Beruflich Dokumente
Kultur Dokumente
Voice channel
Advantages of out-of-band Signaling
F
OSI MODEL SS7 PROTOCOL MODEL
• Signaling data link is the bidirectional
transmission path for signaling.
00 0 Out of alignment
101 Busy
INPUTS
• Packets send=70
• C1=50
• C2=40
• C3=39
GRAPH FOR LEAKY BUCKET ALGORITHM
80
70
60
PACKETS DELIVERED
Desirable
40
Congested
30
20
10
0
0 10 20 30 40 50 60 70 80
PACKETS SEND
• The implementation of leaky bucket algorithm is
preformed in the network layer of signaling
system 7 protocols and uses routers.
INPUTS
• Packets send=70
• C1=50
• C2=40
• C3=39
• B1=20
• B2=18
• B3=17
GRAPH FOR TOKEN BUCKET ALGORITHM
80
70
Max buffer Desirable buffer
60
congested buffer
PACKETS DELIVERED
50
40
30
20
10
0
0 10 20 30 40 50 60 70 80
PACKETS SEND
PERFORMANCE OF LEAKY BUCKET ALGORITHM WHEN
PACKETS WHERE SEND ACROSS THE ROUTER (CASE 2)
INPUTS
• Packets send=80
• C1=60
• C2=50
• C3=49
G R A P H F O R L E A K Y B U C K E T A L G O R IT H M
1 0 0
9 0
8 0
7 0
M a x im u m c a rry in g c a p a c it y o f ro u t e r
6 0
P A C K E T S D E LIV E R E D
D e s ira b le
5 0
4 0 C o n g e s te d
3 0
2 0
1 0
0
PERFORMANCES OF TOKEN BUCKET ALGORITHM OVER
THE LEAKY BUCKET ALGORITHM FOR SAME PACKETS
SEND(CASE 2)
INPUTS
• Packets send=80
• C1=60
• C2=50
• C3=50
• B1=20
• B2=18
• B3=17
GRAPH FOR TOKEN BUCKET ALGORITHM
100
90
80
70
PACKETS DELIVERED
40
30
20
10
0
0 10 20 30 40 50 60 70 80 90 100
PACKETS SEND
PERFORMANCE OF LEAKY BUCKET ALGORITHM
WHEN PACKETS WHERE SEND ACROSS THE
ROUTER (CASE 3)
• Packets send=100
• C1=80
• C2=70
• C3=69
GRAPH FOR LEAKY BUCKET ALGORITHM
120
100
80
Desirable
60
40 Congested
20
0
0 20 40 60 80 100 120
PACKETS SEND
PERFORMANCES OF TOKEN BUCKET
ALGORITHM OVER THE LEAKY BUCKET
ALGORITHM FOR SAME PACKETS SEND (CASE3)
• Packets send=80
• C1=60
• C2=50
• C3=50
• B1=20
• B2=18
• B3=17
GRAPH FOR TOKEN BUCKET ALGORITHM
100
90
80
70
PACKETS DELIVERED
60
congested buffer
50
40
30
20
10
0
0 10 20 30 40 50 60 70 80 90 100
PACKETS SEND
PERFORMANCE OF LEAKY BUCKET
ALGORITHM WHEN PACKETS WHERE
SEND ACROSS THE ROUTER (CASE 4)
INPUTS
• Packets send=69
• C1=49
• C2=39
• C3=38
GRAPH FOR LEAKY BUCKET ALGORITHM
80
70
60
PACKETS DELIVERED
Desirable
40
Congested
30
20
10
0
0 10 20 30 40 50 60 70 80
PACKETS SEND
PERFORMANCES OF TOKEN BUCKET
ALGORITHM OVER THE LEAKY BUCKET
ALGORITHM FOR SAME PACKETS SEND(CASE 4)
INPUTS
• Packets send=69
• C1=49
• C2=39
• C3=38
• B1=19
• B2=18
• B3=17
GRAPH FOR TOKEN BUCKET ALGORITHM
80
70
Max buffer Desirable buffer
60
congested buffer
PACKETS DELIVERED
50
40
30
20
10
0
0 10 20 30 40 50 60 70 80
PACKETS SEND
• IMPLEMENTATION OF ESTABLISHING THE CONNECTION
BETWEEN INTERNATIONAL NETWORK AND TELEPHONE
USER
• enter ck=16
• enter inflag=8
• enter oflag=8
• Fsn=4
• Bsn=4
• Li=3
• Input a, b, c, d= [1111]
• Input a1, b1, c1, d1= [1111]
• A=3
• A1=3
• f3bits=111
• Sei in bits=[0100]
• Sif input=300
Signaling data link, signaling link is established with
international network connected to telephone user part
• IMPLEMENTATION OF ESTABLISHING THE CONNECTION
BETWEEN NATIONAL NETWORK AND TELEPHONE USER
• enter ck=16
• enter inflag=8
• enter oflag=8
• Fsn=4
• Bsn=4
• Li=3
• Input a, b, c, d= [1111]
• Input a1, b1, c1, d1= [1111]
• A=3
• A1=3
• F3bits=111
• Sei in bits=[0100]
• Sif input=270
Signaling data link, signaling link is established with national
network connected to telephone user part
• IMPLEMENTATION OF ESTABLISHING THE CONNECTION
BETWEEN NATIONAL NETWORK AND TELEPHONE USER
• enter ck=16
• enter inflag=8
• enter oflag=8
• Fsn=3
• Bsn=3
• Li=0
• Input a, b, c, d=[1111]
• Input a1, b1, c1, d1=[1111]
• A=3
• A1=3
• f3bits=111
• sei in bits=[0100]
• sif input=270
Fill in signal unit is ready
As the length indicator (Li) is 0, the signal unit is empty and
requires to be filled by message signal unit.
• IMPLEMENTATION OF ESTABLISHING THE CONNECTION
BETWEEN NATIONAL NETWORK AND TELEPHONE USER
• enter ck=16
• enter inflag=8
• enter oflag=8
• Fsn=3
• Bsn=3
• Li=2
• Input a, b, c, d=[1111]
• Input a1, b1, c1, d1=[1111]
• A=3
• A1=3
• f3bits=001
• sei in bits=[0100]
• sif input=270
Link status signal unit is being operated as the length indicator
is 2 and decides which type of alignment is to be done
depending on first 3bits .
REFERENCES
1. Andrew s. Tanenbaum. “Computer networks “,
4th edition Pearson education 2001
2. Pankaj Arora, G.S.M. Mobile Report by, HTML
Document
3. T.S.Rappaport, Wireless communications
principles and practices, Pearson education,
second edition, 1999.
4. Vijay K.Garg &Joseph E.Wilkes,” Principles &
Applications of GSM”, Pearson
education, First edition,1999.
5. Rudra pratap ”getting started with Mat lab”,
6. HTML document, Token bucket algorithm
7. Neda document 105-101-05” signaling system 7
applications and over view”
8. Bellcore, “Advanced Intelligent Network (AIN)
Release 1 Switching system Generic
Requirements”, August 1997
9. Buchnan, K., et al.,”IMT-2000: Service providers
Perspective,”IEEE personal
Communications, August 1997.
10.Leite, F., et., “Regulatory considerations Relating
to IMT-2000,”IEEEpersonal Communications,
August1997.
11.Pandya, R., et al., “IMT-2000 Standards: Network
Aspects,”IEEE Personal Communications,
August 1997.
12.Carsello, R.D.,et al., “IMT-2000 Standards:
Network Aspects,”IEEE personal
Communations,August 1997