In
telecommunications
Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
, in-band signaling is the sending of
control information within the same band or channel used for data such as voice or video. This is in contrast to
out-of-band signaling which is sent over a different channel, or even over a separate network. In-band signals may often be heard by telephony participants, while out-of-band signals are inaccessible to the user. The term is also used more generally, for example of computer data files that include both literal data, and
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
and/or instructions for how to process the literal data.
Telephony
When dialing from a land-line
telephone
A telephone, colloquially referred to as a phone, is a telecommunications device that enables two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most ...
, the
telephone number
A telephone number is the address of a Telecommunications, telecommunication endpoint, such as a telephone, in a telephone network, such as the public switched telephone network (PSTN). A telephone number typically consists of a Number, sequ ...
is encoded and transmitted across the telephone line in form of
dual-tone multi-frequency signaling
Dual-tone multi-frequency (DTMF) signaling is a telecommunication signaling system using the voice-frequency band over telephone lines between telephone equipment and other communications devices and Automatic telephone exchange, switching center ...
(DTMF). The tones control the telephone system by instructing the
telephone switch
A telephone exchange, telephone switch, or central office is a central component of a telecommunications system in the public switched telephone network (PSTN) or in large enterprises. It facilitates the establishment of communication circuits ...
where to route the call. These control tones are sent over the same
channel, the copper wire, and in the frequency range (300 Hz to 3.4 kHz) as the audio of the telephone call. In-band signaling is also used on older telephone carrier systems to provide
inter-exchange information for routing calls. Examples of this kind of in-band signaling system are the
Signaling System No. 5 (SS5) and its predecessors, and
R2 signalling.
Separating the control signals, also referred to as the control plane, from the data, if a
bit-transparent connection is desired, is usually done by
escaping the control instructions. Occasionally, however, networks are designed so that data is, to a varying degree, garbled by the signaling. Allowing data to become garbled is usually acceptable when transmitting sounds between humans, since the users rarely notice the slight degradation, but this leads to problems when sending data that has very low error tolerance, such as information transmitted using a
modem
The Democratic Movement (, ; MoDem ) is a centre to centre-right political party in France, whose main ideological trends are liberalism and Christian democracy, and that is characterised by a strong pro-Europeanist stance. MoDem was establis ...
.
In-band signaling is insecure because it exposes control signals, protocols and management systems to
end user
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrato ...
s, which may result in
falsing. In the 1960s and 1970s, so-called ''
phone phreaks'' used
blue box
A blue box is an Electronics, electronic device that produces tones used to generate the in-band signaling tones formerly used within the North American long-distance telephone network to send line status and called number information over voi ...
es for deliberate falsing, in which the appropriate tones for routing were intentionally generated, enabling the caller to abuse functions intended for testing and administrative use and to make free long-distance calls.
Modems may also interfere with in-band signaling, in which case a
guard tone may be employed to prevent this.
Voice over IP
In
voice over IP
Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
(VoIP), DTMF signals are transmitted in-band by two methods. When transmitted as audio tones in the voice stream, voice encoding must use a lossless coder, such as
μ-law or
A-law pulse-code modulation
Pulse-code modulation (PCM) is a method used to digitally represent analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the amplitud ...
, to preserve the integrity of frequency signals. Still, this method proved often unreliable and was subject to interference from other audio sources. The standard method is to digitally remove DTMF tones from the audio at the source and from the
Real-time Transport Protocol
The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applic ...
(RTP) voice stream and encode them separately as a digital information payload, often termed ''named telephone events'' (NTE), according to RFC 4733. Such DTMF frames are transmit in-band with all other RTP packets on the identical network path.
[RFC 4733, ''RTP Payload for DTMF Digits, Telephony Tones, and Telephony Signals'', Schulzrinne, Tayler (2006)]
In contrast to in-band transmission of DTMF, VoIP signaling protocols also implement
out-of-band method of DTMF transmission. For example, the
Session Initiation Protocol
The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications. SIP is used in Internet telephony, in private IP telepho ...
(SIP), as well as the
Media Gateway Control Protocol (MGCP) define special message types for the transmission of digits.
Other applications
As a method of in-band signaling, DTMF tones were also used by
cable television
Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with bro ...
broadcasters to indicate the start and stop times of
local insertion
In broadcasting, local insertion (known in the United Kingdom as an opt-out) is the act or capability of a broadcast television station, radio station or cable system to insert or replace part of a network feed with content unique to the local s ...
points during station breaks for the benefit of cable companies. Until better,
out-of-band signaling
In telecommunications, signaling is the use of signals for controlling communications. This may constitute an information exchange concerning the establishment and control of a telecommunication circuit and the management of the network.
Classi ...
equipment was developed in the 1990s, fast, unacknowledged, and loud DTMF tone sequences could be heard during the commercial breaks of cable channels in the United States and elsewhere.
These DTMF sequences were sent by the originating cable network's equipment at the
uplink
In a telecommunications network, a link is a communication channel that connects two or more devices for the purpose of data transmission. The link may be a dedicated physical link or a virtual circuit that uses one or more physical links or shar ...
satellite facility, and were decoded by equipment at local cable companies. A specific tone sequence indicated the exact time that the feeds should be switched to and away from the master control feed, to locally-broadcast commercials. The following is an example of such a sequence by a cable company that communicated the following to the cable company's broadcast equipment:
SWITCH TO LOCAL NOW - SWITCH TO LOCAL NOW - PREPARE TO SWITCH BACK - PREPARE TO SWITCH BACK - SWITCH BACK TO NATIONAL NOW - SWITCH BACK TO NATIONAL NOW - "IF YOU HAVEN'T SWITCHED BACK TO NATIONAL NOW, DO SO IMMEDIATELY"
DTMF signaling in the cable industry was discontinued because it was distracting to viewers, and was susceptible to interference when DTMF tones were sounded by characters in television shows. For example, a character dialing a Touch-Tone telephone in a television show could cause the cable company computers to switch away from a "hot feed" to
dead air, and the cost of human-imperceptible signaling technologies decreased.
In-band signaling applies only to
channel-associated signaling Channel-associated signaling (CAS), also known as ''per-trunk signaling'' (PTS), is a form of digital communication signaling. As with most telecommunication signaling methods, it uses routing information to direct the payload of voice or data to i ...
(CAS). In
common channel signaling (CCS) separate channels are used for control and data, as opposed to the shared channel in CAS, so all control is out-of-band by definition.
In computer data, the term refers to embedding any kind of
metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive ...
directly within regular data. These uses have similar tradeoffs as in telecommunications, such as opening an
attack surface
The attack surface of a software environment is the sum of the different points (for " attack vectors") where an unauthorized user (the "attacker") can try to enter data to, extract data, control a device or critical software in an environment. Ke ...
vs. simplifying processing. A few of many examples:
* Embedding a
magic number at the very start of files, to signal the format or language of the following data.
* Embedding a NULL character as in C strings, to signal the end of the string (as opposed to keeping that information outside the string).
* Embedding
markup within text, whether to categorize parts of the text, provide processing or formatting instructions, or for other purposes.
* Reserving some characters in
regular expressions
A regular expression (shortened as regex or regexp), sometimes referred to as rational expression, is a sequence of character (computing), characters that specifies a pattern matching, match pattern in string (computer science), text. Usually ...
, such as "*", to have special processing meanings, rather than representing literals.
* Embedding
control codes in
computer terminal
A computer terminal is an electronic or electromechanical hardware device that can be used for entering data into, and transcribing data from, a computer or a computing system. Most early computers only had a front panel to input or display ...
input as a means of device control, allowing command-line users to issue single-character commands directly, e.g. issues a
^D
code, causing command-line programs to expect no further input from the user, and therefore to quit.
When
out-of-band communication is unavailable, one of two techniques may be used to preserve network
transparency.
*
Encapsulation: The bundling of the control data in the
packet's
header and then removing the header (and/or footer) of the packet at the far end, restoring the data to be the same as the original.
*
Bit stuffing
In data transmission and telecommunications, bit stuffing (also known—uncommonly—as positive justification) is the insertion of non-information bits into data. Stuffed bits should not be confused with overhead bits.
Bit stuffing is used f ...
: The insertion of non-information or
escape character
In computing and telecommunications, an escape character is a character that invokes an alternative interpretation on the following characters in a character sequence. An escape character is a particular case of metacharacters. Generally, the ...
s to modify, synchronize and justify the data so it never looks like signaling information (and remove the stuffed bits and escape codes at the far end, restoring the data to be the same as the original).
See also
*
Control character
In computing and telecommunications, a control character or non-printing character (NPC) is a code point in a character encoding, character set that does not represent a written Character (computing), character or symbol. They are used as in-ba ...
*
Escape sequence
In computer science, an escape sequence is a combination of characters that has a meaning other than the literal characters contained therein; it is marked by one or more preceding (and possibly terminating) characters.
Examples
* In C and ma ...
*
In-band control
*
Line signaling
Line signaling is a class of telecommunications signaling protocols. Line signaling is responsible for off-hook, ringing signal, answer, ground start, on-hook unidirectional supervision messaging in each direction from calling party to called ...
*
Out-of-band control
*
Quindar tones
*
+++ (modem)
References
{{reflist
Network management
Telephony signals