17.05.2015 Views

~ National ~ Semiconductor - Al Kossow's Bitsavers

~ National ~ Semiconductor - Al Kossow's Bitsavers

~ National ~ Semiconductor - Al Kossow's Bitsavers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

0.-------------------------------------------------------------~<br />

C<br />

o<br />

:;::::;<br />

·c<br />

~<br />

z<br />

c<br />

~<br />

L T -Line Termination<br />

Typically, the L T consists of the "U" interface tranceiver<br />

and power feeding functions on the ISDN line card. These<br />

functions must interface to the switch at the "V" reference<br />

point, which is not currently being standardized by CCITI. It<br />

could be a proprietary backplane interface or a nationally<br />

specified interface which would allow the L T to be physically<br />

and electrically separated from the switch.<br />

ISO Layered Protocol Model<br />

The ISO (International Standards Organization) has defined<br />

a 7 layer model structure which describes convenient break<br />

pOints between various parts of the hardware and software<br />

in any data communications system.<br />

Layer 1: Physical layer, that is the hardware which transports<br />

bits across interfaces. This includes ISDN transceivers,<br />

modems etc., power supplies, methods of activating<br />

and de-activating a transmission link, and also the transmission<br />

medium itself, such as wire, fiber, plugs and sockets,<br />

etc.<br />

Layer 2: Data Link layer, which describes a basic framing<br />

structure and bit assignments to enable higher layer messages<br />

to be passed across a physical link. HOLC framing,<br />

addressing and error control are the major elements of this<br />

layer in ISDN.<br />

Layer 3: Network layer, that is those parts of a message<br />

associated with setting-up, controlling and tearing-down a<br />

call through the network. These are all software control<br />

functions, and generally this is the highest layer in the ISO<br />

protocol model which is considered in chip development.<br />

The top 4 layers relate to the structure of the actual application<br />

programs;<br />

Layer 4: Transport layer, concerned with defining sources<br />

and destinations within an operating system for the transfer<br />

of application programs.<br />

Layer 5: Session layer.<br />

Layer 6: Presentation layer.<br />

Layer 7: Application layer.<br />

These layers are generally running on a high level machine,<br />

and discussion regarding this machine is outside the scope<br />

of this document.<br />

LAPD<br />

Link Access Protocol in the "0" channel is the name given<br />

to the packet-mode Signaling protocol defined in CCITI<br />

specs 0920 and 0921 for the data link layer (layer 2) and<br />

0930 and 0931 for the network layer (layer 3 in the ISO 7<br />

layer reference model). At layer 2, LAPO uses the HOLC<br />

framing format. This protocol defines the bits, bytes and sequence<br />

of states necessary between the user and the network<br />

to establish, control and terminate calls using any of<br />

the 100 or more types of services which may be available<br />

via an ISDN. If the users at both ends of the call are connected<br />

to the ISDN and there is a through path for the 0<br />

channel then end-to-end call control is available.<br />

Because of this extensive range of services, implementation<br />

of full LAPO requires considerable memory and processing<br />

power. Standards work has recently focused on definition of<br />

a minimal subset of LAPO to cover the basic requirements<br />

of call control.<br />

Activation/De-activation<br />

Activation is the process of powering up the'S' and 'U'<br />

interfaces from their standby (i.e. de-activated) states and<br />

sending specific signals across the interfaces to get the<br />

whole loop synchronized to the network. A small state machine<br />

in each TE and the NT controls this sequence of<br />

events, and uses timers to ensure that, if the activation attempt<br />

should fail for any reason, the user or network is alerted.<br />

At the end of a call an orderly exit from the network is<br />

effected by sending de-activation sequences before any<br />

equipment can power-down.<br />

3-14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!