Académique Documents
Professionnel Documents
Culture Documents
I hereby declare that the Summer Training, which is being presented in the
Report, entitled “Technologies in Networking and Communication” in partial
fulfillment for the award of Degree of “Bachelor of Technology” in Dept. of
Computer Science and Engineering submitted to the Department of Computer
Science And Engineering, Sri Balaji college of Engineering and Technology,
Rajasthan Technical University is a record of my own investigations carried
under the Guidance of Mr. Rahul Sharma, Asst. Prof., Department of Computer
Science And Engineering, Sri Balaji college of Engineering and Technology.
I have not submitted the matter presented in this Report anywhere for the
award of any other degree.
With great pleasure, I would like to extend my sincere gratitude and thanks to
Mr. Amit Kumar Mishra (Head of Department, Computer Science), Mr. Rahul
Sharma, Asst. prof. CSE and all faculty members for giving me such
opportunity to make seminar Report and guiding through all the aspects of a
Report.
I express my thanks to Dr. Engr. I.P. Meel, Principle, Sri Balaji college of
Engineering and Technology, Jaipur for extending support.
The aim of this summer training is to be familiar to the practical aspects and
uses of theoretical knowledge and clarifying the career goals, so I have
successfully completed the internship and complete this report as the
summery and conclusion that I have drawn from the seminar experience.
I would like to express my sincere gratitude to our project coordinator Mr.
Rahul Sharma (Asst. prof, CSE) who gave their valuable time and grave me
chance to learn something despite having a busy schedule guided me all
through the project. Their careful and precious guidance, which were extremely
valuable for my study both theoretically and practically.
I am incredibly thankful to all my friends for their help, moral support and
their valuable suggestion. Most importantly, I would like to thank my family,
my brother, my sister and other supporting person for their unconditional
support.
I perceive this opportunity as a big milestone in my career development. I will
strive to use gained skills and knowledge in the best possible way, and I will
continue to work in their improvement, in order to attain desired career
objectives.
Shubham Gupta
Enrollment No.: 16E1SBCSF35P201
Abstract
The aim of the network is to provide highly available and scalable environment
for collocation of Internet, Intranet and Extranet services, and applications. It
providing high-speed access to data, voice and internet-based applications. The
network is planned such that it will provide the necessary backbone
connectivity between the different offices to ensure that the network becomes
an enabler for business plans.
Data communications refers to the transmission of this digital data between
two or more computers and a computer network or data network is a
telecommunications network that allows computers to exchange data. The
physical connection between networked computing devices is established using
either cable media or wireless media. The best-known computer network is the
Internet.
This report signifies basics of Data Communication and Computer Network
(DCN) and will also showcase various advance concepts related to Data
Communication and Computer Network.
Contents
Candidate’s Declaration
Acknowledgement
Abstract
Introduction
1.1 Introduction to Summer Training
1.2 Importance of Summer Training
1.3 Company Profile
1.3.1 Services
1.3.2 Organization Structure
1.3.3 Services provided by BSNL
2. Technology I Learned
3. Transmission
3.1 Types of Transmission
3.2 Types of Network Connection
4. Mobile Communication
4.1 Journey from 1G to 4G
4.2 Mobile system Architecture
4.3 Types of Identification Numbers
5. C-DOT and OCB
5.1 C-DOT
5.1.1 General description of C-DOT
5.1.2 NGN
5.1.3 C-DOT to NGN
5.2 OCB
5.2.1 Introduction
5.2.2 Division of OCB-283
5.2.3 Functional Architecture
5.2.4 Call Processing
5.2.5 PCM
6. Leased Lines and Broadband
6.1 Broadband
6.1.1 Types of Broadband Technologies
6.2 Leased Lines
6.2.1 Uses and Benefits
7. Conclusion and Future Work
8. References
1. INTRODUCTION
Type Government-owned
Industry Telecommunications
India
Mobile phone
Broadband
Internet television
IPTV
Website www.bsnl.co.in
Services
BSNL Mobile is a major provider of GSM cellular mobile services under the
brand name Cellone. BSNL provides a complete telecom services solution to
enterprise customers including MPLS, P2P and Internet leased lines. It
provides fixed line services and landline using CDMA technology and its own
extensive optical fiber network. BSNL provides Internet access services through
dial-up connections as prepaid, NetOne as Postpaid and DataOne as BSNL
Broadband.
BSNL offers value-added services such as Free Phone Service (FPH), India
Telephone Card (Prepaid card), Account Card Calling (ACC), Virtual Private
Network (VPN), Tele-voting, Premium Rate Service (PRM)India. BSNL also offers
the IPTV which enables customers to watch television through the Internet and
Voice and Video Over Internet Protocol (VVoIP).
In 2007, BSNL announced plans to provide 5 million broadband connections
and secured 80% of the INR 25 billion rural telephony project of the
Government of India. On 20 March 2009, BSNL launched blackberry services
across India. BSNL paid Rs. 101.87 billion for 3G spectrum in 2010. As of
2011, BSNL offered coverage in over 800 cities across India. BSNL launched in
2012 a 3G wireless pocket-sized router called Wink net Mf50. BSNL 3G
provides HSPA+ service with a top speed of 21.1 Mbit/s downlink and 5.76
Mbit/s uplink.
After providing it for 160 years, BSNL discontinued its telegraph service on 15
July 2013. It began delivering telegrams to the public in February 1855; this
service was upgraded to a web-based messaging system in 2010 and had been
offered through 182 telegraph offices across India.
Bharat Sanchar Nigam Limited, a Public Sector Enterprise, also provides fiber
plans for the home, which are generally known as BSNL FTTH broadband
service. This is the fastest broadband service provided by BSNL, offering speeds
up to 100Mbit/s to home-based Internet users.
ORGANISATION STRUCTURE
4G System
4G is the current mainstream cellular service offered to cell phone users,
performance roughly 10 times faster than 3G service. One of the most
important features in the 4G mobile networks is the domination of high-speed
packet transmissions or burst traffic in the channels. The same codes used in
the 2G-3G networks are applied to 4G mobile or wireless networks, the
detection of very short bursts will be a serious problem due to their very poor
partial correlation properties. A recent study has indicated that traditional
multilayer network architecture based on the Open Systems Interconnection
(OSI) model may not be well suited for 4G mobile network, where transactions
of short packets will be the major part of the traffic in the channels.
Satellite broadband
Satellite Broadband, also referred to as internet-by-satellite, is a high-speed bi-
directional internet connection established via communications satellites
located in the geostationary orbit. The end customer sends and receives data
via a satellite dish e.g. located on the rooftop.
TRANSMISSION
SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e.
communication is unidirectional. We cannot send a message back to the
sender. Unidirectional communication is done in Simplex Systems where we
just need to send a command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television
and remote, keyboard and monitor etc.
HALF DUPLEX Mode
Half-duplex data transmission means that data can be transmitted in both
directions on a signal carrier, but not at the same time.
For example, on a local area network using a technology that has half-duplex
transmission, one workstation can send data on the line and then immediately
receive data on the line from the same direction in which data was just
transmitted. Hence half-duplex transmission implies a bidirectional line (one
that can carry data in both directions) but data can be sent in only one
direction at a time.
Example of half duplex is a walkie- talkie in which message is sent one at a
time but messages are sent in both the directions.
TYPES OF TRANSMISSION
Analog and Digital Transmission
There are a number of differences between analog and digital transmission,
and it is important to understand how conversions between analog and digital
occur. Let's look first at the older form of transmission, analog.
Analog Transmission
An analog wave form (or signal) is characterized by being continuously variable
along amplitude and frequency. In the case of telephony, for instance, when
you speak into a handset, there are changes in the air pressure around your
mouth. Those changes in air pressure fall onto the handset, where they are
amplified and then converted into current, or voltage fluctuations. Those
fluctuations in current are an analog of the actual voice pattern—hence the use
of the term analog to describe these signals.
When it comes to an analog circuit—what we also refer to as a voice-grade
line—we need to also define the frequency band in which it operates. The
human voice, for example, can typically generate frequencies from 100Hz to
10,000Hz, for a bandwidth of 9,900Hz.
But the ear does not require a vast range of frequencies to elicit meaning from
ordinary speech; the vast majority of sounds we make that constitute
intelligible speech fall between 250Hz and 3,400Hz. So, the phone company
typically allotted a total bandwidth of 4,000Hz for voice transmission.
Remember that the total frequency spectrum of twisted-pair is 1MHz. To
provision a voice-grade analog circuit, bandwidth-limiting filters are put on
that circuit to filter out all frequencies above 4,000Hz. That's why analog
circuits can conduct only fairly low-speed data communications. The maximum
data rate over an analog facility is 33.6Kbps when there are analog loops at
either end.
How 56Kbps Modems Break the 33.6Kbps Barrier?
With 56Kbps modems, only one end of the loop can be analog. The other end of
the connection has to be digital. So, in other words, if you're using a 56Kbps
modem to access your Internet service provider (ISP), you have an analog
connection from your home to the local exchange. But the ISP has a digital
subscriber line (DSL) or a digital termination facility from its location to its
exchange.
Digital Transmission
Digital transmission is quite different from analog transmission. For one thing,
the signal is much simpler. Rather than being a continuously variable wave
form, it is a series of discrete pulses, representing one bits and zero bits. Each
computer uses a coding scheme that defines what combinations of ones and
zeros constitute all the characters in a character set (that is, lowercase letters,
uppercase letters, punctuation marks, digits, keyboard control functions).
The digital pulse, like an analog signal, is eroded by impairments in the
network. But the weakened and impaired signal enters the regenerative
repeater, where the repeater examines the signal to determine what was
supposed to be a one and what was supposed to be a zero. The repeater
regenerates a new signal to pass on to the next point in the network, in essence
eliminating noise and thus vastly improving the error rate.
Error rates High; 10–5 bits (that is, Low; with twisted-pair, 10–7 (that, is
1 in 100,000 bits) is 1 in 10 million bits per second) will
guaranteed to have an have an error, with satellite, 10–9
error (that is, 1 in 1 billion per second) will
have an error, and with fiber, 10–11
(that is only 1 in 10 trillion bits per
second) will have an error
Channels
A channel defines a logical conversation path. It is the frequency band, time
slot, or wavelength over which a single conversation flow. A channel is a child
of the digital age because digital facilities enable multiple channels. The
number of channels on a transmission line determines the number of
simultaneous conversations that can be supported. Because we are becoming
more digitalized all the time, you often hear people refer to the number of
channels rather than the number of circuits.
Virtual Circuits
Today, because of the great interest in and increased use of packet switching,
most networks use virtual circuits. Unlike a physical circuit, which terminates
on specific physical ports, a virtual circuit is a series of logical connections
between sending and receiving devices. The virtual circuit is a connection
between two devices that acts as though it's a direct connection, but it may, in
fact, be composed of a variety of different routes. These connections are defined
by table entries inside the switch.
A connection is established after both devices exchange agreement on
communications parameters that are important to establishing and
maintaining the connection and on providing the proper performance for the
application they are supporting. The types of communication parameters that
could be included are message size, the path to be taken, how to deal with
acknowledgements in the event of errors, flow-control procedures, and error-
control procedures.
The term virtual circuit is largely used to describe connections between two
hosts in a packet-switching network, where the two hosts can communicate as
though they have a dedicated connection, although the packets may be taking
very different routes to arrive at their destination.
There are two types of virtual circuits: permanent virtual circuits (PVCs) and
switched virtual circuits (SVCs). The vast majority of implementations today
involve PVCs. PVCs and SVCs are commonly used in packet-switching
networks (for example, X.25, Frame Relay, ATM).
Bandwidth
Bandwidth is the range of frequencies that make up a signal. There are three
major classes of bandwidth that we refer to in telecommunications networks:
narrowband, wideband, and broadband.
Narrowband
Narrowband means that you can accommodate up to 64Kbps, which is also
known as the DS-0 (Digital Signal level 0) channel. This is the fundamental
increment on which digital networks were built. Initially, this metric of 64Kbps
was derived based on our understanding of what it would take to carry voice in
a digital manner through the network. If we combine these 64Kbps channels
together, we can achieve wideband transmission rates.
Wideband
Wideband is defined as being n ∴ 64Kbps, up to approximately 45Mbps. A
range of services are provisioned to support wideband capabilities, including T-
carrier, E-carrier, and J-carrier services. These are the services on which the
first generation of digital hierarchy was built.
T-1 offers 1.544Mbps, and because the T-carrier system is a North American
standard, T-1 is used in the United States. It is also used in some overseas
territories, such as South Korea and Hong Kong. E-1, which provides a total of
2.048Mbps, is specified by the ITU. It is the international standard used
throughout Europe, Africa, most of Asia-Pacific, the Middle East, and Latin
America. J-carrier is the Japanese standard, and J-1 offers 1.544Mbps.
Not every office or application requires the total capacity of T-1, E-1, or J-1, so
you can subscribe to fractional services, which means you subscribe to
bundles of channels that offer less than the full rate. Fractional services are
normally provided in bundles of 4, so you can subscribe to 4 channels, 8
channels, 12 channels, and so on. Fractional services are also referred as n ∴
56Kbps/64Kbps in the T-carrier system and n ∴ 64Kbps under E-carrier. High-
bandwidth facilities include T-3, E-3, and J-3. T-3 offers 45Mbps, E-3 offers
34Mbps, and J-3 supports 32Mbps.
Broadband
The future hierarchy, of course, rests on broadband capacities, and broadband
can be defined in different ways, depending on what part of the industry you're
talking about. Technically speaking, the ITU has defined broadband as being
anything over 2Mbps. But this definition was created in the 1970s, when
2Mbps seemed like a remarkable capacity.
Multiplexing
Multiplexers, often called muxes, are extremely important to
telecommunications. Their main reason for being is to reduce network costs by
minimizing the number of communications links needed between two points.
As with all other computing systems, multiplexers have evolved. Each new
generation has additional intelligence, and additional intelligence brings more
benefits. The types of benefits that have accrued, for example, include the
following:
The capability to do data compression so that you can encode certain
characters with fewer bits than normally required and free up that additional
capacity for the movement of other information.
The more intelligent the multiplexer, the more actively and intelligently it can
work on your behalf to dynamically make use of the transmission resources
you have. Remember that the use of leased lines is a very expensive type of
network connection. Because this network resource has been reserved for one
company's usage only, nobody else has access to that bandwidth, and
providers can't make use of it in the evenings or the weekends to carry
residential traffic, so the company pays a premium.
Even though it is the most expensive approach to networking, the vast majority
of data networking today still takes place using leased lines, because they
make the network manager feel very much in control of the network's destiny.
With leased lines, the bandwidth is not affected by sudden shifts of traffic
elsewhere in the network, the company can apply its own sophisticated
network management tools, and the network manager feels a sense of security
in knowing who the user communities are at either end of that link. But leased
lines have another negative attribute: They are mileage sensitive, so the longer
the communications link, the higher the cost. And in a network that doesn't
efficiently make use of that communications link all day long, leased lines
become overkill and an expensive proposition.
FDM
FDM is an environment in which the entire frequency band available on the
communications link is divided into smaller individual bands or channels.
Each user is assigned to a different frequency. The signals all travel in parallel
over the same communications link, but they are divided by frequency—that is,
each signal rides on a different portion of the frequency spectrum. Frequency,
which is an analog parameter, implies that the type of link you see with FDM is
usually an analog facility. A disadvantage of frequency division muxes is that
they can be difficult to reconfigure in an environment in which there's a great
deal of dynamic change.
TDM
The second multiplexing technique to be delivered to the marketplace was
TDM. There are various levels of TDM. In the plain-vanilla TDM model, as
shown in a dedicated time slot is provided for each port or point of interface on
the system. Each device in a predetermined sequence is allotted a time slot
during which it can transmit. That time slot would enable one character of
data, or 8 bits of digitized voice, to be placed on the communications link. The
allocated time slots have to be framed in order for the individual channels to be
separated out.
A problem with a standard time-division mux is that there is a one-to-one
correlation between each port and time slot, so if the device attached to Port 2
is out for the day, nobody else can make use of Time Slot 2. Hence, there is a
tendency to waste bandwidth when vacant slots occur because of idle stations.
However, this type of TDM is more efficient than standard FDM because more
subchannels can be derived.
FDM and TDM can be combined. For example, you could use FDM to carve out
individual channels and then within each of those channels apply TDM to carry
multiple conversations on each channel. In fact, this is the way that some
digital cellular systems work (for example, Global Systems for Mobile
Communications [GSM]).
STDM
STDM was introduced to overcome the limitation of standard TDM, in which
stations cannot use each other's time slots. Statistical time-division
multiplexers, sometimes called statistical muxes or stat muxes, dynamically
allocate the time slots among the active terminals, which means that you can
actually have more terminals than you have time slots.
A stat mux is a smarter mux and it has more memory than other muxes, so if
all the time slots are busy, excess data goes into a buffer. If the buffer fills up,
the additional access data gets lost, so it's important to think about how much
traffic to put through the stat mux to ensure that performance variables are
maintained. By dynamically allocating the time slots, you get the most efficient
use of bandwidth.
Additionally, because these are smarter muxes, they have the additional
intelligence mentioned earlier in terms of compression and error-control
features. Because of the dynamic allocation of time slots, a stat mux is able to
carry two to five times more traffic than a traditional time-division mux. But,
again, as you load the stat mux with traffic, you run the risk of delays and data
loss occurring.
Intelligent Multiplexing
An intelligent multiplexer is often referred to as a concentrator, particularly in
the telecom world. Rather than being a device used in pairs, it is used as a
singular device, a line-sharing device whose purpose is to concentrate large
numbers of low-speed lines to be carried over a high-speed line to a further
point in the network.
A good example of a concentrator is in a device called the digital loop carrier
(DLC), which is also referred to as a remote concentrator or remote terminal. In
twisted-pairs go from the local exchange to the neighborhood. Before the
advent of DLCs, you needed a twisted-pair for each household. If the demand
increased beyond the number of pairs you had available out of that local
exchange, you were out of luck until a new local exchange was added.
Inverse Multiplexing
The inverse multiplexer arrived on the scene in the 1990s. It does the opposite
of what the multiplexers described so far do. Rather than combine lots of low-
bit-rate streams to ride over a high-bit-rate pipe, an inverse multiplexer breaks
down a high-bandwidth signal into a group of smaller-data-rate signals that
can be dispersed over a range of channels to be carried over the network.
A primary application for inverse multiplexers is to support of high-bandwidth
applications such as videoconferencing. In a videoconference is to occur at
1.5Mbps. The channels are carried across the network separately. At the
destination point, a complementary inverse mux again reaggregates,
resynchronizes, and reproduces that high-bandwidth signal so that it can be
projected on the destination video monitor.
Inverse multiplexing therefore allows you to experience a bit of elastic
bandwidth. You can allocate existing capacity to a high-bandwidth application
without having to subscribe to a separate link just for that purpose.
WDM/DWDM
WDM was specifically developed for use with fiber optics. In the past, we could
use only a fraction of the available bandwidth of a fiber-optic system. This was
mainly because we had to convert the optical pulses into electrical signals to
regenerate them as they moved through the fiber network. And because
repeaters were originally electronic, data rates were limited to about 2.5Gbps.
In 1994, something very important happened: optical amplifiers called erbium-
doped fiber amplifiers (EDFAs) were introduced. Erbium is a chemical that's
injected into the fiber. As a light pulse passes through the erbium, the light is
amplified and continues on its merry way, without having to be stopped and
processed as an electrical signal. The introduction of EDFAs immediately
opened up the opportunity to make use of fiber-optic systems operating at
10Gbps.
EDFAs also paved the way to developing wavelength division multiplexers.
Before the advent of WDM, we were using only one wavelength of light within
each fiber, whereas the visible light spectrum engages a large number of
different wavelengths. WDM takes advantage of the fact that multiple colors or
frequencies of light can be transmitted simultaneously down a single optical
fiber. The data rate that's supported by each of the wavelengths depends on the
type of light source.
Today, we have light sources that operate at a rate of OC-48, which is
shorthand for 2.5Gbps. We have light sources that operate at OC-192, which is
equivalent to 10Gbps. And there are systems in trial that operate at OC-768,
offering 40Gbps per wavelength.
In the future, we'll go beyond that. Part of the evolution of WDM is that every
year we double the number of bits per second that can be carried on a
wavelength, and every year we double the number of wavelengths that can be
carried over a single fiber. But we have just begun. Soon light sources should
be able to pulse in the terabits per second range, and in five years, light
sources should pulse in the petabits per second (1,000Tbps) range.
WDM furnishes a separate channel for each service at the full rate; you cannot
aggregate smaller channels into one large channel. Systems that support more
than 16 wavelengths are referred to as DWDM.
MOBILE COMMUNICTION
Journey from 1G to 4G
1G system
1G specifications were released in 1990 to be used in GSM. 1G systems are
analogue systems such as AMPS that use FDM to divide the bandwidth into
specific frequencies that are assigned to individual calls.
2G system
These second-generation mobile systems are digital and use either TDMA or
CDMA method. Digital cellular systems use digital modulation and have several
advantages over analogue systems, including better utilization of bandwidth,
more privacy, and incorporation of error detection and correction.
2.5G system
It was introduced mainly to add latest bandwidth technology to the existing 2G
generation. It supports higher-data-rate transmission for Web browsing and
also supports a new browsing format language called wireless application
protocol (WAP). The different upgrade paths include high-speed circuit-
switched data (HSCSD), GPRS and EDGE.
HSCSD increases the available application data rate to 14.4 kbps as compared
to 9.6 kbps of GSM. By using four consecutive time slots, HSCSD is able to
provide a raw transmission rate of up to 57.6 kbps to individual users.
3G system
To overcome the short-comings of 2G and 2.5G, 3G has been developed. It uses
a wideband wireless network that offers increased clarity in conversations. ITU
has established 2500-2690MHz, 1700-1855MHz and 806-960MHz bands. Here
the target data rate is 2 Mbps. The data is sent through packet switching. Voice
calls are interpreted through circuit switching.
3G W-CDMA (UMTS)
Universal Mobile Telecommunication System (UMTS) or W-CDMA assures
backward compatibility with 2G and 2.5G TDMA technologies. W-CDMA, which
is an air interface standard, has been designed for always-on packet-based
wireless service, so that computers and entertainment devices may all share
the same wireless network and connect to the Internet anytime, anywhere.
W-CDMA supports data rates of up to 2.048 Mbps if the user is stationary,
thereby allowing high-quality data, multimedia, streaming audio, streaming
video and broadcast type services to consumers. With W-CDMA, data rates
from as low as 8 kbps to as high as 2 Mbps can be carried simultaneously on a
single W-CDMA 5MHz radio channel, with each channel supporting between
100 and 350 simultaneous voice calls at once, depending on antenna sectoring,
propagation conditions, user velocity and antenna polarization.
Time slots in W-CDMA are not used for user separation but to support periodic
functions. (This is in contrast to GSM where time slots are used to separate
users). The bandwidth per W-CDMA channel is 4.4 to 5 MHz
3.5G
It supports a higher through-put and speed at packet data rates of 14.4 Mbps,
supporting higher data needs of consumers.
4G system
It offers additional features such as IP telephony, ultrabroadband Internet
access, gaming services and HDTV streamed multimedia. Flash-OFDM, the
802.16e mobile version of WiMAX (also known as WiBro in South Korea), can
support cellular peak data rates of approx. 100 Mbps for high-mobility
communications such as mobile access and up to 1 Gbps for low-mobility
communications such as nomadic/local wireless access, using scalable
bandwidths of up to 40 MHz. The infrastructure for 4G is only packet-based
(all-IP).
The GSM network is divided into four major systems −
Switching System (SS)
Base Station System (BSS)
Mobile Station (MS)
Operation and Maintenance Center (OMC)
The switching system also called as Network and Switching System (NSS), is
responsible for performing call processing and subscriber-related functions.
The switching system includes the following functional units −
Functions of MSC
Call handling that copes with the mobile nature of subscribers
considering Location Registration, Authentication of subscribers and
equipment, Handover and Prepaid service.
Management of required logical radio link channel during calls.
Management of MSC-BSS signaling protocol.
Handling location registration and ensuring interworking between mobile
station and VLR.
Controls inter-BSS and inter-MSC hand overs.
Acting as a gateway MSC to interrogate HLR. The MSC which is
connected to the PSTN/ISDN network is called as GMSC. This is the only
MSC in the network connected to the HLR.
Standard functions of a switch like charging.
Software installation
Traffic management
Performance data analysis
Tracing of subscribers and equipment
Configuration management
Subscriber administration
Management of mobile equipment
Management of charging and billing
Functions of BTS: -
It is responsible for Time and Frequency synchronization.
The process of channel coding, Encryption, Multiplexing and modulation
for trans-direction and reverse for reception are to be carried out.
It has to arrange for transmission in advance from the mobiles depending
upon their distance from BTS (Timing Advance).
It has to detect Random access requests from mobiles, measure and
monitor the radio channels for power control and handover.
Mobile Station
It refers to the terminal equipment used by the wireless subscribers. It consists
of −
SIM -Subscriber Identity Module
SIM is removable and with appropriate SIM, the network can be accessed using
various mobile equipment.
Mobile Equipment
The equipment is validated separately with IMEI and EIR. The SIM contains an
integrated circuit chip with a microprocessor, random access memory (RAM)
and read only memory (ROM). SIM should be valid and should authenticate the
validity of MS while accessing the network.
SIM also stores subscriber related information like IMSI, cell location identity
etc.
SMS Flow
When a user sends an SMS, the request is placed via the MSC. The MSC
forwards the SMS to the SMSC where it gets stored. The SMSC queries the HLR
to find out where the destination mobile is and forwards the message to the
destination MSC if the destination mobile is available.
If the mobile is not available the message gets stored in the current SMSC
itself. In most installations if a mobile is not available for SMS delivery the
SMSC does not retry. Instead, the destination MSC informs the SMSC when
the mobile comes back in range. SMS handling is a store and forward operation
unlike USSD.
SMS has got a validity period for which it will wait for the destination mobile to
be available. After that time the SMSC will delete the message. The validity
period can be set by the user. Normal validity is 1 day.
Transmitting/Receiving Processes
There are two major processes involved in transmitting and receiving
information over a digital radio link, coding, and modulation.
Coverage Extension
Multipath propagation allows radio signals to reach behind hills and buildings
and into tunnels. Constructive and destructive interference signals received
through multi paths may add together or destroy each other.
Coding
Coding is the information processing that involves preparing the basic data
signals so that they are protected and put in a form that the radio link can
handle. Generally, the coding process includes the Logical Exclusive OR
(EXOR). Coding is included in −
Modulation
Modulation is the processing that involves the physical preparation of the
signal so that the information can be transported on an RF carrier. GSM uses
Gaussian Minimum Shift Keying technique (GMSK). Carrier frequency is
shifted by +/- B/4, where B=Bit rate. However, using the Gaussian filter,
reduces the bandwidth to 0.3 instead of 0.5.
Authentication
Since the air interface is vulnerable to fraudulent access, it is necessary to
employ the authentication before extending the services to a subscriber.
Authentication is built around the following notions.
Authentication Key (Ki) resides only in two places, SIM card and Authentication
Center. Authentication Key (Ki) is never transmitted over air. It is virtually
impossible for unauthorized individuals to obtain this key to impersonate a
given mobile subscriber.
Authentication Parameters
It is authenticated by the VLR with a process that uses three parameters −
1. RAND which is completely random number.
2. SRES which is an authentication signed response. It is generated by
applying an authentication algorithm (A3) to RAND and Ki.
3. Kc which is cipher key. The Kc parameter generated by applying the
cipher key generation algorithm (A8) to RAND and Ki.
These parameters (named an authentication triplet) are generated by the AUC
at the request of the HLR to which the subscriber belongs. The algorithms A3
and A8, are defined by the PLMN operator and are executed by the SIM.
Steps in Authentication Phase
The new VLR sends a request to the HLR/AUC (Authentication Center)
requesting the "authentication triplets" (RAND, SRES, and Kc) available for the
specified IMSI.
The AUC using the IMSI, extracts the subscriber’s authentication key (Ki). The
AUC then generates a random number (RAND), applies the Ki and RAND to
both the authentication algorithm (A3) and the cipher key, generation
algorithm (A8) to produce an authentication Signed Response (SRES) and a
Cipher Key (Kc). The AUC then returns an authentication triplet: RAND, SRES
and Kc to the new VLR.
The MSC/VLR keeps the two parameters Kc and SRES for later use and then
sends a message to the MS. The MS reads its Authentication Key (Ki) from the
SIM, applies the received random number (RAND) and Ki to both its
authentication algorithm (A3) and Cipher key generation Algorithm (A8) to
produce an Authentication Signed Response (SRES) and Cipher key (Kc). The
MS saves Kc for later, and will use Kc when it receives command to cipher the
channel.
The MS returns the generated SRES to the MSC/VLR. The VLR compares the
SRES returned from the MS with the expected SRES received earlier from the
AUC. If equal, the mobile passes authentication. If unequal, all signaling
activities will be aborted. In this scenario, we will assume that authentication
is passed.
Encryption/Ciphering
Data is encrypted at the transmitter side in blocks of 114 bits by taking 114-bit
plain text data bursts and performing an EXOR (Exclusive OR) logical function
operation with a 114-bit cipher block.
The decryption function at the receiver side is performed by taking the
encrypted data block of 114 bits and going through the same "exclusive OR"
operation using the same 114-bit cipher block that was used at the
transmitter.
Network Configuration
PLMN area
Location area
MSC area
PLMN Area
A PLMN area is the geographical area in which land mobile communication
services are provided to the public by a particular PLMN operator. From any
position within a PLMN area, the mobile user can set up calls to another user
of the same network, or to a user of another network. The other network may
be a fixed network, another GSM PLMN, or another type of PLMN. Users of the
same PLMN or users of other networks can also call a mobile user who is active
in the PLMN area. When there are several PLMN operators, the geographical
areas covered by their networks may overlap. The extent of a PLMN area is
normally limited by national borders.
Location Area
To eliminate the need for network-wide paging broadcasts, the PLMN needs to
know the approximate positions of the MSs that are active within its coverage
area. To enable the approximate positions of any MS to be represented by a
single parameter, the total area covered by the network is divided into location
areas. A Location Area (LA) is a group of one or more radio cells. This group
fulfills the following requirements −
Hand Over
This is the process of automatically switching a call-in progress from one traffic
channel to another to neutralize the adverse effects of the user movements.
Hand over process will be started only if the power control is not helpful
anymore.
The Hand Over process is MAHO (Mobile Assisted Hand Over). It starts with the
Down Link Measurements by the MS (Strength of the signal from BTS, Quality
of the signal from BTS). MS can measure the signal strength of the 6best
neighboring BTS downlink (candidate list).
Since time immemorial, a man has tried hard to bring the world as close to
himself as possible. His thirst for information is hard to quench so he has
continuously tried to develop new technologies, which have helped to reach the
objective.
The world we see today is a result of the continuous research in the field of
communication, which started with the invention of telephone by Graham Bell
to the current Avtar as we see in the form INTERNET and mobile phones. All
these technologies have come to existence because man continued its endeavor
towards the objective.
2.GENERAL
2.1 C-DOT DSS MAX –XL is a universal digital switch, which can be configured
for different application as local, transit or integrated local cum transit switch.
The hardware architecture of C-DOT DSS MAX – XL utilizes state of the art
micro circuitry & modular packaging. It utilizes advanced concept in hardware
design such as duplicated & distributed microprocessor-based control, hybrid
integrated circuit & single chip digital signal processors for MF& DTMF
receivers. The software has been written in high level language(C) & the man
machine interface language is a simple English like language. Now CDOT DSS
Exchange can upgrade to provide ISDN service by adding minimum additional
hardware units.
2.2 The system employs a T-S-T switching configuration and is based on a 32
channel PCM structure. It uses a basic rate of 64 Kbps & 2 mbps primary
multiplexing rate. Basic memory unit has been implemented as a 16MB
dynamic RAM board with 256 KB as basic dynamic RAM chip. Single chip
digital signal processors are used for implementing DTMF & MF receivers.
3. Basic Modules.
CDOT DSS MAX-XL exchanges can be configured from four basic modules.
(Figure- 1)
(i) Base Modules.
(ii) Central Modules.
(iii) Administrative Modules.
(iv) Input-Output Modules.
(v) Line Modules.
Next generation network is a packet-based network that can be used for both
telephony and data and that supports mobility. Initially, the term Next
Generation Network was used to refer to the transformation of the core network
to IP. Sometimes an NGN is referred to as an all-IP network.
The ITU defined an NGN as:
“A Next Generation Network (NGN) is a packet-based network able to provide
services including Telecommunication Services and able to make use of
multiple broadband, QoS-enabled transport technologies and in which service-
related functions are independent from underlying transport-related
technologies. It offers unrestricted access by users to different service
providers. It supports generalized mobility which will allow consistent and
ubiquitous provision of services to users.”
The NGN is characterized by the following fundamental aspects:
Packet-based transfer
Separation of control functions among bearer capabilities, call/session,
and application/ service
Decoupling of service provision from network, and provision of open
interfaces
Support for a wide range of services, applications and mechanisms based
on service building blocks (including real time/ streaming/ non-real time
services and multi-media)
Broadband capabilities with end-to-end QoS and transparency
Interworking with legacy networks via open interfaces
Generalized mobility
Unrestricted access by users to different service providers
A variety of identification schemes which can be resolved to IP addresses
for the purposes of routing in IP networks
Unified service characteristics for the same service as perceived by the
user
Converged services between Fixed/Mobile
Independence of service-related functions from underlying transport
technologies
Compliant with all Regulatory requirements, for example concerning
emergency communications and security/privacy, etc.
C-DOT TO NGN
Centre for Development of Telematics in close cooperation with BSNL, has
upgraded the First Rural Exchange Center at Kittur from C-DOT RAX to MAX-
NG for NGN (Next Generation Network Services).
C-DOT (Centre for Development of Telematics) has already upgraded 3
Exchanges in the Urban Network, namely – Vikas Nagar in Dehradun,
Uttarakhand; Katpadi in Vellore, Tamil Nadu and Nuh in Haryana they are
currently running on Trial phase.
The upgradation of MAX-NG would be implemented through BSNL network
across the country within 2-3 years upgrading around 2.5 crore Exchanges,
both Urban and Rural.
The upgradation program will bring VoIP and other broadband services to the
aging fixed line infrastructure, comprising of its MAX / RAX switches. C-DOT
has also developed NGN, GPON which will build broadband pipes to homes,
SOHO’s and multi-dwelling units.
Exchanges running on RAX/MAX technology enable users to access voice-
based services. Up gradation to MAX-NG technology will give fixed line users
access to next generation services like VoIP and other broadband services. This
upgradation will also provide Broadband services to 2.5 lakh Panchayats
through optical fiber aiming at transforming the economy.
ORGANE CONTROL BINARIE(OCB)
Introduction
OCB-283 is digital switching system, which supports a variety of
communication needs like basic telephony, ISDN, interface to mobile, data
communication. ALCATEL of France has developed this system. The first OCB-
283 exchange of R11 version were commissioned in Brest (France) and Beijing
(China) in 1991.
OCB-283 exchange came to India in 1993. The system has been upgraded and
current version R20 has fully validated in Jan 1994. The latest version is R24.
All new technology switching system, are based on (SPC) stored program
control concept. The call processing program is distributed over different
control organs of the system and is stored in ROM/RAM of the units. Data
required to handle the calls are also managed in RAM of different control units.
B. Transmission Media
In many communication systems, it is often necessary to interconnect points
that are some distances apart from each other. The transmission of information
as an electromagnetic signal always occur as a transverse electromagnetic
wave.
C. Exploitation Room
The Exploitation Room operates the whole OCB-283 exchange. So it is also
known as operational room. My main responsibilities are come under this
exploitation room. As in this room all the operations are done through system
software by operating different commands over there. I have to operate some of
these commands, which are named as under and discussed in detail with the
help of example as under:
· IDABSE
· INDIN
E. Computer Unit
As the name specified it is the main part of the exchange that deals with the all
services provided by the exchange to the customers with the help of computer.
It also provides the updated data to all other part of the exchange. The
customers are using the services of the exchange by using the internet also
gets connected to the main server present this room via an internet room. It
mainly consists of the servers that are providing the different services.
The main servers of this room are as following:
IVRS is used for the change number services provided by the exchange. CERS
are provided by the exchange to avoid the problems that the users are facing
the repairing of telephone. In this system when the user enters complaint it
gets directly entered to the server and user is allotted with an id number.
LOCAL DIRECTORY ENQUIRY is another service provided by the exchange, by
using this; subscribers calls the particular number and gets the directory
enquiry. The server present in the main computer room provides this service.
INTERNET DIRECTORY ENQUIRY is the latest service by the exchange. In this
type of service makes it enquiry using the internet, which gets connected to the
main server at the internet room in the exchange and further to the main
server in the computer room.
SMM: Maintenance SM
PU/PE alone
ETA alone
AN (access network) alone.
First two SMAs essentially have GT functions and clock function besides other
ETA or PU/PE functions. For the above functions and to adapt on token ring
different type of couplers and processors are provided. The functional name
and PCB names are listed below:
CMP - implemented by ACAJA5/ACAJB5 or ACAJAG ACASB4
PUP - ACJTR5 AB
Coupler CTSV – i.e. coupler Treatment Signal Vocal or Voice signal processing
couplers.
Coupler CSMP - Coupler signaling Multiprotocol for CCS#7 or V 5.2 signaling
implemented by ACHIL 2 & ACHIL 3 PCBs.
C.1 (SMT): Trunk Multiprocessors Station
GENERAL:
The SMT is an interface for PCM coming from RSU, RLU (E-10 B CSED) and as
junctions from other exchanges. With the initial supply of OCB-283 exchanges
first Generation SMT (SMT – 1G) was supplied and subsequently SMT-2 G
replaced them since no more SMT – 1 G are existent in the field only SMT – 2 G
is included in the hand-out. The functions of SMT are same whether it is SMT
1 G or SMT 2 G. SMT – 2 G is more powerful and intelligence is extended at the
PCM terminal level.
Function of SMT:
(i) Provide terminations of a maximum of 128 PCM from trunks, CSED and
CSND.
(ii) Carrying out URM (Multiplex connection unit function) consisting of:
(a) HDB 3/ Binary code conversion.
(b) Injection and extraction of CAS on time slot 16 and making over to another
functional unit called CLTH for processing
(iii) Transforming the intelligence in PCM TS to LR T/S for switching to
destinations TS and transforming the switched LR time slot into PCM TS.
Specific features of SMT – 2 G:
Beside above-mentioned general functions of SMT following special features are
available in SMT – 2 G.
(i) Digital Access cross connect (DACS) where the additional bits (bit 8 to 12)
can be used to carry channel associated signaling for PABX with linked
numbering scheme.
(ii) Can support higher order PCM multiplexes e.g. 34 M bit /S.
(iii) Can support ISDN PRA (30 B + D) links.
(iv) Reduction of load on MIS/MAS by introducing decentralized processes in a
software way.
F. CSN (Rack)
It is a subscriber connection unit, it can be equipped with either analog or
digital subscriber or both CSN can be either placed in the exchange, which is
called CSNL i.e. local subscriber connection unit, and at remote location called
CSND (Digital Subscriber Connection Unit). The subscriber’s card shelf called
concentrator it is also known as local or remote concentrator i.e. CNL or CNE.
The CSNL is connected to switching matrix (SMX) through minimum of 1 GLR
(i.e. Group of 8 LR’s is called as a GLR and each LR is PCM having 32 slots).
The CSND is connected to UE or SMT rack through a minimum of 2 PCM and a
maximum of 16 PCM’s.
There are four types of cards:
For Analog Signal: TABAF, TABASE
The TABNP card is for basic ISDN and TADPB only 2 channels or circuits are
allotted but for TADPB 1(one) PCM allotted @ 64kbps.
B. Token Rings
In OCB-283 exchange the communication-multiplexed highways are utilized for
interchange of messages between various equipment of exchange. These
communication multiplexes work on the principle of computer’s circular LANs
using TOKEN RING protocols. There are three types of communication
multiplexed highway according to their use: -
- MIS INTERSTATION MULTIPLEX
- MAS STATION MULTIPLEX
- MAL ALARM MULTIPLEX
The MIS token ring is provided for interchange of messages between two SMCs
and between an SMC and SMM. The maximum and minimum number of MIS
is only one (duplicated as A&B) The MAS are provided for interchange of
messages between CSNL, SMT, SMA and SMX on one hand and control units
(SMC) on the other hand. A maximum of four MAS token rings can be provided
in a large size exchange, where as no MAS token ring is provided in compact
configuration. While SMCs are connected on the entire MAS token ring, the
other units are connected only on one of the MAS rings.
MAS token ring can be minimum nil & maximum. FOUR duplicated as A&B.
MAL token ring is provided to handle exchange alarms from all the hardware
stations of exchange except CSNL. The token ring conforms to IEEE 802.5
Standard and operates at 4 Mbps.
Broadband and Leased Line
Broadband
narrow band was used for internet access which were very slow as compared
to today’s standard.
The DSL technology used for transmission is also classified in two parts based
on the basis of downstream and upstream which are as follows –
ADSL typically provides faster speed in the downstream direction than the
upstream direction. ADSL allows faster downstream data transmission over the
same line used to provide voice service, without disrupting regular telephone
calls on that line.
Cable Modem
Cable modem service enables cable operators to provide broadband using the
same coaxial cables that deliver pictures and sound to your TV set. Most cable
modems are external devices that have two connections: one to the cable wall
outlet, the other to a computer. They provide transmission speeds of 1.5 Mbps
or more.
Subscribers can access their cable modem service by simply turning on their
computers, without dialing-up an ISP. You can still watch cable TV while using
it. Transmission speeds vary depending on the type of cable modem, cable
network, and traffic load. Speeds are comparable to DSL.
Fiber
Fiber optic technology converts electrical signals carrying data to light and
sends the light through transparent glass fibers about the diameter of a human
hair. Fiber transmits data at speeds far exceeding current DSL or cable modem
speeds, typically by tens or even hundreds of Mbps.
The actual speed you experience will vary depending on a variety of factors,
such as how close to your computer the service provider brings the fiber and
how the service provider configures the service, including the amount of
bandwidth used. The same fiber providing your broadband can also
simultaneously deliver voice (VoIP) and video services, including video-on-
demand.
Wireless
Wireless broadband connects a home or business to the Internet using a radio
link between the customer’s location and the service provider’s facility. Wireless
broadband can be mobile or fixed.
Wireless Local Area Networks (WLANs) provide wireless broadband access over
shorter distances and are often used to extend the reach of a "last-mile"
wireline or fixed wireless broadband connection within a home, building, or
campus environment. Wi-Fi networks use unlicensed devices and can be
designed for private access within a home or business, or be used for public
Internet access at "hot spots" such as restaurants, coffee shops, hotels,
airports, convention centers, and city parks.
Satellite
Just as satellites orbiting the earth provide necessary links for telephone and
television service, they can also provide links for broadband. Satellite
broadband is another form of wireless broadband, and is also useful for serving
remote or sparsely populated areas.
A leased line, also known as a dedicated line, connects two locations for private
voice and/or data telecommunication service. A leased line is not a dedicated
cable; it is a reserved circuit between two points. The leased line is always
active and available for a fixed monthly fee.
Leased lines can span short or long distances. They maintain a single open
circuit at all times, as opposed to traditional telephone services that reuse the
same lines for many different conversations through a process called switching.
Fractional T1 lines, starting at 128 Kbps, reduce this cost somewhat. They can
be found in some apartment buildings and hotels.
Leased lines create a constant tunnel between two points for continuous data
flow. Typically, the first location is a corporate office with the second location
set as another corporate office, a data center or a corporate wide area network
(WAN). The line itself runs on fiber optic cables that enable large bandwidth
and high speed.
Future Work
There is a vast future scope of this Network. This Design can be improved and
can be used by various banks. If the limitations present in this Design are
removed then, this Network will become very reliable and provide 100% uptime.
We can easily implement any changes to the Network Design as we are using
the latest protocol like Border Gateway Protocol (BGP) in our network which is
having attributes to easily divert or control the flow of data and QOS which can
be used to allocate bandwidth to servers accordingly.
REFERENCES
[1]. Alas, B., Cassell, A., Li, J., Meyyappan, M., & Callen, P. (2007). Friction of
Partially Embedded Vertically Aligned Carbon
Nanofibers Inside Elastomers. Applied Physics Letters, 91.
[2]. Ashley-Rollman, M. P., De Rosa, M., Srinivasa, S. S., Pillai, P., Goldstein,
S. C., & Campbell, J. D. (2007a). Declarative
Programming for Modular Robots. In Workshop on Self-Reconfigurable
Robots/Systems and Applications at IROS '07.
[3]. Ashley-Rollman, M. P., Goldstein, S. C., Lee, P., Mowry, T. C., & Pillai, P.
(2007b) Meld: A Declarative Approach to Programming Ensembles. In
Proceedings of the IEEE International Conference on Intelligent Robots and
Systems IROS '07.
[4]. Byrne, Seamus. (2008, December 22). Morphing Programmable Gadgets
Could Soon Be a Reality. Retrieved February 20, 2010
from http://www.news.com.au/morphing-gadgets-could-soon-be-a-
reality/story-0-1111118387380.
[5]. De Rosa, M., Goldstein, S. C., Lee, P., Campbell, J. D. & Pillai, P. (2008)
Programming Modular Robots with Locally Distributed Predicates. In
Proceedings of the IEEE International Conference on Robotics and Automation
IC