Telecom Crash Course / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $8.21
Usually ships in 1-2 business days
(Save 83%)
Other sellers (Paperback)
  • All (10) from $8.21   
  • New (2) from $23.30   
  • Used (8) from $0.00   

Overview

THE DEFINITIVE TELECOM RESOURCE — COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry — from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts, trends, terminology, acronyms, systems, and services that make up this evolving field. Expert author Steven Shepard offers not only rigorous technical accuracy, but clear, easy-to-follow descriptions, real-world examples, and even a bit of humor, all of which enhance your understanding of the topics covered.

The Latest Innovations

Beginning with a detailed analysis of how and why the telecom industry faltered in the early part of the decade, Telecom Crash Course covers the current state of the field and delves into the myriad new technologies shaping the communications landscape including revolutionary advances in broadband, VoIP, and wireless. This is a must-have resource for all current and aspiring telecom professionals, including IT staff, business decision-makers, marketing and sales staff, and students.

Covers These and Other Key Topics:

  • Digital Wireless
  • Wi-Fi and WiMAX
  • CDMA vs. GSM
  • VoIP
  • Softswitch
  • NGDLC
  • Passive Optical Networking (PON)
  • MPLS
  • 802.17
  • New security threats

EVERYTHING YOU NEED TO KEEP ON TOP OF THE EVER-CHANGING TELECOMMUNICATIONS INDUSTRY:

Introduction
• Wireless
• Wireline
• Access Issues
• Data Issues
• Optical
• IT and Computing

Read More Show Less

Product Details

  • ISBN-13: 9780071451437
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 5/27/2005
  • Edition description: REV
  • Edition number: 2
  • Pages: 528
  • Sales rank: 739,815
  • Product dimensions: 1.07 (w) x 9.00 (h) x 6.00 (d)

Meet the Author

Steven Shepard is the president of the Shepard Communications Group in Williston, Vermont. A professional author and educator with 22 years of varied experience in the telecommunications industry, he has written books and magazine articles on a wide variety of topics. He is the author of Telecommunications Convergence: How to Profit from the Convergence of Technologies, Services, and Companies (McGraw-Hill: New York, 2000); A Spanish-English Telecommunications Dictionary (Shepard Communications Group: Williston, Vermont, 2001); Managing Cross-Cultural Transition: A Handbook for Corporations, Employees and Their Families (Aletheia Publications: New York, 1997); An Optical Networking Crash Course (McGraw-Hill: New York, February 2001); SONET and SDH Demystified (McGraw-Hill: New York, 2001); Telecomm Crash Course (McGraw-Hill: New York, October, 2001); Telecommunications Convergence, Second Edition (McGraw-Hill: New York, February 2002); Video-conferencing Demystified (McGraw-Hill: New York, April 2002); Metro Networking Demystified (McGraw-Hill: New York, October 2002); The Shepard Report: Charting a Path in Uncertain Times (SCG: March 2004); and RFID (McGraw-Hill: New York, July 2004). VoIP Crash Course will be released in mid-2005. Steve is also the Series Editor of the McGraw-Hill Portable Consultant book series.

Mr. Shepard received his undergraduate degree in Spanish and Romance Philology from the University of California at Berkeley and his masters degree in International Business from St. Mary's College. He spent 11 years with Pacific Bell in San Francisco in a variety of capacities including network analysis, computer operations, systems standards development, and advanced technical training, followed by 9 years with Hill Associates, a world-renowned telecommunications education company, before forming the Shepard Communications Group. He is a Fellow of the Da Vinci Institute for Technology Management of South Africa, a member of the Board of Directors of the Regional Educational Television Network, and a member of the Board of Trustees of Champlain College in Burlington, Vermont. He is also the resident director of the University of Southern California's Executive Leadership and Advanced Management Programs in Telecommunications and adjunct faculty member at the University of Southern California, the Garvin School of International Management (Thunderbird University), the University of Vermont, Champlain College, and St. Michael's College. He is married and has two children.

Mr. Shepard specializes in international issues in telecommunications with an emphasis on strategic technical sales, convergence and optical networking, the social implications of technical change, the development of multilingual educational materials, and the effective use of multiple delivery media. He has written and directed more than 40 videos and films, and written technical presentations on a broad range of topics for more than 70 companies and organizations worldwide. He is fluent in Spanish and routinely publishes and delivers presentations in that language. Global clients include major telecommunications manufacturers, service providers, software development firms, multinational corporations, universities, advertising firms, and regulatory bodies.

Read More Show Less

Read an Excerpt

1

First Things First Telecommunications, like all highly visible and interesting fields, is full of apocryphal stories, technical myths, and fascinating legends. Everyone in the field seems to know someone who knows the outside plant repair person who found the poisonous snake in the equipment box in the manhole', the person who was on the cable-laying ship when they pulled up the cable that had been bitten through by some species of deep water shark, some collection of seriously evil hackers, or the backhoe driver who cut the cable that put Los Angeles off the air for 12 hours.

There is also a collection of techno jargon that pervades the telecommnications industry and often gets in the way of the relatively straightforward task of learning how all this stuff actually works. To ensure that such things don't get in the way of absorbing what's in this book, I'd like to begin with a discussion of some of them.

This is a book about telecommunications, which is the science of communicating over distance (tale-,from the Greek tale, "far off'). It is, however, fundamentally dependent upon data communications, the science of moving traffic between computing devices so that the traffic can be manipulated in some way to make it useful. Data, in and of itself, is not particularly useful, consisting as it does of a stream of ones and zeroes that is only meaningful to the computing device that will receive and manipulate those ones and zeroes. The data does not really become useful until it is converted by some application into information, because a human can generally understand information. The human then acts upon the information using a series of intuitive processes that further convert the information into knowledge, at which point it becomes truly useful. Here's an example: A computer generates a steady stream of ones and zeroes in response to a series of business activities involving the computer that generates the ones and zeroes. Those ones and zeroes are fed into another computer, where an application converts them into a spreadsheet of sales figures (information) for the store from which they originated. A financial analyst studies the spreadsheet, calculates a few ratios, examines some historical data (including not only sales numbers but demographics, weather patterns, and political trends), and makes an informed prediction about future stocking requirements and advertising focal points for the store based on the knowledge that the analyst was able to create from the distilled information.

Data communications rely on a carefully designed set of rules that governs the manner in which computers exchange data. These rules are called protocols, and they are centrally important to the study of data communications. Dictionaries define protocol as "a code of correct conduct." From the perspective of data communications, they define it as "a standard procedure for regulating the transmission of data between computers," which is itself "a code of correct conduct." These protocols, which will be discussed in detail later in this book, provide a widely accepted methodology for everything from the pin assignments on physical connectors to the sublime encoding techniques used in secure transmission systems. Simply put, they represent the many rule sets that govern the game. Many countries play football, for example, but the rules are all slightly different. In the United States, players are required to weigh more than a car, yet be able to run faster than one. In Australian Rules football, the game is declared forfeit if it fails to produce at least one body part amputation on the field or if at least one player doesn't eat another. They are both football, however. In data communications, the problem is similar; there are many protocols out there that accomplish the same thing. Data, for example, can be transmitted from one side of the world to the other in a variety of ways including Tl, E1, microwave, optical fiber, satellite, coaxial cable, and even through the water. The end result is identical: the data arrives at its intended destination. Different protocols, however, govern the process in each case.

A discussion of protocols would be incomplete without a simultaneous discussion of standards. If protocols are the various sets of rules by which the game is played, standards govern which set of rules will be applied for a particular game. For example, let's assume that we need to move traffic between a PC and a printer. We agree that in order for the PC to be able to transmit a printable file to the printer, both sides must agree on a common representation for the zeroes and ones that make up the transmitted data. They agree, for example (and this is only an example) that they will both rely on a protocol that represents a zero as the absence of voltage and a one as the presence of a three-volt pulse on the line, as shown in Figure 1-1. Because they agree on the representation, the printer knows when the PC is sending a one and when the PC is sending a zero. Imagine what would happen if they failed to agree on such a simple thing beforehand. If the transmitting PC decides to represent a one as a 300-volt pulse and the printer is expecting a three-volt pulse, the two devices will have a brief (but inspired) conversation, the ultimate result of which will be the release of a small puff of silicon smoke from the printer.

Now they have to decide on a standard that they will use for actually originating and terminating the data that they will exchange. They are connected by a cable (see Figure 1-2) that has nine pins on one end and nine jacks on the other. Logically, the internal wiring of the cable would look like Figure 1-3. However, when we stop to think about it, this oneto-one correspondence of pin-to-socket will not work. If the PC transmits on pin 2, which in our example is identified as the send data lead, it will arrive at the printer on pin 2-the send data lead. This would be analogous to holding two telephone handsets together so that two communicating parties can talk. It won't work without a great deal of hollering. Instead, some agreement has to be forged to ensure that the traffic placed on the send-data lead somehow arrives on the receive data lead and vice versa. Similarly, the other leads must be able to convey information to the other end so that normal transmission can be started and stopped. For example, if the printer is ready to receive the print file, it might put voltage on the data terminal ready (DTR) lead, which signals to the PC that it is ready to receive traffic. The PC might respond by setting its own DTR lead high as a form of acknowledgment, followed by transmission of the file that is to be printed. The printer will keep its DTR lead high until it wants the PC to stop sending. For example, if the printer senses that it is running out of buffer space because the PC is transmitting faster than the slower printer can print, it will drop the DTR lead, causing the PC to temporarily halt its transmission of the print file. As soon as the printer is ready to receive again, it sets the DTR lead high once again, and printing resumes. As long as both the transmitter and the receiver abide by this standard set of rules, data communications will work properly This process of swapping the data on the various leads of a cable, incidentally, is done by the modem-or by a null modem cable that makes the communicating devices think they are talking to a modem. The null modem cable is wired so that the send-data lead on one end is connected to the receive data lead on the other end and vice-versa; similarly, a number of control leads such as the carrier detect lead, the DTR lead, and the data set ready (DSR) leads are wired together so that they give false indications to each other to indicate that they are ready to proceed with the transmission, when in fact no response from the far end modem has been received.

Standards: Where Do They Come From?

Physicists, electrical engineers, and computer scientists generally design data communications protocols. For example, the Transmission Control Protocol (TCP) and the Internet Protocol (IP) were written during the heady days of the Internet back in the 1960s by such early pioneers as Vinton Cerf and the late John Postel. (I want to say "back in the last century" to make them seem like real pioneers.) Standards, on the other hand, are created as the result of a consensus-building process that can take years to complete. By design, standards must meet the requirements of the entire data and telecommunications industry, which is of course global. It makes sense, therefore, that some international body is responsible for overseeing the creation of international standards. One such body is the United Nations. Its 150 plus member nations work together in an attempt to harmonize whatever differences they have at various levels of interaction, one of which is international telecommunications. The International Telecommunications Union (ITU), a suborganization of the UN, is responsible for not only coordinating the creation of worldwide standards but also publishing them under the auspices of its own sub-organizations. These include the Telecommunications Standardization Sector (TSS, sometimes called the ITU-T, and formerly the Consultative Committee on International Telegraphy and Telephony, the CCITT), the Telecommunications Development Sector (TDS), and the Radio Communication Sector (RCS, formerly the Consultative Committee on International Radio, the CCIR). The organizational structure is shown in Figure 1-4.

Of course, the UN and its sub-organizations cannot perform this task alone, nor should they. Instead, they rely upon the input of hundreds of industry-specific organizations as well as local, regional, national, and international standards bodies that feed information, perspectives, observations, and technical direction to the ITU, which serves as the coordination entity for the overall international standards creation process. These include the American National Standards Institute (ANSI), the European Telecommunications Standards Institute (ETSI, formerly the Conference on European Post and Telegraph, CEPT), Telcordia (formerly Bellcore, now part of SAIC), the International Electrotechnical Commission (IEC), the European Computer Manufacturers Association (ECMA), and a host of others.

It is worthwhile to mention a bit about the ITU as a representative standards body. Founded in 1947 as part of the United Nations, it descended from a much older body called the Union Telegraphique, founded in 1865 and chartered to develop standards for the emerging telegraph industry. Over the years since its creation, the ITU and its three principal member bodies have developed three principal goals:

  • To maintain and extend international cooperation for the improvement and interconnectivity of equipment and systems through the establishment of technical standards.
  • To promote the development of the technical and natural facilities (read spectrum) for most efficient applications.
  • To harmonize the actions of national standards bodies to attain these common aims, and most especially to encourage the development of communications facilities in developing countries.

The Telecommunications Standardization Sector

The goals of the TSS, according to the ITU, are as follows:
  • To fulfill the purposes of the union relating to telecommunication standardization by studying technical, operating, and tariff questions and adopting formal recommendations on them with a view to standardizing telecommunications on a worldwide basis.
  • To maintain and strengthen its pre-eminence in international standardization by developing recommendations rapidly.
  • To develop recommendations that acknowledge market and traderelated considerations.
  • To play a leading role in the promotion of cooperation among international and regional standardization organizations and forums and consortia concerned with telecommunications.
  • To address critical issues that relate to changes due to competition, tariff principles, and accounting practices.
  • To develop recommendations for new technologies and applications such as appropriate aspects of the GII and Global multimedia and mobility
Read More Show Less

Table of Contents

Ch. 1 First things first 1
Ch. 2 Protocols 43
Ch. 3 Telephony 125
Ch. 4 The Byzantine world of telecom regulation 225
Ch. 5 Premises technologies 243
Ch. 6 Access technologies 281
Ch. 7 Transport technologies 369
Ch. 8 Telecom market segments 453
Ch. 9 Final summary 481
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)