Introduction to Broadband Communication Systems
Buy e-book PDF
Broadband networks, such as asynchronous transfer mode (ATM), frame relay, and leased lines, allow us to easily access multimedia services (data, voice, and video) in one package. Exploring why broadband networks are important in modern-day telecommunications, Introduction to Broadband Communication Systems covers the concepts and components of both standard and emerging broadband communication network systems. After introducing the fundamental concepts of broadband communication systems, the book discusses Internet-based networks, such as intranets and extranets. It then addresses the networking technologies of X.25 and frame relay, fiber channels, a synchronous optical network (SONET), a virtual private network (VPN), an integrated service digital network (ISDN), broadband ISDN (B-ISDN), and ATM. The authors also cover access networks, including digital subscriber lines (DSL), cable modems, and passive optical networks, as well as explore wireless networks, such as wireless data services, personal communications services (PCS), and satellite communications. The book concludes with chapters on network management, network security, and network testing, fault tolerance, and analysis. With up-to-date, detailed information on the state-of-the-art technology in broadband communication systems, this resource illustrates how some networks have the potential of eventually replacing traditional dial-up Internet. Requiring only a general knowledge of communication systems theory, the text is suitable for a one- or two-semester course for advanced undergraduate and beginning graduate students in engineering, as well as for short seminars on broadband communication systems.
Inspec keywords: satellite communication; personal communication networks; extranets; SONET; virtual private networks; intranets; telecommunication security; modems; fault tolerance; Internet; B-ISDN; digital subscriber lines; ISDN; telecommunication network management
Other keywords: ATM; PCS; synchronous optical network; integrated service digital network; intranets; X.25 networking technology; network security; networking testing; passive optical networks; asynchronous transfer mode; wireless data services; virtual private network; broadband communication network systems; fault tolerance; DSL; broadband ISDN; SONET; satellite communications; wireless networks; fiber channel; personal communications service; cable modem; B-ISDN; network management; Internet-based networks; frame relay; ISDN; extranets; access networks-digital subscriber line; VPN
Subjects: Radio links and equipment; General electrical engineering topics; Stations and subscriber equipment; Optical communication; Telecommunication applications; Computer networks and techniques; ISDN; General and management topics
- Book DOI: 10.1049/SBTE501E
- Chapter DOI: 10.1049/SBTE501E
- ISBN: 9781420061499
- e-ISBN: 9781613531839
- Page count: 444
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
1 Fundamental Concepts
- + Show details - Hide details
-
p.
1
–11
(11)
In this chapter, the fundamental concepts of broadband communications have been discussed. The key components of broadband communication systems, communication network architecture, internetworking, and the various standards which influence them.
-
Part 1: Internet-Based Networks
2 Internet
- + Show details - Hide details
-
p.
13
–35
(23)
The Internet, the so-called 'information superhighway,' is being used by an increasing number of people worldwide. As a result, the Internet has been growing exponentially with the number of machines connected to the network and the amount of network traffic roughly doubling each year. The Internet today is fundamentally changing our social, political, and economic structures, and in many ways obviating geographic boundaries. In this chapter, we will consider the Internet protocol suite and the next generation Internet (IPv6). We will also consider Internet applications, Internet security, and voice over IP networks.
3 Intranet and Extranet
- + Show details - Hide details
-
p.
37
–51
(15)
An Intranet is a privately maintained, secure computer network based on the communication standards of the Internet. It is a smaller version of the Internet that only the internal members of an organization can see. At the same time it is available remotely over the Internet allowing access from any physical location. Organizations can create, within their walls, a manageable, secure version of the World Wide Web. These internal Webs are growing from an explosion in the use and understanding of Internet technology.
-
Part 2: Networking Technologies
4 X.25 and Frame Relay
- + Show details - Hide details
-
p.
53
–75
(23)
X.25 is a packet switched data network protocol that defines an international recommendation for the exchange of data between a user device (DTE) and a network node (DCE). Virtual circuit is the end-to-end connection (through a network) between two user devices (DTEs). Frame relay is a packet switching technology that relies on low-error-rate digital transmission links and high-performance processors. X.25 was designed to provide error-free delivery using high-error-rate links. Frame relay takes advantage of the new, lower-error-rate links, enabling it to eliminate many of the services provided by X.25. Congestion control is about controlling traffic entry into telecommunication networks. Voice over frame relay (VoFR) technology consolidates voice and voiceband data (e.g., fax and analog modems) with data services over the frame relay network. The most popular frame relay application provides companies with LAN-LAN internetworking. In addition, frame relay finds applications in voice over frame relay (VoFR), business, education, medical care, and industry.
5 Fiber Channel
- + Show details - Hide details
-
p.
77
–91
(15)
In this chapter, we first discuss the basic features of fiber channel. Later, we discuss its technology, topology, classes of service, benefits, and applications. Finally, we will wrap up with an application for fiber channel technology-storage area network (SAN).
6 Synchronous Optical Network (SONET)
- + Show details - Hide details
-
p.
93
–108
(16)
Exchange Carriers Standards Association (ECSA) developed synchronous optical network (SONET) for ANSI. Synchronous digital hierarchy (SDH) is the international equivalent of SONET. These standards define the optical telecommunication transport for the U.S. and European Telecommunications. The SONET and SDH are technologies for network transport. They use synchronous operations in facilitating real-time data, voice, and video transmission through fiber optic cabling. The rates range from 51.84 Mbps (OC-1 or optical carrier level 1) to 13.271 Gbps (OC-255). High-speed communications from different vendors are interconnected by applying the SONET standard. The ability of SONET to transport many different digital signals using a standard synchronous transport signal (STS) format is its major attribute. We will discuss the SONET and SDH in this chapter. The SONET signal, frame, components, topologies, and standards will also be discussed.
7 Virtual Private Network (VPN)
- + Show details - Hide details
-
p.
109
–119
(11)
In this chapter, we will consider the different types of VPN, the VPN infrastructure, and virtual networks' requirements. The VPN general architecture, current VPN advantages and disadvantages, provisioning models, and the VPN standard will also be considered.
8 ISDN and BISDN
- + Show details - Hide details
-
p.
121
–141
(21)
The aim of this chapter is to provide an introduction to the rapidly evolving ISDN and BISDN and their related emerging services and technologies. Although ATM will be briefly mentioned in this chapter for the sake of completeness, its full discussion will be in the next chapter.
9 Asynchronous Transfer Mode
- + Show details - Hide details
-
p.
143
–161
(19)
As mentioned in the previous chapter, asynchronous transfer mode (ATM) was selected in 1987 by ITU-T as the universal transfer mode for transferring information of the broadband integrated services digital networks (BISDN). It was originally conceived as a high-speed transfer technology for voice, video, and data over public networks. It combines the benefits of circuit switching with those of packet switching and provides a mechanism for integrating LANs and WANs. ATM allows the carriers to provide different classes of service over the network and to connect devices operating at different speeds. The objective of this chapter is to provide a basic understanding of ATM networks and its services. The chapter provides summaries of ATM cells, protocols, services, and standards. It also discusses various applications of ATM, particularly how it applies in local area network (LAN) environments.
-
Part 3: Access Networks
10 Digital Subscriber Line Systems
- + Show details - Hide details
-
p.
163
–200
(38)
The objective of this chapter is to provide an overall discussion that will give an in-depth treatment of the basic principles, design, and achievable performance of DSL systems for multi-Mbps communication over the subscriber line, and for advanced LAN transmission.
11 Cable Modem Systems
- + Show details - Hide details
-
p.
201
–215
(15)
Cable modem systems are modems designed to operate over cable television (cable TV) lines. Accessing the Internet using a cable network (and a cable modem) is becoming increasingly popular due to the much greater speed than is available through telephone-modem access. A cable modem uses coaxial cable, which has the capability to provide greater bandwidth than regular telephone lines. This makes it possible for cable modem systems to achieve extremely fast access to the World Wide Web (WWW). The fact that millions of homes are already wired for cable TV has provided a tremendous boost to many homes to have access to Internet. However, there are a number of technical difficulties. The fact that the cable TV infrastructure is designed to broadcast TV signals in just one direction-from the cable TV company to people's homes - presents one problem. This is because the Internet is a two-way system where data also needs to flow from the client to the server. It is debatable as to whether the cable TV networks can handle the amount of traffic that could result if millions of users began using the cable modem system for Internet access. Cable modem system organizations have made significant progress in accommodating the two problems mentioned.
12 Passive Optical Networks
- + Show details - Hide details
-
p.
217
–238
(22)
The objective of this chapter is to provide an in-depth discussion of PON, the basic principles, design, advantages, and disadvantages of this new emerging broadband technology. As part of the objectives of this chapter, the authors discuss the security and the key standard issues facing the PONs.
-
Part 4: Wireless Networks
13 Wireless Data Services
- + Show details - Hide details
-
p.
239
–270
(32)
This chapter considers various wireless communication systems including the following: wireless local area networks (WLANs), which enable communication between stations without cables by means of radio frequency or infrared; wireless asynchronous transfer mode (WATM), which facilitates the use of ATM technology for a broad range of wireless network access and internetworking scenarios; wireless personal area network (WPAN), which refers to using a near-field electric field to send data across various devices using the human body as a medium; and cellular communications, which allows frequency reuse by dividing regions into small cells, each cell with a stationary radio antenna.
14 Personal Communications Service
- + Show details - Hide details
-
p.
271
–289
(19)
Personal communication services (PCS) is a new concept that will expand the horizon of wireless communications beyond the limitations of current cellular systems to provide users with the means to communicate with anyone, anywhere, anytime. It is called PCS by the FCC or personal communications networks (PCN) by the rest of the world. Its goal is to provide integrated communications (such as voice, data, and video) between nomadic subscribers irrespective of time, location, and mobility patterns. It promises near-universal access to mobile telephony, messaging, paging, and data transfer.
15 Satellite Communication
- + Show details - Hide details
-
p.
291
–327
(37)
Satellite-based communication has become a major facet of the telecommunication industry for at least two major reasons. First, it provides a means of broadcasting information to a large number of people simultaneously. Thus, satellite communication systems are an important ingredient in the implementation of a global communication infrastructure. Second, satellite communication provides a means of reaching isolated places on earth, where terrestrial telecommunications infrastructure does not exist or teledensity is low. Applications of satellite communications include very small aperture terminals (VSATs) for business applications; fixed satellite service (FSS), which interconnects fixed points; mobile satellite (MSAT) service, which employs satellite to extend cellular network to mobile units; satellite radio, which continuously provide entertainment to listeners; and satellite-based Internet, which enables IP-over-satellite connectivity.
-
Part 5: Network Management and Security
16 Network Management
- + Show details - Hide details
-
p.
329
–340
(12)
This chapter overviews briefly network management architecture, simple management information protocols, management information base (MIB), remote network monitoring (RMON), and a summary of the subsequent sections.
17 Network Security
- + Show details - Hide details
-
p.
341
–361
(21)
We use computer networks for everything from banking and investing online to communicating with others through email or chat programs. Due to the value of information on these networks, it has become a lucrative target for unauthorized users or criminals. To protect both the network and the information on it, network managers must consider taking some security measures. Security measures help you to stop unauthorized users from accessing any part of your computer network. As more and more people become 'wired' or 'connected' and the world becomes more tightly interconnected, network security becomes more important. Network security is the process of preventing and detecting unauthorized use of your network. We begin this chapter by looking at the network security requirements. We then discuss the types and sources of threats there are against computer networks. We go on to consider access control methods, cryptography, firewalls, intrusion detection, and security standards.
18 Network Testing, Fault Tolerance, and Analysis
- + Show details - Hide details
-
p.
363
–397
(35)
In this chapter, we will focus on ADSL modem interoperability and DSLAM reliability testing. The interoperability test is used to perform the reliability test. In this test, we use a single modem against different ports of DSLAM to check the performance of each port. This provides information on how reliable DSLAM ports are in the broadband network. We will also focus on wireless-related tests and the emerging WiMax technology.
-
Testing DSLAM Using SmartBits - SmartWindow
- + Show details - Hide details
-
p.
399
–407
(9)
The device under test (DUT) in this document is an ADSL modem connected in the testing loop. The RJ-11 port of the modem connects to a WireLine Simulator, which can simulate different types of testing loops. The RJ-45 port of the modem connects to a ML-7710 10/100Mb Ethernet SmartCard in a SmartBits chassis. Connect the DS-3 cable from the Stinger trunk module to the AT-9045 45 Mb DS3 ATM SmartCard in the SmartBits chassis. The DSL line input of the Stinger comes from the WireLine Simulator.
Testing DSLAM Using SmartBits - SmartxDSL
- + Show details - Hide details
-
p.
409
–418
(10)
The device under test (DUT) in this document is an ADSL modem connected in the testing loop shown in Figure B1. The RJ-11 port of the modem connects to the WireLine Simulator, which can simulate different types of testing loops. The RJ-45 port of the modem connects to an ML-771010/100Mb Ethernet SmartCard in SmartBits chassis. Connect the DS-3 cable from the Stinger trunk module to the AT-9045 45 Mb DS3 ATM SmartCard in SmartBits chassis. The DSL line input of the Stinger comes from the Wire Line Simulator.
Back Matter
- + Show details - Hide details
-
p.
419
(1)