Sunteți pe pagina 1din 135

ACCESS NETWORK

By
Mr. Muhammad Usman Senior Instructor
Mr. Zahid Hussain Senior Instructor
Mr. Tallat Siddique Senior Instructor
1

WHAT IS TELECOMMUNICATIONS.
To be able to communicate at long distance through electrical or
optical signals.
OR
A long distance communication via integration of information sharing
networks all tied together.

TELECOMMUNICATION NET WORK.


A set of nodes and links that provides connections b/w two or more
defined points to carry out exchange of information b/w them
2

Access Network

EX

Access Network
LE

EX

END USER

AN is called the last mile of Telecom Network

Limitation of Traditional Access Mode


Feeder layer
3~5km

Distribution layer
500m~1km

Drop layer

10~300m

LE
Connection
Cabinet

Central office

Distribution
Box

user

Copper Cables Based

Small coverage
Limited bandwidth
Maintenance complexity
Reliability cut down
Enormous investment

Traditional access mode has become the bottleneck


of modern telecom network!
4

How to Overcome the bottleneck

Optical Integrated Services


Access Network
Advantages:
Wide Coverage
Broad Bandwidth
Easy Maintenance
High Reliability
Low Investment

TERMINOLOGIES
BANDWIDTH:
Range of frequenceies that any
media(copper,optical fiber,Air Interface)
that it can transmit from source to
destination for communication.
MODEM:(Modulation Demodulation
Conversion of Analog signal to digital
signal and vice versa.
6

Few Key Concepts


ElectricalSignalCharacteristics
Bandwidth
Speedoftransfer

Networks are to be designed to handle the


customersrequirements

Telecommunication Networks
A telecommunication network provides
telecommunication services to the customers

The Internet
A networks of networks or ISPs
Architecture involves

Home/Office (User) PCusing web, mail etc


User PC Comm. eqpt e.g Modem, Ethernet
card etc
Local Loop carrier, may be POTS provider,
wireless operator, Power line carrier
ISPsetup
ISPbackbone
Online Contentitself

Access Network
Consists the large part of the network
Connects the end-user with the end-points

of the core network


Uses different technologies
Different Access services possible

10

Media Types
OpenWirePairs
TwistedPair

Wires

CoaxialCable
OpticalFiber
Wireless

11

DSL
Stands for DIGITAL SUBSCRIBER LINE
DSL is a technologies that provide digital data
transmission over the wires of a local telephone
network.
It transmits data and voice simultaneously without any
interruption in voice signals
A DSLAM is the device located at the central office
(CO) of the provider and concentrates connections
from multiple DSL subscribers.
12

BANDWIDTH
The difference between the highest and
the lowest frequencies of a composite
signal. It also measure the information
carrying capacity of a line or a network.
the highest frequency that can be
transmitted in analog operation.
The information carrying capacity of a
digital system.
13

SIGNAL TO NOISE RATIO


(SNR)
The ratio of signal to noise , an indication
of signal quality in analog system.

14

TWISTED PAIR
A twisted pair consists of two conductors
each surrounded by an insulating
material.
Twisted pair cable comes in two forms.
1. Unshielded twisted pair (UTP).
2. Shielded twisted pair (STP).
15

CROSSTALK

The noise on a line caused by signals


traveling along another line.
Electromagnetic interference from one
pair can create a noise over others pairs.
For the solution of this problem, the wire
pairs are twisted around each other at
regular intervals (between 2 and 12 twist
per foot).
16

CROSSTALK

twisting does not always eliminate the


impact of noise, but it does significantly
reduce it.

17

DECIBEL (db)
To show that a signal has lost or gained
strength, engineers use the concept of (db).
The decibel (db) measures the relative
strength of a signal at two different

18

DSL Line Qualification &


Testing Parameters

Noise
Return loss
Single-side Insertion loss
Longitudinal balance
Bit rate evaluation
Crosstalk
19

EARTHING
For earthing of cable to the earth bar the
cabinet, use earth wire equipped with two earth
clamps.
Pass the included plastic guide under the
aluminum screen of the cable.
Pass the earth clamp onto the plastic guide and
under the aluminum screen.
Connect the other end of the earth wire, by
connecting the earth clamp, to the earth bar in
the cabinet.
20

Computer Accessories
Computer with
appropriate
configuration.
Windows 9x,XP,2000
Network Adapter/ LAN
Card
21

Connectors
Connector types
R J - 11

R J - 45

22

Cables

Cable types
STP & UTP

Coaxial

Ethernet

Optical Fiber
23

Modem, Splitter & Rosette


Modem is a device that modulates an analog
carrier signal to encode digital information, and
also demodulates such a carrier signal to
decode the transmitted information
Splitter is a filter that that use to separate the
voice and data.
Rosette is a connector that use to connect the
telephone wire with an output of RJ 11
24

MODEM

MODEM

Splitter

SPLITTER

25

BROADBAND
Next Generation Telecommunication
Technology
It can simultaneously accommodate voice,
data & video, and other services
(integrated Services)
It contains High Data rates.

26

Applications
Video, Voice Mail interactive
Video Phone IP TV
Video on Demand Data
Video Conferencing

27

The Need For Broadband


Changing user needs and demands
competition in telecommunication Sector
effective and better utilization of existing
infrastructure
Multimedia Applications, Video Telephony
Imaging, low cost video conferencing and
Computer-aided design
Note: They all have very high bandwidth requirement.
28

DSL
Stands for DIGITAL SUBSCRIBER LINE
DSL is a technologies that provide digital data transmission over the
wires of a local telephone network.
It transmits data and voice simultaneously without any interruption in
voice signals
DSL connections are deployed in the "last mile" of a local telephone
network of the local loop. The connection is setup between a pair of
Modems on either side of copper wire extending between the customer
premises equipment (CPE) and the DSL access multiplexer (DSLAM).
A DSLAM is the device located at the central office (CO) of the provider
and concentrates connections from multiple DSL subscribers.
29

DSL Variations

30

What is a DSL?
Digital

Subscriber
Line is
a
modern
technology that enables broadband, digital data
over twisted copper pairs, opening the most
crucial bottleneck in the todays data stream.

31

The Demand for High Speed Access


PCMarketcontinuesits tremendousgrowth
Theinternetcontinuesits amazing growth
The present information age has increased

thedemandforbandwidth.
The
trendof
Telecommuting is
getting
populardaybyday.
Even being encouraged bycompaniesto ease
traffic andpollution.
32

Problem # 1 Bandwidth

Residential users are demanding speeds

thattheygetin work environment.


Analog modem connections are limited to

56kbps but typical connection speeds are


evenlesser
BasicRate ISDN is limited to 144kbps.

33

34

Problem # 3 Switch Congestion


Voice switched were sized to handle voice

calls.
Voicecalls are usually short (say5min.)
Data calls are usually long (may be in

hours)
Flat charge pricing by some ISPs has
made problem worse since some users
dontdisconnect.

35

xDSL Solutions:

Problem # 1: Bandwidth blues


xDSL can reach a speed up to
52 Mbits/sec

Problem # 2: Busy Signals


xDSL MODEM is dedicated to each
subscriber

Problem # 3: Switch Congestion

Voice Switch
10

36

37

Types of DSL
ADSL - Asymmetric Digital Subscriber Line (Most
popular).
ADSL Lite - A lower data rate version of Asymmetric
Digital
Subscriber Line.
CDSL - Consumer Digital Subscriber Line.
Either Loop - Ethernet Local Loop by Nortel.
HDSL -High Bit-rate Digital Subscriber Line.
IDSL - ISDN based DSL , Kbps.
RADSL -Rate Adaptive Digital Subscriber Line.
SDSL -Symmetric Digital Subscriber Line.
VDSL -Very High Bit-rate Digital Subscriber Line.
38

A Digital

DSLAM

Subscriber Line Access Multiplexer is


a mechanism at a phone company's central location
that links many customer DSL connections
toasingle high-speed ATM line.
A DSLAM
takes connectionsfrom many
customers and aggregates them onto a single, highcapacity connection tothe internet.
DSLAMs are generally flexible and able to
supportmultiple typesofDSL ina single central office
and different varieties of protocol and modulation
The DSLAM may provide additional functions,
including routing
or
dynamic
address assignment forthe customers

IP
39

How Does xDSL Modems Work?


xDSL modems take advantage of the
spectrum above the telephone audio
channel. While operating with
somewhat less amplitude dynamic
range they increase data rates by
greatly increasing the frequency range
of the communication signal (from
about 10KHz to over 1.0MHz).
To do this they require the installation of
special equipment at the central office
and customer premise
40

Problems
Attenuation - The dissipation of the power
of a transmitted signal as it travels over
thecopperwire line. In-home wiringalso
contributesto attenuation.
Bridged taps Unterminated extensions of
theloop thatcauseadditionallooploss
Crosstalk - The interference between two
wires in the same bundle, caused by the
electricalenergycarried byeach.
41

ADSL
ADSL derives its name from the fact that

the data transfer rates downstream are


muchfasterthan theupstream data rates.
The downstream rate is often up to 10

timesfasterthan theupstream rate.


The data rate of ADSL is highlydependent

upon the distance from the Central Office


(CO)to theConsumerPremises(CPE).
At a

distance

of

9000 ft.,8Mbps

downstream can be achieved while at 18000


ft., only 1.544 Mbps downstream
canbeachieved
42

ADSL
Upstream speeds max out at 640 kbps and

scale down similarly to the downstream speeds.


Designedto coexistwith a regularphoneline,

whichoperatesatfrequenciesupto 4kHz.
In order not to interfere with POTS and to

avoid interferencefromPOTS,ADSLoperates at
frequencies above 4 kHz, (Upstream is in the
range
from 30 kHz to
138 kHz,
downstream ranges from 138kHz, to ~1.1 MHz).
43

ADSL
Separate frequency bands for voice and

data allow the signals to be individually


obtainedusingfilters.
For ADSL these filters are combined into

one central piece of equipment called a


POTSsplitter.
The

POTS
splitter
takesthe
signals received from the service provider and
separatesthem into twohomenetworks.
One is the regular telephone network that
is installed in most homes and the other
network is the homecomputernetwork

44

24

45

Advantages and Disadvantages of ADSL


ADSL is well suited to residential applications. It

uses lines that are already installed virtually


everywhere and peacefully coexists with current
phoneservice.
ADSL is ideal for most home computing and

small business applications because of the large


downstream data capacity (upto 8Mbps).
Analog modem users will also appreciate that

ADSL (like most other flavors of xDSL) is always


connected.
46

Advantages and Disadvantages of ADSL


For large businesses upstream data rates are

often just as important as downstream, which would


make ADSLapoorchoice.
ADSL data rates also suffer dramatically as line

length increases. ADSL will extend out to 18,000 ft,


but its ideal data rates only operate out to 9,000ft.

47

VDSL
Data rates of 13, 26, or up to 52 Mbps are

possible with VDSL!


It will be offered in two varieties, one that is

symmetric like HDSL and another


asymmetric like ADSL.

that is

UltraHighSpeed dataaccesssuch asStreaming

video possible.
Requires fibre close to subscriber

48

VDSL -FDM

49

VDSL NETWORK

50

31

51

52

ADSL2
ADSL2 is not a single protocol buta familyof

protocols developedovertime.
Family members include:

ADSL2
ADSL2+
BondedADSL2

53

Basic ADSL2
Approvedin 2002byITU in G.992.3& G.992.4
AlsoknownasADSL2AnnexA
Differencefrom traditional ADSL

Higher rate: 12Mbpsas compared to 8Mbps


Improved initialization techniques

Reduces NEXT and FEXT

Reduced Power
All Digital Mode

54

ADSL2 Spectrum

Extend the DS
(Downstream) bins to 3.75
MHz Widen the US
(Upstream) from 138kHz
to 276 kHz

55

ADSL2-Bonding
Supports ATM Forum's inverse multiplexing

overATM (IMA) standard.


Through IMA, ADSL2 chipsets can bind two or

more copper pairs in an ADSL link to get fiberlikedata rates overexisting copperlines
32Mbpson4bonded pairs
24Mbpson3bonded pairs
16Mbpson2bonded pairs

56

ADSL2 All Digital Mode


All digital mode (no POTS)
About 256 kbps additional up stream data rate
0-26 kHz used for digital transmission not voice

57

ADSL2 Low Power


L0is ADSL2full power mode
L2 is low power mode at the ATU-C (DSLAM)

while idle will result in better power


L3 is low power mode at the ATU-R (user) and

ATU-C enables the modem to sleep when


information is
not being transmitted (e.g.
overnight) ittakes 3seconds to comeoutofL3 (sleep
mode)

58

ADSL2+
ITU standard G.992.5 in 2003
Doubles the downstream frequency band from
1.1Mhz in basic ADSL2, up to 2.2Mhz in ADSL2+
Increases the downstream data rate on shorter
phone lines, reaching 20Mbps on lines of max
length of ~1.5km
ADSL2+ upstream remains 1Mbps

59

ADSL2+
Can beused to reduce cross talk
use only tones between 1.1Mhz-2.2Mhz, it can

mask all downstream frequencies below 1.1Mhz


Useful when using ADSL2+ in the same binder

as forADSL2

60

Broadband Setup
Pakistans largest Broadband network is PTCL
network. It has called PIE- (Pakistan Internet)
and it connects every ISP and data network in
Pakistan with outside world.
DSLAMS are installed in major cities of
Pakistan.
OFAN (optical fiber network) with ONU (Optical
Network Units) from where the customer will
be connected through Copper lines (like your
phone lines)
61

Broadband Pakistan

Packages

Connectivity

Launched on June 11, 07 with Free Modem & Free Installation


62

Line Qualification Criteria


Test Parameters

Recommended
Values

Comments

Attenuation
(Downstream/Upstream)

Less than 45 dB

< 30 dB is excellent
30-40 dB is very good
40-45 dB Little or no connectivity issues
45-60 dB Connectivity issues progressively become worse
> 60 dB will experience no synch or intermittent synch problems

Signal to Noise Ratio

Greater than 9dB

<6 dB will experience no synch or intermittent synch problems


6-10 dB does not leave much room for variances in condition
10-20 dB Little or no synch problems
> 20 dB is excellent

Attainable Downstream
Line Rate
256k/128k
512k/128k
1Mb/256k
Attainable Upstream Line
Rate
256k/128k
512k/128k
1Mb/256k

Line qualified for a higher rate to leave room for variances in


condition.
Greater than 384k
Greater than 720k
Greater than 1.2M
Line qualified for a higher rate to leave room for variances in
condition.
Greater than 256k
Greater than 256k
Greater than 384M

63

The line conditions decide whether the


Broadband service can be deployed
successfully. Before deploying the
Broadband service, you need to know the
networking topology, test the line electrical
attributes, and finally decide whether the
line conditions are suitable for service
deployment.

64

Line Conditioning Parameters


Line Attenuation
SNR
Crosstalk
Insulation Resistance(>5Mohm)

65

DSLAM
The DSLAM aggregates the
digital data streams coming
from a number of
subscribers onto a single
high-capacity uplink
DSLAMs typically support multiple DSL
transmission types, as well as different
protocol and modulation technologies
within the same DSL type.
New generation of DSLAMs has appeared
that used Ethernet uplinks for DSL traffic
aggregation.

66
Page 66

DSL MODEM
DSL Modem, a broadband access device
that enables high-speed data transmissions
over the existing copper telephone wires (local loops)
By using DSL technologies
DSL Technology is the most cost effective
option due to its ability to utilize millions of
telephone lines installed worldwide for multimegabit data access without extensive and
expensive infrastructure upgrades.
DSL network operators are using bandwidth,
performance and reliability of their networks
as well as value added services such as VoIP,
IPTV, VoD and online games
67

IP, Internet Protocol


After completion of this training the
participants would be able to know:
What is Protocol
Defining Network & protocols
What is Internet
Internet Protocol
TCP/IP protocols & its layers
IP Address, logical address & physical
address

68

PROTOCOLS
A common language or set of communication
rules for devices to exchange information/data etc
To interconnect two or more devices / computers
so that they can talk to each other or they can
download

data

or

video

from

any

Location

/network/device certain protocols are required

Similarly, in order to transfer easily and

safely/correctly some transmission rules /protocols


are also required
69

When Protocols are needed?

any two computers/devices want to share

information

When a network want to exchange data with

other

network

having

more

than

two

computers/devices

A large no. of devices/computers or Networks

can be connected among each other to exchange


huge amount of information/data

For all above situations some PROTOCOLS are

must to communicate and transfer information


70

The Internet or Network of networks


The Internet or Network of networks refers to a
worldwide set of interconnected networks
We need to communicate when we connect
different physical networks located at different
places

Communication services are provided by


software and the user applications and it provides
a common interface for these applications

Such a set of interconnected networks is also

called an inter-network or an Internet


71

The Internet Protocol


The Internet Protocol is the set of communications
protocols for exchanging data
These include TCP-transmission Control Protocol
and IP-Internet Protocol
IP-deals with the real exchange of information
among
networks
and
TCP-deals
with
the
transmission of these Information
Thus forming TCP/IP protocols in all for all
networks to communicate
No matter what type of hardware, operating
system or application program is running.
72

IP Addresses

Numerical identification (logical address) that is

assigned to devices for communication.

Stored

displayed

as
in

binary

numbers,

human-readable

they

are

notations

usually

such

as

192.168.100.1
< network number <host number

This numeric form is used and recognized by the IP

software and the machine/computer reads it in binary


form(010010)

Specifies the locations of the source and destination

nodes

73

To be continued

Used two versions: IPV4(32-bit) and IPV6(128-bit)

IP address consist of pair of numbers: Network

number, Host number or simply net ID and host ID

Similarly there is source IP address and destination

IP address

The destination or receiving host IP address

(logical) is translated/mapped to physical address

Physical address is also machine address IP

Addresses
74

To be continued

Different Address Classes or simply groups are

used for different networks depending upon:

Size of network ( number of hosts)

These Classes are:


Class A, Class B, Class C, Class D, Class E

Small-to-medium sized Networks use Class B,

since such kind of networks are usually designed.

75

To be continued

IP Address Subnets?
Due to network growth, it becomes difficult to
manage any changes in the network like:

adding new hosts

creating new network

distance between networks is changed

To avoid additional request for IPs, splitting an IP is


used, it is called Subneting
The host ID is splited further into anew network and
new host number, the new network is called
Subnetwork or subnet
It becomes then:
< network number <subnet number <host number
76

IP Addresses
The IP addresses can be:
Private

OR

Public

A private IP address cannot be used on the

public Internet, private IP address used within a


single organization, reserved for private networks

A public IP address is the address that can be

assigned to any user trying connecting to Internet


from any place, reserved for Internet.

77

DSLAM

A Digital Subscriber Line Access Multiplexer is a


mechanism at a phone company's central location that
links many customer DSL connections to a single highspeed ATM line.

A DSLAM takes connections from many customers and


aggregates them onto a single, high-capacity connection to
the internet.

DSLAMs are generally flexible and able to support multiple


types of DSL in a single central office and different varieties
of protocol and modulation

The DSLAM may provide additional functions, including


routing or dynamic IP address assignment for the
customers
78

The DSLAM aggregates the digital data streams coming


from a number of subscribers onto a single high-capacity
uplink

DSLAMs typically support multiple DSL transmission


types, as well as different protocol and modulation
technologies within the same DSL type.

New generation of DSLAMs has appeared that used


Ethernet uplinks for DSL traffic aggregation. These
devices have become known as Ethernet DSLAMs or IPDSLAM

IP-DSLAMs function as Layer-2 switches that backhaul


subscriber traffic to BRASs

By architecture centralized or driven by central


processing unit typically embedded in the uplink module
and distributed where some or all traffic processing is
79
done on the line cards

ADSL2+ Jump Line in MDF Room

PSTN

External
line

NE

Splitter
PSTN

Line

ADSL2+ Modem

IP network
ADSL2+

SCU

MA5600
Data signal

Red dashed means before


jumping the line
Blue real line is the new
Jumping Line cables

backplane

80

TCP/IP OVERVIEW
Host

Host

Internet
TCP/IP

TCP/IP was developed by DARPA (Defense American Research


Progressive Agency)

Provide communication b/w DOD (Dept of Defense)


Network (ARPANET) based on TCP/IP
Later ARPANET known as Internet
81
Known as Internet Reference Model

TCP/IP OVERVIEW

Define a set of rules to communicate over e network

TCP/IP provides end-to-end connectivity specifying how


data should be formatted, addressed, shipped, routed
and delivered to the right destination

Later TCP/IP used by a distributor of UNIX

TCP/IP played an important Role

Work well for both LAN and WAN

To communicate across any arrangement of


interconnected network.

82

TCP/IP OVERVIEW
Host

Host

Internet
TCP/IP

TCP/IP information is moved as a series of


datagram
At the receiving end datagram are
reassembled into complete message.

83

TCP/IP Protocol Stack


OSI Reference Model
7

Application

Presentation

Session

Transport

Network

Data Link

Physical

TCP/IP Conceptual Layers

Application

Transport
Internet
Link Layer

Application

3
2
1

TCP/UDP

IP

ICMP
ARP/RARP

Network
Interface &
Hardware

84

Application (Process-to-Process) Layer


This is scope within which applications create user
data and communication this data to the other
process or application on another or same host.
Data coded according to application layer
protocols are encapsulated into one or more
transport layer protocols, which in turn use lower
layer protocol to affect actual data transfer.
Application layer protocols are most often
associated with client-server application and the
commoner servers have specific ports assigned to
them by IANA.
85

Application Layer Overview

Application

Transport
Internet

File Transfer
- TFTP
- FTP
- NFS
E-Mail
- SMTP
Remote Login
- Telnet
- rlogin
Network Management
- SNMP
Name Management
- DNS

Network
Interface

86

File Transfer (FTP, TFTP, NFS)


File Transfer Protocols (FTP) performs basic
interactive file transfers between hosts.
Trivial File Transfer Protocol (TFTP) is a
simplified version of FTP.
Network File System (NFS) was developed
by Sun Microsystems and is a widely used in
remote file access across a network.
87

E-Mail (SMTP)
Simple Mail Transfer Protocol (SMTP)
support the exchange of e-mail.
It can also be used to transfer files, but
its use is usually limited to moderate size
file containing ASCII.

88

Remote Login (Telnet, rlogin)


Telnet is a remote login protocol that
you can use to execute terminal
session with remote hosts.
Remote login (rlogin) is similar to
Telnet, that is offered in most UNIX
implementation.
89

Network Management (SNMP)


Simple Network Management Protocol
(SNMP) is used to gather management
information from network devices.
It also manages statistics, performance,
configurations, collection, and security
of network devices.
90

Name Management (DNS)


Name management is provided by
Domain Name Service (DNS).
It maps IP addresses to the names
assigned to network devices.

91

Transport Layer Overview


Transport layers responsibility include end-to-end
message transfer capabilities independent of
underlying network, along with error control,
fragmentation and flow control.
We can think Transport layer as a transport
mechanism e.g a vehicle whose responsibility is to
make sure that its contents (goods/passengers)
reach its destination safely and soundly, when a
higher or lower layer is responsible for safe
delivery.
92

Transport Layer Overview


It allows you to segmentation and
reassembled.
It is a logical connection b/w
endpoints of inter-network.
It provides a reliability with
sequence number (ISNs) and
acknowledgement (ACKs).

93

Transport Layer Overview


Application
Transport
Internet

Transmission Control
Protocol (TCP)
User Datagram
Protocol (UDP)

Network
Interface

Transport Layer provides two


protocols (TCP, UDP)

94

Transmission Control Protocol


(TCP)
Transmission Control Protocol (TCP) is a
connection-oriented protocols that addresses
numerous reliability issues to provide a byte
stream.
Reliable protocol b/w endpoint of internetwork.
TCP provides segmentation and reassembled.
Virtual circuit service is provided between
end-user applications.
95

Transmission Control Protocol


(TCP)
Transmission Control Protocol (TCP)
responsible for
Data arrives in order
Data has minimal errors
Duplicate data is discarded
Lost/discarded packets are resent
Include traffic congestion control
96

User Datagram Protocol


(UDP)
UDP like TCP is an end to end
Protocol
User Datagram Protocol (UDP) is
connectionless and unreliable.
There is no guarantee that data will
arrive at all, or in the right order.
UDP is faster protocol than TCP.
97

Comparison b/w TCP and


UDP

TCP and UDP are used to carry an assortment


of higher level application. The appropriate
transporty protocol is chosen based on the
higher-layer protocol applications e.g FTP
expect a reliable connection.

98

TCP Segment Format


# Bits

16

16

Source
Port

Dest.
Port

32

32

Sequence Acknowledgement
HLEN
Number
Number

16

16

16

0 or 32

Window

Checksum

Urgent

Option

Reserved

Code
Bits

Data...

Source Portnumber of the calling port


Destination Portnumber of the called
port
Sequence numbernumber used to
ensure correct sequencing of the arriving
data
99

TCP Segment Format


32

Acknowledgement
HLEN
Number

16

16

16

0 or 32

Reserved

Code
Bits

Window

Checksum

Urgent

Option

Data...

Acknowledgment numbernext expected TCP


octet
HLENnumber of 32-bit words in the header
Reservedset to zero
Code Bitscontrol functions (such as setup and
termination of a session)
Windownumber of octets that the sender is
willing to accept.
100

TCP Segment Format


16

16

0 or 32

Checksum

Urgent

Option

Data...

Checksumcalculated checksum of
the header
Urgent Pointerpoints to the end of
the urgent data
Optionsone currently defined:
maximum TCP segment size
Data field can be varied size.

101

Port Numbers
Application
Layer

Transport
Layer

F
T
P

T
E
L
N
E
T

S
M
T
P

D
N
S

T
F
T
P

S
N
M
P

21

23

25

53

69

161

TCP

Port
Numbers

UDP

102

Port Numbers/Socket No
Keep track of conversation of data.
Controlled by IANA.
Port No have certain assigned ranges.
< 1024 are assigned to well known ports.
>= 1024 are dynamically assigned by host
application.
Destination can select correct application using
port number.
103

TCP Port Numbers


Source
Port

Telnet Z

Dest.
Port

Host A

Host Z

SP

DP

1028

23

Dest. port = 23.


Send packet to my
Telnet
application.

104

TCP Handshake/Open Connection


Host A

Host B

Send SYN
(seq=100 ctl=SYN)
SYN received

Hosts A initiates the connection by sending a


packet with in an ISN with a value of 100 and
a SYN bit indicating a connection request.
It sends the SYN to check that host B is ready
to establish a TCP connection.
105

TCP Handshake/Open Connection


1

Host A

Host B

Send SYN
(seq=100 ctl=SYN)

SYN received

2
SYN received

Send SYN
(seq=300 ack=101 ctl=syn,ack)

When host B receive the SYN segment, it records As ISN as


a value of 100.
When host B is ready to start the TCP session, it sends an
ACK segment host A's SYN.
This ACK has a value of 101, which indicates that host B has
received segment 100 and expects segments 101 next.
Host B sends a SYN congaing its own ISN (300) to host A. 106

TCP Handshake/Open Connection


Host A

Send SYN
(seq=100 ctl=SYN)

SYN received

Host B

SYN received

2
Send SYN
(seq=300 ack=101 ctl=syn,ack)

Established
(seq=101 ack=301 ctl=ack
Data)

Host A acknowledges host B's SYN with an ACK.


This ACK has the value of 301, indicating host A has
received segment 300 and expects segment 301 next.
107
Data transfer can now begin.

Internet (Internetworking) Layer

The internal layer has the task of exchanging

datagram across the network boundaries.

It is therefore also referred to as layer that

establishes internetworking.

It defines and establish the Internet.


The primary protocol in this scope is the Inter

Protocol (IP). Its function in routing is to transport


datagram

to

the

next

IP

router

that

has

the

connectivity to a network closer to the final data


destination.
To be continued...

108

The network layer protocol performs IP layer packets

forwarding and routing, forwarding packets from their source


to their destinations, based on their destination IP addresses.

The IP protocol runs all the nodes on the TCP/IP network,

including the hosts and the forwarding equipment of IP


packets on the network.

The IP protocols supports connectionless transmission ,

which can neither avoid loss of packets nor ensure the


sequence that the packets arrive. This makes the packets
forwarding equipment not need to save any status about data
streams, which greatly enhance the efficiency of packets
forwarding.
To be continued...

109

IP (Internet Protocol): Provides the transport layer with

network service.

ICMP (Internet Control Message Protocol): Reports error and

other cases that deserve attention.

ARP (Address Resolution Protocol): Translates IP addresses

into physical addresses.

RARP (Reverse Address Resolution Protocol): Translates

physical addresses into IP network addresses.

110

Link (Network Interface & Hardware) Layer

This layer covers the physical media layer network

technology. It supports nearly every data link topology,


e.g. Ethernet, Token Ring, Frame relay, ATM.

It also defines the Information frame formats for

various physical media connections.

The Link Layer is used to move packets between the

Internet Layer interfaces of two different hosts on the


same link.

these will performs data link functions such as adding

a packets header to prepare it for transmission, then


actually transmit the frame over a physical medium.
To be continued...

111

The TCP/IP model includes specifications of translating

the network addressing methods used in the Internet


Protocol to data link addressing such as MAC (Media
Access Control)

The Link Layer can also be the layer where packets are

intercepted to be sent over a virtual private network or


other network tunnel.

112

The World is Integrating

113

Triple play
Marketing Plan
For PTCL

114

What the customer wants


71% of consumers would prefer a single
bill for all of their communication services
37% said they would switch to a telco for
TV services
71% of consumers want cable TV as part
of their bundle

115

Why offer Triple play?

Increases per customer revenue


Keeps the customer loyal
TV services are sticky
Resulting in overall revenue growth
Enables service offering growth
Internet on TV, Gaming, Video on demand etc.
40% of premium TV customers take VoD
Places the provider as the gateway to all the
Concentric Diversification of communication business
into convergence.

116

Market Summary
Estimated number of TV homes-8 million
Estimated number of existing CATV
customer- Karachi 929,000 Lahore
479,000 Islamabad 142,000.
All these customers are more or less with
traditional cable operators.

117

Global Broadband Video Subscriber


Market Development

Subs(M)

15
10

Broadband Video
Subscribers

5
0
2003 2004 2005 2006 2007

118

Product Features
Cable TV and Multimedia bi-directional
service.
Cable TV Channel 95
High speed internet.
VPN

119

Optional services

IP telephony
Video conferencing
Interactive video games
Hard disc sharing
VOD (video on demand)
Pay per view

120

EXAMPLES TO IPTV
Following are example of IPTV

Video on Demand.
Broadcast Television.
Competitive TV services over managed IP networks
with two way connection.

121

EXAMPLES TO IPTV

IPTV is distinctly different from Internet Video that


simply allows users to watch videos, like movie
previews and web-cams.
Following are not IPTV

Video streaming over internet


Watching TV on your PC (Personal Computer)
Unproven Business models for media and TV
services

122

NEW SERVICES EMERGING

123

NETWORK CONFIGURATION OF
IPTV IN PAKISTAN
Islamabad, IBA-1
Exchange

12410

Legend:

3.After authentication
,AAA return different IP
Pool to BRAS

12410

STM1 POS Link


STM4 POS Link
GCigabit Ethernet Link
E3 Link
Fast Ethernet Link
Dark Fiber

AAA

Gigabit FIBER Link

Rawalpindi, Satellite
Town

4.BRAS assign IP
address from IP pool

2.PPPoE stream
BRAS

BRAS

BTV and VOD

DSLAM
CPE/HGW

SDH
WEB

STB

pots

1.Distinguish different
application by Domain name

PC

124

Equipment Needed for Implementing


TV/IP Solution
Headend Equipments/Technology

IPTV Headend infrastructure is very similar to Digital TV Headend. It


composed of MPEG Encoder, Streamer, CAS Headend, VoD (Video on
Demand) Server, EMS, EPG Server and so on.

TV Headend provides MPEG2 or MPEG4 Live TV contents to STB.


IPTV Headend receives, decode and decrypts video, audio and data
content from a variety of sources, such as satellites, terrestrial, studio
and storage media and convert it through compression techniques
into IP multicast encapsulated MPEG streams.

Encoder, the core part of Headend, implements real-time encoding and


transcoding of MPEG2 and MPEG4 through the hardware or software
125
component based on business model.

Streaming Server

Optibases MGW 5100 streaming platform resides at the head-end.


MGW 5100 transmits the streams to the switch or router which
transfers them over the backbone to the central/remote offices,
and from there to the end user location.
An additional MGW 5100 server can reside at the central office
where it receives local live feeds for transmission to targeted
areas.

Video Server

Video servers fulfill several purposes at head-ends. For store and


forward transmissions, they store digitally encoded content and
stream it through level III devices via operators networking
infrastructure.

They receive newly encoded digital content that is uploaded from


the MGW 5100 server.
They also enable time-shifted TV applications. For this purpose,
MGW 5100 encodes all channels on a daily basis uploading them
to the video server. Viewers at home can then watch any program
at a time convenient to them.
126

Level III Device

Switch or router that supports multicast transmission. The


router or switch resides at the head-end, interfacing with the
network. Another router or switch receives data at the central
office and transmits either to DSLAMS located there, or into
end-user Ethernet based network .

DSLAM

The DSLAM (Digital Subscriber Line Access Multiplexer)


resides at the central office, connecting xDSL subscribers to
the backbone and subsequently to the head-end.
When distributing TV over IP, the DSLAM should support
multicast transmission. If it doesnt, the switch or router at the
central office has to replicate each channel for each request.
This can cause congestion at the DSLAM input level. If the
DSLAM supports multicast, it receives one stream for each
channel and replicates the stream for each end point.
127

CPE (Customer Premises Equipment)

The equipment located at the end-point that

receives the TV/IP stream. Usually the term CPE


refers to the DSL modem. The DSL Modem
receives the stream from the DSLAM or level III
device and transfers it directly to the PC for
display on the desktop or to the IP STB.

IP Set-Top-Box

The IP STB receives the IP stream, and decodes

the stream for display on the TV. Typically, the IP


STB receives the stream from the CPE. Some
STBs can receive the IP stream directly from the
DSLAM, and serve as CPE as well.

128

CPE SOLUTION
Home network
Router
IAD DHCP

NGN

BRAS

PHONE
PPPoE
PC(FE/USB)

internet
GE
HG510
DSLAM

IP network
Multicast
Router

Video

Notepad(WLAN)
PPPoE
TV

DHCP Server(1,2,
)

STB
CPE

NSP

ISP

ISP/ASP

129

End-point Configuration

The TV/IP stream is fed into the CPE (Customer Premises


Equipment), in most cases a modem. The modem transfers the
MPEG-2 or MPEG-4 stream to an IP/STB which decodes the
stream for display on a TV set. MPEG-4 streams can also be
displayed on PCs using the Microsoft Media Player. If there is
sufficient bandwidth between the central office and the endpoint, two channels can be streamed to two IP STBs.

Modems

Modems are also a critical piece of the last mile. Each modem
must interoperate with the DSLAM to ensure maximum
performance over the copper plant. It is highly recommended
that providers purchase a modem that is certified by the
DSLAM manufacturer not only for Internet data access, but
also for the passage of video. Modems should have multiple
Ethernet ports to facilitate multiple STBs or PCs within the
home. A switch in this device is preferable to a hub; the switch
insulates video traffic within the home from other traffic
generated on the network and in the home.
130

Middleware

Middleware refers to the software that integrates the


various parts of the IP over TV solution.

Currently, Optibase maintains strategic partnerships with


iMagicTV and Myrio, two of the leading streaming
middleware providers.

Middleware is installed along the streaming media chain,


starting at the Head-end and reaching into consumers
homes in the form of software running on IP set-top-boxes.

131

Middleware takes care of the following:


Media Asset Management
The software that enables rich media service providers to manage
content, distribution and data rights control. Media asset
management includes channel management and scheduling.
Media asset management solutions also let operators customize
programming line-ups and update viewing rates. At the end-point,
media asset management solutions let consumers create
customized viewing profiles, track viewing habits and account
information and implement parental controls.
Billing
The entire business model of rich media and digital TV services
rests on advanced billing capabilities. Billing solutions need to be
able to track individual usage based on the delivery of
customized interactive content. Billing solutions integrate with
other middleware solutions.
Programming
The management software controls the customized programming
that is targeted at a specific user or group of users. Usually the
program guide is downloaded and updated on a regular basis.
132

IPTV Standards
solutions are based on a combination of standard and
IPTV
proprietary technologies. There is no existing standard which cover

all IPTV needs but there are multiple standards which could fulfill
certain requirement of IPTV. MPEG : MPEG standards can be used
for Content Encoding, Streaming and delivering. MPEG-21. DSLForm : For remote management protocol TR-069 and for Qos TR098 can be used. CEA (Consumer Electronic Association) and
DLNA (Digital Living Networks Alliance): defines some standards for
home equipments. And DVB standards are used for delivering the
contents.

are other standardization bodies which are doing efforts for


There
IPTV like, The IPTV Interoperability Forum/ Alliance for

Telecommunications Industry Solutions (IIF/ATIS). ITU-T IPTV


Focus Group formed Apr 13th, 2006 to coordinate the IPTV global
standardization efforts. Strong push from Korea with
Telecommunications Technology Association (TTA), China with
Communication Standards Association (CCSA), and Japan with
Association of Radio Industries and Businesses (ARIB).
133

Security and Conditional Access

Security is a critical part of the streaming solution

when it comes to conditional access (ensuring that


content is viewed by the audience it was intended for
only) and protection against piracy. Conditional
access solutions use algorithms to encrypt and
scramble content. Content is encrypted at the headend and decoded by smart cards installed in set-topboxes at end-points.

134

THANK YOU

135

S-ar putea să vă placă și