Thursday, 29 March 2012

what is fading , inter symbol interference???


1.2.1 Attenuation

Attenuation is the drop in the signal power when transmitting from one point to another. It can be caused by the transmission path length, obstructions in the signal path, and multipath effects. Figure 2 shows some of the radio propagation effects that cause attenuation. Any objects that obstruct the line of sight signal from the transmitter to the receiver can cause attenuation. 


Figure 2 Radio Propagation Effects
Shadowing of the signal can occur whenever there is an obstruction between the transmitter and receiver. It is generally caused by buildings and hills, and is the most important environmental attenuation factor.
Shadowing is most severe in heavily built up areas, due to the shadowing from buildings. However, hills can cause a large problem due to the large shadow they produce. Radio signals diffract off the boundaries of obstructions, thus preventing total shadowing of the signals behind hills and buildings. However, the amount of diffraction is dependent on the radio frequency used, with low frequencies diffracting more then high frequency signals. Thus high frequency signals, especially, Ultra High Frequencies (UHF), and microwave signals require line of sight for adequate signal strength. To over come the problem of shadowing, transmitters are usually elevated as high as possible to minimise the number of obstructions. Typical amounts of variation in attenuation due to shadowing are shown in Table 6.

DescriptionTypical Attenuation due to Shadowing
Heavily built-up urban centre20dB variation from street to street
Sub-urban area (fewer large buildings)10dB greater signal power then built-up urban center
Open rural area20dB greater signal power then sub-urban areas
Terrain irregularities and tree foliage3-12dB signal power variation

Table 6 Typical shadowing in a radio channel (Values from [11])
Shadowed areas tend to be large, resulting in the rate of change of the signal power being slow. For this reason, it is termed slow-fading, or log-normal shadowing.

1.2.2 Multipath Effects


1.2.2.1 Rayleigh fading

In a radio link, the RF signal from the transmitter may be reflected from objects such as hills, buildings, or vehicles. This gives rise to multiple transmission paths at the receiver. Figure 3 show some of the possible ways in which multipath signals can occur.


Figure 3 Multipath Signals
The relative phase of multiple reflected signals can cause constructive or destructive interference at the receiver. This is experienced over very short distances (typically at half wavelength distances), thus is given the term fast fading. These variations can vary from 10-30dB over a short distance. Figure 4 shows the level of attenuation that can occur due to the fading.


Figure 4 Typical Rayleigh fading while the Mobile Unit is moving (for at 900 MHz)[15]
The Rayleigh distribution is commonly used to describe the statistical time varying nature of the received signal power. It describes the probability of the signal level being received due to fading. Table 7 shows the probability of the signal level for the Rayleigh distribution.

Signal Level (dB about median)% Probability of Signal Level being less then the value given
1099
050
-105
-200.5
-300.05

Table 7 Cummulative distribution for Rayleigh distribution (Value from [15])

1.2.2.2 Frequency Selective Fading

In any radio transmission, the channel spectral response is not flat. It has dips or fades in the response due to reflections causing cancellation of certain frequencies at the receiver. Reflections off near-by objects (e.g. ground, buildings, trees, etc) can lead to multipath signals of similar signal power as the direct signal. This can result in deep nulls in the received signal power due to destructive interference.
For narrow bandwidth transmissions if the null in the frequency response occurs at the transmission frequency then the entire signal can be lost. This can be partly overcome in two ways. 
By transmitting a wide bandwidth signal or spread spectrum as CDMA, any dips in the spectrum only result in a small loss of signal power, rather than a complete loss. Another method is to split the transmission up into many small bandwidth carriers, as is done in a COFDM/OFDM transmission. The original signal is spread over a wide bandwidth and so nulls in the spectrum are likely to only affect a small number of carriers rather than the entire signal. The information in the lost carriers can be recovered by using forward error correction techniques.

1.2.2.3 Delay Spread

The received radio signal from a transmitter consists of typically a direct signal, plus reflections off objects such as buildings, mountings, and other structures. The reflected signals arrive at a later time then the direct signal because of the extra path length, giving rise to a slightly different arrival times, spreading the received energy in time. Delay spread is the time spread between the arrival of the first and last significant multipath signal seen by the receiver.
In a digital system, the delay spread can lead to inter-symbol interference. This is due to the delayed multipath signal overlapping with the following symbols. This can cause significant errors in high bit rate systems, especially when using time division multiplexing (TDMA). Figure 5 shows the effect of inter-symbol interference due to delay spread on the received signal. As the transmitted bit rate is increased the amount of inter-symbol interference also increases. The effect starts to become very significant when the delay spread is greater then ~50% of the bit time.


Figure 5 Multipath Delay Spread
Table 8 shows the typical delay spread for various environments. The maximum delay spread in an outdoor environment is approximately 20 us, thus significant inter-symbol interference can occur at bit rates as low as 25 kbps.

Environment or causeDelay SpreadMaximum Path Length Difference
Indoor (room)40 nsec - 200 nsec12 m - 60 m
Outdoorm sec - 20 m sec300 m - 6 km

Table 8 Typical Delay Spread
Inter-symbol interference can be minimized in several ways. One method is to reduce the symbol rate by reducing the data rate for each channel (i.e. split the bandwidth into more channels using frequency division multiplexing, or OFDM). Another is to use a coding scheme that is tolerant to inter-symbol interference such as CDMA. 

Tuesday, 20 March 2012

WHAT IS CISC????


Pronounced sisk, and stands for complex instruction set computer. Mostpersonal computers, use a CISC architecture, in which the CPU supports as many as two hundred instructions. An alternative architecture, used by manyworkstations and also some personal computers, is RISC (reduced instruction set computer), which supports fewer instructions.

WHAT IS RISC???


Pronounced risk, acronym for reduced instruction set computer, a type ofmicroprocessor that recognizes a relatively limited number of instructions. Until the mid-1980s, the tendency among computer manufacturers was to build increasingly complex CPUs that had ever-larger sets of instructions. At that time, however, a number of computer manufacturers decided to reverse this trend by building CPUs capable of executing only a very limited set of instructions. One advantage of reduced instruction set computers is that they can execute their instructions very fast because the instructions are so simple. Another, perhaps more important advantage, is that RISC chipsrequire fewer transistors, which makes them cheaper to design and produce. Since the emergence of RISC computers, conventional computers have been referred to as CISCs (complex instruction set computers).


To some extent, the argument is becoming moot because CISC and RISC implementations are becoming more and more alike. Many of today's RISC chips support as many instructions as yesterday's CISC chips. And today's CISC chips use many techniques formerly associated with RIS

WHAT IS TRANSISTOR????


A device composed of semiconductor  material that amplifies a signal or opens or closes a circuit. Invented in 1947 at Bell Labs, transistors have become the key ingredient of all digital circuits, including computers. Today's microprocessors contains tens of millions of microscopic transistors.
Prior to the invention of transistors, digital circuits were composed of vacuum tubes, which had many disadvantages. They were much larger, required more energy, dissipated more heat, and were more prone to failures. It's safe to say that without the invention of transistors, computing as we know it today would not be possible.

WHAT IS GPU????


Used primarily for 3-D applications, a graphics processing unit is a single-chip processor that creates lighting effects and transforms objects every time a 3D scene is redrawn. These are mathematically-intensive tasks, which otherwise, would put quite a strain on the CPU. Lifting this burden from the CPU frees up cycles that can be used for other jobs.

The first company to develop the GPU is NVIDIA Inc. Its GeForce 256 GPU is capable of billions of calculations per second, can process a minimum of 10 million polygons per second, and has over 22 million transistors, compared to the 9 million found on the Pentium III. Its workstation version called the Quadro, designed for CAD applications, can process over 200 billion operations a second and deliver up to 17 million triangles per second.

The GeForce NVIDIA GPU card is compatible with the following graphics APIsOpenGL and Microsoft's DirectX, Intel's Accelerated Graphics Port (AGP) technology and AMD 's 3DNow!

The Quadro is an OpenGL specific card with driver support for Pentium III Xeon and AMD Athlon CPUs.

Tuesday, 13 March 2012

TDMA TECHNOLOGY EXPLAINED

As you remember from the Introduction to TDMA tutorial. GSM divides up each ARFCN into 8 time slots.

These 8 timeslots are further broken up into logical channels.

Logical channels can be thought of as just different types of data that is transmitted only on certain frames in a certain timeslot.

Different time slots will carry different logical channels, depending on the structure the BSS uses.
There are two main categories of logical channels in GSM:

Signaling Channels
Traffic Channels (TCH)



Signaling Channels

These are the main types of signaling Channels:Broadcast Channels (BCH) - Transmitted by the BTS to the MS. This channel carries system parameters needed to identify the network, synchronize time and frequency with the network, and gain access to the network.

Common Control Channels (CCH) - Used for signaling between the BTS and the MS and to request and grant access to the network.

Standalone Dedicated Control Channels (SDCCH) - Used for call setup.

Associated Control Channels (ACCH) - Used for signaling associated with calls and call-setup. An ACCH is always allocated in conjunction with a TCH or a SDCCH.

*keep in mind, these are only categories of logical channels, they are not logical channels themselves.

The above categories can be divided into the following logical channels:

Broadcast Channels (BCH)
     Broadcast Control Channel (BCCH)
     Frequency Correction Channel (FCCH)
     Synchronization Channel (SCH)
     Cell Broadcast Channel (CBCH)

Common Control Channels (CCCH)
     Paging Channel (PCH)
     Random Access Channel (RACH)
     Access Grant Channel (AGCH)

Dedicated Control Channel (DCCH)
     Standalone Dedicated Control Channel (SDCCH)
     Fast Associated Control Channel (FACCH)
     Slow Associated Control Channel (SACCH)




Let's examine each type of logical channel individually.

Broadcast Channels (BCH)

Broadcast Control Channel (BCCH) - DOWNLINK - This channel contains system parameters needed to identify the network and gain access. These paramters include the Location Area Code (LAC), the Mobile Network Code (MNC), the frequencies of neighboring cells, and access parameters. 

Frequency Correction Channel (FCCH) - DOWNLINK - This channel is used by the MS as a frequency reference. This channel contains frequency correction bursts. 

Synchronization Channel (SCH) - DOWNLINK - This channel is used by the MS to learn the Base Station Information Code (BSIC) as well as the TDMA frame number (FN). This lets the MS know what TDMA frame they are on within the hyperframe.
* The BSIC was covered in the Introduction to GSM Tutorial. You can also read about the numbering schemes used in GSM.

Cell Broadcast Channel (CBCH) - DOWNLINK - This channel is not truly its own type of logical channel. The CBCH is for point-to-omnipoint messages. It is used to broadcast specific information to network subscribers; such as weather, traffic, sports, stocks, etc. Messages can be of any nature depending on what service is provided. Messages are normally public service type messages or announcements. The CBCH isnt allocated a slot for itself, it is assigned to an SDCCH. It only occurs on the downlink. The CBCH usually occupies the second subslot of the SDCCH. The mobile will not acknowledge any of the messages.

[Back to Top]


Common Control Channels (CCCH)

Paging Channel (PCH) - DOWNLINK - This channel is used to inform the MS that it has incoming traffic. The traffic could be a voice call, SMS, or some other form of traffic.

Random Access Channel (RACH) - UPLINK This channel is used by a MS to request an initial dedicated channel from the BTS. This would be the first transmission made by a MS to access the network and request radio resources. The MS sends an Access Burst on this channel in order to request access.

Access Grant Channel (AGCH) - DOWNLINK - This channel is used by a BTS to notify the MS of the assignement of an initial SDCCH for initial signaling.

[Back to Top]

Dedicated Control Channels (DCCH)

Standalone Dedicated Control Channel (SDCCH) - UPLINK/DOWNLINK - This channel is used for signaling and call setup between the MS and the BTS.

Fast Associated Control Channel (FACCH) - UPLINK/DOWNLINK - This channel is used for control requirements such as handoffs. There is no TS and frame allocation dedicated to a FAACH. The FAACH is a burst-stealing channel, it steals a Timeslot from a Traffic Channel (TCH).

Slow Associated Control Channel (SACCH) - UPLINK/DOWNLINK - This channel is a continuous stream channel that is used for control and supervisory signals associated with the traffic channels.


Signaling Channel Mapping

Normally the first two timeslots are allocated to signaling channels.

Remember that Control Channel (aka signaling channels) are composed of 51 TDMA frames. On a time slot Within the multiframe, the 51 TDMA frames are divided up and allocated to the various logical channels.

There are several channel combinations allowed in GSM. Some of the more common ones are:
FCCH + SCH + BCCH + CCCH
BCCH + CCCH
FCCH + SCH + BCCH + CCCH + SDCCH/4(0..3) + SACCH/C4(0..3)
SDCCH/8(0 .7) + SACCH/C8(0 . 7)

FCCH + SCH + BCCH + CCCH


Downlink


Uplink



[

BCCH + CCCH


Downlink


Uplink



[Back to Top]

FCCH + SCH + BCCH + CCCH + SDCCH/4(0..3) + SACCH/C4(0..3)

The SACCH that is associated with each SDCCH is only transmitted every other multiframe. Each SACCH only gets half of the transmit time as the SDCCH that it is associated with. So, in one multiframe, SACCH0 and SACCH1 would be transmitted, and in the next multiframe, SACCH2 and SACCH3 would be transmitted. The two sequential multiframes would look like this:


Downlink


Uplink


You will also notice that the downlink and uplink multiframes do not align with each other. This is done so that if the BTS sends an information request to the MS, it does not have to wait an entire multiframes to receive the needed information. The uplink is transmitted 15 TDMA frames behind the downlink. For example, the BTS might send an authentication request to the MS on SDCCH0 (downlink) which corresponds to TDMA frames 22-25. The MS then has enough time to process the request and reply on SDCCH0 (uplink) which immediately follows it on TDMA frames 37-40. 


[Back to Top]

SDCCH/8(0 .7) + SACCH/C8(0 . 7)

Once again, the SACCH that is associated with an SDCCH is only transmitted every other multiframe. Two consecutive multiframes would look like this:


Downlink


Uplink





Traffic Channels (TCH)

Traffic Channels are used to carry two types of information to and from the user:

Encoded Speech
Data

There are two basic types of Encoded Speech channels:

Encoded Speech - Encoded speech is voice audio that is converted into digital form and compressed. See the Speech Encoding tutorial to see the process.
    Full Rate Speech TCH (TCH/FS) - 13 kb/s
    Half Rate Speech TCH (TCH/HS) - 5.6 kb/s

Data - Data refers to user data such as text messages, picture messages, internet browsing, etc. It includes pretty much everything except speech. 

    Full rate Data TCH (TCH/F14.1) - 14.4 kb/s
    Full rate Data TCH (TCH/F9.6) - 9.6 kb/s
    Full rate Data TCH (TCH/F4.8) - 4.8 kb/s
    Half rate Data TCH (TCH/F4.8) - 4.8 kb/s
    Full rate Data TCH (TCH/F2.4) - ≤2.4 kb/s
    Half rate Data TCH (TCH/H2.4) - ≤2.4 kb/s




Traffic Channel Mapping

Time slots 2 through 7 are normally used for Traffic Channels (TCH)

Traffic Channel Multiframes are composed of only 26 TDMA frames. On each multiframe, there are 24 frames for Traffic Channels, 1 frame for a SACCH, and the last frame is Idle. Remember that a MS (or other device) only gets one time slot per TDMA frame to transmit, so in the following diagrams we are looking at a single time slot.

Full Rate Traffic Channel (TCH/FS)



When using Half-Rate Speech Encoding (TCH/HS), the speech encoding bit rate is 5.6 kb/s, so one time slot can handle two half-rate channels. In this case, one channel will transmit every other TDMA frame, and the other channel would be transmitted on the other frames. The final frame (25), which is normally used as an Idle frame, is now used as a SACCH for the second half-rate channel.

Half Rate Traffic Channel (TCH/HS)





ARFCN Mapping

This diagram shows a sample Multiframe with logical channels mapped to time slots and TDMA frames. This is just one possible configuration for an ARFCN.
*For illustrative purposes, half of the traffic channels are full-rate and the other half are half-rate

TS0
TS1
TS2
TS3
TS4
TS5
TS6
TS7

SIGNALLING SYSTEM 7 (SS 7) EXPLAINED


Signaling System No. 7 (SS7) is a set of telephony signaling protocols which are used to set up most of the world's public switched telephone network telephone calls. The main purpose is to set up andtear down telephone calls. Other uses include number translation, prepaid billing mechanisms, short message service (SMS), and a variety of other mass market services.

It is usually referenced as Signaling System No. 7 or Signaling System #7, or simply abbreviated to SS7. In North America it is often referred to as CCSS7, an acronym for Common Channel Signaling System 7. In some European countries, specifically the United Kingdom, it is sometimes called C7 (CCITT number 7) and is also known as number 7 and CCIS7 (Common Channel Interoffice Signaling 7).

There is only one international SS7 protocol defined by ITU-T in its Q.700-series recommendations. There are however, many national variants of the SS7 protocols. Most national variants are based on two widely deployed national variants as standardized by ANSI and ETSI, which are in turn based on the international protocol defined by ITU-T. Each national variant has its own unique characteristics. Some national variants with rather striking characteristics are the China (PRC) and Japan (TTC) national variants.

The Internet Engineering Task Force (IETF) has also defined level 2, 3, and 4 protocols that are compatible with SS7:
§  MTP2 (M2UA and M2PA)
§  MTP3 (M3UA)

but use a Stream Control Transmission Protocol (SCTP) transport mechanism. This suite of protocols is called SIGTRAN




There are two essential components to all telephone calls. The first, and most obvious, is the actual content—our voices, faxes, modem data, etc. The second is the information that instructs telephone exchanges to establish connections and route the “content” to an appropriate destination. Telephony signaling is concerned with the creation of standards for the latter to achieve the former. These standards are known as protocols. SS7 or Signaling System Number 7 is simply another set of protocols that describe a means of communication between telephone switches in public telephone networks. They have been created and controlled by various bodies around the world, which leads to some specific local variations, but the principal organization with responsibility for their administration is the International Telecommunications Union or ITU-T. 


Signalling System Number 7 (SS#7 or C7) is the protocol used by the telephone companies for interoffice signalling. In the past, in-band signalling techniques were used on interoffice trunks. This method of signalling used the same physical path for both the call-control signalling and the actual connected call. This method of signalling is inefficient and is rapidly being replaced by out-of-band or common-channel signalling techniques.
 


To understand SS7 we must first understand something of the basic inefficiency of previous signaling methods utilized in the Public Switched Telephone Network (PSTN). Until relatively recently, all telephone connections were managed by a variety of techniques centered on “in band” signaling.
 


A network utilizing common-channel signalling is actually two networks in one:
 

   1. First there is the circuit-switched "user" network which actually carries the user voice and data traffic. It provides a physical path between the source and destination.
 

   2. The second is the signalling network which carries the call control traffic. It is a packet-switched network using a common channel switching protocol.






SS7 PROTOCOL SUIT
The SS7 network is an interconnected set of network elements that is used to exchange messages in support of telecommunications functions. The SS7 protocol is designed to both facilitate these functions and to maintain the network over which they are provided. Like most modern protocols, the SS7 protocol is layered.




Physical Layer (MTP-1) 
This defines the physical and electrical characteristics of the signaling links of the SS7 network. Signaling links utilize DS–0 channels and carry raw signaling data at a rate of 56 kbps or 64 kbps (56 kbps is the more common implementation). 
Message Transfer Part—Level 2 (MTP-2)
The level 2 portion of the message transfer part (MTP Level 2) provides link-layer functionality. It ensures that the two end points of a signaling link can reliably exchange signaling messages. It incorporates such capabilities as error checking, flow control, and sequence checking. 
Message Transfer Part—Level 3 (MTP-3) 
The level 3 portion of the message transfer part (MTP Level 3) extends the functionality provided by MTP level 2 to provide network layer functionality. It ensures that messages can be delivered between signaling points across the SS7 network regardless of whether they are directly connected. It includes such capabilities as node addressing, routing, alternate routing, and congestion control.
Signaling Connection Control Part (SCCP)
The signaling connection control part (SCCP) provides two major functions that are lacking in the MTP. The first of these is the capability to address applications within a signaling point. The MTP can only receive and deliver messages from a node as a whole; it does not deal with software applications within a node.
While MTP network-management messages and basic call-setup messages are addressed to a node as a whole, other messages are used by separate applications (referred to as subsystems) within a node. Examples of subsystems are 800 call processing, calling-card processing, advanced intelligent network (AIN), and custom local-area signaling services (CLASS) services (e.g., repeat dialing and call return). The SCCP allows these subsystems to be addressed explicitly.
ISDN User Part (ISUP)
ISUP user part defines the messages and protocol used in the establishment and tear down of voice and data calls over the public switched network (PSN), and to manage the trunk network on which they rely. Despite its name, ISUP is used for both ISDN and non–ISDN calls. In the North American version of SS7, ISUP messages rely exclusively on MTP to transport messages between concerned nodes.
Transaction Capabilities Application Part (TCAP)
TCAP defines the messages and protocol used to communicate between applications (deployed as subsystems) in nodes. It is used for database services such as calling card, 800, and AIN as well as switch-to-switch services including repeat dialing and call return. Because TCAP messages must be delivered to individual applications within the nodes they address, they use the SCCP for transport.
Operations, Maintenance, and Administration Part (OMAP)
OMAP defines messages and protocol designed to assist administrators of the SS7 network. To date, the most fully developed and deployed of these capabilities are procedures for validating network routing tables and for diagnosing link troubles. OMAP includes messages that use both the MTP and SCCP for routing.











 Signaling Elements/Endpoints




·         SSPs are end office or tandem switches that connect voice circuits and perform the necessary signaling functions to originate and terminate calls.
·         The STP routes all the signaling messages in the SS7 network.
·         The SCP provides access to databases for additional routing information used in call processing. Also, the SCP is the key element for delivering IN applications on the telephony network.
The following sections explore the three signaling elements of the SS7 network in more detail.
SSP
SSPs are telephone switches that are provisioned with SS7 capabilities. End office SSPs originate and terminate calls, and core network switches (STPs) provide tandem or transit calls. The SSP provides circuit-based signaling messages to other SSPs for the purposes of connecting, disconnecting, and managing voice calls. Non-circuit based messages are used to query databases when the dialed number is insufficient to complete the call.

End office SSPs connect directly to users on their subscriber interfaces. The protocols used can vary from analog to digital and can be based on ISDN Primary Rate Interface (PRI) or channel-associated switching (CAS). The end office is in charge of translating subscriber protocol requests into SS7 messages to establish calls.

The SSP uses the dialed number to complete the call, unless, for example, it is an 800, 8xx, 9xx, or Local Number Portability exchange (or is ported NXX). In the latter case, a query is sent to an SCP requesting the routing information (number) necessary to complete the call.


1.
The SSP uses the called number from the calling party or routing number from the database query to begin circuit connection signaling messages.
2.
Then the SSP uses its routing table to determine the trunk group and circuit needed to connect the call.
3.
At this point, a signaling setup message is sent to the destination SSP requesting a connection on the circuit specified by the originating SSP.
4.
The destination SSP responds with an acknowledgment granting permission to connect to the specified trunk and proceeds to connect the call to the final destination.
STP
STPs, as illustrated, are an integral part of the SS7 architecture providing access to the network. STPs route or switch all the signaling messages in the network based on the routing information and destination point code address contained in the message.
The STP provides the logical connectivity between SSPs without requiring direct SSP-to-SSP links. STPs are configured in pairs and are mated to provide redundancy and higher availability. These mated STPs perform identical functions and are considered the home STPs for the directly connected SSP or SCP. The STP also is capable of performing global title translation, which is discussed later in this section.
Circuit-based messages are created on the SSP. Then, they are packetized in SS7 packets and sent from the SSP. Usually they contain requests to connect or disconnect a call. These packets are forwarded to the destination SSP where the call is terminated. It is the STP network's job to properly route such packets to the destination.
Non-circuit based messages that originate from an SSP are database queries requesting additional information needed to complete the call. It is the STP network's job to properly route packets between the SSP and the database interface known as the SCP. These packets are routed to the destination SCP and are addressed to the appropriate subsystem database. The SCP is the interface to the database that provides the routing number required to complete the call.
STPs also measure traffic and usage. Traffic measurements provide statistics such as network events and message types, and usage measurements provide statistics on the access and number of messages per message type. This information is used by the carrier's network planning teams to look at overall system capacity and future planning.
Global Title Translation
In addition to performing basic SS7 packet routing, STPs are capable of performing gateway services such as global title translation. This function is used to centralize the SCP and database selection versus distributing all possible destination selections to hundreds or thousands of distributed switches. If the SSP is unaware of the destination SCP address, it can send the database query to its local STP. The STP then performs global title translation and re-addresses the destination of the database query to the appropriate SCP.
Global title translation centralizes the selection of the correct database by enabling queries to be addressed directly to the STP. SSPs, therefore, do not have the burden of maintaining every potential destination database address. The term global title translation is taken from the term global title digits, which is another term for dialed digits.
The STP looks at the global dialed digits and through its own translation table to resolve the following:
·         The point code address of the appropriate SCP for the database
·         The subsystem number of the database
The STP also can perform an intermediate global title translation by using its translation table to find another STP. The intermediate STP then routes the message to the other STP to perform the final global title translation.
STP Hierarchy
STP hierarchy defines network interconnection and separates capabilities into specific areas of functionality. STP implementation can occur in multiple levels, such as:
·         Local Signal Transfer Point
·         Regional Signal Transfer Point
·         National Signal Transfer Point
·         International Signal Transfer Point
·         Gateway Signal Transfer Point
The local, regional, and national STPs transfer standards-based SS7 messages within the same network. These STPs usually are not capable of converting or handling messages in different formats or versions.
International STPs provide international connectivity where the same International Telecommunication Union (ITU) standards are deployed in both networks.
Gateway STPs can provide the following:
·         Protocol conversion from national versions to the ITU standard
·         Network-to-network interconnection points
·         Network security features such as screening, which is used to examine all incoming and outgoing messages to ensure authorization
You can deploy and install STP functions on separate dedicated devices or incorporate them with other SSP functions onto a single end office or tandem switch. Integrating SSP and STP functions is particularly common in Europe and Australia. This is why fully associated SS7 or CCS7 (CCS7 is the ITU-T version of SS7) networks are prevalent in those areas. Fully associated SS7 occurs when the same transmission channel carries the bearer's information and the signaling information.
SCP
The SCP, as shown  provides the interface to the database where additional routing information is stored for non-circuit based messages. Service-provider SCPs do not house the required information; they do, however, provide the interface to the system's database. The interface between the SCP and the database system is accomplished by a standard protocol, which is typically X.25. The SCP provides the conversion between the SS7 and the X.25 protocol. If X.25 is not the database access protocol, the SCP still provides the capability for communication through the use of primitives.
The database stores information related to its application and is addressed by a subsystem number, which is unique for each database. The subsystem number is known at the SSP level; the request originated within the PSTN contains that identifier. The subsystem number identifies the database where the information is stored and is used by the SCP to respond to the request.
The following databases are the most common in the SS7 network:
·         800 DatabaseProvides the routing information for special numbers, such as 800, 877, 888, 900, and 976 numbers. The 800 database responds to the special number queries with the corresponding routing number. In the case of 800, 888, and 900 numbers, the routing number is the actual telephone number at the terminating end.
·         Line Information Database (LIDB)Provides subscriber or user information such as screening and barring, calling-card services including card validation and personal identification number (PIN) authentication, and billing. The billing features of this database determine ways you can bill collect calls, calling-card calls, and third-party services.
·         Local Number Portability Database (LNPDB)Provides the 10-digit Location Routing Number (LRN) of the switch that serves the dialed-party number. The LRN is used to route the call through the network, and the dialed-party number is used to complete the call at the terminating SSP.
·         Home Location Register (HLR)Used in cellular networks to store information such as current cellular phone location, billing, and cellular subscriber information.
·         Visitor Location Register (VLR)Used in cellular networks to store information on subscribers roaming outside the home network. The VLR uses this information to communicate to the HLR database to identify the subscriber's location when roaming.