Gift Guide

Signaling System 7 / Edition 2

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (11) from $1.99   
  • New (1) from $65.00   
  • Used (10) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2014

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Ship Through Fedex or DHL.

Ships from: New-Delhi, India

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Sort by


If you're involved with communications networks, you can't afford to be without this first complete technical reference on the signaling network that supports cellular communications, broadband networking, ISDN, and virtually all international networks. Using a highly readable, tutorial approach, this unique guide shows you in detail how Signaling System #7 SS7 permits seamless switching from carrier to carrier, network to network, or office to office within a network. Filled with dozens of real-world examples, the book clearly explains protocol functionality, applications, and key components - enabling you to master SS7 without having to rely on expensive and obscure standards documents. Included is an expert overview of SS7 and its importance in the telecommunications industry, plus complete accounts of SS7 network architecture ... the OSI model and SS7 ... the message structures of SS7 ... MTP L2 ... MTP L3 ... SCCP ... TCAP ... ISUP ... and much more. Whether you're a newcomer to the field or a seasoned pro, Signaling System #7 gives you the information and skills you need to put all the power and versatility of SS7 technology to work for you!

Serving a wide audience, including telecommunications students, engineers, marketing and management professionals, this book provides real-world applications and analysis of telephone networks. This second edition includes the latest changes in the SS7 protocol and plenty of complex diagrams. It defines the new parameters for TCAP, ISUP and SCCP, and it includes a chapter describing local number portability (LNP) and its impact on SS7.

Read More Show Less

Editorial Reviews

Offers a reference for anyone working with Signalling System 7 (SS7). Contains a complete short course on SS7 architecture and protocols, technical data for design and specifications, and analysis of key specifications. Each chapter provides a three-step approach to learning, with overviews, detailed discussions, and bit-level descriptions. This edition is updated to reflect the latest changes in the SS7 signalling network and its cellular, broadband, and international applications. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780070580329
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 1/28/1998
  • Series: McGraw-Hill Telecommunications Series
  • Edition description: Older Edition
  • Edition number: 2
  • Pages: 484
  • Product dimensions: 6.29 (w) x 9.31 (h) x 1.64 (d)

Read an Excerpt

Chapter 3: Overview of a Protocol

Before looking at the OSI model, let us examine the functions of a protocol. A protocol is a set of rules governing the way data will be transmitted and received over data communications networks. Protocols must provide reliable, error-free transmission of user data, as well as network management functions. Protocols packetize the user data into data envelopes, some being of a fixed length while others can be variable lengths, depending on the protocol used.

Protocols are used whenever a serial bit stream is used. The protocol defines the order in which the bits will be sent and also appends information for use by the network in routing and management of the network. This appended information is used only by the protocol and is transparent to the user.

Some protocols, such as SS7, actually send predefined messages to the other nodes in the network. Messages can be used at any layer above layer one and are commonly found at layers two and three. A typical example of a protocol message is the initial address message (IAM) sent by the SS7 protocol to establish a connection on a voice circuit between two end offices. Other messages exist for SS7 and will be discussed in greater detail in the other chapters. Predefined messages are an excellent way to send network management functions and handle data error procedures.

Other functions of a protocol include the segmentation of blocks of data for easier transmission over the network and reassembly at the receiving node. When sending multiple blocks of associated data, procedures must be provided that allow the blocks to be identified in the order they were sent and reassembled as such. In large networks, these data blocks can be sent in order but received out of order.

There are three basic modes of operation for a protocol, depending on the type of network. A circuit-switched network protocol establishes a connection on a specific circuit, and then sends the data on that circuit. The circuit used depends on the destination of the data. A good example of a typical circuit-switched network is the Public Switched Telephone Network (PSTN), which uses various circuits for the transmission of voice from one exchange to another.

Once the transmission has been completed, the circuit is released and is ready to carry another transmission. The protocol must manage the connection and release when transmission has been completed, and must also maintain the connection during the data transmission.

Another type of network is a local area network (LAN). LANs use different types of protocols, but the method of transmission is usually very similar. The topology of a LAN is usually a bus topology or a ring topology. In both topologies, the data is transmitted out on the LAN, with an address attached in a protocol header.

When a data terminal recognizes its address, it reads the data. Some mechanism must be used within the protocol to remove the data from the LAN once it has been read. This differs from one protocol to the next. These types of networks only allow one message at a time to be transmitted across the LAN.

Packet-switching networks provide multiple paths to the same destination. Each message has both an originating address and a destination address. The addresses are used to route the message through the network. Unlike LANs, a packet-switched network allows many messages to be transmitted simultaneously across the network.

The circuits used for this type of network are always connected, and transmission is taking place continuously. The direction the message takes from one node to the next depends on the packet address. Each packet provides enough information regarding the data to allow the packet to reach its destination without establishing a connection between the two devices. The X.25 and SS7 networks are both packetswitched networks.

In any protocol stack, there are several layers of addressing used. Typically, at least three layers of addressing can be found. Each device on the network must have its own unique physical address. The node address identifies the particular device within its own network. The layer two protocols are users of this address, since they are responsible for the routing from one device to the next adjacent device.

The next address layer is that of the network itself. This address is used when sending messages between two networks. This address can usually be found in layer three of most protocols. The network address is used by those devices which interconnect two or more networks (such as a router).

Once a message reaches its final destination, the logical address within the destination node must be provided to identify which operation or application entity within the node is to receive the data. An application entity is a function within a network node, such as file transfer or electronic mail. Application does not imply something like word processing (in the network sense).

In the SS7 network, application entities are objects such as IS-41, which allows Mobile Switching Centers in the cellular network to exchange data from one to the other, using the services of SS7 protocols.

As the information is handed from one layer to the next, the protocol appends control information. This control information is used to ensure that the data is received in the same order it was sent, and allows the protocol to monitor the status of every connection and automatically correct problems that may occur.

Control information includes sequence numbering and flow control. This function is usually found at layers two through four, but can also be found in the higher layers. In the SS7 protocols, levels two through four provide varying levels of control.

As mentioned earlier, segmentation and reassembly are also tasks of the protocol. This is necessary when large blocks of data must be transmitted across the network. Large blocks of data can be time consuming and, if an error occurs during transmission, can cause congestion on the network while retransmitting.

For this reason, blocks are broken down into smaller chunks, which make it faster and easier to control and transmit through the network. When a retransmission becomes necessary, only a small portion of the original data must be retransmitted, saving valuable network resources.

Encapsulation is the process of appending the original data with additional control information and protocol headers. This information is stripped off the message by the receiving node at the same layer it was appended. This information is transparent to the user.

Connection control is one of the most important tasks of a protocol. Connections must usually be established not only between two devices, but between two application entities as well. These logical connections must be maintained throughout the data transmission. The establishment of a logical connection ensures reliable data transfer, with the use of positive and negative acknowledgments to advise the adjacent node of transmission status.

Sequence numbering is also used in these types of services to ensure that the data is received in the same order it was transmitted. This type of protocol service is referred to as connection-oriented. Each node may have multiple logical connections established at one time.

When the data transmission is complete, the logical connection must be released to allow another application entity to establish a connection and transmit data. Protocol messages (such as connect requests and disconnects) are used to manage these logical connections....

Read More Show Less

Table of Contents

Ch. 1 Signaling System #7 1
Ch. 2 SS7 Network Architecture 61
Ch. 3 Overview of a Protocol 91
Ch. 4 Overview of Signal Units 117
Ch. 5 Message Transfer Part (MTP) 139
Ch. 6 Message Transfer Part Level Three 159
Ch. 7 General Description of SCCP Functions 221
Ch. 8 Overview of TCAP 267
Ch. 9 Overview of ISUP 321
Appendix A. 449
Appendix B. American National Standards Institute (ANSI) 453
Bibliography 455
Index 457
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)