SlideShare a Scribd company logo
1 of 39
V5 Protocol Introduction
 1. Overview

 2. V5 Protocol Introduction

 3. hardware configuration

 4. data configuration
1. OVERVIEW


1). V Interface

    The digital interface between the access network

   and the switch,including V1、V2、V3、V4、V5。
2). The limitation of the V1~V4 interfaces.

 V1 to V4 interfaces don’t support integrated access.
 And the more important is : V1 to V4 are all not standard
 interfaces, which hampers the development and use of the
 V interfaces.
3).THE FEATURE OF V5

the V5 interfaces are more open and standard, and it
has the ability of integrated access.
4).SERVICES SUPPORTED BY DIFFERENT V
INTERFACES
 V1 interface   ISDN BRA(2B+D) access
 V2 interface   2Mb/s、8Mb/s access
 V3 interface   ISDN PRA(30B+D) access
 V4 interface   Multiple 2B+D access
 V5 interface   ISDN/PSTN integrated access
5)、COMPARISON BETWEEN V5.1 INTERFACE
AND V5.2
   V5.1 interface              V5.2 interface

   Support a PCM link               Support 1-16 PCM links
                                    Dynamic time slot
                                   allocation and have the
   The time slots at the user port
                                   traffic concentration
   and on the PCM link are
                                   function
   fixedly allocated, without the
   traffic concentration function
V5.1 interface                 V5.2 interface



Has not the function of          Has the function of
protecting the communication     protecting the
channels                         communication channels (C
                                 channels)
2. V5 PROTOCOL
    INTRODUCTION

(1)、Basic concepts

(2)、Structure

(3)、layers
1). Basic Concepts
Link: one 2048Kbit/s PCM system in the V5 interface.


Channel:one 64kb/s time slot in a link.
Including B channel and C channel.
Bearer channel (B-channel):
the channel used to carry service


Communication channel ( C channel):
the channel used to carry signaling
logic C channel: Make up of by some protocol. Include
PSTN protocol, BCC protocol, Control protocol, Link control
protocol and protection protocol.

Physical C channel: The V5.2 interface has been allocated the
64Kbit/s time slots used to carry the logic C channel. TS16 is
always as the physical C channel.
Active physical C channel: The physical C channel
currently bearing the logic C channel.


Standby physical C channel: The physical C channel
currently bearing only the protection protocol is used as
the standby channel of the logic C channel carried on the
active physical C channel, that is, it is used to protect the
logic C channel.
 Main link :The link has active physical C channel.


 Sub-link: The link has Standby physical C channel.
Synchronization channel
             Signaling channel
             Bearer channel


Figure(1):Link and Channels
TS0 TS1 TS2               TS15 TS16 TS17         TS30 TS31




TS0 TS1 TS2               TS15 TS16 TS17         TS30 TS31


       Synchronization time slot
       Signaling time slot
       Bearer time slot

              Figure:Time slots allocation of 2M links
Figure: Logic C channel and Physical C channel
2). STRUCTURE Application Layer


                   Data Link Layer


                    Physical Layer


          Figure: Structure model of V5 protocol
Application                       Application
       Layer                             Layer

     Data Link                          Data Link
      Layer            C channel         Layer


      Physical                          Physical
       Layer                             Layer

                       B channel


Figure: PSTN call procedure through V5 interface
Application                      Application
       Layer                            Layer

     Data Link                          Data Link
      Layer                              Layer
                       C channel

       Physical                          Physical
        Layer                             Layer

                        B channel


Figure: ISDN call procedure through V5 interface
3)、Layer function description

A). Physical layer:
 Providing physical transmission channels for all kinds of
messages.
  The physical layer of the V5 interface is composed of
2048Kbit/s links.
TS 15, 16 and 31 of every 2048Kbit/s link can be used as the
physical C channel. The time slots that are not used as the
physical C channels shall be used as B-channels.
B). Data link layer:
 Provide the transmission capability for Layer 3 message and the
data.
Including:LAPV5-EF(Encapsulation Function sub_layer)、
LAPV5-DL(Data link sub_layer)、AN frame relay sub_layer、
Mapping function sub_layer.
ISDN-TE

Q.        PS                                                                              Q.
                                              BCC PS
               Control    Link                                  Link
                         control
                                 protection            control
                                                               control
                                                                       protection   BCC
931       TN                                      TN                                      931
                 LAPV5-DL                                LAPV5-DL                         Q.
                                                                                          921


Q.    P                       Mapping                                  Mapping
          ET/L2
921   S
      T                                          LAPV5-EF
      N

D16               D16
    TE    LC                            C64                                 C64
/64               /64

                         AN frame relay
Explanation
TE:Terminal Equipment
LC:Line Circuit
ET/L2:exchange terminal/Layer 2 functions
D16/64:16kbit/s or 64kbit/s D-channel
C64:64kbit/s communication channel
LAPV5-DL:The data link sub_layer of the V5 interface LAPV5-
EF:The encapsulating function sub_layer of the V5 interface
LAPV5-EF(encapsulation function sub_layer):

  Provide common encapsulation function and disassembling
function to LAPV5-DL frame.

  The end-to-end information exchange of the encapsulating
functions between the AN and the LE is done in the form of
frames.
LAPV5-DL(data link sub_layer):

  Encapsulates the messages from layer 3 into LAPV5-DL
frame;Get out the messages of layer 3 from LAPV5-DL frame.

  The data current in this sub_layer has the following frame
format.
Link addr(high order)                      byte1
     Link addr(low order)                       byte2
     Control                                    byte3
     Control                                    byte4

     Information                                  ….


LAPV5-DL distinguishes different kinds of information
by link address. The link address consists two bytes.
AN frame relay sub_layer:
Accomplishing the frame multiplexing and multiplexing of the
ISDN user ports cooperating with the LAPV5-EF sub_layer.
LAPV5 - DL
From user port to AN:
Getting rid of the head and end labels
and check sequence from the frame and
                                                             Mapping
turn it into AN frame relay. According to
the ISDN user port,it gives the frame an
Efaddr,and then send it to mapping
                                                  AN frame
                                                              LAPV5 - EF
function sub_layer. The mapping                    relay

function sub_layer will map the frame to           D16/64        C64

Ef sublayer in which the frame will be
encapsulated it to LAPV5-EF frame and       ISDN user

sent to V5 communication channel.
C). Application layer

    V5.2 includes 5 protocols.


                             Link
 PSTN        Control                    BCC      Protection
                            control
protocol     protocol                 protocol    protocol
                           protocol
 module      module                   module      module
                           module
A、PSTN protocol:

PSTN protocol provides the procedure relating to specific calls.
it transmits the analog line status information(such as hook off
and hook on ) through the V5 interface.
B、Control protocol
The control protocol of the V5 interface consists of two parts:
common control and user port control.
The common control provides the operations relating to the whole
V5 interface, such as interface start, interface provisioning and the
block/unblock of all the user ports.
The user port control provides the operations relating to only one
port, including all types of ports, such as PSTN user port and
ISDN user port. These ports can be blocked, unblocked, activated
and deactivated.
C、Link control protocol
Fulfilling below functions:
Link status(normal、blocked、out of work)
management,blocking and unblocking the links.
Confirm links at both ends of the interface.(to make sure
whether the links are available).
D、BCC protocol
The BCC protocol controls the allocation and release of the B
channel.
E、protection protocol
The protocol provides the protection program for the

communication path switchover when a fault occurs.
4). V5 signaling procedure in PSTN service
    A).call setup(user of AN originates a call)
User port        AN                          LE
      Off hook             ESTABLISH

                         ESTABLISH ACK

                          ALLOCATION


                 ALLOCATION COMPLETE

                           Dialing tone
B).call release(AN user ends a call)
  User port       AN                       LE
        On hook               SIGNAL

                            DISCONNECT

                          DEALLOCATION

                         DISCONNCET ACK

                       DEALLOCATION COMP

More Related Content

What's hot

E-UTRAN R10/LTE-Advanced Delta
E-UTRAN R10/LTE-Advanced DeltaE-UTRAN R10/LTE-Advanced Delta
E-UTRAN R10/LTE-Advanced DeltaLeliwa
 
Architecture of the lte air interface
Architecture of the lte air interfaceArchitecture of the lte air interface
Architecture of the lte air interfaceEke Okereke
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network TechnologyMohmmad Azam
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010irbas
 
LTE in a Nutshell: Protocol Architecture
LTE in a Nutshell: Protocol ArchitectureLTE in a Nutshell: Protocol Architecture
LTE in a Nutshell: Protocol ArchitectureFrank Rayal
 
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Cemal Ardil
 
LTE Radio Overview: Downlink
LTE Radio Overview: DownlinkLTE Radio Overview: Downlink
LTE Radio Overview: Downlinkaliirfan04
 
Lte x2-handover-sequence-diagram
Lte x2-handover-sequence-diagramLte x2-handover-sequence-diagram
Lte x2-handover-sequence-diagramPrashant Sengar
 
Controller area network (can bus)
Controller area network (can bus)Controller area network (can bus)
Controller area network (can bus)nassim unused
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsShawn Zandi
 

What's hot (20)

E-UTRAN R10/LTE-Advanced Delta
E-UTRAN R10/LTE-Advanced DeltaE-UTRAN R10/LTE-Advanced Delta
E-UTRAN R10/LTE-Advanced Delta
 
Can bus
Can busCan bus
Can bus
 
Network & Internet Working Devices
Network & Internet Working DevicesNetwork & Internet Working Devices
Network & Internet Working Devices
 
Architecture of the lte air interface
Architecture of the lte air interfaceArchitecture of the lte air interface
Architecture of the lte air interface
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network Technology
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
 
LTE in a Nutshell: Protocol Architecture
LTE in a Nutshell: Protocol ArchitectureLTE in a Nutshell: Protocol Architecture
LTE in a Nutshell: Protocol Architecture
 
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
 
Lte mac
Lte macLte mac
Lte mac
 
802 1ad
802 1ad802 1ad
802 1ad
 
Can overview
Can overviewCan overview
Can overview
 
20121120 handover in lte
20121120 handover in lte20121120 handover in lte
20121120 handover in lte
 
Multicast for ipv6
Multicast for ipv6Multicast for ipv6
Multicast for ipv6
 
LTE Radio Overview: Downlink
LTE Radio Overview: DownlinkLTE Radio Overview: Downlink
LTE Radio Overview: Downlink
 
Cs8591 qb
Cs8591 qbCs8591 qb
Cs8591 qb
 
Lte x2-handover-sequence-diagram
Lte x2-handover-sequence-diagramLte x2-handover-sequence-diagram
Lte x2-handover-sequence-diagram
 
Controller area network (can bus)
Controller area network (can bus)Controller area network (can bus)
Controller area network (can bus)
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 

Similar to V5 protocol English

sdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.pptsdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.pptabanoubsamir97
 
Demystifying extended distance ficon, por Stephen R. Guendert
Demystifying extended distance ficon, por Stephen R. GuendertDemystifying extended distance ficon, por Stephen R. Guendert
Demystifying extended distance ficon, por Stephen R. GuendertJoao Galdino Mello de Souza
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
AMTELCO RED ALERT AVAYA Integration
AMTELCO RED ALERT AVAYA Integration AMTELCO RED ALERT AVAYA Integration
AMTELCO RED ALERT AVAYA Integration AMTELCO
 
VXLAN Distributed Service Node
VXLAN Distributed Service NodeVXLAN Distributed Service Node
VXLAN Distributed Service NodeDavid Lapsley
 
Vehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkVehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkIRJET Journal
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction東原 李
 
Digital video broadcasting second generationq
Digital video broadcasting second generationqDigital video broadcasting second generationq
Digital video broadcasting second generationqSusmita Pandey
 
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUES
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUESLTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUES
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systemsEngin Karabulut
 
Signaling atm adaption layer
Signaling atm adaption layerSignaling atm adaption layer
Signaling atm adaption layersemcug
 
ABIS-interface
ABIS-interfaceABIS-interface
ABIS-interfaceKaTaNHou1
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010irbas
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalLeoo Romo
 

Similar to V5 protocol English (20)

Frame2
Frame2Frame2
Frame2
 
sdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.pptsdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.ppt
 
SDH BASICS
SDH BASICSSDH BASICS
SDH BASICS
 
Lecture24
Lecture24Lecture24
Lecture24
 
Demystifying extended distance ficon, por Stephen R. Guendert
Demystifying extended distance ficon, por Stephen R. GuendertDemystifying extended distance ficon, por Stephen R. Guendert
Demystifying extended distance ficon, por Stephen R. Guendert
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
AMTELCO RED ALERT AVAYA Integration
AMTELCO RED ALERT AVAYA Integration AMTELCO RED ALERT AVAYA Integration
AMTELCO RED ALERT AVAYA Integration
 
VXLAN Distributed Service Node
VXLAN Distributed Service NodeVXLAN Distributed Service Node
VXLAN Distributed Service Node
 
Vehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area NetworkVehicle Automation Using Controller Area Network
Vehicle Automation Using Controller Area Network
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Digital video broadcasting second generationq
Digital video broadcasting second generationqDigital video broadcasting second generationq
Digital video broadcasting second generationq
 
San 2
San 2San 2
San 2
 
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUES
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUESLTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUES
LTE-Network-Planning-Huawei-Technologies EMERSON EDUARDO RODRIGUES
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systems
 
Signaling atm adaption layer
Signaling atm adaption layerSignaling atm adaption layer
Signaling atm adaption layer
 
ABIS-interface
ABIS-interfaceABIS-interface
ABIS-interface
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
Cn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_finalCn instructor ppt_chapter4_final
Cn instructor ppt_chapter4_final
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

V5 protocol English

  • 2.  1. Overview  2. V5 Protocol Introduction  3. hardware configuration  4. data configuration
  • 3. 1. OVERVIEW 1). V Interface  The digital interface between the access network and the switch,including V1、V2、V3、V4、V5。
  • 4. 2). The limitation of the V1~V4 interfaces. V1 to V4 interfaces don’t support integrated access. And the more important is : V1 to V4 are all not standard interfaces, which hampers the development and use of the V interfaces.
  • 5. 3).THE FEATURE OF V5 the V5 interfaces are more open and standard, and it has the ability of integrated access.
  • 6. 4).SERVICES SUPPORTED BY DIFFERENT V INTERFACES  V1 interface ISDN BRA(2B+D) access  V2 interface 2Mb/s、8Mb/s access  V3 interface ISDN PRA(30B+D) access  V4 interface Multiple 2B+D access  V5 interface ISDN/PSTN integrated access
  • 7. 5)、COMPARISON BETWEEN V5.1 INTERFACE AND V5.2 V5.1 interface  V5.2 interface Support a PCM link Support 1-16 PCM links Dynamic time slot allocation and have the The time slots at the user port traffic concentration and on the PCM link are function fixedly allocated, without the traffic concentration function
  • 8. V5.1 interface  V5.2 interface Has not the function of Has the function of protecting the communication protecting the channels communication channels (C channels)
  • 9. 2. V5 PROTOCOL INTRODUCTION (1)、Basic concepts (2)、Structure (3)、layers
  • 10. 1). Basic Concepts Link: one 2048Kbit/s PCM system in the V5 interface. Channel:one 64kb/s time slot in a link. Including B channel and C channel.
  • 11. Bearer channel (B-channel): the channel used to carry service Communication channel ( C channel): the channel used to carry signaling
  • 12. logic C channel: Make up of by some protocol. Include PSTN protocol, BCC protocol, Control protocol, Link control protocol and protection protocol. Physical C channel: The V5.2 interface has been allocated the 64Kbit/s time slots used to carry the logic C channel. TS16 is always as the physical C channel.
  • 13. Active physical C channel: The physical C channel currently bearing the logic C channel. Standby physical C channel: The physical C channel currently bearing only the protection protocol is used as the standby channel of the logic C channel carried on the active physical C channel, that is, it is used to protect the logic C channel.
  • 14.  Main link :The link has active physical C channel.  Sub-link: The link has Standby physical C channel.
  • 15. Synchronization channel Signaling channel Bearer channel Figure(1):Link and Channels
  • 16. TS0 TS1 TS2 TS15 TS16 TS17 TS30 TS31 TS0 TS1 TS2 TS15 TS16 TS17 TS30 TS31 Synchronization time slot Signaling time slot Bearer time slot Figure:Time slots allocation of 2M links
  • 17. Figure: Logic C channel and Physical C channel
  • 18. 2). STRUCTURE Application Layer Data Link Layer Physical Layer Figure: Structure model of V5 protocol
  • 19. Application Application Layer Layer Data Link Data Link Layer C channel Layer Physical Physical Layer Layer B channel Figure: PSTN call procedure through V5 interface
  • 20. Application Application Layer Layer Data Link Data Link Layer Layer C channel Physical Physical Layer Layer B channel Figure: ISDN call procedure through V5 interface
  • 21. 3)、Layer function description A). Physical layer: Providing physical transmission channels for all kinds of messages. The physical layer of the V5 interface is composed of 2048Kbit/s links.
  • 22. TS 15, 16 and 31 of every 2048Kbit/s link can be used as the physical C channel. The time slots that are not used as the physical C channels shall be used as B-channels.
  • 23. B). Data link layer: Provide the transmission capability for Layer 3 message and the data. Including:LAPV5-EF(Encapsulation Function sub_layer)、 LAPV5-DL(Data link sub_layer)、AN frame relay sub_layer、 Mapping function sub_layer.
  • 24. ISDN-TE Q. PS Q. BCC PS Control Link Link control protection control control protection BCC 931 TN TN 931 LAPV5-DL LAPV5-DL Q. 921 Q. P Mapping Mapping ET/L2 921 S T LAPV5-EF N D16 D16 TE LC C64 C64 /64 /64 AN frame relay
  • 25. Explanation TE:Terminal Equipment LC:Line Circuit ET/L2:exchange terminal/Layer 2 functions D16/64:16kbit/s or 64kbit/s D-channel C64:64kbit/s communication channel LAPV5-DL:The data link sub_layer of the V5 interface LAPV5- EF:The encapsulating function sub_layer of the V5 interface
  • 26. LAPV5-EF(encapsulation function sub_layer): Provide common encapsulation function and disassembling function to LAPV5-DL frame. The end-to-end information exchange of the encapsulating functions between the AN and the LE is done in the form of frames.
  • 27. LAPV5-DL(data link sub_layer): Encapsulates the messages from layer 3 into LAPV5-DL frame;Get out the messages of layer 3 from LAPV5-DL frame. The data current in this sub_layer has the following frame format.
  • 28. Link addr(high order) byte1 Link addr(low order) byte2 Control byte3 Control byte4 Information …. LAPV5-DL distinguishes different kinds of information by link address. The link address consists two bytes.
  • 29. AN frame relay sub_layer: Accomplishing the frame multiplexing and multiplexing of the ISDN user ports cooperating with the LAPV5-EF sub_layer.
  • 30. LAPV5 - DL From user port to AN: Getting rid of the head and end labels and check sequence from the frame and Mapping turn it into AN frame relay. According to the ISDN user port,it gives the frame an Efaddr,and then send it to mapping AN frame LAPV5 - EF function sub_layer. The mapping relay function sub_layer will map the frame to D16/64 C64 Ef sublayer in which the frame will be encapsulated it to LAPV5-EF frame and ISDN user sent to V5 communication channel.
  • 31. C). Application layer V5.2 includes 5 protocols. Link PSTN Control BCC Protection control protocol protocol protocol protocol protocol module module module module module
  • 32. A、PSTN protocol: PSTN protocol provides the procedure relating to specific calls. it transmits the analog line status information(such as hook off and hook on ) through the V5 interface.
  • 33. B、Control protocol The control protocol of the V5 interface consists of two parts: common control and user port control. The common control provides the operations relating to the whole V5 interface, such as interface start, interface provisioning and the block/unblock of all the user ports.
  • 34. The user port control provides the operations relating to only one port, including all types of ports, such as PSTN user port and ISDN user port. These ports can be blocked, unblocked, activated and deactivated.
  • 35. C、Link control protocol Fulfilling below functions: Link status(normal、blocked、out of work) management,blocking and unblocking the links. Confirm links at both ends of the interface.(to make sure whether the links are available).
  • 36. D、BCC protocol The BCC protocol controls the allocation and release of the B channel.
  • 37. E、protection protocol The protocol provides the protection program for the communication path switchover when a fault occurs.
  • 38. 4). V5 signaling procedure in PSTN service A).call setup(user of AN originates a call) User port AN LE Off hook ESTABLISH ESTABLISH ACK ALLOCATION ALLOCATION COMPLETE Dialing tone
  • 39. B).call release(AN user ends a call) User port AN LE On hook SIGNAL DISCONNECT DEALLOCATION DISCONNCET ACK DEALLOCATION COMP