Description
New interfacing technology allows multiple access networks made by different manufacturers to be attached to the same core telecommunications system, facilitating growth and raising significant regulatory, technical and competitive issues. Access Networks: Technology and V5 Interfacing is the first book to present a unified view of this technology and specifically V5, the global interface standard. The book examines both the fundamentals and advanced aspects of network access technology, and the implications for the future of access networks, up to soliton transmission and quantum cryptography. The author organizes the book into two sections: technological issues and interface issues. A comprehensive examination of the V5 interface standard covers its architecture, multiplexing, message formats, signaling, control protocols, PSTN protocol, bearer channel connection protocol, link control protocol and protection protocol. The book provides separate chapters on advanced copper, optical fiber, advanced optical, and radio access technologies; the powering of access networks; ATM in the access network; and the supported services. Each chapter ends with a summary of the material covered. This groundbreaking book facilitates a rapid understanding without relying on mathematics. It is an essential resource for both graduate students and telecommunications engineers involved in the selection of new technologies and the design of telecommunications systems and equipment.
Table Of Contents
1.Introduction 2. Advanced Copper Pair Technology: Background. Basic Digital Transmission. Pair-Gain Systems. High-Speed Digital Subscriber Loop. ADSL and VDSL. Summary. 3. Optical-Fiber Technology: Background. Optical and Optoelectronic Components. Fiber Architectures. Duplexing and Multiplexing. Upgrading to Broadband. Common Fallacies. Summary. 4. Advanced Optical Technology: Optical Amplifiers. Coherent Optical Systems. Distributed Switching and Optical Ether. The Limits of Optical Transmission. Soliton Techniques. Quantum Cryptography. Summary. 5. Radio Access Technology: Background. Recent Developments in Radio Systems. Cellular and Cordless Technology. Applications of Radio Technology in Access Networks. The Adoption of Radio Technology in the Access Network. Summary. 6. The Powering of Access Networks: The Traditional Balance. Problems for New Technologies. Battery Backup. Remote Feeding. Local Powering. Alternatives to Battery Backup. Summary. 7. ATM in the Access Network: An Overview of ATM. ATM on an Optical Access Network. Protocols for Multipoint ATM Operation. General Problems and Misconceptions. Deployment of ATM Access Networks. Summary. 8. Services Supported by Access Networks:Introduction. Simple Video Services. More Sophisticated Services. Teleaction Services. Social and Psychological Factors. Summary. 9. V5 Interfaces and Architecture: The V5 Access Model. Services and User Ports. V5 Links and Time Slot Structure. Bearer Time Slots and V5 Traffic Capacity. Summary. 10. V5 Multiplexing and Message Formats: Physical Multiplexing. Frame and Message Level Multiplexing. Frame Layer Envelopes. Layer 3 Message Formats. Conventions Used for Identifying Messages. General Observations. Summary. 11. ISDN Signaling and Multiplexing: The Frame Relay Concept. The Debate Over ISDN Multiplexing. V5 Layer 2 Multiplexing for ISDN. ISDN Communication Paths and Channels. Summary. 12. The Control Protocol: The Format of Control Messages. Port Control Messages. Common-Control Messages. Concluding Remarks. Summary. 13. The PSTN Protocol: The PSTN Problem. Basic Call Control Requirements. PSTN Stimuli and Information Elements. Call Control Messages. Example of the Use of the PSTN Protocol. Summary. 14. The Bearer Channel Connection Protocol: Allocation, Concentration, and Reliability. Requirements for the BCC Protocol. Bearer Channel Connection Messages. Summary. 15. The Link Control Protocol: Control of a Multilink Interface. Link Integrity Checking. Link Blocking and Unblocking. V5.2 Link Control Messages. Other Interfaces. Summary. 16. The Protection Protocol: The Purpose of the Protection Protocol. Fundamentals of V5.2 Protection Switching. V5.2 Protection Protocol Messages. Generalization to Other Interfaces. Summary. 17. The VB5 Interface 18. Concluding Remarks
Author
-
Alex Gillespie
Alex Gillespie holds a masters in Theoretical Physics from Cambridge University and a Ph.D. in Particle Physics from Durham University. Since 1988, he has been with BT and has edited several international standards. He is the chairman of the Access and Switch Management group in ETSI and has been a guest editor of special issues of major communications magazines.