Upload
tranbaho1987
View
223
Download
0
Embed Size (px)
Citation preview
7/30/2019 Cisco Press - Design and Implementation of DSL
1/229
Mr. Bad Example
7/30/2019 Cisco Press - Design and Implementation of DSL
2/229
Mr. Bad Example
Design and Implementation
of DSL-Based AccessSolutions
Design and Implementation of DSL-Based Access Solutions addresses variousarchitectures for DSL-based networks. It focuses on how to design and implement an
end-to-end solution for service providers, considering various business models suchas retail, wholesale, VPN, etc.
This book depicts the different architectures, and helps you understand the keydesign principles in deploying them. It covers both access encapsulations such asbridging, PPPoA, PPPoE, and routing, as well as core architectures such as IP, L2TP,
MPLS/VPN, and ATM. Because it focuses on end-to-end solutions, Design andImplementation of DSL-Based Access Solutions talks about how to do massprovisioning of subscribers and how to manage networks in the most efficient way. Italso includes discussions of real-life deployments, their design-related issues, and
their implementation.
7/30/2019 Cisco Press - Design and Implementation of DSL
3/229
Mr. Bad Example
About the Authors
Sanjeev Mervana, CCIE #4006, has over 10 years of experience in networkingand has been with Cisco Systems since 1998. A CCIE since 1998, Sanjeev was theTechnical Leader in the Customer Support Organization at Cisco for resolving
complex networking issues before moving to the Technical Marketing Group. Sincejoining the Technical Marketing Group, Sanjeev has established a lead in definingbroadband architectures for customers and has published several service architecture
papers internally to Cisco as well as for customers. His primary job involves him inarchitectural discussions with leading service providers to offer various value-addservices. Sanjeev has been a key contributor and instrumental in defining some of
the requirements for next-generation products at the edge of the network.
Chris Le, CCIE #5235, is a Technical Marketing Engineer for the Service ProviderLine of Business for Cisco Systems. Chris has provided DSL internetworking design,
implementation, and performance engineering to several service providers. He hasworked extensively on design and implementation in the IP aggregation space and
has provided training to engineers on leased-line and broadband aggregation.
7/30/2019 Cisco Press - Design and Implementation of DSL
4/229
Mr. Bad Example
About the Technical Reviewers
Kumar Reddy is Manager of Technical Marketing at Cisco Systems. Kumar hasauthored a number of technical papers and presentations for both internal andcustomer audiences in the area of broadband aggregation and is a regular technical
presenter and trainer at Cisco events. He works extensively with Cisco customersand pre-sales teams on service architectures and deployments for IP accessnetworks. Prior to joining Cisco, Kumar worked in Paris, teaching and developing
network protocols and software.
Jay Thontakudi is a Technical Marketing Engineer with Cisco, working in the fieldon architectural design, network migration, and issues related to DSL. He has been
with Cisco since 1999. Jay's prior experience includes nine years in the oil andnatural gas industry with job functions in project engineering, process controlnetworks, and enterprise networking. Jay holds a masters degrees in computer
science and mechanical engineering.
Brian Melzer, CCIE #3981, is an Internetwork Solutions Engineer for ThruPoint,Inc., out of its Raleigh office. He has worked as a consultant for ThruPoint since
September 2000. Thrupoint is a global networking services firm and one of the fewcompanies selected as a Cisco System Strategic Partner. Before working forThrupoint he spent five years working for AT&T Solutions on the design and
management of outsourcing deals involving Fortune 500 clients. As a member of theWolfpack, Brian received his undergraduate degree in electrical engineering and hismasters degree in management at North Carolina State University.
7/30/2019 Cisco Press - Design and Implementation of DSL
5/229
Mr. Bad Example
Acknowledgments
We would like to thank Stephane Lamarre first for encouraging us with writing DSLarchitecture white papers that were the basis and inspiration for this book. Thanks toCharles Ford with his expertise in DSL and to Jay Thontakudi for his expertise in IP
DSL switching. Special thanks to Kumar Reddy and Jay for their dedication inreviewing the book, for their constructive suggestions and criticisms, and for keepingus honest.
Our thanks also go to John Kane and Christopher Cleveland from Cisco Press whoassisted us with producing this book and believed in our ideas.
Last but not least, we'd like to thank our Technical Marketing Engineer colleagueswhom we learned so much from and made our work much more enjoyable.
7/30/2019 Cisco Press - Design and Implementation of DSL
6/229
Mr. Bad Example
Introduction
This book is aimed at network engineers who need to have an understanding of DSLtechnology and how it is deployed in real networks today. Some backgroundinformation is provided so that readers can appreciate the problems that DSL can
solve and understand some of the challenges still ahead. Readers need to know basicIP operation in order to easily grasp the concept of different ATM encapsulationsoften used in this book. Although not required, knowledge of dial-up networks may
help readers breeze through the encapsulation portion of this book because the sametechnology used in dial-up networks is also used in DSL aggregation.
Not only network engineers can benefit from this book. Network designers can also
enjoy reading the case studies and the pros and cons of each of the encapsulationmethods. Case studies are provided with in-depth discussion of severalimplementation options, from a small DSL network to a large network supporting
millions of subscribers.
Motivation for the Book
There are many books available in the market today that explain how DSL works atLayer 1, its modulation techniques, and so forth. There are also certain books thatcover some of the access encapsulations briefly. What we couldn't find when westarted working on this book was clear understanding of various architectures, when
to deploy a certain architecture, and what the implications were if we deployed thosearchitectures. There are several service providers out there today with DSL networksranging from very small ones to ones that support millions of customers. The lessons
learned from those deployments in addition to various proof-of-concept labs andperformance tests done in-house will help readers understand and implement thosearchitectures.
Goals of the Book
The purpose of this book is to get the readers more familiar with various DSL accessand core architectures and how they are implemented. By presenting readers with
real-life deployment scenarios and case studies, the book helps readers understandthe pitfalls and benefits of DSL architecture and apply those principles whendesigning and deploying their own DSL networks. The in-depth sections on DSL
architectures will also help you to understand different encapsulation methods usedin networks today.
How This Book Is Organized
Chapter 1 takes you back to the time when 300-baud modem was the onlyaccess technology available to consumers. It covers the progress in access
networks for the last 15 to 20 years and gets you to appreciate how far alongwe've come in bringing high-speed access home to consumers.
7/30/2019 Cisco Press - Design and Implementation of DSL
7/229
Mr. Bad Example
This chapter also discusses the basic building block for telephone networks,which is a DS-0, and the frequency it operates on. Other follow-on access
technologies such as ISDN still did not solve the problem of overloading thePublic Switched Telephone Network (PSTN), leading to the adoption of DSL asthe access technology of choice for phone companies.
Chapter 2 introduces the different flavors of DSL along with the advantagesand disadvantages of each flavor. This chapter looks at Layer 1 designconsiderations, such as copper loop issues, noise margin, and reach, and
what can be done in the DSLAMs and in the Central Office (CO) to resolvethose problems. This chapter also addresses the protocols running over DSLATM and Frame Relayshowing why ATM dominates most, if not all, ADSL
deployments today. Chapter 3 covers DSL functional segments and responsibilities and where the
demarcations end. Companies that own the copper loop are traditionally the
sole provider for both voice and data running over that same copper loop, butbecause of government deregulation, other companies can move in and leasethose lines from the phone companies and offer data to their customers. This
is followed by the services offered by wholesale and retail ISPs. Chapter 4 focuses on the encapsulation methods of subscriber ATM VCs.
PPPoA, PPPoE, RFC 1483 bridge, RFC 1483 routed, and RBE are some of the
encapsulations discussed in detail. The chapter addresses the advantages,disadvantages, and design considerations for customer premises equipment(CPE), aggregation devices, and ATM switches for each encapsulation method.
Coverage also includes the different methods of carrying subscribers data tothe ISP and corporate home gateways, such as L2TP, Service SelectionGateway (SSG), and MPLS.
Chapter 5 is an exciting chapter that presents you with real-life DSLdeployment scenarios. This chapter includes four case studies, ranging from afew hundred thousand subscribers to millions of subscribers with downloadspeeds ranging from 384 kbps to 4 Mbps. All elements of DSL are considered
and calculated including the number of subscribers per DSLAMs, the numberof DSLAMs per CO, the number of ATM switches, and the number ofaggregation devices. When scaling the network, these and other elements
need to be closely examined. In addition to the wealth of practical informationin these case studies, you will also have a chance to look at the migrationpath and scaling up of networks to support a much larger number of
subscribers. Chapter 6 provides an overview of the provisioning model today, which
involves a lot of manual steps in order to roll out a new DSL line. To achieve
the goal of installing one million DSL lines that some service providers haveset, there has to be a better way to automatically provision these linesquickly.
This chapter provides an overview of the flowthrough provisioning conceptand Cisco Element Manager Framework, and how each Element Manager tiesinto the framework that integrates into the existing service provisioning
applications. With the right tools, a line can be tested and provisionedautomatically, and the CPE will have its images and configurationsdownloaded, and other elements in the network will also have the appropriate
configurations downloaded to it automatically.
7/30/2019 Cisco Press - Design and Implementation of DSL
8/229
Mr. Bad Example
Icons Used in This Book
Command Syntax Conventions
The conventions used to present command syntax in this book are the sameconventions used in the IOS Command Reference. The Command Reference
describes these conventions as follows:
Vertical bars (|) separate alternative, mutually exclusive elements. Square brackets [ ] indicate optional elements. Braces { } indicate a required choice. Braces within brackets [{ }] indicate a required choice within an optional
element. Boldface indicates commands and keywords that are entered literally as
shown. In actual configuration examples and output (not general commandsyntax), boldface indicates commands that are manually input by the user
(such as a show command). Italics indicate arguments for which you supply actual values
7/30/2019 Cisco Press - Design and Implementation of DSL
9/229
Mr. Bad Example
Chapter 1. History of Remote AccessTechnology
This chapter covers the following key topics:
History of Remote Access Technology A brief history of the remote accesstechnology and its evolution from analog to digital.
The World of Analog Earlier applications that used analog modems weremainly text-based, but with the explosion of the Internet and its graphicalapplications, analog modem has put a tremendous burden on the PublicSwitched Telephone Network (PSTN).
ISDN ISDN was supposed to be the next big thing, replacing analogmodems; however, because telcos failed to push the technology and investmore upfront for a long-term, rather than a short-term financial gain, the
technology failed to take off. ADSL Comes of Age A brief history of ADSL and its adoption by different
phone companies. Each phone company chose a different ADSL vendor, whilea few ganged up to form a Joint Procurement Contract and together chose
one vendor to supply them with ADSL equipment. ADSL Benefits ADSL offered some of the benefits that analog modems and
ISDN were never able to offer. High-speed access, always-on, offload data
from the voice network, and so much more, are the main reasons everyphone company today is pushing the technology.
Applications That Drive High-Speed Access High-speed access applicationssuch as Voice over IP (VoIP) and video on demand (VoD) enable phonecompanies the possiblity for additional revenues over their existing copperwire infrastructure.
Remember back when a 300 baud modem was the fastest access technology thatyou could get your hands on. And when 2400 baud came out, you thought modemspeed could not get any faster? As encoding algorithms continue to improve and
telephone lines have become cleaner of electrical interference, analog modem speedhas improved greatly with the latest V.90 standard capable of 56 kbps of datatransfer.
In today's digital age, inexpensive cameras that are available in a neighborhoodelectronic store can store images in a digital format, music we listen to is stored
digitally on CDs, and movies are encoded into digital format and stored on DVDs.
The recent MP3 format for music and MPEG-2 for movies have ignited a series oflawsuits from recording and movie studios. Music can be encoded in a digital format
small enough to be shared among friends. It doesn't matter how many times thesong has been copied, the quality of the song doesn't decrease. What worries therecording studios and music labels even more is that these songs are easily
accessible by anyone that has a connection to the Internet.
When it comes to remote access, we are still using decade old technology to transmitthese digital files over analog phone lines. We spent so much time and energy
7/30/2019 Cisco Press - Design and Implementation of DSL
10/229
Mr. Bad Example
building faster computers and digitizing everything from music, voice, and movies,that there has not been much improvement when it comes to access technology.
There have been attempts to bring faster access speed to consumers in the past,each with various degree of success. The most popular broadband accesstechnologies today are cable modems and digital subscriber lines (DSL), with
wireless gaining more popularity. Although each technology has its advantages anddrawbacks, DSL seems promising because it is backed by virtually all phonecompanies, plus the technology has room to grow.
This chapter will cover the history of remote access including analog modem andIntegrated Services Digital Network (ISDN), and the problems that led to the
adoption of DSL by major telephone companies as the next method of remoteaccess.
The World of Analog
Earlier applications that used analog modem involved text-based applications. Theseapplications were mainly used by corporations who had a need for employees orvendors to access and use a corporate database. Digital bits and bytes from the PC
applications are converted into analog waves by analog modems. Those analogwaves then are transmitted through a Public Switched Telephone Network (PSTN).These waves are received by another modem, which in turn converts these signals
into digital bits and bytes that the far-end (receiving) computer can understand.Figure 1-1 illustrates how the signals are converted from one PC to another fromdigital to analog and then back again to digital.
Fi g u r e 1 - 1 . Si g n a l Co n v e r s i o n B e t w e e n T w o Com p u t e r s U s i n g
A n a l o g M o d em s
Because early applications were mainly text-based and early computers were
relatively slow, low-speed modems were not a big issue. A person from their homewould dial in to a computer, and once a session was established, users would send a
couple of keystrokes to the mainframe asking it to do a series of computations. Aftersome time, the mainframe would then display the result of the operation back to theuser, one screen of text at a time. As you can see, there's not much need for a high-speed connection because the majority of the time is spent waiting for themainframe to finish its jobs. Remote access was limited to a very small group of
scientists and engineers involved with number crunching and other mathematicalapplications, and only the final result of the computations were of any interest to theend user.
7/30/2019 Cisco Press - Design and Implementation of DSL
11/229
Mr. Bad Example
When multimedia intensive applications, such as the World Wide Web, began to takeoff, there was an obvious need for remote access speed to improve. Over time,
modem speed has become faster with better modulation/demodulation algorithmsand cleaner copper wires from the Central Office (CO) to your residence. Modemspeed has been able to improve from 300 bps to 1200 bps to 9600 bps. With clever
engineering, modem speed has achieved 56 kbps. But as with most technologies,
there is an upper limit of how fast modem speed can go. With the 56-kbps modemtechnology, we are hitting the upper limit of analog technology, and 56 kbps is the
highest analog speed that we will be able to achieve over the existing copper wiresused to carry voice. Due to the modem limitation, alternative technologies, such asbroadband access technologies, are needed that allow subscribers to access the
Internet at a much higher speed.
Telephone companies had been converting their analog switches to digital fordecades. That along with digital phone switches comes Integrated Services Digital
Network (ISDN), which is supposed to solve the digital to analog back to digitalconversion problem. ISDN enables much faster access speeds. With ISDN, voice anddata can be offered simultaneously over the same pair of copper wiring. A channel is
available for voice and another channel for data. When the voice channel is not inuse, ISDN equipment can use both channels to achieve speeds up to 128 kbps. ISDNwas offered around the time when modem speed was at 9600 bps, making it
attractive to users who demanded high-speed access. Figure 1-2 illustrates theconcept of 2 B channels used in both voice and data.
Fi g u r e 1 - 2 . V o ic e a n d D a t a O v e r t h e Sam e I S D N Li n e
ISDNISDN brings some relief to the speed limitations of analog modems by offering speedup to 1.5 Mbps for Primary Rate Interface (PRI), or a more commonly used rate that
is offered by most phone companies, the Basic Rate Interface (BRI). BRI offers speedup to 128 kbps, significantly faster than traditional analog speed.
7/30/2019 Cisco Press - Design and Implementation of DSL
12/229
Mr. Bad Example
So what makes ISDN able to achieve such high speeds that analog modems can't?To fully understand the difference between analog modems and ISDN, we need to
take a look at how voice is encoded into a digital signal level 0 (DS-0) channel.
To convert an analog voice into digital signal, the required sampling rate is 8000samples per second; therefore, 8 bits are needed to represent each sample.
Therefore, the bandwidth needed is 8000 * 8 = 64,000 bits per second, which iscalled a DS-0 channel. A traditional analog line runs over a DS-0 channel and has 64kbps of total bandwidth. Out of this total bandwidth, 8 kbps is taken out for
telephone signaling, leaving 56 kbps for voice calls. The services that are run overthe 8-kbps channel are necessary for your phone to ring. That's where caller IDinformation is sent, plus other maintenance services so that the telephone switch
knows when you have hung up your call and to stop billing you. This method is calledin-band signaling, or robbed bit signaling, because an 8 kb chunk is taken out, orrobbed out of the original 64 kbps for signaling. If digital signals are converted into
analog and back to digital again, only 56 kbps worth of bandwidth is available to doit in, so this is where the 56-kbps limitation in analog modems comes in. Figure 1-3illustrates the breakdown in robbed bit signaling.
Fi g u r e 1 - 3 . Ro b b e d B i t S ig n a l i n g
ISDN, on the other hand, carries three logical channels over the same pair of copper,
two B, or Bearer, channels and one D, or Delta, channel. Each B channel has abandwidth of 64 kbps and is capable of carrying voice or data. Instead of the 8 kbpsin-band signaling channel from the POTS (plain old telephone system) case, there isnow a separate signaling channel called a D channel that has 16 kbps and can
support signaling for both B channels. The two B channels can then be combinedyielding up to 128 kbps of speed. The attractive feature of ISDN is integrated voiceand data running over the same copper wire. A computer can have both B channelsconnected to the Internet, but when a person needs to make a phone call, he can
simply pick up the phone using one of the B channels. The ISDN equipment willautomatically detect that there is a phone call and will drop one B channel from thecomputer automatically.
You can choose from many variations of ISDN configurations. You can choose one Bchannel to carry voice alone and one D channel for signaling, or you can choose only
one B channel for voice, one B channel for data, and one D channel for signaling. Themost popular method is called 2B+D BRI. Figure 1-4 shows a BRI line has threelogicalchannels: two B channels and one D channel.
Fi g u r e 1 - 4 . L o g i ca l Ch a n n e l s O v e r a BRI I n t e r f a c e
7/30/2019 Cisco Press - Design and Implementation of DSL
13/229
Mr. Bad Example
Besides the voice capability, ISDN also offers other attractive features such as quickcall setup and teardown. In the analog world when a modem needs to call the
Internet, your modem has to train with the modem on the other end, meaning themodems need to negotiate the connecting speed that both computers can send andreceive data reliably. Because each B channel always operates at 64 kbps and there's
a separate dedicated D channel for signaling, the setup time for ISDN is in seconds,negligible to the end user. Because ISDN is entirely digital, this effectively makescommunication between two ISDN devices all digital without converting signals to
analog and back to digital again. Figure 1-5 shows ISDN communication betweentwo PCs.
Fi g u r e 1 - 5 . I SD N Com m u n i ca t io n B e t w e e n T w o Com p u t e r s
This setup seems to be the answer to low-speed analog modem problem but therewere several issues that prevented ISDN from taking off to become the de factoremote access method. The following list examines some of the issues associated
with ISDN that have prevented it from becoming the top remote access method:
The first issue with ISDN is that it's not available to anyone who wants theservice. Before offering ISDN, phone companies must upgrade their phone
switches to make sure they are ISDN-ready. ISDN support for phone switchesrequires expensive software upgrades, costing millions of dollars for eachswitch. Because of this, not all telephone companies embraced ISDN
technology, making ISDN availability spotty in the U.S. Europe and Japan,however, have enjoyed a much higher success rate of ISDN deployment. Withlow availability of ISDN services and phone companies unable to commit to
this technology in the U.S., ISDN service remains expensive, preventing itfrom spreading to lots of consumers and consequently lowering the cost ofISDN.
To make matters worse, common ISDN deployment takes up to three voiceports from the expensive phone switch. Typically, every phone in yourneighborhood will run back into a CO. Then each copper pair will terminate ona phone switch, the most popular of which are the Lucent 5ESS and Nortel
DMS-100. These phone switches are responsible for, among other things,providing a dial tone so that when you pick up the phone you can be sure that
7/30/2019 Cisco Press - Design and Implementation of DSL
14/229
Mr. Bad Example
it's ready for you to dial. Phone ports on these switches are expensive andoften take years of service to recover the initial investment cost. With three
voice ports taken just for ISDN, it becomes too expensive to offer to themasses and, therefore, each phone company has a different view on offeringISDN. Some charge hundreds of dollars for installing ISDN, not including
monthly service and usage charges.
To the phone switch, an ISDN call looks the same as a voice call, tying up thesame 56-kbps channel on the switch. Telephone companies design theirphone network for voice calls that typically last on the average of five to sixminutes per call. Internet users who use analog or ISDN modems typicallystay connected for a much longer period of time, usually from 30 to 35
minutes, tying up phone lines for other people to use. This results in thephone switch getting congested and unable to serve other customers. Thisproblem is similar to the Mother's Day problem where the phone switch runsout of capacity resulting in a busy signal. With everybody rushing to connect
to their Internet at 6:00 p.m. after dinner, this Mother's Day problem nowhappens almost every night, prompting the phone companies to find otherways to offer remote access methods to their customers.
Besides spotty availability and expensive monthly charges, ISDN doesn'tattract a lot of customers because the most affordable and commonly usedform of ISDN (BRI) has a limitation of 128 kbps, making it unattractive for
subscribers who use bandwidth-hungry applications.
As you can see, ISDN offered faster speed access to customers but presented
another set of problems to phone companies. Some phone companies areuncommitted to the technology because of the cost of equipment upgrade and longerreturn on their investment, although ISDN has enjoyed a much higher deployment inEurope and Japan. The best method for phone companies to solve remote access is
to get data off the voice network without running another pair of copper wiring toevery house. The next few sections examine how DSL can help relieve the voicenetwork and at the same time see why DSL technology does not run into the same
56-kbps limitation like the analog modem does.
ADSL Comes of Age
Asymmetric digital subscriber line (ADSL) is a technology invented by BellCore in themid-1980s as a method to offer video and voice over the same copper loop. Theintent was to offer VoD to their customers when they wanted it. When thetechnology fizzled out because VoD failed to take off and typical deployment of ADSL
was too slow to run any real-time video over it; however, the technology seems tohave been forgotten for almost a decade.
ADSL had a renewed interest from phone companies again after their voice networkbecame overloaded with data. ADSL was being looked at again, but this time themain application that was driving it was datanot video like it was originally
designed for. In the early 1990s, phone companies wanted to offer DSL as a methodto prevent data from overtaking their voice network but there was a problem.There's no DSL standard, and phone companies don't make the equipment
themselves. Southwestern Bell, Bell Atlantic, and BellSouth got together to form theJoint Procurement Contract (JPC) to search for an ADSL equipment maker. Theypicked Alcatel as the main supplier of their Digital Subscriber Line AccessMultiplexers (DSLAMs) and customer premises equipment (CPE). US West chose not
7/30/2019 Cisco Press - Design and Implementation of DSL
15/229
Mr. Bad Example
to participate in the consortium and instead picked a startup company calledNetSpeed (later acquired by Cisco). Bell Atlantic went with Westell as the main
supplier for their DSL equipment. Other competitive local exchange carriers (CLECs)such as Northpoint Kovad, Rhythms, and Cincinnati Bell all offered DSL services lateron each choosing ADSL equipment from different vendors.
Unlike ISDN, the announcements by major U.S. telcos are a big boost to ADSLtechnology, signaling that ADSL is at the forefront of new remote access technology.Most importantly with ADSL, voice and data are separated into two different
networks preventing data from overloading the voice infrastructure. Figure 1-6shows data offloaded from the PSTN resulting in two networks: data network andvoice network.
Fi g u r e 1 - 6 . O ff l o a d in g D a t a f r o m P ST N N e t w o r k
Though offering tremendous benefits, ADSL, like most new technologies, has someproblems inherited from the current cable wiring for phone services and massdeployments. In the next chapter, we'll look at these benefits and problems that
earlier ADSL deployments have run into.
ADSL Benefits
In May 2001, 2,914,003 ADSL lines were recorded in service (Telechoice DSLDeployment Summary, www.xdsl.com/content/resources/deployment_info.aspwww.xdsl.com/content/resources/deployment_info.asp). Thistremendous growth in DSL technology was the result of major telcos pushing this
technology. So far, DSL has been the most promising technology that enables telcosto get incremental revenues by offering voice, video, and data over the same copperwire. Telephone companies embraced the technology because of the followingbenefits:
High-speed access For an affordable price of around $40 a month,customers now can get speeds of up to 1 Mbps, which is necessary to
download web pages that are loaded with graphics. Sharing pictures on the
http://www.xdsl.com/content/resources/deployment_info.asphttp://www.xdsl.com/content/resources/deployment_info.asphttp://www.xdsl.com/content/resources/deployment_info.asp7/30/2019 Cisco Press - Design and Implementation of DSL
16/229
Mr. Bad Example
web is now more practical and downloading large MP3 music files from theweb is more attractive largely due to advances in DSL technology.
Always-on If you have ever used a modem before, you know how long ittakes to boot up your computer, turn on the modem, dial a number, andlisten to a barrage of noise from the modem training. If you get lucky, you
will connect on the first try and then you have to make sure everybody in the
house does not pick up the phone while you are online. With DSL, it is aservice that's always on, meaning you are always connected to the Internet.
You no longer have to dial your service provider or fear that someone will pickup the phone while you are on the Internet. The fact that DSL is always onmakes people come up with great ideas of utilizing the service from putting
up their own web server in the garage to monitoring their homes remotelythrough a web camera set up inside their house.
Low maintenance For phone companies deploying hundreds of thousandsof DSL lines, low maintenance is a big requirement. The phone lines between
the CO and your house are usually underground and protected, barringconstruction nearby that results in a cable cut. Once DSL is installed, yourphone line is left aloneno maintenance needed.
Security Because every house has its own copper pair running back to theCO, the voice or data traffic traversing the line does not have to mix with anyother traffic until it gets to the CO, meaning no one else can listen to your
phone message or sniff your data from their computer. Cable technologyrelies on a shared network, similar to a LAN where everybody on the LAN canlisten to all the traffic on that LAN. With some clever hacking or spoofing, a
computer might be hacked into. The implication here is that hacking is harderon a dedicated line like DSL. The nature of a dedicated line to the CO makesthings a little harder for hackers to compromise your home PC.
ADSL provides a tremendous opportunity for telephone companies to offer newservices such as data and voice over their existing copper infrastructure. Newer DSLstandards, such as very-high-data-rate DSL (VDSL), provides an extremely fast pipe
to the consumer, enabling services such as video over DSL, VoD, video conferencing,and VoIP, all on top of the regular POTS line. The next few sections examine howDSL will enable new service offerings and how high-speed access plays an important
role in the future.
Applications That Drive High-Speed Access
Having a big data pipe to the house opens up a new world of applications that werenot possible before with analog modems or even ISDN. Applications such as theWorld Wide Web and e-mail can be run on top of IP. Plus now with plenty ofbandwidth that DSL provides, other bandwidth hungry applications can also run on
top of IP as well. With a theoretical speed of 8-Mbps download for ADSL and 52 Mbpsfor VDSL, data, voice, and video can be run concurrently over the same copper wire.The following sections discuss applications that are bandwidth intensive, including
Video over DSL VoIP Residential Gateway High-speed Internet Access and Virtual Private Network (VPN)
7/30/2019 Cisco Press - Design and Implementation of DSL
17/229
Mr. Bad Example
Video over DSL
With over 827 million copper lines installed worldwide, phone companies have amassive customer base and they also want to offer new services to their customers.Right now, phone companies would love to have recurrent revenue of about $40from each resident. But running cable to every neighborhood proves to be expensive.
Due to their existing infrastructure, phone companies find it very attractive to offernew services utilizing the existing copper pair. With ADSL, they have been able tooffer voice and affordable high-speed data over the same wire and without clogging
up their expensive voice network.
As mentioned previously, ADSL was invented by BellCore to offer VoD over existing
copper pair. Using MPEG-2 compression, each video stream takes about 3 Mbps toachieve 30 frames per second, a standard rate at which broadcast televisionoperates.
Although ADSL was initially designed to operate at 7 Mbps of download speed,distance limitation has cut down the typical ADSL deployment to about 1.5 Mbps
peak download.
As DSLAMs are pushed closer to the neighborhood, copper length is becomingshorter, allowing ADSL to operate at a much higher speed. It also allows other highspeed technologies, such as VDSL, to operate at a maximum theoretical 52 Mbps of
download speed. This availability of high bandwidth allows phone companies to offermultiple real-time feeds of TV channels to their subscribers over VDSL or a singlefeed of real-time or VoD channels over ADSL.
Customers now can use multiple VoIP phone lines, surf the Internet, and watch TV atthe same timeall over the same copper wire. Because there isn't a need to run
additional wiring to your home, the cost savings as a customer is significant. This
news is great for the telephone companies because the more bandwidth they canoffer to their customers, resulting in the capability to offer more robust services (agreater amount of digital TV channels, for example). Figure 1-7 shows a Video over
DSL setup.
Fi g u r e 1 - 7 . Vi d e o o v e r D S L A p p l i c a t i o n
7/30/2019 Cisco Press - Design and Implementation of DSL
18/229
Mr. Bad Example
In the Figure 1-7, a multicast server gets its programming either from a videotapedclassroom or from a satellite feed. A content manager such as an IPTV content
server will broadcast its programming information to any multicast clients thatrequest for one. The ISP point of presence (POP) will pull down a multicast stream
only if there's a client that requests that programming. The beauty of multicast isthat even if there's a hundred clients wanting the same programming, the ISP POPwill have to pull down only one stream and replicate that stream a hundred times onan aggregation device, pushing those streams down the DSL lines to the clients. Inthe case of an IP DSL switch, the replication will be done on the switch itself, pushing
the content closer to the subscriber.
Voice over IP
Corporations have long known that running two networks, one for voice and one fordata, is very expensive both to deploy and to maintain. Separate pieces ofequipment have to be bought and maintained, while renting leased lines from telcos
incurs on-going monthly expenses. As the phone and data networks begin toconverge, corporations are increasingly running voice over their fast data networks.Figure 1-8 shows a typical VoIP application, sometimes called toll bypass.
Fi g u r e 1 - 8 . V o I P A p p l i c a t i o n
Let's say a large corporation has four regional offices across the U.S. with high-speedInternet connections. Voice calls outside the company go out of the PSTN, while datacalls go out of the public Internet connection. Because all four regional offices havehigh-speed Internet connections, voice calls placed to the other regional offices use
VoIP (over the public Internet). Special Premium Quality of Service (QoS) is appliedto these calls to ensure there's minimal delay. This is sometimes referred to as a tollbypass: a remote office or a regional office can dial the headquarters using the four-
or five-digit extension, essentially bypassing the CO.
7/30/2019 Cisco Press - Design and Implementation of DSL
19/229
Mr. Bad Example
There's no reason why this technology will not work for telecommuters using DSL asa data connection to the corporation. Instead of running one phone line for voice and
one phone line for data, both voice and data can be run over the same high-speedDSL connection.
Residential Gateway
Phone companies are already invested heavily in the voice infrastructure, includingphone switches and copper runs to the neighborhood. Besides offering DSL over the
same set of copper, phone companies also would like to offer voice for incrementalrevenue. Running an additional pair of copper lines to the home for a second phoneline is expensive, and voice over the same pair enables the phone companies to
provision a second line without the expensive cable run.
CLECs, unlike phone companies, have no voice infrastructure but would like to offervoice service to their data customers. Imagine when you finally give in and agree to
let your teenage daughter add another phone line to your house. Instead of waitingfor the phone companies to run another pair of copper to your house, these CLECs
can simply enter a couple of keystrokes to activate another phone line for yourhouse.
All that is needed here is a residential gateway. This is a gateway that will sit in yourhome, terminating the DSL line from your provider and, in turn, provide your house
with different services, such as high-speed Internet access, multiple phone lines, andvideo feeds. Figure 1-9 shows how a residential gateway might look.
Fi g u r e 1 - 9 . T y p i c a l Re s i d e n t i a l Ga t e w a y
The residential gateway has several important features built into the box:
7/30/2019 Cisco Press - Design and Implementation of DSL
20/229
Mr. Bad Example
On the PC side, a Dynamic Host Configuration Protocol (DHCP) server,network address translation (NAT), and an Ethernet switch allow multiple PCs
to obtain IP addresses from the residential gateway by way of a traditionalEthernet cable. A wireless base station might be built into the gatewayinstead of an Ethernet hub for wireless 802.11 users. The ideal gateway
should also include VPN and encryption software that enable telecommuters
to connect to their office securely. Several voice ports are also built into this box that enable regular phones to
plug into these ports. As mentioned earlier, when a new phone line is needed,the phone provider can configure their switch and the gateway for a newphone number. There is no need to run an additional pair of copper from the
CO to the house. Last but not least, a coax port should be available for future VoD over DSL
programming. VoD can be achieved easily, even today, when the entire movieis downloaded into the high capacity internal hard drive in the gateway,
enabling later playback at any convenient time.
Some manufacturers have come out with residential gateways, although not all of
them have a lot of the rich features. Cisco, 2Wire, and 3COM have all come out withtheir own version of residential gateway, but you can bet that the functionality ofthese boxes will be a lot richer once they become more popular.
High-Speed Internet Access and VPN
The main application of DSL today is still web and e-mail traffic, which does not needguaranteed bandwidth and delay. One or two seconds delay will not affect yoursending or receiving e-mail. As we move to more time-sensitive traffic such as voice,a different level of service must be implemented by service providers to distinguish
time-sensitive traffic over the rest of the nontime-sensitive applications.
Corporations can take advantage of high-speed Internet access by allowingemployees to access their corporation from home by various techniques. Figure 1-10
shows a typical DSL deployment where a subscriber is connected to the Internet viaan ISP POP. Later chapters will discuss different techniques of building a VPN.
Fi g u r e 1 - 1 0 . H ig h - S p e e d I n t e r n e t A c c es s o v e r D SL
7/30/2019 Cisco Press - Design and Implementation of DSL
21/229
Mr. Bad Example
Looking Ahead
In this chapter, we've looked at how the access technology has evolved from the
traditional analog modems to ISDN and finally DSL. We've also discussed theexciting new applications that can be offered at a low cost to DSL subscribers such as
high-speed Internet access, voice service, VPN, and video over DSL.
We'll take a closer look at different xDSL flavors in the next chapter. Differentencoding algorithms such as Carrierless Amplitude and Phase Modulation (CAP) anddiscrete multitone (DMT) will be discussed, as well as a more in-depth discussion of
the frequencies in which voice and data operates.
References
xDSL.com, which provides an analysis of DSL technologies, can be found at:www.xdsl.com/content/resources/deployment_info.aspwww.xdsl.com/content/resources/deployment_info.asp
http://www.xdsl.com/content/resources/deployment_info.asphttp://www.xdsl.com/content/resources/deployment_info.asphttp://www.xdsl.com/content/resources/deployment_info.asp7/30/2019 Cisco Press - Design and Implementation of DSL
22/229
7/30/2019 Cisco Press - Design and Implementation of DSL
23/229
Mr. Bad Example
T1/E1, which we are familiar with. DSL technology in its simplest form is nothing buta modem technology. Data from the subscriber gets modulated by the subscriber-
end DSL modem before being put on the physical copper loop. The CO equipment atthe other end comprised of banks of modemsdemodulates the signals and makesnecessary switching decisions based on the transport layer used. For example, in the
case of ADSL, the most widely and commonly used data link layer is ATM. Other
vendors, however, also use Frame Relay as the data link layer.
To understand any DSL connectivity, you must understand the components of the
entire DSL network, as shown in Figure 2-1. This diagram is also a graphicalrepresentation of the ADSL Forum reference model.
Fi g u r e 2 - 1 . ADS L Fo r u m R e f e r e n c e M o d e l
As Figure 2-1 illustrates for any DSL connectivity, you have a DSL modem at the
subscriber end at a minimum, noted in the diagram as an ATU-R (ADSL terminationunit-remote) and more commonly known as customer premises equipment (CPE). Atthe CO, a corresponding DSL modem demodulates the signals modulated by thesubscriber modem. The CO is equipped with a digital subscriber line access
multiplexer (DSLAM), which consists of banks of ATU-Cs (ADSL termination unit-central). Depending on the region that CO is serving, the DSLAM should have acorresponding ATU-C for each ATU-R at the subscriber end. Because we are depicting
ADSL in the diagram, we made reference to ADSL termination units. If the flavor ofDSL is SDSL, the subscriber-end modem then would be called STU-R and so forth.
The splitters shown in Figure 2-1 reflect a device that differentiates DSL data from
the regular analog voice. It is important to note here that any DSL flavor usually
makes use of the frequency spectrum, which is higher than that used by regularanalog voice (typically 4 kHz). In simplistic terms, the job of the splitter is to identify
whether the signal is below 4 kHz or higher. This is achieved using a simple low-passfilter technology. By making use of this splitter technology and by DSL using theupper frequency spectrum, utilizing the same pair of copper for both regular analog
voice as well as DSL data is possible. If a single pair of copper is used for both theanalog voice and DSL data, a splitter will be used at both the subscriber end as wellas one in the CO.
7/30/2019 Cisco Press - Design and Implementation of DSL
24/229
Mr. Bad Example
In the CO, when a signal is received from the subscriber end, the POTS splitter sendsthe voice spectrum to a regular phone switch in the CO. Additionally, it sends the
data spectrum to the ATU-C in the DSLAM. The ATU-C in turn demodulates thesignal. Depending on which transport layer the CPE and DSLAM agreed on using(whether it is ATM or Frame Relay), the DSLAM makes the necessary switching
decision to forward the subscriber traffic to its final destination. We will discuss about
the data link layer in the later section, "Considerations at the Data Link Layer (Layer2)."
One other important aspect worth noting on the reference model in Figure 2-1 isupstream and downstream:
Upstream is always referred to as the direction from the subscriber towardsthe CO.
Downstream is referred to as the direction towards the subscriber.Table 2-1 depicts the most commonly used xDSL flavors with their correspondingdistance limitations and bandwidth.
T a b l e 2 - 1 . DSL Fl a v o r Ch a r a c t e r i s t i c s
Upstream Bit Rate Downstream Bit Rate Reach
ADSL Up to 800 kbps Up to 8 Mbps Up to 17,000 feet
G.Lite Up to 176 kbps Up to 1.5 Mbps Up to 18,000 feet
SDSL Up to 768 kbps Up to 768 Kbps Up to 10,000 feet
VDSL Up to 20 Mbps Up to 52 Mbps Up to 3000 feet
G.shdsl Up to 2.3 Mbps Up to 2.3 Mbps Up to 22,000 feet
The distance or reach specified in Table 2-1 reflects the distance from the CPE to theCO. Depending on which modulation technology you use or which flavor of xDSL youselect, you can achieve different bandwidth in both upstream and downstream
direction. The key point that needs to be noted here is that a tradeoff between reachand bandwidth always occurs. The further down the CPE is from the CO, the lesserthe bandwidth it gets. A number of factors can play a big role in determining the
exact bandwidth at a certain distance, and they will be discussed briefly in thesection, "Design Considerations at the Physical Layer (Layer 1)."
ADSL
ADSL, as explained in the first chapter, is the most widely deployed flavor of xDSLtoday. The reason for this is simple: ADSL provides the right suite of bandwidth bothin upstream and downstream directions, required by the most consumers today.
ADSL has gained popularity in today's consumer space, not only as the always-ontechnology but also as a cheaper and more suitable alternative to the common dialmodem technology. In addition, ADSL is being offered and gaining popularity as a
7/30/2019 Cisco Press - Design and Implementation of DSL
25/229
Mr. Bad Example
cheaper alternative to the traditional T1/Frame Relay circuits for small offices, homeoffices, and business customer space.
ADSL has become a relatively mature technology having already been throughseveral years of development and physical deployment by many service providers.ADSL can offer rates of 8 Mbps in the downstream direction and approximately 1
Mbps in the upstream direction.
ADSL uses CAP or DMT to encode the data traffic on copper loop. Both CAP and DMT
are quite different in how they encode. CAP is not standardized; however, DMT wasinitially standardized as ANSI T1.413 and was then forwarded to ITU as G.992.1.Since then, the DMT standard has gone through various versions (or issues). Issue
One provides the basic framework, while Issue Two provides better interoperabilityand includes references to ATM and rate adaptation.
Although both CAP and DMT are frequency domain techniques, CAP relies more
heavily on the time domain than does DMT. CAP sends high bandwidth symbolsacross a wider spectrum for a shorter period of time. On the other hand, DMT relies
on smaller bandwidth channels sending longer duration symbols at a narrowerfrequency.
As shown in Figure 2-2, CAP relies on single downstream and upstream bandoccupying a larger proportion of the available bandwidth. As shown in the diagram,the spectrum is divided into two single carriersthe upstream starts at f1 and thedownstream starts at f2. CAP modems can accept ATM, packet, and bit synchronoustraffic. As seen with most ADSL deployments, however, ATM predominates across
the loop. CAP defines a number of downstream and upstream baud rates (number ofsymbols per second), which then derive the actual bandwidth.
Fi g u r e 2 - 2 . CAP Sp e c t r u m f o r ADS L
CAP was used as the initial choice of encoding method for most initial ADSLdeployments, but with the standardization of DMT and the availability of Issue Two,most vendors started adopting the DMT encoding method to achieve the
interoperability with other vendors. Another reason for vendors to standardize on
7/30/2019 Cisco Press - Design and Implementation of DSL
26/229
Mr. Bad Example
DMT is the fact that DMT is more susceptible to noise and therefore offers a betterrate adapting technique.
DMT encodes the data into a number of narrow subcarriers, or tones, transmitted atlonger time intervals than CAP. As shown in Figure 2-3, DMT consists of 256 4 kHztones.
Fi g u r e 2 - 3 . DMT Sp e c t r um f o r ADS L
The modem can modulate each of these tones at a different bit density (a maximum
of 60 kbps/4 kHz tone) depending on the line noise. For example, the modem canachieve a higher rate at lower frequencies. By contrast, the modem achieves a lowerrate at higher frequencies where there is higher attenuation of the signal. In an
event where the interference or the line noise is high, some of these tones zero out,
meaning those tones are not used and, hence, the aggregate rate that can beachieved is rate adapted. This use of tones and its maintenance is one of the reasonsDMT is considered to be a bit more complex than CAP; however, this use has lately
been overcome by development and advances in a newer generation of digital signalprocessors (DSPs).
DMT defines two data paths: fast and interleaved. Fast offers low latency, while thepurpose of interleaving is to avoid consecutive errors delivered to the Reed-Solomon(RS) forward error correction (FEC) algorithm at the receiving end of the circuit. RS
is much more effective on single errors or errors that are not consecutive.
Most ADSL systems are set up to use frequency-division multiplexing (FDM) toestablish upstream and downstream channels. In FDM mode, the upstream and
downstream frequency bands are separated. Using FDM, the upstream channelallocation ranges from 26 kHz to 138 kHz and downstream ranges from 138 kHz to1.1 MHz. See Part A ofFigure 2-4 for a representation of FDM-based ADSL.
Fi g u r e 2 - 4 . ADSL Ec h o Can c e l la t i o n
7/30/2019 Cisco Press - Design and Implementation of DSL
27/229
Mr. Bad Example
An alternative to FDM is to use echo cancellation, which enables upstream anddownstream signals to use the same spectrum. Echo cancellation also adds more
available spectrum to the downstream channel. The objective of echo cancellation isto enable the downstream data to use lower frequencies than are available in FDMmode. Using lower frequencies results in less attenuation, which theoretically allowsfaster downstream data rates on longer loops (telephone lines). Part B ofFigure 2-4
illustrates this concept.
Echo cancellation mode has the potential to increase downstream bandwidth, but
with a compromise in upstream bandwidth. This mode can also increase crosstalk,resulting in higher noise levels and degraded signal-to-noise ratios (SNRs).
Echo cancellation is used to separate the far-end transmitted signal from the near-
end echo in the overlapped band. Echo is the reflection of a transmitted signal back
into a receiver at the same end of the circuit. The source of echo can be a reflectionfrom the far-end modem or from the two-wire interface of the near-end modem.
When a transmitter and receiver share the same two-wire interface, a four-wire totwo-wire conversion is done. The two-wire interface is split into a receive circuit anda transmit circuit. While line card circuits have been used in ADSL modems to form
four-wire to two-wire hybrids and bandpass filters, there is an increasing use ofdigital signal processors to perform the separation of transmit and receive. Any
7/30/2019 Cisco Press - Design and Implementation of DSL
28/229
Mr. Bad Example
phase errors in an analog circuit can cause a received signal to be coupled into thetransmit path, or vice versa.
A lower data rate version ADSL has also been proposed as an extension to ANSIstandard T1.413 by the Universal ADSL Working Group (UAWG) led by Microsoft,Intel, and Compaq. This is known as G.Lite in the ITU standards committee. The
standard calls for reducing the maximum transmit power, thus reducing thedownload speed of up to 1.5 Mbps and upload speed of up to 512 kbps. G.Liteoperates at a lower frequency than ADSL, allowing for a longer distance between a
CO and its subscribers and, therefore, reaching more subscribers than ADSL. G.Liteuses the same DMT modulation scheme as ADSL but eliminates the POTS splitter atthe customer premises. As a result, the ADSL signal is carried over all the house
wiring, resulting in lower available bandwidth due to greater noise impairments.
VDSL
VDSL is an emerging technology that plans to deliver data rates as high as 52 Mbpsin the downstream direction to the subscriber at a shorter loop. VDSL is not yetstandardized, however both American (ANSI) and European (ETSI) standards bodiesare working actively in standardizing this technology.
With downstream speeds of up to a blazing 52 Mbps, VDSL is the next step up thespeed ladder beyond ADSL. The price paid for VDSL's increased speed, however, is a
shorter distance range. This means that VDSL can be a promising technology forapplications requiring a very high bandwidth in the downstream direction towards tosubscriber, especially in the Multi Dwelling Unit/Multi Tenant Unit (MDU/MTU) space.This also applies for hospitality suites like hotels and so forth that would like to offer
voice, video, and data on a common pair of copper. A typical VDSL-basedarchitecture is shown in Figure 2-5.
Fi g u r e 2 - 5 . MDU / M TU A r c h i t e c t u r e
VDSL comes in two variants: a symmetrical version and an asymmetrical version,
which is one of the key differences from ADSL. Over short ranges (1000 feet), VDSL
7/30/2019 Cisco Press - Design and Implementation of DSL
29/229
Mr. Bad Example
can offer up to 52 Mbps downstream capacity compared to the ADSL capacity of upto 8 Mbps; upstream, the asymmetrical version of VDSL offers a slower data rate of
approximately 1.5 Mbps to 2.3 Mbps. Over short distances, VDSL offers a speedincrease of approximately three to five times over ADSL. Over longer distances,VDSL will offer a speed increase of two to three times but VDSL's distance range will
always be less than that for ADSL.
To provide high bandwidth to the subscriber, the copper loop to the subscribershould be as short as possible, which means that the DSLAMS consisting of VDSL
cards might mainly be located in basements of the buildings for MDU/MTUapplications as well as the hospitality suites. Plus, they are likely to be fed by a highcapacity fiber optic link from a central site but occasionally directly from a CO or
switch.
The asymmetrical version of VDSL works well in the consumer space and would beused mainly to offer various applications to the consumers. Some of the ideal
applications for VDSL include providing video over the copper loop, provisioningmultiple TV channels, video conferencing, streaming video, and so on. On the other
hand, the symmetrical version of VDSL can be a suitable option for business classservices. The bandwidth offered by VDSL today is far more than most people need.This would change, however, with the growing demand of video applications onxDSL.
IDSL
IDSL makes use of the ISDN 2B1Q encoding method but for permanent (or always-on) connectivity, unlike ISDN that enables dynamically initiating/terminating the
connection. IDSL allows for the use of the D channel along with the 2 B channels ofISDN and, hence, can achieve the bandwidth of 144 kbps.
The maximum achievable bandwidth for IDSL is 144 kbps in both directions, and it issymmetric. IDSL is repeatable (which implies that you can have a repeater in theloop to amplify the signal), so it can be offered at longer distances where ADSL
usually cannot be offered. Because of this distance advantage over ADSL, IDSL hasbecome an attractive option for regions where ADSL can't be offered and thesubscribers want to take advantage of high-speed access instead of the slower
analog modem connection. One good question everyone asks at this juncture is,"Why not use plain ISDN, which also provides 128 kbps using two B channels?" Themain difference between ISDN and IDSL is that, with ISDN, the D channel is usuallynot used to carry dataalthough some real applications utilize the D channel to carry
data, like X.25 over D Channel, fewer companies in Europe adopted it consequentlysacrificing 16 kbps. In the case of IDSL, the D channel is used along with two B
channels for carrying data. The other major difference between IDSL and ISDN isthat ISDN is typically not an always-on technology and can initiate the call as andwhen required. However, IDSL is always onyou cannot tear down any of the B or Dchannels if they are idle.
Because a majority of the telephone systems in Europe makes use of ISDNtechnology, ADSL over ISDN is gaining popularity in Europe. ADSL over ISDN is
accomplished by overlaying the DMT encapsulation over the 2B1Q encoding,consequently separating the frequency spectrum of DMT and 2B1Q so that they both
7/30/2019 Cisco Press - Design and Implementation of DSL
30/229
Mr. Bad Example
can coexist and DMT can be carried over 2B1Q. Because in countries, such asGermany, where there is a widespread deployment of ISDN, the coexistence of ADSL
and ISDN on the same copper loop is a requirement. Therefore, the ADSL spectrumin this case can only start at 140 kHz because ISDN occupies a much largerspectrum in the baseband. You need the splitters the same way as discussed in the
ADSL section, but in this case, the splitter is used to separate ISDN from DMT.
SDSL
SDSL is symmetric in nature, which in simple language means you get the same
bandwidth in both upstream and downstream direction. With SDSL, the maximumbandwidth that can be achieved is 2.3 Mbps. The typical maximum reach for SDSL isapproximately 4 km, or 12,000 feet.
SDSL, like IDSL, makes use of 2B1Q encoding. SDSL, however, is not repeatable,meaning that you cannot connect repeaters to boost the signal. The inability to userepeaters with SDSL results in the same distance limitation approach as that of
ADSL. SDSL, unlike ADSL, is not rate adaptive, implying that once the two modemsare trained up they will not rate adapt to a lower rate in case of noise interference orother factors.
SDSL because of its symmetric nature becomes an attractive option for small offices,home offices, or business customer spaces that are looking for cheaper alternative
for traditional time-division multiplexing (TDM) lines. SDSL has been a means ofentry for CLECs to take the leased line business and has been quite successful in thatspace. However, SDSL implementation is not based on any standard, and it isproprietary with each vendor based on the chipsets they use. For this reason, vendor
compatibility with SDSL is a big issue and, therefore, has not become the ultimatechoice of technology for leased line replacement. Most of the CLECs and incumbentlocal exchange carriers (ILECs) are awaiting the arrival of standards-based G.shdsl,
which is presumed will ultimately dominate the Leased Line Replacements and will bethe preferred choice of most DSL providers for business class users.
G.shdsl
Recently, International Telecommunications Union (ITU) determined the highlyanticipated G.shdsl standard. This new standard was developed to replace or
enhance many older or existing DSL technologies and other transport options suchas HDSL, DSL, HDSL2, ISDN, T1, E1, and IDSL. Until now, telecommunicationequipment vendors were required to develop several different line cards toaccommodate each of the services that were offered by the technologies listed
above. The new G.shdsl Draft Standard will enable equipment manufacturers todevelop CO loop access equipment and CPE around a single standard, enabling themto address the interoperability issues faced by other xDSL implementations as
discussed earlier.
G.shdsl is a technology that encompasses all functions which are currently provided
by the European SDSL standard and HDSL2 including Overlapped Phase Trellis-codedInterlocking Spectrum (OPTIS) spectral shaping. G.shdsl is multirate, multiservice,extended-reach, and repeatable.
7/30/2019 Cisco Press - Design and Implementation of DSL
31/229
Mr. Bad Example
It is multirate because it supports data rates from 192 kbps to 2.3 Mbps. G.shdsluses G.hs (handshake) to negotiate the framing protocol. Protocols supported
include ATM, T1, E1, ISDN, and IP. The flexibility of G.shdsl enables the transport ofvirtually any type of service. It makes use of Trellis Coded Pulse AmplitudeModulation (TC-PAM) line coding that enables interoperation due to the low
complexity level of the transceivers. G.shdsl is suppose to deliver approximately 30
percent greater reach than currently deployed transport technologies. G.shdsl isexpected to rapidly replace the proprietary SDSL implementations of today and is
mainly used for business-class users.
Comparing xDSL Flavors
Table 2-2 summarizes the various features of each xDSL flavor we discussed and
which segment of market they fit in.
T a b le 2 - 2 .
ADSL IDSL SDSL G.shdsl
Standard Yes, ANSI T1.413, ITU G.992.1 No No Yes (ITU)
Rate Adaptive Yes No No Yes
Repeatable No Yes No Yes
ATM Framing Yes No No Yes
T1 Framing No No No Yes
E1 Framing No No No Yes
Design Considerations at the Physical Layer(Layer 1)
The purpose of this section is to make you aware of some of the challenges faced atLayer 1 while deploying DSL. Additionally, because this book focus mainly on ADSL,we will discuss some important issues related with DMT and its various options.
Copper Loop Issues
One of the major challenges to next-generation data networking over PSTN is the
copper pair itself. The nature of copper windings and the traditional cabling practicesused in local loops creates huge barriers to technologies, such as ADSL. Thisinfluenced a requirement for rate adaptive and resilient signaling techniques to
compensate for the issues that are inherent in a twisted-pair local loop.
The following issues are all potential hindrances to a voice or DSL network:
Since the early days of telephony, load coils have been applied to long loopsto boost and flatten the frequency response of the line at the upper edge of
7/30/2019 Cisco Press - Design and Implementation of DSL
32/229
Mr. Bad Example
the voice band. These load coils increase attenuation greatly at frequenciesabove the voice band; therefore, load coils must be removed for DSL to
function on a local loop. In multicarrier systems, inter-carrier interference can occur. This happens as
a result of frequency dependent attenuation and dispersion, which can vary
between carriers. With the infringement of a variety of carriers into the CO,
this becomes a serious concern for DSL deployments. In the process of connecting and disconnecting portions of a loop cabling,
portions of open-circuit wiring can sometimes be left connected to a workingtwisted pair. The presence of these bridge taps can affect the frequencyresponse of the loop and cause distortion and interference.
Reflections and distortions can also be caused by loops made up of wires ofdiffering diameter. This is a frequent problem in older wiring that has beenmodified over time.
Impulse noise (a brief, high amplitude jolt of noise introduced into the cablingfrom outside sources) is a major problem in copper wiring. Lightning andswitching equipment transients are common causes of impulse noise. This iscommon in older COs, which are not properly insulated and older network
equipment that has not been properly maintained.
Radio frequency (RF) interference is very common in twisted pairs, especiallywith the cabling techniques common in the U.S. Various radio sources can
impair with a copper transmission medium, the foremost of which is theamateur radio transmitter. Ham radio operators can disrupt telephonecommunication in a large area around their transmitters if the local loops are
extremely long or vertical. RF interference becomes a bigger problem asfrequency increases, making DSL applications more susceptible.
The impact of these points can vary widely depending on particular network
topologies and the specifics of the local loop cabling plant. Both voice and DSLswitching systems have designed solutions for dealing with each of these issues tosome degree.
Reach Versus Bandwidth
One of the challenges faced by the DSL providers today is that they would like tooffer DSL services to as many subscribers as possible, but that is not easilyachievable because of the distance limitations seen in various DSL technology. Alsothe further the subscriber is from the CO the less bandwidth the subscriber can get.
The next couple of sections discuss some of the factors that affect the rate that canbe offered to subscribers.
Noise Margin
It is important to note that higher DSL rates result in lower SNRs and lower DSLrates result in higher SNRs. Therefore, the noise margin becomes lower at longer
cable lengths and at higher DSL rates. When a bit error rate (BER) of 107 can nolonger be maintained, an automatic reduction in DSL rate normally occurs in DSLflavors that are rate adaptive, such as ADSL and G.shdsl.
7/30/2019 Cisco Press - Design and Implementation of DSL
33/229
Mr. Bad Example
RADSL (rate adaptive DSL) is a technique that automatically adjusts the DSLtransmission speed to a rate where the appropriate noise margin can be maintained
and enables a 107 BER to be maintained.
When DSL service is provisioned in a DSLAM, the minimum acceptable noise marginis usually specified. CAP DSL service is typically provisioned with a downstream
margin of 3 dB and an upstream margin of 6 dB. Research has shown that theoptimum margins for DMT service are 6 dB downstream and 6 dB upstream.
Avoiding configuring a DSL service with more noise margin than appropriate isimportant because the system will train to an unnecessarily low DSL rate to providethe specified margin. It is also important to avoid specifying an exceptionally low
margin, such as 1 dB downstream and 1 dB upstream because a small increase innoise level on the transmission line would probably result in excessive errors and asubsequent retraining to a lower DSL rate.
If a DSL line is at maximum reach (maximum cable length) and the modems will nottrain, the margins may be set to zero for troubleshooting purposes only. For
example, if a DSL line trains with the margins set to 0 but will not train when themargins are set to 6 dB, the line length is probably at maximum reach (typically 18kft of 24-gauge wire). If providing service at any cost is necessary, a compromisemargin between 0 and 6 dB can be selected. In such cases, determining whether the
source of the problem is in the downstream spectrum or in the upstream spectrum isimportant, and make adjustments accordingly. For example, a margin setting of 3 dBin the downstream spectrum can be necessary to provide a preferred DSL rate at 18
feet of cable.
Increasing the transmit power levels will also improve the noise margin but at thecost of interfering with other services in the same cable.
Most DSLAMs and CPE report both the provisioned and actual noise margins for eachDSL line. If the actual margin is higher than the provisioned margin, the line shouldprovide an acceptable error rate at the present DSL line rate. As the actual margin
drops below the provisioned margin, there is a high probability of an excessive errorrate and subsequent retrain to a lower DSL rate.
The general indicator of acceptable DSL performance is when the actual margin isbetter than an appropriately set minimum margin, and the DSL line is running at thedesired data rate.
Forward Error Correct ion
FEC refers to the process of correcting errors mathematically at the receiving end ofa transmission path, rather than calling for a retransmit of the erred data.
Retransmitting data to correct errors uses the available bandwidth to repeatedlysend the same information, and the user perceives very slow throughput. FEC resultsin greater effective throughput of user data because valuable bandwidth is not being
used to retransmit erred data.
When errors can be corrected without retransmitting the data, the errors arereported as corrected errors. When errors can't be corrected by the algorithm, they
7/30/2019 Cisco Press - Design and Implementation of DSL
34/229
Mr. Bad Example
are reported as uncorrected errors. The ratio of corrected to uncorrected errorsshows the relative effectiveness of the error correction algorithm, or the relative
intensity of the errors.
FEC Bytes
Also called check bytes or redundancy bytes, FEC bytes are added to the user datastream to produce a means of calculating the presence of erred data and generatinga corrected frame. The appropriate number of FEC bytes provisioned generallydepends on the type of errors being detected and corrected. It is important to note
that the more FEC bytes that are added to the data stream the more bandwidth theusers' data shares with the FEC bytes.
The tradeoff is being able to correct errors without retransmission versusdisplacement of user data. It is generally observed that much better throughput,however, is achieved by increased efficiency in FEC rather than by retransmittingerred data.
In many systems, the selectable number of FEC bytes is 0 (none), 2, 4, 8, 12, or 16.As a very basic and general rule, the more FEC bytes used the more effective is the
error correction. But in error-free transmission paths, an unnecessary number of FECbytes serves only to displace user data in the available bandwidth. For example, 16FEC bytes per frame displaces much more user data at a transmission rate of 256
kbps that the same number of FEC bytes displaces at a transmission rate of 8 Mbps.That is the presence and number of FEC bytes at 256 kbps is more apparent to theuser as reduced throughput than the same number of FEC bytes at 8 Mbps.
Note that some chipsets optimize the number of FEC bytes versus the requested ATMtransmission rate. For example if a downstream rate of 8.032 Mbps and 16 FECbytes is specified in the line configuration but the error rate is within the 107 BER
limit, the chipset may set the number of FEC bytes to a lower number to create therequested user bandwidth. When DMT performance statistics are reviewed, thechipset reports a fewer number of FEC bytes than what was specified in the
configuration.
Before specifying the most efficient number of FEC bytes and the most efficientinterleave delay, we must determine the pattern of errors occurring on the
transmission path. Errors occur in two general patterns: bursty or dribbling.
Interleaving
Interleaving is the process of scrambling user data in a very precise sequence. The
purpose of interleaving is to avoid having consecutive errors delivered to the RS FECalgorithm at the receiving end of the circuit. RS is much more effective on singleerrors or errors that are more spaced in time (not consecutive).
If a noise burst occurs on the copper transmission line, several consecutive data bitscan be affected resulting in consecutive bit errors. Because the data was interleaved
at the transmitter, de-interleaving at the receiver produces not only the original bitsequence, but separates the erred bits over time. (The erred bits appear in separate
7/30/2019 Cisco Press - Design and Implementation of DSL
35/229
Mr. Bad Example
bytes.) Therefore, the erred bits are no longer consecutive and the RS FEC process ismuch more effective.
Latency
In many systems, interleaving can be set to 0 (off, none), 1, 2, 4, 8, or 16milliseconds of interleave delay or interleave depth. The more milliseconds of time
allocated to interleaving, the more data can be interleaved. But increasinginterleaving delay will cause additional latency or delay in the time the data istransmitted and the time it is available to the receiving user.
As a general rule, the more interleaving delay that is used the better the RSalgorithm can correct consecutive errors. The increased latency normally causes no
problems for general data transmission but digitized voice over a high-latency pathresults in extremely unpleasant echo. For this reason, a minimum interleave delay(or no interleaving) is always used on data channels carrying voice traffic. As delay isadded to voice transmissions, the problem of echo increases radically and requires
additional treatment. Two-way video conferencing can also experience some
undesirable effects from excessive latency in the data stream.
A relatively high error rate can usually be tolerated during voice conversations, and ahuman ear might not even detect the errors. Additional consideration of minimizedlatency versus error correction may be required, however, when analog data or fax is
also running on the voice channel. Conversely, greater latency (delay) is notparticularly detrimental to data transmission. Increasing latency does not usuallyreduce the transmission speed (throughput). Effective FEC, partially resulting from
increased interleaving, can contribute significantly to achieving maximum throughputin a noisy environment.
Bursty Errors
Bursty errors are multiple errors that occur in very short timeframes. For example, ina one-minute timeframe, there might have been a total of 100 errors. The 100errors, however, might have occurred in bursts of 10 errors at a time, spaced several
seconds apart.
To determine if errors are bursty, inspect the total DSL trained-up time and erred-seconds counters. If a unit has been trained for one hour and has reported 100
errors and one erred second, the errors are bursty. By contrast, if the unit has beentrained for one hour and has reported 1000 errors and 1000 erred seconds, theerrors are dribbling. (Dribbling errors are covered in the following section.)
Noting the ratio of corrected errors to uncorrected errors is important. If all reportederrors are corrected (no uncorrected errors), no further action is required.
For treating uncorrected bursty errors, increase the interleave delay (interleavedepth). In most systems, interleave delay can be set as low as 1000 microseconds(one millisecond) and as high as 16,000 microseconds (16 milliseconds). If very few
erred seconds are detected over a period of several hours, additional correctivemeasures might not be necessary.
7/30/2019 Cisco Press - Design and Implementation of DSL
36/229
Mr. Bad Example
Dribbl ing Errors
Dribbling errors occur usually one at a time (spaced by milliseconds to seconds) and
continue to occur over any given timeframe.
To treat a steady stream of uncorrected dribbling errors, increase the number of FECbytes. Increasing the number of FEC bytes adds baggage to the datastream. This
results in a tradeoff between correcting errors and reducing the bandwidth availableto the user. The effect of increasing FEC bytes depends on the data rate: Slower datarates demonstrate more bandwidth loss. As a general guideline, do not add more
FEC bytes than what is required to correct the errors.
Coding Gain
When using FEC, typically RS encoding, errors might be corrected at the receiverwithout having to use TCP for block retransmits. When errors are corrected in thisway, it has the same effect of using higher noise margins without the relatedreduction in DSL trained rates. This effect is called coding gain and is expressed in
dB (the equivalent dB of margin).
Without coding gain, we need a specific SNR to achieve and maintain an ATM data
error rate of 107 or better. With coding gain, we can achieve and maintain a 107error rate with a lower SNR. Errors might still be occurring on the transmission linebut are being corrected by the RS algorithm. The resulting error-free (corrected)
data rate is the same as if a higher noise margin was used.
DSL Modem Train-Up
The initialization sequence conducted between two modems is referred to as training,
or train-up.
During train-up, DSL modems start with no data interleaving and no line coding.(Interleaving and line coding must be negotiated between the two modems.) The
signal-to-noise level is calculated across the DSL spectrum, and a DSL line rate isestablished based on three essential factors:
Provisioning The DSL modems cannot establish a faster DSL rate thanwhat is specified (provisioned) in the DSLAM. The DSL trained rate is typicallyspecified in terms of available user bandwidth rather than actual DSL
spectrum used. DMT options An unnecessarily high noise margin setting results in an
unnecessarily low DSL trained rate. The recommended noise margin settings
for DMT are 6 dB downstream and 6 dB upstream. (The recommendation forCAP systems is traditionally 3 dB downstream and 6 dB upstream.)
Line conditions This includes several factors, but primarily two:attenuation and noise levels. It is important to note that more than one noise
source might be contributing to the total noise spectrum on the line, thusproducing multiple noise frequencies with related noise (power) levels. Somenoise sources are more detrimental to DSL performance than others, again
depending on the spectrum and power level of the noise induced into the DSLcircuit.
7/30/2019 Cisco Press - Design and Implementation of DSL
37/229
Mr. Bad Example
Train-Up M ode Options
In DSLAMs options are available sometimes for specifying the training procedure. For
example, in Cisco DSLAMs, you might encounter the options standard train and quicktrain, or standard train and fast train. Standard train relates to a training procedurespecified in ANSI standards document T1.413, which is considered the standards
reference for DMT ADSL. (Any manufacturer offering the option standard train shouldensure the option is T1.413 compliant.) Quick train, fast train, and so forth can bemore proprietary and perform best when used with the same manufacturer's
modems (and usually the same DSL chipset) on both ends of the telephone line.Furthermore, quick train might not always result in a faster train-up by the modems.
Train-Up Problem s
If a DSL modem cannot train to the ATU-C in the DSLAM, any of the following is apossible problem:
Excessive line length, or exceeding the maximum reach An ILECknows how long any given cable pair is, but testing cable length dynamicallyrequires expensive test equipment. It's also important to note the differencebetween 24- and 26-gauge wire. Without getting into pages of calculations,
we can say that 26-gauge wire is significantly more attenuative at allfrequencies than 24-gauge wire. This becomes especially apparent at DSLfrequencies, where 18,000 feet of 24-gauge cable is roughly equivalent to
15,000 feet of 26-gauge wire. Bridge taps and half taps A bridge tap and half tap are the same thing. A
bridge tap occurs when a section of cable is connected to a telephone line at
some midpoint between the CO and the CPE, usually done to prepare for acable reroute. Bridge taps can significantly alter the impedance of a telephoneline, especially at DSL frequencies. Impedance mismatches cause a wide
variety of symptoms, typically reflection of data bits from the tap-point backto the point of transmission, causing bit errors. A tapped-in stub can evenbecome a tuned filter at DSL frequencies, causing excessive attenuation of
DSL signals. Figure 2-6 illustrates the concept of a bridge tap.
Fi g u r e 2 - 6 . B r i d g e T a p
7/30/2019 Cisco Press - Design and Implementation of DSL
38/229
Mr. Bad Example
Interfering signals This can become extremely complicated and difficultto diagnose without spectrum analysis. If a single DSL line is activated in a
25-pair binder (a group of pairs), we can measure a specific noise margin. IfDSL is activated on 10 more pairs in the 25-pair binder, the margin degradesnoticeably.
AM radio stations have been known to cause a degradation of DSL service butshould not cause a no-train condition unless the modems are already atmaximum reach. The DSL spectrum is roughly from 25 kHz to 1.1 MHz, and
the AM radio band (in North America) is roughly from 550 kHz to 1.7 MHz.The overlap in the two spectrums enables powerful radio stations to interferewith highly attenuated DSL signals on longer cable lengths.
DMT interferes with CAP more than other CAP signals. SDSL interferes withDMT. ISDN interferes with CAP. Basically, everything interferes witheverything else. The important thing is that an acceptable noise margin be
maintained, and this is controlled by attenuation (cable length and wiregauge), bridge taps on the line, and the spectrum and power level of
interfering signals.
Finally, note that a small amount of noise is also produced by the digitalsignal processors and DMT modulation subsystems. The term channel noise is
used to identify noise on the transmission path rather than internal noise in amodem.
Load coils Load coils are typically 88 millihenry (mH) chokes placed in thetip and ring lead of the cable pair at specific intervals to add more inductancethan can be produced by twisting the wire pairs. The added inductancecounteracts the effect of capacitance between thousands of feet of a wire pair
by creating a very effective bandpass filter that is optimized for a flatresponse between 300 and 3000 Hz.
Without load coils on cables of 15,000 feet or longer, excessive capacitance
will begin to radically attenuate the higher frequencies of the voice band.Analog modem and fax performance begins to degrade as well as voicequality.
Load coils must be removed from cable pairs when DSL service is provided.What makes the job somewhat difficult and expensive is that, when load coils
are placed in a cable, they are installed 3 kft from each end and at 6 kftintervals between each end. Fortunately for DSL service, many telephonecompanies do not load cables shorter than 10 kft, so fewer cable pairs haveto be unloaded for DSL service.
Other communication devices connected to the phone line Atelephone or fax machine connected to the phone line without a microfilter or
DSL splitter will cause excessive loading on the line when off the hook. Onlonger cable lengths, a DSL modem cannot train when a phone is off the hookunless a microfilter is used at the telephone or a splitter is placed between
the phone and DSL modem.
7/30/2019 Cisco Press - Design and Implementation of DSL
39/229
Mr. Bad Example
On shorter cable lengths, taking a phone off the hook without a filter orsplitter causes the DSL modem to untrain and then retrain at a lower DSL
rate. But things can get tricky. If a cordless phone base unit is connected tothe phone line without a microfilter, the RF pi-filter in the base unit is muchmore reactive (lower resistance) across the wire pair at lower DSL frequencies
than at higher frequencies. The DSL downstream rate appears normal, but
the upstream rate is lower than normal. Fortunately, installing a microfilter inthe phone line to the base unit corrects the problem.
Radio interference (RFI) filters on the phone line RFI filters areinstalled in many areas where AM radio stations can be heard on telephonesduring conversations. The most basic RFI filters are simply capacitors placed
across the phone line. More sophisticated RF filters also include inductorsplaced in the tip and ring. When capacitors are placed across the phone line(parallel) and inductors are inserted into the phone line (series), DSL
frequencies can be removed completely. RFI filters have no affect at voicefrequencies but appear as a short circuit at radio (and DSL) frequencies. RFIfilters can cause degradation of DSL performance on shorter cable lengths
and can prevent DSL modems from training on longer cable lengths.
Power Levels In DSL Services
DSL power levels are much higher than used in voice, fax, or analog data services.
This is simply because of the much greater attenuation of signals at D