+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: What is isdn?

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: What Is ISDN?, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



What is ISDN?

ISDN, which stands for integrated services digital network, is a system of
digitizing phone networks which has been in the works for over a decade. This
system allows audio, video, and text data to be transmitted simultaneously
across the world using end-to-end digital connectivity.

The original telephone system used analog signals to transmit a signal across
telephone wires. The voice was carried by modulating an electric current with a
waveform from a microphone. The receiving end would then vibrate a speaker coil
for the sound to travel back to the ear through the air. Most telephones today
still use this method. Computers, however, are digital machines. All information
stored on them is represented by a bit, representing a zero or a one. Multiple
bits are used to represent characters, which then can represent words, numbers,
programs, etc. The analog signals are just varying voltages sent across the
wires over time. Digital signals are represented and transmitted by pulses with
a limited number of discrete voltage levels. [Hopkins]

The modem was certainly a big breakthrough in computer technology. It allowed
computers to communicate with each other by converting their digital
communications into an analog format to travel through the public phone network.
However, there is a limit to the amount of information that a common analog
telephone line can hold. Currently, it is about 28.8 kbit/s. [Hopkins] ISDN
allows multiple digital channels to be operated simultaneously through the same
regular phone jack in a home or office. The change comes about when the
telephone company's switches are upgraded to handle digital calls. Therefore,
the same wiring can be used, but a different signal is transmitted across the
line. [Hopkins] Previously, it was necessary to have a phone line for each
device you wished to use simultaneously. For example, one line each for the
phone, fax, computer, and live video conference. Transferring a file to someone
while talking on the phone, and seeing their live picture on a video screen
would require several expensive phone lines. [Griffiths] Using multiplexing (a
method of combining separate data signals together on one channel such that they
may be decoded again at the destination), it is possible to combine many
different digital data sources and have the information routed to the proper
destination. Since the line is digital, it is easier to keep the noise and
interference out while combining these signals. [Griffiths] ISDN technically
refers to a specific set of services provided through a limited and standardized
set of interfaces. This architecture provides a number of integrated services
currently provided by separate networks.

ISDN adds capabilities not found in standard phone service. The main feature is
that instead of the phone company sending a ring voltage signal to ring the bell
in your phone, it sends a digital package that tells who is calling (if
available), what type of call it is (data/voice), and what number was dialed (if
multiple numbers are used for a single line). ISDN phone equipment is then
capable of making intelligent decisions on how to answer the call. In the case
of a data call, baud rate and protocol information is also sent, making the
connection instantaneous. [Griffiths] ISDN Concepts:

With ISDN, voice and data are carried by bearer channels (B channels) occupying
a bandwidth of 64 kbit/s each. A delta channel (D channel) handles signalling at
16 kbit/s or 64 kbit/s. H channels are provided for user information at higher
bit rates. [Stallings] There are two types of ISDN service: Basic Rate ISDN
(BRI) and Primary Rate ISDN (PRI).

BRI: consists of two 64 kbit/s B channels and one 16 kbit/s D channel for a
total of 144 kbit/s. The basic service is intended to meet the needs of most
individual users. PRI: intended for users with greater capacity requirements.
Typically the channel structure is 23 B channels plus one 64 kbit/s D channel
for a total of 1.544 Mbit/s. H channels can also be implemented: H0=384 kbit/s,
H11=1536 kbit/s, H12=1920 kbit/s. [Stallings]

In this paper, I will concentrate on defining the specifics of Basic Rate ISDN
for local loop transmission. I will provide an in depth view of ISDN as it
relates to layer 1 to 3 of the seven layer OSI model. I will also provide the
specification for communication at the S/T customer interface.

Basic Rate ISDN:

Basic Rate Interface (BRI) - The BRI is the fundamental building block of an
ISDN network. It is composed of a single 16 kbit/s "D-channel" which is used for
call setup and control and two 64 kbit/s "B-channels". The B-channels can be
used to carry voice and both circuit mode and packet mode data traffic. The D-
channel may also be used to carry X.25 packet traffic if the network supports
that option. [Griffiths]

Basic Rate Interface D Channel - In the analog world, a telephone call is
controlled in-band. Tones and voltages are sent across lines for signalling
conditions. ISDN does away with this. The D channel becomes the vehicle for
signalling. This signalling is called common channel since a separate channel
for signalling is used by two or more bearer channels. [Hopkins]

User - Network protocols define how users interact with ISDN networks. Between
the user equipment and network equipment is a set of defined interfaces. The U
interface is between the central office and the customer premise. This
interface carries information on the twisted pair of wires between the customer
and the central office. At the S/T interface located at the customer location,
two pairs of wires (one for transmitting, one for receiving) are used. The
intermediate device between the U and the S/T interface is known as an NT1. The
NT1 is a hybrid that converts from four wire to two wire and also transforms the
2B+D signal into a different bit stream format. [Griffiths]

ISDN and the OSI Model - The OSI (Open Systems Interconnect) seven layer
protocol was developed to promote interoperability in the data world. ISDN,
which followed OSI, was designed to be a network technology inhabiting the lower
three layers of the OSI model. Consequently, an OSI end system that implements
an OSI seven layer stack can contain ISDN at the lower layers. Also, services
such as TCP/IP (Internet Transmission Control Protocol) can use the ISDN network.
[Griffiths]

Layer 1 of User-Network Interface:

Layer 1 protocols provide the details that describe how the signals (electrical
or optical) are encoded onto the physical medium. These protocols describe how
the user data and signalling bits are transformed into line signals, then back
again into user data bits. The ISDN layer 1 protocol supports the functions
outlined below. [ITU-T, I.430] ( B Channel Transmission ( D Channel Transmission
( D Channel Access Procedure

B Channel Transmission - Layer 1 must support for each direction of transmission,
two independent 64 kbit/s B channels. The B channels contain user data which is
switched by the network to provide the end-to-end transmission source. There is
no error correction provided by the network on these channels. [ITU-T, I.430]

D Channel Transmission - Layer 1 must support for each direction of transmission,
a 16 kbit/s channel for the signalling information. In some networks user
packet data may also be supported on the D channel. [ITU-T, I.430]

D Channel Access Procedure - This procedure ensures that in the case of two or
more terminals, on a point to multipoint configuration, attempting to access the
D Channel simultaneously, one terminal will always successfully complete the
transmission of information. [ITU-T, I.430]

Binary Organization of Layer 1 frame - The structures of Layer 1 frames across
the interface are different in each direction of transmission. Both structures
are shown in figure 1 below. [Griffiths]

A frame is 48 bits long and lasts 250(s. The bit rate is therefore 192 kbit/s
and each bit is approximately 5.2(s long. Figure 1 also shows that there is a
2-bit offset between transmit and receive frames. This is the delay between
frame start at the receiver of a terminal and the frame start of the transmitted
signal. [Griffiths] Figure 1 also illustrates that the line coding used is AMI
(Alternate Marks Inversion); a logical 1 is transmitted as zero volts and a
logical 0 as a positive or negative pulse. Note that this convention is the
inverse of that used on line transmission systems. The nominal pulse amplitude
is 750mV. [Griffiths] A frame contains several L bits. These are balance bits
to prevent a build up of DC on the line. For the direction TE to NT, where each
B-channel may come from a different terminal, each terminal's output contains an
L bit to form a balanced block. [ITU-T, I.430] Examining the frame in the NT to
TE direction, the first bits of the frame are the F/L pair, which is used in the
frame alignment procedure. The start of a new frame is signalled by the F/L
pair violating the AMI rules. Once a violation has occurred there must be a
second violation to restore correct polarity before the next frame. This takes
place with the first mark after the F/L pair. The FA bit ensures this second
violation occurs should there not be a mark in the B1, B2, D, E, or A channels.
The E channel is an echo channel in which D-channel bits arriving at the NT are
echoed back to the TEs. There is a 10 bit offset between the D channel leaving
a terminal, traveling to the NT and being echoed back in the E channel. [ITU-T,
I.430] The A bit is used in the activation procedure to indicate to the
terminals that the system is in synchronization. Next is a byte of the B2
channel, a bit of the E channel and a bit of the D channel, followed by an M bit.
This is used for multiframing. The M bit identifies some FA bits which can be
stolen to provide a management channel. [ITU-T, I.430] The B1, B2, D, and E
channels are then repeated along with the S bit which is a spare bit. [ITU-T,
I.430]

Layer 1 D Channel Contention Procedure - This procedure ensures that, even in
the case of two or more terminals attempting to access the D channel
simultaneously, one terminal will always successfully complete the transmission
of information by first gaining control of the D channel and then retransmitting
its information. The procedure relies on the fact that the information to be
transmitted consists of layer 2 frames delimited by flags consisting of the
binary pattern 01111110. Layer 2 applies a zero bit insertion algorithm to
prevent flag imitation by a layer 2 frame. The interframe time fill consists of
binary 1s which are represented by zero volts. The zero volt line signal is
generated by the TE transmitter going high impedance. This means a binary 0
from a parallel terminal will overwrite as binary 1. Detection of collision is
done by the terminal monitoring the E channel (D channel echoed from the NT).
[ITU-T, I.430]

To access the D channel a terminal looks for the interframe time fill by
counting the number of consecutive binary 1s in the D channel. Should a binary
0 be received the count is reset. When the number of consecutive 1s reaches a
predetermined value (which is greater than the number of consecutive 1s possible
in a frame because of the zero bit insertion algorithm) the counter is reset and
the terminal may access the D channel. When a terminal has just completed
transmitting a frame the value of the count needed to be reached before another
frame may be transmitted is incremented by 1. This gives other terminals a
chance to access the channel. Hence an access and priority mechanism is
established. [ITU-T, I.430] There is still the possibility of collision between
two terminals of the same priority. This is detected and resolved by each
terminal comparing its last transmitted bit with the next E bit. If they are
the same the terminal continues to transmit. If, however, they are different
the terminal detecting the difference ceases transmission immediately and
returns to the D channel monitoring state leaving the other terminal to continue
transmission. [ITU-T, I.430]

Layer 1 Activation/Deactivation Procedure - This procedure permits activation of
the interface from both the terminal and network side, but deactivation only
from the network side. This is because of the multi-terminal capability of the
interface. Activation and deactivation information is conveyed across the
interface by the use of line signals called

'Info signals'. [ITU-T, I.430] Info 0 is the absence of any line signal; this is
the idle state with neither terminals nor the NT working. [ITU-T, I.430] Info 1
is flags transmitted from a terminal to the NT to request activation. Note this
signal is not synchronized to the network. [ITU-T, I.430] Info 2 is transmitted
from the NT to the TEs to request their activation or to indicate that the NT
has activated as a response to receiving an Info 1. An Info 2 consists of Layer
1 frames with a high density of binary zeros in the data channels which permits
fast synchronization of the terminals. [ITU-T, I.430] Info 2 and Info 4 are
frames containing operational data transmitted from the TE and NT
respectively.[ITU-T, I.430] The principal activation sequence is commenced when
a terminal transmits an Info 1. The NT activates the local transmission system
which indicates to the exchange that the customer is activating. The NT1
responds to the terminals with an Info 2 to which the TEs synchronize. The TEs
respond with an Info 3 containing operational data and the NT is then in a
position to send Info 4 frames. Note that all terminals activate in parallel;
it is not possible to have just one terminal activated in a multi-terminal
configuration. The network activates the bus by the exchange activating the
local network transmission system. Deactivation occurs when the exchange
deactivates the local network transmission system. [ITU-T, I.430]

Layer 2 of User-Network Interface:

The Layer 2 recommendation describes the high level data link (HDLC) procedures
commonly referred to as the Link Access Procedure for a D channel or LAP D. The
objective of Layer 2 is to provide a secure, error-free connection between two
endpoints connected by a physical medium. Layer 3 call control information is
carried in the information elements of Layer 2 frames and it must be delivered
in sequence and without error. Layer 2 also has the responsibility for
detecting and retransmitting lost frames.

LAP D was based originally on LAP B of the X.25 Layer 2 recommendation. However,
certain features of LAP D give it significant advantages. The most striking
difference is the possibility of frame multiplexing by having separate addresses
at Layer 2 allowing many LAPs to exist on the same physical connection. It is
this feature that allows up to eight terminals to share the signalling channel
in the passive bus arrangement. [ITU-T, Q.920] Each Layer 2 connection is a
separate LAP and the termination points for the LAPs are within the terminals at
one end and at the periphery of the exchange at the other. Layer 2 operates as
a series of frame exchanges between the two communicating, or peer entities.
The frames consist of a sequence of eight bit elements and the elements in the
sequence define their meaning as shown in Figure 2 below. [ITU-T, Q.920]

A fixed pattern called a flag is used to indicate both the beginning and end of
a frame. Two octets are needed for the Layer 2 address and carry a service
identifier (SAPI), a terminal identifier (TEI) and a command /response bit. The
control field is one or two octets depending on the frame type and carries
information that identifies the frame and the Layer 2 sequence numbers used for
link control. The information element is only present in frames that carry
Layer 3 information and the Frame Check Sequence (FCS) is used for error
detection. A detailed breakdown of the individual elements is given in Figures
3 and 4 below. [ITU-T, Q.920] What cannot be shown in the diagrams is the
procedure to avoid imitation of the flag by the data octets. This is achieved
by examining the serial stream between flags and inserting an extra 0 after any
run of five 1 bits. The receiving Layer 2 entity discards a 0 bit if it is
preceded by five 1's. [ITU-T, Q.920]

Layer 2 Addressing - Layer 2 multiplexing is achieved by employing a separate
Layer 2 address for each LAP in the system. To carry the LAP identity the
address is two octets long and identifies the intended receiver of a command
frame and the transmitter of a response frame. The address has only local
significance and is known only to the two end-points using the LAP. No use can
be made of the address by the network for routing purposes and no information
about its value will be held outside the Layer 2 entity. [ITU-T, Q.921]

The Layer 2 address is constructed as shown in Figure 3. The Service Access
Identifier (SAPI) is used to identify the service intended for the signalling
frame. An extension of the use of the D channel is to use it for access to a
packet service as well as for signalling. Consider the case of digital
telephones sharing a passive bus with packet terminals. The two terminal types
will be accessing different services and possibly different networks. It is
possible to identify the service being invoked by using a different SAPI for
each service. This gives the network the option of handling the signalling
associated with different services in separate modules. In a multi-network ISDN
it allows Layer 2 routing to the appropriate network. The value of the SAPI is
fixed for a given service. [ITU-T, Q.921] The Terminal Endpoint Identifier (TEI)
takes a range of values that are associated with terminals on the customer's
line. In the simplest case each terminal will have a single unique TEI value.
The combination of TEI and SAPI identify the LAP and provide a unique Layer 2
address. A terminal will use its Layer 2 address in all transmitted frames and
only frames received carrying the correct address will be processed. [ITU-T,
Q.921] In practice a frame originating from telephony call control has a SAPI
that identifies the frame as 'telephony' and all telephone equipment examine
this frame. Only the terminal whose TEI agrees with that carried by the frame
will pass it to the Layer 2 and Layer 3 entities for processing. There is also
a SAPI identified in standards for user data packet communication. [ITU-T,
Q.921] Since it is important that no two TEIs are the same, the network has a
special TEI management entity which allocates TEI on request and ensures their
correct use. The values that TEIs can take fall into the ranges:

0-63 Non-Automatic Assignment TEIs
64-126 Automatic Assignment TEIs
127 Global TEI [ITU-T, Q.921]

Non-Automatic TEIs are selected by the user; their allocation is the
responsibility of the user. Automatic TEIs are selected by the network; their
allocation is the responsibility of the network. The global TEI is permanently
allocated and is referred to as the broadcast TEI. [ITU-T, Q.921] Terminals
which use TEIs in the range of 0-63 need not negotiate with the network before
establishing a Layer 2 connection. Terminals which use TEIs in the range 64-126
cannot establish a Layer 2 connection until they have requested a TEI from the
network. In this case it is the responsibility of the network not to allocate
the same TEI more than once at any given time. The global TEI is used to
broadcast information to all terminals within a given SAPI; for example a
broadcast message to all telephones, offering an incoming telephone call. [ITU-T,
Q.921]

Layer 2 Operation - The function of Layer 2 is to deliver Layer 3 frames, across
a Layer 1 interface, error free and in sequence. It is necessary for a Layer 2
entity to interface both Layer 1 and Layer 3. To highlight the operation of
Layer 2 we will consider the operation of a terminal as it attempts to signal
with the network. [ITU-T, Q.921]

It is the action to establish a call that causes protocol exchange between
terminal and network. If there has been no previous communication it is
necessary to activate the interface in a controlled way. A request for service
from the customer results in Layer 3 requesting a service from Layer 2. Layer 2
cannot offer a service unless Layer 1 is available and so a request is made to
Layer 1. Layer 1 then initiates its start-up procedure and the physical link
becomes available for Layer 2 frames. Before Layer 2 is ready to offer its
services to Layer 3 it must initiate the Layer 2 start-up procedure known as
'establishing a LAP'. [ITU-T, Q.921] LAP establishment is achieved by the
exchange of Layer 2 frames between the Layer 2 handler in the terminal and the
corresponding Layer 2 handler in the network. The purpose of this exchange is
to align the state variables that will be used to ensure the correct sequencing
of information frames. Before the LAP has been established the only frames that
may be transmitted are unnumbered frames. The establishment procedure requires
one end-point to transmit a Set Asynchronous Balanced Mode Extended (SABME) and
the far end to acknowledge it with an Unnumbered Acknowledgment (UA). [ITU-T,
Q.921] Once the LAP is established Layer 2 is able to carry the Layer 3
information and is said to be the 'multiple frame established state'. In this
state Layer 2 operates its frame protection mechanisms. Figure 5 below shows a
normal Layer 2 frame exchange. [ITU-T, Q.921]

Once established the LAP operates an acknowledged service in which every
information frame must be responded to by the peer entity. The most basic
response is the Receiver Ready (RR) response frame. Figure 5 shows the LAP
establishment and the subsequent I frame RR exchanges. The number of I frames
allowed to be outstanding without an acknowledgment is defined as the window
size and can vary between 1 and 127. For telephony signalling applications the
window size is 1 and after transmitting an I frame the Layer 2 entity will await
a response from the corresponding peer entity before attempting to transmit the
next I frame. Providing there are no errors all that would be observed on the
bus would be the exchange of I frames and RR responses. However Layer 2 is able
to maintain the correct flow of information in the face of many different error
types. [ITU-T, Q.921]

Layer 2 Error Control - It is unlikely that a frame will disappear completely
but it is possible for frames to be corrupted by noise at Layer 1. Corrupted
frames will be received with invalid Frame Check Sequence (FCS) values and
consequently discarded. [ITU-T, Q.920]

The frame check sequence is generated by dividing the bit sequence starting at
the address up to (but not including) the start of the frame check sequence by
the generator polynomial X16 + X12 + X5 + 1. In practical terms this is done by
a shift register as shown in figure 6. All registers are preset to 1 initially.
At the end of the protected bits the shift register contains the remainder from
the division. The 1's complement of the remainder is the FCS. At the receiver
the same process is gone through , but this time the FCS is included in the
division process. In the absence of transmission errors the remainder should
always be 1101 0000 1111. [ITU-T, Q.920]

The method for recovering from a lost frame is based on the expiration of a
timer. A timer is started every time a command frame is transmitted and is
stopped when the appropriate response is received. This single timer is thus
able to protect both the command and response as the loss of either will cause
it to expire. [ITU-T, Q.920] When the timer expires it is not possible to tell
which of the two frames has been lost and the action taken is the same in both
cases. Upon the timer expiring, Layer 2 transmits a command with the poll bit
set. This frame forces the peer to transmit a response that indicates the value
held by the state variables. It is possible to tell from the value carried by
the response frame whether or not the original frame was received. If the first
frame was received, the solicited response frame will be the same as the lost
response frame and is an acceptable acknowledgment. If however the original
frame was lost, the solicited response will not be an appropriate acknowledgment
and the Layer 2 entity will know that a retransmission is required.

It is possible for the same frame to be lost more than once and Layer 2 will
restransmit the frame three times. If after three transmissions of the frame
the correct response has not been received , Layer 2 will assume that the
connection has failed and will attempt to re-establish the LAP. [ITU-T, Q.921]

Another possible protocol error is the arrival of an I frame with an invalid
send sequence number N(S). This error is more likely to occur when the LAP is
operating with a window size greater than one. If, for example, the third frame
in the sequence of four is lost the receiving Layer 2 entity will know that a
frame has been lost from the discontinuity in the sequence numbers. The Layer 2
must not acknowledge the fourth frame as this will imply acknowledgment of the
lost third frame. The correction operation is to send a Reject (REJ) frame with
the receive sequence number N(R) equal to N(S) + 1 where N(S) is the send
variable of the last correctly received I frame, in this case I frame 2. This
does two things; first it acknowledges all the outstanding I frames up to and
including the second I frame, and secondly it causes the sending end to
retransmit all outstanding I frames starting with the lost third frame. [ITU-T,
Q.920] The receipt of a frame with an out of sequence, or invalid, N(R) does not
indicate a frame loss and cannot be corrected by retransmissions. It is
necessary in this case to re-establish the LAP to realign the state variables at
each end of the link. [ITU-T, Q.920] The Receiver Not Ready (RNR) frame is used
to inhibit the peer Layer 2 from transmitting I frames. The reasons for wanting
to do this are not detailed in the specification but it is possible to imagine a
situation where Layer 3 is only one of many functions to be serviced by a
microprocessor and a job of higher priority requires that no Layer 3 processing
is performed. [ITU-T, Q.920] Another frame specified in Layer 2 is the FRaMe
Reject frame (FRMR). This frame may be received by a Layer 2 entity but may not
be transmitted. It is included in the recommendation to preserve alignment
between LAP D and LAP B. After the detection of a frame reject condition the
data link is reset. [ITU-T, Q.920]

Disconnecting the LAP - After Layer 3 has released the call it informs Layer 2
that it no longer requires a service. Layer 2 then performs its own
disconnection procedures so that ultimately Layer 1 can disconnect and the
transmission systems associated with the local line and the customer's bus can
be deactivated. [ITU-T, Q.921]

Layer 2 disconnection is achieved when the frames disconnect (DISC) and UA are
exchanged between peers. At this point the LAP can no longer support the
exchange of I frames and supervisory frames. [ITU-T, Q.921] The last frame type
to be considered is the Disconnect Mode (DM) frame. This frame is an unnumbered
acknowledgment and may be used in the same way as a UA frame. It is used as a
response to a SABME if the Layer 2 entity is unable to establish the LAP, and a
response to a DISC if the Layer 2 entity has already disconnected the LAP. [ITU-
T, Q.921]

TEI Allocation - Because each terminal must operate using a unique TEI,
procedures have been defined in a Layer 2 management entity to control their use.
The TEI manager has the ability to allocate, remove, check, and verify TEIs
that are in use on the customer's bus. As the management entity is a separate
service point all messages associated with TEI management are transmitted with a
management SAPI. [ITU-T, Q.921]

TEI management procedures must operate regardless of the Layer 2 state and so
the unnumbered information frame (UI) is used for all management messages. The
UI frames have no Layer 2 response and protection of the frame content is
achieved by multiple transmissions of the frame.

In order to communicate with terminals which have not yet been allocated TEIs a
global TEI is used. All management frames are transmitted on a broadcast TEI
which is associated with a LAP that is always available. All terminals can
transmit and receive on the broadcast TEI as well as their own unique TEI. All
terminals on the customer's line will process all management frames. To ensure
that only one terminal acts upon a frame a unique reference number is passed
between the terminal and the network. This reference number is contained within
an element in the UI frame and is either a number randomly generated by the
terminal, or 0 is the TEI of the terminal, depending on the exact situation.
Figure 7 below shows the frame exchange required for a terminal to be allocated
a TEI and establish its data link connection. [ITU-T, Q.921]

Layer 3 of User-Network Interface:

This layer effects the establishment and control of connections. It is carried
in Layer 2 frames as can be seen in figure 8. [ITU-T, Q.930]

The first octet contains a protocol discriminator which gives the D channel the
capability of simultaneously supporting additional communications protocols in
the future. The bits shown in figure 8 are the standard for user-network call
control messages. [ITU-T, Q.930] The call reference value in the third octet is
used to identify the call with which a particular message is associated. Thus a
call can be identified independently of the communications channel on which it
is supported.

The message type coded in the fourth octet describes the intention of the
message (e.g. a SETUP message to request call establishment). These are listed
in Table 1 at the end of this paper. A number of other information elements may
be included following the message type code in the fourth octet. The exact
contents of a message are dependent on the message type. [ITU-T, Q.931]

The message sequence for call establishment is shown in figure 9. In order to
make an outgoing call request, a user must send all of the necessary call
information to the network. Furthermore, the user must specify the particular
bearer service required for the call (i.e. Speech, 64 kbit/s/s unrestricted, or
3.1 kHz Audio) and any terminal compatibility information which must be checked
at the destination. [ITU-T, Q.931]

The initial outgoing call request may be made in an en bloc or overlap manner.
Figure 9 illustrates the call establishment procedures. If overlap sending is
used then the SETUP message must contain the bearer service request but the
facility requests and called party number information may be segmented and
conveyed in a sequence of INFORMATION messages as shown. Furthermore if a
speech bearer service is requested and no call information is contained in the
SETUP message, then the network will return in-band dial tone to the user until
the first INFORMATION message has been received. [ITU-T, Q.931] Following the
receipt of sufficient information for call establishment , the network returns a
call PROCEEDING


 

Other sample model essays:

What Really is a Hacker? Dan Parks Julie Jackson - Instructor CIS 101 11-18-96 There is a common misconception among the general public about what constitutes ...
What Should and Shouldn't Computer Be Allowed To Run Computers have always scared people. Not just because they can be confusing and hard to operate, but also because how they affect peopl...
Why We Should Stick To Qwerty Computer Science 10 The Qwerty keyboard - named Qwerty because the letters q, w, e, r, t, y are arranged next to each other - has been the universal standard s...
Why You Should Purchase A PC Computers are capable of doing more things every year. There are many advantages to knowing how to use a computer, and it is important that everyone know h...
Will Computers Control Humans In The Future? People always tend to seek the easy way out looking for something that would make their lives easier. Machines and tools have given us the ...
William Henry Gates III Chairman and Chief Executive Officer Microsoft Corporatio William (Bill) H. Gates is chairman and chief executive officer of Microsoft Corporation, the ...
William Gibson and The Internet Introduction The words "Internet" and "world wide web" are becoming everyday use these days, it has exploded into the mass market of information and a...
Windows 95 the O/S of the Future The way of the computing world is changing at a neck breaking pace. People are looking for computers to be easy to use, and to make life easier for them. The ...
Technology / Windows 95
Windows 95 James Connell Windows 95 may very well be the most talked about software release in history. With more people than ever using personal computers, and given Microsoft's dominan...
Windows NT vs Unix As An Operating System In the late 1960s a combined project between researchers at MIT, Bell Labs and General Electric led to the design of a third generation of computer op...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD