Principles of Communications Networks and Systems
()
About this ebook
The book is designed to present the material in an accessible but rigorous manner. It jointly addresses networking and transmission aspects following a unified approach and using a bottom up style of presentation, starting from requirements on transmission links all the way up to the corresponding quality of service at network and application layers. The focus is on presenting the material in an integrated and systematic fashion so that students will have a clear view of all the principal aspects and of how they interconnect with each other.
A comprehensive introduction to communications systems and networks, addressing both network and transmission topics
- Structured for effective learning, with basic principles and technologies being introduced before more advanced ones are explained
- Features examples of existing systems and recent standards as well as advanced digital modulation techniques such as CDMA and OFDM
- Contains tools to help the reader in the design and performance analysis of modern communications systems
- Provides problems at the end of each chapter, with answers on an accompanying website
Related to Principles of Communications Networks and Systems
Related ebooks
Wireless Communications: Algorithmic Techniques Rating: 0 out of 5 stars0 ratingsLTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks Rating: 0 out of 5 stars0 ratingsNext Generation Wireless Communications Using Radio over Fiber Rating: 0 out of 5 stars0 ratingsMultihop Wireless Networks: Opportunistic Routing Rating: 4 out of 5 stars4/5RF and Microwave Engineering: Fundamentals of Wireless Communications Rating: 0 out of 5 stars0 ratingsSignal Integrity: From High-Speed to Radiofrequency Applications Rating: 0 out of 5 stars0 ratingsLTE-Advanced and Next Generation Wireless Networks: Channel Modelling and Propagation Rating: 0 out of 5 stars0 ratingsPetri Nets: Fundamental Models, Verification and Applications Rating: 0 out of 5 stars0 ratingsPower Line Communications: Theory and Applications for Narrowband and Broadband Communications over Power Lines Rating: 0 out of 5 stars0 ratingsReconfigurable Radio Systems: Network Architectures and Standards Rating: 0 out of 5 stars0 ratingsMobile and Wireless Communications for IMT-Advanced and Beyond Rating: 0 out of 5 stars0 ratingsHeterogeneous Cellular Networks Rating: 0 out of 5 stars0 ratingsCognitive Communications: Distributed Artificial Intelligence (DAI), Regulatory Policy and Economics, Implementation Rating: 0 out of 5 stars0 ratingsModeling and Dimensioning of Mobile Wireless Networks: From GSM to LTE Rating: 0 out of 5 stars0 ratingsPractical Guide to MIMO Radio Channel: with MATLAB Examples Rating: 0 out of 5 stars0 ratingsRadio Propagation Measurement and Channel Modelling Rating: 0 out of 5 stars0 ratingsFundamentals of Wireless Communication Engineering Technologies Rating: 4 out of 5 stars4/5Understanding Microelectronics: A Top-Down Approach Rating: 0 out of 5 stars0 ratingsThe LTE / SAE Deployment Handbook Rating: 5 out of 5 stars5/5Digital Filters Design for Signal and Image Processing Rating: 0 out of 5 stars0 ratingsRadio Access Networks for UMTS: Principles and Practice Rating: 5 out of 5 stars5/5Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks Rating: 0 out of 5 stars0 ratingsNew Telecom Networks: Enterprises and Security Rating: 0 out of 5 stars0 ratingsMicrowave and Millimeter Wave Circuits and Systems: Emerging Design, Technologies and Applications Rating: 0 out of 5 stars0 ratingsPervasive Computing and Networking Rating: 0 out of 5 stars0 ratingsWireless Multi-Antenna Channels: Modeling and Simulation Rating: 0 out of 5 stars0 ratingsTelephone Communication System Essentials Rating: 0 out of 5 stars0 ratingsSignal Processing and Integrated Circuits Rating: 0 out of 5 stars0 ratingsSatellite Systems for Personal Applications: Concepts and Technology Rating: 0 out of 5 stars0 ratingsComputational Number Theory and Modern Cryptography Rating: 3 out of 5 stars3/5
Telecommunications For You
Codes and Ciphers Rating: 5 out of 5 stars5/5Digital Filmmaking for Beginners A Practical Guide to Video Production Rating: 0 out of 5 stars0 ratingsLinear Algebra Demystified Rating: 0 out of 5 stars0 ratingsProbability Demystified 2/E Rating: 4 out of 5 stars4/5The Great U.S.-China Tech War Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5LTE for Public Safety Rating: 0 out of 5 stars0 ratingsQueueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications Rating: 5 out of 5 stars5/5Trigonometry Demystified 2/E Rating: 4 out of 5 stars4/5Making Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists Rating: 0 out of 5 stars0 ratingsBackhaul Deployment Report Rating: 0 out of 5 stars0 ratings101 Spy Gadgets for the Evil Genius 2/E Rating: 4 out of 5 stars4/5Aeronautical Air-Ground Data Link Communications Rating: 0 out of 5 stars0 ratingsThe Twittering Machine: How Capitalism Stole Our Social Life Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Understanding WiFi Technology: A Comprehensive Guide (Second Edition) Rating: 0 out of 5 stars0 ratingsThe Deal of the Century: The Breakup of AT&T Rating: 4 out of 5 stars4/5The Telecommunications Handbook: Engineering Guidelines for Fixed, Mobile and Satellite Systems Rating: 0 out of 5 stars0 ratingsVirtual Selling: How to Build Relationships, Differentiate, and Win Sales Remotely Rating: 4 out of 5 stars4/5Math Word Problems Demystified 2/E Rating: 3 out of 5 stars3/5Quantum Field Theory Demystified Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5OSS Masterclasses - Insights from Thought-Leaders in Operational Support Systems (OSS) Rating: 0 out of 5 stars0 ratingsAdvanced Statistics Demystified Rating: 4 out of 5 stars4/5IoT Time: Evolving Trends in the Internet of Things Rating: 5 out of 5 stars5/5Business Math Demystified Rating: 4 out of 5 stars4/5
Reviews for Principles of Communications Networks and Systems
0 ratings0 reviews
Book preview
Principles of Communications Networks and Systems - Nevio Benvenuto
Preface
This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in research and in teaching, which makes this book very consistent in both approach and in the notation used.
The uniqueness of this textbook lies in the fact that it addresses topics ranging from the physical layer (digital transmission and modulation) to the networking layers (MAC, routing, and transport). Moreover, quality of service concepts belonging to the different layers of the protocol stack are covered, and the relationships between the metrics at different layers are discussed. This should help the student in the analysis and design of modern communications systems, which are better understood at a system level.
A suitable selection of chapters from this book provides the necessary teaching material for a one-semester undergraduate course on the basics of telecommunications, but some advanced material can be also used in graduate classes as complementary reading. The book is also a useful comprehensive reference for telecommunications professionals. Each chapter provides a number of problems to test the reader's understanding of the material. The numerical solutions for these exercises are provided in the companion website, www.wiley.com/go/benvenuto2.
The content of each chapter is briefly summarized below.
Chapter 1 Overview of modern communications services, along with the presentation of the OSI/ISO model.
Chapter 2 Analyzes both deterministic signals and random processes. The chapter revises the basics of signal theory and introduces both continuous and discrete time signals, and their Fourier transform with its properties. The concepts of energy, power and bandwidth are also reviewed, together with the vector representation of signals by linear space methodologies. Lastly, this chapter introduces the basics of random variables and random processes, their common statistical description, and how statistical parameters are modified by linear systems.
Chapter 3 Describes how information produced by a source, either analog or digital, can be effectively encoded into a digital message for efficient transmission. We will first introduce the reference scheme for analog-to-digital conversion, and focus on quantization, the operation of approximating an analog value with a finite digit representation. We will also present the fundamentals of information theory with the notion of information carried by a digital message. Lastly we introduce the principles of source coding, state the fundamental performance bounds and discuss some coding techniques.
Chapter 4 Models a transmission medium. Firstly, a description of the two-port network is given. A model of noise sources is then provided and its description in terms of parameters such as the noise temperature and the noise figure is presented. A characterization, especially in terms of power attenuation, of transmission lines, power lines, optical fibers, radio propagation and underwater propagation concludes this chapter.
Chapter 5 Deals with digital modulations. The general theory is first presented, relying on concepts of linear spaces and hypothesis testing. Performance is measured by the bit error probability, which again can be expressed in terms of system parameters. Then, the most important modulations are presented as examples of the general concept. These include pulse amplitude modulation, phase shift keying, quadrature amplitude modulation, frequency shift keying and others. A comparison between the different modulation schemes is carefully drawn. Then, more advanced modulation techniques are briefly presented, namely orthogonal frequency division multiplexing and spread spectrum. Finally, the performance of the digital approach is compared against analog transmission, explaining why digital transmission is so widely used.
Chapter 6 Investigates how an information message can be robustly encoded into the signal for reliable transmission over a noisy channel. We describe the principles of channel coding techniques, where robustness is obtained at the price of reduced information rate and complexity of the decoding process. Then, based upon the fundamentals of information theory introduced in Chapter 3, we aim to establish upper bounds on the amount of information that can be effectively carried through a noisy channel, by introducing the concept of channel capacity. We conclude by describing briefly how recently devised coding schemes allow such upper bounds to be approached closely while maintaining moderate complexity.
Chapter 7 Introduces some basic statistical methods that are widely used in the performance analysis of telecommunication networks. The topics covered are the elementary theory of discrete-time and continuous-time Markov chains and birth-death processes. This theory will be applied in Chapters 8 and 9, where we analyze simple queueing systems, and the performance of channel access and retransmission protocols.
Chapter 8 Presents some basic principles of queueing theory. It starts with the definition of a queueing system in terms of arrival, departure, service processes, queueing processes and service discipline. We then define some basic performance metrics for queueing systems, which are classified as occupancy measures (number of customers in the different parts of the system), time measures (system and queueing times) and traffic measures (average rate at which customer arrive and leave the system). We discuss the concept of system stability, both for blocking and nonblocking queueing systems and we illustrate Little's law, a simple but fundamental result of queueing theory. The chapter concludes with a performance analysis of fundamental queueing models, featuring Markovian as well as non-Markovian statistics for the service process. Examples of the application of the developed theory to practical problems, including some unrelated to telecommunications, are provided throughout the chapter.
Chapter 9 Presents and analyzes link-layer algorithms, especially focusing on aspects related to channel access and retransmission of lost or corrupted data packets over point-to-point links – a technique often referred to as Automatic Retransmission reQuest (ARQ). Channel access protocols are subdivided into the following classes: deterministic access, demand-based access, random access and carrier sense multiple access. Mathematical models are given for each class of protocols, thus obtaining the related performance in terms of throughput and delay. The different channel access schemes are then compared as a function of the traffic load of the system. Next, the chapter presents three standard ARQ schemes, namely, stop and wait, go back N and selective repeat ARQ, which are characterized analytically in terms of their throughput performance. The chapter ends with the presentation of some relevant LAN standards: Ethernet, IEEE 802.11 and Bluetooth, with emphasis on their link-layer techniques.
Chapter 10 Describes all the layers above the data link layer dealing with the interconnection of distinct devices so as to form a communication network. The chapter begins by reviewing a useful mathematical tool for network analysis, namely graph theory. Routing methodologies, i.e., how to find efficient paths in the network, are identified and discussed within this framework. Subsequently, we review how the network layer is implemented in the Internet detailing the Internet Protocol (IP), as well as related issues, including Address Resolution Protocol (ARP) and Network Address Translation (NAT). The chapter describes the implementation of Transport Control Protocol (TCP) and the User Datagram Protocol (UDP)) and application (Domain Name Server (DNS)) layers for the Internet. Some examples of application protocols, that is, HyperText Transport Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) are given.
List of Acronyms
List of Symbols
Chapter 1
Introduction to Telecommunication Services, Networks and Signaling
Lorenzo Vangelista
The goal of telecommunication architectures is to provide people (and machines) with telecommunication services. In this chapter we give the basic definition of telecommunication services and we provide an introduction to telecommunication networks and signaling as well as to the well-known ISO/OSI model.
1.1 Telecommunication Services
1.1.1 Definition
The definition of telecommunication service is quite broad; basically, it can be considered as the transfer of information. In a telecommunication service at least three actors are usually involved:
1. one or more sources;
2. a carrier;
3. one or more receivers.
The source(s) and the receiver(s) are not necessarily human beings; they can also be computers, for example. Usually, they are also called customers
or users
, when we do not need to distinguish between the two roles. The carrier is normally a company owning equipment and resources, for example, frequencies, in the case of radio services. The equipment (hardware and software) that allows the information exchange is called telecommunication network, and this can be classified as a local area network
when serving a specific small geographic area or a wide area network
when serving a large geographic area. As an example the network serving an university campus is a local area network, while a large Internet provider network is a wide-area network.
Telecommunication networks can be categorized in many different ways. The most common classification refers to the services the networks carry. We have then:
telephony networks carrying voice related services;
data networks.
Using another criterion, still based on services, we have:
networks dedicated to one specific service, such as the plain old telephone service (POTS);
integrated services networks designed to carry different services at the same time, for example, the integrated services digital network (ISDN).
1.1.2 Taxonomies According to Different Criteria
In this section we classify telecommunication services according to different criteria, including symmetry, configuration and initialization. We would like to remark that the roles of source and receiver in a communication are not exclusive, that is, each party involved in the communication clearly can act as
1. a source only;
2. receiver only;
3. both source and receiver, at different time intervals;
4. both source and receiver, at the same time (think of ordinary phone calls).
Regarding the symmetry characteristic of telecommunication services, we can distinguish between
unidirectional services, for example, television broadcasting;
bidirectional asymmetric services, for example, Web browsing,¹ where there is a bidirectional exchange of information between the user and the Web server but the amount\vadjust of information flowing from the server to the user is by far larger than that flowing from the user to the Web server;
Bidirectional symmetric, for example, the usual telephone conversation.
If we turn our attention to the configuration of services we can make the following distinction:
point-to-point services, where only two users are involved in the telecommunication service, which in turn can be either unidirectional or bidirectional;
multipoint services, involving multiple users, some acting as sources and some as receivers, possibly changing their roles dynamically;
broadcast services, where a single source of information transmits to many receivers.
Telecommunications services can also be categorized based on their initialization; there are basically three categories
Call-based services: any user needs to have an identifier to activate its service and this can be established at any time. A classical example is a telephone call or conference call.
Reservation-based services: similar to call-based services, except that the service made to the carrier must be scheduled. This is often the case for conference call services nowadays or for bulk-data transfers, usually scheduled overnight.
Permanent-mode services: service is negotiated by a contract between the carrier and the parties involved (two or more) and it is always running from the contract signature on. Examples include data connection between two data centers of a large company or, for a wireless operator without fixed infrastructure, a connection between two of its switches.
From the above examples, we would like to remark that in modern telecommunication networks there must be a mechanism to establish a service as easily as possible; this fundamental mechanism is actually hidden from users. Also, it is a network on its own, with users (usually the real end users) and specific protocols² called signaling protocols, which will be discussed in detail in section 1.5.
Finally, we consider the classification of telecommunication services according to their communication mode. Here we have interactive services and broadcast services. As far as the interactive services are concerned we can distinguish between:
conversational services, usually bidirectional, where there must be very little delay in delivering the information; consider, for example, a telephone call and how annoying a delay could be – it sometimes happens for internet-based calls or for calls using satellite communication links;
messaging services, where there are no strict real time constraints but still the delivery time matters. An example is instant messaging, which is very popular nowadays;
information retrieval services, where the interactivity and real time constraints can be mild, as is the case for a database search.
As far as broadcast services are concerned, considering them from the communication mode point of view, we may distinguish between services
Without session control where a user has no control on what is delivered.
With session control where a user can have some control on how the information is presented to her. An example could be the delivery of the same movie on a broadcast channel using different subchannels starting at different times, so that the user can somehow control the start of the movie at her convenience.
1.1.3 Taxonomies of Information Sources
In this section we classify information sources according to their time-varying characteristics and there are two types of sources:
constant bit rate (CBR): the bit rate³ emitted by the source is constant over time;
variable bit rate (VBR): the bit rate may vary over time.
Example 1.1 A The digital encoding of speech according to the ITU G.711 standard (also known as pulse-code modulation or PCM encoding) produces 64 000 bit/s. This values is constant over time regardless of whether the source user actually speaks or not. We can conclude that a voice signal encoded according to the ITU G.711 standard is a constant bit rate source.
Example 1.1 B adaptive multirate (AMR) is a voice-encoding standard employed mainly in cellular networks like universal mobile telecommunications system universal mobile telecommunications system (UMTS) and it is designed to exploit both the speaker's periods of silence and to adapt to the different conditions of the transmission channels over which the bits are transmitted. If the speaker is silent a special sequence of bits is sent and then nothing is emitted until the speaker starts speaking again. On the receiving side when this sequence is received, noise is randomly reproduced, as a comfort feature, just to keep the receiver aware that the link is not broken. The AMR is basically made of eight source encoders with bit rates of 12.2, 10.2, 7.95, 7.40, 6.70, 5.90, 5.15, and 4.75 kbit/s. Indeed, even if the link between the transmitter and the receiver is fed at a constant bit rate, when the transmission channel deteriorates at some point in time, AMR is informed and selects a lower bit rate. Hence, more redundancy bits can be used (resorting to channel coding techniques) for protecting the voice encoded bits from channel errors. We can conclude that a voice signal encoded according to the AMR standard is a variable-rate source.
1.2 Telecommunication Networks
1.2.1 Introduction
In this section we give a general description of a communication network as an infrastructure for exchanging information.
As illustrated in Figure 1.1a network is a collection of nodes connected by links. Nodes can be either end-user or transit nodes. Links connect two nodes and indicate that it is possible to exchange telecommunication services between them. When discussing the nature of the links we may distinguish between physical and logical links; the former represent the presence of an actual resource that connects two nodes and may be used for the communication; the latter are a more general abstraction of the capability of two nodes to communicate. That is to say, there could be many logical links conveyed by a physical link,⁴ whereas many physical links could be needed to establish a logical link.
Figure 1.1 A generic network.
Example 1.2 A In a telephone network the end-user nodes are the usual telephones while the transit nodes include local exchanges and switches.
Example 1.2 B Let's consider a basic ISDN connection; it usually consists of physical link made of a copper twisted pair of cables and three logical links: two links (called B links) carrying user information and one link (called D link) carrying ancillary information used by the network to set up and control the calls. The bit rate of each B link is 64 kbit/s while the D link bit rate is 16 kbit/s.
It is common practice, when dealing with communication networks, to abstract from many details of the implementation, including both physical aspects of the network elements and the policies used to make them communicate with each other. On the one hand, this simply means that we adopt a layered analysis of the network, as will be discussed later in this chapter. In particular, one layer considers the physical devices and another separate layer deals with the network operations from an abstract point of view. This enables us to look at the problem from a different, more theoretical perspective, founded on the branch of mathematics called topology.
A historical background
In year 1735 the mathematician Leonhard Euler solved a popular puzzle of the time: the problem of the seven bridges of Königsberg [1].
This was a sort of networking problem, even though of course it did not involve any transmission or data exchange, but rather it was about finding a specific walk through the bridges of a city built over a river. The city was Königsberg, the then-capital of the Province of Prussia, which consisted of four districts (two sides of the river and two small islands in between), connected through seven bridges, as shown in Figure 1.2. More precisely, the problem consisted of finding a walk visiting every bridge, and doing so exactly once. The details of the actual problem can be found in [2]. The full tale of Euler's solution of the problem is very educational and is recommended as further reading.
Figure 1.2 A map of Königsberg and its seven bridges. The bridges are highlighted in white with black border. The city districts are labeled A, B, C, D, as done in the original formulation by Euler.
We are more interested in which instruments to use in order to approach and solve the problem, so that we can use the same instruments for information networks. Euler found a clever way to translate the bridge problem into a much simpler symbolic representation, which could be analyzed from a theoretical perspective.
It is clear that an immediate and cheap way to approach the problem is, rather than visiting the city, to use a map; instead of walking through the bridges, one can simply look at the graphical representation. However, Euler realized that a good mathematical model did not need unnecessary details. Thus, instead of a precise map, in which the geometrical proportion of the bridges and the city districts were respected, it was possible to use a simpler scheme. What does matter is just which parts of the city are connected, and how.
Thus, Euler used a simple tabular representation, where he took note of which parts of the city were interconnected and by how many bridges. This is a simple topological representation, where only the strictly necessary details are considered. It is commonly believed that in this way Euler invented the branch of mathematics known as topology, and more specifically, the part of it called graph theory. However, the original representation he gave of the problem involved a table, not a graph [1]. Yet, later rearrangements made by other scholars proposed a graphical representation, which is equivalent to Euler's table. Such a representation is reported in Figure 1.3.
Figure 1.3 The graph resulting from Königsberg's bridge problem.
Through this formulation of the problem, the whole city is modeled as a graph, where the districts and the bridges are the vertices and the edges between vertices, respectively. The problem of traversing the bridges could be analyzed by means of this representation, for example by marking, or specifically coloring, the edges corresponding to traversed bridges. It is worthwhile noting that this representation preserves very few characteristics of the original problem. Indeed, the only elements given by the graph are those that are topological invariants of the network – which cannot be altered without substantially changing the problem. In this problem, the topological invariants are the connections between districts along the bridges, whereas it does not matter how large the bridges are or what the physical distance between the districts is.
More in general, to formulate a problem in terms of network topology means to abstract from many aspects and mostly consider just connectivity properties, for example whether two vertices are connected through an edge or not. Once we solve a problem formalized in this manner (or, as is the case for Euler's original problem, we prove it does not admit any solution), we do the same for any problem which is topologically equivalent, that is, that involves the same questions on a network with identical connectivity properties.
Notation and terminology
The topological representations that we will use for communication networks do not significantly differ from that used for Königsberg's bridge problem. Network devices that are able to interconnect with each other are generically called nodes; they are represented as the vertices of a graph, which are in turn linked through edges representing connection means, that is, cables, radio links, optical fibers or something similar.
The whole network is thus represented as a graph , which is often written as , where is the set of the nodes and is the set of the edges. The number of elements in set is . According to the context, the elements of can be denoted in many ways; it is usual to use integer numbers (in which case the nodes are labeled, for example, as ), or capital Latin letters, which is the notation we will employ in this chapter; we will use instead lower-case Latin letters to denote a generic node. In some cases, the edges are also called arcs, links, hops. We will use all these terms as synonyms.
The set of edges is a subset of . Thus, a typical element of can be written as (A,B), where A, . In this case, node A is said to be the source (or the transmitter, or the tail) and node B the destination (or the receiver, or the head) of the edge. However, the inclusion of the pairs of the form (i,i), that is, with both elements equal to the same node, is usually avoided. This would correspond to a single-hop looping to and from the same node, which is usually unrealistic.
Notable network topologies
Several network topologies are actually possible (see Figure 1.4). Some of them are rather complicated because, as will be discussed in Chapter 10, they can be nested. In other words, a larger network can be formed by connecting two or more networks, so as to create a hierarchical structure. However, there are certain network topologies that are, in a sense, considered to be the most basic and frequently studied. In other words, they are standard cases, and there are proper names for them.
Figure 1.4 Five network topologies.
These notable topologies include the following cases:
Star topology: a center node is connected to every other node; there are no links between the other nodes. This case physically represents an interconnection where several end users can communicate only through a transit node (which is the only one to be connected to all of them).
Mesh topology: in this kind of network, every node is connected to every other node; sometimes, this full interconnection is better emphasized by calling it full mesh.
Tree topology: one way to obtain this topology is to have one node, called root, connected with multiple nodes (not connected to each other), called leaves; this is actually the same as the star topology defined above, so the star topology is also a tree topology; however, we can also have a tree if we replace any of the leaves with the root of another tree topology, so that the tree is obtained as a hierarchy of nodes; more in general, as will be discussed in Chapter 10, the term tree
actually applies to all the topologies where there are no loops (as they will be defined in this chapter).
Ring topology: each node is connected to two other nodes only. Moreover, assume we arbitrarily select one node A of the network; then, pick one of the two neighbors of node A, and call it B. Node B is connected to node A and to the other node (call it C). Now, repeat the procedure indefinitely by replacing (A,B) with (B,C), respectively. Sooner or later, A will be touched
again by this procedure. This means that the network contains a loop; actually, it is only a single loop.
Bus topology: from the strict topological point of view, this is the same as a mesh topology; that is, every node is connected to every other; however, in a bus topology the connection is achieved with a special communication line that is shared by all nodes. This line, called a bus admits multiple ways of interconnecting nodes but it can be used only by a single pair of nodes at a time. The definition of bus topology introduces a further element, beyond the mere placement of nodes and links, because it also requires a characterization in terms of medium access. These differences will become clearer when the medium access control is discussed in Chapter 9.
1.2.2 Access Network and Core Network
The topological representation of the network gives an abstract perspective describing a mathematical structure. From an implementation point of view, most telecommunication networks are further subdivided into two parts:
The access network, which is the part interacting with the end user, collecting and transferring the information to the end user; it is the edge of the network itself and enables users to access the network.
The core network, which is responsible for the transmission of the information over long distances, routing the information from one user to the other, and so on; it is the core of the network itself.
The general architecture is shown in Figure 1.5.
Figure 1.5 Core and access networks.
There are networks for which the distinction between access and core networks is not valid: these are the peer-to-peer networks where all nodes have the same characteristics and there is no hierarchy. Two remarkable examples of peer to peer networks are:
the Skype™ [3] network, where the voice traffic is routed through a series of nodes and there is no central server
to/from which everything is sent;
some sensor networks, especially multihop sensor networks where sensors (for example, measuring the temperature) send their measurements – according to specific protocols – to their neighbors and the information is propagating hop-by-hop to the information sink.
Example 1.2 C Consider a very important service nowadays, the asymmetric digital subscriber loop almost surely (ADSL), whose architecture is based on three components (Figure 1.6 provides a generic scheme for this architecture):
User equipment called an ADSL modem to which the user attaches a PC or other networking equipment like a router to form a local area network. Incidentally, equipment combining modem and router in one piece of hardware modem is widespread.
A digital subscriber line accesses multiplexer (DSLAM) at the local exchange on the customer side. It intermixes voice traffic and ADSL, that is, it collects data from many modem ports and aggregates their voice and data traffic into one complex composite signal via multiplexing. On the core network side it connects the data signals to the appropriate carrier's core network, and the phone signals to the voice switch. The DSLAM equipment aggregates the ADSL lines over its asynchronous transfer mode (ATM), frame relay, and/or Internet Protocol network port. The aggregated traffic at up to 10 Gbit/s is then directed to a carrier's backbone switch (in the core network) to the Internet backbone.
The Internet backbone.
Figure 1.6 Core and access networks for the ADSL service.
1.3 Circuit-Switched and Packet-Switched Communication Modes
In this section we briefly discuss the two basic modes in which communication can occur in a network, that is, the circuit-switched and the packet-switched paradigms. Further insight can be found in Chapter 10.
We say that a circuit-switched communication mode is used when, in a communication between user A and the user B, there is a uninterrupted physical route over the information that is continuously flowing; the route, traversing the home network, the access network and the core network and again the access network and the home network, is established at the beginning of the communication and not changed along the communication session. This communication mode is also often referred to as connection orientated.
Conversely, packet-switched communication mode is adopted when, in a communication between the user A and the user B, the information (usually digital or digitized) is grouped into packets, each one having embedded the address of the user B, and these packets are sent across the networks without the constraint that each and everyone follow the same route. The route that each packet is following may be determined by the nodes it is traversing and can of course vary during the session. This communication mode is often referred to as connectionless.
The two communication modes have advantages and disadvantages, which will be highlighted later, although the general trend is towards packet-switched communication networks. The following example tries to clarify the differences between the two modes.
Example 1.3 A The plain old telecommunications network (POTS) (that is, the common, basic form of voice-based telephony still in use for residential services nowadays) of Figure 1.7 is probably the most classical example of a circuit-switched network; at the establishment of the phone call a physical deterministic route is established from user A, along the local switches and the transit switches (of the core network) of possibly different operators, to user B. The phone of user B rings only when this route is found and it is available. It could happen that some of the links are completely busy and cannot accommodate another call; in this case, user A gets a busy tone.
Figure 1.7 Circuit switched network.
Example 1.3 B An example of a packet-switched network is the Internet (see Figure 1.8), which is based on the Internet protocol (IP) where each user
has an identifier, called an IP address. When user A wants to send some digital information to user B, it puts the information in packets containing the IP address of user B and presents the packet to the first edge router (almost equivalent to the switch of a POTS network) of the network. The rule is that based on already known information, any router forwards the packet to the router attached to it, which is in the best position to get the packet delivered to user B. The choice of the router can change over time, so that two consecutive packets can take different routes and it might as well happen that the latter packet arrives before the former. It is up to the receiver to reorder the packets, check that everything is delivered as expected, and so on.
Figure 1.8 Packet switched network – different gray tones of the same box number represent the same packet at different moments in time.
1.4 Introduction to the ISO/OSI Model
In this section we introduce the ISO/OSI model and provide some examples of its application.
1.4.1 The Layered Model
First we introduce the notion of protocol as a set of rules defining telecommunication systems interact. To reduce the unavoidable confusion that could be generated by describing protocols without any guideline, a kind of template has been defined to enable
a consistent definition of different protocols;
an easier comparison between them; and
a translation of one protocol into another, through a suitable conversion.
This template is the layered model and the ISO/OSI model is a particular instance of this model.
According to the layered model, a communication, unidirectional or bidirectional, between two systems, A and B, is made of layers and entities (see Figure 1.9). For each system, each layer-(N – 1) entity provides a service to a layer-N entity. The dialog between the two entities is carried out via an exchange of service messages called primitives and data messages called packet data unit (PDU) through the service access point service access point (SAP). In this manner, a layer-N entity of system A gets to talk to a peer layer-N entity of system B, as messages go down on system A and then up on system B. The way the two peer entities talk is called layer-N protocol and is shown in Figure 1.10.
Figure 1.9 Layered architecture.
Figure 1.10 SAPs, services and protocols in a layered architecture.
An insight on how the data message is actually processed is given in Figure 1.11, where we see that through the layer-N SAP a layer-(N+1) PDU is passed down; this PDU contains the actual pieces of information transmitted from one system to the other at a certain layer. The underlying layer, however, does not simply carry the layer-(N+1) PDU to the other side but clearly needs to add some information needed for the layer-N protocol to work. As a consequence, a protocol control information (PCI) piece of information is appended to the layer-(N+1) PDU (which in the context of layer-N is called layer-N service data unit service data unit (SDU) to highlight that it is coming from the SAP) to make the layer-N PDU, as shown in Figure 1.11. Exactly one PDU fitting into one lower layer PDU is a particular case: actually, it is very common that the layer-(N+1) PDU is split into smaller pieces by the layer-N protocol so that the transmission of a layer-(N+1) PDU is accomplished via the transmission of several layer-N PDUs.
Figure 1.11 PDU, PCI and SDU in a layered architecture.
As said before, the service interaction through SAPs is carried out through the exchange of primitives, which usually are of four types:
1. request
2. confirm
3. indication
4. response
This is shown pictorially in Figure 1.12, where two primitives are shown on one side and two on the other side, grouped as they usually are.
Figure 1.12 Primitives in a layered architecture.
Many protocols do not follow the layered architecture and instead violate it by having, for example, the (N+1)th layer sending primitives to the (N–1)th layer. Furthermore, a recent research area called cross layer design is deliberately designing protocols to avoid each layer working in an isolated way, as implied by the layered approach.
The interaction between layers described above is reflected in what is called the encapsulation of information. In practice, this corresponds to the inclusion of a layer-N PDU as a part of a layer-(N–1) PDU. That is, a piece of information from a higher layer is complemented with some control information, then the resulting data are treated by the lower layer as a whole piece of information. Another control component is appended to it (often as a header, but sometimes as a trailer). This information-hiding process has advantages and disadvantages. It certainly enables modularity of the data, so that each layer only has to manage the control information related to it. However, it may cause a considerable increase in the number of bits sent over the network: in fact, since lower layers are blind to the content of the data exchanged, they are often forced to duplicate control information parts. Finally, there are cases, such as the interaction between TCP/UDP and IP (in particular the pairing of TCP/UDP port and IP address) that do not respect this concept faithfully, as will be discussed in Chapter 10.
1.4.2 The ISO/OSI Model
The ISO/OSI model (Figure 1.13) is a particular instance of the layered protocol architecture specifying:
the number of layers, set to seven;
the function and naming of each layer.
Figure 1.13 The ISO/OSI model.
In the following we give a short description of each layer.
1. The physical layer is responsible for the actual delivery of the information over the physical medium; for example, on the transmitter's side, by employing a modulator, a given waveform is sent over the medium when the bit is 0 and a different one is sent when the bit is 1; so, on the receiver's side, a demodulator can reconstruct the 0/1 sequence based on the received waveform.
2. The data-link layer is mainly responsible for enabling the local transfer of information. Its intervention is necessary in order to enable the actual exchange of bits through the physical layer. Indeed, there are several functionalities of the data-link layer and they are related to different needs. For this reason, it is common, especially within the IEEE 802 standards, to distinguish between two sublayers, which both belong to the data-link layer: (i) the medium access control (MAC), which manages the presence of multiple users on the same medium, and (ii) the logical link control (LLC), which provides the interaction between the upper layers and the MAC as well as performing flow and error control on a local basis. Indeed, the classification of these two entities as two subsets of the second layer, instead of being two separate layers themselves, is more of a conventional matter. Moreover, it is worthwhile noting that their features may not always be required. For example, there might be one single user in the network, in which case multiplexing through MAC could be avoided (or better, simplified, since the availability of the medium still has to be checked). If the network is very simple or the communication medium is guaranteed to be extremely reliable, one may also avoid performing error and flow control on a local basis, thus simplifying the LLC. However, in most cases the operations of the data link layer are quite complex and will be discussed in detail in Chapter 9.
3. The network layer is responsible for setting up, maintaining and closing the connection between the network layer entities of different subsystems. It makes the way in which network resources are used invisible to the Upper layers. Referring to Figure 1.14, the network layer entity on system A does not know whether the flow of information is going through systems B or C while exchanging information with system D. To achieve this goal, the network layer is responsible for host addressing, that is, being able to identify all the nodes in the network in a unique manner, and routing, that is, identifying the most desirable path for the data to follow through the network. It is worth mentioning that, whereas the data link layer is concerned with local communication exchanges, the network layer has a global view. This is not surprising and is implicit in the layers' names: layer 2 is obviously concerned with single links, while layer 3 considers the whole network.
4. The transport layer is responsible for creating a one-to-one transparent virtual pipe between the two ends of the communication flow. It does not deal with the network topology; instead it hides the presence of multiple terminals interconnected in a network fashion, which was the key aspect of the third layer. At layer four, communication proceeds as though only two entities existed in the network; when the communication session is established the transport layer sets up this virtual pipe according to the requests of the session layer. It may also include features to deliver an error-free communication, for example, requesting the network layer to retransmit the pieces of information that are in error. Finally, the transport layer can perform flow control, that is, it prevents the transport layer on one side from sending information faster than the rate that the receiving transport layer on the other side can handle.
5. The session layer The session layer is responsible for establishing, suspending and tearing down in an orderly fashion any communication session the presentation layer might need. In a POTS network, people adopt, as a matter of fact, a call-control protocol, which controls the session. In fact, the dialer takes the phone off the hook, waits for the dial tone, dials the number, waits for the ringing tone and subsequently waits for the receiver to answer, talks, then closes the communication by putting the phone on the hook. If during any of these operations a busy tone is heard, the communication is dropped and the dialer is invited to try again later. When using a cellular phone, a slightly different protocol is adopted since the network availability may be known in advance. Furthermore, even a simple POTS call may have multiple concurrent sessions, that is, a call can be put on waiting, meanwhile another call goes on and finally the previous call is resumed.
6. The presentation layer is responsible for providing directly to the application layer the session layer services as requested by the applications and for processing the data to make them usable to the applications: for example, the encryption and decryption of the data are usually a responsibility of the presentation layer.
7. The application layer is self-explaining: it is the realm of the applications; normally users interact with networks at this level.
Figure 1.14 The network layer.
1.5 Signaling
In this section we provide an introduction to the concept of signaling, giving some background and indicating why it is essential in every network. A short historic and geographic survey is given, listing different types of signaling system at different times and in different regions.
1.5.1 Introduction
In almost every system, with some remarkable exceptions such as the Internet, the communication between two end-points involves two planes: a user plane and a control plane. Both of them are structured according to the layered architecture previously described, but usually, we, as users, are exposed only to the user plane. Users just send and receive useful data, voice, video; to there is a kind of cooperating network behind the fourth wall which is taking care of setting up the communication links, monitoring them, reconfiguring them if we are moving (as in a cellular network) etc. This is what is called the control plane, which is normally implemented according to the layered architecture that is, there is a physical layer (which can be shared somehow with the user plane), a data link layer, a network layer and so on. Of course there are SAPs and primitives as well.
To have an idea of how complicated the control plane can be, refer to Figure 1.15, which shows the control plane of a GSM (Global System for Mobile communications: originally from Groupe Spècial Mobile) network (for the sake of simplicity the figure only includes the elements related to the voice service).
Figure 1.15 The GSM protocol architecture.
The control flow of information is called signaling and the control plane protocols are called signaling protocols. A coordinated set of signaling protocols and entities is called a signaling system.
1.5.2 Channel-Associated and Common-Channel Signaling
There are two types of signaling systems:
channel-associated signaling;
common-channel signaling.
All types of signaling can be divided in two parts: the access network signaling, or user signaling, and the core network signaling.
Channel-associated signaling was the first to be used and is divided into in-band signaling and out-of-band signaling, where it is intended that the band is the voice band. There are three channel-associated systems still in use:
the CCITT R1 system, very similar to the Bell System multifrequency signaling used in the USA since after the second World War;
the CCITT R2 system used in Europe since 1960;
the CCITT signaling system 5, defined in 1964 and used in intercontinental analog links.
For reason of space we will not go into details about these systems; they are very likely the ones we interact with on a daily basis in user signaling (e.g., DTMF). For more in-depth information the reader is referred to [4]. Next subsection is instead devoted to the most important common-channel signaling system: the CCITT signaling system 7.
1.5.3 SS7
In this section we provide a brief overview of the CCITT signaling system 7. This system is replacing step by step the channel-associated signaling systems.
The main difference between this system and the previous ones is that while in the other systems the nodes and the links for the signaling are in common with those carrying the user information, in CCITT signaling system 7 the signaling network (rather ironically) is not in common with the user information network. In other words, the user plane is completely separated from the control plane. The reason for using the word common
when talking about the CCITT signaling system 7 is that a given signaling link is not dedicated to a specific user link: it is used by the signaling network for all the signaling and so is common to all user links. The revolutionary concept brought in by the CCITT signaling system 7 is that there is an overlay network with respect to the one carrying the user information, which is not synchronous with it, perhaps using different physical layer transmission technologies, that controls the user information network. Figure 1.16 illustrates this concept.
Figure 1.16 The CCITT signaling system 7 concept.
The overlay network is called common channel signaling (CCS) network. It is made of two different types of nodes:
Signaling Point (SP) nodes, which are at the edge of the network and are either the sources or the destinations of the signaling information; normally they are mapped one-to-one to the switches of the user plane network and colocated with them; there is an actual connection between them via suitable interfaces; in the diagrams they are usually represented with circles.
Signaling Transfer Point (STP) nodes, which are the core of the signaling network and their purpose is to switch the signaling messages in the network; in the diagrams they are usually represented with squares.
Some equipment can act as both SP and STP at the same time.
The links connecting the nodes of the CCS network are called signaling links (SL) and are commonly made of ISDN (e.g., 64 kbit/s) links, which are always on. The SL are usually represented with dashed lines.
Figure 1.17 shows an example of a network with the CCITT signaling system 7.
Figure 1.17 Example of a network using the CCITT signaling system 7.
Figure 1.18 shows the CCITT signaling system 7 protocol stack. It is made of different components and in its specification divided in four layers, shown in Figure 1.18 and compared again in Figure 1.18 with the ISO/OSI layers definition. According to this latest definition the first three are handled by the STPs, whereas level 4 (i.e., all the rest) is end-to-end and performed by the SPs.
Figure 1.18 CCITT signaling system 7 Protocol Stack.
Without going into full details, we now go through the different protocols bottom up. The Message Transfer Part is the part of the protocol in charge of delivering and routing the messages from and to the different entities. The SS7 level 4 is basically divided in two parts: one related to a kind of signaling-in-the signaling
control plane (control part) and one related to the user plane
(user part) in the signaling part. The first one is needed to establish, control and tear down the logical connection needed for the signaling and comprises the Signaling Connection Control Part (SCCP), the Intermediate Service Part (ISP) and the Transaction Capability Application Part (TCAP). The user plane instead depends on the specific network and can be the plain Telephone User Part (TUP), the Data User Part (DUP) or finally the ISDN User Part (ISUP).
1.5.4 PDH Networks
The plesiochronous digital hierarchy (PDH) is a technology used in telecommunications networks to transport large quantities of data over digital transport equipment such as optic fibers and microwave radio systems. The word plesiochronous
comes from the Greek, more precisely from (near) and (time), so it means more or less at the same time.
In other words, operations are not perfectly synchronous but are not asynchro- nous either.
The European E-carrier system is described below. The basic data-transfer rate is a data stream of 2048 kbit/s (which approximately corresponds to 2 Mbit/s if a megabit is considered as 1024 kilobits). For speech transmission, this is broken down into thirty 64 kbit/s channels plus two 64 kbit/s channels used for signaling and synchronization. Alternatively, the whole 2 Mbit/s may be used for nonspeech purposes, for example, data transmission. The exact data rate of the 2 Mbit/s data stream is controlled by a clock in the equipment generating the data. The exact rate is allowed to vary by some small amount ( ) on either side of an exact 2.048 Mbit/s. This means that multiple 2 Mbit/s data streams can be running at slightly different rates. In order to move several 2 Mbit/s data streams from one place to another, they are combined that is, multiplexed in groups of four. This is done by taking one bit from stream number 1, followed by one bit from stream number 2, then number 3, then number 4. The transmitting multiplexer also adds additional bits in order to allow the far-end receiving demultiplexer to distinguish which bits belong to which 2 Mbit/s data stream, and so correctly reconstruct the original data streams. These additional bits are called justification or stuffing bits. Because each of the four 2 Mbit/s data streams is not necessarily running at the same rate, some compensation has to be made. The transmitting multiplexer combines the four data streams assuming that they are running at their maximum allowed rate. This means that occasionally (unless the 2 Mbit/s is really running at the maximum rate) the multiplexer will look for the next bit but this will not yet have arrived. In this case, the multiplexer signals to the receiving multiplexer that a bit is missing. This allows the receiving multiplexer to correctly reconstruct the original data for each of the four 2 Mbit/s data streams, and at the correct, different, plesiochronous rates. The resulting data stream from the above process runs at 8448 kbit/s (about 8 Mbit/s). Similar techniques are used to combine four 8 Mbit/s plus bit stuffing, giving 34 Mbit/s.⁵ By taking four 34 Mbit/s flows and adding bit stuffing, a 140 Mbit/s flow is achieved. Four 140 Mbit/s flows are further combined (again, plus bit stuffing) into a 565 Mbit/s flow. This is the rate typically used to transmit data over an optic fiber system for long-distance transport. Recently, many telecommunication companies have been replacing their PDH equipment with synchronous digital hierarchy (SDH) equipment capable of much higher transmission rates.
The Japanese and American versions of the PDH system differ slightly in minor details, but the principles are the same. Table 1.1 shows the details of these hierarchies.
Table 1.1 PDH hierarchies: in brackets the