Session 4. Transmission Systems and the Telephone Network Multiplexing

Total Page:16

File Type:pdf, Size:1020Kb

Session 4. Transmission Systems and the Telephone Network Multiplexing Session 4. Transmission Systems and the Telephone Network Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Intro to Computer Communication Networks Multiplexing A A A Trunk A group B B B MUX MUX B C C C C Sharing of expensive network resources – wire, bandwidth, computation power, … Types of Multiplexing n Frequency-Division Multiplexing n Time-Division Multiplexing n Wavelength Division Multiplexing n Code-Division Multiplexing n Statistical Multiplexing ECE/IUPUI 4-2 1 Intro to Computer Communication Networks Frequency Division Multiplexing Bandwidth is divided into a number of frequency slots The very old technology n AM – 10 kHz/channel n FM – 200 kHz/channel n TV – 60 MHz/channel n Voice – 4 kHz/channel How It works n Each channel is raised in frequency by a different amount from others. n Combine them. n No two channels occupy the sample portion of the frequency spectrum Standards (almost) n group – 12 voice channel (60-108 KHz) n supergroup – 5 groups, or 60 voice channels n mastergroup – 5 or 10 supergroups. ECE/IUPUI 4-3 Intro to Computer Communication Networks Time-Division Multiplexing A single high-speed digital transmission Each connection produces a digital information The high-speed multiplexor picks the digital data in round-robin fashion. Each connection is assigned a fixed time-slot during connection setup. A 2 A 1 A 2 A 1 C 2 B 2 A 2 C 1 B 1 A 1 DEMUX B 2 B 1 MUX B 2 B 1 C 2 C 1 C 2 C 1 ECE/IUPUI 4-4 2 Intro to Computer Communication Networks Time-Division Multiplexing – Standards T-1 Carrier : 24 digital telephone n A frame consists of 24 slots, 8-bit per slot. n Each frame has a single bit overhead for framing. n Each connection 8K pulses. n Bandwidth = (24*8+1)*8000 = 1.544 Mbps TDM Jargon in US and Canada n DS1 – output of T-1 multiplexer n DS2 – 4 DS1s n DS3 – 7 DS2s (28 DS1s) w 44.736 Mbps ( not 28*1.544=43.232 Mbps!) TDM Jargon in Europe n E1 – 30/32 voice channels w 1 channel for signalling w 1 channel for framing and maintenance n E2 – 4 E1s n E3 – 4 E2s n E4 – 4 E3s, 139.264 Mbps ( not 32*64*64Kbps = 131.072Mbps!) ECE/IUPUI 4-5 Intro to Computer Communication Networks SONET – Synchronous Optical Networks to handle lower-level digital signals Goals n support different carrier n internationalization n multiplex different digital channels n OAM (Operation, Administration and Maintenance) It is synchronous – controlled by a master clock. Components – sub-layer n switches n multiplexers n repeater STS STS PTE LTE PTE STE STE STE SONET SONET Terminal Mux R R R Mux Terminal Switch Switch Section Section Section Section Line Path ECE/IUPUI 4-6 3 Intro to Computer Communication Networks SONET Frame – 1 Basic SONET: STS-1 n 8000 frame/second, 9x90 bytes n Bandwidth ? Questions n Overheads on each sub-layer? n How many voice telephones can be carried by STS-1? path overhead section overhead line overhead payload (SPE) (87) ECE/IUPUI 4-7 Intro to Computer Communication Networks SONET Frame – 2 Asynchronous payload to Synchronous frame n SPE can begin anywhere within the SONET frame, span two frames. n If a payload arrives at the source while a dummy SONET frame is being constructed, it can be inserted into the current frame. – ADM capability n Pointer – First two bytes of line overhead ECE/IUPUI 4-8 4 Intro to Computer Communication Networks Self Healing Ring in SONET Double ring, bi-directional ring in a normal operation. When the fibers b/w two nodes are broken, the ring wraps around. How about a node failure? Fault tolerance n What is the resource to provide the additional service? n What has been sacrificed? Applied in the FDDI ring architecture. ECE/IUPUI 4-9 Intro to Computer Communication Networks Wavelength Division Multiplexing Optical version of FDM n The space b/w wavelengths is wide State-of-art technology can multiplex about 200 wavelengths, called DWDM (Dense WDM) Topology of optical networks n Goal: All optical communication (no conversion to electrical to transmission) n Expensive optical devices – wavelength converter, optical switch, … n Many wavelengths, still limited n Transparent optical networks Major Difficulties in WDM n No storage n Difficulty in computation Optical MUX Optical deMUX Prism Prism ECE/IUPUI 4-10 5 Intro to Computer Communication Networks Assignment of Wavelengths Current Paths (Connections) n SF-NY, SF-LA, LA -DC, NY-DF, NY-DC We have only two colors, red and blue Each link cannot carry two same color Want to add a connection between NY and LA. How? NY SF CH DC IN LA DF ECE/IUPUI 4-11 Intro to Computer Communication Networks Networks with Switches Geographically widespread networks Information flow from source to destination Switch – Core network components Unlike LAN, the wires (links) are the expensive resource. Control Link Switch 1 1 2 2 3 3 U Connection . of inputs . to outputs . U . U N N ECE/IUPUI 4-12 6 Intro to Computer Communication Networks The Very First Switch - Human person2 Switch ECE/IUPUI 4-13 Intro to Computer Communication Networks First Automatic Switch – Crossbar Switch NxN array of crosspoints (switch elements) Can connect any input to any available output by closing the correcsponding crosspoints It is nonblocking - a compatible request is always satisfied. Scalability n N2 crosspoints 1 2 . N 1 2 … N-1 N ECE/IUPUI 4-14 7 Intro to Computer Communication Networks The First Multistage Switch (Clos Switch) 3 stages, or 2k+1 stage N inputs = n x r 1 1 1 Input, middle, output stage Link b/w each pair of input and 2 middle switch modules 2 2 Link b/w each pair of middle and output switch modules 3 Nonblocking if m=2n-1 3 3 2nr(2n-1)+(2n-1)n2 =O(N1.5) crosspoints 4 What if k < 2n-1 ? r r What if links are multiplexed? m Multicast ? ECE/IUPUI 4-15 Intro to Computer Communication Networks Simple Packet Switch – Knockout Switch Used in some ATM switches Header info in each packet addresses to output port Possible to destine multiple packets to same output simultaneously n Tournament and select one packet Multicast Scalability Input lines Broadcast Bus 1 2 3 4 Concentrator Output Queue 1 2 3 4 Output lines ECE/IUPUI 4-16 8 Intro to Computer Communication Networks Binary Switch – Batcher/Banyan Switch Batcher Network – Sort incoming cell based on destination address Banyan Network n There exists one path from an input line to an output line, so it is possible to route the packet by itself without a central controller (Self-routing). n Two incoming packets might collide. n If the packets are ordered at the input lines, no collision. Batcher Banyan Sorting Network Network ECE/IUPUI 4-17 Intro to Computer Communication Networks Banyan Networks Self-Routing n 0 – move to the first port in the switching module n 1 – move to the second port in the switching module Possible to collide if they are out of order 6=110 0 0 4=100 0 0 1 1 6=110 1 1 2 2 2 2 3 3 3 3 4=100 4 4 4 4 5 5 5 5 6 6 6 6 7 7 7 7 ECE/IUPUI 4-18 9 Intro to Computer Communication Networks Batcher Sorting Networks Each module sorts two numbers only. The network sorts 8 numbers. n external lines – nlog2n complexity. Test yourself with any combination of 0-7. ECE/IUPUI 4-19 Intro to Computer Communication Networks Time Division Switch (TDX) n input lines are scanned in sequence, and build a frame with n slots. Slot of fixed size TSI reorder the slots in a frame and produce an output frame ex) T -1 n a slot is one byte, a frame consists of 24 slots, 8000 frame/sec n input lines input frame output frame Time Slot 7 6 5 4 3 2 1 0 1 2 5 0 3 6 7 4 Interchange 0 4 1 7 2 6 3 3 translation 4 0 table 5 5 6 2 ECE/IUPUI 7 1 4-20 10 Intro to Computer Communication Networks Area Code 202 Telephone Networks TANDEM Local loop (local access) interexchange carriers (IXC) TANDEM Pedestal Area Code 317 Local Exchange Carrier Serving local telephone office Area I/f 274 569 distribution cable Switch Distribution Frame Serving Area I/f feeder cable 881 Transport Area ECE/IUPUI 4-21 Intro to Computer Communication Networks Telephone Networks Local Loop n Analog grade designed 100 years ago. n Where is the largest copper mine? n A pair of twisted wires for bi-directional w Separate wires for each direction between central offices. w Hybrid transformer – convert two pairs to one pair or vice versa. n Utilization is very low. n Fiber to the Home (FTTH) vs. Fiber to the curb (FTTC) Trunk between central offices n Replaced by fiber optic. n For the most of communication services. ECE/IUPUI 4-22 11 Intro to Computer Communication Networks Concentration Numerous users and expensive trunks. Infrequently used customer lines Dual goals n Maximize the utilization of the shared trunks n Maintain an acceptable blocking probability Undeterministic and random manner of connection requests n Modeling with mathematic n Probability and statistics n Infinite number of customers Poisson Process n Independent trial n Timely process Many User Fewer Lines Trunks ECE/IUPUI 4-23 Intro to Computer Communication Networks Principle of Poisson Process, 1 l = arrival rate (call/second) E[X ] = expected holding time (second/call) m = l × E[X ], mean load to the sytem (Erlang) n = the number of trunks p = m / n, probabilit y of one occupancy Ek = event of k occupied trunks P(En) = blocking probabilit y all trunks busy N(t) t ECE/IUPUI 4-24 12 Intro to Computer Communication Networks Principle of Poisson Process, 2 n n 0 n - p n -np -m P(E ) = çæ ÷ö(1- p) p = (1- p) » (e ) = e = e , for small p 0 è0ø ænö ç ÷(1- p) n-k p k P(E ) çk ÷ n -k +1 p R(k ) = k = è ø = × P(E k -1 ) æ n ö n-k +1 k -1 k 1- p ç ÷(1- p) p èk -1ø
Recommended publications
  • GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms
    GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms AAL – ATM Adaptation Layer ADPCM – Adaptive Differential Pulse Code Modulation ADSL – Asymmetric Digital Subscriber Line AIN – Advanced Intelligent Network ALI – Automatic Location Information AMA - Automatic Message Accounting ANI – Automatic Number Identification ANSI –American National Standards Institute API – Applications Programming Interface ATM – Asychronous Transfer Mode BHCA – Busy Hour Call Attempts BHCC – Busy Hour Call Completions B-ISDN – Broadband Integrated Services Digital Network B-ISUP – Broadband ISDN User’s Part BLV – Busy Line Verification BNS – Billed Number Screening BRI – Basic Rate Interface CAC – Carrier Access Code CCS – Centi Call Seconds CCV – Calling Card Validation CDR – Call Detail Record CIC – Circuit Identification Code CLASS – Custom Local Area Signaling CLEC – Competitive Local Exchange Carrier CO – Central Office CPE – Customer Provided/Premise Equipment CPN – Called Party Number CTI – Computer Telephony Intergration DLC – Digital Loop Carrier System DN – Directory Number DSL – Digital Subscriber Line DSLAM – Digital Subscriber Line Access Multiplexer DSP – Digital Signal Processor DTMF – Dual Tone Multi-Frequency ESS – Electronic Switching System ETSI - European Telecommunications Standards Institute GAP – Generic Address Parameter GT – Global Title GTT – Global Title Translations HFC – Hybrid Fiber Coax IAD – Integrated Access Device IAM – Initial Address Message ICP – Integrated Communications Provider ILEC
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Introduction to Telecommunication Network
    Fathur Afif Hari Gary Dhika April Mulya Yusuf AB A A A AB AB AB AB Anin Rizka A B Dion Siska Mirel Hani Airita AB AB AB AB AB www.telkomuniversity.ac.id Public Switch Telephone Network The Access Course Number : TTH2A3 CLO : 1 Week : 2 www.telkomuniversity.ac.id How do we connect telephone? One to One One to Two www.telkomuniversity.ac.id How do we connect telephone? Two to Two www.telkomuniversity.ac.id How do we connect telephone? www.telkomuniversity.ac.id How many copper cable needed for each line? Basically, only 2: • TD (Transmit Data) • RD (Receive Data) www.telkomuniversity.ac.id PSTN (Public Switch Telephone Network) • PSTN consists of groups of local networks, connected by long distance network • Main element of local network is customer premises equipment (CPE), copper cable that connect customer (subscriber) to local switch through main distribution frame (MDF). www.telkomuniversity.ac.id What are main characteristics of PSTN? • Analog, able to transfer 300-3400 Hz or 64 kbps • circuit-switched = with handshaking + dedicated path • Fixed station, limited mobility • Foundation of all telecommunication standard easy integration with ISDN, PLMN, PDN www.telkomuniversity.ac.id Three main networks in PSTN 1. Backbone network core network, connects all local exchange (switching unit within local network) 2. Access Network – connect subscriber to local exchange – Four types of access network: • Access Network with Copper • Access Network with Radio • Access Network with Fiber Optic • Access Network with Hybrid Fiber Coax (HFC) 3. Interconnection Network special backbone network, connect other licensed operator www.telkomuniversity.ac.id Three main networks in PSTN 1.
    [Show full text]
  • A Life Cycle Assessment of Fibre Optic Submarine Cable Systems Craig
    Twenty thousand leagues under the sea: A life cycle assessment of fibre optic submarine cable systems Craig Donovan Stockholm 2009 KTH, Department of Urban Planning and Environment Division of Environmental Strategies Research – fms Kungliga Tekniska högskolan Degree Project SoM EX 2009 -40 www.infra.kth.se/fms Twenty thousand leagues under the sea: A life cycle assessment o f fibre optic submarine cable systems Abstract Submarine cables carry the vast majority of transcontinental voice and data traffic. The high capacity and bandwidth of these cables make it possible to transfer large amounts of data around the globe almost instantaneously. Yet, little is known about the potential environmental impacts of a submarine cable from a life cycle perspective. This study applies Life Cycle Assessment (LCA) methodology to collect and analyse the potential environmental impacts of a submarine cable system within a single consistent framework. The system boundary is drawn at the limits of the terminal station where the signal is transferred to, or from, the terrestrial network. All significant components and processes within the system boundary have been modelled to account for the flow of resources, energy, wastes and emissions. Data quality analysis is performed on certain variables to evaluate the effect of data uncertainties, data gaps and methodological choices. The results highlight those activities in the life cycle of a submarine cable that have the largest potential environmental impact; namely, electricity use at the terminal station and cable maintenance by purpose-built ship. For example, the results show that 7 grams of carbon dioxide equivalents (CO 2 eq.) are potentially released for every ten thousand gigabit kilometres (10,000Gb·km), given current estimations of used capacity.
    [Show full text]
  • Cellular Technology.Pdf
    Cellular Technologies Mobile Device Investigations Program Technical Operations Division - DFB DHS - FLETC Basic Network Design Frequency Reuse and Planning 1. Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. 2. It uses radio frequencies (radio channels) over and over again throughout a market with minimal interference, to serve a large number of simultaneous conversations. 3. This concept is the central tenet to cellular design and is called frequency reuse. Basic Network Design Frequency Reuse and Planning 1. Repeatedly reusing radio frequencies over a geographical area. 2. Most frequency reuse plans are produced in groups of seven cells. Basic Network Design Note: Common frequencies are never contiguous 7 7 The U.S. Border Patrol uses a similar scheme with Mobile Radio Frequencies along the Southern border. By alternating frequencies between sectors, all USBP offices can communicate on just two frequencies Basic Network Design Frequency Reuse and Planning 1. There are numerous seven cell frequency reuse groups in each cellular carriers Metropolitan Statistical Area (MSA) or Rural Service Areas (RSA). 2. Higher traffic cells will receive more radio channels according to customer usage or subscriber density. Basic Network Design Frequency Reuse and Planning A frequency reuse plan is defined as how radio frequency (RF) engineers subdivide and assign the FCC allocated radio spectrum throughout the carriers market. Basic Network Design How Frequency Reuse Systems Work In concept frequency reuse maximizes coverage area and simultaneous conversation handling Cellular communication is made possible by the transmission of RF. This is achieved by the use of a powerful antenna broadcasting the signals.
    [Show full text]
  • Kidsdictionary.Pdf
    Access Charges: This is a fee charged by local phone companies for use of their networks. Amplitude Modulation (AM) that's the "AM" Band on your Radio: A signaling method that varies the amplitude of the carrier frequencies to send information. The carrier frequency would be like 910 (kHz) AM on your AM dial. Your radio antenna receives this signal and then decodes it and plays the song. Analog Signal: A signaling method that modifies the frequency by amplifying the strength of the signal or varying the frequency of a radio transmission to convey information. Bandwidth The amount of data passing through a connection over a given time. It is usually measured in bps (bits-per- second) or Mbps. Broadband Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information. More services can be provided through broadband in the same way as more lanes on a highway allow more cars to travel on it at the same time. Broadcast To transmit (a radio or television program) for public or general use. In other words, send out or communicate, especially by radio or television. Cable A strong, large-diameter, heavy steel or fiber rope. The word history of cable derives from Middle English, from Old North French, from Late Latin capulum, lasso, from Latin capere, meaning to seize. Calling Party Pays A billing method in which a wireless phone caller pays only for making calls and not for receiving them. The standard American billing system requires wireless phone customers to pay for all calls made and received on a wireless phone.
    [Show full text]
  • The Study on Telecommunications Development Plan, Ethiopia
    The Study on Telecommunications Development Plan, Ethiopia CHAPTER 9 TELECOMMUNICATIONS NETWORK PLAN 9.1 Basic Concept of Proposed Network Plan The study of the Proposed Network Plan should necessarily include a broad range of factors, from the expected national socio-economic develpment, government policy to resource availability. Of particular importance are demands of the various services, including those services not available at present, and the extent of financial resources. Other important consideratios include the existing network, transition strategies, interworking with other networks, operation and maintenance, administrative structure, numbering, signalling and other fundamental plans. 9.1.1 Fundamental Network Plan The Network Master Plan is proposed considering: 1) The network is designed considering economical deployment and ease of operation and maintenance. 2) The proposed network will be deployed utilizing the latest technologies at present. 3) The network will be able to accommodate expected demand of existing and new application of basic telephone and non-telephone services that interface to the conventional networks. 4) The network should facilitate the development of ICT (Information and Communication Technology) covering the major areas of Ethiopia. 9.1.2 Evolution of Existing Network to IP Some countries have introduced IP telephony to converge the telephone network and data communication network. In order to utilze the accumulated assets economically and efficiently, the existing switching systems (PSTN) should
    [Show full text]
  • (Gmrs) and Networked (Linked) Repeaters
    ANALYSIS OF OLD & NEW RULES & REGULATIONS FOR THE GENERAL MOBILE RADIO SERVICE (GMRS) AND NETWORKED (LINKED) REPEATERS By P. Randall Knowles, J.D., KAA 8142 Approach to reviewing new version of FCC Rules for GMRS. We all have our own predispo- sitions and preferences what we think should be the nature of operation in GMRS. However, as is commonly the case when lawyers seek to interpret regulatory language, one should look at the commonly understood meaning of the actual language involved, including, in this case, all of the various relevant sections of the Rules in Part 95. Looking outside of the 4 corners of the GMRS Rules themselves for FCC intent is only justified if there is inherent ambiguity in the actual regu- latory language. Remote Control. The FCC Rules for GMRS have authorized “Remote Control” of GMRS Base (including “repeater”) stations for many decades. But this has been limited by the FCC, more re- cently starting in 1978, when the Commission acted to change the Rules to absolutely ban tele- phone interconnection. The background of this action began in August 1977 at the REACT International Conven- tion in Dallas Texas. When Dallas area REACT groups attempted to set up a repeater, it was discovered that a local radio shop had set up repeaters on all 8 channels with telephone “auto- patch”. This totally usurped all of GMRS in the area for one radio shop’s mobile telephone opera- tions. It took action by the FCC’s Field Operations Bureau to end this abuse, but the action was made more difficult because there was no specific GMRS rule preventing “autopatch”.
    [Show full text]
  • Bibliography on Videotelephony and Disability 1993-2002
    Stockholm Institute of Education The Disability and Handicap Research Group Bibliography on Videotelephony and Disability 1993-2002 Magnus Magnusson & Jane Brodin Research Report 36 ISSN 1102-7967 Technology, Communication, Handicap ISRN 1102-HLS-SPEC-H-36-SE FOREWORD This report is part of the work at the FUNKHA-group at Stockholm Institute of Education, The Disability and Handicap Research Group It is also a complement to an earlier report published in 1993 within the European project RACE 2033 (Research in Advanced Communications Technologies in Europe), TeleCommunity. The earlier report was a compilation of references collected from nine databases on the subject of videotelephony. That report presented comments on 190 references from 20 years of publication, most of them related to disability. It is still available and the information is still valid. The present report wishes to follow up on that earlier study, almost exactly a decade later. We have made similar literature searches in similar databases. The main difference between the present and the earlier report is the fact that the field is more difficult to grasp today because there are more information sources, expecially the Internet itself which did not exist in any extensive form at that time. This means that the present report is more focussed on projects and activities and less on formal research reports and papers. The final result in numbers, however, was almost the same as in the first study in 1993, a total number of 188 formal references. We have tried to give a short and condensed picture of the situation as we see it in the world today in this very special, promising and dynamic field.
    [Show full text]
  • Officesuite UC® PUTTING ALL YOUR OFFICESUITE® FEATURES to USE to BE MORE EFFICIENT
    User Guide OfficeSuite UC® PUTTING ALL YOUR OFFICESUITE® FEATURES TO USE TO BE MORE EFFICIENT CONTACT SUPPORT To access the community, go to the Support tab Just click on Live Help on top of the on the MyOfficeSuite Dashboard or visit MyOfficeSuite Dashboard http://community.broadviewnet.com http://MyOfficeSuite.broadviewnet.com Table of Contents Quick Start Guide .....................................................................................3 Using Your Phone ................................................................................4 Using Features Through the MyOfficeSuite Portal ......................................6 Installing Your Phone .................................................................................9 Using Your OfficeSuite® Phone ......................................................................10 Activating Your Phone .........................................................................10 Making Calls ....................................................................................10 Setting Up Voicemail ...........................................................................10 Using the System from the MyOfficeSuite Portal ............................................13 Listening to Voicemail ..........................................................................15 Setting Up Speed Dials .........................................................................17 Forwarding Calls ...............................................................................19 Searching and Adding Contacts
    [Show full text]
  • “Picturephone”
    An article on “Picturephone” Museum of Electrical Engineering Gathered by: Amir Fotovvat A brief history As far back as the 1930s, researchers at AT&T’s Bell Labs built a device that sent a television signal over standard phone lines. However, it had a problem; it was not efficient and practical enough to be used by people around the world. 34 years later AT&T’s Picturephone, introduced as a futuristic demonstration at the New York World’s Fair. There were eight Picturephone booths at the fair and visitors could use them for making video telephone calls. It seemed to many at Bell Labs and at AT&T that universal video telephony was a worthwhile new mission. Thus in 1969 Annual Report, AT&T confidently predicted with perhaps one million sets in use, Picturephone service might be a billion dollar business by 1980. They were thinking that it can largely utilized by businesses-particularly by large corporations then it would spread gradually into the residential market. On June 30, 1970, AT&T finally uncloaked a commercial Picturephone service in the city of Pittsburgh, Pennsylvania. Then after a couple of months they made three more available — one in New York, one in DC, and one in Chicago. The three machines could only communicate with one another and were extremely expensive, costing between $16 and $27 (that is $118 to $200 when adjusted for inflation) for just three minutes. The interesting statistics is that in the next 6 months Just 71 calls were made. Despite these setbacks over the next few years, Bell Labs designed an improved Picturephone set.
    [Show full text]
  • Telephony Implications of Voice Over Internet Protocol
    U.S. Department of Justice Office of Justice Programs National Institute of Justice IN SHORT ➡TCOWARD RIMINAL JUSTICE SOLUTIONS www.ojp.usdoj.gov/nij FEB. 06 NCJ 212976 Telephony Implications of Voice over Internet Protocol Key Points ■ Voice over Internet Protocol technology allows ■ Traditional techniques for emergency location voice communications to be transported digi­ services at public safety answering points as tally through a network using Internet well as methods for telephone intercepts and Protocol (IP) standards. electronic surveillance (wiretaps) are ineffec­ ■ Commercial IP-based telephony services are tive or are not functional with IP-based quickly proliferating as an alternative to tradi­ telephony. tional wire-line consumer telephony services. Voice over Internet Protocol (VoIP) communications Many free, or nearly free, personal computer/ refers to all types of conversational voice informa­ PDA-based VoIP telephony applications are readily tion including landline voice (telephony) or voice available for download and use via the Internet. from a land mobile radio system. VoIP-based tele­ Application developers take advantage of abundant phony is one of the fastest growing telecom tech­ online network capacity to facilitate free Internet- nology sectors. Two VoIP categories are particularly only voice calls with optional access to the public- relevant to public safety: VoIP telephony on public switched telephone network for a modest fee. telephone networks and VoIP technology within Devices with VoIP software can communicate public safety radio systems. nomadically, functioning at any location where network access is available. VOIP MARKET TREND Many businesses and commercial telephony service PUBLIC SAFETY CONCERNS providers are migrating to IP-based infrastructure, Identifying 911 Emergency Calls.
    [Show full text]