Академический Документы
Профессиональный Документы
Культура Документы
Foreword
After more than 100 years of experience in providing global telecommunications solutions, Nortel (Northern Telecom) has acquired Bay Networks, Inc., adding worldclass, IP-based data communications capabilities that complement and expand Nortel's acknowledged strengths. This precedent-setting union creates Nortel Networks, a new company with a widely respected heritage and a unique market position: Unified Networks. Unified Networks create greater value for customers worldwide through network solutions that integrate data networking and telephony. The Unified Networks strategy extends to solutions, products, and services, delivering new economics in networking by reducing costs, introducing higher revenue services, and delivering new value derived through networking. The emergence of the World Wide Web and increasing market deregulation has created a strong demand for networks that provide increased profitability and higher service levels for organizations of all types. Unified Networks from Nortel Networks deliver cutting-edge solutions to reach these new levels of economics. To meet increased needs, Nortel Networks is delivering a new class of customer relationships. Extranets, intranets, Web access, e-mail, call centers, and old-fashioned personal attention are combined to help customers deal with a wide range of new, challenging, and potentially confusing issues. Whether a customer is at the enterprise level, a service provider, or a small business, Nortel Networks delivers Unified Networks solutions designed to meet their unique business challenges. Solutions based on Unified Networks strategies can take many forms, involving many different products and technologies - including those that existed prior to the merger with Bay Networks and many launched since. Unified Networks solutions are differentiated only by their size, scope, and ambition. Each solution is tailored to the unique needs of the customer, and integrates a variety of products, technologies, and services, some of which are described below. Accelar brings together switching and routing into a low-cost, very high-performance package. CallPilot unifies disparate messaging systems, user interfaces, and presentation formats, making messaging more intuitive and easier to use.
Introduction
Voice Fundamentals
Integrated Network Management equips service providers with a common network management platform. IPConnect brings sophisticated telephony services to IP networks. Optivity offers a portfolio of advanced enterprise network management applications and services. Passport supplies enterprises with wide area networking (WAN) solutions that consolidate multiple services, including voice and data, onto a single service provider networking infrastructure. PowerTouch terminal products and advanced telephony and information appliances provide customers with easy and convenient access to network services. Reunion broadband wireless access solutions supply customers with high-speed data, telephony, and Internet services. Symposium advanced customer transaction centers enhance and expedite the way businesses interact with their client base. TransportNode delivers the capacity and reliability of the Optical Internet. Wireless products bring voice, data, and mobility together with an Optical Internet. Network services help to quickly transform disparate networks, architectures, and implementations into high-value Unified Networks.
Regardless of the products, applications, and services used, Unified Networks solutions deliver an integrated approach designed to meet the challenges faced by businesses and organizations of all sizes. Nortel Networks offers a high level of expertise, integrating networks, products, applications, services, and technologies to address the most pressing networking issues faced by businesses today. Unified Networks deliver a new level of economics - based on higher performance, lower cost of ownership, and a range of new high-value applications - designed to improve how business gets done.
Best in class
#1 #2 #2 #1 #1 #1 #1 #1 #1 #1 #3 ATM enterprise switch - VSG 1998 Overall ATM Equipment - VSG 1998 ATM LAN Switch - VSG 1998 Frame relay enterprise switch - VSG 1998 Frame relay switches sold to enterprises - In-Stat 1H98 Worldwide frame relay switch - VSG 1998 Overall Frame relay equipment - VSG 1998 Worldwide enterprise switch - VSG 1998 Overall multiservice switch in 1997 - Dell'Oro Multiservice switches sold to enterprises - Dell'Oro 1H98 Multiservice switches sold to ISPs - Dell'Oro 1H98
II
Introduction
Voice Fundamentals
#1 #1 #1 #1
FRADs - Dataquest 1998 FRAD revenues - Dell'Oro 1H98 Packet Switch - Dataquest 1998 in PADs - Dataquest 1998
Voice Communication
Voice communication has long existed in the world of analog and digital telephone exchanges. Fixed, dedicated, switched services have provided the user with the ability to place telephone calls to practically anywhere in the world. The way that voice is carried and switched within both public and private networks is changing with the evolution towards the Broadband-Integrated Services Digital Network (B-ISDN), as based upon Asynchronous Transfer Mode (ATM) technology. This evolution is accelerating the shift to enterprise networks capable of handling voice, video, and data transmissions over a single, integrated infrastructure. This evolution delivers numerous benefits, including more efficient use of network bandwidth and the ability to offer many different types of voice service. However, there are many issues that first need to be understood, and then overcome, before these benefits can be realized. This booklet examines these issues, highlighting voice communication techniques in use today and investigating those that may become commonplace in the future. Of course, with the limited space available, every technological aspect will not be covered in depth. This booklet is designed to serve as useful introduction to the main subject areas, and additional references have been included for individuals interested in learning more. References are given by a number in square brackets and listed in Appendix D e.g. [3].
Intended Audience
This booklet is intended for a broad range of readers who are involved in the design, implementation, operation, management, or support of enterprise networks carrying both voice and data traffic. It has particular relevance to those with a background in data and/or limited experience in voice technologies, although it will also serve as a useful reference for anyone involved in voice networks today.
Introduction
III
Voice Fundamentals
IV
Voice Fundamentals
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.1 A Short History of the Telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
The Telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
2.1 Key Voice Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.2 Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Basic Operation of the Telephone . . . . . . . . . . . . . . . . . . 2.2.1 Basic Telephony - Signaling . . . . . . . . . . . . . . . . . . 2.2.2 Basic Telephony - The Speech Path . . . . . . . . . . . 2.3 Other Types of Telephones . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 "Two-wire" vs. "Four-wire" Telephony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 .3 .4 .4 .4 .7 .7 .8
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
3.1 Introduction to the PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 3.2 Call Routing in a PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 3.3 Voice Interfaces on a PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Table of Contents
Voice Fundamentals
4.5 The Need for PBX Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 4.5.1 PBX Systems Without Synchronization . . . . . . . . . . . . . . . . . . . .26 4.5.2 PBX Systems With Synchronization . . . . . . . . . . . . . . . . . . . . . . .26
VI
Table of Contents
Voice Fundamentals
Private-to-Public Networking Protocols Public to Public Networking Protocol . Private Networking Protocols . . . . . . . How Does CCS Work? . . . . . . . . . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83 .85 .86 .86 .88 .88 .89
10.1 Introduction to Frame Relay . . . . . . . . . . . . 10.2 Voice Over Frame Relay (VoFR) . . . . . . . . . 10.2.1 Delay on Frame Relay Networks . . . . 10.2.2 VoFR Standards . . . . . . . . . . . . . . . . 10.3 Benefits and Issues of VoFR . . . . . . . . . . . . 10.3.1 Benefits . . . . . . . . . . . . . . . . . . . . . . . 10.3.2 Issues . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents
VII
Voice Fundamentals
. . . . . . . . . . . . . . . . . . . .95
12.1 The Evolution of Voice Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 12.2 What is Voice Switching? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98 12.3 Why Perform Voice Switching? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
APPENDIX A - Company and Product Overview . . . . . . . . . . . . . . . . .101 APPENDIX B - Introduction to Decibels . . . . . . . . . . . . . . . . . . . . . . . .109 APPENDIX C - Glossary of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 APPENDIX D - References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
VIII
Table of Contents
Voice Fundamentals
1 Introduction
This booklet provides an introduction into many of the fundamentals of voice communication, beginning with analog techniques, and concluding with voice over ATM. Some of the ways that enterprise networks can be created will be discussed, and how to make the most efficient use of available network bandwidth through techniques such as speech compression and speech activity detection (also known as silence suppression). Many other issues are discussed, including how and why echo occurs and techniques that can be used to overcome it, thus allowing network managers to migrate their voice networks onto ATM.
Section 1 - Introduction
Voice Fundamentals
in most domestic homes today still operates in essentially the same way as the telephones of over 100 years ago.
Section 1 - Introduction
Voice Fundamentals
2 The Telephone
In this section, the basic operation of the telephone is examined with a look at the two basic functions that it offers: signaling and speech transmission. To better understand this critical piece of equipment, it is important to appreciate how human voice and hearing function. To complete this section, other types of telephones will be examined, including proprietary designs and digital telephone sets.
Voice Fundamentals
As a result, the frequency band used in telephone systems is limited to between 300 Hz and 3.4 kHz, delivering a system that provides speech transmission that is quickly recognized and easily understood.
2.1.2 Levels
It is important to ensure that voice signals are transmitted at the correct level across a network, so that end-to-end performance is maintained. Too low a level can result in speech merging into background noise, creating an environment where the listener finds it hard to hear the talker and is encouraged to talk loudly. On the other hand, too high a level will encourage the listener to talk too quietly. Today, international voice communication is part of everyday life. People need to be able to communicate with others anywhere in the world as effectively as if they were in their own country, or even in their own office. This goal is complicated by the way telephone systems have evolved differently in different countries. For example, an analog (the term analog is described in section 4.2) telephone from North America transmits a lower-level electrical signal for a given acoustic volume than a telephone in the UK. Signal levels will be discussed in this booklet in terms of decibels (dBs), and related terms such as dBm, dBm0, and dBr. For readers unfamiliar with these terms, or individuals who simply need a refresher, please refer to Appendix B.
Voice Fundamentals
to the user that they may now start to dial. Dialing before hearing the dial tone may result in digits being missed by the exchange. However, today's modern exchanges will usually return dial tone immediately after detecting current flow. Upon hearing the dial tone, the user begins to dial the called number. If the telephone is set to pulse dial, the telephone rapidly opens and closes the loop at a rate of approximately 10 PPS (Pulses Per Second) or 20 PPS. This is also referred to as loop-disconnect dialing. Figure 2.1 shows the progress of a call from the handset being lifted and dial tone being returned, to the first digit being dialed (a 3 in this case).
Voice Fundamentals
The frequencies used are shown in Figure 2.2 and defined in ITU-T Recommendation Q.23 [1]. DTMF transmits digits much faster than pulse dialing, and the time taken to send each digit is independent of the digit being sent. An additional benefit of DTMF is that once the call is established, pressing a key on the phone will transmit the tones over the voice path, enabling DTMF to be used to access voice mail, home banking systems, and other tone-based systems. When an incoming call arrives at the telephone set, the exchange applies an AC ringing voltage to the pair of wires. To answer the incoming call, the user picks up the handset. This action applies a loop to the line that is detected by the exchange, which then removes the ringing and connects the voice path through. Recall - Recall is a function usually available on a simple two-wire analog telephone (except for older models). It is often accessed with a button marked "R", and can be used for a number of functions such as accessing additional features from a telephone exchange or swapping between calls on the same line. There are two types of Recall, namely Timed Break Recall (TBR) and Earth Recall (ER). With TBR, pressing the Recall button while the handset is off-hook causes the phone to put a timed break on the line (similar to dialing a "1"). With the phone set to Earth Recall, the phone momentarily applies a ground (earth) to one of its leads, known as the B lead.
Voice Fundamentals
Voice Fundamentals
PBX converts the analog signals to digital PCM (see Section 4.2). A digital telephone performs the analog/digital and digital/analog conversions within the set. Some digital telephones are of a proprietary nature, where the format of the digital data is manufacturer-specific. Many digital sets, however, conform to the Basic Rate ISDN standards as outlined in ITU-T Recommendation I.420 [2]. This defines a digital interface that carries two channels operating at 64 Kbps (known as the B or Bearer channels) and a 16 kilobits per second (Kbps) signaling channel (known as the D or Delta channel). The B channels can be used to carry data or digitized voice in a similar manner to the Primary Rate interfaces as described in sections 4.3 and 4.4. The main difference is that on a Basic Rate interface only two B channels are available. The D channel is normally used to carry Common Channel Signaling (CCS) information for call control in a similar manner to CCS on Primary Rate interfaces (see Section 7.2). However, the specifications also allow the D channel to be used to carry user data, including packet-switched and frame-based data.
Voice Fundamentals
Voice Fundamentals
Most larger PBX systems today are digital. This means that they route connections in a digital form, with speech first being converted from analog into PCM (see Section 4.2). Figure 3.1 shows the typical components used within a digital PBX. The "core" of the PBX is the common control and the switching matrix. The common control acts as the "brains", and controls the overall operation of the PBX. It performs functions such as recognizing that a phone has been taken off hook and connecting a dial-tone generator to the phone, interpreting the dialed digits and routing the call to a particular trunk or line interface, and so on. The switching matrix takes in 1.544 Mbps bit streams comprising multiple 64 Kbps channels and allows them to be connected, or switched, to any other 64 Kbps channel on any other interface. Interfaces to the PBX come in two main types: lines and trunks. Lines connect user devices such as analog or digital telephone sets, or other devices such as data terminals. Trunks are shared links and can carry connections originating from line interfaces on the same PBX or from other trunks also connected to the PBX. Analog trunks can only support one connection at a time, while digital trunks can support many connections simultaneously (see Sections 4.3 and 4.4). The trunks can then be broken down into two additional types: PSTN trunks (also called Central Office trunks) and private trunks. PSTN trunks connect the PBX to the public telephone network, and private trunks (also called "Tie lines" or "Tie trunks") connect the PBX to other PBXs as part of an overall private network.
10
Voice Fundamentals
11
Voice Fundamentals
12
Voice Fundamentals
13
Voice Fundamentals
14
Voice Fundamentals
15
Voice Fundamentals
Due to a finite number of quantization levels available, this process introduces an error into the digital representation of the analog signal. The more bits used in each sample results in additional quantization levels and less error. To achieve reasonable quality over the range of speech amplitudes found in networks requires a minimum of 12-bit PCM samples assuming linear quantization (also known as uniform quantization). A view of linear quantization is given in Figure 4.3a. In practice, this number of levels is unnecessary for two reasons. First, average signal levels are normally small, and only the lower quantization levels actually get used. Second, the human ear operates in a logarithmic manner, being more sensitive to distortion in low-level signals than in high-level signals. As a result, a technique known as companding is used. This reduces the number of quantization levels by retaining multiple levels at low signal amplitudes, and reducing the number of levels for high amplitudes. This process of companding is shown in Figure 4.3b.
16
Voice Fundamentals
direct method of measurement. Instead, a specific relationship is defined between an analog signal and a digital sequence. The relationship of power to the digital signal is defined in G.711 through two tables (one for -law and one for A-law) that define a sequence of PCM samples. When decoded, these samples result in a sine wave signal of 1 kHz, at a nominal level of 0 dBm0. This provides a theoretical maximum level of +3.17 dBm0 for -law, and +3.14 dBm0 for A-law. Any attempt to exceed these levels will result in distortion of the signal, simply because there are no more quantization levels.
17
Voice Fundamentals
4.3.2 Framing - D4
There are two common types of framing used on a DS-1 interface, D4 and Extended Superframe (ESF). D4 framing is shown in Figure 4.8. This consists of a frame of 193 bits with a repetition rate of 8000 frames per second, giving a data rate of 1.544 Mbps and a 125s frame duration. Each frame contains 24 eight-bit timeslots named timeslot 1 through to timeslot 24, and a single bit called the F or framing bit. All 24 timeslots are normally available for traffic except for when CCS is carried. In this case, timeslot 24 is reserved for the signaling channel. Framing is achieved using the F bit over a sequence of 12 frames, which is also called a superframe. In odd-numbered frames the F bit is called Ft for terminal framing, and performs frame alignment. In even-numbered frames the F bit is called Fs and performs superframe alignment.
18
Voice Fundamentals
19
Voice Fundamentals
20
Voice Fundamentals
One of two types of physical interface may be used: the 75-ohm unbalanced coaxial interface, or the 120-ohm balanced twisted pair interface. Parameters including voltage, voltage and frequency tolerance, and others are specified in G.703. The actual data bits are transmitted using Alternate Mark Inversion (AMI) with High Density Bipolar 3 (HDB3) encoding. The objective of using these is twofold: first, to remove any DC component from the transmitted signal (AMI performs this function), and secondly, to ensure that there are a sufficient number of voltage transitions in the signal. This is referred to as "1"s density, and is important so that the receiving device can derive synchronization, or timing from the signal (HDB3 performs this function). Figure 4.8 shows AMI and HDB3 encoding. AMI employs a three-level signal where binary zeroes are encoded using 0 volts, and successive binary "1"s (marks) are encoded using alternating voltages of 2.37 V for the unbalanced interface and 3 V for the balanced interface. HDB3 is defined in G.703, and works by replacing each block of 4 successive zeroes by a pattern of either 000V or B00V, where B represents an inserted pulse that conforms to the AMI rule and V represents an AMI violation. A violation is where two successive "1"s use the same electrical polarity. The choice of which pattern is used ensures that the number of B pulses between consecutive V pulses is odd, thus retaining the DCbalanced nature of the signal. This is important to help ensure error-free transmission.
21
Voice Fundamentals
22
Voice Fundamentals
synchronize to the frame, enabling them to know where the frame starts and which bits refer to which timeslot. The A-bit, also known as the Remote Alarm Indication (RAI) is set to "0" in normal operation. In the event of a fault condition the A-bit will be set to a binary "1". See section 4.3.5 for more details on alarms. The other bits, Si and Sa4-Sa8, are of less significance, although still important. Si is reserved for international use. One specific use, as given in G.704, is to carry a Cyclic Redundancy Check that can be used for enhanced error monitoring on the link. It is important to note that both ends of a link must be configured in the same way, either with CRC enabled or CRC disabled. Sa4 to Sa8 are additional spare bits that can be used for a number of purposes as defined in G.704. For example, Sa4 can be used as a message-based link for operations, maintenance and performance monitoring.
23
Voice Fundamentals
signify loss of multiframe alignment. Timeslot 16 of frame 1 then carries A, B, C, and D bits for timeslots 1 and 17, timeslot 16 of frame 2 carries A, B, C, and D bits for timeslots 2 and 18, and so on up to frame 15 of the multiframe, which carries A, B, C, and D bits for timeslots 15 and 31, after which the sequence repeats. A common problem is when the A, B, C, and D bits in timeslot 16 associated with any of the traffic channels 1 to 15 are set to 0000. If this is the case a false multiframe alignment signal will result, causing the whole signaling mechanism to fail. This situation is most common in a configuration where the PBX system is connected to a multiplexer network that provides an idle pattern of 0000 to the PBX for channels that are not routed. In fact, ITU-T G.704 recommends against the use of 0000 for any signaling purposes for timeslots 1 to 15. It also recommends that if B, C, and D are not used, then they should be set to B=1, C=0 and D=1.
4.4.5 E1 Alarms
Recommendation G.732 describes various fault conditions and subsequent actions that should be taken. It includes such conditions as power supply failure and codec failure, although this booklet will only describe problems associated with the link itself. Frame Level Alarms - (in reference to Figure 4.6) In the event of one of the following problems occurring on the received signal (Rx), bit 3 in timeslot 0 of odd numbered frames should be set to "1" on the transmit (Tx) signal of that PBX system. Loss of incoming signal Loss of frame alignment Excessive error ratio 1 x 10-3
24
Voice Fundamentals
Loss of frame alignment will occur for a number of reasons, including cabling or equipment faults. In the event of a failure in the transmission system between the two PBXs, the transmission system should automatically apply an Alarm Indication Signal (AIS) condition to the line of a continuous stream of "1"s. Multiframe Alarm - When running Channel Associated Signaling, bit 6 of timeslot 16 in frame 0 of the multiframe is used to indicate loss of multiframe alignment. If multiframe alignment is lost on the receive signal, the PBX will set bit 6 in its transmit signal as to the far end. Loss of multiframe alignment is a rare situation, since in a normal failure condition loss of frame alignment is more likely. A common cause of such a condition is misconfiguration of one end of the link, as described in Section 4.3.3 above.
1,544,001Mbit/s
1,543,999Mbit/s
Voice Fundamentals
To understand why synchronization is required, consider the following two examples. The first example shows two PBX systems connected without synchronization, while the second shows PBX 2 synchronized to PBX 1.
1.544001 Mbit/s
1.544001 Mbit/s
26
Voice Fundamentals
There are a number of rules to follow with synchronization, one of which is that the whole network should be synchronized back to the same clock source. Figure 4.13 shows a small network of five PBX systems with PBX 1 taking a high-accuracy clock from an ISDN connection to the public network. An ideal clocking arrangement based upon this network would be for PBX 2 to synchronize its system clock to the data on Link 1 coming from PBX 1. PBX 3 would then synchronize to the data coming from PBX 2 via Link 2. PBX 4 would synchronize to PBX 1 via Link 3 and PBX 5 to PBX 4 via Link 6. In this way, all PBX systems are synchronized together. However, this scenario alone would not compensate for a failure. If link 6 were to fail, PBX 5 would lose the clock to which it is synchronized. To overcome this problem, it is normal to have a clock fallback list in each PBX, and in the event of a problem the PBX will search for another valid source. However, one key criteria to follow when creating clock fallback lists is to ensure that the network cannot get into a clocking loop. For example, this is where PBX 4 takes its clocking signal from PBX 3, PBX 3 from PBX 5, and PBX 5 from PBX 4. In this scenario it is likely that errors would occur, causing loss of synchronization on the links. The error level could extend to where synchronization cannot be regained, resulting in a complete loss of one or more trunks. For this reason, it is very important to follow the manufacturer's guidelines when configuring network clocking.
27
Voice Fundamentals
28
Voice Fundamentals
5 Speech Compression
Speech compression, also referred to as voice compression, describes the process of digitizing speech to a bit rate of less than 64 Kbps. It is normal, however, to start with PCM at 64 Kbps and compress it to a lower rate. Ideally, the resulting speech quality will not be affected, however in practice, there will be some degradation that may or may not be apparent to the users. There are many different techniques with different characteristics used for speech compression, which result in bit rates from a few Kbps up to 40 Kbps. PCM speech can be compressed because a large portion of the 64 Kbps bit stream is redundant. Furthermore, it is thought that speech of reasonable quality can be provided at rates as low as 1 Kbps. This has not yet been achieved, in large part because current understanding of the way speech works is less than complete. As time goes by, new and more efficient techniques are being developed to drive the bit rate lower and lower while maintaining acceptable quality. This section looks at a number of speech compression techniques in common usage today, and other new systems poised for entry into the marketplace. The section concludes with information on speech compression impairments, including the negative effects that are introduced into voice telephony when speech compression is used.
29
Voice Fundamentals
process, called companding, results in digitized speech of 64 Kbps. Therefore, even PCM effectively represents a compressed digital speech form. Companding is discussed in more detail in Section 4.2. Other common waveform coding techniques include Adaptive Differential Pulse Code Modulation (ADPCM), and Continuously Variable Slope Delta (CVSD). Source Coding - Source coders (also known as Vocoders) are more complex than waveform coders, but can compress speech to bit rates of 2.4 Kbps and below. To achieve these compression rates, knowledge of the speech generation process is required. In principle, the speech signal is analyzed and a model of the source is generated. A number of parameters are then transmitted to the destination to allow it to rebuild the model and thus recreate the speech. These parameters include such information as whether a sound is voiced (such as vowels) or unvoiced (such as most consonants), amplitude information, and pitch. While source coders provide very low bit rates, the subjective quality of the regenerated speech can be poor. Often, although the speech is understood, recognition of whom is speaking, referred to as talker recognition, is very poor. Furthermore, source coders do not carry non-speech signals very well, such as modem or fax signals. Because of these factors, source coders are not typically used in commercial applications. Their main use has been in military applications where natural sounding speech is not as important as a very low bit rate, which can then be encrypted for security purposes. Hybrid Coding - As the name suggests, hybrid coding uses aspects of both waveform and source coding, bringing together the benefits of high-quality speech from waveform coders and low bit rates of source coders. Hybrid coders operate in a similar manner to source coders, where a model is built on the parameters of the speech signal. Rather than transmit these parameters directly to the destination, hybrid coders are used to synthesize a number of new signals. These new signals are then compared with the original signal to find the best match. The modeled parameters, along with the excitation signal, which represents how the synthesized signal was produced, are then transmitted to the destination where the speech is reproduced. Examples of hybrid coders include Code Excited Linear Prediction (CELP) and its derivatives, some of which are described later in this section.
30
Voice Fundamentals
31
Voice Fundamentals
32
Voice Fundamentals
process of adaptation, where the amplitude range that can be encoded with four bits changes depending upon the amplitudes at the time. As previously mentioned, ADPCM supports four different bit rates. The different rates are achieved through the number of bits used to encode the difference between one sample and the next, as seen in Figure 5.3.
33
Voice Fundamentals
popular form of speech compression because of its high speech quality and low bit rates, typically between 4.8 Kbps and 16 Kbps. The practical drawbacks of CELP are evident in two main areas. First, CELP often produces end-to-end delays in the order of 50 to 100 ms. This is due to a combination of the processing overhead and the number of speech samples that are buffered for analysis. Such high delays can cause transmission problems (see Section 6 on echo). Second, since CELP is tuned to human speech, it does not support voice band data well and can cause problems with modems and fax machines, as well as the transmission of DTMF tones.
5.5 Conjugate Structure-Algebraic Code Excited Linear Prediction (CS-ACELP) ITU-T G.729
CS-ACELP is another speech compression technique that is based upon CELP. It was originally designed for packetized voice support on mobile networks, although a different scheme known as RPE-LTP has been adopted on the GSM mobile telephone system (see Section 5.6).
34
Voice Fundamentals
CS-ACELP operates at a rate of only 8 Kbps, yet still provides speech quality similar to that of ADPCM at 32 Kbps. Furthermore, it has been shown to operate well in tests even when packets are lost. The coder operates on speech frames of 10 ms, corresponding to 80 samples at a sampling rate of 8000 samples per second. For every 10 ms frame, the speech signal is analyzed to extract the parameters of the CELP model (linear prediction filter coefficients, adaptive and fixed codebook indices and gains). These parameters are then transmitted to the destination in a specified frame format. At the decoder, the filter and gain parameters are used to retrieve the filter information and simulate the filter. The speech is then reconstructed by taking the codebook entry of 80 samples and passing it through the reconstructed filter. Speech is then be converted to A or -law PCM and transmitted to the interface. Please note that this is a somewhat simplified description of the operation of CS-ACELP. A more detailed description can be found in G.729 [16].
35
Voice Fundamentals
Digital Speech Interpolation (DSI) - DSI is the generic term for systems that make use of the gaps in speech by stopping the transmission of digitized voice samples, thus reducing the effective bit rate of the voice channel. It relies on the probability of the speech activity factor (SAF) during a conversation being less than 1. The SAF is the amount of time that one person is talking in an average conversation, and is normally about 0.4 or 40%. An example of where DSI is utilized is in DCME (Digital Circuit Multiplication Equipment) as defined in ITU-T G.763. If a particular voice channel is compressed using 32 Kbps ADPCM, by applying DSI with an SAF of 0.5 the effective bit rate is reduced to 16 Kbps. Regular Pulse Excitation-Long Term Prediction (RPE-LTP) - RPE-LTP is a coding scheme that has been adopted for use on the GSM (an acronym for Group Spciale Mobile and Global System for Mobile communications) mobile telephone system. RPE-LTP operates at 13 Kbps (a recent version operates at 6.5 Kbps). The speech quality is reasonable, although not as good as that offered by LD-CELP or CS-ACELP. Its main advantage over these other compression schemes is its relative simplicity. For this reason, it has also been adopted as a de facto compression scheme for Internet telephony. It is well-suited for this application since compression can be performed in real time on PC platforms with relatively low processing power such as 66 megahertz (MHz) 486 computers.
36
Voice Fundamentals
telephone connections may be expected to perform. It includes definitions of Mean Opinion Scores (MOS), where a number is allocated to the quality of a speech path with the meaning of the number given in Figure 5.4. To determine this number, a series of spoken sentences are transmitted to listeners via the speech compression system under scrutiny. For each sentence, the listeners must allocate a number according to the table in Figure 5.4. The Figure 5.4 Mean Opinion Scores (MOS) numerical average of the results from all the listeners is then used to provide a MOS score for the particular speech compression system (see ITU-T P.80 for a more accurate description of this process). While not exhaustive, Figure 5.5 shows a graph of the speech quality achieved with a number of different speech coding techniques in terms of their Mean Opinion Scores. Note that the use of the term CELP covers Figure 5.5 MOS for Different Speech Coding Schemes a range of different techniques, including proprietary systems and standardized ones such as LD-CELP and CS-ACELP. By using compression schemes such as CS-ACELP, a similar quality to ADPCM at 32 Kbps and regular PCM at 64 Kbps can be achieved. This general quality of speech is often known as "toll quality".
37
Voice Fundamentals
38
Voice Fundamentals
39
Voice Fundamentals
40
Voice Fundamentals
Voice Fundamentals
42
Voice Fundamentals
43
Voice Fundamentals
before transmission. Furthermore, buffers used to reduce jitter impose additional delay. These buffers are used at the output of the network to overcome problems caused by frames/cells arriving from the network at irregular times. Speech Compression - Some speech compression techniques impose significant delays because of the time it takes to perform compression, as well as the need to store up speech samples. For example, CS-ACELP (ITU-T G.729), which compresses speech to 8 Kbps, introduces a one-way delay of approximately 15 ms. Some typical one-way delays from various causes are as follows: Cable (Copper or fiber) 1 ms per 200 km Digital Switch 0.75 to 1.6 ms Speech compression 0.5 to 100 ms Satellite hop 250 ms Frame/Cell-based system up to 50 ms
44
Voice Fundamentals
seconds and the echo control device will still work, although in practice, a delay of this length would be unusable from the point of view of the users.
45
Voice Fundamentals
46
Voice Fundamentals
However, one method described in G.165 is known as a center clipper, and is shown in Figure 6.7. Signals that are larger than the clipping level are let through without change, while signals that are smaller are reduced to the zero level. The net effect is to virtually eliminate echo.
Voice Fundamentals
48
Voice Fundamentals
49
Voice Fundamentals
Some of the key areas addressed are as follows: Use of Composite Source Signal - In determining the performance of echo cancellers, many of the tests defined in G.168 use a new test signal known as the Composite Source Signal (CSS). The CSS has been chosen because it produces test results that are similar to those that real speech would produce. This is in contrast to the white noise source as used in G.165 which does not produce very realistic results. Operation for Higher Level Signals - A G.165 echo canceller does not define requirements for handling signal levels in excess of -10 dBm0. In the past, this has not been a problem, since the average levels in a public voice network have been in the region of 16 dBm0 to -28 dBm0. However, in today's digital networks, particularly private networks, the average levels have increased to between -10 dBm0 and -22 dBm0. This can lead to error-prone performance of echo cancellers. This situation has been compensated for by G.168, which is designed for signal levels up to 0 dBm0. Improved Convergence Time - G.165 used a white noise source to assess the convergence performance of an echo canceller. In practice this was found to be ineffective, resulting in echo cancellers that would frequently take a significant amount of time to converge on real speech echoes. G.168 uses the CSS, and tightens up on the test requirements for convergence time. Three tests are included that are designed for situations where the Non-Linear Processor (NLP) is both enabled and disabled, and when echo exists in the presence of noise. Injection of Comfort Noise - Although the use of a nonlinear processor (NLP) is not required in an echo canceller, without it the echo cancellation performance is limited. The main problem with the NLP is that during operation, all signals, including low-level background noise, are removed. Normally, a user would not even notice background noise at this level. However, when background noise is cutting in and out due to the operation of the NLP, the effect can be quite irritating. A G.168 canceller recognizes this problem by allowing "comfort noise" to be injected into the transmit path (towards the network and the far end talker) of the echo canceller during the time that the NLP is activated. Proper Operation During Facsimile Transmission - Due to significant levels of facsimile traffic in today's networks, a number of tests have been defined in G.168 to ensure that an echo canceller will quickly converge on signals from facsimile machines. Please note that the list given above does not include all the tests that are given in G.168. For more detailed information, please consult the G.168 Recommendation.
50
Voice Fundamentals
51
Voice Fundamentals
Ground Start signaling minimizes the chance of glare by adding additional signals, including the application of a ground to one of the leads to indicate an incoming call. The PBX system uses this approach, rather than intermittent ringing, to identify an incoming call. Once detected, the PBX will prevent call collision on the same circuit. The following section describes the signaling sequences between a public exchange and a PBX Ground Start trunk for calls in both directions: Outgoing Call From PBX: 1) The PBX applies a ground (earth) to the Ring/B lead to seize the trunk. 2) The Exchange busies the trunk and acknowledges the seizure by applying a ground (earth) to the Tip/A lead. Dial tone may be returned. 3) The PBX removes the Ground/Earth condition from the Tip/A lead and applies a DC loop between Tip/A and Ring/B. 4) The PBX dials the outgoing number by pulsing the loop on and off or by transmitting DTMF tones. Incoming 1) 2) 3) 4) Call to PBX: The exchange grounds the Tip/A lead to seize the trunk. The exchange applies ringing to the Ring/B lead. The call arrives at the PBX operator/attendant. To answer the incoming call, the PBX applies a DC loop between Tip/A and Ring/B.
Note that in both cases, the call-in-progress state is the same as for Loop Start. This is important, since if the PBX fails, for example due to power loss, it is still possible to make outgoing emergency calls. In this case, the PBX should automatically switch the trunk to a telephone set with Earth Recall facility. Pressing the Earth Recall button on the telephone will apply a ground to the Ring/B lead just as if the PBX were making an outgoing call. The telephone set would then provide a holding loop and send the digits using pulsing, or DTMF.
52
Voice Fundamentals
common Type II E&M, where additional leads associated with the E&M leads themselves are used to overcome problems of differences in earth potential and/or noise.
Figure 7.1 shows a typical arrangement for connecting two PBX phone systems or dealer boards via an E&M signaling circuit. It shows examples of both two- and four-wire E&M and the connection configuration. The labeling convention for the connections is done with respect to the customer equipment - the M (Mouth) lead is the signaling output, and the E (Ear) lead is the signaling input. On the four-wire interface, T(ip) and R(ing) are the PBX voice output and T1/R1 are the PBX voice input. The signaling circuit should be labeled with the names of the connections to be made to the PBX, with the M connection as the input from the M on the customer equipment. However, not all equipment that forms part of the signaling circuit follows this convention. Technicians configuring E&M interfaces should be aware of the correct meaning of E/M, T/R, and T1/R1, and which are inputs and which are outputs on their particular system.
Note - In Figure 7.1 and others, we have referred to T(ip)/R(ing) as the speech pair for a two wire interface and T/R and T1/R1 as the transmit and receive speech pairs for a four wire interface. These may also be referred to as A/B for a two wire interface and A/B transmit and A/B receive for a four wire interface.
53
Voice Fundamentals
54
Voice Fundamentals
Release Acknowledge - Removal of the ground from the M lead in the opposite direction to the release. The Signaling Circuit - (see Figure 7.1) The signaling circuit may be provisioned in many ways. It may be part of a private multiplexer network, or it may be provided by a carrier as a stand-alone circuit. If it is a stand-alone circuit it is normal for the carrier to convert the E&M signals into some other form of signaling, such as digital or AC (Alternating Current) signaling, before transportation over the wide area network.
55
Voice Fundamentals
An example of an AC signaling system as used on an inter-PBX trunk is shown in Figure 7.3. This demonstrates AC15-A, and shows the signals used for simple call setup. Other signals exist, but cannot be covered within the space restrictions of this booklet.
56
Voice Fundamentals
(PMBXs), its most common current application is for signaling between dealer boards in financial trading companies. Outside of this environment, these signaling systems are unlikely to be encountered today. There are two types of manual signaling, commonly referred to as Manual Ringdown and Auto Ringdown. Manual Ringdown - Used in point-to-point applications where the caller has to take a specific action, such as pressing a key or button to alert the called party. Some common interfaces supporting Manual Ringdown include: Gen/Gen (Sometimes known as "Figure 2") Balanced Battery/Balanced Battery (Sometimes known as "Figure 5") B-wire Earth/Gen More details of each one are given below. Auto Ringdown - Used in point-to-point applications where the caller seizes the line by picking up a handset, which automatically alerts the distant end to an incoming call. Some common interfaces supporting Auto Ringdown: Loop/Gen (Sometimes known as "Figure 1") Gen/Loop (Sometimes known as "Figure 6") More details of each one are given below. Gen/Gen - Sometimes referred to as Ring/Ring, Magneto or Local Battery signaling. Gen/Gen manual ringdown is where the customer's equipment sends a ringing voltage (Gen) to the transmission line when making a call, and expects to see ringing from the line to indicate an incoming call. It typically uses a 17, 25, or 50 Hz AC signal of 70 to 80 V applied to the A and B wires of a two-wire circuit, or to the phantoms of a four-wire circuit. Balanced Battery/Balanced Battery - Sometimes referred to as Balanced Battery Bothways. The customer's equipment sends a balanced battery signal to the transmission line when making a call, and expects to receive a balanced battery signal from the
The term phantom refers to the ability of two circuits to perform the function of three. In the case of a four wire speech circuit this can be achieved by passing a DC voltage or even ringing voltage as shown in the diagram.
57
Voice Fundamentals
line to indicate an incoming call. It is effected by applying the same DC voltage, typically -24 V or -50 V to the A and B wires of a two-wire circuit, or to each wire of the phantoms of a four-wire circuit. B-Wire Earth/Gen - As the name suggests, the customer's equipment puts a ground on the B lead of the line when making a call, and expects to see ringing from the line to indicate an incoming call. This type of signaling is generally used to connect a telephone to the line, but requires the earth recall button on the telephone set to be pressed to signal to the far end. Simply picking up the handset, thus applying a loop, is not sufficient. Loop/Gen - Gen/Loop - Loop/Gen describes a customer equipment interface which provides a DC loop to indicate an outgoing call, and expects to see "generator" or ringing from the line to indicate an incoming call. This is synonymous with the operation of a basic telephone set, except in this case no dialing information is sent. The term Gen/Loop refers to the interface on the signaling circuit itself. It expects to see a loop as an incoming signal from the customer equipment, and applies ringing as an outgoing signal to the customer equipment.
58
Voice Fundamentals
trunk by changing the state of the reverse A-bit to "0." At the end of the call, one end of the link will clear down by changing its A-bit back to "1." This call has no bearing on the other voice timeslots in the same digital trunk or their associated signaling bits. It is quite possible, and in fact normal, that calls are being set up, are in progress, or being cleared down simultaneously on other timeslots.
However, throughout the 1980s, and in the absence of defined global standards, individual countries and PBX manufacturers introduced national, or proprietary, standards for PBX-to-public network and PBX-to-PBX signaling. As a consequence, equipment manufacturers and users suffered from trade barriers caused by technical incompatibilities, which hindered the cost-effective deployment of international corporate networks. The following section is an overview of some of the signaling systems that have been developed. Some are the result of international standards and agreements, while others are of a proprietary nature.
59
Voice Fundamentals
60
Voice Fundamentals
system). This provides the basis for the definition of ISDN call control for PBX to CO applications and the signaling protocol requirements for Primary Rate Interface (PRI). Digital Private Networking Signaling System (DPNSS) - A set of signaling protocols originated by British Telecom who, in conjunction with many equipment manufacturers, developed DPNSS for interworking between PBXs. It is now one of the most powerful CCS private networking systems available, and has been adopted as a de facto standard in many countries other than the UK, including parts of North America. DPNSS is defined in British Telecom Network Requirement 188 [10]. QSIG - Also known as Private Signaling System Number 1 (PSS1). It is an internationally recognized signaling system defined in European Telecommunications Standards Institute (ETSI) specifications, European Computer Manufacturers Association (ECMA) specifications, and International Standards Organization (ISO) specifications. As with Euro-ISDN, QSIG is based on ITU-T Recommendations, ensuring compatibility between public ISDN and private ISDN networks. In practice, the move towards QSIG in many countries is very slow, due to its lack of features when compared to systems such as MCDN and other proprietary systems. However, the development of new features and facilities continues, and as time goes on, more and more users will migrate to QSIG. For further details on QSIG, please refer to reference [11]. Other Proprietary Systems - Many PBX vendors have designed their own proprietary systems, including the Nortel Networks Meridian Customer Defined Networking (MCDN) system, British Telecom's DPNSS, Siemens' CORNET, and Alcatel's ABC. This list is not comprehensive, and does not include all proprietary PBX systems.
61
Voice Fundamentals
CCS is sometimes referred to as an out-of-band signaling system, because signaling does not necessarily follow the same path as the voice channels that it supports. Normally the signaling channel is carried in timeslot 24 for an DS-1 trunk, in timeslot 16 for a E1 trunk, and supports the traffic timeslots in the same trunk. In some systems, the CCS signaling channel in one trunk supports the traffic channels in other trunks. This leaves timeslot 24/16 to be used as an additional traffic channel for trunks not carrying the signaling channel. Most CCS protocols are based upon the layering structure as given by the lower three layers of the OSI model. A description of each layer follows: Layer 1 - Describes the physical connection of the interface to the line together with electrical characteristics, line coding, and framing. Layer 1 also defines the timeslot to be used for signaling: timeslot 24 for 1.544 Mbps DS-1, and Timeslot 16 for 2.048 Mbps E1. Layer 2 - Describes functions used to ensure the reliable transfer of messages over a single physical link, and are typically High-level Data Link Control (HDLC)-based. Reliable transfer is maintained through the use of sequence numbers and a Cyclic Redundancy Check (CRC) on each frame. Errored or missing frames are requested to be retransmitted. For example, Link Access Procedures on the D Channel (LAPD) is an HDLC-based system used with NIS, "Q.931 ISDN", Euro-ISDN, and QSIG. Layer 3 - Describes the actual messages used for call control. This is the layer that actually characterizes the different protocols.
Voice Fundamentals
Figure 7.5 shows an example of the Layer 2 and Layer 3 message formats. The numbers across the top of Layer 2 represent the order in which the data bits are actually transmitted across the link, starting with 1, then 2, and so on. Layer 2 Start Flag - A bit pattern of 01111110 used to identify the start of a message. Address Bytes - Used to identify the receiver or transmitter of a frame. Control Bytes - Used for various functions, including the carrying of sequence numbers. Byte 2 is not always used. Information - This is the actual Layer 3 message. FCS - Frame Check Sequence. Used for error detection. End Flag - A bit pattern of 01111110 used to identify the end of the message. Layer 3 Protocol Discriminator - This specifies the protocol that should be used to interpret the information within a particular message. Call Reference - Uniquely identifies the call that a message relates to. Message Type - Identifies the type of message, e.g. Setup, Connect, Disconnect, etc. Other Information Elements - Provides additional information depending upon what type of message is being sent, including Called Number, Calling Number, type of call (voice, voiceband data, data, etc), Channel Identification, (timeslot) etc. In order to demonstrate the operation of CCS, consider the example of a basic call setup using QSIG between two PBX phone systems. Figure 7.6 shows the Layer 3 messages transferred across the link. It does not show the underlying Layer 2 messages that are used to ensure reliable, error-free communication across the link. To initiate a call, the user of Telephone A picks up the handset and dials a number that corresponds to Telephone B. PBX 1 identifies that Telephone B can be reached via the digital trunk. The following Layer 3 messages are then passed across the trunk between the two PBXs: Setup - Used to initiate call establishment. It contains various Information Elements that define parameters such as the destination number, the calling number, the type of call, the timeslot on which the call will be carried, and others.
63
Voice Fundamentals
Figure 7.6 Message flows for basic call setup with QSIG
Call Proceeding - Sent to the calling PBX to indicate that the requested call establishment has been initiated, and no more call establishment information will be accepted Alerting - Informs the calling PBX that the called user is being alerted. The PBX will, for example, apply ring-back tone to the calling user. Connect - Indicates that the called user has answered the call, and that the calling party can be connected to the agreed traffic channel. Connect Acknowledge - Used to acknowledge receipt of the Connect message. Disconnect - Used to request that the connection be cleared. Release - Indicates that PBX 2 has disconnected the channel, and intends to release the channel and the call reference on receipt of the Release Complete message. Release Complete - Indicates that PBX 1 has released the channel and call reference.
64
Voice Fundamentals
65
Voice Fundamentals
A number of different interface types used for voice communications on telephone exchanges have already been discussed. Common interfaces available on multiplexing networks include: Analog Voice: 2-wire/4-wire with E&M signaling FXS for connection to a telephone set FXO for connection to a PBX extension interface 1.544 Mbps DS-1: 23/24 voice channels, CAS or CCS 2.048 Mbps E1: 30 voice channels, CAS or CCS
Digital Voice:
66
Voice Fundamentals
The biggest drawback that TDM networks experience is that once bandwidth is allocated for a channel, it continues to be allocated whether or not the channel is in use. This has resulted in manufacturers and users looking at other ways of supporting voice and data, such as Asynchronous Transfer Mode (ATM) and frame relay networks. Voice over Asynchronous Transfer Mode - ATM was chosen by the ITU-T as the communications technology upon which Broadband ISDN would be based. It was chosen because of its ability to support all communications requirements including voice, video, and data, and because it is scalable from speeds as low as a few Mbps up to many Gigabits per second (Gbps). ATM will be discussed in more depth in Section 9. ATM provides the low delay levels and delay variations that are required for voice transmission. Voice over Frame Relay - As a technology, frame relay was originally designed as a high-speed version of X.25, suitable for efficient transfer of data across a Wide Area Network (WAN). Since its introduction in the early 1990s, the use of frame relay has grown at an almost exponential rate. Originally it was widely believed that frame relay was not a suitable technology to support speech. This was due to factors such as unpredictable delay levels, and the possibility of frames being discarded in the network. Early frame relay networks based on medium-speed backbone links were not particularly well suited to speech. However, today's frame relay networks are often formed using a frame relay interface and a cellbased backbone. These backbones are typically high-speed networks based on technologies such as ATM, which provide fast, predictable delivery of time-sensitive information. Today, speech support over frame relay is becoming more and more popular. Section 10 of this booklet discusses voice over frame relay. Voice over X.25 - X.25 packet switching was first standardized in 1976 as a means to transport data reliably, via modems, across inherently noisy analog lines. It incorporates techniques, or protocols, which ensure that data carried by the network will reach its destination error-free. Even if the data becomes corrupted, the network will automatically re-transmit it without additional effort required from the user. This capability adds significant overhead to transmissions by introducing large delays, and in cases where re-transmissions occur, variable delays. X.25 is not a suitable technology for voice support for these reasons. Voice over IP (VoIP) - Today, Internet Protocol (IP) networks have practically become the corporate standard for LAN and WAN data traffic, with users ranging from small
67
Voice Fundamentals
home offices to large multinational organizations. As IP networks have grown in popularity, their capabilities have increased to support a wide range of applications and services. Up until now, most of these have been data-orientated, however, other realtime requirements are emerging, including the support of voice and video. Section 11 looks at VoIP, how it operates, and some of the issues involved.
The term TDM comes from the method by which channel information is multiplexed onto the aggregate links. A simple view is shown in Figure 8.2.
68
Voice Fundamentals
As with G.704 and D4/ESF framing for digital PBX connections, a TDM link uses data frames which consist of a series of timeslots. However, the frame length, number of timeslots, and frame repetition rate is usually a proprietary system created by the equipment manufacturer. Figure 8.2 shows how data from a number of channels may share the bandwidth on an aggregate link. The timeslots within the frame provide a particular bandwidth, depending on the frame repetition rate and the number of timeslots per frame. For example, each timeslot may represent a bandwidth of 100 bits per second (bps). This would mean that the 9.6 Kbps channel would require 96 timeslots per frame, the 19.2 Kbps channel would use 192 timeslots, and the 64 Kbps PCM channel would require 640 timeslots per frame. In addition to the actual data, other information needs to be carried in the frame, including the following: Frame synchronization bits. Supervisory communications data between the multiplexers to carry alarms, status, maintenance, and configuration information. Signaling for the channels, including E&M for voice, RTS/CTS for data, etc.
The actual layout of the frame will be determined by a number of factors, including the number and speed of the channels, amount of supervisory overhead, the speed of the aggregate, etc. Once a frame is built for a particular configuration, it will remain
69
Voice Fundamentals
unchanged until one or more of the parameters change. As a result, one of the drawbacks of TDM is that if a device stops sending data into a particular channel, and unless the multiplexer is reconfigured, timeslots are still allocated which wastes bandwidth.
70
Voice Fundamentals
71
Voice Fundamentals
Generic Flow Control (GFC) - Available for flow control at the UNI. Virtual Path Identifier (VPI) - Used as part of addressing function. Virtual Channel Identifier (VCI) - Used as part of addressing function. Payload Type Indicator (PTI) - Identifies the type of cell plus other functions. Cell Loss Priority (CLP) - Indicates whether the cell may be discarded during congestion. Header Error Control (HEC) - CRC check to detect errors in the header.
72
Voice Fundamentals
The 1.544 Mbps (DS-1) or 2.048 Mbps (E1) bit stream from the PBX is converted into blocks of 47 bytes, and a 1 byte AAL header is added. This header contains a sequence number that is used by the destination device to detect missing or misinserted cells. The combination of 48 bytes is then inserted as the payload into the ATM cell, and transmitted to the destination device. The next 47 bytes are then handled in a similar manner. At the destination device, the 48-byte payload is extracted from the ATM cell and the ATM header discarded. The 1-byte AAL header is inspected to ensure that no error has occurred, and the 47-byte data is transmitted to the PBX interface. If a cell is found to be missing, then it needs to be replaced with a dummy cell to ensure timing integrity of
73
Voice Fundamentals
the interface connected to the PBX. The content of the dummy cell will depend upon the actual application, however, for circuit emulation of 1.544 Mbps and 2.048 Mbps circuits, the contents should be all "1"s. This description covers what is known as an unstructured AAL1 service. AAL1 also provides a structured service where additional information is carried to allow the delineation of a structure of the information carried within the payload. Please refer to ITU-T I.363 for further details. AAL2 - A more sophisticated circuit emulation approach has been developed which overcomes the need to preconfigure bandwidth, which is inherent in the AAL1 approach. Using AAL2, multiple channels can be interleaved on a single virtual circuit. Furthermore, AAL2 permits variable bit rate (VBR) coding of voice with standard compression, silence detection and suppression, and dynamic encoding rates. Taking advantage of the "bursty" characteristics of voice communications, AAL2 increases networking efficiency and improves performance for data traffic, making all available bandwidth available for data transmissions when not required to support voice traffic. Another benefit is the ability to engineer delay, which is critical to ensure gain without sacrificing voice quality. AAL2 is not well-suited for switching because of the complexity involved in adding a layer and mechanism in hardware for switching. AAL2 trunking will typically be deployed in applications that require transport of multiple channels in point-to-point trunk scenarios. Examples are digital circuit multiplex equipment and service provider access applications.
74
Voice Fundamentals
AAL5 - In the case of traffic from a LAN, it is not appropriate to use AAL1. This type of information arrives at irregular intervals, and is in the form of a block of data known as a frame. AAL5 is designed to perform the process of adapting LAN frames to fit into ATM cells. Figure 9.4 demonstrates the operation of AAL5. AAL5 takes user data, in this example a 218-byte LAN frame, and adds overhead, which includes padding data and an AAL5 trailer. This produces a new frame that is a multiple of 48 bytes. It then segments the frame into blocks of 48 bytes each, and inserts them into the payload of the ATM cells. An ATM header of 5 bytes is added, and the cell is transmitted into the network and onto its destination. Please note that, in contrast to AAL1, AAL5 is not a continuous process. Cells are only transmitted when there is a frame to send. When there are no frames, no cells are generated and no bandwidth is consumed in the ATM network.
The reason that multiple categories exist is to support the different characteristics and Quality of Service (QoS) requirements associated with various traffic types. For example, speech has a real-time characteristic and requires guaranteed bandwidth and minimal delay, while most data types are non real-time, do not necessarily require guaranteed bandwidth, and can often tolerate significant levels of delay. Detailed descriptions of each category are not provided in this booklet, and the ATM Forum Traffic Management Specification [28] can be consulted for additional information. Voice traffic can be handled in a number of ways. The flow of speech using AAL1 as described in Section 9.1.2 represents a CBR service, since there is a constant flow of information that requires particular QoS parameters. However, voice can also be treated as rt-VBR by taking advantage of the fact that in a typical conversation there are significant gaps (due to gaps between words and while the other person is talking). This can be seen graphically in Figure 9.5, where the left-hand graph shows a constant flow of speech samples, including samples representing silence (CBR). The right-hand graph
75
Voice Fundamentals
76
Voice Fundamentals
This is in contrast to ATM where, at any time, the overall bandwidth used is the sum of the combined bandwidth of all the channels. Any spare bandwidth is available for any channel to use. The difference can be seen by simply looking at the amount of total bandwidth necessary to support the traffic being sent. Both diagrams show the same amount of bandwidth for each traffic type. In the case of the TDM, a larger amount of total bandwidth is needed to support all three traffic types, and the spare bandwidth (shown in white) is not available for use. In the case of ATM, the overall amount of bandwidth required is smaller, and the spare bandwidth is available for other channels to use.
77
Voice Fundamentals
VCC. It also defines interworking support with Primary Rate Interface (PRI) and Basic Rate Interface (BRI) services and interworking with private and public network interfaces. AF-VTOA-0085.000 - "Dynamic Bandwidth Utilization in 64 Kbps Timeslot Trunking Over ATM Using CES": Defines how voice channels from a digital voice interface can be carried only when they are active, thus providing dynamic bandwidth utilization. The method for detecting voice activity is beyond the scope of this booklet. AF-VTOA-0089.000 - "ATM Trunking Using AAL1 for Narrowband Services Version 1.0": Effectively an extension to the capabilities of AF-VTOA-0078.000, this specification provides additional flexibility in how voice channels can be carried across an ATM network. Additional capabilities include call-by-call routing, bandwidth-on-demand, bandwidth sharing, and the support of DS1 and E1 with signaling. In addition to these specifications, AAL2 is defined for the support of low and variable bit-rate trunking applications where single or multiple voice channels are carried in a single VCC (see section 9.1.2).
78
Voice Fundamentals
voice over ATM (or indeed any cell/frame based system), namely delay. However, 5.875 ms of delay is small, and not significant as far as voice is concerned. At the exit point of the network, the cell enters the destination ATM multiplexer, where the contents of the cell are emptied and passed onto the interface for onward transmission to PBX 2. Due to the nature of a cell-based network, a certain amount of delay may be imposed on the cells transmitted from one end of the network to the other. Furthermore, due to variations in the loading on various cell switches within the network, this delay may vary. This is known as Cell Delay Variation (CDV). To overcome the potential problem of running out of cells at the destination multiplexer due to CDV, a buffer must be introduced at the receive end of the connection (see Figure 9.7). The introduction of this buffer creates additional delay. Section 6 discussed saving bandwidth in enterprise networks through speech compression. The general effect of compression is to reduce the number of bits that are available to be placed into cells at the sending end, increasing the cellification delay. For example, speech transmission was compressed from 64 Kbps to 16 Kbps ADPCM, the cellification delay would rise significantly from 5.875 ms to 23.5 ms. There are two methods that can be used to overcome delay. One approach is to partially fill the cells before transmission, although this counteracts the performance benefits of compressing the speech. The other technique is to multiplex multiple voice channels within one VCC.
79
Voice Fundamentals
Therefore, the interpolation implementation must respond very quickly to the start of a speech burst. Speech threshold - This is the level above which the signal is considered to be speech, and below which the signal is considered to be silence. Traditional silence detection compares the energy of the speech signal to a pre-selected energy threshold level. Typically, speech is detected if the signal stays above the threshold for more than a predetermined period of time; silence is detected if the signal is below the threshold for more than a predetermined period of time (hangtime). Such an approach does not take into account the discrepancy between varying or constant background noise. Consequently, the approach could detect real speech periods as silence when the background noise is low, and real silence as speech when the background noise is high. A more accurate speech detection method adapts the threshold relative to the background noise to prevent premature speech clipping. Hangtime - This is the time taken to detect the end of a speech burst (the start of a period of silence). If the hangtime is set to a very short duration in an attempt to maximize bandwidth savings, inter-syllable pauses can be misconstrued as silence periods. If the hangtime is set to a very long duration, entire periods of silence can be missed. The optimal hangtime is one which strikes a balance between speech quality and bandwidth savings. Comfort Noise - A potential drawback with SAD is that during periods of silence when no cells are being transmitted, the receiving end will hear absolute silence, not even background noise. Many systems overcome this by injecting what is known as "comfort noise" into the voice path at the receiving end during these periods. The level of noise injected will be set to be similar to the background noise of the sending end.
80
Voice Fundamentals
Synchronous Residual Time Stamp (SRTS), and the second Adaptive Clock Recovery (ACR).
81
Voice Fundamentals
82
Voice Fundamentals
Data Link Connection Identifier (DLCI) - Used for the link addressing function. Command/Response (C/R) - Determines if the frame is a Command or Response. Forward Explicit Congestion Indication (FN) - Indicates congestion to receiver. Backward Explicit Congestion Indication (BN) - Indicates congestion to sender. Discard Eligibility (DE) - Identifies frame to be discarded in preference to others. Frame Check Sequence (FCS) - Used to identify errors in the frame.
83
Voice Fundamentals
Two other formats using 3- and 4-byte addresses are also defined in Q.922, but they are not commonly used. The Frame Relay Forum defines an information field size of at least 1600 bytes, which is sufficient to cope with most LAN requirements. Larger or smaller information fields can be agreed to between the network and the user. In practice, information field sizes of up to 4096 bytes are not uncommon. Frame relay is a connection-oriented protocol where a path must be set up through a network from source to destination before data frames can be sent. Both Permanent Virtual Circuits (PVCs) and Switched Virtual Circuits (SVCs) are supported, allowing multiple Virtual Circuits (VCs) to be carried on the same physical link. The DLCI field is then used by the end devices on a link to differentiate between different VCs, and route the frames to the appropriate destination. Frame relay is a very efficient method of communication over a range of speeds up to and including E3 (34.368 Mbps) and DS-3 (45.736 Mbps). The primary benefit of frame relay derives from its ability to statistically multiplex traffic from different sources. In other words, bandwidth on a frame relay link is only used by a source when that source has traffic to send. If a particular source has no traffic to send, then the bandwidth on the link is potentially free for other sources to use. The rapid growth in frame relay usage over the last few years has been primarily driven by the interconnection of LANs (Local Area Networks). A typical arrangement is shown in Figure 10.2, where multiple LAN routers need to be connected together. Only one
84
Voice Fundamentals
physical link is needed between each router and the network, with different DLCIs being used to differentiate one VC from another. It should be noted that the number used for a particular DLCI only has local significance on a particular link.
In this case, the FRADs are taking inputs from a number of different voice and data devices and multiplexing them across the links into the frame relay network, where a number of Virtual Circuits (VCs) are set up between FRADs. Please note that FRAD products often provide a wider range of interfaces than is shown here.
85
Voice Fundamentals
86
Voice Fundamentals
Figure 10.4 gives an example that demonstrates how FRF.11 describes the support of voice over frame relay. In this example, a single frame is shown carrying two separate voice channels. The frame relay header represents the normal header information (DLCI etc.) as shown in Figure 10.4. LI is the Length Indicator bit, and is used to indicate whether or not a one octet length byte is present. It is clear (set to 0) if the channel is the only channel or the last channel in the frame, in which case the length byte is absent. The LI bits of all sub-frames preceding the last one are set to "1". EI identifies the length of the channel ID as being either 6 or 8 bits, and allows either 63 or 255 channels to be supported in the frame. If set to "0" then it also implies that the payload will be either Embedded ADPCM (G.727) or CS-ACELP (G.729) speech, depending upon whether Class 1 or Class 2 compliance is required. Class 1 refers to support capabilities for high bit-rate frame-relay interfaces, and Class 2 refers to low bit-rate interfaces.
87
Voice Fundamentals
88
Voice Fundamentals
10.3.2 Issues
Probably the most significant issue of supporting voice over frame relay is delay, as discussed in Section 10.2.1. This is a particularly significant issue in networks where multiple router hops are involved. The level of delay incurred on even a single hop are likely to be high, necessitating the use of echo cancellation techniques as discussed in Section 10. Many products used within frame-relay backbone networks support voice through a prioritization process similar to that described in Section 10.2.1. However, many of these products are cell-based, and expect voice to be carried in cells rather than large frames. This allows cells to be prioritized without significantly affecting the frames that are being held back as lower priority. If the voice frame is as large as allowed by the standard, giving it a high priority may adversely affect the lower-priority frames. As a result, frames should be kept relatively small, ideally at levels below 100 bytes. Although not discussed in the context of frame relay, wherever voice is supported on digital interfaces methods for enabling synchronization between PBXs will need to be provided. This is an area which still requires standardization. Speech compression, which is likely to be used extensively in applications of voice over frame relay, creates its own issues which are discussed in Section 5.7.
89
Voice Fundamentals
90
Voice Fundamentals
11 Voice Over IP
Internet Protocol (IP) networks have become the corporate standard for LAN and WAN data traffic, with users ranging from small home offices to large multinational organizations. In fact, growth in the use of IP has been so great over the last few years that a new version of IP, known as IP version 6 (IPv6), or IP Next Generation (IPng) [22] has been defined to deal with a number of issues existing with the present version of IP (IP version 4). As a result of its popularity, IP has developed to become probably the most flexible networking protocol in use today. IP networks run under the most widely used network operating systems, are highly scalable, and work well with routers, making them ideal for transmitting data over a wide area network. The demand for new applications is growing, including voice and fax over IP, both in corporate IP environments as well as for Small Office Home Office (SOHO) applications. Probably the best known IP network in existence today is the Internet. While voice over the Internet has attracted a certain amount of attention, performance issues including large transmission delays and poor voice quality have prevented the Internet from being used extensively for corporate voice traffic. Part of the problem has been the inability to support guaranteed levels of performance. However, corporate and other private IP networks can be more effectively managed, allowing real-time network traffic such as voice to be supported through detailed network engineering that allows performance levels to be defined.
91
Voice Fundamentals
Real Time Protocol (RTP) - Defined in RFC 1889, RTP provides an end-to-end delivery service for real-time traffic applications, including voice and video over unicast (point-topoint), or multicast (point-to-multipoint) connections. It provides services including payload type identification, sequence numbering, time-stamping, and delivery monitoring. In conjunction with RTP, RFC 1890 [27] describes how audio and video may be carried within RTP. RTP was developed to operate independently of the underlying transport and network layers. While it is common to run RTP on top of UDP and IP, it can also be used with other protocols such as ATM or IPX. Integral to RTP is the Real-time Transport Control Protocol (RTCP) which is used to provide feedback on the quality of the received data on a connection. Reservation Protocol (RSVP) - The basic idea of RSVP is to reserve network bandwidth for a flow of information so that a specified Quality of Service (QoS) can be given to that information flow. The general process behind RSVP is to use a "flow descriptor" to request a particular QoS from the network. When the information is transmitted, it is then given the necessary resources in the network to guarantee a certain level of performance. This process is similar to the process used for defining a traffic contract on an ATM network, and turns the connectionless nature (best-try) of IP into a connection-oriented (reliable) service. H.323 - The H.323 standard provides a foundation for audio, video, and data communications across IP-based networks, including the Internet. By complying to H.323, multimedia products and applications from multiple vendors can interoperate, allowing users to communicate without concern for compatibility. H.323 is an umbrella recommendation from the International Telecommunications Union (ITU) that sets standards for multimedia communications over Local Area Networks (LANs) that do not provide a guaranteed Quality of Service (QoS). These networks dominate today's corporate desktops, and include packet-switched TCP/IP and IPX over Ethernet, Fast Ethernet, and Token Ring network technologies. The H.323 specification was approved in 1996 by ITU Study Group 16. Version 2 was approved in January 1998. The standard is broad in scope and includes both stand alone devices and embedded personal computer technology, as well as point-to-point and multipoint conferences. H.323 also addresses call control, multimedia management, and bandwidth management, as well as interfaces between LANs and other networks.
92
Voice Fundamentals
H.323 is part of a larger series of communications standards that enable videoconferencing across a range of networks. Known as H.32x, this series includes H.320 and H.324, which address ISDN and PSTN communications, respectively.
93
Voice Fundamentals
Voice over IP is an emerging technology, and many issues exist which need to be understood. The main concern is the issue of delay, which can include voice coding delays, packetization delays, delays across the wide area network, and de-packetization and anti-jitter delays. As discussed earlier, IP does not provide quality of service guarantees, and other mechanisms are required to provide them. RSVP has been defined in order that bandwidth can be allocated to a particular connection via an IP wide area network. Most routers do not yet support RSVP and when it is supported, the protocol places a considerable processing burden on the routers. Meanwhile, networks such as the Internet can impose delay levels up to several seconds.
11.1.3 Standards
Standards for Voice over IP are set by the Voice Over IP Forum, a group of Internet telephony vendors organized under the auspices of the International Multimedia Teleconferencing Consortium (IMTC). VoIP standards are based on ITU-T Recommendation H.323, "Visual Telephone Systems and Equipment for Local Area Networks which Provide a Non-Guaranteed Quality of Service". This recommendation is based of the Real-Time Protocol/Control Protocol (RTP/RTCP) as described briefly in section 6.3.1. H.323 defines the support of five encoding algorithms: G.711, G.722, G.728, G.723.1, and G.729, with G.723.1 having been chosen as the default for Internet telephony applications.
94
Voice Fundamentals
Figure 12.1 Number of Voice Circuits on a 2Mbit/s Link With and Without SAD
95
Voice Fundamentals
speech compression, this provides significant bandwidth savings, allowing more channels to share the costly inter-site trunk circuits. Figure 12.1 provides a guide as to the number of voice circuits that can simultaneously share a 2 Mbps trunk, both with and without SAD, assuming that voice traffic occupies about 80% of the 2 Mbps link capacity. Furthermore, when a voice circuit is inactive, the bandwidth allocated can be made available for other traffic.
96
Voice Fundamentals
interpret the signaling bits for each channel and route them on a per-channel basis along with the channel itself. This enables one PBX digital trunk to serve multiple destinations. In addition, should a channel connection fail within the network, the multiplexers can indicate this back to the relevant PBXs with a Backward Busy signal so that it does not use that particular channel. The multiplexers also offer other benefits, including the ability to compress speech, support automatic channel re-routing in the event of failure, and so on. There are also a number of drawbacks with this approach, all centered around the fact that switching is conducted within the PBXs. For example, a call placed from Telephone A to Telephone B will need to be routed from PBX 1, via PBX 4, and onto PBX 5. If speech compression is used, multiple compressions and decompressions will occur, resulting in greater distortion of the speech. In addition, two timeslots are used on the link into PBX 4 which is wasteful in terms of bandwidth. Figure 12.3 shows the configuration used when running Common Channel Signaling (see Section 7.2.2 for information on CCS) on the PBXs. With CCS, it is far more complicated for the multiplexer to interpret the signaling from the PBX than with CAS. Therefore, to create paths between PBX 1 and PBXs 2 and 4, separate interfaces are required on PBX 1. The number of links required at PBX 1 is dictated by the number of other PBXs connected to it, and is independent of the number of channels that are actually being used.
97
Voice Fundamentals
Again, the benefits derived using this approach include the ability to compress speech and support automatic channel re-routing, as well as the added benefits of using CCS itself. The drawbacks are the same as with CAS, with two notable additions: First, the number of interfaces on the PBXs and the multiplexers is increased when using CAS. Second, if a channel connection should fail within the multiplexer network, the multiplexers have no way of signaling this to the PBXs on a per-channel basis. This is because the multiplexers would need to be able to generate CCS messages themselves. Instead, the multiplexer needs to set a Remote Alarm Indication (yellow alarm) to the PBXs on the interfaces that carry the failed channel. The PBX sees this as a trunk-level alarm and busies out the whole trunk.
98
Voice Fundamentals
make an intelligent routing decision. For example, if a call is placed from Telephone A to Telephone B as shown in Figure 12.4, PBX 1 routes the call into the enterprise network. However, with voice switching the enterprise network inspects the dialed number and routes the connection to the appropriate destination. The call is therefore routed directly to PBX 5 rather than needing to be sent via a tandem PBX. Voice switching can be supported with CAS or CCS signaling, although a higher level of functionality can be achieved with CCS due to the additional information carried in the call setup messages. This requires the network to be able to handle the specific protocols used, including NIS, ETSI or QSIQ, etc. It is envisaged that PBX systems will still need to connect to other types of networks, such as PSTN or Virtual Private Networks, so that calls can be routed over a number of different paths. This allows the network to be more resilient to backbone failures, as well as allowing overflow of peak period traffic onto cheaper networks.
99
Voice Fundamentals
sion cycle is encountered per call. This is also a regulatory requirement in some countries, such as Germany, for calls breaking out to the PSTN. Individual channel busy-back - Most implementations of TDM multiplexers can only indicate routing problems to a PBX by busying out all channels on the El/Tl primary rate interface via the RAI (yellow alarm). Because the multiplexing equipment does not provide intelligent signaling on the D-channel, it must rely on physical level attributes to provide feedback to the PBX. This approach is inefficient in congestion or failure scenarios, as all subsequent calls must then be re-routed even if only a single PBX trunk (time slot) cannot be routed by the network. For the network to be effective as a transit PBX, it must work intelligently with the Dchannel call control signaling. For example, if a call cannot be routed due to unavailable bandwidth, then the local network node needs to signal the originating PBX on the Dchannel. The PBX must be informed that the individual call cannot be routed by the network and should use an alternate route, such as the PSTN. Voice/data discrimination - Currently, for voice and data to operate in an integrated PBX network across multiplexers that support compression, the data channels must be segregated from the voice in order to avoid compression. With CCS it is common that at call setup, the type of call is identified in the call setup message (see Section 7.2.2). Since the network is interpreting this signaling, voice and data can be discriminated between and compression used only where appropriate. Bandwidth savings - In traditional PBX networks operating over multiplexer networks, calls that route through tandem PBXs will consume more network bandwidth than those that do not. This is because bandwidth is consumed at the input and output of the tandem PBX, and often demands less efficient network routing paths. In extreme cases, the network design can allow several multiples of the original call bandwidth to be consumed by a multi-hop call. Often this use of bandwidth is unavoidable, but some network managers do not fully appreciate the cost implications. With voice switching in the enterprise network, each call is routed over the most direct path at the time the call is made, resulting in large savings in bandwidth.
100
Voice Fundamentals
101
Voice Fundamentals
breaking into new markets, as well as making existing systems more reliable, powerful, and cost-effective. More recently, the Enterprise Networking portfolio of products has been developed to address the emerging and rapidly growing broadband multimedia markets. In 1995, Northern Telecom unveiled a new corporate logo that would be used globally as the company's unique corporate signature. The name Nortel, which the corporation's subsidiaries and joint ventures around the world already used, is a shortened form of Northern Telecom. The legal name of the corporation has, however, remained Northern Telecom Limited. In 1998, Nortel acquired Bay Networks, Inc. to form Nortel Networks, the leading provider of Unified Networks capable of delivering converged data/voice networking solutions. By adding world-class, IP-based data communications capabilities to complement and expand Nortel's acknowledged strengths, a powerful new business entity has been created to carry the success of Northern Telecom into the 21st century.
Nortel Networks
As a leading global provider of digital networks, Nortel Networks delivers solutions for wireless, broadband, enterprise, and carrier networks. Nortel Networks works with customers worldwide to design, build, and integrate digital networks for communications, information, entertainment, education, and business. According to Dataquest (Wide Area Network Equipment Market Share and Forecast Report), Nortel Networks is a leading provider of WAN equipment worldwide, and is the leading provider of enterprise ATM and frame relay solutions. The latest Yankee Group report (Market Analysis Report on Data Communications Hardware) positions Nortel Networks as the global market leader in ATM Wide Area Network equipment. The Nortel Networks worldwide research capabilities include a network of research and development facilities, affiliated joint ventures, and other collaborations fostering innovative product development and advanced design research. With some 38 research and development sites in sixteen countries and territories, R&D spending in 1998 totaled approximately US $2.45 billion. Nortel Networks reported 1998 revenues of US $17.58 billion. The company operates in more than 150 countries and territories, and comprises over 80,000 employees worldwide.
Unified Networks
Unified Networks create greater value for customers worldwide through network solutions that integrate data networking and telephony. The Unified Networks strategy extends to solutions, products, and services, delivering new economics in networking by
102
Voice Fundamentals
reducing costs, introducing higher revenue services, and delivering new value derived through networking. The emergence of the World Wide Web and increasing market deregulation has created a strong demand for networks that provide increased profitability and higher service levels for organizations of all types. Unified Networks from Nortel Networks deliver cutting-edge solutions to reach these new levels of economics. To meet increased needs, Nortel Networks is delivering a new class of customer relationships. Extranets, intranets, Web access, e-mail, call centers, and old-fashioned personal attention are combined to help customers deal with a wide range of new, challenging, and potentially confusing issues. Whether a customer is at the enterprise level, a service provider, or a small business, Nortel Networks delivers Unified Networks to meet their unique business challenges.
103
Voice Fundamentals
As part of the Nortel Networks product portfolio, Passport enables enterprise customers to deploy a network architecture that is optimized to their requirements. Enterprise network customers benefit from the ability to rapidly deploy new high-performance multimedia services and applications, creating a competitive advantage with the business network. Significant tangible benefits can also be realized by consolidating traffic from all of the enterprise's networks and applications onto a single platform. Passport also offers functionality covering legacy data, IP/LAN through multimedia, and ATM, which can address access through high-capacity backbone requirements. Nortel Networks network management is an open solution based on industry standards. It addresses a wide range of equipment from Nortel Networks, as well as from other vendors. The features and capabilities of Passport services for enterprises are: ATM voice services interLAN switching IBM networking transparent data services managed network services
Passport's flexibility to support a range of services positions it as a best-in-class consolidation switch for enterprises. Passport also supports smooth growth and evolution from traditional data, to frame relay, to ATM services for enterprises.
Management Systems
Nortel Networks management systems provide a comprehensive set of solutions designed to address the operational requirements of enterprise network managers. Unified Management from Nortel Networks delivers the following business and functional values: Increase in operational efficiency Reduce operational costs Gain competitive advantage Managing the LAN, WAN and Telephony network as a system Delivering pragmatic directory-based policy management Monitoring and enforcing end-to-end application service levels Operational simplicity
104
Voice Fundamentals
Unified Management is delivered by Optivity's suite of management applications. Optivity is the leading LAN management solution and is being integrated with leading WAN and Telephony management tools. Optivity is an easy-to-use, pragmatic, and comprehensive management solution for network, policy and service management.
LAN Solutions
Nortel Networks features an integrated Ethernet solution that spans the extended enterprise and consists of innovative, market-leading LAN and WAN products that drive not only price/performance, but offer an array of best-in-class features to meet the demanding needs of business-critical networks. This end-to-end solution delivers innovative priority, security, and resiliency capabilities at a price unmatched in the industry. Until now, Ethernet networks could not provide guaranteed delivery for business-critical applications, such as SAP, Oracle Financials, or voice and video. Now, a breakthrough integrated Ethernet solution from Nortel Networks delivers guaranteed priority and resilience at a fraction of the cost of other Ethernet solutions. The powerful synergy between BayStack enterprise-level stackable switches, market-leading Accelar routing switches, Centillion LAN-ATM switches, Centillion 1000 multiservice switches, and Passport 6400/4400 series multiservice switches delivers a fail-safe networking solution that eliminates downtime and provides guaranteed levels of performance for business-critical applications. This synergistic solution begins in the wiring closet, and extends throughout the wide area network.
Digital Switching
Nortel is a digital switching leader, providing a full line of enterprise network switching systems, including the Meridian 1, Meridian SL-100, Multi-Media Carrier Switch (MMCS), Mercator and Norstar.
Meridian 1
The Nortel Networks Meridian 1 is a digital Private Branch Exchange (PBX) designed to support between 30 and 10,000 lines. It evolved from the highly successful SL-1 system, and was the first PBX designed for use in the global marketplace. This system offers customers a wide range of options to cope with different language needs, as well as corporate networking requirements. Meridian 1 is the best selling telephone system of its type in the world, with a global market of 14 per cent. Since its launch in 1990, over 120,000 systems have been sold, carrying more than 31 million lines in over 100 countries. In Europe alone, 7 million lines have been sold in over 24 countries, giving the Meridian 1 a 15 per cent share of the addressable market in this region.
105
Voice Fundamentals
Flexibility and future-proofing - The Meridian 1 is an example of the Nortel Networks "Evergreen" philosophy, which allows customers to upgrade systems as their organizations evolve and grow. This is achieved through the system's modular architecture which enables customers to add telephone sets, additional lines and extensions, as well as feature options. The system is designed to keep pace with new and emerging technologies, including videoconferencing and broadband transmission, simplifying upgrades and eliminating the need for total upgrade or change of equipment. The different telephone sets - Meridian M3110, M3310 M3820 and M2216 - offer customers access to the range of features and facilities they have programmed into the system, or purchased as optional extras. These range from simple autodial and call forwarding to more sophisticated ACD and conferencing capabilities.
Meridian SL-100
Based on a carrier-grade platform, the Meridian SL-100 is the largest Nortel Networks PBX in the digital switching portfolio, providing a solution to multimedia communications in large commercial enterprises and government environments. It has the flexibility to address current and future capacity and applications needs with its 60,000 digital voice or data line capacity.
Mercator
Mercator is a state-of-the-art, voice and data, multi-site communications system that provides sophisticated PBX features to smaller organizations or locations. The system supports the applications used by Meridian 1, as well as providing full interworking with Meridian 1 networks.
Norstar
Norstar is the best-selling small business communications system around the world. Norstar systems are designed and built for integrated communications and are futureready, adapting to changing business needs.
106
Voice Fundamentals
Multimedia Communications
The Nortel Networks suite of Symposium applications are designed to harness today's sophisticated media, creating an integrated portfolio of products and services to improve productivity and enhance customer relationships. Symposium is based on industry standards and commercially-available hardware. Open platform flexibility translates to rapid application development for teleconferencing, electronic commerce, one-to-one marketing, and other customized solutions.
Mobility
Companion provides an in-building wireless communication system to ensure that key individuals can be reached when they are away from their desks. The system consists of centralized controller units, radio base stations and portable telephones that provide facility-wide coverage. The system can be easily integrated with the existing telephone exchange, enabling customers to make use of all regular features while on the move about the building. Because there are no air-time charges, Companion substantially lowers the cost of mobile communication in the workplace.
107
Voice Fundamentals
108
Voice Fundamentals
109
Voice Fundamentals
dBm0 - A value of power given in dBm0 gives the actual power level of a signal with reference to a point of 0 dBr. It can be used to express the levels of signaling tones, noise, average speech levels, etc. For example, with reference to Figure B.1, if an analog interface on a digital PBX that has a transmit relative level of +6 dBr and a receive relative level of -8 dBr is considered, given an actual signal from the telephone of -9 dBm, this is equivalent to a reference power of -15 dBm0. This is because -9 dBm into the interface will result in a power of -15 dBm at the 0 dBr point. Similarly, in the opposite direction, an actual power of -8 dBm measured at the telephone set results from a power of 0 dBm at the 0 dBr point, and is therefore equivalent to 0 dBm0.
110
Voice Fundamentals
ADPCM
B8ZS
BNR
111
Voice Fundamentals
CCS
CDV CELP CO CPE CRC CS-ACELP CSS CSU CTS CVSD D4 dB dBm dBm0 dBr DC DCME DDI
Common Channel Signaling. A data channel is used to carry signaling messages between telephone exchanges, typically timeslot 16 on an E1, and timeslot 24 on a DS-1. Cell Delay Variation. In ATM, the variation in delay that the cells in a particular cell stream may experience across the network. Code Excited Linear Prediction. A form of speech compression with many implementations, some proprietary and some standard. Central Office. North American term for the PTO local exchange. Customer Premises Equipment. Cyclic Redundancy Check. Conjugate Structured-Algebraic Code Excited Linear Prediction. Version of CELP operating at 8 Kbps and defined in G.729. Composite Source Signal. Customer Service Unit. A device which terminates the T1 connection at the customer premises. Clear To Send. Continuously Variable Slope Delta. Speech compression offering rates from 16 Kbps to 64 Kbps depending upon sampling rate. Framing type used on 1.544 Mbps primary rate digital interfaces. Decibel. A logarithmic measure used to describe the power ratios. An absolute measure of power. Equal to the number of decibels relative to 1 milliwatt. 0 dBm = 1 mw. The absolute power at a point in a network relative to the 0 dBr point. Decibels relative. Used to express relative transmission levels. Direct Current. Digital Circuit Multiplication Equipment. Direct Dial In. A facility that allows users the ability to dial from a public network into a PBX, and to a person's extension, without going via the operator. Data Link. Another name used for the FDL on ESF framed T1 links. Differential Pulse Code Modulation. A speech compression technique. The basis of ADPCM. Digital Private Network Signaling System. Digital interface speed of 1.544 Mbps. Digital Speech Interpolation. A technique which makes use of the gaps in speech to reduce the amount of bandwidth required for transmission.
112
Voice Fundamentals
FXO
FXS
Digital Signaling System 1. Generic term for the ITU-T defined ISDN signaling system. Dual Tone Multi Frequency. Ear & Mouth. The signaling leads used in E&M analog trunk interfaces. Refers to a transmission link that operates at a speed of 2.048 Mbps. European Computer Manufacturers Association. European-DSS1. Another term used to describe Euro-ISDN. Embedded Operations Channel. Another name used for the FDL on ESF framed T1 links. Earth Recall. A facility on some telephone sets to provide a momentary grounding of one of the interface leads. Echo Return Loss. The amount of signal reflected back to the four wire path from a hybrid circuit. Extended Superframe. Framing type used on 1.544 Mbps primary rate digital interfaces. Offers enhanced capabilities over D4 framing. European Telecommunications Standard Institute. European wide implementation of ISDN. Based on ETSI specifications which are themselves based on ITU-T Recommendations. Facility Data Link. A data channel carried within the ESF framing structure on a T1 link. Frame Relay Access Device. A device developed to carry voice samples within a frame relay frame. Foreign Exchange. A term used in North America to describe a telephone service from a CO that is remote from (foreign to) the subscriber's local exchange area. Typically an interface on a multiplexer system that connects to a line card on an exchange to extend that interface out to a remote office. Typically an interface on a multiplexer system that connects to a telephone set which is remote from the exchange that the telephone is connected to. High Density Bipolar 3. Used on E1 digital trunks. Defined in G.703. High Level Data Link Control. Hertz. A measure of frequency in cycles per second. Internet Protocol. Integrated Services Digital Network.
113
Voice Fundamentals
ISO ITU-T kHz LAN LAPD LD-CELP Loop Disconnect m-law MCDN MFAS MF MIPS MOS
NLP NNI Nrt-VBR PABX PAM PBX PCM PVC PMBX POTS PPS PRI PSS1 PSTN Pulse Dial
International Standards Organization. Telecommunication Standardization Sector of the International Telecommunication Union. Formerly the CCITT. Thousands of Hertz. Local Area Network. Link Access Procedures on the D channel. Layer 2 protocol used with various Common Channel Signaling protocols. Low Delay-Code Excited Linear Prediction. Low delay version of CELP operating at 16 Kbps and defined in G.728. A technique used for dialing digits with a basic 2-wire telephone set. PCM type commonly used in North America and Japan. Defined in G.711. Meridian Customer Defined Networking. High functionality CCS protocol used between Meridian 1 PBXs. Multi-Frame Alignment Signal. Multi Frequency. Million Instructions per Second. Mean Opinion Score. In our context it is a subjective measure of the quality of speech transmission systems such as with speech compression. Non Linear Processor. A function in an echo canceller used to remove residual echo. Network-to-Network Interface. Non Real Time Variable Bit Rate (ATM service category). Private Automated Branch Exchange. Usually shortened to PBX. Pulse Amplitude Modulation. Used in the process of converting from an analog signal to digital PCM. Private Branch Exchange. Pulse Code Modulation. Standardized method of producing digital speech. Defined in G.711. Permanent Virtual Circuit. Private Manual Branch Exchange. Plain Old Telephone Service. Basic telephone service on a standard 2-wire telephone. No added features. Pulses Per Second. Primary Rate Interface. Private Signaling System 1. Another term used to describe QSIG. Public Switched Telephone Network. See Loop Disconnect.
114
Voice Fundamentals
SAF
Quantization Distortion. Quantization Distortion Unit. Quality of Service. Internationally defined inter-PBX signaling standard. Defined in ETSI specifications. Research & Development. Remote Alarm Indication. Also referred to as Yellow Alarm. Regular Pulse Excitation with Long Term Prediction. Speech compression technique used on GSM mobile telephone system. Resource Reservation Protocol A method of reserving network bandwidth, enabling a specified QoS to be assigned to selected data flows. Ready To Send. Data interface signal. Real Time Variable Bit Rate (ATM service category). Received signal. Speech Activity Detection. Often called silence suppression. A technique used to stop the transmission of bits during periods of silence. See DSI and SAF. Speech Activity Factor. The proportion of time that a person is actually making sound during a conversation. Typically 40% of the time. Simple Efficient Adaptation Layer. The same as AAL5 in ATM. Small Office Home Office. Synchronous Residual Time Stamp. A method of providing end-toend synchronization when initiating circuit emulation with AAL1. Signaling System number 7. Internationally defined inter-public telephone exchange signaling standard. Also known as CCS7, CCITT No. 7." Switched Virtual Circuit. Refers to a transmission link that operates at a rate of 1.544 Mbps. Timed Break Recall. Time Division Multiplex. The same quality speech as heard over the public telephone network. The name sometimes used to describe a trunk connecting (or tying) together PBXs in a private network. The names sometimes used for the connections of a telephone circuit. The terms are derived from the plug used on manual exchanges. Tip was connected to the tip of the plug and Ring to the slip ring around the plug.
115
Voice Fundamentals
Transmit signal. Unspecified Bit Rate (ATM service category). User Network Interface. Variable Bit Rate. Refers to a bit stream that has a variable bit rate. e.g. speech with Speech Activity Detection operating. Virtual Circuit. Voice over Frame Relay. Voice and Telephony Over ATM. Wide Area Network. Internationally accepted standard for packet switching networks.
116
Voice Fundamentals
APPENDIX D - References
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] ITU-T Recommendation Q.23 - Technical features of push-button telephone sets. ITU-T Recommendation I.420 - ISDN Basic user-network interface. ITU-T Recommendation G.711 - Pulse code modulation of voice frequencies. ITU-T Recommendation G.732 - Characteristics of primary PCM multiplexer equipment operating at 2048 Kbps. ITU-T Recommendation G.703 - Physical/electrical characteristics of hierarchical digital interfaces. ITU-T Recommendation G.704 - Synchronous frame structures used at primary and secondary hierarchical levels. British Telecom Network Requirement BTNR 181 - Signaling System AC15. ITU-T Recommendation I.110 - Preamble and general structure of the I-series recommendations for the Integrated Services Digital Network (ISDN). ITU-T Recommendation Q.700 - Introduction to CCITT Signaling System Number 7. British Telecom Network Requirement BTNR 188 - Digital Private Network Signaling System Number 1 (DPNSS). QSIG - The Handbook for Communication Managers, Interconnect Communications Ltd. ITU-T Recommendation I.113 - Vocabulary of terms for broadband aspects of ISDN. ITU-T Recommendation I.363 - B-ISDN ATM adaptation layer (AAL) specification. ITU-T Recommendation G.726 - 40, 32, 24, 16 Kbps adaptive differential pulse code modulation (ADPCM). ITU-T Recommendation G.728 - Coding of speech at 16 Kbps using low-delay code excited linear prediction (LD-CELP). ITU-T Recommendation G.729 - Coding of speech at 8 Kbps using conjugate structure algebraic code excited linear prediction. ITU-T Recommendation P.80 - Methods for subjective determination of transmission quality. ITU-T Recommendation G.113 - Transmission impairments. ITU-T Recommendation P.83 - Subjective performance assessment of telephone-band and wideband digital codecs. ITU-T Recommendation G.164 - Echo suppressors. ITU-T Recommendation G.165 - Echo cancellers. RFC 1883: Internet Protocol, Version 6 (IPv6) Specification RFC 791.
Appendix D - References
117
Voice Fundamentals
RFC 793. RFC 768. RFC 1889. RFC 1890. ATM Forum Traffic Management Specification Version 4.0 (af-tm-0056.000) Frame Relay Forum Voice over Frame Relay Implementation Agreement FRF.11
118
Appendix D - References
Voice Fundamentals
For any queries relating to this booklet or Nortel Networks products, please contact Nortel Networks as indicated below: Canada Nortel Networks 8200 Dixie Road Brampton, ON L6T 5P6 Canada T. 1-800-4-NORTEL (1-800-466-7835) United States Nortel Networks 4401 Great America Parkway Santa Clara, CA 95054 T. 1-800-822-9638 Europe, Middle East, and Africa Nortel Networks EMEA, S.A. Les Cyclades-Immeuble Naxos 25 Allee Pierre Ziller Valbonne, 06560 France +33-4-92-96-69-66
Asia Pacific Nortel Networks Asia South Pacific 151 Lorong Chaun 02-01 New Tech Park Singapore 556741 +65-287-2877 Caribbean and Latin America Nortel Networks CALA Inc. 1500 Concord Terrace Sunrise, FL 33323-2815 954-851-8886
Acknowledgments:
Thanks are due to the ITU-T for their permission to make use of diagrams and information from various ITU-T Recommendations as listed in Appendix D. All rights reserved. No part of this booklet may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Nortel. Copyright 1999 Northern Telecom Limited. All rights reserved. NORTEL, NORTEL NETWORKS, the NORTEL NETWORKS corporate logo, the globemark design, HOW THE WORLD SHARES IDEAS, Passport, Meridian 1, Meridian SL-100 and Norstar are trademarks of Northern Telecom Limited. Bay Networks, BN, BLN, BCN, and Optivity are registered trademarks, and Accelar, BayStack, Centillion, Optivity Enterprise, and System 5000 are a trademarks of Bay Networks, Inc. All other brand and product names are trademarks or registered trademarks of their respective holders. Information in this document is subject to change without notice. Northern Telecom Limited assumes no responsibility for any errors that may appear in this document.