSL -Very High Bit-rate Digital Subscriber Line.

  • DSLAM

    A Digital Subscriber Line Access Multiplexer is

    a mechanism at a phone company's central location thatlinksmanycustomer DSL connections toasingle high-speed ATM line.

    ADSLAMtakesconnectionsfrommany

    customers and aggregates them onto a single, high-capacity connection tothe internet.

    DSLAMs are generally flexible and able to

    supportmultiple typesofDSL ina single central office and different varieties of protocol and modulation

    The DSLAM may provide additional functions,

    includingroutingordynamicIPaddress assignment forthe customers

  • How Does xDSL Modems Work?

    xDSL modems take advantage of the spectrum above the telephone audio channel. While operating with somewhat less amplitude dynamic range they increase data rates by greatly increasing the frequency range of the communication signal (from about 10KHz to over 1.0MHz).

    To do this they require the installation of special equipment at the central office and customer premise

  • Problems

    Attenuation - The dissipation of the power

    of a transmitted signal as it travels over thecopperwire line. In-home wiringalso contributesto attenuation.

    Bridged taps Unterminated extensions of

    theloop thatcauseadditionallooploss

    Crosstalk - The interference between two

    wires in the same bundle, caused by the electricalenergycarried byeach.

  • ADSL

    ADSL derives its name from the fact that

    the data transfer rates downstream are muchfasterthan theupstream data rates.

    The downstream rate is often up to 10

    timesfasterthan theupstream rate.

    The data rate of ADSL is highlydependent

    upon the distance from the Central Office (CO)to theConsumerPremises(CPE).

    Atadistanceof9000ft.,8Mbps

    downstream can be achieved while at 18000 ft., only 1.544 Mbps downstream canbeachieved

  • ADSL

    Upstream speeds max out at 640 kbps and

    scale down similarly to the downstream speeds.

    Designedto coexistwith a regularphoneline,

    whichoperatesatfrequenciesupto 4kHz.

    In order not to interfere with POTS and to

    avoid interferencefromPOTS,ADSLoperates at frequencies above 4 kHz, (Upstream is in therangefrom30kHzto138kHz, downstream ranges from 138kHz, to ~1.1 MHz).

  • ADSL

    Separate frequency bands for voice and

    data allow the signals to be individually obtainedusingfilters.

    For ADSL these filters are combined into

    one central piece of equipment called a

    POTSsplitter.

    ThePOTSsplittertakesthesignals received from the service provider and separatesthem into twohomenetworks.

    One is the regular telephone network that

    is installed in most homes and the other network is the homecomputernetwork

  • 24

  • Advantages and Disadvantages of ADSL

    ADSL is well suited to residential applications. It

    uses lines that are already installed virtually everywhere and peacefully coexists with current phoneservice.

    ADSL is ideal for most home computing and

    small business applications because of the large downstream data capacity (upto 8Mbps).

    Analog modem users will also appreciate that

    ADSL (like most other flavors of xDSL) is always connected.

  • Advantages and Disadvantages of ADSL

    For large businesses upstream data rates are

    often just as important as downstream, which would make ADSLapoorchoice.

    ADSL data rates also suffer dramatically as line

    length increases. ADSL will extend out to 18,000 ft, but its ideal data rates only operate out to 9,000ft.

  • VDSL

    Data rates of 13, 26, or up to 52 Mbps are

    possible with VDSL!

    It will be offered in two varieties, one that is

    symmetriclike HDSLandanotherthatis asymmetric like ADSL.

    UltraHighSpeed dataaccesssuch asStreaming

    video possible.

    Requires fibre close to subscriber

  • VDSL -FDM

  • VDSL NETWORK

  • 31

  • ADSL2

    ADSL2 is not a single protocol buta familyof

    protocols developedovertime.

    Family members include:

    ADSL2

    ADSL2+

    BondedADSL2

  • Basic ADSL2

    Approvedin 2002byITU in G.992.3& G.992.4

    AlsoknownasADSL2AnnexA

    Differencefrom traditional ADSL

    Higher rate: 12Mbpsas compared to 8Mbps

    Improved initialization techniques

    Reduces NEXT and FEXT

    Reduced Power

    All Digital Mode

  • ADSL2 Spectrum

    Extend the DS

    (Downstream) bins to 3.75 MHz Widen the US (Upstream) from 138kHz to 276 kHz

  • ADSL2-Bonding

    Supports ATM Forum's inverse multiplexing

    overATM (IMA) standard.

    Through IMA, ADSL2 chipsets can bind two or

    more copper pairs in an ADSL link to get fiber-likedata rates overexisting copperlines

    32Mbpson4bonded pairs

    24Mbpson3bonded pairs

    16Mbpson2bonded pairs

  • ADSL2 All Digital Mode

    All digital mode (no POTS)

    About 256 kbps additional up stream data rate

    0-26 kHz used for digital transmission not voice

  • ADSL2 Low Power

    L0is ADSL2full power mode

    L2 is low power mode at the ATU-C (DSLAM)

    while idle will result in better power

    L3 is low power mode at the ATU-R (user) and

    ATU-C enables the modem to sleep when informationisnotbeingtransmitted(e.g. overnight) ittakes 3seconds to comeoutofL3 (sleep mode)

  • ADSL2+ upstream remains 1Mbps

    ADSL2+

    ITU standard G.992.5 in 2003

    Doubles the downstream frequency band from

    1.1Mhz in basic ADSL2, up to 2.2Mhz in ADSL2+

    Increases the downstream data rate on shorter

    phone lines, reaching 20Mbps on lines of max length of ~1.5km

  • as forADSL2

    ADSL2+

    Can beused to reduce cross talk

    use only tones between 1.1Mhz-2.2Mhz, it can

    mask all downstream frequencies below 1.1Mhz

    Useful when using ADSL2+ in the same binder

  • Broadband Setup

    Pakistans largest Broadband network is PTCL network. It has called PIE- (Pakistan Internet) and it connects every ISP and data network in Pakistan with outside world.

    DSLAMS are installed in major cities of Pakistan.

    OFAN (optical fiber network) with ONU (Optical Network Units) from where the customer will be connected through Copper lines (like your phone lines)

    UPSKILL TRAINING PROGRAM

    *

  • Broadband Pakistan

    Packages

    Connectivity

    Launched on June 11, 07 with Free Modem & Free Installation

    UPSKILL TRAINING PROGRAM

    *

  • Line Qualification Criteria

    Test ParametersRecommended ValuesCommentsAttenuation (Downstream/Upstream)Less than 45 dB< 30 dB is excellent30-40 dB is very good40-45 dB Little or no connectivity issues45-60 dB Connectivity issues progressively become worse> 60 dB will experience no synch or intermittent synch problemsSignal to Noise RatioGreater than 9dB 20 dB is excellentAttainable Downstream Line Rate256k/128k512k/128k1Mb/256kGreater than 384kGreater than 720kGreater than 1.2MLine qualified for a higher rate to leave room for variances in condition.Attainable Upstream Line Rate256k/128k512k/128k1Mb/256kGreater than 256kGreater than 256kGreater than 384MLine qualified for a higher rate to leave room for variances in condition.

    UPSKILL TRAINING PROGRAM

    *

  • The line conditions decide whether the Broadband service can be deployed successfully. Before deploying the Broadband service, you need to know the networking topology, test the line electrical attributes, and finally decide whether the line conditions are suitable for service deployment.

    UPSKILL TRAINING PROGRAM

    *

  • Line Conditioning Parameters

    Line Attenuation

    SNR

    Crosstalk

    Insulation Resistance(>5Mohm)

    UPSKILL TRAINING PROGRAM

    *

  • Page *

    DSLAM

    The DSLAM aggregates the digital data streams coming from a number of subscribers onto a single high-capacity uplink

    DSLAMs typically support multiple DSL transmission types, as well as different protocol and modulation technologies within the same DSL type.

    New generation of DSLAMs has appeared that used Ethernet uplinks for DSL traffic aggregation.

    UPSKILL TRAINING PROGRAM

    *

  • DSL MODEM

    DSL Modem, a broadband access device

    that enables high-speed data transmissions

    over the existing copper telephone wires (local loops)

    By using DSL technologies

    DSL Technology is the most cost effective option due to its ability to utilize millions of telephone lines installed worldwide for multi-megabit data access without extensive and expensive infrastructure upgrades.

    DSL network operators are using bandwidth, performance and reliability of their networks as well as value added services such as VoIP, IPTV, VoD and online games

    UPSKILL TRAINING PROGRAM

    *

  • After completion of this training the participants would be able to know:

    What is Protocol

    Defining Network & protocols

    What is Internet

    Internet Protocol

    TCP/IP protocols & its layers

    IP Address, logical address & physical address

    IP, Internet Protocol

  • A common language or set of communication

    rules for devices to exchange information/data etc

    To interconnect two or more devices / computers so that they can talk to each other or they can download data or video from any Location /network/device certain protocols are required Similarly, in order to transfer easily and safely/correctly some transmission rules /protocols are also required

    PROTOCOLS

  • any two computers/devices want to share information When a network want to exchange data with other network having more than two computers/devices A large no. of devices/computers or Networks can be connected among each other to exchange huge amount of information/data For all above situations some PROTOCOLS are must to communicate and transfer information

    When Protocols are needed?

  • The Internet or Network of networks refers to a worldwide set of interconnected networks We need to communicate when we connect different physical networks located at different places Communication services are provided by software and the user applications and it provides a common interface for these applications Such a set of interconnected networks is also called an inter-network or an Internet

    The Internet or Network of networks

  • The Internet Protocol is the set of communications protocols for exchanging data These include TCP-transmission Control Protocol and IP-Internet Protocol IP-deals with the real exchange of information among networks and TCP-deals with the transmission of these Information Thus forming TCP/IP protocols in all for all networks to communicate No matter what type of hardware, operating system or application program is running.

    The Internet Protocol

  • Numerical identification (logical address) that is assigned to devices for communication. Stored as binary numbers, they are usually displayed in human-readable notations such as 192.168.100.1

    < network number

  • Used two versions: IPV4(32-bit) and IPV6(128-bit) IP address consist of pair of numbers: Network number, Host number or simply net ID and host ID Similarly there is source IP address and destination IP address The destination or receiving host IP address (logical) is translated/mapped to physical address Physical address is also machine address IP Addresses

    To be continued

  • Different Address Classes or simply groups are used for different networks depending upon: Size of network ( number of hosts) These Classes are: Class A, Class B, Class C, Class D, Class E Small-to-medium sized Networks use Class B, since such kind of networks are usually designed.

    To be continued

  • Due to network growth, it becomes difficult to manage any changes in the network like: adding new hosts creating new network distance between networks is changed To avoid additional request for IPs, splitting an IP is used, it is called Subneting The host ID is splited further into anew network and new host number, the new network is called Subnetwork or subnet It becomes then:

    < network number

  • The IP addresses can be:

    Private OR Public

    A private IP address cannot be used on the public Internet, private IP address used within a single organization, reserved for private networks A public IP address is the address that can be assigned to any user trying connecting to Internet from any place, reserved for Internet.

    IP Addresses

  • DSLAM

    A Digital Subscriber Line Access Multiplexer is a mechanism at a phone company's central location that links many customer DSL connections to a single high-speed ATM line.A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the internet.DSLAMs are generally flexible and able to support multiple types of DSL in a single central office and different varieties of protocol and modulationThe DSLAM may provide additional functions, including routing or dynamic IP address assignment for the customers
  • The DSLAM aggregates the digital data streams coming from a number of subscribers onto a single high-capacity uplinkDSLAMs typically support multiple DSL transmission types, as well as different protocol and modulation technologies within the same DSL type.New generation of DSLAMs has appeared that used Ethernet uplinks for DSL traffic aggregation. These devices have become known as Ethernet DSLAMs or IP-DSLAMIP-DSLAMs function as Layer-2 switches that backhaul subscriber traffic to BRASsBy architecture centralized or driven by central processing unit typically embedded in the uplink module and distributed where some or all traffic processing is done on the line cards
  • ADSL2+ Jump Line in MDF Room

    IP network

    External line

    Red dashed means before jumping the lineBlue real line is the new Jumping Line cables

    MA5600

    Data signal

    NE

    backplane

    ADSL2+

    SCU

    PSTN

    Line

    PSTN

    ADSL2+ Modem

    Splitter

  • TCP/IP OVERVIEW

    TCP/IP was developed by DARPA (Defense American Research Progressive Agency) Provide communication b/w DOD (Dept of Defense) Network (ARPANET) based on TCP/IP Later ARPANET known as Internet Known as Internet Reference Model

    Host

    Internet

    TCP/IP

    Host

  • TCP/IP OVERVIEW

    Define a set of rules to communicate over e network

    TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, shipped, routed and delivered to the right destination

    Later TCP/IP used by a distributor of UNIX

    TCP/IP played an important Role

    Work well for both LAN and WAN

    To communicate across any arrangement of interconnected network.

  • TCP/IP OVERVIEW

    TCP/IP information is moved as a series of datagram

    At the receiving end datagram are reassembled into complete message.

    Host

    Internet

    TCP/IP

    Host

  • TCP/IP Protocol Stack

    Application

    Transport

    Internet

    Link Layer

    OSI Reference Model

    TCP/IP Conceptual Layers

    Application

    Network Interface & Hardware

    4

    3

    2

    1

    TCP/UDP

    IP

    ICMP

    ARP/RARP

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    Physical

    7

    6

    5

    4

    3

    2

    1

  • Application (Process-to-Process) Layer

    This is scope within which applications create user data and communication this data to the other process or application on another or same host.Data coded according to application layer protocols are encapsulated into one or more transport layer protocols, which in turn use lower layer protocol to affect actual data transfer.Application layer protocols are most often associated with client-server application and the commoner servers have specific ports assigned to them by IANA.
  • Application Layer Overview

    Application

    Transport

    Internet

    Network Interface

    File Transfer

    - TFTP

    - FTP

    - NFS

    E-Mail

    - SMTP

    Remote Login

    - Telnet

    - rlogin

    Network Management

    - SNMP

    Name Management

    - DNS

  • File Transfer (FTP, TFTP, NFS)

    File Transfer Protocols (FTP) performs basic interactive file transfers between hosts.

    Trivial File Transfer Protocol (TFTP) is a simplified version of FTP.

    Network File System (NFS) was developed by Sun Microsystems and is a widely used in remote file access across a network.

  • E-Mail (SMTP)

    Simple Mail Transfer Protocol (SMTP) support the exchange of e-mail.

    It can also be used to transfer files, but its use is usually limited to moderate size file containing ASCII.

  • Remote Login (Telnet, rlogin)

    Telnet is a remote login protocol that you can use to execute terminal session with remote hosts.

    Remote login (rlogin) is similar to Telnet, that is offered in most UNIX implementation.

  • Network Management (SNMP)

    Simple Network Management Protocol (SNMP) is used to gather management information from network devices.

    It also manages statistics, performance, configurations, collection, and security of network devices.

  • Name Management (DNS)

    Name management is provided by Domain Name Service (DNS).

    It maps IP addresses to the names assigned to network devices.

  • Transport Layer Overview

    Transport layers responsibility include end-to-end message transfer capabilities independent of underlying network, along with error control, fragmentation and flow control.

    We can think Transport layer as a transport mechanism e.g a vehicle whose responsibility is to make sure that its contents (goods/passengers) reach its destination safely and soundly, when a higher or lower layer is responsible for safe delivery.

  • Transport Layer Overview

    It allows you to segmentation and reassembled.

    It is a logical connection b/w endpoints of inter-network.

    It provides a reliability with sequence number (ISNs) and acknowledgement (ACKs).

  • Transport Layer Overview

    Transport Layer provides two protocols (TCP, UDP)

    Transmission Control

    Protocol (TCP)

    User Datagram

    Protocol (UDP)

    Application

    Transport

    Internet

    Network Interface

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a connection-oriented protocols that addresses numerous reliability issues to provide a byte stream.

    Reliable protocol b/w endpoint of inter-network.

    TCP provides segmentation and reassembled.

    Virtual circuit service is provided between end-user applications.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) responsible for

    Data arrives in order

    Data has minimal errors

    Duplicate data is discarded

    Lost/discarded packets are resent

    Include traffic congestion control

  • User Datagram Protocol (UDP)

    UDP like TCP is an end to end Protocol

    User Datagram Protocol (UDP) is connectionless and unreliable.

    There is no guarantee that data will arrive at all, or in the right order.

    UDP is faster protocol than TCP.

  • Comparison b/w TCP and UDP

    TCP and UDP are used to carry an assortment of higher level application. The appropriate transporty protocol is chosen based on the higher-layer protocol applications e.g FTP expect a reliable connection.
  • TCP Segment Format

    Source Portnumber of the calling port

    Destination Portnumber of the called port

    Sequence numbernumber used to ensure correct sequencing of the arriving data

    # Bits

    6

    16

    32

    4

    16

    6

    32

    Source

    Port

    Dest.

    Port

    Sequence

    Number

    Acknowledgement

    Number

    HLEN

    Reserved

    Code

    Bits

    16

    Window

    16

    Check-

    sum

    16

    Urgent

    0 or 32

    Option

    Data...

  • TCP Segment Format

    Acknowledgment numbernext expected TCP octet

    HLENnumber of 32-bit words in the header

    Reservedset to zero

    Code Bitscontrol functions (such as setup and termination of a session)

    Windownumber of octets that the sender is willing to accept.

    6

    4

    6

    32

    Acknowledgement

    Number

    HLEN

    Reserved

    Code

    Bits

    16

    Window

    16

    Check-

    sum

    16

    Urgent

    0 or 32

    Option

    Data...

  • TCP Segment Format

    Checksumcalculated checksum of the header

    Urgent Pointerpoints to the end of the urgent data

    Optionsone currently defined: maximum TCP segment size

    Data field can be varied size.

    16

    Check-

    sum

    16

    Urgent

    0 or 32

    Option

    Data...

  • Port Numbers

    TCP

    Port
    Numbers

    F
    T
    P

    Transport
    Layer

    T
    E
    L
    N
    E
    T

    D
    N
    S

    S
    N
    M
    P

    T
    F
    T
    P

    S
    M
    T
    P

    UDP

    Application
    Layer

    21

    23

    25

    53

    69

    161

  • Port Numbers/Socket No

    Keep track of conversation of data.

    Controlled by IANA.

    Port No have certain assigned ranges.

    < 1024 are assigned to well known ports.

    >= 1024 are dynamically assigned by host application.

    Destination can select correct application using port number.

  • TCP Port Numbers

    Source

    Port

    Dest.

    Port

    Host A

    Dest. port = 23.
    Send packet to my

    Telnet
    application.

    1028

    23

    SP

    DP

    Host Z

    Telnet Z

  • TCP Handshake/Open Connection

    Send SYN

    (seq=100 ctl=SYN)

    SYN received

    Host A

    Host B

    Hosts A initiates the connection by sending a packet with in an ISN with a value of 100 and a SYN bit indicating a connection request. It sends the SYN to check that host B is ready to establish a TCP connection.

    1

    UPSKILL TRAINING PROGRAM

    Both ends of the connection are synchronized with this sequence.

    By exchanging beginning sequence numbers, any lost data may be recovered.

  • TCP Handshake/Open Connection

    Send SYN

    (seq=100 ctl=SYN)

    SYN received

    Send SYN

    (seq=300 ack=101 ctl=syn,ack)

    Host A

    Host B

    SYN received

    When host B receive the SYN segment, it records As ISN as a value of 100. When host B is ready to start the TCP session, it sends an ACK segment host A's SYN. This ACK has a value of 101, which indicates that host B has received segment 100 and expects segments 101 next.Host B sends a SYN congaing its own ISN (300) to host A.

    1

    2

    UPSKILL TRAINING PROGRAM

    Both ends of the connection are synchronized with this sequence.

    By exchanging beginning sequence numbers, any lost data may be recovered.

  • TCP Handshake/Open Connection

    Send SYN

    (seq=100 ctl=SYN)

    SYN received

    Send SYN

    (seq=300 ack=101 ctl=syn,ack)

    Established

    (seq=101 ack=301 ctl=ack

    Data)

    Host A

    Host B

    SYN received

    Host A acknowledges host B's SYN with an ACK. This ACK has the value of 301, indicating host A has received segment 300 and expects segment 301 next.Data transfer can now begin.

    1

    2

    3

    UPSKILL TRAINING PROGRAM

    Both ends of the connection are synchronized with this sequence.

    By exchanging beginning sequence numbers, any lost data may be recovered.

  • Internet (Internetworking) Layer

    The internal layer has the task of exchanging datagram across the network boundaries. It is therefore also referred to as layer that establishes internetworking. It defines and establish the Internet. The primary protocol in this scope is the Inter Protocol (IP). Its function in routing is to transport datagram to the next IP router that has the connectivity to a network closer to the final data destination.

    To be continued...

  • The network layer protocol performs IP layer packets forwarding and routing, forwarding packets from their source to their destinations, based on their destination IP addresses. The IP protocol runs all the nodes on the TCP/IP network, including the hosts and the forwarding equipment of IP packets on the network. The IP protocols supports connectionless transmission , which can neither avoid loss of packets nor ensure the sequence that the packets arrive. This makes the packets forwarding equipment not need to save any status about data streams, which greatly enhance the efficiency of packets forwarding.

    To be continued...

  • IP (Internet Protocol): Provides the transport layer with network service. ICMP (Internet Control Message Protocol): Reports error and other cases that deserve attention. ARP (Address Resolution Protocol): Translates IP addresses into physical addresses. RARP (Reverse Address Resolution Protocol): Translates physical addresses into IP network addresses.
  • Link (Network Interface & Hardware) Layer

    This layer covers the physical media layer network technology. It supports nearly every data link topology, e.g. Ethernet, Token Ring, Frame relay, ATM. It also defines the Information frame formats for various physical media connections. The Link Layer is used to move packets between the Internet Layer interfaces of two different hosts on the same link. these will performs data link functions such as adding a packets header to prepare it for transmission, then actually transmit the frame over a physical medium.

    To be continued...

  • The TCP/IP model includes specifications of translating the network addressing methods used in the Internet Protocol to data link addressing such as MAC (Media Access Control) The Link Layer can also be the layer where packets are intercepted to be sent over a virtual private network or other network tunnel.
  • The World is Integrating

  • Triple play
    Marketing Plan
    For PTCL

    UPSKILL TRAINING PROGRAM

    *

  • What the customer wants

    71% of consumers would prefer a single bill for all of their communication services37% said they would switch to a telco for TV services71% of consumers want cable TV as part of their bundle

    UPSKILL TRAINING PROGRAM

    *

  • Why offer Triple play?

    Increases per customer revenueKeeps the customer loyalTV services are stickyResulting in overall revenue growthEnables service offering growthInternet on TV, Gaming, Video on demand etc.40% of premium TV customers take VoDPlaces the provider as the gateway to all the Concentric Diversification of communication business into convergence.

    UPSKILL TRAINING PROGRAM

    *

  • Market Summary

    Estimated number of TV homes-8 millionEstimated number of existing CATV customer- Karachi 929,000 Lahore 479,000 Islamabad 142,000.All these customers are more or less with traditional cable operators.

    UPSKILL TRAINING PROGRAM

    *

  • UPSKILL TRAINING PROGRAM

    *

  • Product Features

    Cable TV and Multimedia bi-directional service.Cable TV Channel 95 High speed internet.VPN

    UPSKILL TRAINING PROGRAM

    *

  • Optional services

    IP telephonyVideo conferencingInteractive video gamesHard disc sharingVOD (video on demand)Pay per view

    UPSKILL TRAINING PROGRAM

    *

  • EXAMPLES TO IPTV

    Following are example of IPTV

    Video on Demand.

    Broadcast Television.

    Competitive TV services over managed IP networks with two way connection.

  • EXAMPLES TO IPTV

    IPTV is distinctly different from Internet Video that simply allows users to watch videos, like movie previews and web-cams.

    Following are not IPTV

    Video streaming over internet

    Watching TV on your PC (Personal Computer)

    Unproven Business models for media and TV services

  • NEW SERVICES EMERGING

  • 12410

    12410

    Rawalpindi, Satellite Town

    Islamabad, IBA-1 Exchange

    BRAS

    BRAS

    SDH

    DSLAM

    3.After authentication ,AAA return different IP Pool to BRAS

    4.BRAS assign IP address from IP pool

    1.Distinguish different application by Domain name

    2.PPPoE stream

    BTV and VOD

    WEB

    NETWORK CONFIGURATION OF IPTV IN PAKISTAN

    Legend:

    GCigabit Ethernet Link

    STM4 POS Link

    E3 Link

    Fast Ethernet Link

    STM1 POS Link

    Dark Fiber

    Gigabit FIBER Link

    STB

    CPE/HGW

    PC

    pots

    AAA

  • Equipment Needed for Implementing TV/IP Solution

    Headend Equipments/Technology

    IPTV Headend infrastructure is very similar to Digital TV Headend. It composed of MPEG Encoder, Streamer, CAS Headend, VoD (Video on Demand) Server, EMS, EPG Server and so on.

    TV Headend provides MPEG2 or MPEG4 Live TV contents to STB. IPTV Headend receives, decode and decrypts video, audio and data content from a variety of sources, such as satellites, terrestrial, studio and storage media and convert it through compression techniques into IP multicast encapsulated MPEG streams.

    Encoder, the core part of Headend, implements real-time encoding and transcoding of MPEG2 and MPEG4 through the hardware or software component based on business model.

    UPSKILL TRAINING PROGRAM

    *

  • Streaming Server

    Optibases MGW 5100 streaming platform resides at the head-end. MGW 5100 transmits the streams to the switch or router which transfers them over the backbone to the central/remote offices, and from there to the end user location.

    An additional MGW 5100 server can reside at the central office where it receives local live feeds for transmission to targeted areas.

    Video Server

    Video servers fulfill several purposes at head-ends. For store and forward transmissions, they store digitally encoded content and stream it through level III devices via operators networking infrastructure.

    They receive newly encoded digital content that is uploaded from the MGW 5100 server.

    They also enable time-shifted TV applications. For this purpose, MGW 5100 encodes all channels on a daily basis uploading them to the video server. Viewers at home can then watch any program at a time convenient to them.

    UPSKILL TRAINING PROGRAM

    *

  • Level III Device

    Switch or router that supports multicast transmission. The router or switch resides at the head-end, interfacing with the network. Another router or switch receives data at the central office and transmits either to DSLAMS located there, or into end-user Ethernet based network .

    DSLAM

    The DSLAM (Digital Subscriber Line Access Multiplexer) resides at the central office, connecting xDSL subscribers to the backbone and subsequently to the head-end.

    When distributing TV over IP, the DSLAM should support multicast transmission. If it doesnt, the switch or router at the central office has to replicate each channel for each request.

    This can cause congestion at the DSLAM input level. If the DSLAM supports multicast, it receives one stream for each channel and replicates the stream for each end point.

    UPSKILL TRAINING PROGRAM

    *

  • CPE (Customer Premises Equipment)

    The equipment located at the end-point that receives the TV/IP stream. Usually the term CPE refers to the DSL modem. The DSL Modem receives the stream from the DSLAM or level III device and transfers it directly to the PC for display on the desktop or to the IP STB.

    IP Set-Top-Box

    The IP STB receives the IP stream, and decodes the stream for display on the TV. Typically, the IP STB receives the stream from the CPE. Some STBs can receive the IP stream directly from the DSLAM, and serve as CPE as well.

    UPSKILL TRAINING PROGRAM

    *

  • CPE SOLUTION

    DSLAM

    IP network

    ISP

    DHCP Server(1,2,

    )

    NGN

    Video

    CPE

    ISP/ASP

    TV

    STB

    HG510

    PHONE

    PC(FE/USB)

    Home network

    internet

    Multicast

    Router

    GE

    PPPoE

    IAD DHCP

    PPPoE

    NSP

    BRAS

    Router

    Notepad(WLAN)

  • End-point Configuration

    The TV/IP stream is fed into the CPE (Customer Premises Equipment), in most cases a modem. The modem transfers the MPEG-2 or MPEG-4 stream to an IP/STB which decodes the stream for display on a TV set. MPEG-4 streams can also be displayed on PCs using the Microsoft Media Player. If there is sufficient bandwidth between the central office and the end-point, two channels can be streamed to two IP STBs.

    Modems

    Modems are also a critical piece of the last mile. Each modem must interoperate with the DSLAM to ensure maximum performance over the copper plant. It is highly recommended that providers purchase a modem that is certified by the DSLAM manufacturer not only for Internet data access, but also for the passage of video. Modems should have multiple Ethernet ports to facilitate multiple STBs or PCs within the home. A switch in this device is preferable to a hub; the switch insulates video traffic within the home from other traffic generated on the network and in the home.

    UPSKILL TRAINING PROGRAM

    *

  • Middleware

    Middleware refers to the software that integrates the various parts of the IP over TV solution.

    Currently, Optibase maintains strategic partnerships with iMagicTV and Myrio, two of the leading streaming middleware providers.

    Middleware is installed along the streaming media chain, starting at the Head-end and reaching into consumers homes in the form of software running on IP set-top-boxes.

  • Middleware takes care of the following:

    Media Asset Management

    The software that enables rich media service providers to manage content, distribution and data rights control. Media asset management includes channel management and scheduling. Media asset management solutions also let operators customize programming line-ups and update viewing rates. At the end-point, media asset management solutions let consumers create customized viewing profiles, track viewing habits and account information and implement parental controls.

    Billing

    The entire business model of rich media and digital TV services rests on advanced billing capabilities. Billing solutions need to be able to track individual usage based on the delivery of customized interactive content. Billing solutions integrate with other middleware solutions.

    Programming

    The management software controls the customized programming that is targeted at a specific user or group of users. Usually the program guide is downloaded and updated on a regular basis.

  • IPTV Standards

    IPTV solutions are based on a combination of standard and proprietary technologies. There is no existing standard which cover all IPTV needs but there are multiple standards which could fulfill certain requirement of IPTV. MPEG : MPEG standards can be used for Content Encoding, Streaming and delivering. MPEG-21. DSL-Form : For remote management protocol TR-069 and for Qos TR-098 can be used. CEA (Consumer Electronic Association) and DLNA (Digital Living Networks Alliance): defines some standards for home equipments. And DVB standards are used for delivering the contents.

    There are other standardization bodies which are doing efforts for IPTV like, The IPTV Interoperability Forum/ Alliance for Telecommunications Industry Solutions (IIF/ATIS). ITU-T IPTV Focus Group formed Apr 13th, 2006 to coordinate the IPTV global standardization efforts. Strong push from Korea with Telecommunications Technology Association (TTA), China with Communication Standards Association (CCSA), and Japan with Association of Radio Industries and Businesses (ARIB).

  • Security and Conditional Access

    Security is a critical part of the streaming solution when it comes to conditional access (ensuring that content is viewed by the audience it was intended for only) and protection against piracy. Conditional access solutions use algorithms to encrypt and scramble content. Content is encrypted at the head-end and decoded by smart cards installed in set-top-boxes at end-points.

    UPSKILL TRAINING PROGRAM

    *

  • THANK YOU

    Global Broadband Video Subscriber

    Market Development

    0

    5

    10

    15

    20032004200520062007

    Subs (M)

    Broadband Video

    Subscribers