Professional Documents
Culture Documents
Modern_Telecom_Networks_v2_1706262578
Modern_Telecom_Networks_v2_1706262578
Telecommunication
Networks
by
Henry Dijkstra
Jan 2024
1
Table of Contents
1 Telecom Technologies
Mobile, FTTX, Legacy & Common Technologies
2 Telecom Sites
Core, CPE & Access Sites
3 Equipment Rooms
With Raised Floors, Without Raised Floors & Sites without Equipment Rooms
5 Sub Nodes
Hardware Sub-Nodes & Software Sub-Nodes
6 Node Ports
Mechanical, Electrical, Optical & RF
11 Conclusion
2
1 Technologies
Modern telecom networks are made up of many di erent and interconnected
technologies. However, in simple terms, there are three basic technologies currently
being used, namely mobile, bre and legacy.
In addition to mobile, FTTx and legacy networks, power and transmission is deployed
to support these three network types.
AC POWER DC POWER
Power systems for telecom networks Power systems for telecom networks
produce alternating current (ac) supplies also produce direct current (DC)
or direct current (DC) supplies. The ac supplies. The DC networks normally
networks are at grid voltage and include produce a nominal -48v, and include
solar systems, uninterruptible power recti ers, batteries, solar systems,
supplies (UPS), generators, automatic earthing systems, bus bars and
transfer switches (ATS), earthing systems distribution cabinets.
and distribution cabinets.
TRANSMISSION
Backbone transmission to carry traffic from location to location comes in many
forms, depending upon the requirements. Normal physical transmission
bearers include satellite, optical cables, electrical cables, and microwave radio.
4
fi
The type of technology that is used in a particular network depends upon how old the
network is, and what the network is used for. Pulse Network Manager is a fully
customisable telecom network inventory system, so its can register any technology
type.
2 Telecom Sites
Telecom sites are the buildings or large enclosures that accommodate the equipment
being used in telecom networks. Sites can be classi ed into three di erent types,
namely; core, customer premises equipment (CPE) and access.
5
fi
ffi
fi
ff
2.3 Access Sites
In order for customer’s tra c to connect to equipment in the core network, it will need
to pass through an access network. Most of the time, sites in the access network will
also be considered as being outside plant (OSP) sites. OSP sites are not generally a
building but more often, an enclosure or shelter.
Access network sites may include towers, masts, manholes, street cabinets, hand-holes
and cell site shelters.
Sometimes a telco may rent real estate from a customer
to accommodate some of their network equipment. An
example of this, would be an incumbent operator
renting space on a church steeple to mount an antenna.
If that same church also rented a landline from the
incumbent operator, the church site would be
considered both an access site (because of the
antenna) and a CPE site (because of the junction box
and telephone associated with the landline).
Sometimes, especially in outside plant (OSP)
scenarios, a site can be more than just a site. An
underground manhole for example, can be considered
both a site and a piece of equipment. A manhole is
considered a site only if its geographical location is
taken into account.
Telcos may need to apply to local government to instal
a manhole in a particular location and then provide a
physical address or GPS co-ordinates.
A manhole however is also a piece of equipment that is manufactured, is identi ed with a
model number and needs to be purchased.
6
ffi
fi
Depending upon the site type, PNM will apply certain database rules. For example,
PNM pays attention to security in core and access sites, but ignores security for
customer premises equipment sites.
There are many sites in even a small telecom network. It is important that each site is
correctly identi ed to avoid any confusion. The International Telecommunications Union
(ITU) recommendation M.1400 provides guidelines for a naming convention. For sites,
an abbreviation for the name is used, normally consisting of letters and numbers.
However, these recommendations were written for older networks and quite often,
cannot strictly be applied to newer networks. Most Telcos adopt their own “modern”
version of ITU M.1400 so that they can apply it to their networks, including its sites.
PNM allows telcos to make use of M.1400, a modi ed version of M.1400 or their own
naming convention to name not only their sites, but their entire network.
3 Equipment Rooms
A telecommunication site in the core network would have at least one equipment
room but normally more, depending upon its size and network function. A legacy
telephone exchange site may have three equipment rooms, one for power
equipment, one for the switching equipment and one for the transmission
equipment.
The equipment rooms are normally divided into rows. Each row contains a number of
racks. The equipment itself is installed within the racks.
Not all tile positions can accommodate racks. A door opening, furniture, re hydrant,
emergency exit, or internal support structures such as a pillar, can render a oor tile
position unusable.
When a raised oor is used, the weight of the equipment becomes very important. If
there is an excess of weight on the raised oor, there is a risk that the supporting rods
will bend or break, thereby causing the raised oor to collapse. This will damage the
equipment, break inter-connecting cables and may cause serious injury or death to
anyone in the equipment room at the time. This is why heavy equipment such as large
battery banks are very seldomly installed in an equipment room with a raised oor.
For safety reasons, supporting rods and their associated metal framework that are used
for raised oors, should therefore be inspected regularly for damage and wear.
8
fl
fl
fl
fl
fi
fl
fl
fl
3.3 Sites without Equipment Rooms
Pulse Telecom’s Network Manager (PNM), registers data concerning all equipment
rooms. For sites where racks are used, the data imported into PNM is used to
automatically generate equipment room oor plans. This allows technicians and
engineers to identify the exact location of equipment that is of interest to them. It also
allows technicians and telcos to accurately plan network expansion at a physical level,
in any equipment room within their network.
• Servers
• Multiplexors
• Packet Shapers
• Radio Heads
• Etc.
9
fl
fl
4.2 Passive Nodes
Passive nodes are nodes that do not require power, nor do they have the ability to
consume power. Without power, they do not have the ability to be managed via a
communication channel.
The same applies to ac and DC distribution boards that accommodate the required
circuit breakers and fuses. These nodes are functionally passive unless enhanced by
electronics requiring power. The node’s function is passive, but the node itself is
implemented as an active node.
10
ffi
fi
4.5 Node Properties
Each node has a certain group of properties. Some properties relate to that one
particular Node, for instance, it’s serial number or con guration. Other properties may
relate to that node model, for instance, its power consumption, physical dimensions or
its user manual.
PNM already has many common properties ready for data to be entered. However, PNM
also allows users to create their own properties.
A node’s particular property can be used entirely for the user’s bene t, or it can be used
by PNM for a capacity calculation. Some properties are used for both, depending upon
the particular property. For example, the amount of thermal radiation that a node
generates will be used by PNM for its thermal capacity calculations. This is so a report
can be generated to say whether there is su cient cooling capacity in the heat,
ventilation and air conditioning (HVAC) system to keep the equipment room at the correct
temperature.
For most people at a functional level, this level of node analytics is too deep to be
considered even interesting. However, for PNM, these de nitions are very important.
This is because PNM creates rules, relationships and calculations based upon these
classi cations.
5 Telecom Sub-Nodes
5.1 Hardware Sub-Nodes
Sometimes, a node is made up of a series of smaller nodes that live inside a host node.
There are two main types of sub-nodes, hardware sub-nodes and software sub-nodes.
A typical example of a hardware sub
node is an Add Drop Multiplexer
(ADM) within a SDH network. The
host node is the ADM itself. The ADM
might contain a number of E1
tributary cards. Each tributary card
has its own properties, similar to the
properties of its parent node. In some
cases, the sub-node may change the
properties of its host node. This might
be the case in an ADM node’s power
requirements, that will increase as
more E1 cards are added. The ADM’s
total power requirements will be
related to its con guration property,
which will de ne how many cards are
installed, their type and their
individual power requirements.
11
fi
fi
fi
ffi
fi
fi
fi
A host node could be regarded as a sub-node, depending
upon where it was installed. Following certain rules, the
same node type, for example an optical splitter, could be
a node in one site and a sub-node in another site, all in
the same network. This makes life very complicated and
needs to be avoided.
Imagine a splitter that is located in an equipment room
of an exchange building. The splitter is obviously
considered to be a node. If that same splitter was
installed in a manhole, and the manhole was
considered a node, that splitter would have to be a sub-node. From that splitter’s
perspective, we need to refer to a manhole as a site. This enables the splitter to always
be a node, regardless of where it is installed.
5.2 Software Sub-Nodes
A typical example of a software sub-node is an application that performs a network
function.
In 5G, these applications would include the access and mobility function (AMF),
session management function (SMF), user plane function (UPF), centralised unit (CU),
and distribution unit (DU), etc.
The software functions reside in a server. That server is a host node. The applications
inside the server are its sub node(s). The properties of a software sub-node are very
di erent from a hardware host node. A software sub node itself, doesn’t generate heat,
but may in uence the amount of heat generated by its host node. A software sub-node
doesn’t occupy a footprint in an equipment room, but does occupy storage in the host,
and consumes the host node’s processing power.
For a hardware or a software-based host node, its con guration would be dependent
upon the properties of its sub nodes. If relevant, these are sent internally within PNM
to its capacity calculator.
12
ff
fl
fi
6 Node Ports
Every node has ports. Ports terminate connections between the node and other nodes.
Ports are the gateway to the rest of the network via a connection of some description.
Even a simple bedside light has a port. This is a power port where the connection is the
power cord. Without ports, a node would have to be able to function without any
connection to any other node. These self-su cient type nodes, by pure de nition, can
never be part of a telecom network.
A node has one or more node types. For instance an ODF that has many identical ports
that terminate a speci c bre optic type connector would be regarded as one port type.
That same ODF might have multiple port types.
Physical properties fall into one of 4 main port type groups. These are:
• Mechanical
• Electrical
• Optical
• Radio frequency (RF).
13
fi
fi
ffi
fi
6.3 Optical Ports 6.4 RF Ports
From a physical interface perspective, From a physical interface perspective, the
optical port properties re similar to RF interface is very simple, as it is the air
electrical ports. Optical bres can be or a wave guide. The air has no
terminated with a variety of connectors and so there are no ( xed)
connectors. These include: properties.
To connect a host’s sub-node to another host, or another host’s sub-node, only the ports
on the host nodes are used. Imagine an ADM node with an E1 tributary card. The E1
tributary card is a sub-node. However, it still requires power to be able to function. The
power comes from the ADM host node, its incoming power received via its power port
that is sourced from a power distribution cabinet node. Inside the ADM, there will be a
port to send power to the E1 tributary card and a port on the E1 tributary port to receive
that power. However, these are internal ports and speci c to the manufacturer.
From PNM’s perspective, these internal ports do not require registration.
Sub-nodes that are software applications, follow the same rules. PNM can register
software ports, but these are 16-bit port numbers identifying well-known ports, (for
example HTTPS port 443), registered ports, dynamic, private ports and sockets. PNM
does not register the virtual ports within a server that allows the application to send and
receive signals to the server’s network interface card (NIC) and the associated external
node port.
14
fi
fi
fi
7 Connections (Circuits)
Connections in a telecom network are also sometimes called circuits or paths.
Connections that connect two nodes via their ports are called point-to-point
connections. Connections between more than one node is called a point to multi-point
connection.
For PNM to consider a connection to be a connection, the connection must be
terminated by a port in all of the relevant nodes.
A connection can be a:
• Physical connection
• Logical connection
• Virtual connection.
15
ffi
fi
7.3 Virtual Connections
The virtual connection layer is the only layer out of the 3 layers that does not
have a planned and permanent connection, neither point to
point, nor point to multipoint. Virtual connections have
two or more node ports somewhere in the network that
need to connect with each other. The
virtual signal is split into packets of data.
The network then routes each
packet along its logical and physical
resources to its destination, using a best
attempt approach.
Each packet might
be transported
using a di erent
route depending
upon network conditions
such as quality, priority and congestion. Examples of virtual layers are the interfaces
that carry signals between 5G applications, such as the N1, N2 and N3, etc.
The connection types all have a relationship with each other. Most connections have a
payload, or a connection it carries. It also has a carrier, or a connection that carries it.
The bottom most layer is the trench in the physical connection group.
16
ff
Because a trench is at the bottom of the hierarchy, it doesn’t have a carrier, only a
payload.
Like all connections, a trench must have at least two nodes to connect to. A trench can
therefore terminate at a manhole (MH), a hand-hole (HH), a street cabinet (SC), or an
external termination point (ETP).
An inside plant (ISP) duct is installed between two or more footprints. An ISP duct
will normally carry cables, bres and conductors, but rarely sub-ducts. An ISP
duct will normally be laid above racks, or under a raised oor. PNM does not
consider that an ISP duct has a carrier.
17
fi
fl
7.7 Cables (Physical Connections)
Cables can be classi ed as being an outside
plant (OSP) cable, or an inside plant (ISP) cable.
Although this sounds quite straight forward in
real life, there is some grey area for PNM.
• Ethernet cables
• Non-Ethernet Comms cables
• Power cables
18
fi
fi
fi
fi
The eight conductors inside an Ethernet cable perform the same function, have the same
pinout on a RJ45 and use the same colour code. An Ethernet cable is always plugged into
a RJ45 jack, there is no possibility to plug in individual conductors. For this
reason, PNM ignores the conductor layer as a payload and only
considers the next layer, which is the transport layer in the logical
connection group. The cable will require a port, but only
because its ignored payload still requires one. The same may
apply to some other non-Ethernet cables such as coax cables.
Most non-ethernet cables are multi-conductor cables. Like optical cables, the cable itself
doesn’t require a port. That requirement belongs to its payload, i.e. the conductors
inside the cable. A conductor from one cable may be connected to a conductor from
another cable to form a conductor-connection.
DC POWER
DC power has two conductors and
PNM does recognise each conductor
individually. There is a second reason
as well. Like a multi-conductor
comms cable, a conductor from one
cable may be connected to a
conductor from another cable to
form a conductor-connection.
19
ff
7.8 Transport Carrier - Fibre, Conductor, RF (Physical Connections)
Typical examples of the transport layer include 100GE, 10GE, 1GE, IP/MPLS, SDH and
PDH. Within these transport layer groups, there are sub-categories. Within SDH for
example, a transport layer might be classi ed as a virtual container level 1-2 (VC12),
virtual level 3 (VC3), virtual container level 4 (VC4), and Synchronous Transport Module
level “n” (STM-n). Each sub-category has its owns data speeds, protocols and rules.
One sub-category can be the carrier for another sub-category. For example, an STM-1
can be the carrier for a VC4 and a STM-4’s payload. If the bottom most layer is that VC4,
it is the VC4, that will be the bre’s payload. The top most layer of the transport layer
group carries the tra c layer. This can be virtual tra c as is the case in 5G technology.
A transport layer
connection can be
a point-to-point
connection or a
point-to-multipoint
connection. 20
fi
ffi
fi
ff
fi
fi
ffi
fi
fi
7.10 Interface (Virtual Connection)
A virtual connection makes use of the logical transport layer on a packet by packet
basis. Each data packet of a virtual connection may be transported on a di erent
logical route, according to the latest information in a router’s routing table.
PNM initially assumes that all routes have an equal cost factor and pretends that all
packets will be transmitted and received along the same logical routes.
PNM will update its assumptions based upon live data from an OSS or another node to
say something di erent or upon manual changes in the connection properties
regarding speed and bandwidth.
The interface layer has no payload, as it is at the top of the hierarchy. Examples of
interfaces taken from a 5G network include Xn, N22 and N6.
8 Network Data
Network data can be stored in one of three ways;
In order for network data to be complete, accurate and useful, it must rst be captured.
The capturing can be achieved in one of three ways.
• Automatically via an API that is con gured to be in an auto discovery mode between
PNM and the data source.
• Automatically via an export function from the source to a common format such as a
spread sheet.
• Manually into a common format such as a spread sheet, using the data obtained as a
result of a network audit.
21
ff
fi
fi
ff
The data is normally captured using a project approach. Capturing the data from an
entire network can seem like an impossible task, especially when the data is
fragmented and suspected of being incomplete, inaccurate, corrupt, con icting or
missing altogether.
The capturing is therefore prioritised geography-based, technology-based or pain
point-based, or a combination of all three, depending upon the requirements. This
allows the capture scope to be simpli ed and easily manageable.
Once the data is captured, it must be validated. This prevents a typical “rubbish in
– rubbish out” scenario. PNM’s bulk loader provides the initial validation function
for all captured data that is not transferred directly into PNM via an API. Data that
cannot be validated is highlighted and needs to be validated and/or corrected
manually.
The nal step is to migrate the validated data into PNM. Once migrated using
PNM’s bulk loader function, or API, the imported data is once again validated using
any network data that has already been imported into PNM previously. Any issues
that are found are highlighted, enabling the data to be corrected.
Export Conversion
Network
Audit
Common
Format
API
Spreadsheet
22
fi
fi
fl
The data can be used in a number of PNM features. Each feature is designed to
save the telco a signi cant amount of capital expenditure and operational
expenditure. Network related features include:
9 Naming Convention
The naming convention on which most telcos base their own naming convention is ITU
recommendation M.1400. Because M.1400 was created for use with analogue and time
division multiplex circuits serving the international PSTN, adaption for IP-based and
national mobile networks became challenging.
By default, PNM uses a modi ed version of M.1400. Regardless, PNM allows telcos to
create their own naming convention.
23
fi
fi
fi
fi
ffi
9.1 Site Naming Convention
code and are added onto to the site name. An MPLS router in Auckland would be
identi ed as AKL-MPLS. If there is more than one ODF in Auckland, they might be called
AKL-MPLS-1 and AKL-MPLS-2, etc.
In M.1400, node ports are not included in the naming convention as a change of port
does not change the connection’s originating destination, terminating destination, speed
or sequence number.
This carries on into SDH and IP-based connections. For example, a STM-4 in SDH is
identi ed as 4S. A 10 gigabit Ethernet connection is referred to 10GEn.
24
fi
fi
fi
fi
fi
fi
9.3 Sequence Number Naming Convention
The sequence number is the number that follows the total number of connections that
have the same site names, node names and speed. For example there might be 12
connections running between Auckland-MPLS-2 and Wellington-MPLS-3 at 10 gigabits
per second. The next connection in the sequence will be:
AKL-MPLS-2—WLG-MPLS-3-10GEn13.
User plane tra c is tra c that is primarily generated and received by a telco’s
customers or users. The users can be either a human or a machine.
Control plane tra c is tra c that is primarily generated and received by telecom nodes
to set up, tear down or transfer call-related information between nodes. Telecom
networks use a sub-network, known as a signalling network, that crosses technology
boundaries. To a certain degree, it runs in parallel to the user plane network that it
serves.
For example, a signalling network would establish and tear down a call between a
PSTN user and a mobile user.
Historically there have been many di erent types and versions of signalling protocols
including:
25
ffi
ffi
ffi
ffi
ffi
ffi
ff
ffi
Signalling can be in-band or out-of-band. In-band means that the signaIling messages
are carried in the same channel as the user tra c is carried in. Out-of-band signalling
means that the signalling messages are carried in a separate channel than the user
tra c is carried in.
There are many di erent types of signalling networks including, but not limited to:
SS7 uses CCS (Common Channel Signalling), where one out-of-band signalling link
carries the signalling messages for multiple channels of user plane tra c. However,
despite SS7 still being widely used, it is being superseded by newer technologies.
The SS7 subnetwork contains nodes. These nodes can be dedicated hardware type
nodes, hardware-based sub-nodes that reside on host nodes, or a virtualised sub-
node function on a host node. Sometimes multiple SS7 nodes can reside on or in one
physical host. Examples of SS7 nodes include:
SSP (Signalling Switching Point): This node terminates SS7 messages. It is normally
built into a switching node such as a PSTN switch or a MSC/VLR.
STP (Signalling Transfer Point): This node switches SS7 messages between SSPs. It
can be regarded as a “telephone exchange” for SS7 messages.
SCP (Switching Control Point): These are databases for advanced call processing e.g.
translating 0800 and 0900 numbers into directory numbers.
A comprehensive SS7 network can be seen in the diagram below.
26
ffi
ff
ffi
ffi
SSPs, STPs and SCPs are connected together using the same transmission medium
types as the user tra c. For redundancy purposes, they use a mated pair con guration,
so that if one of the links fails, there is a second one available.
The SS7 network is made up of several types of links. These links are assigned a letter
and form access functions as follows:
SS7 has a protocol suite similar to the OSI model consisting of Message Transfer
Protocols (MTP), SCCP (Signalling Connection Control Part) and Applications, e.g.,
Intelligent Network Application Part, Mobile Application Part, Transaction Capabilities
Application Part, and Integrated Services Digital Network User Part.
NETWORK APPLICATION
PHYSICAL DATA LINK
LAYER LAYER
LAYER LAYER
MTP Level 3 INAP, MAP, TCAP,
MTP Level 1 MTP Level 2
& SCCP CAP, ISUP, etc
RADIUS primarily uses the UDP (User Datagram Protocol) as its transport protocol,
which is part of the TCP/IP suite. RADIUS messages are sent and received between a
RADIUS server and telecom network nodes that are its “clients”.
DIAMETER is a more modern version of RADIUS and uses TCP for a more reliable
method of communication. Both systems are primarily used for AAA (Authentication,
Authorization, and Accounting)
27
ffi
ff
ffi
fi
SCTP (Stream Control Transmission Protocol), is used to ensure reliable and ordered
delivery of signalling messages over IP networks. SCTP is preferred due to its features
like multi-homing, path redundancy, and congestion control.
PNM can register all of the above IP-based protocols. It is less complicated than SS7
since these protocols use existing IT networks that will already be registered.
11 Conclusion www.pulsetelecom.net
28
fi