Professional Documents
Culture Documents
AG - BT01 - E1 Overview of Soft Switch V1.0 60p
AG - BT01 - E1 Overview of Soft Switch V1.0 60p
AG_BT01_E1
Chapter
Data-communication
Basics
Key points
Birth of Telephone
FIGURE 1 TELEPHONE HISTORY (SWITCHING HISTORY)
Emergence of time-switching
While traditionally, telephone switches connected physical
circuits (e.g., wire pairs), modern telephone switches use a
combination of space- and time-division switching. In other
words, each voice channel is represented by a time slot (say 1 or
2) on a physical wire pair (A or B). In order to connect two voice
channels (say A1 and B2) together, the telephone switch
interchanges the information between A1 and B2. It switches
both the time slot and physical connection. To do this, it
exchanges data between the time slots and connections 8000
times per second, under control of digital logic that cycles
through electronic lists of the current connections. Using both
types of switching makes a modern switch far smaller than
either a space or time switch could be by itself.
The structure of a switch is an odd number of layers of smaller,
simpler subswitches, interconnected by a web of wires that goes
from each subswitch, to a set of the next layer of subswitches.
In most designs, a physical (space) switching layer will alternate
with a time switching layer. The layers are symmetric, because
every call is symmetric (there's a connection in both directions).
A space-division subswitch uses digital multiplexers controlled by
a cyclic memory. This takes physical space for the wiring.
A time-division subswitch reads a complete cycle of time slots
into a memory, and then writes it out in a different order, also
under control of a cyclic computer memory. This causes some
delay in the signal.
Development of VOIP
Telephone systems have been slowly adopting the "IP" (Internet
Protocol) technology over the last decades. Early experiments
proved that voice can be converted to digital "packets" and sent
over the Internet. The packets would be collected and converted
back to analog voice. The quality of the calls was not great but it
showed that it could be done. The major problem was something
called "packet loss" which is common with TCP/IP connections.
By the early 2000s, the IP telephony (or "VoIP" - Voice over
Internet Protocol) technology had improved. Using "classes" of
service, reliable connections could be obtained and packet loss
reduced to minimum levels. Business systems started using VoIP
technology in their PBX (Private Branch Exchange) switches. The
telephones themselves were almost like small computers that
had their own analog/digital conversion systems and TCP/IP
networking technology all the same system. The phone could
"piggy-back" on their existing computer network system. Hence
having voice AND data traffic over the same wires! As we see
the history of VOIP, it can be divided into 3 phases:
PABX was
Telephone
the data
the users
The data link layer provides the functional and procedural means
to transfer data between network entities and to detect and
possibly correct errors that may occur in the Physical layer. The
addressing scheme is physical which means that the addresses
(MAC address) are hard-coded into the network cards at the
time of manufacture
The network layer provides the functional and procedural means
of transferring variable length data sequences from a source to a
destination via one or more networks while maintaining the
quality of service requested by the Transport layer. The Network
layer
performs
network
routing,
flow
control,
segmentation/desegmentation, and error control functions. The
router operates at this layer -- sending data throughout the
extended network and making the Internet possible, although
there are layer 3 (or IP) switches. This is a logical addressing
scheme - values are chosen by the network engineer. The
addressing scheme is hierarchical.
The transport layer provides transparent transfer of data
between end users, thus relieving the upper layers from any
concern with providing reliable and cost-effective data transfer.
The transport layer controls the reliability of a given link. Some
protocols are stateful and connection oriented. This means that
the transport layer can keep track of the packets and retransmit
those that fail. The best known example of a layer 4 protocol is
TCP.
The session layer provides the mechanism for managing the
dialogue between end-user application processes. It provides for
either duplex or half-duplex operation and establishes
checkpointing,
adjournment,
termination,
and
restart
procedures. This layer is responsible for setting up and tearing
down TCP/IP sessions.
The presentation layer relieves the Application layer of concern
regarding syntactical differences in data representation within
the end-user systems. MIME encoding, encryption and similar
manipulation of the presentation of data is done at this layer. An
example of a presentation service would be the conversion of an
EBCDIC-coded text file to an ASCII-coded file.
The application layer interfaces directly to and performs common
application services for the application processes. The common
application services provide semantic conversion between
associated application processes. Examples of common
application services include the virtual file, virtual terminal (for
example, Telnet), and "Job transfer and Manipulation protocol".
IP
32 bits
Dotted
Decimal
Network
255
Maximum
1
255
255
8 9
16 17
255
24 25
32
Example
172
16
Decimal
Example 10101100 00010000
Binary
122
128
64
32
16
8
4
2
1
128
64
32
16
8
4
2
1
128
64
32
16
8
4
2
1
Binary
Host
204
01111010 11001100
www.
.zte.com.cn
www.univ
univ.zte.com.
www.univ
cn
10
11
IP
8 bits
8 bits
8 bits
8 bits
Host
Host
Host
Host
Host
Host
Host
Host
Host
Host
Class A:
Network
Network
Class B:
Network
Network Network
Network
Class C:
Network
Network Network
Network Network
Network
Class D:
Host
Host
Multicast
Class E:
Research
www.
cn
univ.zte.com.
.zte.com.cn
www.univ
univ.zte.com.
Network category
Local Area Networks
Local Area Networks (LANs) accommodate users within a
building or on a campus. Ethernet is the leading network
technology for LANs or networks contained in buildings or on a
single site. Ethernet was first implemented as a shared network
using hubs, but high usage caused congestion that could
dramatically slow or even shut down the network. Subsequently
Ethernet was implemented using a switched architecture scaling
performance of the network. The Ethernet ports operated in full
duplex, gradually the speed increased form 10 Mbps to 10 Gbps,
packet processing at higher layers and routing were added.
12
LAN
MAN
WAN
www.
.zte.com.
cn
www.univ
univ.zte.com.
.zte.com.cn
www.univ
Basic concepts of IP
telephone
The transmission of realtime voices via the IP network is
different from that of ordinary data. In the former case, the
relevant application devices must meet the realtimeness of
voices. The voice packet transmission requires the network to
provide sufficient bandwidth in time. Therefore, for most of the
current IP networks that do not provide so high rates, the voice
compression technology is the key for implementing IP voice
communication. Now, we will present a brief description of the
frequently used voice coding and compression modes at present:
1. PCM
Pulse code modulation (PCM) is the earliest
technology, which does not include any
algorithm. It transmits voice signals with
bandwidth, i.e., taking 8,000 samples per
digital voice
compression
the 64kbps
second and
13
14
Homework
1. Please briefly discuss the telephone history
2. What are the common decoding/encoding algorithm in
telephone history, describe the differences
15
Chapter
NGN Architecture
Key points
network
architecture
based
on
Why NGN
At present, two totally independent networks exist: the PSTN
network and data network, which provide the voice service and
basic data service respectively.
Network separation and isolation of operation & maintenance
have been keeping the general network operation &
maintenance costs on a high level, and furthermore, a network
cannot provide complicated convergence services, although the
network convergence has been an inevitable trend.
Since a traditional voice network is a closed network with
monopolized resources, it has become a common understanding
in the telecom industry that the packet network (typically, the
Internet), with the advantages such as open architecture, low
costs and large scale, will replace the PSTN to become the basic
frame of the next generation of convergence networks and that
the construction of the next generation of networks will be based
on current packet networks.
It is necessary for carriers to consider resource utilization and
investment protection during construction of future networks. On
one hand, carriers should trace the latest technologies; and on
the other hand, they should try to utilize existing technologies
and resources. Thus, carriers can provide users with large
numbers of services economically and rapidly to make the
17
highest profits,
alteration.
without
the
need
of
large-scale
network
Service layer
Database
SCP
AAA Server
Application Server
ZXSS10 SS
Softswitch
Control layer
Policy Server
ZXSS10 SS
Softswitch
IP Router/ATM Swtich
Core Packet Network
Core layer
Edge layer
SG
TG
AG
NAS
H.323
GW
IP
PBX
M SAG
Broadband Access
No.7 Network
PSTN / ISDN
IAD
WAG
Wireless
WAG:
18
ZTE Softswtich
ZXSS10 SS1a is a piece of softswitch control equipment with
medium capacity, which can process hundreds of thousands of
calls. ZXSS10 SS1b is a piece of softswitch control equipment
with large capacity, which can process millions of calls.
19
20
21
The ZXMSG 5200 is applied in the edge access layer of the NGN
network. It can provide abundant services for various users. For
ordinary users, it can perform many services such as Video On
Demand (VOD), online stock purchasing, online teaching, telemedicine and cell network administration. After commissioning
the IPTV service in later period, it can provide more abundant
video service for users. For corp subscribers such as enterprises,
banks, governments, hotels and schools, it provides more
service types including complex dedicated line service besides
voice and data service access. So the demand of access mode is
also various. For low speed dedicated line service, it can provide
narrowband data dedicated lines such as subrate, 64k, N*64k,
2M by ZXMSG 5200. For broadband dedicated line demand, it
can provide the access of dedicated data service such as
:LAN,ADSL,G SHDSL and VDSL conveniently.
23
F I G U R E 1 5 I AD S E R I E S P R O D U C T S
24
F I G U R E 1 6 N G N P R O T O C O L F AM I LY
Megaco/H.248 protocol
The Megaco/H.248 protocol is used between the SoftSwitch
control equipment and various media gateways. Two
abstractions are defined in the protocol, i.e. Termination and
Context.
A Termination sources and/or sinks one or more streams. In a
multimedia conference, a Termination can be multimedia and
sources or sinks multiple media streams. The media stream
parameters, as well as modem, and bearer parameters are
encapsulated within the Termination.
A Context is an association between a collection of Terminations.
There is a special type of Context, the null Context, which
contains all Terminations that are not associated to any other
Termination. For instance, in a decomposed access gateway, all
idle lines are represented by Terminations in the null Context.
There are eight commands defined in H.248. They are Add,
Modify, Subtract, Move, AuditValue, AuditCapability, Notify and
ServiceChange.
A group of commands between the MG and the SoftSwtich
control equipment implement the transaction interaction. One
event interworking can be identified by a TransactionID.
Transactions consist of one or more Actions. An Action consists
of a series of Commands that are limited to operating within a
single Context. Consequently each Action typically must specify
a ContextID. Figure 17 shows a graphic representation of the
Transaction, Action and Command relationships.
25
F I G U R E 1 7 T R A N S A C T I O N , A C T I O N A N D C O M M A N D R E L AT I O N S H I P S
SIGTRAN protocol
The SIGRAN protocol stack transmits the SCN Signaling in the IP
network, supports the interface with the standard primary
language of the SCN Signaling application without any
modification, thus to guarantee that the existent SCN Signaling
application can be put into use without modification. Meanwhile,
it utilizes standard IP transmission protocol as the lower layer
transmission Signaling, and satisfies the requirement by SCN
Signaling transmission through adding the function of the
protocol. Figure 18 shows the model of a universal Signaling
transmission function defined by IETF.
26
IP SCP/IP HLR
Sigtran
SCN
signaling
Sigt ran
SCN
signaling
Sigt ran
Signaling gateway (SG)
Sigtran
Sigt ran
M edia gateway
controller (M GC)
Media gateway
controller (MGC)
M edia
stream
M GC
P
M GCP
Media gateway
(MG)
RTP stream
Media gateway
(MG)
M edia
stream
Signaling
and IP
TCAP
Q931/QSIG
MTP3
IU
A
M2UA/M2PA
SCCP
ISUP
M3UA
SCTP
IP
TUP
TCAP
Signaling
application layer
SUA
Signaling
adaption layer
Signaling
transmission laye r
IP protocol layer
In the following Sections 3.2, 3.3, 3.4, 3.5 and 3.6, descriptions
of M3UA, M2UA, M2PA, SCTP and SUA protocols will be given
respectively.
27
M3UA protocol
Being the third level adaptation protocol of MTP, the Signaling
adaptation layer protocol of SIGTRAN protocol stack M3UA is
used to support the transmission of the MTP-3 user message in
IP network, including ISUP, SCCP and TUP messages. TCAP or
RANAP message is transmitted transparently by M3UA as SCCP
payload. The M2UA protocol employs SCTP for the reliable
Signaling transmission at the low transmission layer.
Protocol Overview
1. Terms:
AS (Application Server): It is a logical concept. Each AS is an
endpoint that implements some service function in the
network. An AS always serves a specified routing key.
ASP (Application Server Process): It is a process instance in
AS. More than one ASP can serve one AS in the
active/standby or load-sharing mode. One ASP can also
serve more than one AS.
SCTP connection: It provides the service of transmitting
MTP3 user Signaling protocol data and the message between
peer layers of M3UA.
Routing key: Each routing key in the gateway defines a
collection of routing characteristics of SS7 Signaling
message. The SS7 Signaling message with the required
characteristics is processed by a designated AS.
Routing Context: These are parameter values of ASPM
message between gateway and ASP. The parameter uniquely
identifies the SS7 Signaling message related to a specific AS,
that is to say, the message keeps a one-to-one relationship
with the routing key or AS.
2. Signaling Transmission Model
The SS7 message is sent from SCN to the IP network via the
Signaling gateway by using M3UA protocol. The transmission
mode of Signaling protocol is shown in Figure 20.
28
F I G U R E 2 0 S C H E M AT I C D I A G R A M O F I S U P M E S S A G E T R A N S M I T T E D T H R O U G H
SG
SEP/STP
SS7
IP
SG
NIF
ISUP, etc.
ASP
ISUP, etc.
MTP3
M TP3
M 3UA
M 3UA
MTP2
M TP2
SCTP
SCTP
L1
L1
IP
IP
SEP/STP
SS7
IP
SG
SCCP
SCCP User
ASP
SCCP User
SCCP
SCCP
MTP3
MTP3
M3UA
M3UA
MTP2
MTP2
SCTP
SCTP
L1
L1
IP
IP
29
SEP/STP
SG
SS7
IP
ASP
NIF
30
MTP3
MTP3
M3UA
M3UA
MTP2
MTP2
SCTP
SCTP
L1
L1
IP
IP
Chapter
31
F I G U R E 2 3 U S I N G B 1 0 0 T O S O L V E P R I V AT E - P U B L I C A D D R E S S M A P P I N G
Routing
Any node in a network can communicate with softswitch device
directly, when the NGN network becomes larger and larger, IP
network devices grows more and more, it is inappropriate to ask
softswitch device itself maintain the routing information. A
integrated, aggregated, shared routing device becomes
necessary.
To solve the routing problems, when the country NGn network is
under construction , all softswitch routing information should be
contained in routing server, while communicating with other
softswitches, one should first consult the routing information
towards a routing server to query the proper way. While the
network involves minor number of softswitches, the softswitch
itself can maintain the routing information.
OSS implementation
For NGN, the problems like network management, billing, which
are not considered in the internet
business are the most
important required functionality that traditional tele-carriers care
about. OSS components, functionality, and working mode, the
information provided by network element device, interfaces
between OSS and application system, inter-working and
implementation with existing network management system,
billing system, and authentication system are also very
important problems which need to be solved in recent years.
ZTE softswitch EMS system partially solved the above problems
and provided a unified network management system EMS.
32
QoS
From the policies below, it is clear that the ZTE softswitch
system can not only ensure the voice forwarding with highest
priority but also control the bandwidth and traffic of voice and
video services in the network to ensure the QoS of voice and
video services, providing subscribers with carrier-class QoS.
33
Subscribers
transmission
Can
equipment
be
does
Classified
not
as
Two
support
Vlan
34
Class 4 Replacement
Class 4 replacement is more popular among incumbent carriers
as they are not keen in replacing C5 switches in near future. C4
switches however, if at all replaced, are prime choice of carriers
as replacement candidates; in order to reduce complexity and
gain advantage of ease of managing their network.
It is what exactly NGN has to offer from its bag of tricks.
FIGURE 24 CLASS 4 REPLACEMENT SOLUTION USING SOFTSWITCH
ACCESS solution
Then there is another situation where ZTE Softswitch can
accommodate a large number of subscribers via IAD who are
interested in broadband internet access using DSL. IAD is
another unique product in NGN network, which works as kind of
a residential gateway (RGW). As an end result,
Softswitch is accessible to IAD and internal details of DSL
network are transparent to user. The key point to note here is
that DSL is being used as access technology here, and as
expected NGN network perfectly integrates.
35
F I G U R E 2 5 A C C E S S S O L U T I O N C A B L E V I A I AD 6 0 0
36
F I G U R E 2 6 A C C E S S S O L U T I O N U S I N G I AD 5 2 4
37
38
39
40
41
Service properties
1. service utilization
User select its 800 service number and fill in its own
telephone number, accomplish the service by clicking the
webpage button, user can also fill in known 800 service
number.
2. billing
accomplish subscriber billing function, bill goes to the user
account which has been bound to the service, while charge
no money towards the caller.
3. service data management
service user can manage it own account through webpage,
such as changing routing, password etc.
4. subscriber management
5. administrator could change the service user configuration,
including add/remove/delete users etc.
6. ONLY
When service user has multiple telephone numbers, it can
register a single one web 800 number, for those who access
the 800 number users, system will divert the calls to
different destinations according to the service user
requirements.
42
Web Conference
Web Conference is a web-based conference call service.
Conference information is displayed on web pages, while the
conference chair reserves and manages a conference through
web pages.
Conference members may also decide whether to attend the
conference through the web any of the two interchangeable
ways: convergence and distribution. Sub-conferences are
provided and the conference can be recorded in full. The system
supports conference joining via a variety of terminals
Web conference service poses excellent potential market for
government and educational organization. Government could
initiate meeting and communicate with upper/lower agencies,
educational organization could launch remote education easily by
using such service.
43
Service Properties
1. pre-paid function
web conference has pre-paid function. Conference card
records the credit; only when the credit in the card is
enough, person who holds the card has the right to launch
the meeting. Conference fee consists of several parts:
telephone billing, conference billing, conference booking
billing. Card holder can query the conference card, and
charge it with pre-paid telephone card.
2. conference chairman
card holder has the right to book/define/modify/query the
conference, according to the conference notice feedback,
he/she has the right to decide whether or not to launch the
meeting and manage the conference in real-time
3. conference member
the person who got invitation from the chairman, there are
two ways joining the conference: convergence and radiation
4. conference administrator
two kinds of administrator: system administrator and general
administrator. System administrator can manage the general
administrator, general administrator only manages the
conference
5. conference organization
two ways of joining the conference: convergence and
radiation. Convergent way is that the conference member
dialing the conference access code and password after the
launching and been patched to the conference. Radiation way
is that the system automatically calls the conference
44
Web Call
Web Call is a prepaid service which initial call from Web Page.
FIGURE 34 WEB CALL SERVICE
45
Service properties
1. basic voice service
subscriber could initiate a phone call from webpage to a
telephone, which could be fix telephone or soft terminal.
2. video communication
subscriber could initiate a video call from web page to a
telephone, which could be video phone , or compatible soft
phone. Subscriber could switch off the video function as well.
3. booking
subscriber could book a telephone call by entering card
number and password in the web page, caller/calling party
could all be normal pstn telephone. Call duration can be
setup by subscriber itself.
4. family number
subscriber can set up a family number, the billing fee to such
number can be different with normal phone calls
5. voice message
subscriber can enter a text and then initiate the phone call,
when the call is established, the system can play the text
automatically.
ONLY
With the communication development, the need of users for a
more convenient information acquisition measure that allows
mutual exchange at any time and any place becomes more and
more urgent. The launch of the ONLY (One Number Links You)
conception can meet such need perfectly.
The ONLY service is an integrated personal communication
service integrating multiple services. Its core lies in that is
provides a unique ONLY number for a user.
46
F I G U R E 3 5 O N LY S E R V I C E
Service properties
1. Caller party
i.
47
Chapter
Dual-homing Technology
Key points
49
Dual-homing implementation
principle
In the network designation, adopting dual-homing principle,
each device will control half of the network resources.
1. Network resources have been divided equally into halves and
assigned to two zones controlled by an individual softswitch.
2. the main/assistant softswitch engage data synchronization in
the back stage to ensure the data integration
3. heartbeat mechanism ensures the working status checking
between SS and SS, SS and terminals, SS and gateways.
F I G U R E 3 7 D U A L - H O M I N G I M P L E M E N T AT I O N P R I N C I P L E
50
51
52
F I G U R E 4 0 T G S I D E C O N F I G U R AT I O N F O R D U A L - H O M I N G
F I G U R E 4 1 S G S I D E C O N F I G U R AT I O N F O R D U A L - H O M I N G
53
3rd-party
devices,
the
54
F I G U R E 4 3 B I L L I N G , A C C O U N T I N G M A N A G E M E N T C O N F I G U R AT I O N F O R D U A L HOMING
55
Figures
Figure 1 Telephone history (switching history)........................2
Figure 2 OSI Model.............................................................8
Figure 3 OSI Model and its protocols.....................................8
Figure 4 TCP/IP protocol......................................................9
Figure 5 IP address example..............................................10
Figure 6 IP address illustration...........................................10
Figure 7 IP address classes................................................12
Figure 8 LAN, MAN and WAN..............................................13
Figure 9 Next-generation Network Based on the Softswitch
Technology........................................................................18
Figure 10 Front view of the ZXSS10 SS1a (4U).....................20
Figure 11 Rear view of the ZXSS10 SS1a (4U)......................20
Figure 12 Front view of the ZXSS10 SS1b shelf (12U)...........21
Figure 13 Rear view of the ZXSS10 SS1b Shelf (12U)............21
Figure 14 ZXMSG9000 rack structure..................................22
Figure 15 IAD series products.............................................24
Figure 16 NGN protocol family............................................25
Figure 17 Transaction, Action and Command Relationships.....26
Figure 18 SIGTRAN Signaling Transmission Function Model. . . .27
Figure 19 SIGTRAN Protocol Stack Model.............................27
Figure 20 Schematic Diagram of ISUP Message Transmitted
Through SG.......................................................................29
Figure 21 Schematic Diagram of SCCP Signaling Transmission 29
Figure 22 Management Message Transmission Model.............30
Figure 23 Using B100 to solve private-public address mapping
.......................................................................................32
Figure 24 Class 4 Replacement solution Using Softswitch.......35
Figure 25 Access Solution Cable Via IAD600.......................36
Figure 26 Access Solution Using IAD524..............................37
Figure 27 access solution using I704...................................37
57
58