Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BULGARIAN
ACADEMY
OF
SCIENCES
PROBLEMS
, ROBOTICS, 47
47
. 1998 . Sofia
The ideaof IntegratedServices DigitalNetwork (ISDN)appeared atthe beginningof the 70-ies in Europe. The rapid development of new technologies in telecommunications startedoffitsrealizationandstandardizationinBulgariatoo.
96
The interface between ISDN users TE and the network is marked as ISPBX - ISDN Private Branch Exchange. The broadband ISDN (B-ISDN) is comparatively new and is used mostly for image transfer(for examplevideo conferencesor LANsinterconnection). TheB-ISDN provides data rate exchange of hundreds of Mbps. ISDN follows theOSI structureof ISO.It providestransport services between two TEs. The B- and D-channels work in parallel and are accessible through a common point TSAP (Transport Service Access Point). The separation of the two types of channels is transparent for the user; they have their own protocols for levels 2 and 3. Each independently attached unitreceives its own TSAP to access the transport level. Each participant in ISDN has only one NSAP point (Network Service Access Point) for the networklevelaccess. The standardized digital communication has to meetthe following basic requirements: voice, data,video andtext tobe transmittedon thesame line; only one connector plug is needed; decreaseof costsontransmittingnon-voice messages; connectionofprivateinstallationsasbranches; decreaseoftime,neededforcallsetup. The telecommunication companiesin different countries areaiming atuniting the alreadyexisting separatenetworks andthefutureones ina singlenetworksoto decrease thecostsandincreasetheefficiencyoflinks. ISDNdraws theinterest towardsitself ofbothpublicandprivateexchanges (PABX). It is transmission media independent, enables both new and old TE to be used and integratesallcurrentandfuturenetworkservices.
2. ISDN Standardization
Thequestionof standardizationisofparticularimportance.Withtheimplementation of ISDNa newgeneration ofTE iscreated, whichto satisfythe requirementsfor integrated servicesnetworkingandtoperformdifferentfunctionsinpublicandprivatenetworks.On theother handthe attachmentof standardizedand specificunits tothe ISDNnetwork has tobepossible. CCITT hasalready accepted to a certain extent the standards for levels 1 and 2 of the OSI model of ISDN. ETSI (European Telecommunication Standards Institute) and ECMA (European Computer Manufacturers Association) are working on standardization of level 3 on European scale (EURO-ISDN). A borderline step in the introduction of the EURO-ISDN has been made by several European countries by introducing their own variants ofthe D-channel protocol on level 3, such as the protocols of theGerman Post 1TR6 and the French protocols VN2/VN3. CCITT gives the following recommendations for ISDN: I.100 general recommendations, I.200 definitionofservices, I.300 networkaspects, I.400 physicalaspectsandtransmissionprotocols, I.500 interfaceswithinthenetwork, I.600 principles fornetworkmaintenance. Thephysical levelof thenetwork isformed accordingto recommendationsI.430 and I.431 for ISDN with Basic and Primary Access respectively. On the D-channel protocol Q.921 is used for level 2 (LAPD) and Q.931 for level 3. On channel B the HDLC X.75
97
symmetrical protocol is used forlevel 2 (LAPB) andISO 8280(X.25) - for level3. Level 4isbroughtout asX.224interface. Different functional groups have been defined in the CCITT model, each of them covering similar users functions of ISDN. The NT1 (Network Termination) functional grouprealizestheconnection onthe sideof thepublic network.NT2 ensuresdifferent TE for ISDNto makeuse ofthe cable.For examplea privatetelecommunication installation is a complex and powerful functional group NT2. Sample point S is the boundary between NT2 and TE1 or TA (Terminal Adapter), i.e.theinterface oftheusertowards ISDN.TheS-pointinPrimaryAccessISDNis usually used to connect to mainframe. The S interface performs levels 1 and 2 in the OSI model and satisfiestheincreasingnumberofstandardsonlevel 3. Sample point T separates NT2 from NT1. When TE is directly attached to the public networkinpointNT1,point ScoexistswithT. SandTaretoa greatextentinternationally standardized. S p e ci f i c manufacturers fu ncti ons PrivatestandardsS (ECMA)
Fig. 1
S/T (directconnection)
TE 1
NT 2
NT 1
S
TE 1 I SD N
T S
NT 2 NT 1
R
TE 2 TA
Functional Blocks:
NT 1 NT 2 TE 1 TE 2 TA S T R
Network Termination 1 Network Termination 2 Terminal Equipment 1 (ISDN) Terminal Equipment 2 (non-ISDN) Terminal Adapter User Interface ISDN Interface Auxiliary Interface to the TE Functional Group Inte rface
Sample Points:
Fig. 2
98
One of themajor objectivesof people,working onthe problems of standardization is thecompatibilityofTE, i.e.TEfromdifferentmanufacturersto beusedbothinpublic and privatenetworks.ETSIistheresponsibleinEurope forthe standardizationofpublic ISDN,hence forT andS/T interfaces.ECMA takespart instandardizing private networks anddefines theS andQinterfaces(links betweenISDN installations). Themanufacturersoftelecommunicationinstallationsoffersomespecificservicesto theircustomers, whichare mostlyinteresting forthePABXsusers butnotforthe public network.Thosespecificprivateservices arestandardizedbyECMA.Theresult isthat the standard for the S interface within the boundaries of ECMA covers much larger number offunctions,butithastoremaincompatiblewiththeS/Tinterfaceofthepublicnetwork. Two types of protocols for TE (level 3) are defined in the CCITT recommendations foradditionalservicescontrol:pulseandfunctional.Thepulseprotocoldoesnotrequire the TE to know anything about the call and the handling of the additional service; the intelligenceisinthenetworkitself.ThecommunicationbetweentheTEandthenetwork iswithimpulses,interpretedandhandledbythenetworkThepulseprotocolsmakepossible theearlyintroductionofadditionalISDN-services. Thespecificservices,requiring intelligentinterworkingbetweentheTEand the networkcannotberealizedbypulseprotocols.Thefunctionalprotocol,usedinthatcase, requiresthattheTEreceivesinformationaboutthecalledadditionalservice,asitdoespart of the handling. The communication between the TE and the network is by functional messages. In that case the TE is more intelligent and takes over most of the line management.
99
alternatedestinationcallredirection(ADCR)service.Callsarecompletedregardlessof whether either location is anISDN one. The ADCRservice canbe usedas acall distributoron networkbase tohelp customers balancetheloadordistributetheincomingcallsbasedonreal-timeevents.Italsohelps more incoming calls to be completed in case of network access facilities or premises malfunctions.Anycall completionproblemsrelatedtotrafficsurges,longabnormalcall holding times,local agent disruptions etc.are treatedby ADCR. 3.3.CallsSelection ISDN customer can dedicate selected B-channels for a specific service when working in real-time, or share it on demand among several services. Channels are allocated to incoming andoutgoing callrequests ona FIFObasis. Overflowand peaktraffic resources can be shared among combined services, eliminating the need for special dedicated overflowcircuits.Thesecircuitsareusedtohandleburstsoftrafficforeachserviceandare idle therest ofthe time.Customers of ISDN can control accessto networkservices, for example, handlingtrafficpeaksforahigh priorityservicebylimiting theuseofalower priorityone.Thebenefitissavingsforthecustomerbecausefewerfacilitiesarerequired. 3.4. Flexible Bandwidth on Demand The service is proposed in ISDN Primary Rate Interface. On customers demand Bchannels can be bundled into groups of 1, 6 or 24 channels. Bandwidth of 64 Kbps, 384 Kbpsor1536Kbpsisofferedrespectively.Therequestforbundlingismadeduringthecall setup.Customersnolongerneedtomaintaindedicatedbroadbandordatafacilities,hence costs are cut. Broadband channel bundling to 384 Kbps or 1536 Kbps on demand is particularlyconvenientforhigh-qualitycolorvideoteleconferencing,computergraphics, CAD, image and data transfers. 3.5. D-Channel Backup The D-channel backup service improves access reliability for ISDN customers. The arrangement is with two D-channels: an active and a spare one. If the prime D-channel fails,thebackuponetakes overimmediately.Allstablecallsare maintainedandnormal callhandlingisresumed. 3.6. User-to-UserInformation Forwarding User-defined,percallinformationis passedthroughthenetwork betweenoriginating and terminatingcall parties.Both partieshavetoterminate onISDN PrimaryRateInterface equipment. This user-defined information is associated withthe standardcall control messagesand isdelivered atthebeginningof thecall withthecallrequest. Thanksto it an ISDN terminal can display the calling party name or a brief message when the phone r i n g s . Typicalexampleof ISDNservicesuse areemergencyresponseanddisasterrecovery centers organized in the USA and some European countries. Emergency response centers arecomputerized alarmmonitoring organizations,using ISDN calling partyand dialed numberidentificationservicestolocateandrespondtodifferentemergenciessuchasbreakins,fire,heatandwatercrisesetc.Thecallingpartynumberofthecustomerindicatesthe location of theemergency. When a call is received at the emergency response center, a databaseimmediatelyretrievesthecustomersfilebasedonthecallingpartyidentification. This file shows the agent the whole necessary information the customers name and address, alist ofpeople tocontact, howto handlethe alarmetc. AutomatedISDNcalling partynumber identificationhasconsiderablyincreasedtheaccuracy oftheserviceas it eliminates humanerror as the majorfactor infalse alarms.
100
UsingISDN servicescustomers havegained accuracy of information,efficiency by shorteningcall holdingtime and faster call set-up, improvedoperation performance, reliability, andreduced costs.The ADCRfeature improvescall completionand telecommunicationsreliability.Customersrevenuesareincreasedbyredirectingandcompleting callsformerlyblockedbytrafficsurges,inefficientlyengineeredcustomeraccessfacilities, orservicedisruptions.Thebroadbandcapabilitiesanduser-to-userinformationtransfer service of ISDN give customer the opportunityto create new servicesand markets.
101
polling to exchange management information. Much of this polling can be eliminated by the so called spoofing technique. It involves the reduction or elimination of polling transmissions overwide arealinksandthelocalemulation ofthe responsesthat devices ateachendofthelinksexpecttoreceive.Thelatterisnecessarytokeepsessionsaliveby givingdevices theimpression thatthe remoteend ofthe linkis communicatingwith them directly.Spoofingalsoinvolvesmaintainingofdialoguebetweenremotedeviceswhichis necessary forthe networkto performits functionefficiently.AsISDN isoften soldas a cheaper alternative to permanent leased circuits for linking remote offices into core backbone networks spoofing becomes very important as part of the broader subject of bandwidth management; a spectrum of techniques for making use of WAN links most cost effectively.Thisconcernsespeciallydial-upservices(ISDNinparticular)whereyoupay for what you use. Besides spoofing, bandwidth management includes also data compression,techniques forminimization ofbandwidth ortime inlong distancelinkstransmiss i o n s ,e t c . Spoofing is normally handled by routers on each LAN. The problem with IPX spoofing isthat thereareseveraltypes ofIPX datapackets thatneed spoofing,and only some of them arecovered by the majority of routers. Therouting informationprotocol (RIP)and theservice advertisingprotocol(SAP) packets are most often spoofed ones. RIP packets specify paths between LANs and help routersto keeptheir tablesup todate, whileSAP packetsadvertise theavailability of servers, printers and other resources on aNetWare LAN. Other IPX packets that need to be spoofed are the serialization packetsNovell license numbers broadcasted by the NetWareserversagainstpiratedcopies,watchdog packets- checkingfor illegalusage of NetWare,SPX packets- anextension of IPX protocol,guaranteeing deliveryof data. Apart from IPX there are some less common protocols needing spoofing, such as Banyan Vines IP, Microsofts WFW over TCP/IP, etc. Theneedforspoofingdoesnotconcernjustthenetworklayerprotocols(suchasIPX), butcanbe requiredatanylevelatwhichmessages aregenerated.Besidesitcanbeapplied atmorethanonelevelatatime,reducingoreliminatinglowlevelnetworkpollsandhigher levelcommunicationbetweenapplications.Theobjectiveisspoofingtoprofitablyprevent unnecessarilyraisedISDNcalls. In order to keep ISDN call time to a minimum some other techniques are needed as well.Theproblemisthatitisimpossibletoeliminatealltransmissionofdata,notdirectly linked to an users application because some management information has to be transmitted for the proper work of the network. However this can have a small impact on the network by compressing andsending it at the right time. Theinformation whichis absolutelyneeded tobe transmittedis therouting tables updates, as they age and eventually totally disappear. Over ISDN, the number of these updates should be keptto aminimum, meanwhileensuring routerstables to be upto date. Besides these updates, the SNMP management systems also generate polls that should be minimized too. Thereare three methods, used for transmittingthe routing table updates and SNMP p o l l s : timed updatesthe longest used method, but it does not work well for ISDN. Updates aretransmitted atpreset intervals,consuming alone20% onaverage ofthe total bandwidth,which isratherunacceptable; triggeredupdates a bettermethod, asupdates aretriggered onlyin caseof some significant changes that have to be reported. The method is not applicable on large networks, becausethere are too many changes to be reported; piggyback updates the optimum solution for ISDN networks. Polls and updates are only transmitted when an ISDN call for user data sending has already been raised. Exception iswhen eithera linkor arouter failureisolatesanISDN routerand theaim is 102
tobringitbackintothenetworkincaseanalternativepath exists. What is the future application of ISDN? ISDN plays an integral role in the development of intelligent networking and premisesapplications.Callredirection,networkcallqueuing,andannouncementsrequire intelligent premisesinteraction. ISDN shares intelligence between the networks and premisesinordertoprovideflexibleandcustom-orientedservices.Theintroductionofnew modern technologies - ATM, Frame relay etc. - in ISDN is a tendency in its future development. In Bulgaria the Bulgarian Telecommunication Company has started the introduction of ISDN services in some public exchanges. Some state institutions and business customerswillbethefirstattachedtothenetwork.
References
1. B i r b e c k, J. ISDN routing: the spoof issue. Telecommunications, August 1995, 106111. 2. C a m p b e l l, R.C., S. J. S o b e l. AT&T aggressively moves ISDN forward. AT&T Technology, 6, 1997, No 1, 2229. 3. S c h n e l l, G. u. a. Bussysteme in der Automatisierungstechnik. Wiesbaden, Verlag Vieweg, 1994. 4. S u l z b a c h e r, N. Datenkommunikation ueber das ISDN zwischen DOS-und UNIX-PCs. Philips Telecommunication Review, 50, 1992, No 2, 2531. 5. W i l l e m s t e i n, R. A. S. ISDN-Schhnittstelle der Tk-Anlage SOPHO-S fuer gemischten Einsatz von herstellerspezifischen und standardisierten Endgeraeten.Philips TelecommunicationReview, 50, 1992, No 2, 3748.
ISDN
, -
, 1113
( ) ISDN . : , . : , , , , , . NT1, NT2, S T OSI. ISDN Internet. . . ISDN . () (). ISDN : ATM, Frame relay . 103