A30808-X2799-X3-1-7618
Contents
1 2 2.1 2.2 2.3 3 3.1 3.2 3.3 4 4.1 4.1.1 4.1.2 4.2 4.2.1 4.2.2 5 5.1 5.2 5.3 5.4 6 6.1 6.2 7 8 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 User-Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reference Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Basic Access and Primary Rate Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . Functional Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OSI Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Communication Between the Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protocol Architecture in the B and D Channels. . . . . . . . . . . . . . . . . . . . . . 7 7 8 9
10 11 11 13
Physical Layer (Layer 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Basic Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Reference Point S/T Between Terminal Equipment and the Network Termination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Reference Point U Between the Network Termination and the Exchange . 17 Primary Rate Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2048-kbit/s Primary Rate Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 1544-kbit/s Primary Rate Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Data Link Layer (Layer 2 of DSS1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Layer 2 Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Commands and Responses and their Functions . . . . . . . . . . . . . . . . . . . . Assignment of the Terminal Endpoint Identifier . . . . . . . . . . . . . . . . . . . . . 19 19 24 26 28
Network Layer (Layer 3 of DSS1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Message Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Use of Layer 3 Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Example of a Complete DSS1 Message. . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Illustrations
Fig. Fig. Fig. Fig. 1.1 1.2 2.1 2.2 Signaling in ISDN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 ISDN subscriber line types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Reference configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 ISDN basic access with more than one terminal device (in this case eight) 8 Examples of connections between ISDN subscribers and an exchange via basic access (2 B+D) and primary rate access (30 B+D or 23 B+D). . . . 9 The seven layers of the OSI reference model . . . . . . . . . . . . . . . . . . . . 11 Communication between entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
A30808-X2799-X3-1-7618
Fig. 3.3 Fig. 3.4 Fig. 3.5 Fig. 3.6 Fig. 4.1 Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. Fig. 4.2 4.3 5.1 5.2 5.3 5.4 5.5 5.6 6.1 6.2 6.3 6.4 6.5 7.1
Forwarding signaling information via the D channel (in this case from a terminal to the exchange) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Protocol architecture for the transfer of user information on the B channel 14 Protocol architecture for the transfer of signaling information on the D channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Example of a protocol architecture in ISDN terminals . . . . . . . . . . . . . . 15 Basic access pulse frame structure between TE and NT with possible pseudo-ternary values for the individual bits. . . . . . . . . . . . . . . . . . . . . . 17 Pulse frame structure of the 2048-kbit/s primary rate access . . . . . . . . . 18 Pulse frame structure of the 1544-kbit/s primary rate access . . . . . . . . . 19 Layer 2 frame structure with and without an information field. . . . . . . . . 21 Address field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Control field formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Example of accessing terminals with a layer 2 address (SAPI+TEI) from the exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Handling the sequence numbers for acknowledged information transfer27 Assignment of a TEI or denial of assignment . . . . . . . . . . . . . . . . . . . . . 28 Structure of a DSS1 message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Call reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Information elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Example of an information element with the called party number . . . . . 35 Connection setup (principle for digit selection) . . . . . . . . . . . . . . . . . . . . 36 A complete message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Tables
Tab. 5.1 Tab. 5.2 Tab. 5.3 Tab. 5.4 Tab. 5.5 Tab. 5.6 Tab. 6.1 Tab. 6.2 Tab. 6.3 Meaning of the command/response bit. . . . . . . . . . . . . . . . . . . . . . . . . . 22 Defined information classes of the service access point identifiers . . . . 22 Defined applications of the terminal endpoint identifiers. . . . . . . . . . . . . 23 Commands and responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Tasks of the commands and responses of the S frames . . . . . . . . . . . . 27 Tasks of the SABME and DISC commands and of the UA and DM responses of the U frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Protocol discriminator codes and their meanings . . . . . . . . . . . . . . . . . . 31 Codes for the message types for call setup, call cleardown and miscellaneous messages as defined in CCITT Recommendation Q.391. . . . . . . 32 Codes for the message types for supplementary services as defined in CCITT Recommendation Q.932 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
A30808-X2799-X3-1-7618
1 Introduction
In view of the wide range of services and features offered in the integrated services digital network (ISDN), a very high-capacity signaling system, more so than those used for conventional communication systems, is needed to handle signaling functions between the exchanges and between the exchanges and the terminal equipment/telecommunication systems The International Telegraph and Telephone Consultative Committee (CCITT) has specified two systems (see Fig. 1.1) for transmitting the signaling information (control information) in the ISDN: common channel signaling system no. 7 (CCS7) for use between exchanges (see topic 8) digital subscriber signaling system no.1 (DSS1, previously known as the D channel protocol) for use between exchanges and the terminal equipment; this system is the subject of this document.
DSS1
CCS7
DSS1
Exchange
Exchange
PABX
Fig. 1.1
Signaling in ISDN
For certain supplementary services these two systems also permit end-to-end signaling between subscriber terminal equipment. This topic document is based on the relevant CCITT Recommendations (Blue Book). In order to ensure that, say, speech and signaling information or text and signaling information can be transmitted simultaneously in ISDN with no mutual interference, separate channels are provided, known as the B channels and the D channel. The B channels carry speech, text, data and images whereas the D channel is used exclusively for signaling. CCITT has specified two types of ISDN access line (Fig. 1.2): the basic access a basic access has two B channels and one D channel the primary rate access for PABXs; a primary rate access has 30 or 23 B channels and one D channel
A30808-X2799-X3-1-7618
B B D
64 kbit/s speech, text, data, images 64 kbit/s speech, text, data, images 16 kbit/s signaling, low transfer rate data
a) Basic access
B D B
64 kbit/s speech, text, data, images 64 kbit/s signaling, low transfer rate data 64 kbit/s speech, text, data, images
Fig. 1.2
The separate D channel has a very high capacity and is permanently available. Its transmission capacity is such that it can handle not only the signaling information but also low transfer rate data such as packet data, telemetry data and user-user information. Priority is always given to signaling information. The D channel transfers signaling information and data irrespective of the busy/idle status of the B channels, which means, for example, that a subscriber can be simultaneously sending a fax on one B channel and making a telephone call on the other B channel while the directory number of a calling subscriber is displayed on his terminal. This directory number is transmitted via the D channel. Access to the D channel is assured at all times from all terminal equipment and from the exchange. The principal features of DSS1 are as follows: internationally standardized very high integrity and exibility suitable for all communication services (telephony, facsimile, teletex, data transfer etc.) short reaction times future-proof to accommodate new requirements. For communication between terminal equipment and between terminal equipment and the exchanges, DSS1 is based on dened characteristics of the user-network interface (Section 2) the Open System Interconnection (OSI) reference model (Section 3).
A30808-X2799-X3-1-7618
2 User-Network Interface
2.1 Reference Conguration
One of the principal requirements that have to be met before ISDN can be introduced is that the system must be digital up to and including the terminal equipment. For the subscriber access line the CCITT has defined functional groups with intermediate reference points (see Fig. 2.1). This arrangement defines the tasks that the individual subscriber and exchange functional groups have to perform so that compatibility is assured between different exchanges and terminal equipment
Access line U
Exchange equipment V
Functional groups
Fig. 2.1
Reference configuration
CCITT defines the user-network interface both for the basic access and for the primary rate access. These specifications are based on the OSI reference model (Section 3). They relate not only to the physical characteristics of such interfaces but also, for example, to access options and protocols. In particular, the defined interfaces guarantee the following: use of different terminal equipment for different services portability of terminal equipment independent development of the technologies, congurations and installations for terminal equipment and networks cost-effective connection to specialized storage and data processing media and to other networks. The user-network interface can cover reference points S and T, as follows: if a type 2 network termination (NT2, e.g. a PABX) is installed, the user-network interface is at reference point T if there is no NT2 installed, reference points S and T coincide (reference point S/T) and the user-network interface is then effectively at reference point S. This means that the presence or absence of an NT2 determines the location of the usernetwork interface; generally speaking this will be the same user-network interface in both cases. CCITT does not specify the interface at reference point U but does represent the connection between network termination 1 (NT1) and the exchange as a digital transmission system (CCITT Recommendation G.961).
A30808-X2799-X3-1-7618
2.2
Reference points
S/T
Multiservice terminal
Fax terminal
Teletex terminal
X.21 bis
TA X.21 bis
X.21
TA X.21
X.25
TA X.25
Fig. 2.2
ISDN basic access with more than one terminal device (in this case eight)
The primary rate access with the channel structure 30 or 23 B+D is used for point-topoint connections between medium- to large-size PABXs and the exchange. The trans-
A30808-X2799-X3-1-7618
mission path via the U interface is provided by two balanced wire pairs of a lowfrequency cable, optical waveguides or radio relay routes. If a PABX is used the interfaces at reference points S and T may be different. The subscribers, for example, may be connected to the PABX via basic access (reference point S) and the PABX may be linked to the exchange via primary rate access (reference point T). Depending on their size, PABXs can be connected to an exchange via basic and primary rate access (Fig. 2.3) via basic access only via primary rate access only
Network termination equipment Access lines U 2 B+D Exchange equipment
S/T
a)
NT1
LT
ET
b)
NT1
2 B+D
LT
ET
c) Both a) and b)
1)
LT
ET
2 B+D S T
1)
LT
ET
d) PABX
NT1
2 B+D
LT
ET
NT1
30 B+D 2)
LT
ET
Direct connection to the exchange with a single terminal (single device port, a) with more than one terminal via a passive bus (multiple device port, b).
Via remote concentrators (in most cases connection to the exchange is implemented with digital transmission links, c). Via PABXs (d).
Fig. 2.3
Examples of connections between ISDN subscribers and an exchange via basic access (2 B+D) and primary rate access (30 B+D or 23 B+D)
2.3
Functional Groups
The functional groups (Fig. 2.1) of an ISDN access are described in brief below:
A30808-X2799-X3-1-7618
ISDN terminal equipment (TE1, terminal equipment type 1) A TE1 is equipped with the protocols relevant to the interface at reference point S and can be connected directly to the passive bus. Non-ISDN terminal equipment (TE2, terminal equipment type 2) In contrast to TE1, a TE2 has a conventional interface (e.g. a/b, X.21, X.25, V.24) and can be connected to the passive bus only via an appropriate terminal adapter. Terminal adapter (TA) The terminal adapter enables conventional non-ISDN terminal equipment to be used in the ISDN by adapting conventional interfaces to protocols of the interface at reference point S. Network termination (NT) A network termination may consist of two components (NT1 and NT2). Network termination 1 (NT1) ensures that the terminal equipment is physically matched to the exchange access line. It also enables the access line to be shared by more than one terminal. In addition, an NT1 can support centralized maintenance irrespective of the operating state of the subscriber equipment (test loop) and report transmission quality criteria to the exchange. The NT2 option contains switching functions, in other words it can be a PABX. If no such NT2 functions are needed then NT2 is not installed (zero NT2). Line termination (LT) An LT terminates an access line in the exchange as far as transmission is concerned. Depending on whether it is used for a basic access or a primary rate access it can perform functions such as feeding the NT or the intermediate regenerators, providing test loops, signal regeneration and code conversion. Exchange termination (ET) An ET terminates an access line in the exchange as far as control is concerned; user and signaling information pass via the exchange termination. In the exchange it handles the protocol of the data link layer (layer 2 of the OSI reference model, see Sections 3 and 5) of DSS1. If necessary, the signaling information received by the terminal equipment is converted into a different format before being further processed outside the ET. LTs and ETs may be integrated in a single functional unit.
10
A30808-X2799-X3-1-7618
3.1
The Layers
The OSI reference model assigns the necessary communication functions to seven layers (Fig. 3.1). Layers 1 to 7 of an open system are arranged in a vertical hierarchical structure. A lower layer, possibly supported by a layer or layers beneath it, provides certain defined services for the layer above it (if it exists). This applies to all layers from 1 to 7. The functions of the lower layers are fundamental to the functions of the higher levels. The functions of layers 1 to 7 are defined in CCITT Recommendation X.200. The principal tasks of the seven layers are as follows: Layer 1:Controls the physical transmission medium Layer 2:Ensures data transfer via the links Layer 3:Establishes and switches the entire network connection Layer 4:Provides an end-to-end transport service Layer 5:Controls the end-to-end communication link Layer 6:Creates a form of presentation for data communication which is not userand device-dependent Layer 7:Controls user-specic communication
Communication functions
Application layer Presentation layer Session layer OSI reference model Transport layer Network layer Data link layer Physical layer
7 6 5 4 3 2 1
Fig. 3.1
The design of the physical connection paths (copper wires, coaxial cable, optical waveguides, radio relay links or satellite links) needed to transfer user and signaling information is not described in layer 1 of the OSI reference model. Although the stipulations of the OSI reference model are valid for all seven layers, only layers 1, 2 and 3 are described in detail below since only these three layers are relevant to DSS1. References to the higher layers are included for the sake of completeness only.
3.2
A30808-X2799-X3-1-7618
11
Within a terminal two vertically adjacent entities communicate, in an abstract sense, by means of service primitives in order to make use of the services of the layer below (if there is such a layer) so that it can perform its own services and make its services available to the layer above. Entities in one terminal can only communicate with entities of the same layer in other terminals (horizontal communication). These communicating entities in different terminals are called peer entities. Communication between peer entities is regulated by a protocol. Peer entities may be in the same open system or in different open systems. Fig. 3.2 shows an example of peer entities of layers 1 to 3 for DSS1 between a terminal equipment and an ISDN exchange. The peer entities involved exchange information in the form of protocols with protocol elements (dotted lines). Logical connections are set up for communication in the horizontal direction. The physical connections, however, all pass via the D channel (layer 1). The service primitives are used for communication in the vertical direction via the entities.
Terminal equipment Layer 3 Entity of the network layer Layer 3 protocol (logical connection) Service primitives
Service primitives
Service primitives
Service primitives
D channel
Fig. 3.2
Example: Forwarding of signaling information from a terminal equipment to the ISDN exchange. With the aid of service primitives as the means of communication, the signaling information in a terminal equipment, for example, passes step by step from the layer 3 entity to the layer 2 entity and then to the layer1 entity (Fig. 3.3). The layer 3 and 2 entities add appropriate protocol elements to the signaling information which are needed for performing the tasks in question (see Sections 5 and 6). The layer 1 entity does not add any protocol elements as such but does have recourse to a simple protocol (see Section 4). It sends a bit stream containing the signaling information and the protocol elements to the layer 1 entity in the exchange. Layers 1 to 3 in the exchange check the information received for formal correctness with the aid of their respective protocols. When it has
12
A30808-X2799-X3-1-7618
performed its check and removed its own protocol elements each layer passes the information to the next higher layer or to the signaling application.
P3
Signaling
P=Protocol element
P3
Signaling
P2
P3
Signaling
P2
P2
P3
Signaling
P2
D channel
P1
P2
P3
Signaling
P2
Fig. 3.3
Forwarding signaling information via the D channel (in this case from a terminal to the exchange)
3.3
A30808-X2799-X3-1-7618
13
Terminal equipment
Terminal equipment
CCITT Recommenda -tion I.430 (basic access) or I.431 (primary rate access)
B channel
B channel
Fig. 3.4
CCITT has defined layers 1 to 3 for ISDN to provide secure transfer of signaling information and low transfer rate data on the D channel (see Sections 4 to 6). Fig. 3.5 shows how the layers are distributed for the exchange of signaling information between two terminal equipments. For the transfer of low transfer rate data on the D channel the application-oriented layers (4 to 7) have, at most, only an end-to-end function between the terminals.
Terminal equipment ISDN Terminal equipment
CCITT Recommendations Q.930/I.450 and Q.931/I.451 Q.920/I.440 and Q.921/I.441 I.430 (basic access) or I.431 (primary rate access) DSS1
Layer 3 2 1
Layer 3 2 1
Exchange
Exchange
Layer 3 2 1
Layer 3 2 1
D channel
D channel
Fig. 3.5
The complete protocol architecture in an ISDN terminal for communication via the B and
14
A30808-X2799-X3-1-7618
D channels is shown in Fig. 3.6, using a multiservice terminal connected to a basic access as an example. The relevant CCITT Recommendations are included in the diagram.
Low transfer rate data High-level protocols for low transfer rate data
Service 1
Service 2
Layer 7 6
5 4 3 2 This signaling application is controlled by services 1 and 2 and low transfer rate services
Basic access
Fig. 3.6
A30808-X2799-X3-1-7618
15
4.1
4.1.1
Basic Access
Reference Point S/T Between Terminal Equipment and the Network Termination
CCITT Recommendation I.430 provides for one 16-kbit/s D channel and two 64-kbit/s B channels for both directions of transmission between the terminal equipment (TE) and the network termination (NT) of a basic access. Transmissions between TE and NT take place in full duplex mode at a bit rate of 192 kbit/s. The pulse frames used contain 48 bits each and have a total transmission time of 250 ms. In one second 4000 such pulse frames are transmitted (48 bits 4000/s = 192 kbit/s). Four of the 48 bits of each pulse frame (D bits) constitute the D channel (4 bits 4000/s = 16 kbit/s). Within the pulse frame the D bits occupy bit numbers 12, 25, 36 and 47 (Fig. 4.1). In the direction of transmission from the NT to the TE there are also four E bits which form a D echo channel (4 bits 4000/s = 16 kbit/s). The bit numbers of the E bits in such a pulse frame are 11, 24, 35 and 46. The D echo channel is used to control TE access to the D channel (collision detection, see below). The decisive factor for setting the time difference between the receive pulse frame and the transmit pulse frame is the reception of the first bit of each pulse frame (F bit) at the TEs. On this basis the terminal equipment involved sends the pulse frames in the direction of the NT with an offset of 2 bits. A pseudo-ternary code is used for the transmission of pulse frames between the TE and the NT. In this code the binary values of "1" are transmitted at zero voltage and binary values of "0" alternately at positive and negative voltage. Two intentional code violations are used for pulse frame detection. 1st code violation: The L bit (bit number 2) and the first zero bit after the L bit (but no later than the FA bit (bit numbers 3 to 14)) are both transmitted at negative voltage. 2nd code violation: The last zero bit of a pulse frame and the following F bit (bit number 1) of the next pulse frame are both transmitted at positive voltage. To ensure satisfactory transmission of information (from the TE to the NT) via a passive bus, ordered access to the D channel is assured for each TE in a multi-device configuration. Defined priorities ensure that transmission of the signaling information takes preference over all other forms of information (packet data, telemetry data, user-user information). Before information is transmitted on the D channel a TE must check for the idle state (permanent binary "1" on the D echo channel). If information is transmitted simultaneously from two or more TEs there is a mechanism to ensure that only one TE can complete transmission (D channel contention resolution). For this purpose, the NT loops back the D channel bits received from the TE (D bits) to the TEs on the D echo channel (E bits). The TEs compare the bit received on the D echo channel with the last D bit sent (see arrows in Fig. 4.1). If a TE ascertains that the bits sent and received are the same it continues sending information; if, however, it finds that they are not the same (binary "0" = positive or negative voltage instead of binary "1" = zero voltage) it immediately stops sending information (collision detection). The other TE continues to transmit. TEs which interrupt transmission have to wait for the next opportunity to transmit via the D channel.
16
A30808-X2799-X3-1-7618
250 s
Bit numbers 1 D + 0 2-bit offset L F
From NT to TE
2 L 3 4
B1 B1
10
11 12 13 14 15 16 17 D A FA N B2 B2
B1 E
23 24 25 26 27 28 B2 E D M B1 B1
34 35 36 37 38 39 B1 E D S B2 B2
45 46 47 48 B2 E D L F L
+ 0 D L F 1 L 2 B1 B1 3 4
Bit numbers
11 12 13 14 15 16 17
23 24 25 26 27 28
34 35 36 37 38 39
45 46 47 48
From TE to NT Key to bits A B1, B2 D E F FA L M N S Activation bit Bit on the B1 or B2 channel Bit on the D channel Bit on the echo channel Frame detection bit Additional frame detection bit, here set to binary 0 in both directions because multiframes are not used DC compensation bit Multiframe bit Bit with binary value FA, therefore set to binary 0 Not yet defined; set to binary 0 Markers of frame sections which are independently dc balanced
Fig. 4.1
Basic access pulse frame structure between TE and NT with possible pseudo-ternary values for the individual bits
4.1.2
A30808-X2799-X3-1-7618
17
bits of a binary signal can be represented by three ternary signal elements, and with the 2B/1Q code two bits of a binary signal by one quaternary signal element. The transmission speed on the subscriber line is reduced by 25% and 50% respectively compared with the equivalent binary signal: an information signal with a total bit rate of, say, 160 kbit/s (2 B+D + synchronization and control information) is transferred on the subscriber line at 120 kbaud (4B/3T code) or 80 kbaud (2B/1Q code).
4.2
4.2.1
Bit number Channel time slot 0 Channel time slot 1 Channel time slot 2
B channel 30
Fig. 4.2
18
A30808-X2799-X3-1-7618
4.2.2
1 F bit
Bit number Bit time slot Channel time slot 1 Channel time slot 2
B channel 23 D channel
Fig. 4.3
5.1
Frame
The layer 2 frame structure with and without the information field is shown in Fig. 5.1.
A30808-X2799-X3-1-7618
19
The frames are used for activating and deactivating layer 2, for transferring layer 3 information and for performing internal layer 2 control and supervision functions. The layer 2 frames are divided into two categories: commands (C) and responses (R). Whether commands have to be acknowledged (i.e. require responses) or not depends on the particular functions being performed. CCITT has defined the "multiple frame operation" procedure for information transfer with acknowledgments. In this procedure a number of frames sent one after the other can be acknowledged as a group, which means that there is no need for each frame to be acknowledged immediately (see control field). The layer 2 frames with their changing addresses and frame lengths differ considerably from the repetitive pulse frames with permanently assigned channel time slots of digital transmission systems or of the primary rate access (see Section 4.2 and also topic 7).
20
A30808-X2799-X3-1-7618
5 Flag
Information field
Octet m-2 Frame check sequence field Octet m-1 Flag Octet m
5 Flag
Address field Octet 3 Octet 4 Control field *) Octet n-2 Frame check sequence field Octet n-1 Flag Octet n
*) The second octet of the control field is not used in the U frame without a sequence number for the transfer of unnumbered unacknowledged information and control functions.
Fig. 5.1
Flag Each frame starts and ends with a flag. The flags always have the same bit pattern: 01111110. Between the opening and closing flags of a frame the transmitter automatically inserts a "0" after five consecutive "1"s. The receiver then masks out these inserted "0" bits. This makes flag detection unambiguous (in the idle state between frames the terminals send a continuous sequence of "1" signal elements). The closing flag of a
A30808-X2799-X3-1-7618
21
frame can also be the opening flag of the next frame. Address field The address field consists of two octets (Fig. 5.2) and uniquely identifies a layer 2 connection. It contains two address field extension bits (EA), a command/response bit (C/R bit), a service access point identifier (SAPI) and a terminal endpoint identifier (TEI).
5 SAPI
2 C/R
1 EA (=0) EA (=1)
TEI
Octet 3
Fig. 5.2
Address field
Address field extension bits With the EA bits the address field length is extended to or defined at two octets. The EA bit of the first address field octet is assigned the binary value "0" and the EA bit of the second address field octet the binary value "1". Binary "1" of the second EA bit indicates the last octet of the address field. Command/response bit The C/R bit indicates whether a frame contains a command or a response (Table 5.1).
Frame contents Transmission direction Binary value of the C/R bit 1 0 0 1
Command
Response
Tab. 5.1
Service access point identifier The SAPI in the address field denotes the class of information to be transferred. These information classes are used to differentiate between signaling, layer 2 administrative information and packet data including user-user information. With the six bits of the address field a total of 64 information classes, numbered from 0 to 63, can be identified. Bit 3 of octet 2 is the least significant bit (LSB) and bit 8 the most significant bit (MSB). The meanings of the defined SAPIs are shown in Table 5.2.
SAPI 0 1 16 63 2 through 15 and 17 through 62 Information class Signaling Packet data (Q.931 signaling procedures) Packet data (X.25 layer 3 procedures) Layer 2 administration function (TEI administration) For future applications
Tab. 5.2
22
A30808-X2799-X3-1-7618
Terminal endpoint identifier The TEI in the address field denotes a terminal for explicit transfer of a message. Functional groups of multiservice terminals can have their own TEI in the same way as individual terminals. TEIs enable terminals within an information class (same SAPI) to be differentiated, and with a particular common TEI it is possible to access a number of terminals at the same time (broadcasting). Depending on the design of the terminal, a TEI can be assigned to a terminal either by the user or automatically by the network (see Section 5.4). The available 7 bits of the address field give a possible 128 different TEI values, numbered from 0 to 127. Bit 2 of octet 3 is the least significant bit (LSB) and bit 8 the most significant bit (MSB). The applications of the TEI are shown in Table 5.3.
TEI 0 through 63 64 through 126 127 Applications Assigned by the user Automatically assigned by the exchange Broadcasting and for assigning TEIs 64 through 126
Tab. 5.3
Control field The control field contains the code for identifying the type of frame. There are three formats for control fields (Fig. 5.3): I format for serially numbered acknowledged information transfer (I frame) S format for supervisory control functions (S frame) U format for unnumbered unacknowledged information transfer and control functions (U frame).
5 N(S) N(R)
1 0 P
a) I format
8 0
7 0
6 0
5 0 N(R)
4 S
3 S
2 0
1 1 P/F
b) S format
8 M
7 M
6 M
5 P/F
4 M
3 M
2 1
1 1
c) U format
Fig. 5.3
A30808-X2799-X3-1-7618
23
The control fields with the I format of all the frames to be transmitted are each given a send sequence number N(S). The receive sequence numbers N(R) of I and S frames acknowledge the error-free reception of all I frames up to send sequence number N(S) = N(R) 1. Sequence numbers N(S) and N(R) are used to supervise the continuous and error-free exchange of frames (see also Section 5.3). a) for signaling basic access primary rate access b) for packet data basic access primary rate access 1 I frame 7 I frame 3 I frame 7 I frame
The value of the P (poll) bit and the F (final) bit may be binary 0 or 1: A command with P bit = 1 requests a response from the layer 2 entity of the receiver. In the resultant receive response the F bit has the binary value 1. A command with P bit = 0 does not require any particular response. In a nonrequested response the F bit has the binary value 0. The S and M bits determine the function of the frame. Information field The information field consists of an integer number of octets and may contain as many as 260 octets. The contents of the information field form part of layer 3 and are described in Section 6.1. Frame check sequence field The frame check sequence field consists of two octets. A frame check sequence (FCS) is used to detect transmission errors on the D channel. The transmitter uses an algorithm to form a 16-bit FCS from the contents of the address, control and information fields of a frame. The receiver uses the same algorithm to calculate the FCS and compares it with the FCS received from the transmitter. If the two FCSs are identical then transmission is error-free.
5.2
Layer 2 Addressing
Information transfer via the D channel of a subscriber line takes place in the same way whether from the terminals to the exchange or from the exchange to the terminals. The layer 2 addressing procedure via the D channel can best be described with reference to an example (Fig. 5.4). To simplify matters this example only deals with the addressing procedure for information transfer from the exchange to the terminal equipment. For the purposes of information transfer the relevant exchange provides appropriate frames and inserts an appropriate service access point identifier (SAPI) in the address field. The value of this SAPI depends on whether, for example, signaling information (SAPI = 0) or packet data (SAPI = 16) is being transferred. The exchange also includes the relevant terminal endpoint identifier (TEI) in the address field. In our example TEI = 64 or 71 for a particular user terminal (the TEIs have been automatically assigned by the exchange, see also Section 5.4) or TEI = 127 for addressing all the terminals simultaneously (broadcasting).
24
A30808-X2799-X3-1-7618
Subscriber line
Exchange
Signaling SAPI=0 TEI=64 TEI=127 Packet data SAPI=16 TEI=64 TEI=127 D channel (16 kbit/s) SAPI=0 TEI=64 TEI=71 TEI=127
Fig. 5.4
Example of accessing terminals with a layer 2 address (SAPI+TEI) from the exchange
The individual frames arrive at the terminals via the D channel. All the terminals examine the address field (TEI and SAPI) and ascertain whether the frame is intended for them. If this is the case, the layer 2 message is evaluated and, if there are I and U frames, the information field of the frame is forwarded in transparent form to the relevant layer 3. The information field may, for example, contain signaling, packet data or layer 2 administration data. In the case of signaling, the actual voice, text, data or image information is sent via an assigned B channel or, if the video telephony service is being used, currently via two B channels. If TEI = 127 all the terminals equipped with an appropriate SAPI receive the messages. What happens then depends on the type of message. Layer 2 administration messages with SAPI = 63 (administration function) can be used, for example, for assigning TEIs to the terminals (Section 5.4). In all terminals with appropriate SAPIs the information fields are forwarded to layer 3.
A30808-X2799-X3-1-7618
25
5.3
Control field formats Serially-numbered information transfer (I) Supervisory control functions (S)
Commands Information (I) Receive ready (RR) Receive not ready (RNR)
Responses
Reject (REJ) Unnumbered information Set asynchronous balanced transfer and control functions (U) mode extended (SABME)
Disconnected mode (DM Unnumbered information (UI) Disconnect (DISC) Unnumbered acknowledgment (UA) Frame reject (FRMR) Connection management Exchange identification (XID) Exchange identification (XID)
Tab. 5.4
Commands and responses I frame: The numbered I frames transfer the layer 3 information to be acknowledged via the layer 2 connection. Figure 5.5 shows how the send and receive sequence numbers N(S) and N(R) are incremented.
26
A30808-X2799-X3-1-7618
Terminal equipment
Exchange
Send 0 Receive 0, 0 acknowledged Send 1, acknowledge 0 1 acknowledged Send 2, (0 acknowledged) 2 acknowledged Send 3, (0 acknowledged) Receive 1, 3 acknowledged
I frame (Control field: N(S)=0, N(R)=0) I frame (Control field: N(S)=0, N(R)=1) I frame (Control field: N(S)=1, N(R)=1) S frame (Control field: N(R)=2) I frame (Control field: N(S)=2, N(R)=1) S frame (Control field: N(R)=3) I frame (Control field: N(S)=3, N(R)=1) I frame (Control field: N(S)=1, N(R)=4)
Receive 0 Send 0, acknowledge 0 Receive 1, 0 acknowledged Acknowledge 1 Receive 2, (0 acknowledged) Acknowledge 2 Receive 3, (0 acknowledged) Send 1, acknowledge 3
Fig. 5.5
S frame: The RR, RNR and REJ control functions are used for controlling layer 2 transfers (Table 5.5). If there is no layer 3 information to be sent, the control functions may also acknowledge received I frames.
Command/response Receive ready (RR) Tasks Indicate ready to receive (I frame) Acknowledge received I frames Cancel a temporary busy state previously indicated by RNR Indicate a temporary busy state Interrogate the status of a peer entity (if P bit = 1) Request retransmission of an I frame, possibly in connection with the cancelation of a temporary busy state previously indicated by RNR implicit indication of the receive ready status status interrogation of a peer entity (if P bit = 1)
Tab. 5.5
Tasks of the commands and responses of the S frames U frames: The SABME, DISC, UA and DM control functions (Table 5.6) are used to set up and clear down acknowledged layer 2 connections for multiple frame operation. The UI commands of the U frame (UI frame) are used for transferring information which does not have to be acknowledged. These commands relate to the assignment, checking, removal, identification and confirmation of TEIs (for SAPI = 63, see example in Fig. 5.6, assignment of a TEI) and also to the broadcasting of information to all the terminals of the called party (Section 6.2). The FRMR control function acknowledges received frames which do not conform to the protocol in use, indicates the protocol error and calls for the layer 2 connection to be reset. Frames with the XID control function can be exchanged between the layer 2 entities so that protocol parameters can be changed as required.
A30808-X2799-X3-1-7618
27
Command/response Set asynchronous balanced mode extended (SABME) Disconnect (DISC) Unnumbered acknowledgment (UA)
Disconnection request for an acknowledged layer 2 connection Positive response to SABME or DISC, possibly in connection with cancelation of a temporary busy state previously indicated by RNR Indicate lack of readiness to accept an acknowledged layer 2 connection
Tab. 5.6
Tasks of the SABME and DISC commands and of the UA and DM responses of the U frame
Terminal equipment Exchange
UI frame (SAPI, TEI) [information field: ID request, Ri, Ai] UI frame (SAPI, TEI) [information field: ID assigned, Ri, Ai] OR UI frame (SAPI, TEI) [information field: ID denied, Ri, Ai]
In all three cases: address field SAPI=63, TEI=127 ID= identity Ri= reference number Ai= action indicator
Fig. 5.6
5.4
28
A30808-X2799-X3-1-7618
forwarded to the terminal in the Ai field of an "identity assigned" UI frame. The terminal checks the reference number to make sure that the TEI is intended for it and stores this TEI. All subsequent messages to or from this particular terminal will contain this TEI in the address field. The TEI remains valid for the terminal until the terminal is disconnected from the network, either intentionally or as a result of a fault/error, or the TEI is withdrawn by the layer 2 administration entity in the exchange. If there are no free TEI values available when the request is made, the layer 2 administration entity in the exchange cannot assign a TEI value to the terminal. In this case, the terminal receives an "identity denied" UI frame. The layer 2 administration entity in the exchange can also verify the assigned TEIs of the various terminals. Withdrawal or verification of the TEIs takes place with the aid of UI frames in much the same way as assignment of the TEIs.
6.1
Message Structure
The layer 3 entities supply the complete messages for transfer in layer 2 information fields (one per field, see Section 5.1). The number of octets in the message may vary but is never more than 260. The DSS1 messages, internationally standardized by CCITT, have a uniform structure (Fig. 6.1) and each contains the prescribed protocol discriminator (Table 6.1), a call reference, the message type and a number of information elements.
A30808-X2799-X3-1-7618
29
Protocol discriminator
Protocol discriminator
Call reference Octet 3 Octet 4 Message type Octet 5 Octet 6 Information elements
Fig. 6.1
Protocol discriminator The protocol discriminator occupies the first octet in each layer 3 message. It identifies the layer 3 protocol used to define the meaning and use (message type) of the message. For user-network call control in DSS1 CCITT has defined the bit pattern outlined in bold in Table 6.1. Table 6.1 shows the meanings of the various protocol discriminator values according to CCITT. Within this given framework individual operating companies can freely assign meanings to the protocol discriminators and thus define specific protocols.
30
A30808-X2799-X3-1-7618
Meaning
8 0 0 0 0 0 0 0 0 1
7 0 0 0 0 0 1 1 1 1
6 0 0 0 0 1 0 0 0 1
5 0 0 0 1 1 0 0 1 1
4 0 to 0 1 0 to 1 0 to 1 0 to 1
3 0 0 0 0 1 0 1 0 1
2 0 0 0 0 1 0 1 0 1
1 0 0 0 0 1 0 1 0 0 Reserved for other layer 3 protocols (including X.25 protocol) National applications Messages for user-network call control (CCITT Recommendation Q.931) Reserved for other network layer or layer 3 protocols (including X.25 protocol) Protocol discriminators in user-user information elements. Not available for messages for user-network call control
Tab. 6.1
Protocol discriminator codes and their meanings Call reference The call reference is the second part of each layer 3 message. Each call reference contains a call reference value. In layer 3 a call reference value establishes the unique relationship between the message and a particular call or a particular supplementary service control operation. These relationships apply only to the relevant layer 2 path between a terminal equipment and an exchange; in other words they have no end-toend significance. For layer 3 the use of different call reference values allows multiple use of a layer 2 connection. A particular call reference value is permanently assigned to a call from the start of setup to the end of cleardown. Only when the call has been cleared down can this call reference value be assigned to another call. The call reference (Fig. 6.2) may consist of two octets in the case of basic access and three octets for primary rate access or two octets as a network option. Bits 1 to 4 of the first call reference octet indicate the length of the subsequent call reference value (i.e. one or two octets). Call references consisting of one octet may be assigned values from 0 to 127, those consisting of two octets may be assigned values from 0 to 32,767. The originating side of the calls defines the call reference values relevant to it. The full range of call reference values is available to each originating side. A marker bit (bit eight in the second call reference octet) identifies the origin (subscriber terminal or exchange equipment) of a call reference. The originating side sets the marker bit to binary "0". In call-related messages from the remote end the marker bit is always inverted (binary "1").
A30808-X2799-X3-1-7618
31
7 0
6 0
5 0
Octet 3
7 0
6 0
5 0
Fig. 6.2
Call reference
Message type The message type constitutes the third part of each layer 3 message. It indicates the function of the messages just sent. For the codes defined here bit 8 of the message type octet is always set to "0" and is provided as a possible extension bit for the future. The codes for the individual message type octets are listed in Tables 6.2 and 6.3.
Message type octet (Bit numbering 8 0 0 7 0 0 6 0 0 5 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 4 0 0 0 0 1 0 0 1 0 1 0 0 1 0 0 3 0 0 0 1 1 0 0 1 1 1 0 1 1 0 0 2 0 0 1 1 1 1 0 0 1 1 1 0 0 0 0 1 0 1 0 1 1 1 1 1 0 0 0 1 1 1 0 National application: message type defined in subsequent octet Messages for call setup ALERTING CALL PROCEEDING CONNECT CONNECT ACKNOWLEDGE PROGRESS SETUP SETUP ACKNOWLEDGE Messages during the active call phases RESUME RESUME ACKNOWLEDGE RESUME REJECT SUSPEND SUSPEND ACKNOWLEDGE SUSPEND REJECT USER INFORMATION Meaning
Tab. 6.2
Codes for the message types for call setup, call cleardown and miscellaneous messages as defined in CCITT Recommendation Q.391.
32
A30808-X2799-X3-1-7618
Message type octet (Bit numbering 8 0 7 1 6 0 5 0 0 1 0 0 0 1 1 0 1 1 0 0 1 1 4 0 1 1 0 1 0 1 1 0 1 1 0 3 1 1 0 1 1 0 0 0 0 1 1 1 2 0 0 1 1 1 0 0 1 1 1 0 0 1 1 1 0 0 0 0 1 1 0 0 1 1 Messages for call cleardown DISCONNECT RELEASE RELEASE COMPLETE RESTART RESTART ACKNOWLEDGE Miscellaneous messages SEGMENT CONGESTION CONTROL INFORMATION FACILITY NOTIFY STATUS STATUS ENQUIRY
Meaning
Tab. 6.2
Codes for the message types for call setup, call cleardown and miscellaneous messages as defined in CCITT Recommendation Q.391.
Message type octet (Bit numbering) Meaning 3 1 0 0 0 0 1 0 1 2 0 0 0 0 1 1 1 0 1 0 0 0 0 1 1 0 0 Messages during the active call phases (Q.931, see Table 6.2) HOLD HOLD ACKNOWLEDGE HOLD REJECT RETRIEVE RETRIEVE ACKNOWLEDGE RETRIEVE REJECT Miscellaneous messages (Q.931, see Table 6.2) FACILITY REGISTER
8 0
7 0
6 1
5 0 0 1 1 1 1
4 0 1 0 0 0 0 00
0 0
Tab. 6.3
Codes for the message types for supplementary services as defined in CCITT Recommendation Q.932 Information elements The fourth and last part of a message consists of the information elements assigned to the message type. The information elements contain the actual information to be transferred which is needed, for example, for setting up a call or for controlling a service. A layer 3 message may contain one or more information elements, or none at all. There are two categories of information element (Fig. 6.3): single-octet information elements multiple-octet information elements. There are two types of single-octet information element: Type 1 consists of an information element identifier (bits 5 to 7) and a contents part (bits 1 to 4) with various parameters. These parameters may, for example, be a code set changeover (shift, see below), an overload level or a repeat indicator.
A30808-X2799-X3-1-7618
33
Type 2 transfers only an information element identifier. This corresponds to a message such as "Sending complete" or "More data". Bits 5 to 7 are permanently set to "010". The multiple-octet information elements vary in length (three or more octets). The first octet of such an element contains the information element identifier. This indicates whether the information element contains, say, the called party number (Fig. 6.4), useruser information or a call status (see CCITT Recommendations Q.931 and Q.932 for complete lists). The second octet of the multiple-octet information element specifies the number (length) of the subsequent octets (a binary value between 0 and 255). Transfer of some of the octets of an information element is optional, which means that information elements with the same identifier may nevertheless consist of different numbers of octets.
8 Single-octet information elements 1 a) Type 1 7 6 Identifier 5 4 3 2 1 Bit numbering
Contents
8 1
7 0
6 1
5 0
Bit numbering
Identifier
b) Type 2
4 Identifier
Bit numbering
Length of contents
Contents
Fig. 6.3
Information elements
34
A30808-X2799-X3-1-7618
8 0
7 1
6 1
5 1
4 0
3 0
2 0
1 0
Bit numbering
Length of contents 1 0 Directory number type 1st digit Numbering plan identification
nth digit
Fig. 6.4
With the bits available it is possible to encode the following numbers of information element identifiers: Single-octet information elements Type 1: up to eight (3-bit identier) Type 2: up to 16 (4 bits of the 7-bit identier are variable); Multiple-octet information elements up to 128 (7-bit identier) per codeset. These numbers of identifiers can be increased by using single-octet information elements as shift octets. The shift octets enable several codesets with different meanings to be accessed. Up to eight codesets are possible. A shift can either relate only to the subsequent information element (non-locking shift) or to all subsequent information elements until the next shift (locking shift). In a message the multiple-octet information elements within a codeset appear in ascending order in accordance with the binary values of the information elements. This makes it easier for the receiving equipment (entities) to detect the information elements. Single-octet information elements, on the other hand, may appear at any point within a message.
6.2
A30808-X2799-X3-1-7618
35
a SETUP message to all the terminal equipment (TE1 and TE2) connected to the called subscriber line. The SETUP message contains information on the service and may also contain a multiple subscriber number for accessing a particular terminal. The SETUP message is transferred without acknowledgment. If no message (e.g. ALERTING or CONNECT) is received from the called side the exchange sends the SETUP message again after a period of time T to the called subscriber line.
Calling party Exchange (n) TE SETUP ET ET TE1 Called party TE2
INFORMATION INFORMATION
ALERTING
ALERTING
ALERTING
CONNECT
CONNECT
CONNECT ACK
CONNECT ACK
RELEASE
RELEASE COMP
Fig. 6.5
In this example a global SETUP message is used which is targeted at all the called party's service-compatible terminals. The two service-compatible terminals of the called party each respond with an ALERTING message. On receipt of the ALERTING messages the exchange sets up separate, individually addressable signaling connections via the D channel. By sending these messages the terminals indicate that they are ready to accept the call. Receipt of the first ALERTING message is reported to the terminal of the called party likewise by an ALERTING message. The calling party receives ringing tone. If the called party answers (e.g. by lifting his handset) then his terminal will send its exchange a CONNECT message. The first CONNECT message to arrive determines which terminal is responsible for the call. The exchange of the called party informs this terminal with the aid of a CONNECT-ACKNOWLEDGE message containing the individual layer 2 address that it has been selected for the telephone call. The terminal connects itself to the B channel assigned to the call. A CONNECT message informs the terminal of the calling party that the call has been accepted. Ringing tone is disconnected and call charge metering is started for the telephone call now completely through-connected via the B channel. The calling terminal may optionally acknowledge
36
A30808-X2799-X3-1-7618
receipt of a CONNECT message with a CONNECT-ACKNOWLEDGE message. On the called side all the other terminals which have sent an ALERTING or CONNECT message but which have not been given the call receive a RELEASE message. These terminals each acknowledge the RELEASE message with a RELEASE-COMPLETE message and switch over to the idle state.
A30808-X2799-X3-1-7618
37
Opening flag
Address flag
0
1
1
2
1
3
1
4
1
5
1
6
1
7
0
8
0
EA
0
C/R
1
EA
0
TEI= 64
1
Layer 2
SAPI= 0
Bit numbering
Control field
Protocol discriminator
0
I for mat
0
P
Call reference
0
Marker
Bearer capability
Channel identification
0
Preferred channel
Digit 6
Digit 5
Digit 4
Digit 3
Digit 2
Closing flag
0
1
1
2
1
3
1
4
1
5
1
6
1
7
0
8
Layer 2
Bit numbering
Fig. 7.1
A complete message
38
A30808-X2799-X3-1-7618
8 Abbreviations
C CCITT CCS7 DISC DM DSS1 EA ET FCS FRMR HDLC I I ISDN ISO LAPB LSB LT MSB N(R) N(S) NT OSI PABX PCM R REJ RNR RR S SABME SAPI TA TEI TE1 TE2 U UA UI XID 2B/1Q 4B/3T code command International Telegraph and Telephone Consultative Committee common channel signaling system no. 7 disconnect (layer 2 command) disconnected mode (layer 2 response) digital subscriber signaling system no. 1 address field extension bit exchange termination frame check sequence frame reject (layer 2 response) high-level data link control information (layer 2 command) sequentially numbered information transfer (format and frame integrated services digital network International Organization for Standardization link access procedure balanced least significant bit line termination most significant bit receive sequence number send sequence number network termination open system interconnection private automatic branch exchange pulse code modulation response reject (layer 2 command or response receive not ready (layer 2 command or response) receive ready (layer 2 command or response) supervisory control functions (format and frame) set asynchronous balanced mode extended (layer 2 command) service access point identifier terminal adapter terminal endpoint identifier terminal equipment type 1 terminal equipment type 2 unnumbered information transfer and control functions (format and frame) unnumbered acknowledgment (layer 2 response) unnumbered information (layer 2 command) exchange identification (layer 2 command or response) code in which 2 bits of a binary signal are represented by 1 quaternary signal element code in which 4 bits of a binary signal are represented by 3 ternary signal elements
A30808-X2799-X3-1-7618
39
40
A30808-X2799-X3-1-7618