Vous êtes sur la page 1sur 66

INFORMATION AND COMMUNICATION TECHNOLOGY

A TRAINING REPORT SUBMITTED TO AMITY UNIVERSITY, GURGAON IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF TECHNOLOGY IN Electronics and communication By PRANEY KALRA A50105110033 Under the esteemed guidance of Rajiv Mittal (Director, Huawei Training Department)

Department of Electronics and Communication Engineering Amity School of Engineering and Technology AMITY UNIVERSITY, HARYANA, INDIA JUNE-2013

DECLARATION

I,

Praney

Kalra,
th

student

of

Bachelor

of

Technology

(Electronics

and

Communication) , 7 Semester Enrollment No. A50105110033 hereby declare that the training work entitled Information and Communication Technology which is being submitted to Department of Electronics and Communication Engineering, AMITY

UNIVERSITY, HARYANA is my authentic work record carried out at Lab during my project session.

Date: 05 August 2013

Praney Kalra Enrollment no. A50105110033

ACKNOWELEGEMENTS

I would like to extend my gratitude and my sincere thanks to my honourable, esteemed supervisors Ms. Ritu Bisht. I sincerely thank for his exemplary guidance and encouragement. Their trust and support inspired me in the most important moments of my making right decisions and I am glad to work with them. My special thank goes to Rajiv Mittal, Head of Training Department, Huawei Telecommunication India Co pvt Ltd. for his encouragement, support and providing the facilities for the completion of the training. Finally, I would like to extend my gratitude to all those persons who directly or indirectly helped me in the process and contributed towards this work. Last but not least I would like to thank my parents, who taught me the value of the hard work by their own example.

Praney Kalra

ABSTRACT

The term Infocommunications is sometimes used interchangeably with ICT. In fact Infocommunications is the expansion of telecommunications with information processing and content handling functions on a common digital technology base. ICT is responsible for the mobile web and many other technologies like Cloud computing,Wi-Fi , MMS , SMS, VoIP etc. In this report there is overview of whole mobile network, hardware used in the network, evolution of mobile communication and many other things. This training was an eye opener. This reports highlights the importance of communication and technology i n todays world. From todays scenario life cant be imagine without these techonolgies.

List of Contents Chapter 1 : Huawei Telecommunication 1.1 Introduction 1.2 Vision and Mission 1.3 Core Values Chaper 2 : Information and Communication Technology 2.1 What is ICT? 2.2 Technological Capacity of ICT Chapter 3 : Mobile Communication History 3.1 Evolution of PSTN 3.2 Evolution of Mobile Communication Chaper 4 : Global System For Mobile Communication 4.1 4.2 4.3 4.4 4.5 4.6 4.7 Introduction to GSM GSM Carrier Frequencies GSM network Components Handover MBB SGSN GGSN

Chapter 5 : Data Network and Transport Network 5.1 MAN 5.2 IP MAN 5.3 Transmission method in current communication networks 5.4 SDH 5.5 OSI Model Chapter 6 : Cloud Computing 6.1 Types of Cloud 6.2 Service Models 6.3 Advantages 6.4 Disadvantages Chapter 7 : Practical overview 7.1 BTS

7.1.1 BTS 3900 7.1.2 BTS 3900A List of Figures Chapter 2 : Information and Communication technology 2.1 ICT Chapter 3 : Mobile Communication History 3.1 Evolution of mobile communication 3.2 Inventor of 1G Mobile 3.3 1G mobile phone 3.4 2G mobile phones 3.5 3G mobile phones 3.6 3.5G mobile phones 3.7 4G mobile phone Chapter 4 Global System for Mobile Communication 4.1 GSM network Components 4.2 Mobile phone and SIM 4.3 SIM 4.4 Switching Subsystem 4.5 MBB Chapter 5 : Data Network and Transport Network 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 OSI model Vs IP protocol Chapter 6 : Cloud Computing 6.1 6.2 Cloud Service model Cloud MAN MAN Bus Ring Mesh Star Tree OSI Architecture Services topology topology topology topology topology model Protocols

Chapter 7 Practical Overview 7.1 7.2 7.3 Structural 7.4 7.5 7.6 7.7 7.8 7.9 BTS 3900A BTS BTS Diagram FAN Site Cabinet BTS DRFU Unit GTMU BBU DCDU

of

CHAPTER 1

HUAWEI TELCOMMUNICATION 1.1 Introduction Huawei is one of the world's leading providers of ICT solutions, with a footprint spanning 140 countries and revenues of USD 28 billion in 2010. With a significant presence in Carrier Network, Enterprise Business, Device Business and other business, Huawei provides cuttingedge, next generation solutions in the domains of Information, Communications and Technology. Huawei began its India operations in 1999. Today, with a pan-India presence, and partnerships with every telecom service provider and other key stakeholders, Huawei has contributed significantly to the growth of the Indian ICT industry. Huawei's largest overseas R&D centre is located in Bangalore, and the company employs over 6,000 engineers and managers in the country. Working closely with its customers, Huawei India is committed to enriching lives through communication. A leading telecom infrastructure and solutions company, Huaweis relationship with India goes back to the year 1999, when it established the first overseas R&D Centre in Bangalore. Over the years, Huawei India has partnered with the Indian government, public sector companies and private enterprises to enable rapid growth of telecommunication services in the country. Today, India is Huaweis second largest market outside of China with an employee base of over 6,200 employees across the length and breadth of the country. Huawei is committed towards enriching lives of Indians through communication, bridging digital divide and growing telecom in a sustainable manner.

1.2 Vision and Mission 1.2.1 Our Enduring Brand Promise

Enriching life and improving efficiency through a better connected world. 1.2.2 Customer-centric We keep an unwavering focus on our customers, partnering with them and committing ourselves to meet their goals and needs. We rely on deep customer insights and continuous feedback to guide our priorities and influence the way we work. Our Brand Attributes

Dedicated We are passionate about the success of our customers, making every effort to meet our commitments. We measure our work against how much value we bring to customers. We strive to continuously improve ourselves, building our capabilities, our knowledge base, and our expertise. Innovative We proactively anticipate trends and customer needs. Continuous innovation puts us directly on the cutting edge of technology. We generate new value through smart design and the integration of our products, services, and experiences future Global We operate on the world stage so that we can provide the best locally. We are actively engaged in communities; we learn from local cultures, recruit and develop local talent, partner with local suppliers, and customize our offerings for local tastes and needs. Open We are active listeners and contributors internally and externally. We always bring a unique point of view, listen to others suggestions for how we can improve, and share knowledge and insights to help the industry and key stakeholders evolve and grow. Trusted We say what we do and do what we say, delivering on the promises we make to our customers and partners. We respect fair business practices and maintain the highest standards of information integrity and security. As a responsible corporate citizen, we actively promote the sustainable development of society, the economy, and the environment.

1.3 Core Values

1.3.1 Customers First

Huawei exists to serve customers whose demand is the driving force behind our development. We continuously create long term value for customers by being responsive to their needs and requirements. We measure our work against how much value we bring to customers because we can only succeed through our customers' success.

1.3.2 Dedication We win customers' respect and trust primarily through dedication. It includes every effort we make to create value for customers and to improve our capabilities. We value employees' contributions and reward them accordingly. 1.3.3 Continuous Improvement Continuous improvement is required for us to become better partners for our customers, improve our company and grow as individuals. This process requires that we actively listen and learn in order to improve. 1.3.4 Openness and Initiative Driven by customer needs, we passionately pursue customer-centric innovations in an open manner. We believe that business success is the ultimate measure of the value of any technology, product, solution or process improvement. 1.3.5 Integrity Integrity is our most valuable asset. It drives us to behave honestly and keep our promises, and, thus, win our customers' trust and respect. 1.3.6 Teamwork We can only succeed through teamwork. By working closely in both good times and bad, we lay the foundation for successful cross-cultural collaboration, streamlined inter-departmental cooperation and efficient processes.

CHAPTER 2 Information and Communication Technology

2.1 WHAT IS ICT? ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

Fig 2.1 The term ICT is now also used to refer to the convergence of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. In other words, ICT consists of IT as well as telephony, broadcast media, and all types of audio and video processing and transmission. The expression was first used in 1997in a report by Dennis Stevenson to the UK government and promoted by the new National Curriculum documents for the UK in 2000. ICT is often used in the context of "ICT roadmap" to indicate the path that an organization will take with their ICT needs. The term ICT is now also used to refer to the merging (convergence) of telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the telephone network with the computer network system. See VOIP. This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the two network systems. ICT stands for 'Information and Communication Technology'. IT stands for 'Information Technology'. The two are very similar. The main difference is that IT is more widely used within industry, whereas ICT

is applied to the academic and education side and used in places of learning, such as school, colleges and universities.

2.2 Technological Capacity of ICT The world's technological capacity to store information grew from 2.6 (optimally compressed) exabytes in 1986 to 15.8 in 1993, over 54.5 in 2000, and to 295 (optimally compressed) exabytes in 2007. This is the informational equivalent to 404 billion CD-ROM in 2007. Piling them up would create a stack from the earth to the moon and a quarter of this distance beyond (with 1.2 mm thickness per CD). The worlds technological, capacity to receive information through one-way broadcast networks was 432 exabytes of (optimally compressed) information in 1986, 715 (optimally compressed) exabytes in 1993, 1.2 (optimally compressed) zettabytes in 2000, and 1.9 zettabytes in 2007. The world's effective capacity to exchange information through two-way telecommunication networks was 281 petabytes of (optimally compressed) information in 1986, 471 petabytes in 1993, 2.2 (optimally compressed) exabytes in 2000, and 65 (optimally compressed) exabytes in 2007. The world's technological capacity to compute information with humanly guided general-purpose computers grew from 3.0 10^8 MIPS in 1986, to 6.4 x 10^12 MIPS in 2007.

CHAPTER 3 Mobile Communication History

3.1 Evolution of PSTN 3.1.1 PSTN : (1990-2000) The basic call service is provided, and the telephone is popularised in large scale. The voice quality is good because the circuit switched technology is adopted. Representative model : CC08-128 M switch 3.1.2 SoftSwitch : (2001-2010) The basic call service and Multimedia services are provided. The IP packet switched (PS) technology is adopted, implementing the transition from centralised control to decentralised control and cost saving. Representative model : U-SYS SoftX3000 3.1.3 IMS : (2011-201X) - Multimedia Services are provided. All services are completely separated from the control part. The Fixed Mobile Convergence (FMC). The development trend of the communication network, is implemented. Representative model : IMS SingleCORE 3.2 Evolution of Mobile Communication

Fig 3.1

3.2.1 1st Generation Mobile Communication (1G) 1G or 1st generation mobile phones were the earliest cellular systems that were developed in early 80s. The idea was come up with the development of the short ranged radio telephones. At early 70s, the short ranged radio waved telephones were developed s uch as walkie-talkies. These systems were used to communicate over small geographical area & the system is fully analog. Which means communication is done by switching from sender to receiver. In these telephone systems, the communication was done by transmitting radio signals on specific frequencies through the airwaves. In the early 80s, the 1st generation phones were developed to increase the efficiency of the mobile technology. 1G phone are also analogue & the major improvement done was increasing the range of the transmission. So that the communication can be done over a large area, than the walkie-talkies. 1st Generation mobile phones used a single universal network standard known as Advanced Mobile Phone Systems (AMPS). In this technology, separate frequencies were used for each conversation & therefore needed considerable bandwidth for a large number of users. That means the bandwidth needed to be increased with the users. In AMPS, the cell centers could assign channels to handsets based on the signal strength. It also allowed re-using the same frequency in various locations without interference. This allowed a large number of phones to be supported over a geographical area. AMPS cellular service was operated in the 800-900 MHz cellular FM band. 3.2.1.1 Features of 1G Mobile Technology Analogue system. Mobility can take the cellular where needed Circuit switched technology. Basic voice calls only. Limited local & regional coverage. Phones were large in

Inventor of 1G mobile-Dr Martin Cooper Fig 3.2 3.2.2 2nd Generation Mobile Technology (2G)

1G mobile phone Fig 3.3

After the 1st Generation mobile technology, at early 90s, the 2G or 2nd Generation mobile networks were established. It was developed as a solution for problems arose in analogue systems. Therefore digital encryption of the voice calls was used in 2G technology. That means the digital mobile communication started with the 2nd Generation. 2G cellular telecom networks were commercially launched on GSM (Global Systems for Mobile Communication) standard in Finland in 1991. Along with the digital advancement, 2G came with another two benefits, over the 1G mobile phones. 2G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels & also introduced the data services for mobile phones. The ability to send text messages or SMS (Short Message Service) was 1st invented in 2G mobile phones. Thus this SMS facility made the mobile communication more efficient & effective to use. 2G technologies can be divided into two standards depending on the type of multiplexing used. TDMA-based (Time Division Multiple Access) & CDMA-based (Code Division Multiple Access) are those two standards. The phrase multiple access means that more than one user can utilize each call. TDMA assigns each call a certain portion of time on a designated frequency. TDMA is used for Interim Standard 54 (IS-54) & Interim Standard 136 (IS-136).in TDMA each conversation gets the radio for one-third of the time & therefore TDMA has three times the capacity of an analog system using the same number of channels. TDMA operates in 800 MHz (IS-54) or 1900 MHz (IS-136). CDMA gives a unique code to each call & spreads it over the available frequencies. After digitizing data, spreads it over the entire available bandwidth. CDMA is the basis for Interim Standard 95 (IS-95) & operates both in 800 MHz & 1900 MHz bands. The main 2G standards are as follows. GSM- TDMA based technology

CDMA one CDMA based technology PDC TDMA based used exclusively in Japan

There are number of advantages in 2G technology. Introducing the digital data services such as SMS& email is a major improvement. The lower power emission made sure the health safety. Withanalogue systems, same phone number can be in two or more phones & it was eliminated in 2G. Theprivacy is ensured in 2G phones than the 1G phone

2G mobile phones Fig 3.3 3.2.2.1 2.5G Mobile Technology 2.5G is the 2nd Generation enhanced version of 2G technology. The enhancement achieved through implementing a packet switched domain in addition to circuit switched domain. This is to give user a better services & access to the internet. 2.5G gives higher data rates & additional capabilities. The technology used to access internet is General Packet Radio Service (GPRS). GPRS can provide data rates from 56 kb/s, up to 115 kb/s. GPRS can be used for services such as Wireless Application Protocol (WAP) access, Multimedia Messaging Service (MMS), & for internet services such as email& World Wide Web (WWW) access. 3.2.2.2 2.75G Mobile Technology 2.75G Mobile Technology Another enhancement in 2G technology is the 2.75G & it is the road to the 3G technology. GPRS networks evolved in Enhanced Data Rates for GSM Evolution (EDGE). EDGE, Enhanced GPRS (EGPRS), or IMT Single Carrier (IMT-SC) is a backward compatible digital mobile phone technology & it allows improved data transfer rates. EDGE is developed in 2003 by AT&T in US. EDGE is standardized by 3GPP & it provides increased capacity of GSM/GPRS networks. Higher data rates are achieved by switching to more sophisticated methods of coding with existing GSM timeslots. 3.2.3 3rd Generation Mobile Generation (3G) 3rd Generation or the 3G mobile technology is the latest state in the development of wireless communication technology. The 3G technology was first used in Japan in 2001, as they did not

use the 2.5G technology; thus they needed a solution to bridge the gap & face the capacity requests. Since then it improved a lot by adding many sophisticated features for the users. 3G uses a host of high tech infrastructure networks, handsets, base stations, switches & other devices to allow mobile to offer high speed internet access, data & CD quality services. Currently, over 80% of the world population is using this 3G mobile technology for their communication purposes. Compared to earlier mobile phones, 3G handsets provide many new features like TV streaming, multimedia, videoconferencing, web browsing, e-mail, paging, fax, navigational maps & etc. Also the ability to enhance the features & add additional functionalities to the available applications is another added advantage in this 3G technology. 3G technologies are developed according to the International Telecommunications Unions IMT 2000 specification. Universal Mobile Telephone System (UMTS) is one of the technologies used in 3G mobiles which are based on W-CDMA technology. This is used in the countries which used GSM technology & UMTS is managed by the 3GPP organization. Another standard is the CDMA2000 which is an enhancement of earlier version of 2G CDMA standard (IS-95) & is managed by 3GPP2. The other standard is TD-CDMA which is being developed in China. The 3G technology allows 2Mbps speed for stationary & 384Kbps for mobile systems.

3G mobile phones Fig 3.4 3.2.3.1 3.5G mobile Technology 3.5G is the next generation in mobile technology which is also called High-Speed Downlink Packet Access (HSDPA). It is a mobile telephony protocol & is a packet-based data service in W-CDMA, downlink with a data transmission up to 8-10 Mbit/s over a 5 MHz bandwidth. HSDPA is enabled with a new transport layer channel which is called High Speed Downlink Shared Channel (HS-DSCH) to send packets on the downlink. It includes 3 layers to enhance its services. HS-SCCH, HS-PDSCH & HS-DPCCH are those three layers. In HSDPA or 3.5G technology, the data is transmitted together with error correction bits, thus can be corrected without re-transmission. The HS-DSCH channel is shared between users using channeldependent scheduling to make the best use of available radio conditions. So the packet scheduling in 3.5G phones, is very faster than other technologies. Adaptive modulation & coding

is another significant improvement in 3.5G technology. As well as improving data rates, it also decreases latency & so the round trip time for applications also reduced.

3.5g mobile phone Fig 3.5

3.2.4 4th Generation Mobile Technology (4G) 4G can be considered as the future of the mobile technology. With the rapid development in the technology, people try to have more sophisticated & advanced mobile communication. With the high rates of requirements, 4G technology comes into the play. Even though 3G is a successful invention, still there are many reasons to go for 4G technology, as listed below. High input fees for the 3G service licenses. Difference in license terms 3G phones are expensive Lack of coverage Low cost Wider bandwidths, higher bit rates Scalability of mobile networks

In 4G mobile phones, the data transfer rate is more than 100 Mbit/s & link efficiency of 15 bit/s/Hz in the downlink & 6.75 bit/s/Hz in uplink. It expected to have high quality services for multimedia purposes such as real time audio, high speed data, HDTV video content, mobile TV, etc. As the future expectations from a mobile phone is more towards the internet access, in 4G technology, data communication is via IPV6 technology to support for the rapid growing users. It uses multi standard wireless systems such as Bluetooth, WI-Fi. The CDMA technology is not used in 4G instead uses the Orthogonal Frequency Division Multiplexing (OFDM) technology. OFDM allows transferring data more than other forms of multiplexing. It simplifies the design of the transmitter & receiver & allows using almost the entire frequency band. WiMax connection is using the 4G technology in the mobile phones

recently. A 4G mobile phone can be considered as a fully functional computer with the portability.

4G mobile phones Fig 3.6

CHAPTER 4 Global system for Mobile Communication

4.1 Introduction to GSM Global System for mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. GSM (Global System for Mobile Communications) is the most popular standard for mobile telephony systems in the world. It enables international roaming arrangements between mobile phone operators, providing subscribers the use of their phones in many parts of the world. GSM differs from its predecessor technologies in that both signaling and speech channels are digital, and thus GSM is considered a second generation (2G) mobile phone system. The ubiquity of implementation of the GSM standard has been an advantage to both consumers, who may benefit from the ability to roam and switch carriers without replacing phones, and also to network operators, who can choose equipment from many GSM equipment vendors. GSM also pioneered low-cost implementation of the short message service (SMS), also called text messaging, which has since been supported on other mobile phone standards as well. Newer versions of the standard were backward-compatible with the original GSM system. For example, Release '97 of the standard added packet data capabilities by means of General Packet Radio Service (GPRS). Release '99introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).

4.2 GSM Carrier Frequencies GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated, the 850 MHz and 1900 MHz bands were used instead (for example in Canada and the United States). Freq. Range for GSM900 : Regardless of the frequency selected by an operator, it is divided into timeslots for individual phones to use. This allows eight full-rate or sixteen half-rate speech channels per radio frequency. These eight radio timeslots (or eight burst periods) are grouped into a TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is 270.833 kbit/s, and the frame duration is 4.615 ms.

The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900.

Table 4.1 4.3 GSM network Components

Fig 4.1

GSM Network Architecture consists : Mobile Station SIM Mobile Handset Base Station Subsystem BSC (Base Site Controller) BTS (Base Transceiver Station) Network Switching System MSC (Mobile Switching Centre) HLR (Home Location Register) VLR (Visitor Location Register) EIR (Equipment Identity Register) AUC (Authentication Centre)

4.3.1 MOBILE STATION The MS (Mobile Station) is the combination of terminal equipment and subscribers data. The terminal equipment as such is called as ME (Mobile Equipment) and the subscribers data is stored in a saperate module called SIM (Subscribers Identity Module). MS=ME+SIM

Fig 4.2 The primary functions of MS are to transmit and receive voice and data over the air interface of the GSM system. MS performs the signal processing function of digitizing, encoding, error protecting, encrypting, and modulating the transmitted signals. It also performs the inverse functions on the received signals from the BS.

In order to transmit voice and data signals, the mobile must be in synchronization with the system so that the messages are the transmitted and received by the mobile at the correct instant. To achieve this, the MS automatically tunes and synchronizes to the frequency and TDMA timeslot specified by the BSC. This message is received over a dedicated timeslot several times within a multi frame period of 51 frames. The exact synchronization will also include adjusting the timing advance to compensate for varying distance of the mobile from the BTS. 4.3.2 SIM The SIM is a removable, the size of a credit card, and contains an integrated circuit chip with a microprocessor, random access memory (RAM), and read only memory (ROM). The subscriber inserts it in the MS unit when he or she wants to use the MS to make or receive a call. As stated, a SIM also comes in a modular from that can be mounted in the subscribers equipment. A subscriber identity module (SIM) on a removable SIM card securely stores the servicesubscriber key (IMSI) used to identify a subscriber on mobile telephony devices (such as mobile phones and computers). The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone or broadband telephony device.

Fig 4.3 GSM subscribers are provided with a SIM (subscriber identity module) card with its unique identification at the very beginning of the service. By divorcing the subscriber ID from the equipment ID, the subscriber may never own the GSM mobile equipment set. The subscriber is identified in the system when he inserts the SIM card in the mobile equipment. This provides an enormous amount of flexibility to the subscribers since they can now use any GSM-specified mobile equipment. Thus with a SIM card the idea of Personalize the equipment currently in use and the respective information used by the network (location information) needs to be updated. The smart card SIM is portable between Mobile Equipment (ME) units. The user only needs to take his smart card on a trip. He can then rent a ME unit at the destination, even in another country, and insert his own SIM. Any calls he makes will be charged to his home GSM account. Also, the GSM system will be able to reach him at the ME unit he is currently using. This is the main advantage of GSM over CDMA.

4.3.3 Base Station System (BSS) The BSS is a set of BS equipment (such as transceivers and controllers) that is in view by the MSC through a single A interface as being the entity responsible for communicating with MSs in a certain area. The radio equipment of a BSS may be composed of one or more cells. A BSS may consist of one or more BS. The interface between BSC and BTS is designed as an A bis interface. The BSS includes two types of machines: the BTS in contact with the MSs through the radio interface; and the BSC, the latter being in contact with the MSC. The function split is basically between transmission equipment, the BTS and managing equipment at the BSC. All radio-related functions are performed in the BSS, which consists of base station controllers (BSCs) and the base transceiver stations (BTSs).

4.3.4 Base Station Controller (BSC)

Fig 4.4 A BSC is a network component in the PLMN that function for control of one or more BTS. It is a functional entity that handles common control functions within a BTS. BSC within a mobile network is a key component for handling and routing information. The BSC provides all the control functions and physical links between the MSC and BTS. It is a high-capacity switch that

provides functions such as handover, cell configuration data, and control of radio frequency (RF) power levels in base transceiver stations. A number of BSCs are served by an MSC. The BSC is connected to the MSC on one side and to the BTS on the other. The BSC performs the Radio Resource (RR) management for the cells under its control. It assigns and releases frequencies and timeslots for all MSs in its own area. The BSC performs the intercell handover for MSs moving between BTS in its control. It also reallocates frequencies to the BTSs in its area to meet locally heavy demands during peak hours or on special events. The BSC controls the power transmission of both BSSs and MSs in its area. The minimum power level for a mobile unit is broadcast over the BCCH. The BSC provides the time and frequency synchronization reference signals broadcast by its BTSs. The BSC also measures the time delay of received MS signals relative to the BTS clock. If the received MS signal is not centered in its assigned timeslot at the BTS, The BSC can direct the BTS to notify the MS to advance the timing such that proper synchronization takes place. The BSC may also perform traffic concentration to reduce the number of transmission lines from the BSC to its BTSs. 4.3.5 Base Terminal Station (BTS) The BTS handles the radio interface to the mobile station. The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the network. A group of BTSs are controlled by a BSC. A BTS is a network component that serves one cell and is controlled by a BSC. BTS is typically able to handle three to five radio carries, carrying between 24 and 40 simultaneous communication. Reducing the BTS volume is important to keeping down the cost of the cell sites.

A BTS compares radio transmission and reception devices, up to and including the antennas, and also all the signal processing specific to the radio interface. A single transceiver within BTS supports eight basic radio channels of the same TDM frame. The primary responsibility of the BTS is to transmit and receive radio signals from a mobile unit over an air interface. To perform this function completely, the signals are encoded, encrypted, multiplexed, modulated, and then fed to the antenna system at the cell site. Transcoding to bring 13-kbps speech to a standard data rate of 16 kbps and then combining four of these signals to 64 kbps is essentially a part of BTS, though; it can be done at BSC or at MSC. The voice communication can be either at a full or half rate over logical speech channel. In order to keep the mobile synchronized, BTS transmits frequency and time synchronization signals over

frequency correction channel (FCCH and BCCH logical channels. The received signal from the mobile is decoded, decrypted, and equalized for channel impairments. Random access detection is made by BTS, which then sends the message to BSC. The channel subsequent assignment is made by BSC. Timing advance is determined by BTS. BTS signals the mobile for proper timing adjustment. Uplink radio channel measurement corresponding to the downlink measurements made by MS has to be made by BTS BTS-BSC Configurations There are several BTS-BSC configurations: single site, single cell; single site, multicell; and multisite, multicell. These configurations are chosen based on the rural or urban application. These configurations make the GSM system economical since the operation has options to adapt the best layout based on the traffic requirement. Thus, in some sense, system optimization is possible by the proper choice of the configuration. These include omni-directional rural configuration where the BSC and BTS are on the same site; chain and multidrop loop configuration in which several BTSs are controlled by a single remote BSC with a chain or ring connection topology; rural star configuration in which several BTSs are connected by individual lines to the same BSC; and sectorized urban configuration in which three BTSs share the same site and are controlled by either a collocated or remote BSC. In rural areas, most BTSs are installed to provide maximum coverage rather then maximum capacity.

4.3.6 NETWORK SWITCHING SUBSYSTEM: The Network Switching Subsystem (NSS) comprises of: Mobile services Switching Centre (MSC) Home Location Register (HLR) Visitor Location Register (VLR) Authentication Centre (AC) Equipment Identification Register (EIR)

Fig 4.5 The network and the switching subsystem together include the main switching functions of GSM as well as the databases needed for subscriber data and mobility management (VLR). The main role of the MSC is to manage the communications between the GSM users and other telecommunication network users. The basic switching function is performed by the MSC, whose main function is to coordinate setting up calls to and from GSM users. The MSC has interface with the BSS on one side (through which MSC VLR is in contact with GSM users) and the external networks on the other (ISDN/PSTN/PSPDN). The main difference between a MSC and an exchange in a fixed network is that the MSC has to take into account the impact of the allocation of RRs and the mobile nature of the subscribers and has to perform, in addition, at least, activities required for the location registration and handover. The MSC is a telephony switch that performs all the switching functions for MSs located in a geographical area as the MSC area. The MSC must also handle different types of numbers and identities related to the same MS and contained in different registers: IMSI, TMSI, ISDN number, and MSRN. In general identities are used in the interface between the MSC and the MS, while numbers are used in the fixed part of the network, such as, for routing. 4.3.7 Mobile services Switching Centre (MSC) An MSC is the point of connection to the network for mobile subscribers of a wireless telephone network. It connects to the subscribers through base stations and radio transmission equipment that control the air interface, and to the network of other MSCs and wireless infrastructure through voice trunks and SS7. An MSC includes the procedures for mobile registration and is generally co-sited with a visitor location register (VLR) that is used to temporarily store information relating to the mobile subscribers temporarily connected to that MSC. The MSC performs the telephony switching functions of the system. It controls calls to and from other telephone and data systems. It also performs such functions as toll ticketing, network interfacing, common channel signaling, and others. As stated, the main function of the MSC is to coordinate the set up of calls between GSM mobile and PSTN users. Specifically, it performs functions such as paging, resource allocation, location registration, and encryption.

Specifically, the call-handling function of paging is controlled by MSC. MSC coordinates the set up of call to and from all GSM subscribers operating in its areas. The dynamics allocation of access resources is done in coordination with the BSS. More specifically, the MSC decides when and which types of channels should be assigned to which MS. The channel identity and related radio parameters are the responsibility of the BSS; The MSC provides the control of interworking with different networks. It is transparent for the subscriber authentication procedure. The MSC supervises the connection transfer between different BSSs for MSs, with an active call, moving from one call to another. This is ensured if the two BSSs are connected to the same MSC but also when they are not. In this latter case the procedure is more complex, since more then one MSC involved. The MSC performs billing on calls for all subscribers based in its areas. When the subscriber is roaming elsewhere, the MSC obtains data for the call billing from the visited MSC. Encryption parameters transfers from VLR to BSS to facilitate ciphering on the radio interface are done by MSC. The exchange of signaling information on the various interface toward the other network elements and the management of the interface themselves are all controlled by the MSC. Finally, the MSC serves as a SMS gateway to forward SMS messages from Short Message Service Centres (SMSC) to the subscribers and from the subscribers to the SMSCs. It thus acts as a message mailbox and delivery system The SMSC is a store-and-forward device used to provide peer-to-peer text messaging services in mobile networks. Any text message issued from a mobile handset is forwarded to the SMSC, where the location of the called subscriber is determined by consulting the appropriate HLR. If the subscriber is currently connected to a reachable network, the location is determined and the text message is transmitted. If not, the message is stored for later transmission once the subscriber becomes available. The SMSC also includes back-end interfaces for the connection of enhanced service platforms that can be used to implement a variety of SMS services such as tele voting and premium rate data services (e.g., weather, traffic, sports, and news). 4.3.8 Visitor Location Register The VLR is a database that contains temporary information about subscribers that is needed by the MSC in order to service visiting subscribers. The VLR is always integrated with the MSC. When a mobile station roams into a new MSC area, the VLR connected to that MSC will request data about the mobile station from the HLR. Later, if the mobile station makes a call, the VLR will have the information needed for call setup without having to interrogate the HLR each time. The VLR is allocated with an MSC. A MS roaming in an MSC area is controlled by the VLR responsible for that area. When a MS appears in a LA, it starts a registration procedure. The MSC for that area notices this registration and transfers to the VLR the identity of the LA where the MS is situated. A VLR may be in charge of one or several MSC LAs. The VLR constitutes the databases that support the MSC in the storage and retrieval of the data of subscribers present

in its area. When an MS enters the MSC area borders, it signals its arrival to the MSC that stores its identity in the VLR. The information necessary to manage the MS is contained in the HLR and is transferred to the VLR so that they can be easily retrieved if so required. The data contained in the VLR and in the HLR are more or less the same. Nevertheless the data are present in the VLR only as long as the MS is registered in the area related to that VLR. Data associated with the movement of mobile are IMSI, MSISDN, MSRN, and TMSI. The terms permanent and temporary, in this case, are meaningful only during that time interval. Some data are mandatory, others are optional.

4.3.9 Home Location Register The HLR is a database that permanently stores data related to a given set of subscribers. The HLR is the reference database for subscriber parameters. Various identification numbers and addresses as well as authentication parameters, services subscribed, and special routing information are stored. Current subscriber status including a subscribers temporary roaming number and associated VLR if the mobile is roaming, are maintained. The HLR is a database used for storage and management of subscriptions. The HLR is considered the most important database, as it stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status. When an individual buys a subscription from one of the PCS operators, he or she is registered in the HLR of that operator. Once a mobile user is registered with a network, the current location is stored in the HLR, thus allowing incoming calls to be routed to the subscriber. The HLR provides data needed to route calls to all MS-SIMs home based in its MSC area, even when they are roaming out of area or in other GSM networks. The HLR provides the current location data needed to support searching for and paging the MS-SIM for incoming calls, wherever the MS-SIM may be. The HLR is responsible for storage and provision of SIM authentication and encryption parameters needed by the MSC where the MS-SIM is operating. It obtains these parameters from the AUC. The HLR maintains record of which supplementary service each user has subscribed to and provides permission control in granting services. The HLR stores the identification of SMS gateways that have messages for the subscriber under the SMS until they can be transmitted to the subscriber and receipt is knowledge.

Some data are mandatory, other data are optional. Both the HLR and the VLR can be implemented in the same equipment in an MSC (collocated). A PLMN may contain one or several HLRs 4.3.10 Authentication Centre A unit called the AUC provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call. The AUC protects network operators from different types of fraud found in today's cellular world. The AUC stores information that is necessary to protect communication through the air interface against intrusions, to which the mobile is vulnerable. The legitimacy of the subscriber is established through authentication and ciphering, which protects the user information against unwanted disclosure. Authentication information and ciphering keys are stored in a database within the AUC, which protects the user information against unwanted disclosure and access. The HLR is also responsible for the authentication of the subscriber each time he makes or receives a call. The AUC, which actually performs this function, is a separate GSM entity that will often be physically included with the HLR. Being separate, it will use separate processing equipment for the AUC database functions. 4.3.11 Equipment Identity Register The EIR is a database that contains information about the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective mobile stations. The AUC and EIR are implemented as stand-alone nodes or as a combined AUC/EIR node. EIR is a database that stores the IMEI numbers for all registered ME units. The IMEI uniquely identifies all registered ME. There is generally one EIR per PLMN. It interfaces to the various HLR in the PLMN. The EIR keeps track of all ME units in the PLMN. It maintains various lists of message. The database stores the ME identification and has nothing do with subscriber who is receiving or originating call. There are three classes of ME that are stored in the database, and each group has different characteristics: White List: contains those IMEIs that are known to have been assigned to valid MSs. This is the category of genuine equipment. Black List: contains IMEIs of mobiles that have been reported stolen. Gray List: contains IMEIs of mobiles that have problems (for example, faulty software, and wrong make of the equipment). This list contains all MEs with faults not important enough for barring.

4.4

Handover Handover, or handoff as it is called in North America, is the switching of an ongoing call to a different channel or cell. There are four different types of handover in the GSM system, which involve transferring a call between

Channels (time slots) in the same cell, Cells (Base Transceiver Stations) under the control of the same Base Station Controller (BSC), Cells under the control of different BSCs, but belonging to the same Mobile services Switching Centre (MSC), and Cells under the control of different MSCs.

The first two types of handover, called internal handovers, involve only one Base Station Controller (BSC). To save signalling bandwidth, they are managed by the BSC without involving the Mobile service Switching Centre (MSC), except to notify it at the completion of the handover. The last two types of handover, called external handovers, are handled by the MSCs involved. Note that call control, such as provision of supplementary services and requests for further handoffs, is handled by the original MSC. Handovers can be initiated by either the mobile or the MSC (as a means of traffic load balancing). During its idle time slots, the mobile scans the Broadcast Control Channel of up to 16 neighboring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, and is used by the handover algorithm. The algorithm for when a handover decision should be taken is not specified in the GSM recommendations. There are two basic algorithms used, both closely tied in with power control. This is because the BSC usually does not know whether the poor signal quality is due to multipath fading or to the mobile having moved to another cell. This is especially true in small urban cells

4.5

MBB (Mobile Broadband) :

Fig 4.6 Mobile broadband is the marketing term for wireless Internet access delivered through mobile phone towers to computers, mobile phones (called "cell phones" in North America and South Africa), and other digital devices using portable modems. Although broadband has a technical meaning, wireless-carrier marketing uses the phrase "mobile broadband" as a synonym for mobile Internet access. The bit rates available with Mobile broadband devices support voice and video as well as other data access. Devices that provide mobile broadband to mobile computers include:

PC cards, also known as PC data cards, and Express cards USB and mobile broadband modems, also known as connect cards portable devices with built-in support for mobile broadband, such as laptop computers, netbook computers, smartphones, Ipads, PDAs, and other mobile Internet devices.

Internet access subscriptions are usually sold separately from mobile phone subscriptions. 4.6 Gateway GPRS support node (GGSN) The gateway GPRS support node (GGSN) is a main component of the GPRS network. The GGSN is responsible for the internetworking between the GPRS network and external packet switched networks, like the Internet and X.25 networks.

From an external network's point of view, the GGSN is a router to a "sub-network", because the GGSN hides the GPRS infrastructure from the external network. When the GGSN receives data addressed to a specific user, it checks if the user is active. If it is, the GGSN forwards the data to the SGSN serving the mobile user, but if the mobile user is inactive, the data is discarded. On the other hand, mobile-originated packets are routed to the right network by the GGSN. The GGSN is the anchor point that enables the mobility of the user terminal in the GPRS/UMTS networks. In essence, it carries out the role in GPRS equivalent to the home agent in Mobile IP. It maintains routing necessary to tunnel the protocol data units (PDUs) to the SGSN that services a particular MS (mobile station). The GGSN converts the GPRS packets coming from the SGSN into the appropriate packet data protocol (PDP) format (e.g., IP or X.25) and sends them out on the corresponding packet data network. In the other direction, PDP addresses of incoming data packets are converted to the GSM address of the destination user. The readdressed packets are sent to the responsible SGSN. For this purpose, the GGSN stores the current SGSN address of the user and his or her profile in its location register. The GGSN is responsible for IP address assignment and is the default router for the connected user equipment (UE). The GGSN also performs authentication and charging functions. With LTE scenario the GGSN functionality moves to SAE gateway (with SGSN functionality working in MME). 4.7 Serving GPRS support node (SGSN) A serving GPRS support node (SGSN) is responsible for the delivery of data packets from and to the mobile stations within its geographical service area. Its tasks include packet routing and transfer, mobility management (attach/detach and location management), logical link management, and authentication and charging functions. The location register of the SGSN stores location information (e.g., current cell, current VLR) and user profiles (e.g., IMSI, address(es) used in the packet data network) of all GPRS users registered with it. 4.7.1 Common SGSN functions

Detunnel GTP packets from the GGSN (downlink) Tunnel IP packets toward the GGSN (uplink) Carry out mobility management as Standby mode mobile moves from one Routing Area to another Routing Area Billing user data

4.7.2 GSM/EDGE specific SGSN functions Enhanced Data Rates for GSM Evolution (EDGE) specific SGSN functions and characteristics are:

Maximum data rate of approx. 60 kbit/s (150 kbit/s for EDGE) per subscriber Connect via frame relay or IP to the packet control unit using the Gb protocol stack

Accept uplink data to form IP packets Encrypt down-link data, decrypt up-link data Carry out mobility management to the level of a cell for connected mode mobiles

CHAPTER 5 Data Network and Transport Network

5.1 MAN A metropolitan area network (MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. The limits of Metropolitan cities are determined by local municipal corporations and we cannot define them. Hence, the bigger the Metropolitan city the bigger the MAN, smaller a metro city smaller the MAN. The IEEE 802-2002 standard describes a MAN as being: A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate-to-high data rates. A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. MANs might also be owned and operated as public utilities. They will often provide means for internetworking of local networks. MAN ARCHITECTURE

Fig 5.1

The full MAN architecture consists of MAN transport network , MAN data network and broadband access network. In addition , the MAN can be divided into the core layer , convergence layer , access network layer , and end access layer. 5.1.1 MAN transmission network :- Through SDH technology / MSTP or through WDM , the physical connection between networked computing devices is established using either cable media or wireless media. 5.1.2 MAN data network:- Switches / Ethernet including the service access control layer and uses IP / MPLS . Broadband access network :- It is a part of telecommunications network which connects subscribers to their immediate service provider. It is contrasted with core network. It resides between a device such as remotely controlled machine and provides connection with its core network (CN)

Fig 5.2 5.2 MAN Data Network(IP MAN ) Layers of Data Communication Network Structure Data communication network is a physical transfer of data (a digital bit stream) over a point to point or point to multipoint communication. A communication data communication network consists of :-

BACKBONE NETWORK MAN ACCESS NETWORK A backbone network is a part of network infrastructure that interconnects various pieces of networks, providing path for exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in same building, in different building in a campus environment, or over wide areas. Normally, the backbones capacity is greater than the networks connected to it. A MAN is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN An access network is that part of telecommunications network which connects subscribers to their immediate service provider. It is contrasted with the core network (eg: the network switching subsystem in GSM ) which connects local providers to each other. The access network may be further divided between feeder plan or distribution network, and drop plant or edge network.

5.2.1 MAN data network structure

5.2.2 Types of DATA NETWORK IP network:- The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP, as the primary protocol in the Internet layer of the Internet protocol suite, has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. ATM network :- Asynchronous Transfer Mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals". ATM was developed to meet the needs of the Broadband Integrated Services Digital Network, as defined in the late 1980s,[2] and designed to unify telecommunication and computer networks. It was designed for a network that must handle both traditional high-throughput data traffic (e.g., file transfers), and realtime, low-latency content such as voice and video. Frame relay (FR) network:- Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology. Originally designed for transport across Integrated Services Digital Network (ISDN) infrastructure, it may be used today in the context of many other network interfaces.

5.3 Transmission method in current communication networks It means through which data is transformed from one place to another is called transmission or communication media. There are two categories of transmission media used in computer communications.

BOUNDED/GUIDED MEDIA UNBOUNDED/UNGUIDED MEDIA

5.3.1 BOUNDED MEDIA: Bounded media are the physical links through which signals are confined to narrow path. These are also called guide media. Bounded media are made up of external conductor (Usually Copper) bounded by jacket material.

Commonly used transmission media are : Copper cables Microwave radio Optical fiber Infrared radio

5.3.1.1 COPPER CABLES The physical cable is often the weak link in data communication. It is the cable that handles the interference sensitive analogue signal. It is the cable, through its design, installation and length together with the surrounding electrical effects, which determines the rate and quality of communications. 5.3.1.2 COAXIAL CABLE: Coaxial cable is very common & widely used commutation media. For example TV wire is usually coaxial. Coaxial cable gets its name because it contains two conductors that are parallel to each other. The center conductor in the cable is usually copper. The copper can be either a solid wire or stranded martial. CHARACTERISTICS OF COAXIAL CABLE

Low cost Easy to install Up to 10Mbps capacity Medium immunity form EMI Medium of attenuation

ADVANTAGES COAXIAL CABLE


Inexpensive Easy to wire Easy to expand Moderate level of EMI immunity

DISADVANTAGE COAXIAL CABLE

Single cable failure can take down an entire network

5.3.1.3 Twisted Pair Cable The most popular network cabling is Twisted pair. It is light weight, easy to install, inexpensive and support many different types of network. It also supports the speed of 100 mps. Twisted pair cabling is made of pairs of solid or stranded copper twisted along each other. The twists are done to reduce vulnerably to EMI and cross talk. The number of pairs in the cable depends on the type. The copper core is usually 22-AWG or 24-AWG, as measured on the American wire gauge standard. There are two types of twisted pairs cabling 1. Unshielded twisted pair (UTP) 2. Shielded twisted pair (STP) 5.3.1.4 Fiber Optics Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light only moves in one direction for two way communication to take place a second connection must be made between the two devices. It is actually two stands of cable. Each stand is responsible for one direction of communication. A laser at one device sends pulse of light through this cable to other device. These pulses translated into 1s and 0s at the other end. In the center of fiber cable is a glass stand or core. The light from the laser moves through this glass to the other device around the internal core is a reflective material known as CLADDING. No light escapes the glass core because of this reflective cladding. Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second) Characteristics Of Fiber Optic Cable:

Expensive Very hard to install Capable of extremely high speed Extremely low attenuation No EMI interference

Advantages Of Fiber Optic Cable:


Fast Low attenuation No EMI interference

Disadvantages Fiber Optics:


Very costly Hard to install

5.4 SYNCHRONOUS DIGITAL HIERARCHY Synchronous Digital Hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At low transmission rates data can also be transferred via an electrical interface. The method was developed to replace the Plesiochronous Digital Hierarchy (PDH) system for transporting large amounts of telephone calls and data traffic over the same fiber without synchronization problems. SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media. It is the international equivalent of Synchronous Optical Network. Both technologies provide faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, "synchronous" means the bits from one call are carried within one transmission frame. "Plesiochronous" means "almost (but not) synchronous," or a call that must be extracted from more than one transmission frame. SDH uses the following Synchronous Transport Modules (STM) and rates: STM-1 (155 megabits per second), STM-4 (622 Mbps), STM-16 (2.5 gigabits per second), and STM-64 (10 Gbps). 5.4.1 Difference with PDH PDH or the plesiochronous digital hierarchy is a popular technology that is widely used in the networks of telecommunication in order to transport the huge amounts of data over the digital equipment for transportation like microwave radio or fiber optic systems. The term plesiochronous has been derived from the Greek work plesio that means near and chronos meaning time. This means that the PDH works in a state when the various different parts of a network are clearly synchronized. But with the change in technology, the PDH is now being replaced by the SDH or what is popularly called as synchronous digital hierarchy. The SDH is useful equipment that is used in most of the telecommunications networks. This PDH helps in proper transmission of the data that generally runs at the similar rate but allows some slight variation in the speed than the nominal rate. The basic transfer rate of the data is 2048 kilobits per second. For instance, in each speech transmission, the normal rate breaks into different thirty channels of 64 kilobits per second along with two different 64 kilobits per second in order to perform the tasks of synchronization and signaling. The typical rate of transmitting the data over the fiber optic systems is 565 Mbit/sec in order to transport the data in the long distance. But as the technology has improved with the passing of time, now the telecommunication companies have replaced the PDH equipment with that of the SDH equipment, which has the capability of transmitting the data at much higher rates as compared to the PDH system.

The weaknesses that PDH faced paved way for the introduction and use of the SDH systems. Although the PDH proved to be a breakthrough in the field of digital transmission, the weaknesses that made it less demanded includes: 1. 2. 3. 4. Asynchronous structure that is rigid. Restricted management capacity. Non availability of world standard on the digital formats. No optical interfaces world standard and without an optical level, networking is not possible.

But if we compare the PDH system with that of the SDH system, the latter one has a large number of advantages. Some of the most common advantages enjoyed by the usage of SDH include: 1. 2. 3. 4. 5. 6. 7. optical interfaces capability of powerful management world standard digital format synchronous structure is flexible cost effective and easy traffic cross connection capacity and add and drop facility reduced networking cost due to the transversal compatibility forward and backward compatibility

5.4.2 SDH network topology Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. First developed in the 1970s, fiberoptic communication systems have revolutionized the telecommunications industry and have played a major role in the advent of the Information Age. Because of its advantages over electrical transmission, optical fibers have largely replaced copper wire communications in core networks in the developed world. The process of communicating using fiber-optics involves the following basic steps: Creating the optical signal involving the use of a transmitter, relaying the signal along the fiber, ensuring that the signal does not become too distorted or weak, receiving the optical signal, and converting it into an electrical signal. Microwave communication requires line of sight and earth towers to transmit information and hence have relatively smaller area coverage. One tower receives a signal it amplifies it and sends it to the next tower. The microwave systems have the capability to carry large amount of data both digital and analogue at high speed and are mostly used for the transmission of telephone and television signals. 5.4.3 CLASSIFICATION OF TOPOLOGY Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network. Essentially, it is the topological structure of a network, and

may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. There are two basic categories of network topologies: 1. Physical topologies 2. Logical topologies The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits. The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. The study of network topology recognizes eight basic topologies:

chain Bus Star Ring Mesh Tree

5.4.3.1 Bus Topology

Fig 5.4 In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data matches the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable is terminated on both ends and when without termination data transfer stop and when cable breaks, the entire network will be down. 5.4.3.2 Star Topology

Star network topology Fig 5.5

In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. In Star topology every node (computer workstation or any other peripheral) is connected to central node called hub or switch. The switch is the server and the peripherals are the clients. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.

5.4.3.3 Ring Topology

Ring network topology Fig 5.6 A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring. When a device sends data, it must travel through each device on the ring until it reaches its destination. Every node is a critical link. 5.4.3.4 Mesh Topology The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law.

Fully connected network

Fig 5.7

Fully connected mesh topology A fully connected network is a communication network in which each of the nodes is connected to each other. A fully connected network doesn't need to use switching nor broadcasting. However, its major disadvantage is that the number of connections grows quadratically with the number of nodes, per the formula

and so it is extremely impractical for large networks. A two-node network is technically a fully connected network. 5.4.3.5 Tree Topology

Tree network topology Fig 5.8

This particular type of network topology is based on a hierarchy of nodes. The highest level of any tree network consists of a single, 'root' node, this node connected either a single (or, more commonly, multiple) node(s) in the level below by (a) point-to-point link(s). These lower level nodes are also connected to a single or multiple nodes in the next level down. Tree networks are not constrained to any number of levels, but as tree networks are a variant of the bus network topology, they are prone to crippling network failures should a connection in a higher level of nodes fail/suffer damage. Each node in the network has a specific, fixed number of nodes connected to it at the next lower level in the hierarchy, this number referred to as the 'branching factor' of the tree. This tree has individual peripheral nodes. Advantages It is scalable. Secondary nodes allow more devices to be connected to a central node. Point to point connection of devices. Having different levels of the network makes it more manageable hence easier fault identification and isolation. Disadvantages Maintenance of the network may be an issue when the network spans a great area. Since it is a variation of bus topology, if the backbone fails, the entire network is crippled.

definition: Tree topology is a combination of Bus and Star topology. 5.5 OSI MODEL The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO). The model groups similar communication functions into one of seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer.

Fig 5.9 Layer 1: physical layer The physical layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or fiber optical cable. The major functions and services performed by the physical layer are the following:

Establishment and termination of a connection to a communications medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control. Modulation or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

Layer 2: data link layer At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

Layer 3: network layer The network layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network (in contrast to the data link layer which connects hosts within the same network), while maintaining the quality of service requested by the transport layer. The network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer, sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer. The addressing scheme is not hierarchical. The network layer may be divided into three sublayers: 1. Subnetwork access that considers protocols that deal with the interface to networks, such as X.25; 2. Subnetwork-dependent convergence when it is necessary to bring the level of a transit network up to the level of networks on either side 3. Subnetwork-independent convergence handles transfer across multiple networks. Layer 4: transport layer The transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred. Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI. Layer 5: session layer The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls. Layer 6: presentation layer The presentation layer establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a

mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack. This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer. Layer 7: application layer This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

5.5.1 PROTOCOLS

Fig 5.10

5.5.2 Difference with TCP/IP MODEL

Fig 5.11

Each layer of TCP/IP models corresponds to different protocols. The TCP/IP protocol stack is a set of communication protocols. It is named after 2 important protocols that are transmission control protocol (TCP) and internet protocol(IP). The TCP/IP protocol stack ensures the communication between network devices. It is a set of rules that defines how information is delivered in a network

CHAPTER 6 Cloud Computing

The term cloud is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network, and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents and computing reects the ability of performing computing tasks. A computing capability that provides an abstraction between the computing resource and its underlying technical architecture(e.g., servers, storage, networks), enabling convenient, ondemand network access to a shared pool of congurable computing resources that can be rapidly provisioned and released with minimal management e ort or service provider interaction.

Fig 6.1

6.1 Types of Cloud There are different types of clouds that you can subscribe to depending on your needs. As a home user or small business owner, you will most likely use public cloud services. 1. Public Cloud - A public cloud can be accessed by any subscriber with an internet connection and access to the cloud space. 2. Private Cloud - A private cloud is established for a specific group or organization and limits access to just that group. 3. Community Cloud - A community cloud is shared among two or more organizations that have similar cloud requirements. 4. Hybrid Cloud - A hybrid cloud is essentially a combination of at least two clouds, where the clouds included are a mixture of public, private, or community.

6.2 Service Models In practice, cloud service providers tend to offer services that can be grouped into three categories: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (Iaas). Figure 3.1 shows Cloud Computing service architecture as a SPI model.

Figure 6.2: Cloud Computing Service Model 6.2.1 Software as a service (SaaS) SaaS is software that is developed and hosted by the SaaS vendor and which the end user accesses over the Internet. Unlike traditional applications that users install on their computers or servers, SaaS software is owned by the vendor and runs on computers in the vendors data center (or a colocation facility). A single instance of the software runs on the cloud and services multiple end users or client organizations. Broadly speaking, all customers of a SaaS vendor use the same software: these are one-size-fits-all solutions. Well known examples are Salesforce.com, Googles Gmail and Apps, instant messaging from AOL, Yahoo and Google, and Voice-over Internet Protocol (VoIP) from Vonage and Skype. 6.2.2 Platform as a service (PaaS) PaaS provides virtualized servers on which users can run applications, or develop new ones, without having to worry about maintaining the operating systems, server hardware, load balancing or computing capacity. A PaaS environment provides compute power by providing a runtime environment for application code. Therefore the unit of deployment is a package that contains application code or some compiled version of the application code. Another capability of PaaS environments is that scale can be specified via configuration and provided automatically by the environment. For example, if you need three instances of a web user interface in order to deal with anticipated load

then this could be specified in a configuration file and the environment would deploy your three instances automatically. For example, Microsofts Azure Services Platform supports the .NET Framework and php. As another example Googles App Engine supports Java and Python. 6.2.3 Infrastructure as a service (IaaS) In its purest incarnation Infrastructure as a Service (IaaS) offers compute power, storage, and networking infrastructure (such as firewalls and load balancers) as a service via the public internet. An IaaS customer is a software owner that is in need of a hosting environment to run their software. Originally the term for this type of offering was Hardware as a Service (HaaS). IaaS vendors use virtualization technologies to provide compute power. Therefore the unit of deployment is a virtual machine which is built by the software owner. The best known example is Amazons Elastic Compute Cloud (EC2) and Simple Storage Service (S3). Commercial examples of IaaS include Joyent, whose main product is a line of virtualized servers that provide a highly available on-demand infrastructure. Services are typically charged by usage and can be scaled dynamically, i.e. capacity can be increased or decreased more or less on demand.

6.3 Advantages of Cloud Computing 1. Convenience. You can access your data anywhere you can connect to the Internet. 2. Security. Most companies use industrial level security software and practices which make it harder for hackers to get at your data. Thats harder, but not impossible. 3. Backups. You have a backup of your data in case your local computer crashes. 4. Collaboration. With your permission, others can access, view, and modify your documents. 5. Environmentally friendly. It takes fewer resources to cloud compute, thus saving energy. Some businesses take it a step further and incorporate cloud computing into their telecommuting strategies. 6.4 Disadvantages of Cloud Computing 1. Security breaches. Remember, I said that remote server security makes it harder, but not impossible, for hackers to reach your data. If there is a compromise of the server(s) where your data is stored, your personal information may be exposed to the world. Theres also a good chance that more than just your information may be affectedwe're talking possibly millions of other users. 2. Outages. Have you ever been unable to access your email due to your provider being down? Now, imagine if you needed a document for an important business meeting or presentation and your storage providers site was down. Believe me it happens, and it happens at the most inconvenient times. 3. Storage limits. While your local hard drive may be able to hold 500GB or more of data, unfortunately a remote server may only allow you to freely store about 5GB. If you want more

room, youll have to pay. Still, even with a paid account, it cant begin to touch the amount of room you have locally. There also may be a limit on the size of the data that can be stored. 4. Slow speeds. Uploading and downloading of large documents may take a long time. 5. Limited features. If you use remote software thats provided by the storage service to manipulate and modify your data, it usually lacks the features of a program running locally.

6.5 Conclusion To summarize, the cloud provides many options for the everyday computer user as well as large and small businesses. It opens up the world of computing to a broader range of uses and increases the ease of use by giving access through any internet connection. However, with this increased ease also come drawbacks. You have less control over who has access to your information and little to no knowledge of where it is stored. You also must be aware of the security risks of having data stored on the cloud. The cloud is a big target for malicious individuals and may have disadvantages because it can be accessed through an unsecured internet connection.

CHAPTER 7 Practical Overview

7.1 BTS A base transceiver station (BTS) is a piece of equipment that facilitates wireless communication between user equipment (UE) and a network. UEs are devices like mobile phones (handsets), WLL phones, computers with wireless internet connectivity, WiFi and WiMAX devices and others. The network can be that of any of the wireless communication technologies like GSM, CDMA, Wireless local loop, WAN, WiFi, WiMAX, etc. BTS is also referred to as the radio base station (RBS), node B (in 3G Networks) or, simply, the base station (BS). For discussion of the LTE standard the abbreviation eNB for evolved node B is widely used. Though the term BTS can be applicable to any of the wireless communication standards, it is generally associated with mobile communication technologies like GSM and CDMA. In this regard, a BTS forms part of the base station subsystem (BSS) developments for system management. It may also have equipment for encrypting and decrypting communications, spectrum filtering tools (band pass filters), etc. Antennas may also be considered as components of BTS in general sense as they facilitate the functioning of BTS. Typically a BTS will have several transceivers (TRXs) which allow it to serve several different frequencies and different sectors of the cell (in the case of sectorised base stations). A BTS is controlled by a parent base station controller via the base station control function (BCF). The BCF is implemented as a discrete unit or even incorporated in a TRX in compact base stations. The BCF provides an operations and maintenance (O&M) connection to the network management system (NMS), and manages operational states of each TRX, as well as software handling and alarm collection. The basic structure and functions of the BTS remains the same regardless of the wireless technologies. 7.1.1 General Architecture A BTS in general has the following parts: Transceiver (TRX) Quite widely referred to as the driver receiver (DRX), DRX are either in form of single (sTRU), double (dTRU) or a composite double radio unit (DRU). It basically does transmission and reception of signals. It also does sending and reception of signals to and from higher network entities (like the base station controller in mobile telephony). Power amplifier (PA) Amplifies the signal from DRX for transmission through antenna; may be integrated with DRX. Combiner Combines feeds from several DRXs so that they could be sent out through a single antenna. Allows for a reduction in the number of antenna used.

Duplexer For separating sending and receiving signals to/from antenna. Does sending and receiving signals through the same antenna ports (cables to antenna). Antenna This is the structure that lies underneath the BTS; it can be installed as it is or disguised in some way (Concealed cell sites). Alarm extension system Collects working status alarms of various units in the BTS and extends them to operations and maintenance (O&M) monitoring stations. Control function Controls and manages the various units of BTS, including any software. On-the-spot configurations, status changes, software upgrades, etc. are done through the control function. Baseband receiver unit (BBxx) Frequency hopping, signal DSP, etc.

Fig 7.1

7.1.2 Huawei BTS 3900

Fig 7.2 The BTS3900 mainly consists of the following components: The BBU3900 is used for baseband processing and enables interaction between the BTS and the BSC. The DRFU is a double radio filter unit that processes two carriers. The DRFU performs modulation and demodulation between baseband signals and RF signals, processes data, and combines and divides signals. The indoor macro cabinet houses the BBU3900 and DRFUs. In addition, the indoor macro cabinet provides the functions such as power distribution, heat dissipation, and surge protection. The BTS3900 cabinet is designed in compliance with the IEC297 standard and features a modular structure. It processes the baseband signals and the RF signals. Based on the types of external power input, the BTS3900 cabinets can be classified as follows: The BTS3900 -48 V cabinet: contains the DRFU, BBU, GATM, DCDU-01, and FAN unit. The BTS3900 +24 V cabinet: contains the DRFU, BBU, DCDU-01, FAN unit, and power subrack (DC/DC). The BTS3900 220 V cabinet contains the DRFU, BBU, DCDU-01, FAN unit, and power subrack (AC/DC).

7.1.3 Structure of the BTS3900 -48v cabinet The external power input to the BTS3900 -48 V cabinet is -48 V DC. The DC power is directly led into the DCDU-01 and the DCDU-01 distributes the DC power to each component in the cabinet. The BTS3900 -48 V cabinet can be installed alone or stacked on top of another BTS3900 -48 V cabinet. The BTS3900 -48 V cabinet contains the following components: the DRFU, BBU, GATM, DCDU-01, and FAN unit, among which the GATM is optional. Figure shows the typical configurations when the cabinet is installed alone and when one cabinet is stacked on another.

Fig 7.3

7.1.4 DRFU One double radio filter unit (DRFU) provides two TRXs.

Fig 7.4 The DRFU handles modulation and demodulation between baseband signals and RF signals, data processing, and combining-distribution. The DRFU performs the following functions: It modulates baseband signals to GSM RF signals by using direct frequency conversion in the transmit channel. After amplifying or combining the RF signals, the DRFU sends the signals to the antenna for transmission. It receives RF signals from the antenna and down-converts the RF signals to IF signals. After amplifying, analog-to-digital converting, digital down-converting, matched filtering, and performing Automatic Gain Control (AGC), the DRFU sends the signals to the BBU for further processing. It performs power control and standing wave detection. It performs reverse power detection. It supports frequency synthesis and loop testing. It generates the CPRI clock, recovers the CPRI clock of lost synchronization, and detects alarms.

7.1.5 GATM The GSM antenna and TMA control module (GATM) is a module that controls the antenna and TMA. The GATM is optional.

Fig 7.5 The GATM has the following functions: Controlling the RET antenna Supplying power to the TMA Reporting the RET control alarm signals Monitoring the current from the feeder 7.1.6 FAN Unit The FAN unit, also called the fan module, is used to dissipate the heat in the cabinet. One FAN unit has four fans.

Fig 7.6

The FAN unit has the following functions: Providing forced ventilation and dissipation for the cabinet Detecting the temperature The FAN unit has the following capabilities: Supporting two modes of adjusting the rotation speed of the fans, such as adjustment based on the temperature and adjustment controlled by the central processing unit Controlling the fan rotation, and stopping the rotation of the fans when the ambient temperature is low.

7.1.7 DCDU-01 The direction current distribution unit (DCDU-01) provides ten -48 V DC power outputs.

Fig 7.7 The DCDU-01 has the following functions: Receiving -48 V DC input Providing ten -48 V DC outputs for other boards and modules in the cabinet Providing surge protection of 10 kA in differential mode and 15 kA in common mode, and providing dry contact for surge protection failure 7.1.8 BBU3900 Equipment The BBU3900 is the baseband control unit that enables the communication between the BTS and the BSC. The BBU3900 has the following functions: Providing physical ports for the communication between the BTS and the BSC Providing the CPRI ports for communication with the DRFU Providing the USB port for downloading the BTS software Providing the OM channel connected to the LMT or M2000 Processing the UL and DL data Providing centralized management on the entire BTS system, such as OM and signaling processing Providing the reference clock for the system

Fig 7.8 The BBU3900 boards consist of the UEIU, GTMU, and UELP. The BBU3900 modules consist of the UBFA and the UPEU. 7.1.8.1 UEIU Board This describes the Universal Environment Interface Unit (UEIU) board. It transmits monitoring signals and alarm signals from external devices to the main control board. 7.1.8.2 GTMU Board The GSM Transmission, Timing, and Management Unit for BBU (GTMU) controls and manages the entire BTS. It provides interfaces related to the reference clock, power supply, OM, and external alarm collection. 7.1.8.3 UELP Board This describes the Universal E1/T1 Lightning Protection Unit (UELP) board. It is an optional board which is installed in the SLPU or the BBU. The UELP provides lightning protection for four E1/T1 signals. 7.1.8.4 UBFA Module This describes the Universal BBU Fan Unit Type A (UBFA) module. It is a mandatory module of the BBU3900 that controls the fan speed and detects the temperature of the fan board. 7.1.8.5 UPEU Board This describes the Universal Power and Environment Interface Unit (UPEU) board. It converts -48 V or +24 V DC to +12 V DC.

7.1.9 BTS 3900A (Outdoor BTS)

Fig 7.9 The BTS3900A consists of the following modules:


The BBU3900 is used for baseband processing and enables interaction between the BTS and the BSC. The DRFU, the double-transceiver filter unit, performs modulation and demodulation between baseband signals and RF signals, processes data, and combines and divides signals. The power distribution box and RF cabinet provides space for BBU3900 and DRFU and the functions of power distribution, heat dissipation, and surge protection.

Fig 7.10

7.1.9.1 FMUA Collecting environment alarm information in the cabinet. The environment alarm is classified into temperature alarm, humidity alarm, smoke alarm, water immersion alarm, and door status alarm. Collects surge protection alarm information of the DC power distribution unit. Monitors the operating status of fans. The fan speed can be adjusted based on the temperature or adjusted by the central processing unit. Stops the rotation of the fans when the ambient temperature is low. Temperature monitoring and reporting RS485 port cascading and extension The FMUAs can be cascaded.

Vous aimerez peut-être aussi