P. 1
ORI000002 V5 theory ISSUE2.0

ORI000002 V5 theory ISSUE2.0

|Views: 36|Likes:
Published by api-19974739

More info:

Published by: api-19974739 on Dec 03, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

ORI000002 V5 theory

ISSUE 2.0

Wireless Curriculum Development Section

CONTENT

Basic concepts Protocols Protection group Application

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Introduction: Z interface Z interface

LE

Z interface: 2-wire analog interface Traditionally, POTS subscribers are connected directly to LE via Z interface
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Introduction: Z interface

Digital MUX

LE

With the emerging of digital MUX and digitalterminal, there is a requirement for digital interface
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Introduction: V interface

V interface : digital interface on the user side of LE. V5.1: ITU-T Recommendation G.964 V5.2: ITU-T Recommendation G.965

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Introduction: What is V5?
V5 LE AN

V5 is the digital interface between LE and AN which is standard and open for narrow band service, classified as V5.1 and V5.2
Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Physical Compositon(1)

LE

E1 link 1 E1 link 2 E1 link 3
Transparent Channel

AN

V5.2

V5.2

Maximum 16 E1 links in one V5.2 interface Any/all E1 links may use a transparent digital link

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

V5.2 interface in CDMA WLL System
V5.2 INTERFACE

LE

D T F

E1
C A I E

AN
(RAC)

In CDMA WLL System:
CAIE card provides E1 interface CLCB card processes V5.2 protocol
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Physical Compositon(2)
... ...

TS0

TS1

TS15 TS16

TS30 TS31

TS0

ONE FRAME
E1 frame is divided into 32 TDM slots They are number as TS0,TS1.... TS31 TS0 is a frame slot for frame synchronization TS16, 15 and 31 can be used to carry V5 protocol information, and TS16 has a priority Others are used to carry PCM encoded voice information from PSTN port
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Two important concept
Physical communication Channel: A 64k time slot on a V5.2 interface provisionedto carry protocol information. Bearer channel:
A 64k time slot used to provide the bi-directional transmission capability for PCM encoded 64Kbit/s channel from PSTN user ports.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

About ISDN

V5.2 interface support both BRA and PRA, but V5.2 doesn't process the information from ISDN port, it just transfers the information to LE transparently. D channel information is mutiplexed and carried on physical C-channel. B channel information is carried on bearer channel.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Rules for the Selection of Physical C Channels
TS0 TS1
Primary link Secondary link Other link

...... TS14 ...... ..... ..... . ..... .

TS15 TS16 TS17

n+1 n+3 n+5 3n-1

1 2 3

...... ...... ...... ...... ......

TS30 TS31

n+2 n+4 n+6 3n

......
n

Other link

Frame overhead

Bearer channel

1

Compulsive channel

3

Other possible C channels

n is the number of the links configured for V5.2 interface 1,2,3......3n is the sequence for C channel configuration.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Five protocols of V5.2

V5.2 interface includes 5 protocols, they are:

PSTN
BCC(Bearer Channel Connection)

CONTROL LINK CONTROL PROTECTION
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Communication Path, Logical C Channel, Physical C Channel(1)

PSTN

Logic C channel

BCC CONTROL L-CONTROL PROTECTION Physical C Channel

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Communication Path, Logical C Channel, Physical C Channel(2)
Logic C channel BCC CONTROL L-CONTROL PROTECTION Logic C channel PSTN Physical C Channel ISDN ISDN PSTN Physical C Channel

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Primary Link and Secondary Link
PSTN

Logic C channel

BCC CONTROL L-CONTROL PROTECTION Physical C Channel

PROTECTION

Physical C Channel

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Active C Channel and Standby C Channel
Logic C channel
BCC CONTROL L-CONTROL PROTECTION

Physical C Channel

Active c channel

PROTECTION

Physical C Channel Logic C channel

Standby c channel

PSTN

PSTN

Physical C Channel
ISDN

Active c channel
ISDN

Physical C Channel
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Standby c channel

PSTN protocol (1)
Digital MUX

digital

v5

LE
analog

AN
analog

The connection of LE and PSTN ports
Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PSTN protocol (2) protocol information
user A
addr A+stim a

stimulator a

LE
addr B+stim b

AN
user B

stimulator b

stimulator: hook-off, hang up, ...... The PSTN protocol is basically a stimulus protocol.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

BCC protocol(1)

This protocol enables V5.2 interface bearer channels to be allocated or de-allocated based on a call. The BCC protocol provides the means for the LE to request the AN to establish and release connections between a specific AN user port and a specific V5.2 interface bearer channel.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

BCC protocol(2)

TS10

TS26

0 1

TS10

A B C

TS26
TS10

n

TS10

LE

AN

These three telephones are busy, the BCC protocol has allocated a bearer channel (time slot) for each of them
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

CONTROL protocol(1)

The control protocol is composed of a subscriber port control part and a V5 interface common control part.

Port control:
If a user's service is interrupted by a system fault or a maintenance operation, this user port must be blocked. After the recovery of system fault or the maintenance operation ended, the user port must be unblocked.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

CONTROL protocol(2)

Common control:
An important function of CONTROL protocol is to verify V5 ID. V5 ID: a integer(0~224 -1) assigned to both side of V5.2 interface which must be equal. When the V5.2 interface start or restart, the control protocol will verify the V5ID on both sides. If the verification is not success, the start process will be terminate.
Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

LINK control protocol(1)

Since the V5.2 interface may consist of multiple 2048 kbit/s links, there is a need for link verification and for blocking /unblocking of a specific link. Three procedures have been defined for these functions and performe a specific link management at both sides of V5.2 interface. Link blocking & unblocking Events and failure reports Link identification
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

LINK control protocol(2)

LE

0 1 n

E1 link 1 E1 link 2 E1 link n

0 1 n

AN

link ID

LINK ID: a integer assigned at the two ends of a specific link which must be equal; Different link has different link ID.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

PROTECTION protocol

According to protocol architecture and multiplexing structure, a communication channel may carry information associated to several E1 links. The failure of a communication channel could affect the service of a large number of customers in abnormal. This is in particular true for the BCC protocol. In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication channel under failure are provided.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

PROTECTION protocol
ACTIVE C-CHANNEL

× LE LE

TS16

TS16

AN AN
STANDBY C-CHANNEL

The switch-over of protocol information
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

The application of multiple V5.2
LE1
V5.2

0 1 ...... 16 V5.2 0 1 0 1
V5.2 0

AN1

A B C D
AN2

V5.2

......
Confidential Information of Huawei. No Spreading without Permission.

1 6

LE2

Security Level: Internal

Summary

The introduction of V5 interface
Bearer Channel / Physical C Channel C Path& Logic C Channel &Active C Channel & Standby C Channel

Important concepts  The five protocol in V5.2 interface The application of multiple V5.2 interface

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->