1. Field of Invention
This application relates generally to broadband networks and more particularly to identifying faults in a network.
2. Discussion of Related Art
In recent years, broadband networks have become widely deployed. Many businesses and homes have broadband network connections. Two popular types of broadband networks are ADSL and cable.
In these broadband networks, individual subscribers are generally connected to the network through an access network. In an ADSL network, the access network is usually physically implemented on twisted pair copper wires originally deployed for narrowband voice telephony. These wires are routed from a central office in cable bundles that each runs through a neighborhood or other portion of the service area for the network. Wires are tapped from the cable to make connection to individual homes or offices in the service area. A device at the central office is connected to the rest of the broadband network and can route signals from the network onto a particular subscriber line. In an ADSL network, this device is called a Digital Subscriber Line Access Multiplexer (DSLAM).
A cable network is conceptually similar, though implemented with different hardware. The broadband network includes many access networks through which subscribers are connected to the network. Subscribers in a particular neighborhood are connected through a common cable to a neighborhood router. Information on a cable network is transmitted using IP addressing, with each subscriber having its own IP address. In this way, each subscriber receives information directed to it as part of a “virtual” subscriber line.
The access portion of a network has traditionally been one of the most difficult parts of the network for a service provider to maintain. A network service provider might provide service to hundreds of thousands of subscribers. Clusters of subscribers will access the network through different access networks. Thus, there are many access networks that must be maintained. Further, the access networks are physically spread out over a wide area, exposing the access networks to significant potential for fault or interference. Furthermore, the geographical dispersion of the access networks also makes it expensive and difficult to identify and locate conditions that might affect service to users of the network.
Herein, an ADSL network will be used as an example of a broadband network. However, cable and other types of broadband networks exist and experience problems analogous to those encountered in ADSL networks.
Some service affecting conditions in an ADSL access network arise from physical problems in the line. For example, a bridged tap or a resistance imbalance, if present on the line, might decrease the rate at which data can be transmitted over the line. Likewise, sources of noise or interference might also impact performance. One such source of interference is crosstalk from lines in the cable bundle that carry other types of services. We anticipate, because of governmental regulation that forces the local telephone operating companies to make their networks open to any carrier that wants to use them, that there will be more instances of lines within a cable bundle carrying services that interfere with ADSL service.
It would be desirable for a network operator to be able to quickly identify service affecting conditions, including interference.
With the foregoing background in mind, it is an object to provide an efficient method for detecting service affecting conditions in an access network.
The foregoing and other objects are achieved in a network having a modem connected to each subscriber line. Information from the modem is used to identify service affecting conditions on the line. In one embodiment, the information from the modem is combined with information obtained from measuring electrical characteristics on the line to identify service affecting conditions. In another embodiment, the information from the modem describes the data transmission rate as a function of frequency.
The accompanying drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. In the drawings:
This invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having,” “containing”, “involving”, and variations thereof herein, is meant to encompass the items listed thereafter and equivalents thereof as well as additional items.
Subscriber lines 112 connect user premises 1141 . . . 1144 to a switch 110. In the example of
Switch 110 connects to a narrow band network 152. Switch 110 routes a telephone call carried over narrowband net 152 to an appropriate subscriber line.
The network also includes a measurement unit 116. Measurement unit 116 connects through switch 110 to any of the subscriber lines 1121-1124. As is known in the art, measurement unit 116 can measure electrical properties on the subscriber lines. An example of a suitable measurement unit is the Celerity® product sold by Teradyne, Inc. of Deerfield, Ill.
Measurement unit 116 provides data to service center 118. Service center 118 could be a call center operated by the network operator. Though
Broadband services are provided to subscriber premises 1144 through subscriber line 1124. Accordingly, subscriber line 1124 is connected at its central end to broadband network 150. The connection is made through DSLAM 160.
Returning to
Premises 1144 includes a premises splitter 268. Splitter 268 includes a low pass filter 270 that connects to a traditional telephone 284. Splitter 268 also includes a high pass filter 272 that connects to a network termination device 260. Splitter 268 ensures that low frequency signals, such as are used to carry telephone service, are routed to telephone 284 and higher frequency signals, such as those used to carry broadband data, are routed to network termination device 260.
Network termination device 260 is sometimes called a modem. It includes a transceiver unit 262. Herein the term “modem” will be used to generally refer to any device that transmits or receives information to or from the access network to establish communication between a subscriber and the broadband network.
Network termination device 260 might also include circuitry to perform dynamic channel allocation, such as multiplexer 264. For example, an ADSL modem might allocate data between 2 ATM channels to support dual latency (e.g. fast and interleaved) modes. However, such an element is not necessary to practice the invention.
Network termination 260 also includes a physical connection 266, here to a home network 280. The specific type of physical connection will depend on the type of devices at the premises connected to the network.
On the central side of the line, there is a corresponding central office splitter 218. Splitter 218 includes a low pass filter 220 and a high pass filter 222. Low pass filter 220 is connected to switch 110. Low pass filter 220 passes low frequency voice signals between switch 110 and subscriber line 1124. High pass filter 222 passes high frequency signals between DSLAM 160 and subscriber line 1124.
DSLAM 160 includes a corresponding transceiver 212. It also includes a device multiplexing device 214, similar to the multiplexer 264. DSLAM 160 also includes a physical connection 216 to the broadband network 150.
In operation, broadband information from the network 150 destined for premises 1144 passes through DSLAM 160 and is encoded at transceiver unit 212. This information passes through subscriber line 1124 where it is received by transceiver unit 266 inside network termination 260. The information is then converted into a form where it can be used within the home network 280. Likewise information from subscriber terminals 282 is passed through home network 280 to transceiver 262. Transceiver 262 puts the information in a form that can be transmitted over subscriber line 1124 to transceiver unit 212 inside the DSLAM. Transceiver 212 receives the information and allows DSLAM 160 to place it in a format that it can be transmitted over broadband network 150.
When information is provided from broadband network 150 through subscriber line 1124 to subscriber terminals 282, the access network is said to be providing data in a down stream direction. Conversely when information is generated at subscriber terminals 282 and pass through subscriber line 1124 to DSLAM 160, the access network is said to be operating in the upstream direction. In an ADSL network, the rate at which information is passed in the upstream direction is lower than the rate at which information is passed in the downstream direction.
To convey information, the carrier is modulated. The modulated carrier signal can take on one of a discrete number of modulation states. However, each carrier does not need to have the same number of modulation states.
The number of modulation states within each frequency bin is determined during a training sequence. When transceiver 262 and transceiver 212 initially establish communication, they go through a training sequence. The goal of the training sequence is to determine the maximum number of modulation states the carrier in each frequency bin can have in order to ensure reliable communication.
Different modulation states are created by changing some property of the carrier signal. In an ADSL system, modulation states are created by changing the amplitude and phase of the carrier. Each modulation state corresponds to a particular combination amplitude and phase of the carrier signal.
When a carrier has many modulations states, each modulation state looks similar to many others. Thus, even small distortions of the signal can cause the receiving transceiver to mistakenly identify the modulation state of the signal at the time it was transmitted. To reduce mistakes in identifying the information that was transmitted, the number of modulation states is reduced for tones that experience distortion.
The number of modulation states of the carrier indicates the number of bits of information that can be transmitted in that frequency bin in a single interval when data is transmitted. For example, when there are two modulation states, a single bit information can be transmitted. If four modulation states are used, two bits can be transmitted, etc.
We have discovered that different sources of interference will have different impacts on the bit densities of subscriber lines. We have also observed that the specific impact of a source of interference will depend on the length of the line. As will be described, we have used this recognition to develop a technique that can identify both whether a source of interference is present and the nature of that interference.
Turning to
In the illustrated embodiment, the measurements obtained from measurement unit 116 are used only to estimate the length of the line. My currently pending patent application Ser. No. 10/176,014, entitled System and Method for Pre-qualification of Telephone Lines for DSL Service Using an Average Loop Loss, filed Jun. 20, 2002, which is hereby incorporated by reference, describes a method of estimating the length of a line which is particularly useful in an ADSL environment. However, alternative ways of estimating the line length are possible. A simple estimate of line length can be obtained by measuring the capacitance of the line. Alternatively it is not necessary for the estimate of the line length to be derived from measurements taken on the line. In some cases, a network operator will have records of the length of each subscriber line mode at the time the lines were installed. Estimating the line length from installation records is not a presently preferred embodiment because such records are often inaccurate.
As yet a further alternative, it is possible that the length of the line could be estimated from information derived from DSLAM 160. As transceivers 212 and 262 send information back and forth over line 1124, they can measure the amount that each signal is attenuated by the line. Because the attenuation on a line is generally related to its length, this attenuation information can be used to estimate the length of the line as well. Information on line attenuation can be obtained from DSLAM 160 through network management system 290. Where attenuation information from DSLAM 160 is used to estimate the length of the line, it is preferable that the attenuation of the upstream link be used for the computation. We have observed that the relationship between line length and attenuation is measured by at least some DSLAMs is less linear for the downstream link then the upstream link.
A simple way to determine the relationship between attenuation measured by a particular DSLAM 160 and the length of the line is to make a series of empirical measurements using a test setup. Preferably, the relationship is determined for many different kinds of DSLAMs. If DSLAM data is used at step 410 to estimate the length of the line, the stored data for the particular type of DSLAM 160 attached to the subscriber line 1124 being tested would be accessed.
Once the length of the line is estimated, processing proceeds to step 412. At step 412 reference parameter data is selected. In the embodiment of
The process proceeds to step 414. At step 414 corresponding parameters for the line under test are determined. Here the information on the line under test is obtained from DSLAM 160. As shown in
Networks in widespread use today are implemented according to standards. The standards define the interfaces that every network element must implement. In this way, someone building a network can assemble a network from components manufactured by different sources, but the elements will all work together in the network. The standard interfaces also allow different network elements to easily interact. For example, a computer within service center 118 can easily access parameters concerning the operation of a DSLAM 160 through MIB 452.
The standards define the minimum information that must be available through an interface. Many manufacturers of equipment implement additional features through an interface. For example, the bit densities pictured in
Once parameter data is obtained for the line under test, processing proceeds to step 416. At step 416 an interference pattern is identified. In the preferred embodiment, an interference pattern is determined by comparing the parameters of the line under test with the reference data. In frequency bins where the line under test has a lower bit density than the reference, the difference can be attributed to a source of interference. Element 460 represents this difference pattern. Here element 460 is shown as a graph. Element 460 will preferably be implemented as a data set in the memory of a computer executing step 416. The data set might include a series of points that represents points on the curve pictured as element 460. However, any convenient method for representing the information pictured in the graph of element 460 could be used.
At step 418 results of analysis on the collected data are reported. The form of the results will depend on the intended use of the information obtained. In a simple form, the interference pattern such as pictured in 460 might be reported. However, it is not necessary that the results be reported in graphical form. For example, step 418 may report only whether there is or is not a source of interference on the line under test. Such a determination might be made by recognizing either a significant number of frequency bins in which the actual measured parameters differ from the referenced parameters or frequency bins in which there is a significant deviation between the measured parameters and the referenced parameter. In the presently contemplated embodiment, the degree of difference that constitutes a significant difference is determined empirically under controlled conditions in a laboratory setting before the program that executes step 418 is written.
As yet a further example of the results that might be reported at step 418, the results might include a report on the type of interference source present. As described above in connection with
Another example of a source of interference that might be identified is an E1 interferer that would create a drop in performance around 1.024 MHz or an HDSL that creates a drop in performance in the 0 to 392 kHz range.
It should be appreciated that
Also, it should be appreciated that analysis of a signal does not need to include analysis of all of the frequencies. Some sources of interference impact transmission over a limited range of frequencies. When identifying whether such sources of interference are present, analysis can be simplified by looking for a pattern indicative of interference over only that range of frequencies.
Furthermore, it should be appreciated that the analysis would not necessarily be graphical. Line library 450 and interference pattern 460 are represented graphically partially as an aid in understanding the theoretical operation of the invention. It is possible that the comparisons could be made using a set of rules or data tables. For the example of an idle T1 circuit creating interference, a rule might be in the form of: If the number of bits in the frequency bin including 772 kHz is less then 40 percent of the number of bits in the reference, indicate an idle T1 circuit. More generally, some sources of interference might be identified if the line performance parameters in certain frequency ranges are below some threshold.
The invention was described in connection with an ADSL network. The process described herein is not limited to use in such networks. For example, cable networks also include modems in central locations in an access network that communicate with subscribers. These modems also include interfaces for providing network management information. In the same way that information was obtained through MIB 452 of DSLAM 160, parameters on the operation of the access network in a cable network can be obtained from a cable modem.
Having thus described several aspects of at least one embodiment of this invention, it is to be appreciated various alterations, modifications, and improvements will readily occur to those skilled in the art. For example, it was described above that reference data was selected at step 412 based on the length of the line. However, any available information might be used to select the reference data. For example, measured resistive imbalance or defected bridged tops might drive the selection of reference data. In this case, reference library 450 would include representations of lines with of different lengths and different physical characteristics. Such alterations, modifications, and improvements are intended to be part of this disclosure, and are intended to be within the spirit and scope of the invention.
As another example, it was described that the performance of the line is analyzed by obtaining the bit rate per tone in a DMT system. However, corresponding analyses could be performed using other per-tone information. Other DMT parameters could be used to perform the analysis. Possibly, a computer in service center will be programmed to perform the analysis as using multiple types of DMT parameters. The specific analysis used would depend on which DMT parameters were readily available from the modems in the access network under test. Examples of other DMT parameters that might be made available by a modem include signal to noise ratio per tone and attenuation per tone.
Accordingly, the foregoing description and drawings are by way of example only.
Number | Name | Date | Kind |
---|---|---|---|
3882287 | Simmonds | May 1975 | A |
4087657 | Peoples | May 1978 | A |
4186283 | Simmonds | Jan 1980 | A |
4529847 | DeBalko | Jul 1985 | A |
4620069 | Godwin et al. | Oct 1986 | A |
4868506 | DiStefano | Sep 1989 | A |
5025221 | Blaess | Jun 1991 | A |
5083086 | Steiner | Jan 1992 | A |
5121420 | Marr et al. | Jun 1992 | A |
5128619 | Bjork et al. | Jul 1992 | A |
5157336 | Crick | Oct 1992 | A |
5270661 | Burnett | Dec 1993 | A |
5302905 | Crick | Apr 1994 | A |
5319311 | Kawashima et al. | Jun 1994 | A |
5400321 | Nagato | Mar 1995 | A |
5402073 | Ross | Mar 1995 | A |
5404388 | Eu | Apr 1995 | A |
5436953 | Nilson | Jul 1995 | A |
5461318 | Borchert et al. | Oct 1995 | A |
5465287 | Egozi | Nov 1995 | A |
5528661 | Siu et al. | Jun 1996 | A |
5528679 | Taarud | Jun 1996 | A |
5606592 | Galloway et al. | Feb 1997 | A |
5629628 | Hinds et al. | May 1997 | A |
5636202 | Garney | Jun 1997 | A |
5680391 | Barron et al. | Oct 1997 | A |
5699402 | Bauer et al. | Dec 1997 | A |
5758027 | Meyers et al. | May 1998 | A |
5790523 | Ritchie, Jr. et al. | Aug 1998 | A |
5864602 | Needle | Jan 1999 | A |
5870451 | Winkler et al. | Feb 1999 | A |
5881130 | Zhang | Mar 1999 | A |
5937033 | Bellows | Aug 1999 | A |
5956386 | Miller | Sep 1999 | A |
5978449 | Needle | Nov 1999 | A |
6002671 | Kahkoska et al. | Dec 1999 | A |
6014425 | Bingel et al. | Jan 2000 | A |
6026145 | Bauer et al. | Feb 2000 | A |
6084946 | Beierle | Jul 2000 | A |
6091338 | Natra | Jul 2000 | A |
6091713 | Lechleider et al. | Jul 2000 | A |
6107867 | Lakshmikumar | Aug 2000 | A |
6111861 | Burgess | Aug 2000 | A |
6115466 | Bella | Sep 2000 | A |
6118860 | Hillson et al. | Sep 2000 | A |
6154447 | Vedder | Nov 2000 | A |
6169785 | Okazaki | Jan 2001 | B1 |
6177801 | Chong et al. | Jan 2001 | B1 |
6181775 | Bella | Jan 2001 | B1 |
6192109 | Amrany et al. | Feb 2001 | B1 |
6205202 | Yoshida et al. | Mar 2001 | B1 |
6209108 | Pett et al. | Mar 2001 | B1 |
6215854 | Walance | Apr 2001 | B1 |
6215855 | Schneider | Apr 2001 | B1 |
6226356 | Brown | May 2001 | B1 |
6240177 | Guntzburger et al. | May 2001 | B1 |
6256377 | Murphree et al. | Jul 2001 | B1 |
6263047 | Randle et al. | Jul 2001 | B1 |
6263048 | Nelson et al. | Jul 2001 | B1 |
6266395 | Liu et al. | Jul 2001 | B1 |
6285653 | Koeman et al. | Sep 2001 | B1 |
6292468 | Sanderson | Sep 2001 | B1 |
6292539 | Eichen et al. | Sep 2001 | B1 |
6349130 | Posthuma et al. | Feb 2002 | B1 |
6366644 | Sisk et al. | Apr 2002 | B1 |
6385297 | Faulkner et al. | May 2002 | B2 |
6389109 | Schmidt et al. | May 2002 | B1 |
6445733 | Zuranski et al. | Sep 2002 | B1 |
6456694 | Posthuma | Sep 2002 | B1 |
6463126 | Manica et al. | Oct 2002 | B1 |
6466647 | Tennyson | Oct 2002 | B1 |
6487276 | Rosen et al. | Nov 2002 | B1 |
6507870 | Yokell et al. | Jan 2003 | B1 |
6614880 | Lysaght et al. | Sep 2003 | B1 |
6687336 | Holeva | Feb 2004 | B1 |
6741676 | Rudinsky et al. | May 2004 | B2 |
6781386 | LeHenaff | Aug 2004 | B2 |
6970415 | Galarza et al. | Nov 2005 | B1 |
20020009155 | Tzannes | Jan 2002 | A1 |
20020089999 | Binde | Jul 2002 | A1 |
20030048756 | Chang et al. | Mar 2003 | A1 |
20030095591 | Rekai et al. | May 2003 | A1 |
20030108095 | Duvaut et al. | Jun 2003 | A1 |
20040028189 | Bauer et al. | Feb 2004 | A1 |
Number | Date | Country |
---|---|---|
0722164 | Jul 1996 | EP |
WO 9111872 | Aug 1991 | WO |
WO 9844428 | Oct 1998 | WO |
WO 9963427 | Dec 1999 | WO |
WO 0027134 | May 2000 | WO |
WO 0064132 | Oct 2000 | WO |
WO 0101597 | Jan 2001 | WO |
WO 0124490 | Apr 2001 | WO |
WO 0167729 | Sep 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20050069029 A1 | Mar 2005 | US |