You are on page 1of 42

Summer Training Report 8/31/2017 11:13:06 AM

A
IN PLANT SUMMER TRAINING REPORT
ON

BHARAT SANCHAR NIGAM LIMITED


MAIN EXCHANGE, TELECOM DISTRICT FAIZABAD

SESSION 2017-2018

SUBMITTED FOR THE PARTIAL FULFILLMENT FOR THE AWARD OF THE


DIPLOMA
IN
ELECTRONICS ENGINEERING (MODERN CONSUMER
ELECTRONICS APPLIANCES)
OF
GOVERNMENT POLYTECHNIC, BARABANKI

SUBMITTED BY:
Arpit Moriya
V SEM (Elex MCEA)
FINAL YEAR

------------------------------------------------------------------------------
Department of Electronics Engineering
GOVERNMENT POLYTECHNIC, BARABANKI
Barabanki-225123, India

Website: http://gpbarabanki.com/

pg. 1 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

Certificate

pg. 2 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

ACKNOWLEDGEMENT

It is with profound gratitude that I express my deep indebtedness to all the employees
of B.S.N.L. (Main Exchange) GMTD Office, Telecom District FAIZABD without
whose support and guidance it would not have been possible for this training to have
materialized and taken a concrete shape. I owe my personal thanks to my trainers in
charge – Smt. Ranjana Khalil (SDE), who extended full support and co-operation at
every stage of my training period. I would also like to take this opportunity to
acknowledge the guidance from Mr. Vivek Kumar Srivastavsa (TPO) GP
Barabanki.

I am also indebted to my parents and friends for their constant encouragement and
helping me in my endeavor.Last, but not the least, I would like to thank everyone who
has contributed for the successful completion of my training.

Arpit Moriya
(Diploma V SEMESTER – Elex MCEA)

pg. 3 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

PREFACE

Organizations are made up of people and function through people. Without people,
organizations cannot exist. The resources of men, money, material, machinery, and
mechanism are connected, coordinated and utilized through people. Engineers need to
concentrate more on mechanism and the way in which things have been made. The
need of training arises for doing things yourself, understanding its way.

Practical exposure for doing things makes a person conversant to the technicalities
involved in any job. In view of such benefits, imparting of vocational training has
been made an integral part of any academic structure.

In B.S.N.L., training is given to Engineering Aspirants to secure future in the dynamic


world of telecommunications. Today telecommunication industry is one of the very
fastest growing industries in the world.

In this order I have taken 28 days BSNL training. In my report I try to introduce
Leased line concepts, WLL, WIMAX, Wi-Fi, GSM, CDMA, overview of Optical
Fiber.

pg. 4 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

TABLE OF CONTENTS

SR CONTENTS PAGE NO.


- Cover Page 1

- Certificate 2

- Acknowledgement 3

- Preface 4

- Table of Contents 5

1. Introduction to BSNL 7
How BSNL Came to Telecom Network 7
Institutional Framework 7
BSNL Contribution to DOT 8
Services 8
Achievements of BSNL 9

2. Working of Basic Telecom network 10


Call Setup 10
Electronic Exchange 11
Carrier Room 12
CLLS 12
MLLN 13
Main Distribution Frame 13
Parts of MDF 13
Functions of MDF 14
Power Plant 14
Central Air Conditioner 15

3. Leased Lines 16
Introduction 16
Drawbacks of LL 16
MLLN 16
MLLN Features 16
MLLN Advantages 17
Applications Of MLLN 17

4. Corporate Network 18
Introduction 18
Why do Organization have CN? 18
Features of CN Security 19

5. WI-FI 20
WI-FI Network 20
Working of WI-FI Network 20

pg. 5 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

Benefits of WI-FI 21
Limitations of WI-FI 21

6. WLL (Wireless Local Loop) 22


Technical Aspects of WLL 22
Advantages Of WLL 22

7. WIMAX 23
Wireless Broadband Services 23
Salient Features of WIMAX 23
Evolution of Broadband Services 23
WiMAX Network Architecture 24

8. Internet 27
OSI Networking Model 28

9. Mobile 2G/3G 31
Features of GSM 2G 31
GSM Subsystem 31
Radio Subsystem 31
Network and Switching Subsystem 31
Function of MSC 32
Third Generation 3G Technologies 33

10. GPRS 34

11. CDMA 35
Advantages of CDMA 35
Disadvantages of CDMA 35
Difference Between CDMA and GSM 35

12. Fibre Optic Transmission Medium 36


Introduction 36
Architecture of Fibre 36
Classification 37
Advantages of Fibre Optics 37

13. Introduction to Dense Wavelength Division 38


Multiplexing

14. IT Projects Of BSNL 40

- Conclusion 41
- Bibliography and References 42

pg. 6 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

1.
INTRODUCTION TO BSNL

Bharat Sanchar Nigam Limited (abbreviated BSNL) is an Indian state-owned


telecommunications company headquartered in New Delhi. It was incorporated on
15 September 2000 and assumed the business of providing telecom services and
network management from the erstwhile Central Government Departments of
Telecom Services (DTS) and Telecom Operations (DTO) as of 1 October 2000 on a
going-concern basis. It is the largest provider of fixed telephony and broadband
services with more than 60% market share, and is the fifth largest mobile telephony
provider in India. However, in recent years, the company's revenues and market share
have plummeted resulting in heavy losses as a result of intense competition in the
Indian telecommunications sector. BSNL is India's oldest communication service
provider and had a customer base of 93.29 million as of June 2015. It has footprints
throughout India, except for Mumbai and New Delhi, where telecommunications are
managed by Mahanagar Telephone Nigam Limited (MTNL).

1.1 HOW BSNL CAME IN TELECOM MARKET:

The initial phase of telecom reforms began in 1984 with the creation of Center for
Department of Telematics (C-DOT) for developing indigenous technologies and
private manufacturing of customer premise equipment. Soon after, the Mahanagar
Telephone Nigam Limited (MTNL) and Videsh Sanchar Nigam Limited (VSNL)
were set up in 1986.The Telecom Commission was established in 1989. A crucial
aspect of the institutional reform of the Indian telecom sector was setting up of an
independent regulatory body in 1997 – the Telecom Regulatory Authority of India
(TRAI), to assure investors that the sector would be regulated in a balanced and fair
manner. In 2000, DoT corporatized its services wing and created Bharat Sanchar
Nigam Limited.

1.2 INSTITUTIONAL FRAMEWORK:

It is defined as the system of formal laws, regulations, and procedures, and informal
conventions, customs, and norms, that broaden, mold, and restrain socio-economic
activity and behavior. The country has been divided into units called Circles, Metro
Districts, Secondary Switching Areas (SSA), Long Distance Charging Area (LDCA)
and Short Distance Charging Area (SDCA).

In India, DoT is the nodal agency for taking care of telecom sector on behalf of
government.
Its basic functions are:

pg. 7 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

 Policy Formulation
 Review of performance
 Licensing
 Wireless spectrum management
 Administrative monitoring of PSUs
 Research & Development
 Standardization/Validation of Equipment

1.3 BSNL CONTRIBUTION TO DEVELOPMENT OF TELECOM:

Bharat Sanchar Nigam Limited was formed in year 2000 and took over the service
Providers role from DOT. BSNL’s roadmap for providing customer with access to the
latest telecommunications services without losing sight of universal service access has
been by way of utilizing optimally the existing infrastructure and accelerating
advances in technological component by innovative absorption.

1.4 SERVICES:

BSNL Mobile is a major provider of GSM cellular mobile services under the brand
name Cellone. BSNL provides a complete telecom services solution to enterprise
customers including MPLS, P2P and Internet leased lines. It provides fixedline
services and landline using CDMA technology and its own extensive optical fiber
network. BSNL provides Internet access services through dial-up connections as
prepaid, NetOne as Postpaid and DataOne as BSNL Broadband.
BSNL offers value-added services such as Free Phone Service (FPH), India
Telephone Card (Prepaid card), Account Card Calling (ACC), Virtual Private
Network (VPN), Tele-voting, Premium Rate Service (PRM) and Universal Access
Number (UAN). BSNL also offers the IPTV which enables customers to watch
television through the Internet and Voice and Video Over Internet Protocol (VVoIP).
In 2007, BSNL announced plans to provide 5 million broadband connections and
secured 80% of the INR 25 billion rural telephony project of the Government of India.
On 20 March 2009, BSNL launched blackberry services across India. BSNL paid Rs.
101.87 billion for 3G spectrum in 2010. As of 2011, BSNL offered coverage in over
800 cities across India. BSNL launched in 2012 a 3G wireless pocket-sized router
called Winknet Mf50. BSNL 3G provides HSPA+ service with a top speed of 21.1
Mbit/s downlink and 5.76 Mbit/s uplink.
After providing it for 160 years, BSNL discontinued its telegraph service on 15 July
2013. It began delivering telegrams to the public in February 1855; this service was
upgraded to a web-based messaging system in 2010 and had been offered through 182
telegraph offices across India.
Bharat Sanchar Nigam Limited, a Public Sector Enterprise, also provides fiber plans
for the home, which are generally known as BSNL FTTH broadband service. This is
the fastest broadband service provided by BSNL, offering speeds up to 100Mbit/s to
home-based Internet users.
According to a Telecom Regulatory Authority of India Report dated 19 Feb 2016, at
the end of 2015, BSNL's 14.54% share of the broadband market placed it 4th in

pg. 8 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

market share. As a wireless provider, it ranked 6th with an 8.16% share of that
market.
BSNL launched linguistic email service using the DATAMAIL app in eight Indian
languages. The DATAMAIL app is powered with XgenPlus ] email technology
provided by Data Xgen Technologies. On 8 June 2017 BSNL signed a memorandum
of understanding (MoU) with the Universal Service Obligation Fund (USOF) to have
25,000 Wi-Fi hotspots in rural exchanges within the next six months.

1.5 ACHIEVEMENTS OF BSNL:

 BSNL has a customer base of over 10 crore and is the fourth largest integrated
telecom operator in the country.

 BSNL is the market leader in Broadband, landline and national transmission


network.

 BSNL is also the only operator covering over 5 lakh village with telecom
connectivity.

 Area of operation of BSNL is all India except Delhi & Mumbai.

pg. 9 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

2.

WORKING OF BASIC TELECOMMUNICATION NETWORK

This section includes brief introduction of how a call is processed when we dial a call
from basic telephone to another basic telephone or from basic to mobile or vice versa.

2.1 CALL SETUP:

 When a subscriber calls to another subscriber first its request goes to the nearest
switching centre that is PSTN (Public Switching Telecommunication Network).
Then it processes the caller and subscriber’s number if it exists in the same BSC
then call setup is completed.
 If subscriber is not in the same BSC (Base Switching Centre) then call transfer to
MSC (Main Switching Centre) then it transfers the call to prior BSC then call
setup is completed.
 If Caller calls to a mobile subscriber then call transfer is done by MTSO now call
transfer is done on BTSs (Base Transceiver Station) and call setup is completed.

FIG 2.1 HOW LINE REACHES FROM SUBSCRIBER TO EXCHANGE

pg. 10 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

2.2 FUNCTION OF EXCHANGE:

 Exchange of information with subscriber lines with other exchange. This is done
by two type of signaling:
1. Inchannel signaling
2. Common channel signaling
 Processing of signaling information and controlling the operation of signaling
network.
 Charging and billing.

2.3 AUTOMATIC ELECTRONIC EXCHANGE:

ABOUT THE AUTOMATIC EXCHANGE


All telephone subscribers are served by automatic exchanges, which perform the
functions the human operator. The number being dialed is stored and then passed to
the exchange's central computer, which in turns operates the switching to complete
the call or routes it a higher level switch for further processing. Today's automatic
exchanges uses a pair of computers, one running the program that provides services
and the second monitoring the operation of the first, ready to take over in a few
seconds in the event of equipment failure.
Various exchanges present in BSNL are:
C-DOT
E-l0 B
OCB 283 (Exchange & TAX)
EWSD (Exchange & TAX)
All exchange has some purposes and some basic structural units, which are:
1. Subscriber's connection unit
2. Switching network (CX)
3 .Control unit
4. OMC (Operational &maintenance Control)
For smooth working of an exchange following unit are very important-
1. Computer Unit: - it deals with additional services of the exchange to the customers
with the help of computers.
2. Power Plant:- to feed proper power supply to exchange Plant: - to maintain the
continuous temperature + or - 2 degree Celsius to the digital switch (exchange).

pg. 11 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

3. MDF: - to connect switch (exchange) with the external environment (subscriber)


i.e. it is the interface between subscribers and exchange.

COMPUTER UNIT
As the name specified it is the main part of the exchange that deals with the all
services provided by the exchange to the customers with the help of computer. It also
provides the updated data to all other part of exchange. The customers are using the
services of the exchange by using the internet also gets connected to the main server
present this room via an internet room. It mainly consists of the servers that are
providing the different services. The main servers of this room are:
1. IVRS is used for the change number services provided by the exchange.
2. CERS are provided by the exchange to avoid the problems that the users are
facing the repairing of telephone. In this system when the user enters it’s complained
it gets directly entered to the server and user is allotted with an id number.
3. LOCAL DIRECTORY ENQUIRY is another services provided by the
exchange, by using this subscribers calls the particular number and gets the directory
enquiry. The server present in the main computer room provides this service.
4. INTERNET DIRECTORY ENQUIRY is the latest service by the exchange. In
this type of service makes it enquiry using the internet, which gets connected to the
main server at the internet room in the exchange and further to the main server in the
computer room.

2.4 CARRIER ROOM:

Leased line connectivity is provided in carrier room. This room has two parts:
1. Conventional leased line system
2. MLLN

2.5 CONVENTIONAL LEASED LINE SYSTEM:


 It consists of modems and routers that are provided by the company requesting for
that network.
 Connectivity of different ATM, banks etc. is provided by BSNL here.
 For this, we have 4 modems (2 in Exchange, 1 at sender and 1 at receiver)
 Modems are used for short distances i.e. trans and receive part are received here
and local lead connection is given to the subscriber.
 Local lead faults can be handled here but the trans and receive faults can be
handled by the department meant for it.

pg. 12 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

 Accept 64Kbps or 2 Mbps.


 For long distance communication we have MUXS and data is sent through optical
fibers. MUXS are present at both the ends.

2.6 MANAGED LEASED LINE NETWORK:


 No open wiring.
 Route can be changed by the computer software
 In FAIZABAD MainExchange, we have 3 VMUX of type II.

2.7 MDF(MAIN DISTRIBUTION FRAME):


M.D.F. is a media between switching network and subscriber’s line. It is a termination
point within the local telephone exchange where exchange equipment and
terminations of local loops are connected by jumper wires.

FIG 2.2 MDF


(REF- 4)

2.7.1 PARTS OF THE MDF


HORIZONTAL SIDE:
It is again subdivided in to two parts:
I. Exchange side
ii. Line side
Description of the horizontal side:-
RACK: - On the rack, the tags are situated. One rack is having eight tags. The
courting is done from up (0) to down (7).
TAG: - Each rack consists of eight tags.
1 tag = 4 core

pg. 13 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

1 core = 4 bunch
1 bunch = 2 lines
N.E.:- The word NE stands for the ‘NUMBER OF EQUIPMENT’.
It is a 128 pair cable. The EWSD and MDF connected by NE.
WEDGE:-If we want to disconnect any two numbers then we insert a wedge between
subscriber side and exchange side. Here wedge works as insulator made of plastic.

VERTICAL SIDE:
The vertical aside connected to the underground cable. This cable is having 100
pairs. These pair is distributed when we allot the telephone number to the subscriber.
Vertical side is again subdivided in two parts:
One part is connected with the horizontal side and another with the subscriber line by
underground cable. This is how the present day telephone system works. Different
exchanges have different architectures of switching call routing and other features.

2.7.2 FUNCTIONS OF MDF:

 All cable copper wires supplying services through user telephone lines are
terminated and distributed through MDF.
 The most common kind of large MDF is a long steel rack accessible from both
sides. Each jumper is a twisted wire.
 It consists of local connection and broadband connection frames for the main
Exchange area.
 The MDF usually holds central office protective devices including heat coils and
functions as a test point between a line and the office.
 It provides testing of calls.
 It checks whether fault is indoor or external.
 All lines terminate individually.

2.8 POWER PLANT:

 It provides -48V to the switch rooms and 48V to the connections.


 Batteries: - These are the instant sources of the power as soon as power is gone
off.
 UPS (Uninterrupted Power Supply):- The UPS must give supply to the
computer. As we know there is some equipment which can withstand any type
of power supply, but there are also some instruments which cannot withstand
with this type of power.

pg. 14 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

 Charging- Discharging Unit: - The batteries we are using in the power room
need timely charging. As soon as the AC power supply is on, we make use of
the charging unit present in the power room. The slowly charging of the
batteries is known as the trickle charging. But sometimes we need the
BOOSTER charging. In this type of charging we take of the batteries from the
load and charge separately, until it gets fully. The main work of the discharging
unit is to control the discharging of the batteries.
 Inverter and Converter Unit: - the main use of this system is to change AC
mains to DC.
 Engine Room:- we know that the batteries are the instant source of supply but
we cannot use it for much larger time, thus for this, we have an engine to
generate the power supply. They are of 885 KVA. Thus, this room controls the
supply of the engine.
 There is earth region too for protection.

2.9 CENTRAL AIR CONDITIONER


 For the function of electrical equipment, cooling system is basic requirement.
 It provides the thermal stability so that the temperature does not reach the
tolerance.
 It saves equipment from dust so to avoid malfunction of equipment’s.
 It protects equipment from excess humidity which can caused rusting of
equipment. The basic unit of measurement used in the industry is known as
“ton of refrigeration” (TR) which is equivalent to the heat extracted in 24
hours.
 The compressor is the heart of the AC system and the costliest. It increases
the pressure and temperature of the refrigerant gas coming from the
evaporator coils by compressing it. Compressor comes in various types. The
most widely used is simple reciprocal type a cylinder and piston arrangement.
For capacity more than 120 TR, centrifugal compressors are used. The
condenser liquefies the refrigerant gas by a heat exchange process. The
capillary tube or the expansion valve pressurizes liquid refrigerant. The
refrigerant then passes through the evaporator coils, which extract heat out of
the ambience.

pg. 15 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

3.

LEASED LINES

3.1 INTRODUCTION:

A leased line (dedicated line) is a permanent fiber optic or telephone connection


between two points set up by a telecommunications carrier. They can be used for
telephone, data, or Internet services. Businesses use a leased line to connect to
geographically distant offices because it guarantees bandwidth for network traffic. For
example, a bank may use a leased line in order to easily transfer financial information
from one office to another. Customers generally pay a flat monthly rate for the service
depending on the distance between the two points. Leased lines do not have telephone
numbers. The information sent through the leased line travels along dedicated secure
channels, eliminating the congestion that occurs in shared networks.

3.2 DRAWBACKS OF TRADITIONAL LEASED LINE CIRCUITS:

1. Limited range of services - Only Plain Leased Line Service, Data cards
support only up to 64 kbps, no support for N x 64 Kbps.
2. From Operator point of view in case of Leased Line Circuit different boxes
from different vendors so difficult to manage & control.
3. No Centralized Monitoring or alarm or performance monitoring.

The solution to this is MLLN.

3.3 MLLN ( MANAGED LEASED LINE NETWORK ):

The MLLN service is specially designed mainly for having effective control and
monitoring on the leased line so that the down time is minimized and the circuit
efficiency is increased. This mainly deals with data circuits ranging from 64 Kbps to
2048 Kbps.

3.3.1 MLLN FEATURES:

1. MLLN is an integrated, fully managed, multi service digital network platform


through which service provider can offer a wide range of service at an optimal
cost to business subscriber.
2. Using NMS, MLLN can provide high speed Leased Line with improved QoS,
high availability & reliability.
3. Except for connecting the local lead to the MODEM all operations &
maintenance is carried out through ROT (Remote Operating Terminal).

pg. 16 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

4. NMS supports service provisioning, Network optimization, planning & service


monitering.
5. System offers end to end circuit creation and modification, circuit loop testing &
fault isolation, automatic rerouting of traffic in case of trunk failure, software
programmability of NTU etc.
6. Banking, Financial institution, Stock market, paper industry, broadcasting &
Internet service Provider are the main customers for MLLN.

3.3.2 MLLN ADVANTAGES:


1. 24 hrs Performance Monitoring of the circuit.
2. Circuit fault reports generated proactively.
3. On Demand the Bandwidth can be increased.
4. Low lead time for new circuit provisioning.
5. Protection against the failure of the circuit through recovery Management
process either automatic or manually.
6. Long drive on single copper pair.( for 64 kbps – 7 kms & for 2mbps – 3.5 kms)
7. Centrally managed from ROT connected to the NMS.

3.3.3 APPLICATION OF MLLN:


1. Corporate high speed internet access through Broadband.
2. LAN interconnection.
3. Hotline connectivity for voice.
4. Point to point connection for data circuit.
5. Point to multipoint connection.

pg. 17 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

4.

CORPORATE NETWORK
4.1 INTRODUCTION:

A corporate network (CN) is a closed and private computer network that affords
secure communications between geographically dispersed LANs of an enterprise.

Traditional networks An ideal network


 Informal  Formal
 Socially oriented  Business oriented
 Had geographical boundaries  International infrastructure &
exposure
 Were expertise specific  Comprehensive expertise
 No access to corporate  Access to substantial corporate
resources resources
 Not self sufficient  self sufficient
 Not self sustainable  Self sustainable
 No corporate governance  Governed by strict values and
policies principles

TABLE 5.1 DIFFERERCES BETWEEN TRADITIONAL AND IDEAL


NETWORKS

The requirement in a Corporate Network is same as ideal network.

4.2 WHY DO BUISNESSES HAVE CORPORATE NETWORK?

A business implements a corporate network to share applications and data between


different computing devices and users in different locations. Unless the application is
web based or database driven, this usually means copying files back and forth
between a network drive and a local computer, where a desktop application is used to
read and/or edit the files.
The increasing need to access corporate data from anywhere has led to changes in the
nature of applications, in current model of corporate network.

A typical corporate network has the following characteristics:


 Many LAN segments.
 More than one network protocol (IP or IPX).
 OSPF-configured areas, if it uses IP.
 Dial-up connectivity for users connecting from home or while traveling.
 Connectivity to external networks.
 Demand-dial connections to branch offices.
 Dedicated circuits to branch offices.

pg. 18 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

 A corporate network typically uses different types of network media. The


different office segments can be on 10-MB Ethernet or Token Ring networks,
but the backbone network used for connecting the different networks and
hosting servers is usually made up of 100-MB Ethernet . Connectivity to
external networks (the Internet) is over leased lines. Connectivity to branch
offices is either over dial-up line or dedicated media (leased lines).

FIG 4.1 CORPORATE NETWORK

4.3 FEATURES OF CORPORATE NETWORK SECURITY:


 Complete bullet-proof protection of the remote computers you have on your
network.
 Executable patches can be easily uploaded to all your remote computers and
executed remotely.
 Easy and intuitive configuration without lots of complicated configuration files.
Everything is configured through the stand-alone GUI interface from any
location where TCP/IP connection to your corporate network can be established.
 You do not need to physically visit your workstations when you need to change
security settings or install patches.
 The remote client service application is bullet-proof. Your users will not be able
to disable, uninstall or delete it.
 All traffic between the server and the clients is encrypted. All local files are
encrypted as well.
 The server service application and the remote client service application work as
NT services under Windows NT/2000/XP and higher therefore they will keep
working in the logoff mode.

pg. 19 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

5.

WI-FI (WIRELESS FIDELITY)


5.1 WI-FI NETWORK:

A Wi-Fi network provides the features and benefits of traditional LAN technologies
such as Ethernet and Token Ring without the limitations of wires or cables. It
provides the final few meters of connectivity between a wired network and the mobile
user. WIFI is a wireless LAN Technology to deliver wireless broad band speeds up to
54 Mbps to Laptops, PCs, PDAs, dual mode Wi-Fi enabled phones etc.

5.2 WORKING OF WI-FI NETWORK:

In a typical Wi-Fi configuration, a transmitter/receiver (transceiver) device, called the


Access Point (AP), connects to the wired network from a fixed location using
standard cabling. A wireless Access Point combines router and bridging functions, it
bridges network traffic, usually from Ethernet to the airwaves, where it routes to
computers with wireless adapters. The AP can reside at any node of the wired
network and acts as a gateway for wireless data to be routed onto the wired network.
It supports only 10 to 30 mobile devices per Access Point (AP) depending on the
network traffic. Like a cellular system, the Wi-Fi is capable of roaming from the AP
and re-connecting to the network through another AP. Like a cellular phone system,
the wireless LAN is capable of roaming from the AP and re-connecting to the network
through other APs residing at other points on the wired network. This can allow the
wired LAN to be extended to cover a much larger area than the existing coverage by
the use of multiple APs such as in a campus environment. It may be used as a
standalone network anywhere to link multiple computers together without having to
build or extend a wired network.

FIG 5.1WI-FI NETWORK

pg. 20 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

End users access the Wi-Fi network through Wi-Fi adapters, which are implemented
as cards in desktop computers, or integrated within hand-held computers. Wi-Fi
wireless LAN adapters provide an interface between the client Network Operating
System (NOS) and the airwaves via an antenna.

5.3 BENEFITS OF WI-FI:


Wi-Fi offers the following productivity, conveniences, and cost advantages over
traditional wired networks:
 Mobility: Wi-Fi systems can provide LAN users with access to real-time
information anywhere in their organization.
 Installation Speed and Simplicity: Installing a Wi-Fi system can be fast and easy
and can eliminate the need to pull cable through walls and ceilings.
 Installation Flexibility: Wireless technology allows the network to go where
wire cannot go.
 Reduced Cost-of-Ownership: While the initial investment required for Wi-Fi
hardware can be higher than the cost of wired LAN hardware, overall
installation expenses and life-cycle costs can be significantly lower.
 Scalability: Wi-Fi systems can be configured in a variety of topologies to meet
the needs of specific applications and installations. Configurations are easily
changed and range from peer-to-peer networks suitable for a small number of
users to full infrastructure networks of thousands of users that allows roaming
over a broad area.
 It offers much high speed up to 54 Mbps which is very much greater than other
wireless access technologies like CORDECT, GSM and CDMA.

5.4 LIMITATIONS OF WI-FI:

 Coverage: A single Access Point can cover, at best, a radius of only about 60
meters. For 10 square kms area roughly 650 Access Points are required, where
as CDMA 2000 1xEV-DO requires just 09 sites.

 Roaming: It lacks roaming between different networks hence wide spread


coverage by one service provider is not possible, which is the key to success of
wireless technology.

 Backhaul: Backhaul directly affects data rate service. Wi-Fi real world data
rates are at least half of the their theoretical peak rates due to factors such as
signal strength, interference and radio overhead .Backhaul reduces the
remaining throughput further.

 Interference: Wi-Fi uses unlicensed spectrum, which mean no regulator recourse


against interference. The most popular type of Wi-Fi, ‘802.11’b uses.

pg. 21 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

6.
WIRELESS IN LOCAL LOOPS (WLL)
WLL is a communication system that connects customers to the Public Switch
Telephone Network (PSTN) using radio frequency signals as substitutes of
conventional wires for all part of connection between the subscribers and the
telephone exchange. It works on CDMA technique. The local loop is access part of
telecommunication network i.e. the part between PSTN switch and subscribers. WLL
network application involves uses of radio to replace of the wire link between PSTN
switch and subscriber. The radio technology is able to provide same quality of
services as that provided by the wires line. Application of wireless loop technology
has just been started in the worldwide. There is no standard for this so far. However,
a number of national and international air interface standards for digital cellular
mobile telephone system are available.

TECHNICAL ASPECTS: WLL is based on CDMA technique and is entirely different from
GSM. The system for WLL services can be divided in two following parts-
BSC (Base Switching Centre):- It provides links between BTS &8SM; it consists of
different processors, in BSNL it is of SUN Polaris of LG Company. In lG 1 BSC can have
48 8TS? in computer system.
ADVANTAGES OF WLL: Country wide induction of WLL underway of areas than are
non-feasible for the normal network Helping relieves congestion of connections in
the normal cable / wire based network in urban areas Limited the mobility without
any airtime charges. It has improved signal and reducing the interference Greater
capacity than mobile Provides ease of operation, administration & maintenance at
lower cost.

pg. 22 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

7.

WIMAX
7.1 WIRELESS BROADBAND SERVICES:

There are two fundamentally different types of broadband wireless services. The first
type attempts to provide a set of services similar to that of the traditional fixed-line
broadband but using wireless as the medium of transmission. This type, called fixed
wireless broadband, can be thought of as a competitive alternative to DSL or cable
modem. The second type of broadband wireless, called mobile broadband, offers the
additional functionality of portability, nomadicity and mobility.

WI-MAX is an acronym that stands for World-wide Interoperability for


Microwave Access and this technology is designed to accommodate both fixed and
mobile broadband applications.

7.2 SALIENT FEATURES OF WIMAX:

 OFDM-based physical layer.

 Very high peak data rates.

 Scalable bandwidth and data rate support.

 Adaptive modulation and coding (AMC).

 Link-layer retransmissions.

 Support for TDD and FDD OFDMA.

 Flexible and dynamic per user resource allocation.

 Support for advanced antenna techniques.

 Quality-of-service support.

 Robust security.

 Support for mobility.

 IP-based architecture.

7.3 EVOLUTION OF BROADBAND WIRELESS:

1. NARROWBAND WIRELESS LOCAL-LOOP SYSTEMS: The first application


for which a wireless alternative was developed and deployed was voice telephony.
These systems, called wireless local-loop (WLL). WLL systems based on the digital-

pg. 23 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

enhanced cordless telephony (DECT) and code division multiple access (CDMA)
standards continue to be deployed in these markets. During the same time, several
small start-up companies focused solely on providing Internet-access services using
wireless, antennas to be installed at the customer premises. These early systems
typically offered speeds up to a few hundred kilobits per second. Later evolutions of
license-exempt systems were able to provide higher speeds.

2. FIRST-GENERATION BROADBAND SYSTEMS: As DSL and cable modems


began to be deployed, wireless systems had to evolve to support much higher speeds
to be competitive. Very high speed systems, called local multipoint distribution
systems (LMDS), supporting up to several hundreds of megabits per second, were
developed.
In the late 1990s, one of the more important deployments of wireless broadband
happened in the so-called multi channel multipoint distribution services (MMDS)
band at 2.5GHz. The MMDS band was historically used to provide wireless cable
broadcast video services, especially in rural areas where cable TV services were not
available. The first generations of these fixed broadband wireless solutions were
deployed using the same towers that served wireless cable subscribers. These towers
were typically several hundred feet tall and enabled LOS coverage to distances up to
35 miles, using high-power transmitter.
The advent of satellite TV ruined the wireless cable business, and operators were
looking for alternative ways to use this spectrum. A few operators began to offer one-
way wireless Internet-access service, using telephone line as the return path.

3. SECOND - GENERATION BROADBAND SYSTEMS: Second-generation


broadband wireless systems were able to overcome the LOS issue and to provide
more capacity. This was done through the use of a cellular architecture and
implementation of advanced-signal processing techniques to improve the link and
system performance under multi path conditions. Many solved the NLOS problem by
using such techniques as orthogonal frequency division multiplexing (OFDM), code
division multiple access (CDMA), and multi antenna processing.

4. WIMAX AND OTHER BROADBAND WIRELESS TECHNOLOGIES:


WIMAX is not the only solution for delivering broadband wireless services. WiMAX
occupies a somewhat middle ground between Wi-Fi and 3G technologies when
compared in the key dimensions of data rate, coverage, QoS, mobility, and price.

7.4 WIMAX NETWORK ARCHITECTURE:

The overall network may be logically divided into three parts:

1. Mobile Stations (MS) used by the end user to access the network.
2. The access service network (ASN), which comprises one or more base stations
and one or more ASN gateways that form the radio access network at the edge.
3. Connectivity service network (CSN), which provides IP connectivity and all the
IP core network functions.

pg. 24 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

ASN-ACCESS SERVICES NETWORK


NAP-NETWORK ACCESS PROVIDER
CSN- CORE SERVICES NETWORK
NSP- NETWORK SERVICES PROVIDER
BS- BAS STATION
HA-HOME AGENT
FA-FOREGN AGENT
AAA-AUTHENTICATION AUTHONZATION & ACCOUNTING

FIG 6.1 WIMAX NETWORK ARCHITECTURE

BASE STATION (BS): The BS is responsible for providing the air interface to the
MSS. Additional functions that may be part of the BS are micro mobility management
functions, such as handoff triggering and tunnel establishment, radio resource
management, QoS policy enforcement, traffic classification, DHCP (Dynamic Host
Control Protocol) proxy, key management, session management, and multicast group
management.

ACCESS SERVICE NETWORK GATEWAY (ASN-GW): The ASN gateway


typically acts as a layer 2 traffic aggregation points within an ASN. Additional
functions that may be part of the ASN gateway include intra-ASN location
management and paging, radio resource management and admission control, caching
of subscriber profiles and encryption keys, AAA client functionality, establishment
and management of mobility tunnel with base stations, QoS and policy enforcement,
and foreign agent functionality for mobile IP, and routing to the selected CSN.

CONNECTIVITY SERVICE NETWORK (CSN): The CSN provides connectivity


to the Internet, ASP, other public networks, and corporate networks. The CSN is
owned by the NSP and includes AAA servers that support authentication for the

pg. 25 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

devices, users, and specific services. The CSN also provides per user policy
management of QoS and security. The CSN is also responsible for IP address
management, support for roaming between different NSPs, location management
between ASNs, and mobility and roaming between ASNs, subscriber billing and inter
operator settlement, inter-CSN tunneling to support roaming between different NSPs.

REFERENCE POINTS: The WiMAX NWG defines a reference point as a


conceptual link that connects two groups of functions that reside in different
functional entities of the ASN, CSN or MS. Reference points may not be a physical
interface except when the functional entities on either side of it are implemented on
different physical devices.

Reference point End points Description


R1 MS and CSN Implements the air interface (IEEE
802.16e) specifications.
R2 MS and CSN For authentication, authorization, IP host
configuration management and mobility
management, only a logical interface
between MS and CSN
R3 ASN and CSN Supports AAA, policy enforcement,and
mobility mgmt. capabilities
R4 ASN and ASN A set of protocols originating/terminating
in various entities within the ASN. In
Release I , R4 is the only interoperable
interface between different ASNs or
heterogenous ASNs.
R5 CSN and CSN A set of protocols for interworking
between home and visited network.
R6 BS and ASN-GW A set of control and bearer plane
protocols for communication between BS
and ASN-GW. It may serve as a conduit
for exchange of different MAC states
information between neighboring BSs.
R7 ASN-GW-DP An optional set of control plane protocols
and ASN-GW- for co-ordination between two group of
EP functions identified in R6.
R8 BS and BS A set of control plane message flows and
bearer plane data flows between BSs to
ensure fast and seamless handover.

TABLE 7.1 REFERENCE POINTS

pg. 26 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

8.
INTERNET

The basic function of Internet can be summarized as under-


i. Inter connecting of computers to form a network.
ii. Inter connecting of computers to form a network of networks.
iii. To establish a communication link between two computers within as network.
iv. To provide alternate communication link among the networks, even if one
network is not working. These are based on TCP/IP communications protocol.
Transfer of a file through Internet:-
Suppose a file is to be transmitted on Internet from one computer to other ones
Break the file in to small packets Attached destination and source address in o
packets Multiplexed and transmit these packets At destination de-multiplex the
packets Remove address bits from the packets and assemble the data in to the
original file Make source bits as destination address and send the acknowledgement
in to the source .Therefore, it is clear that network hardware sends the packets to
specified destination and network software reassembles of communications, the
computer network performs the following functions-
i. Addressing and routing
ii. Fragmentation and error correction
iii. Data error checking
iv Connectivity control
v. Multiplexing and de-multiplexing
vi. Data flow control
vii. End users interface etc.
The data handling single module cannot handle the entire process. One that adopted
as a standard is an open system interconnection (OSI) model.

pg. 27 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

OSI NETWORKING MODEL:


The open systems interconnection model defines all the methods and protocols
needed to connect one computer to any other over a network. The OSI model
separates the methods and protocols needed for a network connection in to seven
different layers. Each higher layer relies on services provided by a lower level layer.
The OSI model is sometimes called “the seven layer model”. It was developed by the
International Standards Organization (ISO) in 1983 and is documented as standard
7498.
Layers are:
i. Application layer
ii. Presentation Layer
iii. Session layer
iv. Transport layer
v. Network layer
vi. Data link layer
vii..Physical layer

PHYSICAL LAYER
The physical layer defines the properties of the physical medium used to make a
network connection. It includes a network cable that can transmit a stream of bits
between nodes on the physical network. The physical connection can be either point
to point or multipoint, and it can consist of either half duplex (one direction at a
time) or full duplex (both directions simultaneously) transmissions. Moreover, the
bits can be transmitted either in series or in parallel (most network use a serial
stream of bits, but the standard allows for both serial and parallel transmission). The
specification for the physical layer also defines the cable used, the voltages carried
on the cable, the timing of the electrical signals, the distance that can be run, and so
on. For example, a NIC network interface network) is part of the physical layer.

DATA LINK LAYER


The data link layer, layer 2, defines standard that assign meaning to the bits carried
by the physical layer. It establishes a reliable protocol through the physical layer, so

pg. 28 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

the network layer (layer 3) can transmit its data. The data link layer typically includes
error detection and correction to ensure a reliable data stream. The data elements
carried by the data link layer are called frames. Examples of frame types include x.25
and 802.x (802.x includes both Ethernet and Token Ring networks). The data link
layer is usually subdivided in to two sub layers, called the Logical link control (LLC)
and Media Access Control (MAC) sub layers. The LLC sub layer performs tasks such as
call set up and termination and data transfer. The MAC sub layer handles frame
assembly and disassembly, error detection and correction, and addressing. The two
most common MAC protocols are 802.3 Ethernet and 802.5 Token ring.

NETWORK LAYER:
The network layer, Layer-3, is where a lot of action goes on for most networks. The
network layer defines how data packets get from one point to another on network.
The Network layer is also known as packet layer, it defines different packet.

TRANSPORT LAYER
Layer protocols include Transmission Control Protocol (TCP) and Sequenced Packet
Exchange (The Transport Layer, layer-4, manages the flow of information from one
network node to another. It identifies each computer or node on a network
uniquely. It ensures that the packets are decoded in the proper sequence and that all
packets are received. Transports).

SESSION LAYER
The session layer, layer-5, defines the connection from a user to a network server,
or from a peer on a network to another peer. These virtual connections are referred
to as sessions. They include negotiation between the client and the host, or peer and
peer, on matters of flow and control, transaction- processing, transfer of user
information, and authentication.

pg. 29 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

PRESENTATION LAYER:

The presentation layer, layer-6, takes the data supplied by the lower level layer and
transform so it can be presented to the system. The Presentation layer can include
data compression and decompression as well as data encryption and decryption.

APPLICATION LAYER:
The Application layer, layer 7, controls how the operating system and its application
interact with network. As mentioned earlier, data flows from an application program
or the operating system, and then goes through the protocols and devices that make
up the seven layers of the OSI model one by one until the data arrives at the physical
layer and is transmitted over the network connection. The computer at the receiving
end reverses this process. At each stage of the OSI model, the data is “wrapped”
with new control information related to the work done at the particular layer. This
control information is different for each layer, but it includes headers. Therefore, for
example, when the data goes into the networking software and components making
up the OSI model, it starts at the application layer and includes an application header
and application data. Next, at the presentation layer, a presentation header is
wrapped around the data and it is passed to the session layer, where a session
header is wrapped around all the data, and so on, until it reaches the physical layer.
At the receiving computer this process is reversed.

pg. 30 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

9.

MOBILE 2G/3G
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) 2G

In wireless communication every region is divided into cells. Cell size is constant for
whole system. GSM is a form of multiplexing, which divides the available bandwidth
among the different channels. Most of the times the multiplexing used is either TDM
(Time division multiplexing) or FDM (Frequency Division Multiplexing). SM differs
from its predecessor technologies in that both signaling and speech channels are
digital, and thus GSM is considered a second generation (2G) mobile phone system.

FIG 8.1
9.1 MAIN FEATURES OF GSM:

 Support for voice and data services


 Better frequency efficiency, smaller cells and more customers per cell
 High audio quality and reliability for wireless, uninterrupted phone calls at higher
speeds (e.g. from cars, trains) i.e. high transmission quality.
 Authentication via chip-card and PIN.
 Worldwide connectivity.

9.2 GSM SUBSYSTEMS:

 RADIO SUBSYSTEM (RSS)


 NETWORK AND SWITCHING SUBSYSTEM (NSS)

9.2.1 RADIO SUBSYSTEM:

MOBILE STATION (MS):


A mobile unit is a transmitter as well as receiver too. It has a SIM (Subscriber Identity
Module) which gives a unique identity of a subscriber. Every mobile unit has a unique
IMIE (International Mobile Equipment Identity) number.

pg. 31 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

BASE TRANSCEIVER STATION (BTS):


 A base transceiver station or cell site (BTS) is a piece of equipment that facilitates
wireless communication between user equipment (UE) and a network.
 It encodes, encrypts, modulates and feeds the RF signal to antenna.
 It produces time and frequency synchronization signals.
 It does power control and frequency hopping too.

BASE STATION CONTROLLER (BSC):


 Its main work is to control several transceivers.
 Switching between BTSs
 Managing of network resources
 Mapping of radio channels

9.2.2 NETWORK AND SWITCHING SUBSYSTEM:

This subsystem does mainly switching, mobility management, interconnection to


other networks, system control.

COMPONENTS:

1. MOBILE SERVICES SWITCHING CENTRE (MSC):

It controls all connections via a separated network to/from a mobile terminal within
the domain of the MSC – several BSC can belong to a MSC.

2. DATABASES:

Home Location Register (HLR):


Central master database containing user data, permanent and semi-permanent data of
all subscribers assigned to the HLR (one provider can have several HLRs).

Visitor Location Register (VLR):


Local database for a subset of user data, including data about all user currently in the
domain of the VLR.

8.2.3FUNCTION OF MAIN SWITCHING CENTER (MSC):

 Manages communication between GSM and other network (PSTN, Data


Network and GPRS).
 Call setup basic switching, call handling.
 Location register
 Billing for subscriber

9.3 FEATURES OF GSM:

 GSM is already used worldwide with over 450 million subscribers.

pg. 32 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

 International roaming permits subscribers to use one phone throughout Western


Europe. CDMA will work in Asia, but not France, Germany, the U.K. and other
popular European destinations.
 GSM is mature, having started in the mid-80s. This maturity means a more stable
network with robust features. CDMA is still building its network.
 The availability of Subscriber Identity Modules, which are smart cards that
provide secure data encryption give GSM m-commerce advantages.

THIRD GENERATION 3G TECHNOLOGIES: -


Third generation (3G) networks were conceived from the Universal Mobile
Telecommunications Service (UMTS) concept for high speed networks for enabling a
variety of data intensive applications. 3G systems consist of the two main standards,
CDMA 2000 and W-COMA, as well as other 3G variants such as NIT DoCoMo’s
Freedom of Mobile Multimedia Access (FOMA) and Time Division Synchronous
Code Division Multiple Access (TD-SCDMA) used primarily in China.
DATA SPEED
The data speed of 3G is determined based on a combination of factors including the
chip rate, channel structure, power control, and synchronization.
An example of calculating the theoretical data speed is as follows: -
W-CDMA assigned code 400-500 Kbps/code. 6 codes X 400 >2Mbps (UMTS target
for 3G data speed in fixed location)
Actual data speeds will vary in accordance with several factors including:
 Number of users in cell/sector
 Distance of user from cell
 User is moving or stationary
 Network operator capacity' and network optimization requirements

pg. 33 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

10.

GENERAL PACKET RADIO SERVICE (GPRS)


General packet radio service (GPRS) is a packet oriented mobile data service
available to users of the 2G cellular communication systems, global system for mobile
communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides
data rates of 56-114 kbps. It provides moderate speed data transfer, by using unused
time division multiple access (TDMA) channels.

Its supported protocols are Internet Protocol (IP), Point to Point Protocol (PPP) and
X.25.

GPRS data transfer is typically charged per megabyte of traffic transferred, while data
communication via traditional circuit switching is billed per minute of connection
time, independent of whether the user actually is using the capacity or is in an idle
state. GPRS is a best effort packet switched service, as opposed to circuit switching,
where a certain Quality of service (QoS) is guaranteed during the connection for non-
mobile users.

GPRS extends the GSM circuit switched data capabilities and makes the following
services possible:

 “ Always on” Internet access


 Multimedia messaging service (MMS)
 Push to talk over cellular (PoC/PTT)
 Instant messaging and presence – wireless village
 Internet applications for smart devices through wireless application protocol
(WAP)
 Point to Point (P2P) service: inter-networking with the internet (IP).
 Increase message sending speed 30 messages per minute approximately.

pg. 34 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

11.

CODE DIVISION MULTIPLE ACCESS (CDMA)


Code Division Multiple Access (CDMA) consistently provides better capacity for
voice and data communications that other commercial mobile technologies, allowing
more subscribers to connect at any given time, and it is the common platform on
which 3G technologies are built.
CDMA is a spread spectrum technology, allowing many users to occupy the same
time and frequency allocations in a given band/space. As it name implies, CDMA
assigns unique codes to each communication to differentiate it from others in the
same spectrum resources, CDMA enables many more people to share the airwaves at
the same time than do alternative technologies.

11.1 ADVANTAGES OF CDMA:

 Increased cellular communications security.


 Simultaneous conversations
 Increased efficiency, meaning that the carrier can serve more subscribers.
 Smaller phones
 Low power requirements and little cell-to-cell coordination needed by
operators.
 Extended reach-beneficial to rural users situated far from cells.

11.2 DISADVANTAGES OF CDMA:

 Due to its proprietary nature, all of CDMA’s flaws are not known to the
engineering community.
 CDMA is relatively new, and the network is not as mature as GSM.
 CDMA cannot offer international roaming, a large GSM advantage.

11.3 DIFFERENCE BETWEEN CDMA AND GSM:

 The GSM stands for global system for mobile communication and CDMA for
code division multiple accesses.
 GSM is a form of multiplexing, which divides the available bandwidth among
the different channels. Most of the times the multiplexing used are either TDM
(Time Division Multiplexing) or FDM (Frequency Division Multiplexing). On
the other hand CDMA is a type of multiple access scheme (which means
allotting the given bandwidth to multiple users) and makes use of spread
spectrum technique which is essentially increasing the size of spectrum.
 In CDMA each user is provided a unique code and all the conversations
between 2 users are coded. This provides a greater level of security to CDMA
users than the GSM ones.

pg. 35 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

12.

FIBER OPTIC TRANSMISSION SYSTEM


12.1 INTRODUCTION:
Optical Fiber is new medium, in which information (voice, Data or Video) is
transmitted through a glass or plastic fiber, in the form of light, following the
transmission sequence give below:
(1) Information is encoded into Electrical Signals.
(2) Electrical Signals are converted into light Signals.
(3) Light Travels down the Fiber.
(4) A Detector Changes the Light Signals into Electrical Signals.
(5) Electrical Signals are decoded into Information.

FIG 12.1 OPTICAL FIBER TRANSMISSION

12.2 ARCHITECTURE OF FIBER:

The optical fiber has two concentric layers called the core and the cladding. The inner
core is the light carrying part. The surrounding cladding provides the difference
refractive index that allows total internal reflection of light through the core. The
index of the cladding is less than 1%, lower than that of the core. Most fibers have an
additional coating around the cladding. This buffer coating is a shock absorber and
has no optical properties affecting the propagation of light within the fiber.

pg. 36 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

Jacket Jacket

Cladding
Core

Cladding (n2) Cladding

Core (n2) Jacket


Light at less than Angle of Angle of
critical angle is
incidence reflection
absorbed in jacket
Light is propagated by
total internal reflection

FIG 12.2 PROPAGATION OF LIGHT THROUGH FIBRE

12.3 CLASSIFICATION:
There are three types of fibers:
(I) Multimode Step Index fiber (Step Index fiber)
(II) Multimode graded Index fiber (Graded Index fiber)
(III) Single- Mode Step Index fiber (Single Mode fiber)

(I) STEP-INDEX MULTIMODE FIBER: It has a large core, up to 100 microns in


diameter. As a result, some of the light rays that make up the digital pulse may travel
a direct route, whereas others zigzag as they bounce off the cladding. This type of
fiber is best suited for transmission over short distances, in an endoscope, for instance.
(II) GRADED-INDEX MULTIMODE FIBER: It contains a core in which the
refractive index diminishes gradually from the center axis out toward the cladding.
The higher refractive index at the center makes the light rays moving down the axis
advance more slowly than those near the cladding. A digital pulse suffers less
dispersion.
(III) SINGLE-MODE FIBER: It has a narrow core (eight microns or less), and the
index of refraction between the core and the cladding changes less than it does for
multimode fibers. Light thus travels parallel to the axis, creating little pulse
dispersion. Telephone and cable television networks install millions of kilometers of
this fiber every year.

12.4 ADVANTAGES OF FIBRE OPTICS:


• SPEED: Fiber optic networks operate at high speeds - up into the gigabits.
• BANDWIDTH: large carrying capacity.
• DISTANCE: Signals can be transmitted further without needing to be refreshed or
strengthened.
• RESISTANCE: Greater resistance to electromagnetic noise such as radios, motors or
other nearby cables.
• MAINTENANCE: Fiber optic cables costs much less to maintain.

pg. 37 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

13.

Advanced Optical Networks: DWDM


(DENSE WAVELENGTH DIVISION MULTIPLEXING)

INTRODUCTION
The revolution in high bandwidth applications and the explosive growth of the Internet,
however, have created capacity demands that exceed traditional TDM limits. To meet
growing demands for bandwidth, a technology called Dense Wavelength Division
Multiplexing (DWDM) has been developed that multiplies the capacity of a single fiber.
DWDM systems being deployed today can increase a single fiber’s capacity sixteen fold,
to a throughput of 40 Gb/s. The emergence of DWDM is one of the most recent and
important phenomena in the development of fiber optic transmission technology. Dense
wavelength-division multiplexing (DWDM) revolutionized transmission technology by
increasing the capacity signal of embedded fiber.
One of the major issues in the networking industry today is tremendous
demand for more and more bandwidth. Before the introduction of optical networks, the
reduced availability of fibers became a big problem for the network providers. However,
with the development of optical networks and the use of Dense Wavelength Division
Multiplexing (DWDM) technology, a new and probably, a very crucial milestone is being
reached in network evolution. The existing SONET/SDH network architecture is best
suited for voice traffic rather than today’s high-speed data traffic. To upgrade the system
to handle this kind of traffic is very expensive and hence the need for the development of
an intelligent all-optical network. Such a network will bring intelligence and scalability to
the optical domain by combining the intelligence and functional capability of
SONET/SDH, the tremendous bandwidth of DWDM and innovative networking software
to spawn a variety of optical transport, switching and management related products.In
traditional optical fiber networks, information is transmitted through optical fiber by a
single light beam. In a wavelength division multiplexing (WDM) network, the vast
optical bandwidth of a fiber (approximately 30 THz corresponding to the low-loss region
in a single mode optical fiber) is carved up into wavelength channels, each of which
carries a data stream individually.
The multiple channels of information (each having a different carrier
wavelength) are transmitted simultaneously over a single fiber. The reason why this can
be done is that optical beams with different wavelengths propagate without interfering
with one another. When the number of wavelength channels is above 20 in a WDM
system, it is generally referred to as Dense WDM or DWDM.
DWDM technology can be applied to different areas in the
telecommunication networks, which includes the backbone networks, the residential
access networks, and also the Local Area Networks (LANs). Among these three areas,
developments in the DWDM-based backbone network are leading the way, followed by
the DWDM-based LANs.

pg. 38 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

DEVELOPMENT OF DWDM TECHNOLOGY

Early WDM began in the late 1980s using the two widely spaced wavelengths in
the 1310 nm and 1550 nm (or 850 nm and 1310 nm) regions, sometimes called wideband
WDM. The early 1990s saw a second generation of WDM, sometimes called narrowband
WDM, in which two to eight channels were used. These channels interval of about 400
GHz in the 1550-nm window. By the mid-1990s, dense WDM (DWDM) systems were
emerging with 16 to 40 channels and spacing from 100 to 200 GHz. By the late 1990s
DWDM

systems had evolved to the point where they were capable of 64 to 160 parallel channels,
densely packed at 50 or even 25 GHz intervals. As fig. 1 shows, the progression of the
technology can be seen as an increase in the number of wavelengths accompanied by a
decrease in the spacing of the wavelengths. Along with increased density of wavelengths,
systems also advanced in their flexibility of configuration, through add-drop functions,
and management capabilities.

pg. 39 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

14.

IT PROJECTS OF BSNL

IT Projects of BSNL are;


 CDR
 ERP
 SancharSoft

CDR:
Call Detail Record based Customer Care and Convergent Billing System

CDR is used for CRM (Consumer Relation Management), IM & OM ( using


CLAITY), PMS (Payment Management System) and Billing Management.

ERP:
Enterprise Resource Planning which is migration towards paperless working.
There are too many vendors which offer ERP solution to organizations but BSNL
uses SAP ERP for its ERP Project.
Different tasks can be done using different modules in SAP ERP. ie
 FICO(Financial Management & Control)
 HCM ( Human Capital Management)
 MM (Material Management)
 SD (Sales and Distribution)
 PM (Plant Maintenance)
 EP (Enterprise Portal) etc.

SANCHARSOFT:
SanscharSoft is developed by BSNL itself to keep and manage postpaid and
prepaid mobile costumers records.
SanscharSoft is a web based centralized System which can be accessed through
secure VPN Broadband Connection using Login Credentials.
All mobile costumer’s CAF, Activation, Bills etc. are managed in SancharSoft.

pg. 40 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

CONCLUSION
Engineering student will have to serve in the public and private sector industries and
workshop based training and teaching in classroom has its own limitation. The lack of
expo sure to real life, material express and functioning of industrial organization is the
measure hindrance in the student employment.

In the open economy era of fast modernization and tough competition, technical
industries should procedure pass out as near to job function as possible.

Practical training is one of the major steps in this direction. I did my training from
BSNL, Bharatpur which is one of the best known communication service provider
companies of India. The training helps me in gaining in depth knowledge of the
working of telephone exchange, various technologies of BSNL –GSM, GPRS,
WIMAX, Wi-Fi, MLLN and optical fiber transmission.

In the end, I hereby conclude that I have successfully completed my industrial training
on the above topics.

pg. 41 Submitted By: Arpit Moriya


Summer Training Report 8/31/2017 11:13:06 AM

BIBLIOGRAPHY AND REFERENCES


(I) BIBLIOGRAPHY:

1. Data Communication And Networking- Behrouz A. Foruzan


2. Wireless Communication and Networks-William Stallings
3. Computer Networking – Kurose & Ross

(II) REFERENCES:

4. www.bsnl.co.in
5. Wkipedia.org

6. Linkedin SlideShare

pg. 42 Submitted By: Arpit Moriya

You might also like