Detailed functions of NGN User Access Technology

Source: Internet
Author: User
Tags passthrough

We have discussed the role of NGN User Access Technology in a comprehensive manner and the setting of "giving a full introduction to the specific role of NGN user access technology, the NGN user access technology provides us with solutions to most of the setup problems.

The Next Generation Network (NGN) is a comprehensive and open Network architecture, the service management application plane, business control plane, core exchange plane, and edge access plane are four different functional planes. They provide voice, data, multimedia, and other services on a unified group network. This technological innovation makes the user access method of NGN user access technology very flexible and diverse in application forms. In this paper, we combine Huawei U-SYS to describe various user access technologies that can be provided by NGN user access technology and their applications in different occasions. The focus is on the diversity of access-side applications and the flexibility of access-based applications.

Only POTS users can access the NGN user access technical network through AG or IAD. AG or IAD interacts with Softswitch through MGCP/H.248 protocol to realize the Call Control of users through SoftSwitch, at the same time, AG or IAD implements speech codec, media stream packaging and compression, mute detection, and basic Sound Receiving number and other media gateway functions to enable media stream intercommunication between POTS users and other users.

AG is used as the access method. Suitable for scenarios with large capacity and concentrated users, such as intensive residential areas and enterprise voice access. AG is convenient for local device management and maintenance, but AG downstream only has a twisted pair Cable interface. For scenarios where there are only five types of leased line resources or operators, the application is limited and distribution frames need to be set up in the data center, works with multiple lanswitches and other devices to achieve user access in a category-5 mode;

IAD is used as the access method. It is suitable for accessing voice services of local users with small capacity and scattered users. The IAD access method is flexible and suitable for a wide range of applications, such as home, corridor, desktop, and IP supermarkets. However, IAD is a terminal device, which is inconvenient for management and maintenance.

Through the Access Gateway AG or the FXO port of the integrated access device IAD, the gateway can communicate with the PBX through the AT0 loop relay. The traditional old-fashioned PBX mostly accesses the softswitch network through this method; method 4, 5, and 6: Access through the gateway AG, relay gateway TG, or the E1 interface of the integrated access device IAD, and communicate with the PBX through the HPA signaling or the No. 1 signaling, currently, the new PBX mostly accesses the softswitch network through this method. The above six access methods do not have special application requirements. They are used to select the corresponding access mode based on the user's actual network conditions.

V5 users can access the NGN user access technical network through the TMG8010 of the relay gateway. Two access modes are available: TMG8010 supports V5UA, and V5 signaling is transparently transmitted to SoftX3000 through TMG8010, the Softswitch is used to process V5 signaling and complete V5 user access. TMG8010 supports downstream V5 access. After TMG8010 ends V5 signaling, it is converted to H.248 and reported to the softswitch for processing, access V5 users.

For the voice access of traditional xDSL users, the DSLAM device enables comprehensive access to user-side voice and data, implements voice and data separation on the DSLAM device, and implements broadband access through the DSLAM uplink; after DSLAM, The ONU device connects to the PSTN network through V5 signaling.

When a user accesses a technical network through NGN, the voice and data are separated by the DSLAM device, and the data is connected through the DSLAM uplink broadband. The voice access can be implemented in the following ways: voice continues to be connected by The ONU device, but is not directly connected to the PSTN device. Instead, the V5UA gateway TMG8010 is connected to the softswitch, which is similar to the normal V5 user's access to the softswitch.

This solution is applicable to the evolution from a traditional access network to an NGN user access technology. The original switch access is changed to a Softswitch access. Method 3: The Access Gateway AMG5000 is connected to the softswitch network after the voice passes through DSLAM, same as that of common POTS users. This solution is applicable to the creation of a DSLAM community. When DSLAM is used to access broadband services, it also provides VoIP voice services with AG devices;

The Access Gateway AMG with the wide and narrow band comprehensive access function is used to connect voice users and support xDSL access to data. Voice access is connected to the softswitch network with common POTS users, and xDSL data is directly connected to the broadband data network after the AMG aggregation. This solution can be seen as an alternative to solution 3 in the future. AG provides wide and narrow band access in a unified manner;

IAD is used to achieve integrated access of voice and data. The IAD replaces the RTU of the ADSL user terminal mounted under the original DSLAM device to achieve integrated access of users. Voice and data packets are no longer differentiated on the DSLAM device after they are uplink through the IAD, and are directly passthrough to the broadband network bearer network. voice and data are connected to the voice and data services through their respective IP address headers. This solution is suitable for applications of families or small companies that only support twisted pair wires;

IAD is connected directly to the downstream RJ45 port of the RTU, and the data access of the original ADSL is used as the bearer channel of the IAD access. The access of IAD is the same as that of normal Ethernet access. The voice service directly completes encoding conversion, compression, packaging, and data packet uplink together on the IAD. For DSLAM, it is no longer necessary to distinguish whether the IAD comes up with data services or voice services.

You can directly upload the data as an IP packet and separate the data from the voice service by using the IP address self-addressing of the data packet header. For users who want to provide multimedia services or integrated media applications, they can also change the aforementioned IAD to an Ephone. The application principle is the same as that of IAD. The original RTU-mounted POTS phone is not affected, and the narrowband PSTN is still connected through the V5 interface. This solution is suitable for scenarios where twisted pair wires are used to meet broadband access needs, while multiple telephones are required, or the original narrowband network needs not to be modified, provides VoIP services directly on the existing data network;

The principle of this access method is similar to that of Method 6. However, replacing IAD with Ephone is a solution for how to access Ephone on DSL. This solution is suitable for domestic users who require DSL access for Ephone. As shown in figure 5, Ethernet users' voice access can be achieved using IAD or Ephone of different specifications.

IAD with RJ45 ports and ports at the same time is used for downlink access. This kind of IAD is convenient and natural, and can be directly connected to POTS and PCs to achieve broadband and voice user access. Voice access is similar to IAD access for common POTS users. Data Access is passthrough through the IAD to enter the broadband network. At this time, IAD is similar to a LanSwitch to complete data access. Ephone access is implemented using IP addresses, provides multimedia video functions or other personalized services;

IAD or AMG with only 11 downstream ports is used, which works with the LanSwitch device, change the wiring in the near-end distribution frame and install the distribution box in the user's home. Use the redundant lines in the five categories to split an RJ45 port into an RJ45 port and use the 1/2/3/6 lines) and a gossip 11 port using 4/5 of the two lines), to achieve a five-class line to the user's home PC and POTS at the same time access. If there is no need for a category-5 line entry, you can also directly use the twisted pair wire entry to solve pure speech applications;

Using IAD with corridor switch function, there are only five kinds of RJ45 ports in the downlink to achieve simultaneous access of voice and data. By installing a wire divider in the user's home, A RJ45 port is decomposed into an RJ45 port using the redundant lines in the cat-5e to take advantage of the four wires 1/2/3/6) and a gossip 11 port using 4/5 of the two lines) to achieve simultaneous access to the PC and POTS in the user's home. The above four access methods are selected based on the user's actual network conditions.

By using MTA or IAD, you can access OCs through interfaces RJ45 and ipv11, the local terminal accesses the Bearer Network of the NGN user access technical network through the access layer device cmts of the HFCs network. In this way, the HFCs broadband data access network is used as a pure access network, make full use of the existing market users who have already activated the broadband access service for the radio/TV network have CableModem, and a downstream network port is used for Internet access) and add an MTA or IAD, provides comprehensive voice and data services;

Using ETA embedded CableModem function) directly works with CMTS Based on DOCSIS interface specifications to complete data transmission based on the hfc-based network and access the Bearer Network of the NGN user access technology. This method is the development trend in the future, the user's terminal costs will be greatly reduced, and only one terminal can provide integrated access based on HPC.

Wireless Network Transmission is achieved through AP supporting WLAN 802.11 protocol, the local AP is connected to an Ethernet switch with up to M ports, the user-side AP is connected to IAD downstream, or other terminal devices with up to 5 categories, such as Ephone and IAD, to achieve wireless access for end users, and access the softswitch network system;

You can directly insert a NIC that supports the WLAN function into a PC or a host machine that has this function interface, and run SoftPhone on the computer, for example, Uniphone that supports the SIP protocol or OpenEye that supports the H.323 protocol ), achieve user access. This method is suitable for intensive office buildings and prosperous commercial centers.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.