You are on page 1of 64

ABOUT ITI LIMITED

ITI Limited is the first public sector enterprise. It was established in 1948 just after
the independence. The unit was poised to revolutionariesed the national
telecommunication scenario by rolling 500000 lines of E10B type of electronic
system every year with modern equipment .Exchange is based on technology C-DOT
developed in India according to its environment. MANKAPUR earned the distinction
of Digital City because first system was manufactured by it. Also entered into non
communication field with its Note Counting Machine(NCN), Note Bundling
Machine, Fake Note Detector and Inverter etc. The latest undertaking of ITI limited is
BTS( base transceiver station) with technical collaboration with MIS CIT ALCATEA
of France. In 1979 it was renewed as it manufactures different types of products. In
this BTS manufacturing started from the year 2005. ITI Limited is also engaged in
installation commissioning operation and maintenance part of GSM network.

MISSION:

“ To be the leader in the domestic market and an important global player in voice and
data and image communication providing total solution to the customers to built on a
core competencies to enter new business area.”

OBJECTIVES:

 To provide Value Added Services.


 To contribute considerable efforts in realizing the objective of India’s
national telecom policy 1999.
 To device new cost effective total solution with emerging technologies.
 Generate demand for telecom product innovation.
 To become the strong service provider with major business trust in telecom
network.
 Strengthen technical scanning capabiliyies to batch mark the organization
product/service against global standards.
 Introduce effective product planning and control system.
 Build company wise effective information system.
JOINT VENTURES:
ITI Limited has joint ventures with
 ITI Equitorial Satcom Ltd. BANGALORE.
 ITI Communication private Ltd. SINGAPORE
 FIBCOM India Ltd. NEW DELHI
TECHNICAL COLLABRATION:
Among several technical collaborations some important one’s are -
CIT ALCATEL of France for large digital switching
ASCOM of Switzerland for SMPS power products.
NEC of Japan for Microwave equipments
AT & T for LAN fiber optics.
INFRASTRUCTURE:
It has seven manufacturing units in India, out of which three are situated in Uttar
Pradesh, two of them are in Karnataka, the other two are in Karta and in Jammu &
Kashmir respectively.
Bangalore Karnataka
Rai Bareily Uttar Pradesh
Naini Uttar Pradesh
Mankapur Uttar Pradesh
Palghat Karta
Jammu & Kashmir Jammu & Kashmir
Electronic Complex Karnataka
It also has regional offices in INDIA
Lucknow
Bangalore
Mankapur
Palghat

INFORMATION ABOUT UNITS:


BANGALORE UNIT:
ITI Bangalore unit was first unit of ITI which was established in 1948. this unit was
first certified with ISO-9001 and is the largest one among all the units. In this unit
switching components and defence products as well as telephone parts are
manufactured.
ELECTRONIC CITY BANGALORE:
This unit was established in 1987 with an accreditation of ISO-9002.
This unit is specially manufacturing digital exchange parts with C-DOT Technology.
RAIBAREILY UNIT:

This plant is also known as Electronic city plant. It was established in the year 1956.
It manufactures variety of communication equipment. This plant executes a ‘Turn Key
Project’ and it provides total tele services –
Supply
Installation
Commissioning
TEC approval
NAINI PLANT:
The Nainiunit of ITI was established in the year 1964 and has accreditation of ISO-
9001. It manufactures wireless local loop and transmission equipments. This plant
also provides TEC(Telecom Equipment Certification).
SHRI NAGAR UNIT:
This unit has an accreditation of ISO-9002 and manufactures LIU and performs
assembling of telephone sets.
PALGHAT UNIT:
This unit was established in 1976 mainly for manufacturing of digital tank/trunk
automatic exchanges and medium lower digital exchange. It has started the
manufacturing of OCB-283 switching products.
MANKAPUR PLANT (GONDA):
It was established in the year 1982 in collaboration with CIT ALCATEL ( France) for
manufacturing of E10B electronic switching exchanges. Now it has started the
manufacturing of few parts of OCB-283 exchange. Some new devices are recently
manufactured such as
NCM (Note Counting Machine)
NBM (Note BundlingMachine)
Inverters
UPS
ABOUT ITI LIMITED (Mankapur):

Mankapur unit of the ITI Ltd. Is the sixth unit of ITI also known as “Digital city of
INDIA”. It was established in 1983. it started its production in April 1985. the first
product was E10B electronic telephone exchange under the technical collaboration
with ALCATEL of FRANCE.

The electronic switching system (ESS) project is situated in the


green’s field area at Mankapur. It was setup with an initial investment of Rs. 177.2
crore including a foreign exchange component of Rs.11.67 crore.

The unit was the first company in INDIA to produce E10B


exchange at that time. The unit is an integrated factory in its real sense where
excellent facilities are built up not only assembling of the system but also
manufacturing in house all main component required as input to the system.

The unit is positioned to evolutiozed the national


telecommunication scenario by rolling out 5000 lines of E10B type of electronic
switching system every year with modern equipment of facilities and trained man
power.
Products Of ITI Limited MANKAPUR

E10B exchange
CSN-MA exchange
C-DOT exchange
CSN-MM exchange
GSM (in process)

In brief

Established 1982
Starting of construction Feb 1983
Starting of production April 1985
Total area 352 acres
A.C. covered space 44,300 sq.m
(largest in ASIA)
factory covered area 77,500 sqm

ISO

We are usually unaware of the role played by standards in raising levels of quality,
safety, reliability, efficiency and interchangeability - as well as in providing such
benefits at an economical cost. Standards make an enormous contribution to most
aspects of our lives - although very often, that contribution is invisible.

ISO (International Organization for Standardization) is the world's largest


developer of standards. It started in 1987 and after that it was revised in 1984.
Although ISO's principal activity is the development of technical standards, ISO
standards also have important economic and social repercussions. ISO standards
make a positive difference, not just to engineers and manufacturers for whom
they solve basic problems in production and distribution, but to society as a
whole.

How ISO standards benefit society

For businesses, the widespread adoption of International Standards means that


suppliers can base the development of their products and services on specifications
that have wide acceptance in their sectors. This, in turn, means that businesses using
International Standards are increasingly free to compete on many more markets
around the world.

For customers, the worldwide compatibility of technology which is achieved when


products and services are based on International Standards brings them an
increasingly wide choice of offers, and they also benefit from the effects of
competition among suppliers.
For governments, International Standards provide the technological and scientific
bases underpinning health, safety and environmental legislation.

For trade officials negotiating the emergence of regional and global markets,
International Standards create "a level playing field" for all competitors on those
markets. The existence of divergent national or regional standards can create technical
barriers to trade, even when there is political agreement to do away with restrictive
import quotas and the like. International Standards are the technical means by which
political trade agreements can be put into practice.

For developing countries, International Standards that represent an international


consensus on the state of the art constitute an important source of technological know-
how.

For consumers, conformity of products and services to International Standards


provides assurance about their quality, safety and reliability.

For everyone, International Standards can contribute to the quality of life in general
by ensuring that the transport, machinery and tools we use are safe.

CLASSIFICATION:

QMS( quality management system) –

ISO 9000:1994/2000

EMS(environment management system)-

ISO 14000:1996

OHSAS(occupational health and safety)-

ISO 18000:199

Some Important Points:

 More than 100 countries are member


 9000 standards

 200 technical committee

 25000 engineers

 headquarter is in GENEVA
ISO -9000 series

ISO-9000 it describes fundamentals of QMS and specifies the terminology for


QMS.

ISO-9001 it specifies requirements for QMS for use where an organization is


capable to provide products that meet customer and applicable to regulatory
requirements needs to be demonstrated.

ISO-9004 it provides guidance on managing and conducting environmental and


quality audits. It provides guidance on QMS, including the process for continual
improvement, that contribute to the satisfaction of an organization customer and
other interested parties.

ISO provides guidelines to organization for performance improvement. it gives


guidance to the application of quality management and describe what processes
should passed by the quality management system, the focus of this international
standard is to improve the process of an organization in order to improve
performance.

QUALITY CONTROL: it is a monitoring process that eliminates the cause of


unsatisfactory performance at all stages of production process.

FEATURES OF ISO 9001:2000

 Continual improvement: it implies the improvement done step by step


taking corrective action,which is permanent continual improvement.
 Customers focus: we should know requirements and needs of customers.
In ISO, quality includes business as if quality of product will be good so
will be business.

 Measurable objectives: the objective should be SMART

S : specific

M : measurable

A : achievable

R: realistic

T: time

 Analysis: is the process of going through merits and demerits of the


product.
 Process and process owner: any activity or operation which receives
input and converts it into output using resources is called process.
Processors approach may be defined as “system identification and
management of various processes of organization and particularly
interaction between them."

What is QMS?

QMS strands for Quality Management System

QUALITY means

 Standardization of product
 Defined product OR

 subjective mental impression of the customer about a product OR

To access the

 Organization ability to meet the customer requirement


 Organization ability to meet regulatory /government

 Organization ability to meet organization’s own requirements

ISO: 9001-2000 does not imply

 Uniformity in structure of QMS in different organization


 Uniformity of documentation

ISO: 9001-2000: QMS based on

 Process approach
 Understanding customer’s requirement

 Fulfilling customer’s requirement

 Setting rules for process, performance and effectiveness

 PDCA (plan, do, check, act)

 Objective measurement

 Continual improvement

QMS APPORACH

1. 8 – QM principles
2. Process approach

3. Creating maturity model

8 – QM principles

1. customer focus
2. leadership

3. involvement of people

4. process approach

5. system approach to management

6. factual approach to decision making

7. mutually beneficial supplier

8. continual improvement

Process Approach : Is group of activities which uses resources to transform input


into output, based on P.D.C.A.PDCA tools for achieving QMS:ISO:9001-2000.

P – plan

 Establish objective
 Establish process

 Match it with customer’s requirement

 Match it with full organization policy

D - do implement the process

C - check to monitor the process and product

A - act take action for it

Maturity Model:

ADHOC (coincidence)
Repeatable (processes are practicable)

Managed (always fulfill customer’s requirement)

Optimized (6-sigma criteria)


Relationship Between ISO 9001 & ISO 9004

Both are developed as consistent pair of QMS


Both complement each other

But ISO 9000 used for

 For internal application

 For certification

ISO : 9004 is used for

 It is not intended for certification

 For external application

DIFFERENCE BETWEEN ISO:9001 & ISO 9001:1994

ISO 9001:2000 ISO 9001:1994

 Process approach Product approach


 Continual improvement Continuous improvement

 Commitment of top mgmt. Role of top mgmt.

 Measurable objective Objective

 Customer satisfaction Meeting customer need

ISO: 14000

It is based on environmental measurement system. Environment can be defined as


everything that surrounds us, but technically it can be defined as-

“conditions, objects and circumstances by which someone or something is


surrounded.”

Human Environment it comprises of all tangible and intangible elements


thatsurround us and owe their origin to human activities.

ISO have made four international standards for invironment in the year 1999.

TC-146 air quality management


TC-147 water quality management

TC-190 soil quality management


TC- acoustic management

Type Of Pollution

Water pollution
Land pollution

Sound pollution

Air pollution

Odour pollution

ISO 14000 for : EMS

System efficiency

Reducing waste

Pollution preservation

Improved performance

Implementation of government regulation

ISO : 14000

Process cycle

Step 1: Formation of…..

i. Core team
ii. MR

iii. Environment training group

Step 2: Internal environmental review

IER
Step 3: Identification of……

Environmental aspects

Environmental impact

Step 4: Significant Environmental Aspects

Identification

Register/Documents

Step 5: Feasibility- Analysis

EMP ( Environmental management Prog)

OCP

Step 6: Environmental policy

Objective and target

Step 7: EMS

Document review and release

Step 8: Implementation

Step 9: Auditor training

Step10: Internal Audit

Step11: Management review and assessment

Step12: External edit and assessment

Step13: Final certification audit

Step14: ISO 14001 certificate

ISO-core standards

9000/9001/9004/19011/14001

Other ISO standards


ISO 10011/10012/10013/10014/10015/10017

9000 ISO- technical report

family 10006/10007/10013/10014/10015

Technical specifications

16949

ISO Document Include

Specification
Guidance

Tools

Technical

Repeated business and refessal

Benefits of ISO

Reorganization
Business growth

Quality assurance

Self System

SIX SIGMA

“ Leadership determines the directory of company organization determines the


potential of company. Personal determines the success of company.”

- JOHN
MAXWELL

Definition:
Six sigma Is a measure of quality that strives for mew perfection.

“ It is a rigorous and systemic methodology that utilizes information and statistical


analysis to measure and improve and organization, operational, performance,
practices and system by identifying and preventing defects in manufacturing and
service related process in order to anticipate and exceed expectations of all stoke
holders to accomplished effectiveness.”

It is statistical measurement which tells us how good our products , services and
process really are. It helps us to establish our course and gauge our pace in the race
for total customer satisfaction.

The statistical representation of six sigma describes quantitatively how a process is


performing. To achieve six sigma a process must not produce more than 3.4 defects
per million opportunities. It is a highly disciplined process that helps organizations
focus on developing and delivering near perfect products and services.

Sigma is a statistical term that measures how for a given process deviates from
perfection. The central idea behind Six Sigma is that if you can measure how many
“defects” you have in a process, you can systematically figure out how to eliminate
them and get as close to “zero defects” as possible.

When we say a process is Six Sigma, we are saying it is best in class. Such a level of
capability will only yield about three instances of non-conformance out of every
million opportunities. With the improvement in process capability, defects gradually
go away.

It is the most powerful management initiative of our times which is benefiting


organizations operating in diverse sectors across the globe in terms of increased
market share, customer satisfaction, cost reduction and dramatic boost to bottom lines.

As per our unit policy, we have launched SIX SIGMA INITIATIVE in our unit. SIX
SIGMA is basically data driven process based management system, in which the
senior management (also known as C –level management, CEO, CIO, CFO and
Peers) communicate and drive the over all objectives.

The objectives may include:

X% of employees to br trained by a certain date.

Training of senior management officials is also essential, which should cover six
sigma overview, real world examples of successful employment, specific application
to business/ industry, tools for successful implementation and the financial benefits of
its implementation etc .Depending on the availability of time and their desire to learn
details black belt training should also be provided to all the senior management
officers.
SIX SIGMA CHAIN

Chief executive

To provide leadership

I I I

Champion-I Champion-II Champiom-III…

(For process Management and Project Championing)

Master Black Belts-I MBB-III MBB-III…..

( Trainers, Coach, Quality Controlers, to facilitate improvement projects, sstatistical


analysis of data….)

Black Belters-II BB-II BB-III…..

( To lead the project teams, fully responsible for technicalities involved in a project,
General process control and improvement………..)

Green Belters GB GB GB GB …………

( project work, general process control for particular assigned project, head of the
project control team )

Team of Individuality Selected Team Members Under Each GB)

SIX SIGMA PHILOSOPHY

Customers need products / services on time, with zero defects, at the lowest cost .

To improve means we must be able to predict and prevent, not detect and react.

By combining the mean and standard deviation, the “sigma” of a process can be
calculated.

The sigma of a process tells us how capable it is.

Once basic competencies and deficiencies are known corrective action can be taken.
Corrective action leads to the reduction of defects, cycle-time and the cost.

The reduction of defects cycle-time and cost leads to improved customer satisfaction.

As customer satisfaction improves, likelyhood of doing business increases.

As business increases we ( as individuals ) grow and prosper.

Philosophy And Its Examples

Its more than just a quality system like TQM or ISO. It’s the way of doing business. It
can be seen as a vision, a philosophy, a symbol, a metric, a goal, a methodology etc.

Six sigma philosophy is being practiced by many Fortune 500 companies and has
already become a way of life at GE, Motorola, Honeywell, Sony, Nokiya, Poloroid,
Hughes, Caparo Maruti, Escorts Hospita, Tata ssl, Whirlpool of India etc.

Most of the companies have netted multi million dollars savings by adopting six
sigma in all their business process and transaction. Some of the examples are :

1: GE saved $12 billion over five years and added $1 to its earning per share. It
produces annual benefits of over $2.5 billion across the organization from Six-Sigma.
It Has Virtually Become Religion At G.E.

2:Honeywell (Allied signal) recorded more than $800 million in savings in a year.

3: Motorola reduced manufacturing costs by $1.4 billion from 1987-1994. six Sigma
reportedly saved Motorola $1.5 Billion over the last 11 years.

4: Caterpillar Inc. a heavy equipment manufacturer reaped $500 million through Six
Sigma during the year 2002.

It boasts to have 2,700 trained Six sigma Black Belters.

5: At Bharti teleLinks( mobile arm Air-tel) an organization – wide six sigma initiative
has saved arount Rs. 75 crores from mobile business during 2003-04. ( 130 Six-
Sigma Projects) . Revenue generated Rs. 5002 Crores, profit-619.46 Crores,
Subscriber base 6.5 million, against 7.2 million of Relience infocom Loss of Rs.400
Crores) and 5.2 million of BSNL.

At an average savings, with achieving Six-Sigma level, varies from 1.2% to 4.5%
of total revenue.

Six Sigma has changed the DNA of many organizations. It is now the way they work
in every thing they do and in every product they design. Six-Sigma methodology
demands that every process should be planned properly and executed consistently.
Companies operating at three to four Sigma level loose 10-15% of their revenues
annually towards the cost of poor quality.

SIX SIGMA FOCUS

ISSUE CLASSICAL SIX-SIGMA


Management Cost & time Quality &time

Manufacturing Trial & error Robust design

Tolerance Worst case Roof sum of squares

Preventing

Problems Fixing System based

Problem solving Expert based Data

Analysis Experience Process

Focus Product Proactive

Behavior Reactive Statistically based

Reasoning Experience based Long term

Outlook Short term Customer

Aim Company Learning

Organization Authority Necessity

Training Luxury Empowered teams

Chain of command Hierarchy Asset

Localize

People Cost optimization

Control Centralized

improvement automation
Symbolic representation of six sigma - 6σ

6 σ = √A2 + B2 + C2

to adopt six sigma we use DMAIC process

D – define

M – measure

A – analysis

I – improve

C – control

DEFINE:

 Determine benchmarks
 Set baseline

 Determine customer requirements

Define phase task includes:

 Define the business opportunity


 Identify champion business owner and stake holder

 Define estimated benefits and financial saving


 Define project and team character with tools like: project character or project
matrices

 Hold team kick of meeting

MEASURE:

 Develop defect measurement


 Develop data collection process

 Collect data

 Create data

 Compile & display data

SIX SIGMA PROJECT DATA

 Reduce expenses
 Reduce scrap formation

 Reduce downtimes or increase uptimes

 Reduce rework

 Reduce throughout at

 Reduce quality defect

METHODOLOGY

1. DMAIC 2. DMADV

Define Define

Measure Measure

Analysis Analysis

Improve Design

Control Verify

SIX- SIGMA PROJECT :


Guidelines are as follows

1. The project should have process input output


2. A good six sigma project never have predetermined solution

3. If solution or answer is known, just go and fix it instead of achieving or


adopting six-sigma process

4. All project need to be approached from the perspective of understanding


the variation in process, its controlling & eliminating the defects.

Comparison between six sigma & ISO

SIX- SIGMA ISO

1. it is measurable 1. it has no scale

2. it take care of all 2. it takes care of product

stake holder

3. it takes care about 3. it talks about customer’s

customer’s delight satisfaction

4. it is for self assessment 4. provides certificate

5. it goes for no wastage 5. it is for reducing

wastage
ERP

(Enterprise Resource planning)

Evolution of ERP

Inventory control module (ICM)……………1950s

Material requirement planning (MRP 1)……1960s

Manufacturing resource planning (MRP2). 1970s

Enterprise resource planning ( ERP)………..1990s

Enterprise Resource Planning systems (ERPs) integrate (or attempt to integrate) all
data and processes of an organization into a single unified system. A typical ERP
system will use multiple components of computer software and hardware to achieve
the integration. A key ingredient of most ERP systems is the use of a single, unified
database to store data for the various system modules.

The term ERP originally implied systems designed to plan the utilization of
enterprise-wide resources. Although the acronym ERP originated in the
manufacturing environment, today's use of the term ERP systems has much broader
scope. ERP systems typically attempt to cover all basic functions of an organization,
regardless of the organization's business or charter. Business, not-for-profit
organizations, governments, and other large entities utilize ERP systems.

Additionally, it may be noted that to be considered an ERP system, a software


package generally would only need to provide functionality in a single package that
would normally be covered by two or more systems. Technically, a software package
that provides both Payroll and Accounting functions (such as QuickBooks) would be
considered an ERP software package.

However; the term is typically reserved for larger, more broadbased applications. The
introduction of an ERP system to replace two or more independent applications
eliminates the need for interfaces previously required between systems, and provides
additional benefits that range from standardization and lower maintenance (one
system instead of two or more) to easier and/or greater reporting capabilities (as all
data is typically kept in one database).

Examples of packages commonly referred to as ERP systems include: SAP, Oracle,


PeopleSoft (which has been taken over by Oracle), J.D. Edwards, Sage Software,
BAAN, MAS, and the Microsoft Dynamics suite of ERP products.Examples of
modules in an ERP which formerly would have been stand-alone applications include:
Manufacturing, Supply Chain, Financials, CRM, Human Resources, and Warehouse
Management.
Overview

Looking more closely at ERP systems, a key factor is the integration of data from all
aspects of an organization. To accomplish this, an ERP system typically runs on a
single database instance with multiple software modules providing the various
business functions of an organization.

some organizations choose to only implement portions of an ERP system and develop
an interface to other ERP or stand-alone systems for their other application needs. For
instance, the PeopleSoft HRMS and Financials systems are generally considered
better than SAP's HRMS solution. And SAP's manufacturing and CRM systems are
generally considered better than PeopleSoft's equivalents. So an organization large
enough to justify the purchase of an ERP system, may choose to purchase the
PeopleSoft HRMS and Financials modules from Oracle, and their remaining
applications from SAP.

An example of a complete ERP implementation is very rare indeed. Organizations


large enough to justify ERP purchases typically have specialized needs that are not
met by any one ERP software vendor. This requires either heavy customization, use of
different modules from different vendors, or extensive re-engineering. In an ideal
world, an example of a complete ERP implementation would be a manufacturing
company running SAP,Oracle,PeopleSoft, or Dynamics for all relevant systems. A
single database would contain all data for the software modules, which would include:
Manufacturing: Engineering, Bills of Material, Scheduling, Capacity, Workflow
Management, Quality Control, Cost Management, Manufacturing Process,
Manufacturing Projects, Manufacturing Flow Supply Chain Management:, Inventory,
Order Entry, Purchasing, Product Configurator, Supply Chain Planning, Supplier
Scheduling, Financials: General Ledger, Cash Management, Accounts Payable,
Accounts Receivable, Fixed Assets Projects: Costing, Billing, Time and Expense,
Activity Management Human Resources: Human Resources, Payroll, Training, Time
& Attendance, Benefits CRM: Sales and Marketing, Commissions, Service, Customer
Contact and Call Center support Data Warehouse and various Self-Service interfaces
for Customers, Suppliers, and Employees.

Enterprise Resource Planning is a term originally derived from manufacturing


resource planning (MRP II) that followed material requirements planning (MRP).
MRP evolved into ERP when "routings" became major part of the software
architecture and a company's capacity planning activity also became a part of the
standard software activity. ERP systems typically handle the manufacturing, logistics,
distribution, inventory, shipping, invoicing, and accounting for a company. Enterprise
Resource Planning or ERP software can aid in the control of many business activities,
like sales, marketing, delivery, billing, production, inventory management, quality
management, and human resources management.

ERPs are often incorrectly called back office systems indicating that customers and the
general public are not directly involved. This is contrasted with front office systems
like customer relationship management (CRM) systems that deal directly with the
customers, or the eBusiness systems such as eCommerce, eGovernment, eTelecom,
and eFinance, or supplier relationship management (SRM) systems.

.ERP II means open ERP architecture of components. The older, monolithic ERP
systems became component oriented.

EAS - Enterprise Application Suite is a new name for formerly developed ERP
systems which include (almost) all segments of business, using ordinary Internet
browsers as thin clients.

BEFORE: Prior to the concept of ERP systems, departments within an organization


would have their own computer systems. For example, the Human Resources (HR)
department, the Payroll (PR) department, and the Financials department. The HR
computer system (Often called HRMS or HRIS) would typically contain information
on the department, reporting structure, and personal details of employees. The PR
department would typically calculate and store paycheck information. The Financials
department would typically store financial transactions for the organization. Each
system would have to rely on a set of common data to communicate with each other.
For the HRIS to send salary information to the PR system, an employee number
would need to be assigned and remain static between the two systems to accurately
identify an employee. The Financials system was not interested in the employee level
data, but only the payouts made by the PR systems, such as the Tax payments to
various authorities, payments for employee benefits to providers, and so on. This
provided complications. For instance, a person could not be paid in the Payroll system
without an employee number.

AFTER: ERP software, among other things, combined the data of formerly disparate
applications. This made the worry of keeping employee numbers in synchronization
across multiple systems disappear. It standardised and reduced the number of software
specialties required within larger organizations. It enabled reporting that spanned
multiple systems much easier. And it allowed for the development of higher level
analysis functions enabling larger organizations to identify trends with in the
organization and make appropriate adjustments more quickly.

After ERP

Supply chain management (SCM)……………..1994s

Customer relation management (CRM)……….later

E- commerce

E- governance
Best Practices

Best Practices were also a benefit of implementing an ERP system. When


implementing an ERP system, organizations essentially had to choose between
customising the software or modifying their business processes to the "Best Practice"
functionality delivered in the vanilla version of the software.

Implementation

Because of their wide scope of application within the firm, ERP software systems rely
on some of the largest bodies of software ever written. Implementing such a large and
complex software system in a company used to involve an army of analysts,
programmers, and users. This was, at least, until the development of the Internet
allowed outside consultants to gain access to company computers in order to install
standard updates. ERP implementation, without professional help, can be a very
expensive project for bigger companies, especially transnationals. Companies
specializing in ERP implementation, however, can expedite this process and can
complete the task in under six months with solid pilot testing.

Enterprise resource planning systems are often closely tied to supply chain
management and logistics automation systems. Supply chain management software
can extend the ERP system to include links with suppliers.

To implement ERP systems, companies often seek the help of an ERP vendor or of
third-party consulting companies. Consulting in ERP involves three levels, namely
top level systems architecture, business process consulting (primarily re-engineering)
and technical consulting (primarily programming and tool configuration activity). A
systems architect designs the overall dataflow for the enterprise including the future
dataflow plan. A business consultant studies an organization's current business
processes and matches them to the corresponding processes in the ERP system, thus
'configuring' the ERP system to the organization's needs. Technical consulting often
involves programming. Most ERP vendors allow modification of their software to suit
the business needs of their customer.

Customizing an ERP package can be very expensive and complicated, because many
ERP packages are not designed to support customization, so most businesses
implement the best practices embedded in the acquired ERP system. Some ERP
packages are very generic in their reports and inquiries, such that customization is
expected in every implementation. It is important to recognize that for these packages,
it makes more sense to buy third party reporting packages that interface well to
particular ERP, than to reinvent what tens of thousands of other clients of that same
ERP have needed to develop.

Today there are also web-based ERP systems. Companies would deploy web-based
ERP because it requires no client side installation, and is cross-platform and
maintained centrally. As long as you have an Internet connection, or a network
connection to a system installed on the LAN, you can access web-based ERPs through
typical web browsers.
Advantages

In the absence of an ERP system, a large manufacturer may find itself with many
software applications that do not talk to each other and do not effectively interface.
Tasks that need to interface with one another may involve: design engineering (how
best to make the product); order tracking from acceptance through fulfillment; the
revenue cycle from invoice through cash receipt; managing interdependencies of
complex Bill of Materials; tracking the 3-way match between Purchase orders (what
was ordered), Inventory receipts (what arrived), and Costing (what the vendor
invoiced); and the Accounting for all of these tasks, tracking the Revenue, Cost and
Profit on a granular level.

Change how a product is made, in the engineering details, and that is how it will now
be made. Effectivity dates can be used to control when the switch over will occur
from an old version to the next one, both the date that some ingredients go into effect,
and date that some are discontinued. Part of the change can include labeling to
identify version numbers.

Computer security is included within an ERP, to protect against both outsider crime,
such as industrial espionage and insider crime, such as embezzlement. A data
tampering scenario might involve a terrorist altering a Bill of Materials so as to put
poison in food products, or other sabotage. ERP security helps to prevent abuse as
well.

There are concepts of Front office (how the company interacts with customers), which
includes CRM or Customer relationship management; Back end (internal workings of
the company to fulfill customer needs), which includes quality control, to make sure
there are no problems not fixed, in the end products; Supply chain (interacting with
suppliers and transportation infrastructure). All of these can be integrated through an
ERP, although some systems have gaps in comprehensiveness and effectiveness.
Without an ERP that integrates all these, it can be quite complicated for a
manufacturer to manage.

Disadvantages

Many of the problems that organizations have with ERP systems are due to the
inadequate level of investment in ongoing training for all personnel involved,
including those implementing and testing changes, as well as a lack of corporate
policies protecting the integrity of the data held in the ERP systems and how it is
used.
Limitations of ERP include:

 Success depends on the skill and experience of the workforce, including


training about how to make the system work correctly. Many companies cut
costs by cutting training budgets. Privately owned small enterprises are often
undercapitalized, meaning their ERP system is often operated by personnel
with inadequate education in ERP in general, such as APICS foundations, and
in the particular ERP vendor package being used.
 Personnel turnover; companies can employ new managers lacking education
in the company's ERP system, proposing changes in business practices that are
out of synchronization with the best utilization of the company's selected ERP.
 Customization of the ERP software is limited. Some customization may
involve changing of the ERP software structure which is usually not allowed.
 Re-engineering of business processes to fit the "industry standard" prescribed
by the ERP system may lead to a loss of competitive advantage.
 ERP systems can be very expensive to install.
 ERP vendors can charge sums of money for annual license renewal that is
unrelated to the size of the company using the ERP or its profitability.
 ERPs are often seen as too rigid, and difficult to adapt to the specific
workflow and business process of some companies
 The system can suffer from the "weakest link" problem - an inefficiency in
one department or at one of the partners may affect other participants.
 Once a system is established, switching costs are very high for any one of the
partners (reducing flexibility and strategic control at the corporate level).
 The blurring of company boundaries can cause problems in accountability,
lines of responsibility, and employee morale.
 Resistance in sharing sensitive internal information between departments can
reduce the effectiveness of the software.
 There are frequent compatibility problems with the various legacy systems of
the partners.
 The system may be over-engineered relative to the actual needs of the
customer.

Available ERP’s in the world

SAP 60% share (Germany)

People soft

BaaN 40% share (Netherland)

Oracle

Rameo & Marshal


Why ITI has gone for BaaN?

 BaaN is very strong for discrete manufacturing industry.


 It has long relationship with CMC for hareware maintenance.
 Liscence was less.

Softwares used by ITI are

Window NT 4.0 Operating System

ORACLE 8.D.5.X DATABASE

BaaN C4 Application

 Operating system is dual boot to protect Baan from virus


 BaaN on WIN NT side
 Office internet & mails on WIN 98 side
 For network, NMS (network management software) of CISCO

ITI Network

 ITI has gone for star topology


 They have used optical fiber from main switch to auxiliary switch
 UTP (unshielded twistedpair) cable from AUXILIARY switch to HUB client
 Dial up for distant and remote places
AS1 PC

AS2 HUB PC

MS AS3

AS9 EB EB LAN

BAAN BASIC OVERVIE

ORGANISATION

user

Supply Manufacturing

Chain Distribution

FinanceFi mmmk Finance


ENVIRONMENT
Project

Services

Transportation

Baan Manufacturing Structure:


Project
Master
Control
Producti
-on
schedule
Shop floor
Control

MRP -1
Repetiti
Master
ve
Data
Manufa-
cture Project
Capacit- Configu
y Requi- -raion
rement
plane

Master Data
 Common master data
 Package master data

KEY Features

1. Engineering change control


2. Capacity requirement planning

3. Master production scheduling

4. Material requirement planning

5. Product classification

6. Product configuration

7. Product network planning

8. Repetitive manufacturing

9. Engineering data management

Baan Distribution

1. Real time inventory interaction with production


2. Lot control

3. Multi-side capability

4. Integration with QMCS(Quality management control system)

5. EDI capability ( Electronic data information)

6. Supply chain management

Baan Finance

1. Configurable process
2. Accounting and management tool

3. Data entry efficiency

4. Drill down
5. Flexible currency handling

Benefits of using enterprises modular

1. Save time by providing modules


2. Fully integrated with Baan application

3. Allows optimization overtime

Baan open system Environment

Baan Tools

B sheel

User UI DB Data
interface driver driver base

Operating
system

Interface
GSM

(Global system for Mobile Communication)

ORIGIN: Communication is the basic need of society after development of


communication system. Earlier there was point to point communication between
subscribers. That means, there should be a physical link which can provide medium
for communication.

So if there are 4 users, there should be 6 physical links available. If the no. of users
are large then a huge physical connections are required which is extremely costly and
not practically possible. Solution to overcome this problem are exchanges. Exchange
is nothing but an interface between the caller and the receiver.

After development of exchange system, improvement and


modification is done at exchange level to provide large number of connections and
subscriber’s satisfaction. But there are many limitations of fixed line telephones like:

 No mobility
 Delay in new connection
 Security hazard

 Prone to failures

 Very less value added services

To overcome this limitation , mobile telephone system concept came into picture. The
basic concept behind the mobile communication is the cellular telephony, which is
developed by idea of cordless telephony.

CORDLESS TELEPHONY:

In cordless telephony user can get mobility but within a certain range.
Communication between hand set and base4 set is through radio frequency link.

CELLULAR TELEPHONY: With the concept of cordless telephony, if base stations


are increased, then range of mobility will also increase. The need will be to control
base station. So there is development of base station controller.
BASE
STATION
CONTROLLER

The base stations are called Base Transceiver Station(BTS). A single BTS may give
various frequency by Time Division Multiple Access(TDMA), no. of users can be
increased. But for a service provider, frequency limit is fixed. So there is a concept of
frequency reuse. Suppose a particular area is covered by a 7 BTS having
different frequencies and provider has limit of only these 7 frequencies. So to
interface the range of communication, if same frequencies is used again and again
with enough separation to their own used frequencies of communication can be
increased to any extent. This is called Frequency Reuse. And the BTS configuration is
like cell cluster, so this communication system is called to cellular telephony.

After cellular telephony came in picture, various cellular systems developed


in world, like : AMPS, NMT450, NMT900, J/NTACS, TACS, NETC< RADIOCOM.
These are first generation of cellular telephony. In 1989 the second generation of
cellular system i.e. GSM is developed and in 1991 its commercial use is started. GSM
is one of the mobile telephony standards. It is the latest technology developed in
INDIA. Now ITI Mankapur is going to manufacture BTS based on GSM technology,
first time in INDIA. Other than GSM many systems like CDMA, PDC, D-AMPS,
MSS.LEOS, MEOS are developed as second generation of telephony in cellular. Now
IMT2000 satellite, UMTS/IMT-2000 are being developed as a third generation of
cellular telephony.

ABOUT GSM:

Phase I of the GSM specifications were published in 1990. Commercial service was
started in mid-1991, and by 1993 there were 36 GSM networks in 22 countries.
Although standardized in Europe, GSM is not only a European standard. Over 200
GSM networks (including DCS1800 and PCS1900) are operational in 110 countries
around the world. In the beginning of 1994, there were 1.3 million subscribers
worldwide, which had grown to more than 55 million by October 1997. With North
America making a delayed entry into the GSM field with a derivative of GSM called
PCS1900, GSM systems exist on every continent, and the acronym GSM now aptly
stands for Global System for Mobile communications. Low terminal and service cost
logo of GSM to identify compatibility of handsets and
equipments

OBJECTIVES OF GSM:

 Support for international roaming


 Ability to support handheld terminals
 Support for range of new services and facilities
 Spectral efficiency
 ISDN compatibility

Services provided by GSM

From the beginning, the planners of GSM wanted ISDN compatibility in terms of the
services offered and the control signalling used. However, radio transmission
limitations, in terms of bandwidth and cost, do not allow the standard ISDN B-
channel bit rate of 64 kbps to be practically achieved.

Using the ITU-T definitions, telecommunication services can be divided into bearer
services, teleservices, and supplementary services. The most basic teleservice
supported by GSM is telephony. As with all other communications, speech is digitally
encoded and transmitted through the GSM network as a digital stream. A variety of
data services is offered. GSM users can send and receive data, at rates up to 9600 bps,
to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public Data
Networks, and Circuit Switched Public Data Networks using a variety of access
methods and protocols, such as X.25 or X.32. Since GSM is a digital network, a
modem is not required between the user and GSM network, although an audio modem
is required inside the GSM network to interwork with POTS.

Other data services include Group 3 facsimile, as described in ITU-T recommendation


T.30, which is supported by use of an appropriate fax adaptor. A unique feature of
GSM, not found in older analog systems, is the Short Message Service (SMS). SMS is
a bidirectional service for short alphanumeric (up to 160 bytes) messages. SMS can
also be used in a cell-broadcast mode, for sending messages such as traffic updates or
news updates. Messages can also be stored in the SIM card for later retrieval
Supplementary services are provided on top of teleservices or bearer services. In the
current (Phase I) specifications, they include several forms of call forward (such as
call forwarding when the mobile subscriber is unreachable by the network), and call
barring of outgoing or incoming calls, for example when roaming in another country.
Many additional supplementary services will be provided in the Phase 2
specifications, such as caller identification, call waiting, multi-party conversations.
Architecture of the GSM network

A GSM network is composed of several functional entities, whose functions and


interfaces are specified. Figure 1 shows the layout of a generic GSM network. The
GSM network can be divided into three broad parts. The Mobile Station is carried by
the subscriber. The Base Station Subsystem controls the radio link with the Mobile
Station. The Network Subsystem, the main part of which is the Mobile services
Switching Center (MSC), performs the switching of calls between the mobile users,
and between mobile and fixed network users. The MSC also handles the mobility
management operations. Not shown is the Operations and Maintenance Center, which
oversees the proper operation and setup of the network. The Mobile Station and the
Base Station Subsystem communicate across the Um interface, also known as the air
interface or radio link. The Base Station Subsystem communicates with the Mobile
services Switching Center across the A interface.

Figure 1. General architecture of a GSM network

1. Mobile Station
The mobile station (MS) consists of the mobile equipment (the terminal) and a smart
card called the Subscriber Identity Module (SIM). The SIM provides personal
mobility, so that the user can have access to subscribed services irrespective of a
specific terminal. By inserting the SIM card into another GSM terminal, the user is
able to receive calls at that terminal, make calls from that terminal, and receive other
subscribed services.

2. Mobile Equipment: The mobile equipment is uniquely identified by the


International Mobile Equipment Identity (IMEI).
3. SIM( Subscriber Identity Module): The SIM card contains the International
Mobile Subscriber Identity (IMSI) used to identify the subscriber to the
system, a secret key for authentication, and other information. The IMEI and
the IMSI are independent, thereby allowing personal mobility. The SIM card
may be protected against unauthorized use by a password or personal identity
number.

4. Base Station Subsystem(BSS)


The Base Station Subsystem is composed of two parts, the Base Transceiver Station
(BTS) and the Base Station Controller (BSC). These communicate across the
standardized Abis interface, allowing (as in the rest of the system) operation between
components made by different suppliers.

 BTS: The Base Transceiver Station houses the radio tranceivers that define a
cell and handles the radio-link protocols with the Mobile Station. In a large
urban area, there will potentially be a large number of BTSs deployed, thus the
requirements for a BTS are ruggedness, reliability, portability, and minimum
cost.

CARDS IN BTS RACK:

XIBM: it is an external alarm board and is used for alarm purpose, gives 2.6MHz
clock for SUMA

MSCA: multi external connection area

for BTS. It supplies 48 volt DC to BTS rack. It contain 6 switches, 1 for alarm and
5 for shelf.

TRAG: these are transceiver cards, transmission & reception of information is


through this part. These are connected to each other via discard. A complete BTS
rack such that a 1:4 BTS rack contains 12 TRAG cards. TRAG cards are
controlled by ANC cards.

ANC: it is antenna network combiner. It connects externally by antenna and


internally with TRAX cards. 1 ANC can control maximum of 4 TRAG. 1 ANC
covers 1 sector ( 120 °) of external antenna. It acts three kbps signaling with 13
kbps information.

SUMA: it is station unit module access. It is the most important and main
controlling card of BTS rack. It encodes 4 , 16 kbps (information+ signaling) to
1 , 64 kbps channel in reception to ABIS link. It decodes 64 kbps channels into 4,
16 kbps channels on transmission.

 BSC:The Base Station Controller manages the radio resources for one or more
BTSs. It handles radio-channel setup, frequency hopping, and handovers. The
BSC is the connection between the mobile station and the Mobile service
Switching Center (MSC).

5. Network Subsystem
The central component of the Network Subsystem is the Mobile services Switching
Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and
additionally provides all the functionality needed to handle a mobile subscriber, such
as registration, authentication, location updating, handovers, and call routing to a
roaming subscriber. These services are provided in conjuction with several functional
entities, which together form the Network Subsystem. The MSC provides the
connection to the fixed networks (such as the PSTN or ISDN). Signalling between
functional entities in the Network Subsystem uses Signalling System Number 7 (SS7),
used for trunk signalling in ISDN and widely used in current public networks.

The Home Location Register (HLR) and Visitor Location Register (VLR), together
with the MSC, provide the call-routing and roaming capabilities of GSM.

 Home Location Register (HLR) : The HLR contains all the administrative
information of each subscriber registered in the corresponding GSM network,
along with the current location of the mobile. The location of the mobile is
typically in the form of the signalling address of the VLR associated with the
mobile station. The actual routing procedure will be described later. There is
logically one HLR per GSM network, although it may be implemented as a
distributed database.

 Visitor Location Register (VLR): The Visitor Location Register (VLR)


contains selected administrative information from the HLR, necessary for call
control and provision of the subscribed services, for each mobile currently
located in the geographical area controlled by the VLR. Although each
functional entity can be implemented as an independent unit, all
manufacturers of switching equipment to date implement the VLR together
with the MSC, so that the geographical area controlled by the MSC
corresponds to that controlled by the VLR, thus simplifying the signalling
required. Note that the MSC contains no information about particular mobile
stations --- this information is stored in the location registers.

The other two registers are used for authentication and security purposes. The
Equipment Identity Register (EIR) is a database that contains a list of all valid mobile
equipment on the network, where each mobile station is identified by its International
Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been
reported stolen or is not type approved. The Authentication Center (AuC) is a
protected database that stores a copy of the secret key stored in each subscriber's SIM
card, which is used for authentication and encryption over the radio channel.

Radio link aspects

The International Telecommunication Union (ITU), which manages the international


allocation of radio spectrum (among many other functions), allocated the bands 890-
915 MHz for the uplink (mobile station to base station) and 935-960 MHz for the
downlink (base station to mobile station) for mobile networks in Europe. Since this
range was already being used in the early 1980s by the analog systems of the day, the
CEPT had the foresight to reserve the top 10 MHz of each band for the GSM network
that was still being developed. Eventually, GSM will be allocated the entire 2x25
MHz bandwidth.

Multiple access and channel structure


Since radio spectrum is a limited resource shared by all users, a method must be
devised to divide up the bandwidth among as many users as possible. The method
chosen by GSM is a combination of Time- and Frequency-Division Multiple Access
(TDMA/FDMA). The FDMA part involves the division by frequency of the
(maximum) 25 MHz bandwidth into 124 carrier frequencies spaced 200 kHz apart.
One or more carrier frequencies are assigned to each base station. Each of these
carrier frequencies is then divided in time, using a TDMA scheme. The fundamental
unit of time in this TDMA scheme is called a burst period and it lasts 15/26 ms (or
approx. 0.577 ms). Eight burst periods are grouped into a TDMA frame (120/26 ms, or
approx. 4.615 ms), which forms the basic unit for the definition of logical channels.
One physical channel is one burst period per TDMA frame.

Channels are defined by the number and position of their corresponding burst periods.
All these definitions are cyclic, and the entire pattern repeats approximately every 3
hours. Channels can be divided into dedicated channels, which are allocated to a
mobile station, and common channels, which are used by mobile stations in idle
mode.

Traffic channels
A traffic channel (TCH) is used to carry speech and data traffic. Traffic channels are
defined using a 26-frame multiframe, or group of 26 TDMA frames. The length of a
26-frame multiframe is 120 ms, which is how the length of a burst period is defined
(120 ms divided by 26 frames divided by 8 burst periods per frame). Out of the 26
frames, 24 are used for traffic, 1 is used for the Slow Associated Control Channel
(SACCH) and 1 is currently unused (see Figure 2). TCHs for the uplink and downlink
are separated in time by 3 burst periods, so that the mobile station does not have to
transmit and receive simultaneously, thus simplifying the electronics.

In addition to these full-rate TCHs, there are also half-rate TCHs defined, although
they are not yet implemented. Half-rate TCHs will effectively double the capacity of a
system once half-rate speech coders are specified (i.e., speech coding at around 7
kbps, instead of 13 kbps). Eighth-rate TCHs are also specified, and are used for
signalling. In the recommendations, they are called Stand-alone Dedicated Control
Channels (SDCCH).

Figure 2. Organization of bursts, TDMA frames, and multiframes for speech and
data

Control channels
Common channels can be accessed both by idle mode and dedicated mode mobiles.
The common channels are used by idle mode mobiles to exchange the signalling
information required to change to dedicated mode. Mobiles already in dedicated mode
monitor the surrounding base stations for handover and other information. The
common channels are defined within a 51-frame multiframe, so that dedicated
mobiles using the 26-frame multiframe TCH structure can still monitor control
channels. The common channels include:
Broadcast Control Channel (BCCH)
Continually broadcasts, on the downlink, information including base station
identity, frequency allocations, and frequency-hopping sequences.
Frequency Correction Channel (FCCH) and Synchronisation Channel (SCH)
Used to synchronise the mobile to the time slot structure of a cell by defining
the boundaries of burst periods, and the time slot numbering. Every cell in a
GSM network broadcasts exactly one FCCH and one SCH, which are by
definition on time slot number 0 (within a TDMA frame).
Random Access Channel (RACH)
Slotted Aloha channel used by the mobile to request access to the network.
Paging Channel (PCH)
Used to alert the mobile station of an incoming call.
Access Grant Channel (AGCH)
Used to allocate an SDCCH to a mobile for signalling (in order to obtain a
dedicated channel), following a request on the RACH.

Speech coding
GSM is a digital system, so speech which is inherently analog, has to be digitized.
The method employed by ISDN, and by current telephone systems for multiplexing
voice lines over high speed trunks and optical fiber lines, is Pulse Coded Modulation
(PCM). The output stream from PCM is 64 kbps, too high a rate to be feasible over a
radio link. The 64 kbps signal, although simple to implement, contains much
redundancy. The GSM group studied several speech coding algorithms on the basis of
subjective speech quality and complexity (which is related to cost, processing delay,
and power consumption once implemented) before arriving at the choice of a Regular
Pulse Excited -- Linear Predictive Coder (RPE--LPC) with a Long Term Predictor
loop. Basically, information from previous samples, which does not change very
quickly, is used to predict the current sample. The coefficients of the linear
combination of the previous samples, plus an encoded form of the residual, the
difference between the predicted and actual sample, represent the signal. Speech is
divided into 20 millisecond samples, each of which is encoded as 260 bits, giving a
total bit rate of 13 kbps. This is the so-called Full-Rate speech coding. Recently, an
Enhanced Full-Rate (EFR) speech coding algorithm has been implemented by some
North American GSM1900 operators. This is said to provide improved speech quality
using the existing 13 kbps bit rate.

Channel coding and modulation


Because of natural and man-made electromagnetic interference, the encoded speech
or data signal transmitted over the radio interface must be protected from errors. GSM
uses convolutional encoding and block interleaving to achieve this protection. The
exact algorithms used differ for speech and for different data rates. The method used
for speech blocks will be described below.

Recall that the speech codec produces a 260 bit block for every 20 ms speech sample.
From subjective testing, it was found that some bits of this block were more important
for perceived speech quality than others. The bits are thus divided into three classes:

 Class Ia 50 bits - most sensitive to bit errors


 Class Ib 132 bits - moderately sensitive to bit errors
 Class II 78 bits - least sensitive to bit errors

Class Ia bits have a 3 bit Cyclic Redundancy Code added for error detection. If an
error is detected, the frame is judged too damaged to be comprehensible and it is
discarded. It is replaced by a slightly attenuated version of the previous correctly
received frame. These 53 bits, together with the 132 Class Ib bits and a 4 bit tail
sequence (a total of 189 bits), are input into a 1/2 rate convolutional encoder of
constraint length 4. Each input bit is encoded as two output bits, based on a
combination of the previous 4 input bits. The convolutional encoder thus outputs 378
bits, to which are added the 78 remaining Class II bits, which are unprotected. Thus
every 20 ms speech sample is encoded as 456 bits, giving a bit rate of 22.8 kbps.

To further protect against the burst errors common to the radio interface, each sample
is interleaved. The 456 bits output by the convolutional encoder are divided into 8
blocks of 57 bits, and these blocks are transmitted in eight consecutive time-slot
bursts. Since each time-slot burst can carry two 57 bit blocks, each burst carries traffic
from two different speech samples.

Recall that each time-slot burst is transmitted at a gross bit rate of 270.833 kbps. This
digital signal is modulated onto the analog carrier frequency using Gaussian-filtered
Minimum Shift Keying (GMSK). GMSK was selected over other modulation
schemes as a compromise between spectral efficiency, complexity of the transmitter,
and limited spurious emissions. The complexity of the transmitter is related to power
consumption, which should be minimized for the mobile station. The spurious radio
emissions, outside of the allotted bandwidth, must be strictly controlled so as to limit
adjacent channel interference, and allow for the co-existence of GSM and the older
analog systems (at least for the time being).

Multipath equalization
At the 900 MHz range, radio waves bounce off everything - buildings, hills, cars,
airplanes, etc. Thus many reflected signals, each with a different phase, can reach an
antenna. Equalization is used to extract the desired signal from the unwanted
reflections. It works by finding out how a known transmitted signal is modified by
multipath fading, and constructing an inverse filter to extract the rest of the desired
signal. This known signal is the 26-bit training sequence transmitted in the middle of
every time-slot burst. The actual implementation of the equalizer is not specified in
the GSM specifications.

Frequency hopping
The mobile station already has to be frequency agile, meaning it can move between a
transmit, receive, and monitor time slot within one TDMA frame, which normally are
on different frequencies. GSM makes use of this inherent frequency agility to
implement slow frequency hopping, where the mobile and BTS transmit each TDMA
frame on a different carrier frequency. The frequency hopping algorithm is broadcast
on the Broadcast Control Channel. Since multipath fading is dependent on carrier
frequency, slow frequency hopping helps alleviate the problem. In addition, co-
channel interference is in effect randomized.
Discontinuous transmission
Minimizing co-channel interference is a goal in any cellular system, since it allows
better service for a given cell size, or the use of smaller cells, thus increasing the
overall capacity of the system. Discontinuous transmission (DTX) is a method that
takes advantage of the fact that a person speaks less that 40 percent of the time in
normal conversation by turning the transmitter off during silence periods. An added
benefit of DTX is that power is conserved at the mobile unit.

The most important component of DTX is, of course, Voice Activity Detection. It
must distinguish between voice and noise inputs, a task that is not as trivial as it
appears, considering background noise. If a voice signal is misinterpreted as noise, the
transmitter is turned off and a very annoying effect called clipping is heard at the
receiving end. If, on the other hand, noise is misinterpreted as a voice signal too often,
the efficiency of

Figure 3. Signalling protocol structure in GSM

The signalling protocol in GSM is structured into three general layers depending on
the interface, as shown in Figure 3. Layer 1 is the physical layer, which uses the
channel structures discussed above over the air interface. Layer 2 is the data link
layer. Across the Um interface, the data link layer is a modified version of the LAPD
protocol used in ISDN, called LAPDm. Across the A interface, the Message Transfer
Part layer 2 of Signalling System Number 7 is used. Layer 3 of the GSM signalling
protocol is itself divided into 3 sublayers.

Radio Resources Management


Controls the setup, maintenance, and termination of radio and fixed channels,
including handovers.
Mobility Management
Manages the location updating and registration procedures, as well as security
and authentication.
Connection Management
Handles general call control, similar to CCITT Recommendation Q.931, and
manages Supplementary Services and the Short Message Service.
Signalling between the different entities in the fixed part of the network, such as
between the HLR and VLR, is accomplished throught the Mobile Application Part
(MAP). MAP is built on top of the Transaction Capabilities Application Part (TCAP,
the top layer of Signalling System Number 7. The specification of the MAP is quite
complex, and at over 500 pages, it is one of the longest documents in the GSM
recommendations

NEW
BSS
M
S

Previous
MSC

PREVI HLR NEW VLR


-OUS
VLR

The location updating procedures, and subsequent call routing, use the MSC and two
location registers: the Home Location Register (HLR) and the Visitor Location
Register (VLR). When a mobile station is switched on in a new location area, or it
moves to a new location area or different operator's PLMN, it must register with the
network to indicate its current location. In the normal case, a location update message
is sent to the new MSC/VLR, which records the location area information, and then
sends the location information to the subscriber's HLR. The information sent to the
HLR is normally the SS7 address of the new VLR, although it may be a routing
number. The reason a routing number is not normally assigned, even though it would
reduce signalling, is that there is only a limited number of routing numbers available
in the new MSC/VLR and they are allocated on demand for incoming calls. If the
subscriber is entitled to service, the HLR sends a subset of the subscriber information,
needed for call control, to the new MSC/VLR, and sends a message to the old
MSC/VLR to cancel the old registration.

For reliability reasons, GSM also has a periodic location updating procedure. If an
HLR or MSC/VLR fails, to have each mobile register simultaneously to bring the
database up to date would cause overloading. Therefore, the database is updated as
location updating events occur. The enabling of periodic updating, and the time period
between periodic updates, is controlled by the operator, and is a trade-off between
signalling traffic and speed of recovery. If a mobile does not register after the
updating time period, it is deregistered.

A procedure related to location updating is the IMSI attach and detach. A detach lets
the network know that the mobile station is unreachable, and avoids having to
needlessly allocate channels and send paging messages. An attach is similar to a
location update, and informs the system that the mobile is reachable again. The
activation of IMSI attach/detach is up to the operator on an individual cell basis.

Authentication and security


Since the radio medium can be accessed by anyone, authentication of users to prove
that they are who they claim to be, is a very important element of a mobile network.
Authentication involves two functional entities, the SIM card in the mobile, and the
Authentication Center (AuC). Each subscriber is given a secret key, one copy of
which is stored in the SIM card and the other in the AuC. During authentication, the
AuC generates a random number that it sends to the mobile. Both the mobile and the
AuC then use the random number, in conjuction with the subscriber's secret key and a
ciphering algorithm called A3, to generate a signed response (SRES) that is sent back
to the AuC. If the number sent by the mobile is the same as the one calculated by the
AuC, the subscriber is authenticated

The same initial random number and subscriber key are also used to compute the
ciphering key using an algorithm called A8. This ciphering key, together with the
TDMA frame number, use the A5 algorithm to create a 114 bit sequence that is
XORed with the 114 bits of a burst (the two 57 bit blocks). Enciphering is an option
for the fairly paranoid, since the signal is already coded, interleaved, and transmitted
in a TDMA manner, thus providing protection from all but the most persistent and
dedicated eavesdroppers.

Another level of security is performed on the mobile equipment itself, as opposed to


the mobile subscriber. As mentioned earlier, each GSM terminal is identified by a
unique International Mobile Equipment Identity (IMEI) number. A list of IMEIs in the
network is stored in the Equipment Identity Register (EIR). The status returned in
response to an IMEI query to the EIR is one of the following:

White-listed
The terminal is allowed to connect to the network.
Grey-listed
The terminal is under observation from the network for possible problems.
Black-listed
The terminal has either been reported stolen, or is not type approved (the
correct type of terminal for a GSM network). The terminal is not allowed to
connect to the network.

Communication management
The Communication Management layer (CM) is responsible for Call Control (CC),
supplementary service management, and short message service management. Each of
these may be considered as a separate sublayer within the CM layer. Call control
attempts to follow the ISDN procedures specified in Q.931, although routing to a
roaming mobile subscriber is obviously unique to GSM. Other functions of the CC
sublayer include call establishment, selection of the type of service (including
alternating between services during a call), and call release.

Call routing
Unlike routing in the fixed network, where a terminal is semi-permanently wired to a
central office, a GSM user can roam nationally and even internationally. The directory
number dialed to reach a mobile subscriber is called the Mobile Subscriber ISDN
(MSISDN), which is defined by the E.164 numbering plan.

PSTN Gateway HLR


MSC

Terminati- BSS
ng MSC

Fixed Set VLR MS


(FS)

This number includes a country code and a National Destination Code which
identifies the subscriber's operator. The first few digits of the remaining subscriber
number may identify the subscriber's HLR within the home PLMN.

An incoming mobile terminating call is directed to the Gateway MSC (GMSC)


function. The GMSC is basically a switch which is able to interrogate the subscriber's
HLR to obtain routing information, and thus contains a table linking MSISDNs to
their corresponding HLR. A simplification is to have a GSMC handle one specific
PLMN. It should be noted that the GMSC function is distinct from the MSC function,
but is usually implemented in an MSC.

The routing information that is returned to the GMSC is the Mobile Station Roaming
Number (MSRN), which is also defined by the E.164 numbering plan. MSRNs are
related to the geographical numbering plan, and not assigned to subscribers, nor are
they visible to subscribers.

The most general routing procedure begins with the GMSC querying the called
subscriber's HLR for an MSRN. The HLR typically stores only the SS7 address of the
subscriber's current VLR, and does not have the MSRN (see the location updating
section). The HLR must therefore query the subscriber's current VLR, which will
temporarily allocate an MSRN from its pool for the call. This MSRN is returned to
the HLR and back to the GMSC, which can then route the call to the new MSC. At the
new MSC, the IMSI corresponding to the MSRN is looked up, and the mobile is
paged in its current location area (see Figure 4).

Figure 4. Call routing for a mobile terminating call

The connection between BTS and BSC is on ABIS interface . this is done by 2.048
physical layer which has 32 time slots of 64 kbps each. Time slot zero for such
synchronization, time slot 16 for signaling and removing time slots for speech. So one
TDMA frame can carry 30 speech signals.
T0 T1 T2. ……. T16 T17 …… T31

Synchronization signalling

Total time frame is of 125µsec. and each speech time slot is of 3.99 µsec. .

Ab is link. E1 link – 32 time slots – European system

(PCM link) E2 link – 24 time slots- American system

In India E1 link(32 time slots) is adopted.

1 TDMA frame consists of 8 burst period.

BP0 BP1 ………… BP6 BP7

1 burst period = 0.577 msec.

1 frame = 8*(15/26) = 4.615 msec.

26 TDMA multiframe :

used to define the TCH/F and TCH/H

26*8 BP = 120 msec.

51 TDMA multiframe:

used to define TCH/F , TCH/H and common channels.

51*8 BP = 235 msec

Super Frame:

51 of 26 TDMA multiframe & 26 of 51 TDMA frame

51*26MF = 6.12 sec

corresponding to the smallest cycle for which the organization of all channels is
repeated.

Hyper frame:

2048 of super frame

2048*51*26*8BP = 3hr, 28 min, 53 sec, 760 ms


smallest cycle for frequency hopping.

Burst structure
There are four different types of bursts used for transmission in GSM. The normal
burst is used to carry data and most signalling. It has a total length of 156.25 bits,
made up of two 57 bit information bits, a 26 bit training sequence used for
equalization, 1 stealing bit for each information block (used for FACCH), 3 tail bits at
each end, and an 8.25 bit guard sequence, as shown in Figure 2. The 156.25 bits are
transmitted in 0.577 ms, giving a gross bit rate of 270.833 kbps.

The F burst, used on the FCCH, and the S burst, used on the SCH, have the same
length as a normal burst, but a different internal structure, which differentiates them
from normal bursts (thus allowing synchronization). The access burst is shorter than
the normal burst, and is used only on the RACH.

BURST TYPE:

Normal burst: carry data

F- burst : used in FCCH(Frequency correction channel)

S- burst : used in SCH (synchronization channel)

Access burst : used in RACH(Random access channel)

Dummy burst

Normal Burst

Encrypted Training Encrypted


information sequence information
TB3 TB3 GP8.25
57+1 bits 26 bits 57+1 bits

Dummy Burst

TB3 Mixed bits, 142 bits TB3 GP 8.25

Access Burst

Encrypted
Training information Extended guard bits
TB3 sequence 41 TB3 68.25 bits
bits 36 bits

Synchronization Burst

Extended Extended Encrypted


TB3 information 39 training information 39 TB3 GP8.25
bits sequence 64 bits
bits

Frequency correction Burst

TB3 Mixed bits, 142 bits TB3 GP 8.25

LOGICAL CHANNEL TYPE

Full Rate TCH/F

Traffic

Channels

Half rate TCH/H

Logical

Channels BCCH

Broadcast downlink FCCH

Channels SCH

CBCH

Signaling common downlink PCH

Channels channel control AGCH

uplink RACH
Dedicated slow SACCH

Control channel fast SDCCH

FACCH

TRAFFIC CHANNELS:

TCH/F: traffic channel full rate at 13kbps.

TCH/H: traffic channel half rate at 6.5kbps.

EFR: Enhanced full rate at 13 kbps

BROADCAST CHANNELS DOWNLINK:

BCCH (Broadcast control channels):

Broadcasting network/cell specific information

FCCH( Frequency correction control channel):

Used by mobile for frequency correction

SCH( synchronization channel):

Synchronize mobile(TDMA FN & BSIC)

CBCH (Cell broadcasting control channel)

COMMON CONTROL CHANNEL:

Downlink:

PCH(paging channel)

For alerting mobile

AGCH (Access grant channel)

For granting access to mobile

Uplink:
RACH( Random access channel)

Mobile seeking attention of BTS

DEDICATED CONTROL CHANNELS

SLOW:

SACCH (Slow associated control channel, Duplex)

Transmission of signaling data( radio link separation , transmitt power control,


timing advance)

FAST:

SDCCH( stand alone dedicated control channel)

Signaling channel used for service request.

FACCH( fast associated control channel)

Stealing flag and preemption

Used during call setup, handover

CALL BARRING

Call barring is a GSM feature by which certain mobiles could be barred to access to
certain cells.

Used to reserve cells for handover and for certain mobiles

Every cell has a set parameter which defines access classes (programmed in SIM of a
mobile) are barred for particular cell. This parameter is broadcasted on BCCH.

Two Standards of GSM:

GSM-900

GSM-1800

S No. Parameters GSM-900 GSM-1800


1 Uplink band 890 to 915MHz 1710 to 1785 MHz
935 to 960 MHz
1805 to 1888 MHZ

2 Downlink band
200KHz
200KHz
124
3 Channel spacing 374
45 MHz
4 Total channel 95MHZ
8
5 Duplex spacing 8

6 Time slots

Speech coding and decoding in GSM

Speech Channel Interlocki Ciphering


coding coding ng

modulation

Speech Channel Deciphering Demodulatin


decoding decodfing
C-DOT

C-DOT, the Indian Telecom Technology Center, Relies on Data Connection for
Next Generation Software

C-DOT Selects Data Connection's Complete Suite of Next Generation Protocols


for Use in New Range of Telecom Products

Established in 1984 by the Government of India, C-DOT develops network


technologies and solutions for fixed-line, mobile, packet-based and converged
networks. C-DOT has a strong pool of around 800 software and hardware engineers
with world-class technology development centers based in New Delhi and Bangalore,
India.

Founded in 1981, Data Connection has developed portable routing and signaling
source code covering a wide range of technologies for over 20 years. The company
optionally provides its routing protocols tightly coupled with its packet and/or optical
MPLS software products to give an integrated control plane that significantly reduces
development time and costs for OEM system vendors. Backed by a self-funded, long-
standing corporation with world-renowned customer support, all of Data Connection's
products are architected for high availability and seamless portability to numerous
hardware and software environments. It can work in rural areas on high temperature
upto 50 ° c.

C-DOT switches have a distributed architecture. A Base Module(BM) has 512 ports
which can provide non-blocking connectivity and can accept concentrated subscriber
lines. The BM, capable of serving upto 2000 lines or 512 trunks, is used as the basic
building block. Each BM is housed in a single cabinet. By interconnecting upto 32
such BMs through a Central Module(CM), the switch can support upto 40,000 lines.
The system can support upto 4:1 concentration. Lines and trunks can be inter-mixed
in the same BM. .

Hardware

A BM can support upto 16 Terminal Units(TUs), each handling 128 terminations. A


serive Unit(SU) caters for service functions like tone generation, MF/DTMF
singalling etc. The switch is controlled by Motorola 68010/68040. In the periphery,
one 8-bit microprocessor controls 128 terminations. The system has a high
redundancy - all hardware excluding line/trunk terminations are duplicated to provide
a very high system reliability. The switch uses less than 40 card types. The controllers
communicate through a Base Message switch (BMS) via 64 kb/s HDLC links. The
switch is highly connectorised with minimal inter-frame wiring. Low power CMOS
technology ensures low power consumption. The BM is convection cooled and the
CM is forced air-cooled.

The major function of CM is to provide voice switching between the BMs and enable
communication of control messages between different parts of the system. The AP
supports the global routing and translation functions.

Software

The software is distributed across the 16-bit and 8-bit controllers of the system.
Majority of the software real time functions are handled at the BM level. Only
minimal real time functions are handled at AP. The BP handles call processing,
administration and mainetenance functions relating to the terminations connected to
that BM. Majority of the realtime software runs under a custom built real time
operating system called CDOS. The software is implemented as Modular
communicating processes using 'C' language.

Features of C-DOT:

C-DOT Exchange:

 Single base module EX ( SBM)


 Main automatic exchange large (MAX-L)

 Main automatic EX extra large (MAX-XL)

 C-DOT MAX is a universal digital switch. It can be configured for local ,


transmit, inter local and inter transmit exchange.

 The maximum capacity as per subscriber is 40,000 subscriber lines for local
exchange configuration and 15000 for trunk automation.

 It reduces the 16 rack E10B exchange to 1 C-DOT exchange.

 Processing time and speed, time delay& response is better in C-DOT.

Basic Modules Of C-DOT MAX:

 Base module (BM)


 Central module( CM)

 Administrative Module (AM)


 Input Output Module(IOM)

BASE MODULE: it is the basic building block of C-DOT, DSS-MAX. it


interface subscriber lines with exchange to other subscriber line, PBX (private
branch exchange, analog and digital lines. The trunk line may be two wire
digital CAS ( common associated signaling) or CCS (common control
signalling). One BM can provide maximum 2024 subscriber lines using 2 LM
racks at place where less no. of subscribers are needed. It contains control and
line cards.

Functions of BM:

 Analog to digital conversions of all signals on analog lines and trunks.


It is done in line cards.
 Interfaces digital trunk and digital subscriber lines.

 Switches the call between the terminals i.e. subscriber lines.

 Communicate between administrative module & central module.

 Provision of special circuit for call processing support.

UNITS OF BM:

Analog Terminal Unit (ATU): in this unit there are 16 line cards , each
can handle 8 subscriber. So this unit interfaces 128 analog terminal units.
Cards in ATU are as follows:

1. Subscriber line card: This is of two types:

LCC: line Circuit card

CCM: circuit card with memory

Both LCC & CCM cards interface to 8 subscribers and provide basic
BORSCHT functions for line card.

B - Battery O - Overloading

C - Circuit H - hybridization

R - Ringing T - testing

S - Synchronization
E10B

E10B is a digital time division switching system. It works on TDM technique.The


E10B system has been developed in terms of an integrated telephone network rather
than in terms of individual telephone exchange. The system is used for serving us
Local, TAX and Tandem Exchanges.

CSE is the Electronic subscriber concentrator to Interface the Subscribers. CSE could
be co-located CSEL) remoted (CSED).

The controller part of the exchange which has a Distributed Architecture with main
functions like Switching Network (CX), Marker (MQ), Call Processing (MR),
Charging (TX), Translation / Routing (TR) frequency sender / receiver (RTA),
Multiplex Connection (URM), standby charge recording unit (DSF) etc. These
controller parts control call handling routing and charging functions.

The operation and maintenance functions are by Control Unit (OC) which handles all
administration statistical and technical operations required to run the E10B
Exchanges. It shares two fundamental principles:

1. Use of digital PCM technology


2. Spectrum of the switching function (at exchange level) from the
management function(at network level)

The E10B system has been developed for 30 channel PCM operation, but
it can also handle 24 channel PCM system, when the Platon exchange
went into service. E10B fitting centre can be divided in to three main
block.

Block 1:- Subscriber and circuit connection .

Block 2:- Time division switching mode.

Block 3:- Control unit

The operation and maintenance centre constitutes a fourth block which is


shared by a number of switching centers.

Wi – Fi
Wi-Fi stands for wireless fidelity and is meant to be used generically when referring
any type of 802.11 network whether 802.11b, 802.11a, dual band etc..The term is
promulgated by Wi-Fi alliance. A user with a Wi-Fi certified product can use any
brand ofaccess point with any brand of client hardware that is also certified. Typically
any Wi-Fi product using the same radio frequency (2.4GHz for 802.11b or 11g, 5GHz
for 802.11a) will work with any other, even if not Wi-Fi certified. Formerly, the term
"Wi-Fi" was used only in place of the 2.4GHz 802.11b standard, in the same way that
"Ethernet" is used in place of IEEE 802.3. The Alliance expanded the generic use of
the term in an attempt to stop confusion about wireless LAN interoperability.

STANDARDS:

IEEE 802.11 based

802.11 : provides 1 or 2 Mbps transmission in the 2.4GHz band, uses either FHSS or
DSSS

802.11b : provides 11Mbps transmission (with a fall back to 5.5, 2 & 1Mbps) in the
2.4 GHz band. It uses only DSSS

802.11g : provides 20+ Mbps in the 2.4 GHz band

802.11a : provides upto 54 Mbps in the 5GHz band. It uses OFDM(orthogonal


frequency division multiplexing).

802.11n : promises to give speeds of 100Mbps & may use MIMO

Wi-Fi in INDIA:

BSNL putting up Wi-Fi in about 22 cities

Chennai, Kolkata, Pune, airports are Wi-Fi enabled . Mysore became the first Wi-Fi
city in India

Wi-Fi net has set up hospitals in Mysore covering the computer city and few villages
near by.

It costs INR 750 per month and unlimited data transfer.

With three tower, for transmission of signals, the entire city spread over 130 sqKm ,
has become wireless internet enable.

India has about 384 Wi-Fi hot spots. Karnataka-231, TN-83, MH-23, Delhi-1, WB-7,
AP-6.

Wi-Fi application in WMAN:


MESH architecture is used.

TAIPEI

Philadelphia

San-francisco

Wi-Fi range extensions:

Range extension by RABWIM(50KMs, 50Mbps & Maspro, 5KMs)

Team fiber red wire achieved an unamplified 124.9 mile, 11- MB connections for
three hours. The team has shattered their previous world record of 55.1 miles and the
ground to ground amplified record of 82miles set in UTAH.

Wi-MAX

The two driving forces of modern Internet are broadband, and wireless. The WiMax
standard combines the two, delivering high-speed broadband Internet access over a
wireless connection. Because it can be used over relatively long distances, it is an
effective "last mile" solution for delivering broadband to the home, and for creating
wireless "hot spots" in places like airports, college campuses, and small communities.

Based on the IEEE 802.16 Air Interface Standard, WiMax delivers a point-to-
multipoint architecture, making it an ideal method for carriers to deliver broadband to
locations where wired connections would be difficult or costly. It may also provide a
useful solution for delivering broadband to rural areas where high-speed lines have
not yet become available. A WiMax connection can also be bridged or routed to a
standard wired or wireless Local Area Network (LAN).

The so-called "last mile" of broadband is the most expensive and most difficult for
broadband providers, and WiMax provides an easy solution. Although it is a wireless
technology, unlike some other wireless technologies, it doesn't require a direct line of
sight between the source and endpoint, and it has a service range of 50 kilometers. It
provides a shared data rate of up to 70Mbps, which is enough to service up to a
thousand homes with high-speed access.

WiMax offers some advantages over WiFi, a similar wireless technology, in that it
offers a greater range and is more bandwidth-efficient. Ultimately, WiMax may be
used to provide connectivity to entire cities, and may be incorporated into laptops to
give users an added measure of mobility.

WiMax requires a tower, similar to a cell phone tower, which is connected to the
Internet using a standard wired high-speed connection, such as a T3 line. But as
opposed to a traditional Internet Service Provider (ISP), which divides that bandwidth
among customers via wire, it uses a microwave link to establish a connection.

Because WiMax does not depend on cables to connect each endpoint, deploying
WiMax to an entire high-rise, community or campus can be done in a matter of a
couple days, saving significant amounts of manpower.

APPLICATIONS:

Rural areas coverage.

Urban areas –traffic burden in congested areas.

Study shows only half of all households in Europe, will have broadband access by
2008.

Spain plans to deploy Wi-Max mostly in rural areas where high speed capable
infrastructure is either poor or non existed.

Altitude of France use 50 Wi-Max base stations, offer data network services in three
regions of France. Alvarvion ill upgrade equipment to 802.16d speech.

Voice over Wi-Max in France being tried out altitude TELCOM- SA demonstrated
how it will use Wi-max technology to deliver telephone calls.

ACKNOWLEDGEMENT

It was the beginning when Graham Bell invented telephone, since then in the world
of telecommunication the technology has increased by leaps and bounds. The training
in ITI limited mankapur is a view to some technology indeed.

I am very thankful to Mr. Atul Ahluwalia ( DGM HRD &TS) who graciously
accepted me as the summer trainee at the ITI Limited Mankapur.
I am also thankful to Mr. A.K.Mishra (Engr, PCB), Mr. D.K.Mishra(AE,SIT), Mr.
S.S.Das (Engr,MAX-L, C/T), Mr. R.S. Yadav(Engr, FT- BTS), Mr. N.K.Dixit (Engr,
FT-BTS), Mr. N.S.Yadav (AM, MP-CT), Mr. Pathak (AM, CMA-BTS), Mr.
O.P.Srivastava (AE, CMA-BTS), Mr. Kuldeep Sharma (AE, R&D) for helping me to
understand the working of various divisions and helped me a lot to the point of my
query.

I want to give my special thanks to all the members of the department of the ITI Ltd.
Mankapur for their co-operation. And at last but not the least I want to thank to my
friends.

CONCLUSION

Industrial training plays an important role in the life of every student as it helps a lot
to get a clear picture of industrial environment. It also helps to understand what
actually happens in an industry and acquainted me with various industrial standards.

This report is based on my personal experience which I gained over here.

Here, during four weeks of my training period, I only come to know about how we
should work in a team and what are its benefits. How we should cope out with
difficult situations.
Beside knowledge about various manufacturing processes and products , we came to
know about some technologies such as GSM, OCB-283, SIX-SIGMA and some new
technologies i.e WI-Fi, Wi-Max, C-DOT, E10B etc. here I also experienced the
pressure of handlig the time bound assignments.

PREFACE

I hereby present my report on industrial training in ITI Limited Mankapur . I hve


divided my report into many sections as per the division inside the industry. Each
section is further divided into sub sections.
The first of the report consists of a brief overview of ITI Limited Mankapur. After
this there is details of ISO certification and some new technologies as GSM, SIX-
SIGMA, ERP.

The last section of the report tells about some advanced technologies in the field of
electronics such as E10B, OCB-283, C-DOT, Wi-Fi, Wi-Max etc.

At last I would like to say that I have put my best efforts in bringing out this report in
the time bounded period. I am sure that this report will provide useful information to
the readers.
Mr. ATUL AHLUWALIA SUBMITTED BY:

DGM(HRD & TS) NIKUNJ BHATIA

ITI LTD. MANKAPUR B.Tech 3rd year (EC)

PSIT,KANPUR

VSTR NO. 179


CONTENTS

S. No. TOPICS PAGE No.


1. Preface
2. Acknowledgement
3. Overview of ITI(About ITI
4. Mankapur)

5. ISO
6. SIX SIGMA
7. ERP & BAAN
8. GSM
9.
C-DOT
10.
E10B
11.
Wi-Fi
12.
Wi-Max
13.
Component Division
14.
Circuit Division
15.

16.
Hybrid Section

17. SEA Plant

18. Quality Assurance

Conclusion

You might also like