access network
DESCRIPTION
Access NetworkTRANSCRIPT
-
ACCESS NETWORK
By
Mr. Muhammad Usman Senior Instructor
Mr. Zahid Hussain Senior Instructor
Mr. Tallat Siddique Senior Instructor
UPSKILL TRAINING PROGRAM
- WHAT IS TELECOMMUNICATIONS.
To be able to communicate at long distance through electrical or optical signals.
OR
A long distance communication via integration of information sharing networks all tied together.
TELECOMMUNICATION NET WORK.A set of nodes and links that provides connections b/w two or more defined points to carry out exchange of information b/w them
UPSKILL TRAINING PROGRAM
*
-
Access Network
LE
END USER
EX
EX
AN is called the last mile of Telecom Network
Access Network
UPSKILL TRAINING PROGRAM
*
telecom network is consist of exchange network ,transmission network and access network,access network located the end of telecom network.as an end users oriented network ,access network is connected to the end users directly , access kind of services . so access network is called "the last mile of telecom network".
1.unknown3.unknown4.unknown5.unknown -
LE
Central office
user
Limitation of Traditional Access Mode
Connection
Cabinet
Distribution
Box
3~5km
500m~1km
10~300m
Feeder layer
Distribution layer
Drop layer
Small coverage Limited bandwidth Maintenance complexity Reliability cut down Enormous investmentTraditional access mode has become the bottleneck
of modern telecom network!
Copper Cables Based
UPSKILL TRAINING PROGRAM
*
6.unknown -
How to Overcome the bottleneck
Advantages:
Wide Coverage
Broad Bandwidth
Easy Maintenance
High Reliability
Low Investment
Optical Integrated Services
Access Network
?
!
UPSKILL TRAINING PROGRAM
*
-
TERMINOLOGIES
BANDWIDTH:Range of frequenceies that any media(copper,optical fiber,Air Interface) that it can transmit from source to destination for communication.
MODEM:(Modulation Demodulation
Conversion of Analog signal to digital signal and vice versa.
UPSKILL TRAINING PROGRAM
*
-
Few Key Concepts
ElectricalSignalCharacteristics
Bandwidth
Speedoftransfer
Networks are to be designed to handle the
customersrequirements
-
Telecommunication Networks
A telecommunication network provides
telecommunication services to the customers
-
The Internet
A networks of networks or ISPs
Architecture involves
Home/Office (User) PCusing web, mail etc
User PC Comm. eqpt e.g Modem, Ethernet
card etc
Local Loop carrier, may be POTS provider,
wireless operator, Power line carrier
ISPsetup
ISPbackbone
Online Contentitself
-
Access Network
Consists the large part of the network
Connects the end-user with the end-points
of the core network
Uses different technologies
Different Access services possible
-
Media Types
OpenWirePairs
TwistedPair Wires
CoaxialCable
OpticalFiber
Wireless
-
DSL
Stands for DIGITAL SUBSCRIBER LINE
DSL is a technologies that provide digital data transmission over the wires of a local telephone network.
It transmits data and voice simultaneously without any interruption in voice signals
A DSLAM is the device located at the central office (CO) of the provider and concentrates connections from multiple DSL subscribers.
UPSKILL TRAINING PROGRAM
*
-
BANDWIDTH
The difference between the highest and the lowest frequencies of a composite signal. It also measure the information carrying capacity of a line or a network. the highest frequency that can be transmitted in analog operation. The information carrying capacity of a digital system. -
SIGNAL TO NOISE RATIO
The ratio of signal to noise , an indication of signal quality in analog system.
(SNR) -
TWISTED PAIR
A twisted pair consists of two conductors each surrounded by an insulating material.
Twisted pair cable comes in two forms.
Unshielded twisted pair (UTP).
Shielded twisted pair (STP).
-
CROSSTALK
The noise on a line caused by signals traveling along another line.Electromagnetic interference from one pair can create a noise over others pairs. For the solution of this problem, the wire pairs are twisted around each other at regular intervals (between 2 and 12 twist per foot). -
CROSSTALK
twisting does not always eliminate the impact of noise, but it does significantly reduce it. -
DECIBEL (db)
To show that a signal has lost or gained strength, engineers use the concept of (db). The decibel (db) measures the relative strength of a signal at two different -
DSL Line Qualification & Testing Parameters
Noise Return loss Single-side Insertion loss Longitudinal balance Bit rate evaluation Crosstalk -
EARTHING
For earthing of cable to the earth bar the cabinet, use earth wire equipped with two earth clamps.Pass the included plastic guide under the aluminum screen of the cable.Pass the earth clamp onto the plastic guide and under the aluminum screen.Connect the other end of the earth wire, by connecting the earth clamp, to the earth bar in the cabinet. -
Computer Accessories
Computer with appropriate configuration.Windows 9x,XP,2000Network Adapter/ LAN CardUPSKILL TRAINING PROGRAM
*
-
Connectors
Connector typesR J - 11R J - 45UPSKILL TRAINING PROGRAM
*
-
Cables
Cable types STP & UTP Coaxial Ethernet Optical FiberUPSKILL TRAINING PROGRAM
*
-
Modem, Splitter & Rosette
Modem is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information Splitter is a filter that that use to separate the voice and data. Rosette is a connector that use to connect the telephone wire with an output of RJ 11UPSKILL TRAINING PROGRAM
*
-
Splitter
MODEM
MODEM
SPLITTER
UPSKILL TRAINING PROGRAM
*
-
BROADBAND
Next Generation Telecommunication Technology
It can simultaneously accommodate voice, data & video, and other services (integrated Services)
It contains High Data rates.
UPSKILL TRAINING PROGRAM
*
-
Applications
Video, Voice Mail interactive
Video Phone IP TV
Video on Demand Data
Video Conferencing
UPSKILL TRAINING PROGRAM
*
-
The Need For Broadband
Changing user needs and demands
competition in telecommunication Sector
effective and better utilization of existing
infrastructure
Multimedia Applications, Video Telephony Imaging, low cost video conferencing and Computer-aided design
Note: They all have very high bandwidth requirement.
UPSKILL TRAINING PROGRAM
*
-
DSL
Stands for DIGITAL SUBSCRIBER LINE
DSL is a technologies that provide digital data transmission over the wires of a local telephone network.
It transmits data and voice simultaneously without any interruption in voice signals
DSL connections are deployed in the "last mile" of a local telephone network of the local loop. The connection is setup between a pair of Modems on either side of copper wire extending between the customer premises equipment (CPE) and the DSL access multiplexer (DSLAM).
A DSLAM is the device located at the central office (CO) of the provider and concentrates connections from multiple DSL subscribers.
UPSKILL TRAINING PROGRAM
*
-
DSL Variations
UPSKILL TRAINING PROGRAM
*
-
What is a DSL?
DigitalSubscriberLineisamodern
technology that enables broadband, digital data over twisted copper pairs, opening the most crucial bottleneck in the todays data stream.
-
The Demand for High Speed Access
PCMarketcontinuesits tremendousgrowth
Theinternetcontinuesits amazing growth
The present information age has increased
thedemandforbandwidth.
ThetrendofTelecommutingisgetting
populardaybyday.
Even being encouraged bycompaniesto ease
traffic andpollution.
-
Problem # 1 Bandwidth
Residential users are demanding speeds
thattheygetin work environment.
Analog modem connections are limited to
56kbps but typical connection speeds are evenlesser
BasicRate ISDN is limited to 144kbps.
7
-
8
-
made problem worse since some users dontdisconnect.
9
Problem # 3 Switch Congestion
Voice switched were sized to handle voice
calls.
Voicecalls are usually short (say5min.)
Data calls are usually long (may be in
hours)
Flat charge pricing by some ISPs has
-
Problem # 1: Bandwidth blues
xDSL can reach a speed up to
52 Mbits/sec
Problem # 2: Busy Signals
xDSL MODEM is dedicated to each
subscriber
Problem # 3: Switch Congestion
Data traffic is routed aroundthe voice switch
Voice Switch
10
xDSL Solutions:
-
Types of DSL
ADSL - Asymmetric Digital Subscriber Line (Most popular).
ADSL Lite - A lower data rate version of Asymmetric Digital
Subscriber Line.
CDSL - Consumer Digital Subscriber Line.
Either Loop - Ethernet Local Loop by Nortel.
HDSL -High Bit-rate Digital Subscriber Line.
IDSL - ISDN based DSL , Kbps.
RADSL -Rate Adaptive Digital Subscriber Line.
SDSL -Symmetric Digital Subscriber Line.
VDSL -Very High Bit-rate Digital Subscriber Line.
-
DSLAM
A Digital Subscriber Line Access Multiplexer is
a mechanism at a phone company's central location thatlinksmanycustomer DSL connections toasingle high-speed ATM line.
ADSLAMtakesconnectionsfrommany
customers and aggregates them onto a single, high-capacity connection tothe internet.
DSLAMs are generally flexible and able to
supportmultiple typesofDSL ina single central office and different varieties of protocol and modulation
The DSLAM may provide additional functions,
includingroutingordynamicIPaddress assignment forthe customers
-
How Does xDSL Modems Work?
xDSL modems take advantage of the spectrum above the telephone audio channel. While operating with somewhat less amplitude dynamic range they increase data rates by greatly increasing the frequency range of the communication signal (from about 10KHz to over 1.0MHz).
To do this they require the installation of special equipment at the central office and customer premise
-
Problems
Attenuation - The dissipation of the power
of a transmitted signal as it travels over thecopperwire line. In-home wiringalso contributesto attenuation.
Bridged taps Unterminated extensions of
theloop thatcauseadditionallooploss
Crosstalk - The interference between two
wires in the same bundle, caused by the electricalenergycarried byeach.
-
ADSL
ADSL derives its name from the fact that
the data transfer rates downstream are muchfasterthan theupstream data rates.
The downstream rate is often up to 10
timesfasterthan theupstream rate.
The data rate of ADSL is highlydependent
upon the distance from the Central Office (CO)to theConsumerPremises(CPE).
Atadistanceof9000ft.,8Mbps
downstream can be achieved while at 18000 ft., only 1.544 Mbps downstream canbeachieved
-
ADSL
Upstream speeds max out at 640 kbps and
scale down similarly to the downstream speeds.
Designedto coexistwith a regularphoneline,
whichoperatesatfrequenciesupto 4kHz.
In order not to interfere with POTS and to
avoid interferencefromPOTS,ADSLoperates at frequencies above 4 kHz, (Upstream is in therangefrom30kHzto138kHz, downstream ranges from 138kHz, to ~1.1 MHz).
-
ADSL
Separate frequency bands for voice and
data allow the signals to be individually obtainedusingfilters.
For ADSL these filters are combined into
one central piece of equipment called a
POTSsplitter.
ThePOTSsplittertakesthesignals received from the service provider and separatesthem into twohomenetworks.
One is the regular telephone network that
is installed in most homes and the other network is the homecomputernetwork
-
24
-
Advantages and Disadvantages of ADSL
ADSL is well suited to residential applications. It
uses lines that are already installed virtually everywhere and peacefully coexists with current phoneservice.
ADSL is ideal for most home computing and
small business applications because of the large downstream data capacity (upto 8Mbps).
Analog modem users will also appreciate that
ADSL (like most other flavors of xDSL) is always connected.
-
Advantages and Disadvantages of ADSL
For large businesses upstream data rates are
often just as important as downstream, which would make ADSLapoorchoice.
ADSL data rates also suffer dramatically as line
length increases. ADSL will extend out to 18,000 ft, but its ideal data rates only operate out to 9,000ft.
-
VDSL
Data rates of 13, 26, or up to 52 Mbps are
possible with VDSL!
It will be offered in two varieties, one that is
symmetriclike HDSLandanotherthatis asymmetric like ADSL.
UltraHighSpeed dataaccesssuch asStreaming
video possible.
Requires fibre close to subscriber
-
VDSL -FDM
-
VDSL NETWORK
-
31
-
ADSL2
ADSL2 is not a single protocol buta familyof
protocols developedovertime.
Family members include:
ADSL2
ADSL2+
BondedADSL2
-
Basic ADSL2
Approvedin 2002byITU in G.992.3& G.992.4
AlsoknownasADSL2AnnexA
Differencefrom traditional ADSL
Higher rate: 12Mbpsas compared to 8Mbps
Improved initialization techniques
Reduces NEXT and FEXT
Reduced Power
All Digital Mode
-
ADSL2 Spectrum
Extend the DS
(Downstream) bins to 3.75 MHz Widen the US (Upstream) from 138kHz to 276 kHz
-
ADSL2-Bonding
Supports ATM Forum's inverse multiplexing
overATM (IMA) standard.
Through IMA, ADSL2 chipsets can bind two or
more copper pairs in an ADSL link to get fiber-likedata rates overexisting copperlines
32Mbpson4bonded pairs
24Mbpson3bonded pairs
16Mbpson2bonded pairs
-
ADSL2 All Digital Mode
All digital mode (no POTS)
About 256 kbps additional up stream data rate
0-26 kHz used for digital transmission not voice
-
ADSL2 Low Power
L0is ADSL2full power mode
L2 is low power mode at the ATU-C (DSLAM)
while idle will result in better power
L3 is low power mode at the ATU-R (user) and
ATU-C enables the modem to sleep when informationisnotbeingtransmitted(e.g. overnight) ittakes 3seconds to comeoutofL3 (sleep mode)
-
ADSL2+ upstream remains 1Mbps
ADSL2+
ITU standard G.992.5 in 2003
Doubles the downstream frequency band from
1.1Mhz in basic ADSL2, up to 2.2Mhz in ADSL2+
Increases the downstream data rate on shorter
phone lines, reaching 20Mbps on lines of max length of ~1.5km
-
as forADSL2
ADSL2+
Can beused to reduce cross talk
use only tones between 1.1Mhz-2.2Mhz, it can
mask all downstream frequencies below 1.1Mhz
Useful when using ADSL2+ in the same binder
-
Broadband Setup
Pakistans largest Broadband network is PTCL network. It has called PIE- (Pakistan Internet) and it connects every ISP and data network in Pakistan with outside world.
DSLAMS are installed in major cities of Pakistan.
OFAN (optical fiber network) with ONU (Optical Network Units) from where the customer will be connected through Copper lines (like your phone lines)
UPSKILL TRAINING PROGRAM
*
-
Broadband Pakistan
Packages
Connectivity
Launched on June 11, 07 with Free Modem & Free Installation
UPSKILL TRAINING PROGRAM
*
-
Line Qualification Criteria
Test ParametersRecommended ValuesCommentsAttenuation (Downstream/Upstream)Less than 45 dB< 30 dB is excellent30-40 dB is very good40-45 dB Little or no connectivity issues45-60 dB Connectivity issues progressively become worse> 60 dB will experience no synch or intermittent synch problemsSignal to Noise RatioGreater than 9dB 20 dB is excellentAttainable Downstream Line Rate256k/128k512k/128k1Mb/256kGreater than 384kGreater than 720kGreater than 1.2MLine qualified for a higher rate to leave room for variances in condition.Attainable Upstream Line Rate256k/128k512k/128k1Mb/256kGreater than 256kGreater than 256kGreater than 384MLine qualified for a higher rate to leave room for variances in condition.UPSKILL TRAINING PROGRAM
*
-
The line conditions decide whether the Broadband service can be deployed successfully. Before deploying the Broadband service, you need to know the networking topology, test the line electrical attributes, and finally decide whether the line conditions are suitable for service deployment.
UPSKILL TRAINING PROGRAM
*
-
Line Conditioning Parameters
Line Attenuation
SNR
Crosstalk
Insulation Resistance(>5Mohm)
UPSKILL TRAINING PROGRAM
*
-
Page *
DSLAM
The DSLAM aggregates the digital data streams coming from a number of subscribers onto a single high-capacity uplink
DSLAMs typically support multiple DSL transmission types, as well as different protocol and modulation technologies within the same DSL type.
New generation of DSLAMs has appeared that used Ethernet uplinks for DSL traffic aggregation.
UPSKILL TRAINING PROGRAM
*
-
DSL MODEM
DSL Modem, a broadband access device
that enables high-speed data transmissions
over the existing copper telephone wires (local loops)
By using DSL technologies
DSL Technology is the most cost effective option due to its ability to utilize millions of telephone lines installed worldwide for multi-megabit data access without extensive and expensive infrastructure upgrades.
DSL network operators are using bandwidth, performance and reliability of their networks as well as value added services such as VoIP, IPTV, VoD and online games
UPSKILL TRAINING PROGRAM
*
-
After completion of this training the participants would be able to know:
What is Protocol
Defining Network & protocols
What is Internet
Internet Protocol
TCP/IP protocols & its layers
IP Address, logical address & physical address
IP, Internet Protocol
- A common language or set of communication
rules for devices to exchange information/data etc
To interconnect two or more devices / computers so that they can talk to each other or they can download data or video from any Location /network/device certain protocols are required Similarly, in order to transfer easily and safely/correctly some transmission rules /protocols are also requiredPROTOCOLS
- any two computers/devices want to share information When a
network want to exchange data with other network having more than
two computers/devices A large no. of devices/computers or Networks
can be connected among each other to exchange huge amount of
information/data For all above situations some PROTOCOLS are must
to communicate and transfer information
When Protocols are needed?
- The Internet or Network of networks refers to a worldwide set
of interconnected networks We need to communicate when we connect
different physical networks located at different places
Communication services are provided by software and the user
applications and it provides a common interface for these
applications Such a set of interconnected networks is also called
an inter-network or an Internet
The Internet or Network of networks
- The Internet Protocol is the set of communications protocols
for exchanging data These include TCP-transmission Control Protocol
and IP-Internet Protocol IP-deals with the real exchange of
information among networks and TCP-deals with the transmission of
these Information Thus forming TCP/IP protocols in all for all
networks to communicate No matter what type of hardware, operating
system or application program is running.
The Internet Protocol
- Numerical identification (logical address) that is assigned to
devices for communication. Stored as binary numbers, they are
usually displayed in human-readable notations such as 192.168.100.1
< network number
- Used two versions: IPV4(32-bit) and IPV6(128-bit) IP address
consist of pair of numbers: Network number, Host number or simply
net ID and host ID Similarly there is source IP address and
destination IP address The destination or receiving host IP address
(logical) is translated/mapped to physical address Physical address
is also machine address IP Addresses
To be continued
- Different Address Classes or simply groups are used for
different networks depending upon: Size of network ( number of
hosts) These Classes are: Class A, Class B, Class C, Class D, Class
E Small-to-medium sized Networks use Class B, since such kind of
networks are usually designed.
To be continued
- Due to network growth, it becomes difficult to manage any
changes in the network like: adding new hosts creating new network
distance between networks is changed To avoid additional request
for IPs, splitting an IP is used, it is called Subneting The host
ID is splited further into anew network and new host number, the
new network is called Subnetwork or subnet It becomes then:
< network number
- The IP addresses can be:
Private OR Public
A private IP address cannot be used on the public Internet, private IP address used within a single organization, reserved for private networks A public IP address is the address that can be assigned to any user trying connecting to Internet from any place, reserved for Internet.IP Addresses
-
DSLAM
A Digital Subscriber Line Access Multiplexer is a mechanism at a phone company's central location that links many customer DSL connections to a single high-speed ATM line.A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the internet.DSLAMs are generally flexible and able to support multiple types of DSL in a single central office and different varieties of protocol and modulationThe DSLAM may provide additional functions, including routing or dynamic IP address assignment for the customers - The DSLAM aggregates the digital data streams coming from a number of subscribers onto a single high-capacity uplinkDSLAMs typically support multiple DSL transmission types, as well as different protocol and modulation technologies within the same DSL type.New generation of DSLAMs has appeared that used Ethernet uplinks for DSL traffic aggregation. These devices have become known as Ethernet DSLAMs or IP-DSLAMIP-DSLAMs function as Layer-2 switches that backhaul subscriber traffic to BRASsBy architecture centralized or driven by central processing unit typically embedded in the uplink module and distributed where some or all traffic processing is done on the line cards
-
ADSL2+ Jump Line in MDF Room
IP network
External line
Red dashed means before jumping the lineBlue real line is the new Jumping Line cablesMA5600
Data signal
NE
backplane
ADSL2+
SCU
PSTN
Line
PSTN
ADSL2+ Modem
Splitter
-
TCP/IP OVERVIEW
TCP/IP was developed by DARPA (Defense American Research Progressive Agency) Provide communication b/w DOD (Dept of Defense) Network (ARPANET) based on TCP/IP Later ARPANET known as Internet Known as Internet Reference ModelHost
Internet
TCP/IP
Host
-
TCP/IP OVERVIEW
Define a set of rules to communicate over e network
TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, shipped, routed and delivered to the right destination
Later TCP/IP used by a distributor of UNIX
TCP/IP played an important Role
Work well for both LAN and WAN
To communicate across any arrangement of interconnected network.
-
TCP/IP OVERVIEW
TCP/IP information is moved as a series of datagram
At the receiving end datagram are reassembled into complete message.
Host
Internet
TCP/IP
Host
-
TCP/IP Protocol Stack
Application
Transport
Internet
Link Layer
OSI Reference Model
TCP/IP Conceptual Layers
Application
Network Interface & Hardware
4
3
2
1
TCP/UDP
IP
ICMP
ARP/RARP
Application
Presentation
Session
Transport
Network
Data Link
Physical
7
6
5
4
3
2
1
-
Application (Process-to-Process) Layer
This is scope within which applications create user data and communication this data to the other process or application on another or same host.Data coded according to application layer protocols are encapsulated into one or more transport layer protocols, which in turn use lower layer protocol to affect actual data transfer.Application layer protocols are most often associated with client-server application and the commoner servers have specific ports assigned to them by IANA. -
Application Layer Overview
Application
Transport
Internet
Network Interface
File Transfer
- TFTP
- FTP
- NFS
E-Mail
- SMTP
Remote Login
- Telnet
- rlogin
Network Management
- SNMP
Name Management
- DNS
-
File Transfer (FTP, TFTP, NFS)
File Transfer Protocols (FTP) performs basic interactive file transfers between hosts.
Trivial File Transfer Protocol (TFTP) is a simplified version of FTP.
Network File System (NFS) was developed by Sun Microsystems and is a widely used in remote file access across a network.
-
E-Mail (SMTP)
Simple Mail Transfer Protocol (SMTP) support the exchange of e-mail.
It can also be used to transfer files, but its use is usually limited to moderate size file containing ASCII.
-
Remote Login (Telnet, rlogin)
Telnet is a remote login protocol that you can use to execute terminal session with remote hosts.
Remote login (rlogin) is similar to Telnet, that is offered in most UNIX implementation.
-
Network Management (SNMP)
Simple Network Management Protocol (SNMP) is used to gather management information from network devices.
It also manages statistics, performance, configurations, collection, and security of network devices.
-
Name Management (DNS)
Name management is provided by Domain Name Service (DNS).
It maps IP addresses to the names assigned to network devices.
-
Transport Layer Overview
Transport layers responsibility include end-to-end message transfer capabilities independent of underlying network, along with error control, fragmentation and flow control.
We can think Transport layer as a transport mechanism e.g a vehicle whose responsibility is to make sure that its contents (goods/passengers) reach its destination safely and soundly, when a higher or lower layer is responsible for safe delivery.
-
Transport Layer Overview
It allows you to segmentation and reassembled.
It is a logical connection b/w endpoints of inter-network.
It provides a reliability with sequence number (ISNs) and acknowledgement (ACKs).
-
Transport Layer Overview
Transport Layer provides two protocols (TCP, UDP)
Transmission Control
Protocol (TCP)
User Datagram
Protocol (UDP)
Application
Transport
Internet
Network Interface
-
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is a connection-oriented protocols that addresses numerous reliability issues to provide a byte stream.
Reliable protocol b/w endpoint of inter-network.
TCP provides segmentation and reassembled.
Virtual circuit service is provided between end-user applications.
-
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) responsible for
Data arrives in order
Data has minimal errors
Duplicate data is discarded
Lost/discarded packets are resent
Include traffic congestion control
-
User Datagram Protocol (UDP)
UDP like TCP is an end to end Protocol
User Datagram Protocol (UDP) is connectionless and unreliable.
There is no guarantee that data will arrive at all, or in the right order.
UDP is faster protocol than TCP.
-
Comparison b/w TCP and UDP
TCP and UDP are used to carry an assortment of higher level application. The appropriate transporty protocol is chosen based on the higher-layer protocol applications e.g FTP expect a reliable connection. -
TCP Segment Format
Source Portnumber of the calling port
Destination Portnumber of the called port
Sequence numbernumber used to ensure correct sequencing of the arriving data
# Bits
6
16
32
4
16
6
32
Source
Port
Dest.
Port
Sequence
Number
Acknowledgement
Number
HLEN
Reserved
Code
Bits
16
Window
16
Check-
sum
16
Urgent
0 or 32
Option
Data...
-
TCP Segment Format
Acknowledgment numbernext expected TCP octet
HLENnumber of 32-bit words in the header
Reservedset to zero
Code Bitscontrol functions (such as setup and termination of a session)
Windownumber of octets that the sender is willing to accept.
6
4
6
32
Acknowledgement
Number
HLEN
Reserved
Code
Bits
16
Window
16
Check-
sum
16
Urgent
0 or 32
Option
Data...
-
TCP Segment Format
Checksumcalculated checksum of the header
Urgent Pointerpoints to the end of the urgent data
Optionsone currently defined: maximum TCP segment size
Data field can be varied size.
16
Check-
sum
16
Urgent
0 or 32
Option
Data...
-
Port Numbers
TCP
Port
NumbersF
T
PTransport
LayerT
E
L
N
E
TD
N
SS
N
M
PT
F
T
PS
M
T
PUDP
Application
Layer21
23
25
53
69
161
-
Port Numbers/Socket No
Keep track of conversation of data.
Controlled by IANA.
Port No have certain assigned ranges.
< 1024 are assigned to well known ports.
>= 1024 are dynamically assigned by host application.
Destination can select correct application using port number.
-
TCP Port Numbers
Source
Port
Dest.
Port
Host A
Dest. port = 23.
Send packet to myTelnet
application.1028
23
SP
DP
Host Z
Telnet Z
-
TCP Handshake/Open Connection
Send SYN
(seq=100 ctl=SYN)
SYN received
Host A
Host B
Hosts A initiates the connection by sending a packet with in an ISN with a value of 100 and a SYN bit indicating a connection request. It sends the SYN to check that host B is ready to establish a TCP connection.1
UPSKILL TRAINING PROGRAM
Both ends of the connection are synchronized with this sequence.
By exchanging beginning sequence numbers, any lost data may be recovered.
-
TCP Handshake/Open Connection
Send SYN
(seq=100 ctl=SYN)
SYN received
Send SYN
(seq=300 ack=101 ctl=syn,ack)
Host A
Host B
SYN received
When host B receive the SYN segment, it records As ISN as a value of 100. When host B is ready to start the TCP session, it sends an ACK segment host A's SYN. This ACK has a value of 101, which indicates that host B has received segment 100 and expects segments 101 next.Host B sends a SYN congaing its own ISN (300) to host A.1
2
UPSKILL TRAINING PROGRAM
Both ends of the connection are synchronized with this sequence.
By exchanging beginning sequence numbers, any lost data may be recovered.
-
TCP Handshake/Open Connection
Send SYN
(seq=100 ctl=SYN)
SYN received
Send SYN
(seq=300 ack=101 ctl=syn,ack)
Established
(seq=101 ack=301 ctl=ack
Data)
Host A
Host B
SYN received
Host A acknowledges host B's SYN with an ACK. This ACK has the value of 301, indicating host A has received segment 300 and expects segment 301 next.Data transfer can now begin.1
2
3
UPSKILL TRAINING PROGRAM
Both ends of the connection are synchronized with this sequence.
By exchanging beginning sequence numbers, any lost data may be recovered.
-
Internet (Internetworking) Layer
The internal layer has the task of exchanging datagram across the network boundaries. It is therefore also referred to as layer that establishes internetworking. It defines and establish the Internet. The primary protocol in this scope is the Inter Protocol (IP). Its function in routing is to transport datagram to the next IP router that has the connectivity to a network closer to the final data destination.To be continued...
- The network layer protocol performs IP layer packets forwarding
and routing, forwarding packets from their source to their
destinations, based on their destination IP addresses. The IP
protocol runs all the nodes on the TCP/IP network, including the
hosts and the forwarding equipment of IP packets on the network.
The IP protocols supports connectionless transmission , which can
neither avoid loss of packets nor ensure the sequence that the
packets arrive. This makes the packets forwarding equipment not
need to save any status about data streams, which greatly enhance
the efficiency of packets forwarding.
To be continued...
- IP (Internet Protocol): Provides the transport layer with network service. ICMP (Internet Control Message Protocol): Reports error and other cases that deserve attention. ARP (Address Resolution Protocol): Translates IP addresses into physical addresses. RARP (Reverse Address Resolution Protocol): Translates physical addresses into IP network addresses.
-
Link (Network Interface & Hardware) Layer
This layer covers the physical media layer network technology. It supports nearly every data link topology, e.g. Ethernet, Token Ring, Frame relay, ATM. It also defines the Information frame formats for various physical media connections. The Link Layer is used to move packets between the Internet Layer interfaces of two different hosts on the same link. these will performs data link functions such as adding a packets header to prepare it for transmission, then actually transmit the frame over a physical medium.To be continued...
- The TCP/IP model includes specifications of translating the network addressing methods used in the Internet Protocol to data link addressing such as MAC (Media Access Control) The Link Layer can also be the layer where packets are intercepted to be sent over a virtual private network or other network tunnel.
-
The World is Integrating
-
Triple play
Marketing Plan
For PTCLUPSKILL TRAINING PROGRAM
*
-
What the customer wants
71% of consumers would prefer a single bill for all of their communication services37% said they would switch to a telco for TV services71% of consumers want cable TV as part of their bundleUPSKILL TRAINING PROGRAM
*
-
Why offer Triple play?
Increases per customer revenueKeeps the customer loyalTV services are stickyResulting in overall revenue growthEnables service offering growthInternet on TV, Gaming, Video on demand etc.40% of premium TV customers take VoDPlaces the provider as the gateway to all the Concentric Diversification of communication business into convergence.UPSKILL TRAINING PROGRAM
*
-
Market Summary
Estimated number of TV homes-8 millionEstimated number of existing CATV customer- Karachi 929,000 Lahore 479,000 Islamabad 142,000.All these customers are more or less with traditional cable operators.UPSKILL TRAINING PROGRAM
*
-
UPSKILL TRAINING PROGRAM
*
-
Product Features
Cable TV and Multimedia bi-directional service.Cable TV Channel 95 High speed internet.VPNUPSKILL TRAINING PROGRAM
*
-
Optional services
IP telephonyVideo conferencingInteractive video gamesHard disc sharingVOD (video on demand)Pay per viewUPSKILL TRAINING PROGRAM
*
-
EXAMPLES TO IPTV
Following are example of IPTV
Video on Demand.
Broadcast Television.
Competitive TV services over managed IP networks with two way connection.
-
EXAMPLES TO IPTV
IPTV is distinctly different from Internet Video that simply allows users to watch videos, like movie previews and web-cams.
Following are not IPTV
Video streaming over internet
Watching TV on your PC (Personal Computer)
Unproven Business models for media and TV services
-
NEW SERVICES EMERGING
-
12410
12410
Rawalpindi, Satellite Town
Islamabad, IBA-1 Exchange
BRAS
BRAS
SDH
DSLAM
3.After authentication ,AAA return different IP Pool to BRAS
4.BRAS assign IP address from IP pool
1.Distinguish different application by Domain name
2.PPPoE stream
BTV and VOD
WEB
NETWORK CONFIGURATION OF IPTV IN PAKISTAN
Legend:
GCigabit Ethernet Link
STM4 POS Link
E3 Link
Fast Ethernet Link
STM1 POS Link
Dark Fiber
Gigabit FIBER Link
STB
CPE/HGW
PC
pots
AAA
-
Equipment Needed for Implementing TV/IP Solution
Headend Equipments/Technology
IPTV Headend infrastructure is very similar to Digital TV Headend. It composed of MPEG Encoder, Streamer, CAS Headend, VoD (Video on Demand) Server, EMS, EPG Server and so on.
TV Headend provides MPEG2 or MPEG4 Live TV contents to STB. IPTV Headend receives, decode and decrypts video, audio and data content from a variety of sources, such as satellites, terrestrial, studio and storage media and convert it through compression techniques into IP multicast encapsulated MPEG streams.
Encoder, the core part of Headend, implements real-time encoding and transcoding of MPEG2 and MPEG4 through the hardware or software component based on business model.
UPSKILL TRAINING PROGRAM
*
-
Streaming Server
Optibases MGW 5100 streaming platform resides at the head-end. MGW 5100 transmits the streams to the switch or router which transfers them over the backbone to the central/remote offices, and from there to the end user location.
An additional MGW 5100 server can reside at the central office where it receives local live feeds for transmission to targeted areas.
Video Server
Video servers fulfill several purposes at head-ends. For store and forward transmissions, they store digitally encoded content and stream it through level III devices via operators networking infrastructure.
They receive newly encoded digital content that is uploaded from the MGW 5100 server.
They also enable time-shifted TV applications. For this purpose, MGW 5100 encodes all channels on a daily basis uploading them to the video server. Viewers at home can then watch any program at a time convenient to them.
UPSKILL TRAINING PROGRAM
*
-
Level III Device
Switch or router that supports multicast transmission. The router or switch resides at the head-end, interfacing with the network. Another router or switch receives data at the central office and transmits either to DSLAMS located there, or into end-user Ethernet based network .
DSLAM
The DSLAM (Digital Subscriber Line Access Multiplexer) resides at the central office, connecting xDSL subscribers to the backbone and subsequently to the head-end.
When distributing TV over IP, the DSLAM should support multicast transmission. If it doesnt, the switch or router at the central office has to replicate each channel for each request.
This can cause congestion at the DSLAM input level. If the DSLAM supports multicast, it receives one stream for each channel and replicates the stream for each end point.
UPSKILL TRAINING PROGRAM
*
-
CPE (Customer Premises Equipment)
The equipment located at the end-point that receives the TV/IP stream. Usually the term CPE refers to the DSL modem. The DSL Modem receives the stream from the DSLAM or level III device and transfers it directly to the PC for display on the desktop or to the IP STB.
IP Set-Top-Box
The IP STB receives the IP stream, and decodes the stream for display on the TV. Typically, the IP STB receives the stream from the CPE. Some STBs can receive the IP stream directly from the DSLAM, and serve as CPE as well.
UPSKILL TRAINING PROGRAM
*
-
CPE SOLUTION
DSLAM
IP network
ISP
DHCP Server(1,2,
)
NGN
Video
CPE
ISP/ASP
TV
STB
HG510
PHONE
PC(FE/USB)
Home network
internet
Multicast
Router
GE
PPPoE
IAD DHCP
PPPoE
NSP
BRAS
Router
Notepad(WLAN)
-
End-point Configuration
The TV/IP stream is fed into the CPE (Customer Premises Equipment), in most cases a modem. The modem transfers the MPEG-2 or MPEG-4 stream to an IP/STB which decodes the stream for display on a TV set. MPEG-4 streams can also be displayed on PCs using the Microsoft Media Player. If there is sufficient bandwidth between the central office and the end-point, two channels can be streamed to two IP STBs.
Modems
Modems are also a critical piece of the last mile. Each modem must interoperate with the DSLAM to ensure maximum performance over the copper plant. It is highly recommended that providers purchase a modem that is certified by the DSLAM manufacturer not only for Internet data access, but also for the passage of video. Modems should have multiple Ethernet ports to facilitate multiple STBs or PCs within the home. A switch in this device is preferable to a hub; the switch insulates video traffic within the home from other traffic generated on the network and in the home.
UPSKILL TRAINING PROGRAM
*
-
Middleware
Middleware refers to the software that integrates the various parts of the IP over TV solution.
Currently, Optibase maintains strategic partnerships with iMagicTV and Myrio, two of the leading streaming middleware providers.
Middleware is installed along the streaming media chain, starting at the Head-end and reaching into consumers homes in the form of software running on IP set-top-boxes.
-
Middleware takes care of the following:
Media Asset Management
The software that enables rich media service providers to manage content, distribution and data rights control. Media asset management includes channel management and scheduling. Media asset management solutions also let operators customize programming line-ups and update viewing rates. At the end-point, media asset management solutions let consumers create customized viewing profiles, track viewing habits and account information and implement parental controls.
Billing
The entire business model of rich media and digital TV services rests on advanced billing capabilities. Billing solutions need to be able to track individual usage based on the delivery of customized interactive content. Billing solutions integrate with other middleware solutions.
Programming
The management software controls the customized programming that is targeted at a specific user or group of users. Usually the program guide is downloaded and updated on a regular basis.
-
IPTV Standards
IPTV solutions are based on a combination of standard and proprietary technologies. There is no existing standard which cover all IPTV needs but there are multiple standards which could fulfill certain requirement of IPTV. MPEG : MPEG standards can be used for Content Encoding, Streaming and delivering. MPEG-21. DSL-Form : For remote management protocol TR-069 and for Qos TR-098 can be used. CEA (Consumer Electronic Association) and DLNA (Digital Living Networks Alliance): defines some standards for home equipments. And DVB standards are used for delivering the contents.
There are other standardization bodies which are doing efforts for IPTV like, The IPTV Interoperability Forum/ Alliance for Telecommunications Industry Solutions (IIF/ATIS). ITU-T IPTV Focus Group formed Apr 13th, 2006 to coordinate the IPTV global standardization efforts. Strong push from Korea with Telecommunications Technology Association (TTA), China with Communication Standards Association (CCSA), and Japan with Association of Radio Industries and Businesses (ARIB).
-
Security and Conditional Access
Security is a critical part of the streaming solution when it comes to conditional access (ensuring that content is viewed by the audience it was intended for only) and protection against piracy. Conditional access solutions use algorithms to encrypt and scramble content. Content is encrypted at the head-end and decoded by smart cards installed in set-top-boxes at end-points.
UPSKILL TRAINING PROGRAM
*
-
THANK YOU
Global Broadband Video Subscriber
Market Development
0
5
10
15
20032004200520062007
Subs (M)
Broadband Video
Subscribers