V5 Protocol


Basic Principles

V5 is a standardized protocol suite for the connection of Access Networks (AN) to the Local Exchange (LE). The Access Network itself typically has PSTN and ISDN interfaces (user ports) to the customer. The V5 interfaces are based on G.703/G.704 interfaces at 2048 kbit/s (E1). V5.1 is a single 2048 kbit/s interface, whereas V5.2 may consist of one or up to sixteen 2048 kbit/s links, provisionable by the operator. Note that Access Network (AN) is often also referenced as Line Termination (LT) and Local Exchange (LE) as Exchange Termination (ET).



Figure 1 - V5 Principles


Time slot 0 (TS0) of the 32 time slots is always used for frame alignment, error reporting and error performance monitoring using cyclic redundancy check procedures. In case of V5.2 links, TS0 is additionally used to verify the correct physical connection of a 2048 kbit/s link. Up to three time slots on each 2048 kbit/s link may be assigned as so-called communication channels (C-channels). C-channels carry PSTN signalling, ISDN D-channel information, control information and, in case of V5.2 the bearer channel connection protocol (BCC) and the protection protocol. All 64 kbit/s time slots not provisioned as C-channels are available as PSTN or ISDN bearer channels or may carry analogue or digital leased lines.

Major differences between V5.1 and V5.2 interfaces

The V5.1 interface between an Access Network (AN) and the Local Exchange (LE) support the following access types:

The V5.2 interface between an Access Network (AN) and the Local Exchange (LE) support the following access types:

Frame Structure of 2M Signal

Sub- Multiframe (SMF)

Frame Number

Bits 1 to 8 of the Frame (TS 0)

   

1

2

3

4

5

6

7

8




I

0
1
2
3
4
5
6
7

C1
0
C2
0
C3
1
C4
0

0
1
0
1
0
1
0
1

0
A
0
A
0
A
0
A

1
Sa4
1
Sa4
1
Sa4
1
Sa4

1
Sa5
1
Sa5
1
Sa5
1
Sa5

0
Sa6
0
Sa6
0
Sa6
0
Sa6

1
Sa7
1
Sa7
1
Sa7
1
Sa7

1
Sa8
1
Sa8
1
Sa8
1
Sa8




II

8
9
10
11
12
13
14
15

C1
1
C2
1
C3
E
C4
E

0
1
0
1
0
1
0
1

0
A
0
A
0
A
0
A

1
Sa4
1
Sa4
1
Sa4
1
Sa4

1
Sa5
1
Sa5
1
Sa5
1
Sa5

0
Sa6
0
Sa6
0
Sa6
0
Sa6

1
Sa7
1
Sa7
1
Sa7
1
Sa7

1
Sa8
1
Sa8
1
Sa8
1
Sa8

E CRC-4 Error Indication Bits
Sa4 to Sa8 Spare Bits, can be used for e.g. DCN purposes
C1 to C4 Cyclic Redundancy Check-4 (CRC-4) Bits
A Remote Alarm Indication

Figure 2 - Multiframe Structure of G.703/G.704 2M Signal



 

1

2

3

4

5

6

7

8

       

Sa4

Sa5

Sa6

Sa7

Sa8

 

Framing

Sync.

--

V5

--

Figure 3 - TS0 of G.703/G.704 2M Signal in V5.2 use

The Sa7 bit is used for link control purposes only if the interface is in V5.2 use, refer to ETS 300 347. The usage of Sa4 bit for synchronisation purposes is optional and depends upon provisioning. ISDN primary rate uses Sa4 to Sa6 for link management purposes.

V5 Protocols

The control and link control protocols provide the bidirectional information transfer required to:

In V5.2 the C-channels are protected against 2048 kbit/s link failures, if V5 consists of more than a single 2048 kbit/s link. A protection protocol running on two 2048 kbit/s links in parallel controls the switch-over of C-channels in case of a link failure. These two dedicated 2048 kbit/s links, carrying the protection protocol, are called primary link and secondary link. The common bearer channel connection protocol (BCC) under control of the LE side sets up connections on per call basis in the V5.2 case. In the V5.2 case the control protocol and link control protocols, the BCC protocol and, if provisioned, the protection protocol are always kept together in the TS16 of the primary 2048 kbit/s link of the V5.2 interface. All other protocols may be assigned to TS15, TS16 or TS31 of any 2048 kbit/s link of the V5.2 interface by provisioning. TS16 of the secondary 2048 kbit/s link also carries the protection protocol and is reserved as backup c-channel for the TS16 of the primary link.

V5.1 uses just a single 2048 kbit/s link with a fixed association between timeslots and user ports. In the V5.1 case the control protocol is always allocated to TS16. All other protocols may be assigned to either TS15, TS16 or TS31.

Link control requirements and procedures

Since the V5.2 interface may consist of multiple 2048 kbit/s links, there is a need for link ID-verification and for blocking of a specific link. Two procedures have been defined for these functions and are performed through the link control protocol.

Bit rates lower than 64 kbit/s are not supported directly. They are seen as user applications within a 64 kbit/s B-channel in the PRA. One or more B-channels in the PRA may be used for the optional permanent line capability or semi-permanent leased line service. Multi-rate bearer services, which may use H0, H12 or other multislot channels between userport and LE are also supported by any V5.2 interface supporting ISDN-PRA using the appropriate ISDN signalling systems.

Control principles

The following general requirements have been defined for both the ISDN-BA port and the ISDN-PRA port. They shall be relevant for the PSTN ports as well if not stated otherwise:

Bearer Channel Connection (BCC)

The BCC protocol is used to allocate bearer channels on a specific 2048 kbit/s link to user ports, generally on a call by call basis. The bearer channels allocated by means of the BCC protocol but not on a call by call basis are given below:

Protection

The protection protocol is used in the case of interfaces with more than one 2048 kbit/s link. It is required that the link control, the control, and the BCC protocols have a communication path over the V5.2 interface, even in the event of one 2048 kbit/s link failure (i.e. primary or secondary link). The protection protocol has the responsibility to ensure that there is a method by which entities in the LE and AN can communicate for the purpose of protecting logical C-channels in the case of a single link failure, if standby physical C-channels are provisioned. In the event of protection switching being required for logical C-channels, it is the responsibility of the protection management function to initiate the switch-over in a controlled manner using the protection protocol.

Standards

Standards dealing with V5 issues are available both from ETSI and ITU-T. A small subset is given below: