Akash 1

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 30

1

1.Introduction
Broadband services are used by Telecom Companies worldwide to leverage their existing investment in copper in the local loop. Copper as a last-mile delivery medium has the advantage of near-universal penetration, and local Telecom Companies are increasingly eyeing broadband services on it as a means of hitting back at cable operators who have begun infringing on their turf by their bundled Internet offerings. This article attempts to demystify the basic technologies involved in broadband delivery, the GOIs attempts to promote broadband usage in the country, and BSNLs broadband plans as part of its ambitious NIB-II project.

1.1What is broadband?
To state the obvious, broadband indicates a means of connectivity at a high or broad bandwidth. In India, TRAI has defined broadband as any connectivity delivered to the end user at a bandwidth greater that 256 kbps. (So that immediately excludes the popular DIAS services offered by BSNL at many places). Why is bandwidth so important and how to estimate how much bandwidth is required for a particular application? A small example below will help illustrate the concept. Assuming you wish to receive a VCD quality transmission ( incidentally, this is also the quality offered by low cost desktop videoconferencing applications ) over your broadband connection, the maths is: Pixel count per frame 200 X 300 = 60000 Frame rate -- 30 per sec (minimum) Bandwidth required : 200 X 300 X 30 = 1800000 = 1.8 Mbps

Of course, the above is raw transmission rate modern technologies use advance compression algorithms to reduce the data rate to a great extent.

1.2Definition of Broad Band:Broadband is often called high-speed Internet, because it usually has a high rate of data transmission. In general, any connection to the customer of 256 kbit/s or more is considered broadband.

2.HOW IS BROADBAND DIFFERENT FROM DIAL-UP SERVICE?


Broadband service provides higher speed of data transmissionAllows more content to be carried through the transmission pipeline. Broadband provides access to the highest quality Internet servicesstreaming media, VoIP (Internet phone), gaming and interactive services. Many of these current and newly developing services require the transfer of large amounts of data which may not be technically feasible with dial-up service. Therefore, broadband service may be

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

2 increasingly necessary to access the full range of services and opportunities that the Internet can offer. Broadband is always ondoes not block phone lines and no need to reconnect to network after logging off. Less delay in transmission of content when using broadband.

3.WHY IS BROADBAND IMPORTANT?


Broadband can provide you with the technical capability to access a wide range of resources, services and products that can enhance your life in a variety of ways. These resources, services and products include,

Education, Culture, & Entertainment


Broadband can overcome geographical and financial barriers to provide access to a wide range of educational, cultural and recreational opportunities and resources.
o

Tele-health & Telemedicine


Broadband can facilitate provision of medical care to unserved and underserved populations through remote diagnosis, treatment, monitoring and consultations with specialists.
o

Economic Development/E-Commerce
Broadband can promote economic development and revitalization through electronic commerce (e-commerce) by: Creating new jobs and attracting new industries. Providing access to regional, national and worldwide markets.
o

Electronic Government (E-Government)


Electronic government can help streamline peoples interaction with government agencies and provide information about government policies, procedures, benefits and programs.
o

Public Safety and Homeland Security


Broadband can help protect the public by facilitating and promoting public safety information and procedures, including, but not limited to: Early warning/public alert systems and disaster preparation programs. Remote security monitoring and real time security background checks. Backup systems for public safety communications networks.
o

Broadband Communications Services


Broadband provides access to new telecommunications technologies such as Voice Over Internet Protocol (VoIP) allowing voice communication using the Internet.
o

Communications Services for People With Disabilities


Broadband permits users of Telecommunications Relay Services (TRS) to use Video Relay Services (VRS) to communicate more easily, quickly and expressively with voice telephone users.
o

4.TYPES OF BROADBAND CONNECTIONS:Broadband includes several high-speed transmission technologies such as:

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Digital Subscriber Line (DSL) Cable Modem Fiber Wireless Satellite Broadband over Power lines (BPL)

The broadband technology you choose will depend on a number of factors. These may include whether you are located in an urban or rural area, how broadband Internet access is packaged with other services (like voice telephone and home entertainment), price and availability.

4.1Broadband Services
Several interesting services can be provided in an Integrated manner by the broadband service provider. Some of these are: High Speed Internet Services Video on Demand Multicast Video Streaming Interactive e- Learning Interactive Gaming High speed Internet Services refer to always-on fast Internet access. Video on Demand enables the user to select from an online library of content and select any of the available choices for viewing at a convenient time. This is similar to borrowing a Video for viewing . Multicast video streaming is similar to cable or terrestrial broadcast the user can join at any time but the stream begins and ends at the preappointed times. Interactive e-learning can consist of electronic classrooms with 2-way and multi-way communication between teachers and students. Interactive gaming enables multiple players to play online games pitted against each other or against computers, through gaming servers employed by gaming content providers. Needless to say, all these services require the service provider to have strong tie-ups with the various content providers. After all, what is hardware without usable software?

5.Digital Subscriber Line (DSL):-

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

4 Despite its name, DSL does not refer to a physical line but to a Modem or rather a pair of Modems . A DSL Modem pair creates a digital subscriber line, but the network does not purchase the lines when it buys ADSL - it already owns those - it purchase Modems. DSL technology uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers.

DSL

Existing Copper Line

DSL

Core Network

DSL

Existing Copper Line

DSL

Fig.1 .1 Digital Subscriber Line

5.1xDSL - Different types of DSL:DSL (Digital Subscriber Line) is a modem technology for broadband data access over ordinary copper telephone lines (POTS) from homes and businesses. xDSL refers collectively to all types of DSL, such as ADSL (and G.Lite), HDSL, SDSL, IDSL and VDSL etc. They are sometimes referred to as last-mile technologies because they are used only for connections from a telephone switching station to a home or office, not between switching stations. These technologies provide high rate, bi-directional data communications by using elaborate modulation and error correction schemes which send and receive frequencies above 20 kHz and therefore above the hearing range of humans. With appropriate filtering at each end of the twisted pair, many of these approaches also allow an ordinary analogue Plain Old Telephone System (POTS) telephone service to continue to operate on the same line. If this filtering can be achieved without the need for external power at the customer site, this preserves existing life-line telephone services, while providing a bi-directional multimegabit-per-second digital communication path to each home or office. To interconnect multiple DSL users to a high-speed backbone network, the telephone company uses a Digital Subscriber Line Access Multiplexer (DSLAM). The DSLAM aggregates data transmission from all access DSL lines and then connects to an Asynchronous Transfer Mode (ATM) network. At the other end of each transmission, a

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

5 DSLAM demultiplexes the signals and forwards them to appropriate individual DSL connections. Most DSL technologies require that a signal splitter be installed at a customer premise. However, it is possible to manage the splitting remotely from the central office. This is known as splitterless DSL, "DSL Lite," G.Lite, or Universal ADSL.

6.Types of DSL Technology:1. HDSL (High bit rate Digital Subscriber Lines) 2. ADSL (Asymmetric Digital Subscriber Line) 3. G.Lite ( Universal DSL ) 4. SDSL (Single-line Digital Subscriber Line) (Integrated Services Digital Network DSL) 5. VDSL (Very-high-bit-rate Digital Subscriber Line) IDSL

6.1High bit rate Digital Subscriber Lines (HDSL):The HDSL technology employs two-wire bi-directional transceivers with echo chancellors at either ends. The 2B1Q line code is used as a bandwidth reduction technique along with the self synchronizing scrambling procedure.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Fig1.2 High bit rate DSL

6.2HDSL Deployment:The transmission medium over which the HDSL equipment is expected to operate is the local telephone line distribution networks, which mostly include 0.5 mm twisted pair of quad PIJF cable, but without any loading coils. There is no need for any selection of pairs. Also, the provision of Remote Power Feed makes the HDSL system a powerful tool for the service provider in accessing the subscriber at the last mile with the required grade of service. The HDSL equipment supports various types of flexible interfaces. Each meeting as different type of application in the local and access networks. Depending upon the type of interfaces supported, the HDSL equipment specification drawn by TEC is classified into the following types: Single pair configuration 2-pair configuration 3-pair configuration.

HDSL is a bi-directional symmetric transmission system that allows the transport of signals with a bit-rate of 1.544Mbit/s or 2.048Mbit/s on multiple access network wire-pairs. Two different options for the line code are recommended; the Pulse Amplitude Modulation 2B1Q and the Carrierless Amplitude/Phase modulation (CAP). CAP is applicable for 2.048Mbit/s, while for 2B1Q two different frames are defined.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

7 The 2B1Q standard for 2.048Mbit/s caters for both duplex transmission on a single pair and parallel transmission on two or three pairs. This allows for the distribution of the data to several pairs and for the reduction of the symbol rate in order to increase the line length or transmission reach. CAP is defined for one or two pairs only and the 1.544Mbit/s 2B1Q for two pairs only.

7.Asymmetric Digital Subscriber Line (ADSL):Asymmetrical Digital Subscriber Line (ADSL) systems are getting deployed in networks for providing broadband services. In the basic configuration existing Copper pair between subscriber premises and service provider is used with Modem at each end. This allows one telephone line to support POTS and high speed data channel. ADSL supports down-stream rates much higher than the up-stream raters, making it as a very attractive choice for Internet service. ADSL systems have down-stream rates 0.50 to 8 mbps and up-stream rates 64 to 640 Kbps. Most popular rates are 6 mbps down-stream and 640 Kbps up-stream. These systems can cover up to 6 kms of Loop range depending upon speed of operation.

ADSL MODEM

Splitter

Splitter ADSL LT

ISP

Copper Lines g

Existin

Exchange EXCHANG E

Equpt.

Fig1.3 Asymmetrical Digital Subscriber Line

ADSL2
ADSL2 (ITU G.992.3 and G.992.4) adds new features and functionality targeted at improving performance and interoperability and adds support for new applications and services. Among the changes are improvements in ADSL's data rate, an increase in the

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

8 distance ADSL can reach from the local telephone exchange, dynamic data rate adaptation, better resistance to noise, diagnostics, and a stand-by mode to save power. ADSL2 also reduces the initialisation time from more than 10 seconds (as is required for ADSL) to less than 3 seconds. ADSL2 has the same signal footprint as ADSL.

ADSL2+:ADSL2+ (ITU G.992.5) doubles the bandwidth used for downstream data transmission, effectively doubling the maximum downstream data rates, and achieving rates of 25 Mbps on telephone lines. ADSL2+ solutions will interoperate with ADSL and ADSL2, as well as with ADSL2+. ADSL2+ will include all the feature and performance benefits of ADSL2 while maintaining the capability to interoperate with legacy ADSL equipment.

G.Lite:G.Lite (also known as DSL-Lite and universal ADSL) is similar to ADSL, offering lower speeds without the need for POTS splitters at the customer premises. The benefits of simple installation and a lower cost of implementation are considered to offset the potential drawback of reduced speed, which is limited to 1.5 Mb/s downstream and 384 kb/s upstream.

7.1Single-line Digital Subscriber Line (SDSL):Symmetric digital subscriber line (SDSL), also know as single line DSL, is a technology that delivers a symmetric link to data networks for residential and business users. Using existing telephone lines, SDSL extension technology can transport multiple services, such as private line, digital voice transmission, Internet protocol (IP), or frame relay. Because SDSL is symmetric, its maximum data rate is the same both upstream and downstream. Typically, SDSL generates speeds of 2.3 Megabits per second (Mb/s) upstream and downstream. Specifically designed with the small- and medium-sized businesses in mind, SDSL has faster upstream capabilities than asymmetric DSL (ADSL), making it more suitable for 'push and pull' communication services, such as web hosting or teleconferencing.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

7.2ISDN DSL (IDSL):Integrated Services Digital Network (ISDN) digital subscriber line (IDSL) is a variation of DSL technology that allows users to employ existing ISDN card technology for data-only use. Specifically designed for those homes and businesses located too far from a telephone company's central office (CO) to subscribe to the more commonly used asymmetric DSL (ADSL) technology, IDSL transmits digital data from users at speeds up to 144 Kilobits per second (Kb/s) on existing telephone lines. IDSL technology uses digital (rather than analog or voice) transmission to bypass the phone company's CO equipment that handles analog signals. IDSL uses ISDN transmission coding to bundle together ISDN service and voice all on one circuit. While ISDN passes through the phone company's CO voice network, IDSL bypasses the voice network by plugging into a special router at the phone company end. Unlike ISDN service, which requires call setup and may involve per-call fees, IDSL is a dedicated service, typically billed at a flat rate with no usage charges.

7.3 Very-high-bit-rate Digital Subscriber Line (VDSL):Very high bit rate digital subscriber line (VDSL) is one of the hottest areas of DSL development. VDSL technology transmits high speed data over existing telephone lines with the promise of lightning fast transfer speeds. VDSL offers fast data rates over relatively short distances - the shorter the distance, the faster the connection rate. In trials, VDSL has produced speeds between 51 and 55 Megabits per second (Mb/s) over lines of up to 300 mtrs to 1500 mtrs. As the final length of cable to a home or business, VDSL connects to neighborhood optical network units (ONUs), which connect to the telephone company's central office (CO) main fiber network backbone. This architecture allows VDSL users to access the maximum bandwidth available through ordinary phone lines. The increased bandwidth offered with VDSL technology will result in the delivery of a new wave of services, including interactive TV, video on demand, and high definition TV.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

10

Summary of various DSL specifications:Family ADSL ADSL2 ADSL2plus ADSL2-RE SHDSL VDSL VDSL2 IDSL HDSL G.lite ITU G.992.1 G.992.3 G.992.5 G.992.3 G.991.2 G.993.1 G.993.2 ANSI T1.601 G911.1 G922.2 NAME G.dmt G.dmt.bis ADSL2plus Reach Extended G. SHDSL Very-high-datarate DSL Very-high-datarate DSL 2 ISDN DSL High-speed DSL Splitterless ADSL Max capabilities 7 Mbps down, 800 kbps up 8 Mb/s down, 1 Mbps up 24 Mbps down, 1 Mbps up 8 Mbps down, 1 Mbps up 5.6 Mbps up/down 55 Mbps down, 15 Mbps up 100 Mbps up/down 144 kbps up/down 2 Mbps up/down 1.5 Mbps down, 384kbps up Speed No. of Line reqd 1 1 1 1 1 1 1 1 2 1

7.4Asymmetric Digital Subscriber Line (ADSL):ADSL stands for Asymmetrical Digital Subscriber Line. It is one example of a family of analogue modem technologies called Digital Subscriber Line (xDSL). ADSL is the only xDSL implementation that allows the local loop to continue to be used for analogue telephony. At the simplest level, ADSL is a high-speed replacement for a Conventional Modem or ISDN adapter that allows you to access the Internet faster. The following diagram shows the maximum speeds attainable. Maximum speeds attainable

PC

DEPARTMENT OF

V.90 MODEM

SERVICE INTERNET PROVIDER 56 K AND COMMUNICATION ELECTRONICS

33 K

Conventional Modem Connection

ENGINEERING

11 64/128 K
PC ISDN TA SERVICE PROVIDER INTERNET

64/128 K
ISDN CONNECTION

PC ADSL MODEM

640 K
SERVICE PROVIDER INTERNET

8000 K
ADSL MODEM CONNECTION

Tele. Exch.

For a traditional telephone network, twisted-pair cables are used to transport only telephone voice signals. Whereas with the introduction of the ADSL technology, not only voice signals, but also high-speed data signals can be transported over the telephone wire, and the two types of signals do not interfere each other, thus improving the utilization of the line. The ADSL technology basically a set of office-end equipment is needed at the central office (CO) and a set of Customer Premises Equipment (CPE) at the user end to include the users in a broadband network and enable them to enjoy broadband cyber surfing, without the need of expensive network investment and construction. The asymmetry feature of ADSL is that its downlink speed can be as high as 8 Mbps, which exactly fits the present Internet access characteristics and meets the users Internet access requirement.

7.5Principle used in ADSL:ADSL employs the special modulation-demodulation hardware to connect ends of the existing twisted-pair cable. It creates a pipeline with three channels The ADSL communication pipeline contains a high-speed downlink channel (to the user end), an uplink channel and a POTS channel (0 kHz ~ 4 kHz). The POTS channel is used to ensure normal voice communications even if the ADSL connection fails. Both the high-speed and mediumspeed channels can be multiplexed to create multiple low-speed channels.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

12 ADSL uses a very simple method compression to obtain amazing rate. It uses very advanced DSP and algorithms to compress as much information as possible in the telephone wire (twisted pair). ADSL products use FDM to multiplex the uplink and downlink channels, and isolate the POTS channel. To make full use of the spectrum resources, ADSL usually adopts the DMT (Discrete MultiTone) modulation technology. DMT divides 1 MHz spectrum into 256 sub channels with the bandwidth of 4.3125 kHz. The ADSL rate completely depends on the line distance. The longer the distance, the lower the rate. The lowest rate may be below 1.5 Mbps, but the average rate can normally reach 6 Mbps. The figure shows the band used. ADSL works by implementing many modems in parallel, each of which uses its own slice of the available bandwidth.

ADSL Bandwidth

UPSTREAM

DOWNSTREAM

4 KHz

26 KHz

138 KHz

1 . 1 MHz

Fig1.4 ADSL Bandwidth

Figure 2 is approximate, and shows how ADSL uses many individual modems working in parallel to exploit maximum bandwidth and deliver very high speed. Each black bar represents a modem operating at a different frequency.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

13

History of ADSL :-

1985 1990

Bell Labs discovers a new way to make traditional copper wires support new digital services Phone companies start deploying High-Speed DSL (HDSL) to offer T1 service on copper lines without the expense of installing repeaters. Phone companies begin to promote ADSL as a way to enter the video market.

1995 NOW

Innovative companies begin to see ADSL as a way to meet the need for faster Internet access ADSL is being deployed for fast Internet access across the World

Benefits of ADSL: Can talk on the phone and use the Internet at the same time on an existing single phone line Can connect to the Internet at up to 140 times faster than analog modems Connection to the Internet is always on. Home has its own dedicated connection. Connection is highly Reliable. Connection is highly secure.

Disadvantages of ADSL: A DSL connection works better when you are closer to the provider's central office. The connection is faster for receiving data than it is for sending data over the Internet. The service is not available everywhere.

8. Need

for additional technologies:-

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

14 Since the main reason for using ADSL is Internet access, it is obvious that the higher-level protocol has to be TCP/IP. However, at the lower levels, considerable divergence exists in how TCP/IP is transported over the ADSL link, and how the data is forwarded over the telecom network to the ISP. The only other fixed component is the lowest level protocol used: ATM. In theory, the choice of low level protocol is open, except in the case of G.992.2 (G.lite) where ATM is specifically defined as the low-level protocol. In practice, however, ATM is the de-facto standard for all ADSL implementations.

ADSL: A comparison with PSTN & ISDN


The inherent differences between ADSL and traditional Dial-up modems and ISDN: SL. No. 1 2 ADSL is always-onmode and can be used as dial-up mode. Internet 3 PSTN and ISDN are Dial-up technologies Data, Voice, Data to the Internet, Data to ADSL PSTN &ISDN

ADSL is just about data to the PSTN and ISDN allow you to use Fax, other devices. ADSL connects you to a pre- PSTN and ISDN allow you to choose defined ISP the Internet Service Provider you want to use. PSTN runs at 64kbps & ISDN runs at 64kbps or 128kbps PSTN stops you using your phone

4 5

ADSL can potentially download at 8 Mbps ADSL allows you to surf and phone at the same time

8.1ADSL Service:This section will describe the function of each component that connects to the Internet, starting from the ADSL Modem and also look inside the 'Service provider' box and examine the main components that they use to provide ADSL service.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

15

ADSL Modem

PC Local loop Loop

SERV ICE PROVIDER

NET R

INTE

ADSL MODEM

Fig1.5.ADSL Modem in local loop

ADSL modem is connected to the telephone wiring (called the 'local loop') that connects to the local exchange equipment. The ADSL modem uses a combination of several-advanced signal processing techniques in order to achieve the required throughput speeds on ordinary telephone wiring at distances up to several miles from the local exchange. ADSL modem can be broken down in to three basic categories: 1. PCI ADSL modem. 2. USB ADSL modem:. 3. Ethernet or wireless router.

8.2Types of ADSL Modem


Intelligent ADSL Modems and Passive ADSL Modems

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

16 An intelligent ADSL modem has all the required communications protocols built-in. A passive ADSL modem relies on the PC's operating system to provide the protocols.

ADSL Components - Service provider

The implementation of ADSL by the Service Provider is shown in Figure below :

PC
ADSL MODEM

SERVICE PROVIDER

INTERNET

PC
ADSL MODEM

DSLAM

BRAS

ISP

INTERNET

Fig1.6ADSL service provider Within the block that was previously identified simply as 'Service provider', there are three important components: DSLAM BBRAS ISP - DSL Access Multiplexer - Broadband Remote Access Server - Internet Service Provider

DSLAM (DSL Access Multiplexer)

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

LOCAL LOOP

D S L A M

OF

B R A S

I S P

NET R

INTE

17

Fig 1.7 ADSL equipment

A Digital Subscriber Line Access Multiplexer (DSLAM) is a network device, usually at a telephone company central office, that receives signals from multiple customer Digital Subscriber Line (DSL) connections and puts the signals on a high-speed backbone line using multiplexing techniques. Depending on the product, DSLAM multiplexers connect DSL lines with some combination of asynchronous transfer mode (ATM), frame relay, or Internet Protocol networks. DSLAMs support a wide variety of high-bandwidth applications including video on demand, video conferencing, high-speed Internet access, and streaming multimedia content. Nextgeneration DSLAM platforms will offer greater density and lower cost per port along with more diversity in services (such as voice gateways and virtual private networks) using multiple DSL transports such as ADSL, VDSL, HDSL, SHDSL, and so on. When the phone company receives a DSL signal, an ADSL modem with a POTS splitter detects voice calls and data. The DSLAM intermixes voice-frequency signals and high-speed DSL data traffic onto a customer's DSL line. It also separates incoming phone and data signals and directs them onto the appropriate carrier's network. Voice calls are sent to the PSTN, and data are sent to the DSLAM, where it passes to the Internet, then back through the DSLAM and ADSL modem before returning to the customer's PC. More DSLAM channels a phone company has, the more customers it can support. A DSLAM delivers exceptionally high-speed data transmission over existing copper telephone lines. A DSLAM separates the voice-frequency signals from the high-speed data traffic and controls and routes digital subscriber line (xDSL) traffic between the subscriber's end-user equipment (CPE) and Broadband Access Server or BBRAS, but it may not be a direct connection; the BBRAS can be located anywhere.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

18

8.3 BRAS (Broadband Remote Access Server):The BBRAS is the piece of equipment that sits between the DSLAM at the telephone exchange and the ISP that connects to the Internet. It may be in local exchange or it may be elsewhere in service provider's network. Single BBRAS will probably handle connections from several DSLAMs. The purpose of the BBRAS is to unwrap the various protocols inside which data travels over the ADSL connection. It also makes connection to the ISP appear exactly as if the connection is by using a dial-up modem or ISDN. ADSL does not specify the protocols that are used to construct the connection to the Internet. The result of this is that there are at least five different ways in which the data can be carried between the PC and the BBRAS. The method used by the PC and the modem must be the same as that used by the BRAS for the connection to work. A BRAS is a multi-service access node able to manage IP service access for a large number of subscribers. In order to access a specific service managed by the BRAS, the subscriber must login towards the BRAS. With VLAN techniques, the Access Domain can be divided into a number of logically separated domains, each associated with a specific Service Provider.

8.4 ISP (Internet Service Provider):The Broadband Access Servers are connected to an Internet Service Provider or ISP. This is the place where the connection to the Internet is made. The ISP usually provides other services like mail and news servers, and may cache frequently-used pages from the Internet so that the access can be more quickly. The ISP treats ADSL connections exactly the same as connections made using ordinary Dialup modems or ISDN.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

19

9.Controlling

Service Access :-

To be able to charge subscribers for their use of services, access control must be implemented, so that subscribers can be recognized and verified by the system as entitled to use certain services, and so that the system can charge the subscriber accordingly. The control of access to network services can be divided into three main tasks:

9.1Authentication, Authorization, and Accounting (AAA) : Authentication is the process of uniquely identifying a subscriber, for example based on a combination of user name and password. Authorization is the process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted. Usually, authorization occurs within the context of authentication: the authentication may implicit allow for different types of access or activities. Accounting means keeping track of the subscriber sessions as for example how long the subscriber uses a service, the type of service used and the amount of data transferred during the session. The accounting information can be used for billing and capacity planning. The most widely deployed AAA protocol is RADIUS. It is a client-server protocol used to exchange subscriber information over a network in a secure way. The RADIUS server contains the actual subscriber profile data, including the login credentials. The client will draw on this information in order to verify the credentials given by subscribers when they log in. The RADIUS client will inform the server about the subscribers service usage, typically when the subscriber ends a service session. This information is stored by the server, and may later be retrieved by an accounting system. The RADIUS client resides within the Access Domain, typically as an integrated part of an access server. The RADIUS server may be located locally at the Service Provider, or within the Access Domain. By separating the AAA function from the access server, the Service Provider can centralize sensitive information in a single RADIUS server, and have a vendorindependent interface to all its access servers. In a scenario with multiple Service Providers, each Service Provider will often have his own RADIUS server managing the subscriber

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

20 profiles. Service Providers are widely deploying RADIUS as the AAA protocol for dial-in users.

9.2 Speed can be variable:The speed of the connection achieved between your ADSL modem and the DSLAM depends on how far you are from the DSLAM, and the maximum allowed speed for your connection configured in the DSLAM. The speed of your connection to the Internet depends on many more variables.

Upto Several Hundreds of lines DSLAMs

Many BAS

Fig1.8 BBRAS

1. The number of other users connected to the same DSLAM and how many of these users are actively using their connections now 2. The speed of the connection between the DSLAM and BBRAS 3. How many other DSLAMs are connected to the same BBRAS as you and how many of these users are active 4. The speed of the connection between the BBRAS and the ISP 5. How many other BBRAS are connected to the same ISP as you and how many of these users are active 6. The speed of the ISP's connection to the Internet 7. How many of the other users of the ISP (using dial-up modems and ISDN as well as ADSL) are active.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

21 8. Whether the ISP already has the information you requested cached so that it is not necessary to get the data from the Internet.

ADSL Implementations by Telcos and ISPs:The service provider who supplies ADSL service may be any of the following commercial organisation types: The local or national telephone company who owns the local loop Another company who rents the local loop from the telephone company The Internet Service Provider

10.Requirement at Customer End:1. BSNL BASIC PHONE. 2. COMPUTER OF MINIMUM CONFIGURATION, WITH 10/100 Mbps ETHERNET CARD. 3. DSL MODEM+ SPILITTER 4. PPPoE SOFTWARE TO BE LOADED AT THE CUSTOMER END. 5. BROADBAND ACCOUNT (USERNAME AND PASSWORD).

10.1DSL MODEM:A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which has the digital subscriber line service configured, to allow the computer to connect to the Internet. Put simply, a DSL modem or DSL router is what you need in order to connect to DSL broadband. The term DSL modem is technically used to describe a modem which connects to a single computer, through a USB port or is installed in a computer PCI slot. The more common DSL router which combines the function of a DSL modem and a home router, is a standalone device which can be connected to multiple computers though multiple Ethernet ports or an integral wireless access point. Also called a residential gateway, a DSL router usually manages the connection and sharing of the DSL service in a home or small office network.

10.2SPLITTER:DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

22 A DSL filter is an analog low-pass filter installed between analog devices (such as telephones or analog modems) and a plain old telephone service(POTS) telephone line, in order to prevent interference between such devices and a digital subscriber line (DSL) service operating on the same line. Without DSL filters, signals or echoes from analog devices at the top of their frequency range can result in reduced performance and connection problems with DSL service, while those from the DSL service at the bottom of its range can result in line noise and other issues for analog devices. Typical installation for an existing home involves installing DSL filters on every telephone, fax machine, voice band modem, and other voiceband device in the home, leaving the DSL modem as the only unfiltered device. For wall mounted phones, the filter is in the form of a plate which hangs on the standard wall mount, and upon which the phone hangs in turn. In cases where it is possible to run new cables, it can be advantageous to split the telephone line after it enters the home, installing a single DSL filter on one leg and running it to every jack in the home where an analog device will be in use, and dedicating the other (unfiltered) leg to the DSL modem. Some devices, such as monitored alarms and Telephone Devices for the Deaf, mainly certain older models using an acoustic coupler, may be hardwired and may not easily accept a DSL filter. Some of these devices can be successfully filtered with a DSL filter or splitter, especially if the hardwired connection is converted into a jacked connection. Some DSL modems have filtering circuitry built-in, to which the telephones and fax machines can be connected.

10.3Point to Point Protocol (PPP):PPP is the protocol used to carry Internet traffic to the ISP across modem and ISDN links. PPP incorporates authentication - Username/Password checking - and this is the main reason for its use with ADSL. Although the BBRAS handles the PPP and performs the authentication, it often does this by accessing the subscriber databases that reside at the ISP. This way, the ISP knows that connections routed to it by the BBRAS have been authenticated against the ISP's own subscriber database.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

23 The only options to access ISP are the Username and Password. If either of these are incorrect then the access to the ISP is denied, just as would happen on a dial-up modem or ISDN connection. For dial-up customers, PPP authentication is almost universally used as the de facto Internet standard for identifying users and measuring their usage. The authentication built-in to PPP is used not only to control who can access the services of the ISP, by checking the username and password, but it also drives the billing system. Clearly, the same requirements for access control and billing exist for ADSL customers, especially where the ISP is a separate commercial organisation from the Telco.

Role of PPP in ADSL


PPP is often used on ADSL connections. It is the protocol used to transport Internet traffic across modem and ISDN links. PPP incorporates authentication (username/password checking) and this is the main reason for its use - when it is used - with ADSL. Identifying the user also allows the ISP to measure usage and charge accordingly. It is very important to understand between which points the PPP interaction occurs: the PPP session is between the ADSL Modem and the BBRAS. Although the BBRAS handles the PPP and performs the authentication, it often does this by referencing the subscriber databases that reside at the ISP. This way, the ISP knows that connections routed to it by the BBRAS have been authenticated against the ISP's own subscriber database.

PPP Overview:The Point-to-Point Protocol (PPP) is one of link layer protocols that bearing network layer packets over point-to-point link. It has found wide application since it can provide user authentication, support synchronous / asynchronous communication and can be expanded easily. PPP defines a whole set of protocols, including link control protocol (LCP), network control protocol (NCP) and authentication protocols (PAP and CHAP). Among them:

LCP is responsible for establishing, removing and monitoring the data link. NCP is used to negotiate the format and type of the packets transmitted over the data link. Authentication protocol suite is used for network security.

10.4 PPPoE:DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

24 As customers deploy ADSL they must support PPP-style authentication and authorization over a large installed base of legacy bridging customer premises equipment (CPE). PPPoE provides the ability to connect a network of hosts over a simple bridging access device to a remote access concentrator or aggregation concentrator. With this model, each host uses its own PPP stack, thus presenting the user with a familiar user interface. Access control, billing, and type of service can be done on a per user, rather than a per site, basis. As specified in RFC 2516, PPPoE has two distinct stages: a discovery stage and a PPP session stage. When a host initiates a PPPoE session, it must first perform discovery to identify which server can meet the client's request, then identify the Ethernet MAC address of the peer and establish a PPPoE session id. While PPP defines a peer-to-peer relationship, discovery is inherently a client-server relationship.

11. BROADBAND COMPONENT:1. Customer Premises Equipment (CPE). 2. Digital subscriber Line Access Multiplexer (DSLAM). 3. LAN Switches: For aggregating DSLAM. 4. Broadband Remote Access Server (BRAS). 5. RADIUS AND LDAP (SSSS). 6. Provisioning System.

11.1 Customer Premises Equipment:Customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carriers telecommunication channel(s) at the demarcation point ("demarc"). The demarc is a point established in a building or complex to separate customer equipment from the equipment located in either the distribution infrastructure or central office of the Communications Service Provider. CPE generally refers to devices such as telephones, routers, switches, residential gateways (RG), set-top boxes, fixed mobile convergence products, home networking adaptors and internet access gateways that enable consumers to access Communications Service Providers' services and distribute them around their house via a LAN (Local Access Network). Also included are key telephone systems and most private branch exchanges. Excluded from CPE are over voltage protection equipment and pay telephones. CPE can refer to both devices purchased by the subscriber and provided by the operator or service provider.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

25

Line RJ 11

Splitter RJ 11

RJ 11 RJ 11

ADSL RJ 45

Line RJ 11

Splitter RJ 11

RJ 11 RJ 11 RJ 45

ADSL RJ 45

Single User with Voice and Data Line RJ 11 RJ 11 RJ 11

Single User with Voice, Data and Video

RJ 45 STB AV Port

Splitter

ADSL RJ 45

Switch

Multi user Business Customer

1 5

Fig1.9 CPE

11.2 Digital subscriber line access multiplexer:A digital subscriber line access multiplexer (DSLAM, often pronounced dee-slam) is a network device, often located in the telephone exchanges of the telecommunications operators. It connects multiple customer digital subscriber line (DSL) interfaces to a highspeed digital communications channel using multiplexing techniques.[1] By placing additional DSLAMs at locations remote from the telephone exchange, telephone companies provide DSL service to locations previously beyond effective range.

Fig 1.10 Siemens DSLAM SURPASS hiX 5625

11.2.1 Path taken by data to DSLAM:DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

26 1. Customer premises: DSL modem terminating the ADSL, SHDSL or VDSL circuit and providing LAN interface to single computer or LAN segment 2. Local loop: the telephone company wires from a customer to the telephone exchange or to a serving area interface, often called the "last mile" (LM). 3. Telephone exchange: Main distribution frame (MDF): a wiring rack that connects outside subscriber lines with internal lines. It is used to connect public or private lines coming into the building to internal networks. At the telco, the MDF is generally in proximity to the cable vault and not far from the telephone switch. xDSL filters: DSL filters are used in the telephone exchange to split voice from data signals. The voice signal can be routed to a POTS provider or left unused whilst the data signal is routed to the ISP DSLAM via the HDF (see next entry). Handover distribution frame (HDF): a distribution frame that connects the last mile provider with the service provider's DSLAM DSLAM: a device for DSL service. The DSLAM port where the subscriber local loop is connected converts analog electrical signals to data traffic (upstream traffic for data upload) and data traffic to analog electrical signals (downstream for data download).

11.2.2 Role of the DSLAM:-

Fig1.11 xDSL Connectivity diagram The DSLAM equipment collects the data from its many modem ports and aggregates their voice and data traffic into one complex composite "signal" via multiplexing. Depending on

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

27 its device architecture and setup, a DSLAM aggregates the DSL lines over its Asynchronous Transfer Mode (ATM), frame relay, and/or Internet Protocolnetwork (i.e., an IP-DSLAM using PTM-TC [Packet Transfer Mode - Transmission Convergence]) protocol(s) stack. The aggregated traffic is then directed to a telco's backbone switch, via an access network (AN) also called aNetwork Service Provider (NSP) at up to 10 Gbit/s data rates. The DSLAM acts like a network switch since its functionality is at Layer 2 of the OSI model. Therefore it cannot re-route traffic between multiple IP networks, only between ISP devices and end-user connection points. The DSLAM traffic is switched to a Broadband Remote Access Server where the end user traffic is then routed across the ISP network to the Internet. Customer-premises equipment that interfaces well with the DSLAM to which it is connected may take advantage of enhanced telephone voice and data line signaling features and the bandwidth monitoring and compensation capabilities it supports. A DSLAM may or may not be located in the telephone exchange, and may also serve multiple data and voice customers within a neighborhood serving area interface, sometimes in conjunction with a digital loop carrier. DSLAMs are also used by hotels, lodges, residential neighborhoods, and other businesses operating their own private telephone exchange. In addition to being a data switch and multiplexer, a DSLAM is also a large collection of modems. Each modem on the aggregation card communicates with a single subscriber's DSL modem. This modem functionality is integrated into the DSLAM itself instead of being done via an external device like a traditional computer modem. Like traditional voice-band modems, a DSLAM's integrated DSL modems usually have the ability to probe the line and to adjust themselves to electronically or digitally compensate for forward echoes and other bandwidth-limiting factors in order to move data at the maximum connection rate capability of the subscriber's physical line. This compensation capability also takes advantage of the better performance of "balanced line" DSL connections, providing capabilities for LAN segments longer than physically similar unshielded twisted pair (UTP) Ethernet connections, since the balanced line type is generally required for its hardware to function correctly. This is due to the nominal line impedance (measured in Ohms but comprising both resistance and inductance) of balanced lines being somewhat lower than that of UTP, thus supporting 'weaker' signals (however the solid-state electronics required to construct such digital interfaces is more costly).

11.3 Broadband Remote Access Server:A broadband remote access server (BRAS, B-RAS or BBRAS) routes traffic to and from broadband remote access devices such as digital subscriber line access multiplexers (DSLAM) on an Internet service provider's (ISP) network. BRAS can also be referred to as a Broadband Network Gateway (BNG). The BRAS sits at the core of an ISP's network, and aggregates user sessions from the access network. It is at the BRAS that an ISP can inject policy management and IP Quality of Service (QoS). The specific tasks include:

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

28

Aggregates the circuits from one or more link access devices such as DSLAMs Provides layer 2 connectivity through either transparent bridging or PPP sessions over Ethernet or ATMsessions Enforces quality of service (QoS) policies Provides layer 3 connectivity and routes IP traffic through an Internet service providers backbone network to the Internet

A DSLAM collects data traffic from multiple subscribers into a centralized point so that it can be transported to a switch or router over a Frame Relay, ATM, or Ethernet connection. The router provides the logical network termination. Common link access methods include PPP over Ethernet (PPPoE), PPP over ATM (PPPoE) encapsulated sessions, bridged ethernet over ATM or Frame Relay (RFC 1483/RFC 1490), or just plain ethernet. In the case of ATM or Frame Relay based access, individual subscribers are identified by Virtual Circuit IDs. Subscribers connected over ethernet-based remote access devices are usually identified by VLAN IDs or MPLS tags. By acting as the network termination point, the BRAS is responsible for assigning network parameters such as IP addresses to the clients. The BRAS is also the first IP hop from the client to the Internet.

11.4 Remote Authentication Dial In User Service:Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc., in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards.[1] Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may [2] incorporate modems, DSL, access points,VPNs, network ports, web servers, etc. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server, the Virtual Private Network server, the Network switch with port-based authentication, and the Network Access Server (NAS), are all gateways that control access to the network, and all have a RADIUS client component that communicates with the RADIUS server. The RADIUS server is usually a background process running on a UNIX or Microsoft Windows server.[3] RADIUS serves three functions: 1. to authenticate users or devices before granting them access to a network, 2. to authorize those users or devices for certain network services and 3. to account for usage of those services. RADIUS servers use the AAA concept to manage network access in the following two-step process, also known as an "AAA transaction". AAA stands for authentication, authorization

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

29 and accounting. Authentication and Authorization characteristics in RADIUS are described in RFC 2865 while Accounting is described by RFC 2866.

11.4.1Authentication and authorization:The user or machine sends a request to a Remote Access Server (RAS) to gain access to a particular network resource using access credentials. The credentials are passed to the RAS device via the link-layer protocol - for example, Point-to-Point Protocol (PPP) in the case of many dialup or DSL providers or posted in an HTTPS secure web form. In turn, the RAS sends a RADIUS Access Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol.[4] This request includes access credentials, typically in the form of username and password or security certificate provided by the user. Additionally, the request may contain other information which the RAS knows about the user, such as its network address or phone number, and information regarding the user's physical point of attachment to the RAS. The RADIUS server checks that the information is correct using authentication schemes such as PAP, CHAP or EAP. The user's proof of identification is verified, along with, optionally, other information related to the request, such as the user's network address or phone number, account status, and specific network service access privileges. Historically, RADIUS servers checked the user's information against a locally stored flat file database. Modern RADIUS servers can do this, or can refer to external sources commonly SQL, Kerberos, LDAP, or Active Directory servers to verify the user's credentials.

Fig1.12 RADIUS Authentication and Authorization Flow

The RADIUS server then returns one of three responses to the RAS : 1) Access Reject, 2) Access Challenge, or 3) Access Accept.

Access Reject - The user is unconditionally denied access to all requested network
resources. Reasons may include failure to provide proof of identification or an unknown or inactive user account. Access Challenge - Requests additional information from the user such as a secondary password, PIN, token, or card. Access Challenge is also used in more complex authentication dialogs where a secure tunnel is established between the user machine and the Radius Server in a way that the access credentials are hidden from the RAS.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

30

Access Accept - The user is granted access. Once the user is authenticated, the RADIUS server will often check that the user is authorized to use the network service requested. A given user may be allowed to use a company's wireless network, but not its VPN service, for example. Again, this information may be stored locally on the RADIUS server, or may be looked up in an external source such as LDAP or Active Directory.

Each of these three RADIUS responses may include a Reply-Message attribute which may give a reason for the rejection, the prompt for the challenge, or a welcome message for the accept. The text in the attribute can be passed on to the user in a return web page. Authorization attributes are conveyed to the RAS stipulating terms of access to be granted. For example, the following authorization attributes may be included in an Access-Accept:

The specific IP address to be assigned to the user The address pool from which the user's IP should be chosen The maximum length that the user may remain connected An access list, priority queue or other restrictions on a user's access L2TP parameters VLAN parameters Quality of Service (QoS) parameter

12.Lightweight Directory Access Protocol :The Lightweight Directory Access Protocol (LDAP; /old/) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.[1] LDAP is defined in terms of ASN.1 and transmitted using BER. Directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number. LDAP is specified in a series of Internet Engineering Task Force (IETF) Standard Track Request for Comments (RFCs).

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

You might also like