Professional Documents
Culture Documents
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
1
CHAPTER ONE
Introduction
2
1.1 Introduction
Work experience is any experience that a person gains while working in a specific field or
occupation, but the expression is widely used to mean a type of volunteer work that is commonly
intended for young people often students to get a feel for professional working environments. work
experience is often offered between the second and final years of an undergraduate degree course,
especially in the science, engineering and computing fields. Courses of this nature are often called
sandwich courses, with the work experience year itself known as the sandwich year. During this
time, the students on work placement have the opportunity to use the skills and knowledge gained
in their four years, and see how they are applied to real world problems. This offers them useful
insights for their final year and prepares them for the job market once their course has finished.
Some companies sponsor students in their final year at university with the promise of a job at the
end of the course. This is an incentive for the student to perform well during the placement as it
helps with two otherwise unwelcome stresses the lack of money in the final year, and finding a job
when the University course ends.
Practical training is an essential part of a degree from a university of applied sciences. For
the student, practical training is goal-oriented and diverse work that develops competence in
relation to the professional field and working life. Practical training offers students opportunities
to participate in recognizing and analyzing the development needs of the field. Practical training
helps develop a professional identity and for students to learn the key work tasks in one’s own
field, using various work tools and methods, evaluating one’s own learning and development needs,
combine theory and practice, general working-life and creating working-life contacts and network.
In this training courses are going to show the knowledge that we gain from to field study at PTC
and in Sabafone company
3
Public Telecom Corporation in Sana'a was fully merged with Authority of Telecom in Aden to
become (PTC) Public Telecom. Corporation, which is responsible on providing all Telecom.
Services and implementation of telecom projects in all Yemeni governorates.
PTC is considered as one of the most important service providers and successful leader in
Yemen, according to many surveys (questionnaires and public opinion) that conducted by a many
official and civil organization, including SABA news agency and September 26 newspaper. PTC
has been awarded the first and second position for best corporations in terms of Excellency in
providing services to the public through the years 2004 and 2005.
SABAFON, Yemen Company for Mobile Telephony started its commercial operations in February
2001. SABAFON consists of five main partners. Together they combine forces in SABAFON to
provide customers with the highest quality of GSM mobile services with cutting – edge technology.
Since the launch of SABAFON, in February 2001, it has set up the largest GSM cellular network,
which covers 68% of Yemen's population. SABAFON, since its start of operations has provided
coverage to major cities, towns, major highways and remote areas of Yemen. Today, the goal is to
improve the quality of network in the existing areas and provide coverage to new cities and towns.
Training Field is going to achieve the requirement of the Work Experience in block three fourth
year.
2. To use the skills and knowledge gained in their four years, and see how they are applied to real
world problems.
4
1.5. Training Limitations
1.5.1. Time Limitation
5
CHAPTER 2
Literature Review
6
2.1 Introduction
This chapter is containing the background theory of the Training and pilot study.
7
5- Master clock in SDH network
6- SDH Network Topology
7- Components of SDH Equipment
8- SDH Protection Technologies
9- Advantage of SDH
8
2- Benefits of NGN.
3- NGN elements.
4- Principle of NGN.
5- Characteristics of NGN in contrast with TDM.
6- NGN Technology Operation.
7- How does PSTN work with the NGN
8- Services of NGN Technology
9
2.7 Operation and Maintenance Subsystem (OMS) in SABAFON, Yemen Company
10
CHAPTER 3
Project Methodology
11
3.1 Introduction
This chapter contains the plan of procedures that are going to achieve the objectives. To give a
detailed explanation to show the steps which was followed to carry out the study such as Training
plan, framework, branch study, time table.
The plan of the Training is shown in the following table (1). It explains the components of each
chapter.
Table (2) table shows the objectives of each chapter, actions, tools of collecting data, and final
results.
12
Table (2) Shows Executing Table Training`
It explains the period, which the Research is going to take as shown in the following table.
Table (3) shows the time table of Training
13
CHAPTER 4
14
4.1 Introduction
This chapter is going to analyze the data collected from the training field, which aim to know the
OMC and GSM Network in SABAFON Yemen Company for Mobile Telephony also, the
microwave transmission at the PTC, central and optical transmission. Furthermore, how to use
various work tools and methods of OMS and network also, the microwave transmission at the PTC,
central and optical transmission. Finally, analyze and recognize the key work tasks in one’s own
field.
The data will be analyzed from the knowledge that have gained with the engineers in SABAFON,
Yemen Company for Mobile Telephony and PTC. Which it contains six reports to know how to
use various work tools and methods of OMS and network also, the microwave transmission at the
PTC, central and optical transmission.
15
Work Experience
Report 1
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
16
Title: Training in Public Telecommunication Corporation, at Operating and
Maintenance General Department.
17
4.2. Microwave Transmission
1. Introduction
PTC is considered as one of the most important service providers and successful leader in
Yemen, according to many surveys (questionnaires and public opinion) that conducted by a many
official and civil organization, including SABA news agency and September 26 newspaper. PTC
has been awarded the first and second position for best corporations in terms of Excellency in
providing services to the public through the years 2004 and 2005.
2. Definition of Microwave
Microwave is a kind of electromagnetic wave. The frequency range of microwave is 300 MHz to
300 GHz. But in microwave communication, the frequency range is generally from 3 GHz to 30
GHz. accordingly, the wavelength is between 1 decimeter and 1 centimeter, so microwave is also
called “centimeter wave”. According to the characteristics of microwave propagation, microwave
can be considered as plane wave. The plane wave has no electric field and magnetic field
longitudinal components along the propagation direction. The electric field and magnetic field
components are vertical to the propagation direction.
18
3. Applications of Digital Microwave
- Emergency communications
- Satellite.
7GHz / 8GHz / 11GHz / 13GHz / 15GHz / 18GHz / 23GHz /26GHz / 32GHz / 38GHz Every
frequency band is identified by its central frequency, for example, the central frequency of the 7
GHz frequency band is 7575 MHz. The rough principle of microwave band application is that low-
band microwave is usually used for large-capacity. But the network sometimes uses the lowest
frequency band. The lower frequency band has the longer wavelength and the stronger diffraction
ability. There are several rules on the use of frequency bands based on practical application
experience.
1- For long haul PDH microwave links (distance between stations is generally longer than 15
km), 8 GHz frequency band is recommended. If the distance between stations is no longer
than 25 km, 11 GHz frequency band can also be used. The specific frequency band shall
be determined based on the local climate conditions and microwave transmission cross-
section.
2- For short haul PDH microwave links (generally used in the access layer and the distance
between stations is shorter than 10 km), 11G / 13G / 14G / 15G / 18G frequency bands are
recommended.
3- For long haul SDH microwave links (distance between stations is generally longer than 15
km), 5G / 6G / 7G / 8G frequency bands are recommended. If the distance between stations
19
is no longer than 20 km, 11 GHz frequency band can also be used. The specific frequency
band shall be determined based on the local climate conditions and microwave
transmission cross-section.
5. RF Channel Configuration
The central frequency indicates the specific frequency band. A frequency band is divided by the
central frequency into low bands and high bands. There is protection spacing between two
frequency bands. It prevents interference between frequency bands. After selecting the microwave
frequency band, RF channels should be configured. In this scheme frequency band are divided into
several smaller sub-bands to provide the spectrum required by the transmitter. These sub-bands
are called as “Channels”. These channels are usually indicated by their center frequencies and
sequence number. To avoid interference between the transmit frequency and the receive frequency;
there must be a certain spacing between them. This spacing is called “Transmit/receive spacing”.
The transmit frequency and the receive frequency always come in pairs, one in a low band and the
other in a high band.
The central frequency indicates the specific frequency band. A frequency band is divided
by the central frequency into low bands and high bands. There is protection spacing between two
frequency bands. It prevents interference between frequency bands. After selecting the microwave
frequency band, RF channels should be configured. In this scheme frequency band are divided into
several smaller sub-bands to provide the spectrum required by the transmitter. These sub-bands
are called as “Channels”. These channels are usually indicated by their center frequencies and
sequence number. To avoid interference between the transmit frequency and the receive frequency;
there must be a certain spacing between them. This spacing is called “Transmit/receive spacing”.
The transmit frequency and the receive frequency always come in pairs, one in a low band and the
other in a high band.
The baseband signal cannot be directly transmitted over microwave radio channels but must be
converted into frequency band signal in order to implement microwave transmission. Generally,
the digital baseband signal is the service signal to be transmitted. After the digital baseband signal
20
is modulated into the IF signal, it still cannot be directly transmitted over the air link but must be
converted once more into the signal of a higher frequency.
By the parameters used to modulate the carrier signal with the digital baseband signal, there
can be various modulation methods
1- ASK (Amplitude Shift Keying): Use the digital baseband signal to change the carrier
amplitude.
2- FSK (Frequency Shift Keying): Use the digital baseband signal to change the carrier
frequency.
3- PSK (Phase Shift Keying): Use the digital baseband signal to change the carrier phase.
4- QAM (Quadrature Amplitude Modulation): Use the digital baseband signal to change
the carrier phase and amplitude.
8. Antenna Installation
There many techniques to setup the microwave antenna but most useful way is to start identify the
north and the turn left of right as deal with the one of is in the other side to be line of sight and also
by sitting the elevation angle of the antenna as need to be line of sight.
21
Figure 4.2.1 Setting the antenna using north angle
9. Microwave Polarization
There are two type of polarization that could be setup the antenna to transmission over the
microwave link.
22
- Vertical polarization
- Horizontal polarization
23
10. Software Installation
To configure the microwave site it should be connected to the indoor microwave remotely or
ethernet as shown in this figure. 10. Software Installation To configure the microwave site it should
be connected to the indoor microwave remotely or ethernet as shown in this figure.
If the configuration is remotely the far site should be configure first and then the near sit
then configures. First step:
- Then go configuration choose link configuration. After that selecting the modulation mode.
24
Figure 4.2.6 Setting the modulation``
- The microwave spectrum has larger bandwidth and hence large amount of information can be
transmitted using it.
- Microwave communication is used since earlier days as one of the Line of Sight Communication
in hilly remote areas where other means of wired communication is not possible to be installed.
- As we know lumped components such as resistors, inductors and capacitors do not have same
characteristics at microwave frequencies as they have at lower frequencies. Hence it is difficult to
implement these components at microwave frequencies.
2- Our knowledge was not good because most of information was new about us we have not
studied before.
1- Engineers were helpful with as and work hard to help us in our training.
Report 2
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
27
Title: Training in Public Telecommunication Corporation, at Operating and
Maintenance General Department.
28
4.3. Optical Transmission (SDH)
Synchronous Digital Hierarchy is transmission system (protocol) for high speed and high capacity
optical communication system which defines the frame structure, multiplexing method, digital
rates hierarchy and interface code pattern.
2. SDH Work
The bit rate level SDH signal (base signal) is 155.520Mb/s which is known as "synchronous
transport module -1" (STM-the bit rate of STM-1 find from this equation:-
The one frame can be sent in 125μs so, in one second it send 8000 frame. And each frame contains
of on array and the array contains of 9 rows and 270 columns which means that in each frame it
contains 2430 byte.
𝐵𝑅=8000𝐹𝑟𝑎𝑚𝑒⁄𝑠 ×2430𝑏𝑦𝑡𝑒⁄𝐹𝑟𝑎𝑚𝑒×8𝑏𝑖𝑡⁄𝑏𝑦𝑡𝑒=155.52𝑀𝑏𝑝𝑠
29
Table 4.3.1. SDH Levels
So, if you need the second STM bit rate you have to multiple of basic STM-1 by 4.
Higher level signals are obtained by “byte interleaved multiplexing” low level signal.
Digital signal in all the network element in a SDH network are controlled by a master clock. The
signal is clock aligned to each-other, which is why they are called synchronous.
A. Chain Network
In a chain network, all nodes are connected one after another on a line with both ends open.
Chain network is used along railway lines, highways, power supply lines, etc.
B. Star Network
In a star network there is a central node to which the other nodes are directly connected. There are
no direct links between other nodes.
- Advantages: Advantage of the Tree Networks are similar to those of Chain and Star
Networks.
- Disadvantages: Not suitable for bidirectional traffics.
31
C. Ring Network
Ring network is such a structure in which all nodes are connected one after another to form a circle.
D. Mesh Network
Mesh network is such a structure in which many nodes are interconnected together via direct links.
- Regenerators (REG)
32
Figure 4.3.5 Components of SDH Equipment
TM is used in the terminal station of the network.TM has only one line port (optical interface).the
line port of the TM is always considered as the western side (W) port. Its function is to multiplexer
or de- multiplexer the lower-rate tributary signals to or from the higher-rate STM-N line signal.
ADM is used in the transfer stations (intermediate nodes) of the network, the most important
(network element -NE) type. It has tow line ports and we classify them into western side (W) and
eastern side (E) ports. The function of ADM is to multiplexer or de-multiplexer the lower-rate
tributary signals to or from STM-N line signal at both W and E ports. In addition, it can Cross-
connect STM-N line signals between two line ports.
33
Figure 4.3.7. Add and Drop Multiplexer
Regenerators has only two line ports and has no tributary ports. There are two kinds of regenerators:
Optical regenerators and Electrical regenerators. Optical regenerators serves mainly as an
amplifier of the optical power to increase optical transmission distance. Electrical regenerators is
used to avoid the accumulation of line noise through optical/electrical conversion, electrical signal
sampling, Judging, regenerating and reforming, electrical/ optical conversion.
DXC the answer is Digital cross connection is a multi-port device which is used to cross connection
STM-N signals. It can cross connection STM-N signals from m input lines to n output lines (m ≥
n).
34
Figure 4.3.8 Digital cross connection
A. Line Protection
Three schemes are common for protection in line channels: one-plus-one, one-to-one, and one-to-
many:
1- One-Plus-One: In this scheme, there are normally two lines: one working line and one
protection line. Both lines are active all the time. The sending multiplexer sends the same
data on both lines; the receiver multiplexer monitors the line and chooses the one with the
better quality. If one of the lines fails, it loses its signal, and, of course, the other line is
selected at the receiver. Although the failure recovery for this scheme is instantaneous, the
scheme is inefficient because two times the bandwidth is required.
2- One-to-One: In this scheme, which looks like the one-plus-one scheme, there is also one
working line and one protection line. However, the data are normally sent on the working
line until it fails. At this time, the receiver, using the reverse channel, informs the sender
to use the protection line instead. Obviously, the failure recovery is slower than that of the
one-plus-scheme, but this scheme is more efficient because the protection line can be used
for data transfer when it is not used to replace the working line.
3- One-to-Many: This scheme is similar to the one-to-one scheme except that there is only
one protection line for many working lines. When a failure occurs in one of the working
lines, the protection line takes control until the failed line is repaired. It is not as secure as
the one-to-one scheme because if more than one working line fails at the same time, the
protection line can replace only one of them.
35
Figure 4.3.9 Line protection
B. Ring Protection
SDH rings can be used in either a unidirectional or a bidirectional configuration. In each case, we
can add extra rings to make the network self-healing, capable of self-recovery from line failure.
1- Unidirectional Path Switching Ring (UPSR): is a unidirectional network with two rings:
one ring used as the working ring and the other as the protection ring. The idea is similar
to the one-plus-one APS scheme we discussed in a linear network. The same signal flows
through both rings, one clockwise and the other counterclockwise. A node receives two
copies of the electrical signals at the path layer, compares them, and chooses the one with
the better quality. If part of a ring between two ADMs fails, the other ring still can
guarantee the continuation of data flow. UPSR, like the one-plus-one scheme, has fast
failure recovery, but it is not efficient because we need to have two rings that do the job of
one. Half of the bandwidth is wasted.
2- Bidirectional Line Switching Ring (BLSR): In BLSR, communication is bidirectional,
which means that we need two rings for working lines. We also need two rings for
protection lines. This means BLSR uses four rings. The operation, however, is similar to
the one-to-one APS scheme. If a working ring in one direction between two nodes fails,
the receiving node can use the reverse ring to inform the upstream node in the failed
direction to use the protection ring.
36
C. Sub-Network Connection Protection (SNCP)
SNCP uses the 1+1 protection mode. Traffics are simultaneously sent on both the working and
protection sub-network connection. When the working sub-network connection fails, or when its
performance deteriorates to a certain level, at the receiving end of the sub-network connection, the
signal from the protection sub-network connection is selected according to the preference selection
rule. Switching usually takes the unidirectional switching mode, thus it needs no APS protocol.
To define a world standardization: it uses a unique worldwide hierarchy and it supports very high
bit rates (155/622/... Mb/s).
- The researchers did not have knowledge about the SDH technique.
- Transport cost.
37
Work Experience
Report 3
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
38
Title: Training in Public Telecommunication Corporation, at Operating and
Maintenance General Department.
39
4.3. Telephone Traffic.
1. Telephone Network
The telephone network has traditionally been build up as a hierarchical system. The individual
subscribers are connected to a subscriber switch or sometimes a local exchange (LEX). This part
of the network is called the access network. The subscriber switch is connected to a specific main
local exchange which again is connected to a transit exchange (T EX) of which there usually is at
least one for each area code. The transit exchanges are normally connected into a mesh structure.
Figure 3.1 shows the type of telephone network. These connections between the transit exchanges
are called the hierarchical transit network. There exist furthermore connections between two local
exchanges (or subscriber switches) belonging to different transit exchanges (local exchanges) if
the traffic demand is sufficient to justify it.
Here are three basic structures of networks: mesh, star and ring. Mesh networks are applicable
when there are few large exchanges (upper part of the hierarchy, also named polygon network), w
here as star networks are proper when there are many small exchanges (lower part of the hierarchy).
Ring networks are app lied for example in fibre optical systems. A connection between two
subscribers in different transit areas will normally pas s the following exchanges:
USER → L E X → TE X → T E X → LEX → U S ER
The individual transit trunk groups are base d on either analogue or digital transmission
systems, and multiplexing equipment is often used. Twelve analogue channels of 3 kHz each make
up one first order bearer frequency system (frequency multiplex), while 32 digital channels of 64
Kbps each make up a first order PCM - system of 2.048 M bps (pulse-co de-multiplexing, time
40
multiplexing). The 64 Kbps are obtained from a sampling of the analogue signal at a rate of 8 kHz
and an amplitude accuracy of 8 bit. Two of the 32 channels in a PCM system are used for signalling
and control.
Figure 4.3.2. In a telecommunication network all exchanges are typically arranged in a three level
hierarchy.
Local exchanges or subscriber exchanges (L), to which the subscribers are connected, are
connected to main exchanges (T), which again are connected to inter-urban exchanges (I). An
inter-urban area thus makes up a star network. The inter-urban an exchanges are interconnected in
a mesh network. In practice the two network structures are mixed, because direct trunk groups are
established between any two exchanges, when there is sufficient traffic.
Due to reliability and security there will almost always exist at least two disjoint paths
between any two exchanges and the strategy will be to use the cheapes t connections first The
hierarchy in the Danish digital network is reduced to two levels only. The upper level with transit
exchanges consists of a fully connected meshed network while the local exchanges and subscriber
switches are connected to two or three different transit exchanges due to security and reliability.
2. Telephone Traffic
Telephone traffic is primarily composed of the calls originated by subscribers and, by definition,
is measured by the product of the number of calls passing over the group of circuits, or trunks,
under consideration and their average duration.
41
There is no named unit for this aspect of telephone traffic, the numerical value obtained
merely has the dimensions of calls and time, e.g. 6 call minutes or 0.l call hours. The number of
trunks provided between any two points must however, be sufficient to handle the average number
of simultaneous calls which will be in progress during the busiest time of the day. For planning
purposes, therefor& it is desirable to have a measure of telephone traffic which gives directly the
average number of simultaneous calls in progress at any specified time. This pamphlet shows how
such a unit is derived and used in conjunction with Erlang’s formula to determine the number of
trunks required to handle a given amount of traffic. Only groups of trunks working under full
availability conditions are considered. Full availability means that all sources have access to all
the trunks in the group, and in practice such a condition does not always exist.
- Traffic Intensity, A represents the average traffic density (occupancy) during any one hour period.
- Occupancy is any use of a traffic resource regardless of whether or not a connection (call) is
completed.
- Occupancy is the probability of finding the trunk busy is equal to the proportion of time for which
the trunk is busy.
The average number of simultaneous calls in progress during a period is known as the traffic flow,
or intensity, and is measured directly in units known as Erlang’s. It should be noted that originally
the. Erlang’s was known as the Erlang’s unit' or 'T.U. The unit can be derived from observations
of calls and their duration over a specified period, and provides directly the following information:
42
The traffic flow, a erlangs, during a period of time T, can be determined from observations of the
number of calls C, and their average duration t, when T and t are expressed in the same units, as
follows:-
By definition the volume of traffic during the period T is equal to the number of calls C, times
their average duration t Thus:
Volume of traffic = C * T
5. Busy Hour
As we know that the telephone traffic varies from time to time, so any calculations based on the
average will be misleading for the requirements most of the time. To get a reasonable standard of
service, the calculations for the numbers of switching equipment should be based on some
internationally agreed criteria. This internationally agreed criteria, on which all the calculations
are based is the busy hour. The busy hour is defined as a period of sixty consecutive minutes during
which the telephone traffic is the highest. The busy hour varies from exchange to exchange
depending on its location, and community interest of its subscribers.
It is defined as the average number of calls per subscriber during the busy hour.
43
7. Holding Time
This is called holding time because during this time, the switches in the exchange are held busy.
The holding time per call consists of two parts: Operating time, is the time during which the call
is set up and after conversation the switches are released and Conversation time, is the actual time
used by the subscriber in talking. From the subscriber point of view the conversation time is
important while for the telephone administration the total time is of importance because the
switches remain busy until both the subscriber put down their receivers.
- Loss System: In a loss system overload traffic is rejected without being serviced. e.g:
conventional automatic telephone exchange.
- Delay System: In a delay system overload traffic is held in a queue until the facilities become
available to service it. e.g: Operator oriented manual exchange.
44
9. Offered, Carried and Blocked Traffic
- Offered traffic is the traffic intensity that would occur if all traffic submitted to a group of circuits
could be processed.
- Blocked traffic is that portion of traffic that cannot be processed by the group of circuits (offere
traffic minus carried traffic).
- Blocked traffic may be rejected, retried or offered to another group of circuits (overflow).
- Because of random nature of network traffic, fundamentals of probability theory are applied.
- Call Arrivals
- Holding Times
In either case, the traffic load depends on frequency of arrivals and average holding time for each
arrival.
- Measurement of traffic within a network allows a network managers & analysts to both make
day to day decisions about operations and plan for long-term developments.
- These measurements are conducted on a continuous basis and the results compiled into reports
for further network management.
- Traffic measurements are used in many fundamental activities such as calculating traffic intensity
in specific circuit or group, identification of traffic pattern and trends, monitoring services etc.
- Grade of Service is a measure of the probability that a percentage of the offered traffic will be
blocked or delayed.
45
- the ability to interconnect users
For example, if GOS = 0.05, one call in 20 will be blocked during the busiest hour because of
insufficient.
1- Our knowledge was not good because most of information was new about us we have not
studied before.
3- Because the war it was difficult to visit some site with the engineers.
1. Engineers were helpful with as and work hard to help us in our training.
46
Work Experience
Report 4
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
47
Title: Training in Public Telecommunication Corporation, at Operating and
Maintenance General Department.
48
4.4. Next Generation Network (NGN)
1. Introduction of NGN
Next Generation Networking (NGN) is a broad term to describe some key architectural evolutions
in telecommunication core and access networks. The general idea behind NGN is that one network
transports all information and services (voice, data, and all sorts of media such as video) by
encapsulating these into packets, like it is on the Internet. NGNs are commonly built around the
Internet Protocol, and therefore the term "all-IP" is also sometimes used to describe the
transformation toward NGN.
The reason behind using NGN technology is that the cooperation always tries to provide
the new services to the subscribers in contrasting with the progressing of wireless services.
49
2. Benefits of NGN:
The advantages of NGN can be divided into two families, each defined by the industry player who
profits from these advantages. For equipment providers, the NGN creates a new source of revenues
generated by the expansion of the equipment providers offering and by increasing the number of
customers. The Next Generation Network has many advantages or benefits; we will list some of
them as follows.
1- Federating network The NGN will enable an operator to offer telephone services and data
services on a single telephone network. This backbone network is based on packet
switching. This technique allows the bandwidth to be used flexibly unlike circuit switching
in which a user has a fixed 64 Kbit/s rate, regardless of his real requirement, packet
switching means that the user can be afforded the rate, and therefore bandwidth, that is best
suited to his needs and according to the resources available in the network. Additionally,
these networks adapt automatically to congestion problems.
2- Open interfaces The telecommunications market is becoming more and more open to
competition. The conventional economic model based solely on two players, the operator
and the customers, has been overturned. These days, a distinction is drawn between the
customer and the access provider, carrier operator and service provider. The latter three of
these interact to offer the customer the service with the required quality. Each, located on
an NGN layer, needs to be able to use the open interfaces between the layers to choose the
best provider.
3- Independent layers Restructuring networks into independent layers is a way of allowing
the equipment of a particular layer to be upgraded without needing to modify the equipment
of the layer above or below. This can be seen as a measure of flexibility in network and
service evolution.
4- Software update Centralizing call control in the Media Gateway Controller (MGC) units is
a way of minimizing the cost of upgrading network control software.
5- Services The convergence of voice and data on the same network is a way of expanding
the raft of services, which is translated into an increase in sources of income. The NGN
services include the traditional fixed and mobile telephone services such as intelligent
50
network services, Internet services like the WEB and email and multimedia services like
video telephony and video on demand.
3. NGN Elements:
1- Media Gateways (MGWs) Gateways are used on the border between the packet switched
IP networks and the circuit switched PSTN or between different areas of a packet network.
Additionally, there are some other applications for gateways, for example small residential
gateways to connect single analogue telephones to an IP network.
2- Soft switches (Media Gateway Controllers-MGC) The soft switch is a centralized element
to control calls or data connections. This centralized function may have different names
depending on the used protocol. In an H.323 configuration, it is called a Gatekeeper; in a
SIP environment it is called a SIP Proxy-Server. Some vendors use the term Call Server.
The term Soft switch or Media Gateway Controller is used in case of a node that supports
different protocols.
4. Principle of NGN:
Let's summarize the principles of an NGN. One network is used for all kinds of communication.
There is no separation between Time Division Multiplex ‐ TDM ‐ and data networks. All types of
terminals are supported. This includes the analogue and ISDN telephone on the one hand and the
new IP telephones on the other. The terminals can be connected directly to the network or a wide
variety of media gateways can be used. Softswitches form the heart of the NGN to control all kinds
of calls. Depending on the network and implemented functions, the size, internal structure and
used protocols may differ. With NGN the reuse of resources is possible. Not the whole network
must be replaced. So a network operator can reuse different resources in the access network as
well as in the service and application layer. With NGN, an Interconnection to other networks is
possible. That means that NGN can be placed at first as an overlay to extend the existing network.
51
Later a smooth transition to a complete NGN can be made step by step. The separation of the call
setup and the media transport layer opens new opportunities to reduce operator expenses.
Characteristics that make NGN better than TDM are depicted in the following table.
52
6. NGN Technology Operation
NGN technology operation. NGN is divided into four layers: access layer, network layer, control
layer and service layer. NGN bases on packet switching transmission. Each layer does many
functions and those layers contact with others by using protocols. SIP, H.232, MGWC, and H.242
are the most important protocols in NGN. Figure (4.4) depicts the layers of NGN.
1- Access media Access layer allows end points to connect to the telecommunication network
and can be accessed be any technique such as; (POTS, ISDN, GSM/UMTS, HFC ,LMDS,
ADSL, etc).
2- Network layer Network layer insures the format adaptation of user information coming
from the access layer to be sent onto the control layer. In addition, network layer combines
the MGW equipment. The function of MGW is to adapt user data to the backbone network
based on packet switching using IP.
3- Control layer The MGC that is located in control layer. It is used to handling and control
the MGW control layer. Figure (4.3) depicts the way of communicating between MGC and
MGWs via H.248.
4- Application layer Application layer contains the servers that NGN can provide to the users.
As shown in the figure (4.4). It is open interfaces with interconnection with The control
layer. also, table 6 discusses the most important protocols of NGN switching technology.
53
Figure 4.4.4 NGN Layers
NGN operating system is softswitch Linux and windows server. MG's operating system is
windows server.
1- First solution, Alcatel Company Upgrade: It makes upgrade for the PSTN by replacing the
central switch in every city via MGWs. Then MGWs are connected to the MGCs. There
are twenty-four MGWs and two MGCs. This solution will be stopped in 2018 as it is still
in the primary plan but the PTC cannot execute the project until nowadays. The fault of
this solution is, the network will face problem in accommodating with the new techniques
in the future.
2- Second solution, ZTE Company Softswitch(SS) can be connected to the MGWs by MPLS
such in Al-Tehrair Central. On the other hand SS can be connected directly to the MGWs
as occurred in PTC. The aim of MPLS is to move the packet through transmission network
with minimum delay. Because NGN is fast technology, the MPLS is the suitable technique
solution to work with NGN. Then the MG is the intermediate between the PSTN and the
SS. There are two SS and MGWs. One of the SS and MGW is located in the Sana's PTC
and the another one is in Sana'a A1 as shown in the Figure 6.5. The advantage of this
solution is that supporting the new techniques in the future like IMS and LTE.
54
10. Difficulties and Facilities:
55
Work Experience
Report 5
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
56
Title: Training in SABAFON, Yemen Company for Mobile Telephony.
57
4.5. GSM Network
1. Introduction
SABAFON, Yemen Company for Mobile Telephony started its commercial operations in February
2001. SabaFon consists of five main partners. Together they combine forces in SabaFon to provide
customers with the highest quality of GSM mobile services with cutting – edge technology. Since
the launch of SabaFon, in February 2001, it has set up the largest GSM cellular network, which
covers 68% of Yemen's population. SabaFon, since it's start of operations has provided coverage
to major cities, towns, major highways and remote areas of Yemen. Today, the goal is to improve
the quality of network in the existing areas and provide coverage to new cities and towns.
The GSM (Global System for Mobile) Network has two major subsystems which are:
58
4. The Functions of MS
The mobile station (MS) provides all mobile subscriber operating functions. The MS consists of
mobile equipment (ME) such as a mobile phone or a personal digital assistant (PAD) provided
with a chip card, called a SIM (subscriber identity module). The Mobile Station consists of two
main elements:
6. Function of BTS
The Base Transceiver Station (BTS) comprises the radio transmission and reception equipment,
including the antennas, and the signaling processing specific to the radio interface. BTS is
responsible for the radio supply of a cell. The BTS makes all functions that concern the radio
connection between the network and the mobile station available. The BTSE performs the
following main tasks:
- GSM network use to band of frequency first band for Up is use 890 to 915 and from 935 to
960 for Down, but SABAFON is for up 898.8 to 906.6 (44- 83 number of the frequency) while it
use for down 943.8 to 951.6. the second band that GSM network is that Up 1710–1785 and Down
1805–1880.
59
Figure 4.5.2. The Base Transceiver Station (BTS)
7. Function of BSC
The Base Station Controller (BSC) is responsible for the intelligent section of the BSS. It controls
the resource management, the safeguarding function, and the local O&M (Operation and
Maintenance) functions. The BSC controls several BTS and switches the connections through
transparently. The BSC assigns traffic channel connections from the SSS to the cells (BTSE).
Furthermore, it controls the whole Base Station Subsystem. Note that every BSC contained in the
network controls one Base Station Subsystem. The BSC is divided into two subdivisions: the BSS
central equipment (BCE) and the transcoding and rate adaptation unit (TRAU). The BCE controls
the radio processing like resource management, channel management, call processing, etc. The
TRAU is responsible for the rate adaptation of the 64 kbps channels from the SSS (A-interface) to
the "traffic channel" rate of 16 kbps. BSC Capacity in SBS “Siemens Base Station”.
8. Function of TRAU
The Transcoder and Rate Adaptor Unit (TRAU) is the equipment in which coding and decoding
are carried out as well as rate adaptation. The two main functional units of the TRAU are:
60
The Transcoding and Rate Adaptor Unit (TRAU) provides interfaces to the BSC, MSC and
LMT.Transparent switching through of CCSS7 and OMAL signaling information.
The TRAU interfaces are called: - A interface (to the SSS (MSC)).
The TC transforms the incoming speech information, which is embedded in 64 kbit/s channels,
into transcoded speech information, which is embedded in 16 kbit/s channels. Transcoded speech
is a digital way of speech representation.
Starting with the mobile station with the antenna is electromagnetic wave. After the signal arrive
to the antenna the antenna is connected to the BTS with two cable
- First is called feeder because it is hard to bend easily so they use it outdoor.
- The second cable which called jamper because it bend easily so they use it indoor to connect
the antenna with the BTS.
From the BTS to the microwave they us E1 cable which hold 32time slut and they can connect to
BSC using line of sight microwave.
61
11. Function of MSC
The MSC is responsible for the through connection of the "call path", it assumes the call processing
function between BSS, other MSCs, PLMN and wire line subscribers MSC as "combined
switching center". The Mobile Services Switching Center (MSC) is responsible for establishing
traffic channel connections:
- To the BSS.
- To other MSC.
A gateway is a node interconnecting two networks. The GMSC is the interface between the mobile
cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a
GSM user. The GMSC is often implemented in the same machines as the MSC.
The database of a MSC contains information for the routing of traffic channel connections
and handling of the basic and supplementary services. The MSC also performs administration of
cells and location areas.
Numerous tasks performed by the MSC in the GSM/DCS- PLMN network are similar to
the ones performed by an exchange in the telephone network. The subscriber administration,
however, differs.
Home Location Register (HLR) that administers the subscriber's data of an area covering either a
whole PLMN or only parts of it.
The HLR is a database where the mobile subscribers are created, deleted, released and barred by
the operator. It contains all permanent subscriber identities, as well as the services (and
corresponding restrictions) that a mobile subscriber is authorized to use.
A great part of the HLR subscriber data is required for connection setup and clear down.
To ensure that this data is immediately available for a call, the information is temporarily stored
62
in a further database, which is closest to the mobile subscriber's location. This type of database is
called Visitor Location Register (VLR) and is associated with the MSC.
The "home location register" is the unit in which the subscriber is resident. the subscriber
is administratively managed here, and information regarding the current location of the subscriber
is found here. This means that the address of the visited VLR is entered in the HLR for every
"location registration" and interrogated there upon every call to a mobile subscriber (mobile
terminating call) of the corresponding network.
The Visitor Location Register (VLR) contains the relevant data of all mobile subscribers currently
located in the service area of a MSC. The permanent data are the same as the data found in the
HLR. Locating the data in the VLR, as well as in the HLR, reduces the data traffic to the HLR
because it is not necessary to ask for this data every time it is needed.
If a mobile station is located in its own MSC, it still uses the two different registers, even
though the VLR seems redundant. The consistency simplifies the procedures. The data of the
subscribers located in the area of the MSC belonging to the VLR are stored in the VLR. During a
"location registration" the subscriber data from the "home location register" are requested and
stored in the VLR until the subscriber changes location areas, is manually deleted, or is deleted by
an occupancy level dependent, scheduled automatism. In other words, during a location update
(when the subscriber moves to a different VLR service area), the new (current) VLR requests
subscriber data from the HLR and the subscriber data are passed from the HLR to the current VLR.
The data is stored for as long as the mobile subscriber moves around in the area associated with
this VLR. The VLR provides the subscriber data whenever it is needed for handling a call. If a
subscriber moves to another VLR service area, a location update takes place again: the new VLR
requests subscriber data from the HLR responsible for the mobile subscriber.
15. Function of AC
The authentication center AC is responsible for mobile traffic security. The authentication center
makes parameters available which are transmitted to the visited MSC and there are used for the
authentication test on the one hand and for encipherment on the other. The purpose of the
authentication is to protect the network against unauthorized users. The authentication feature
63
ensures that the user (mobile subscriber) is who he claims to be. Subscriber authentication is
performed at each registration and at each call set-up attempt (mobile originating or terminating).
If a mobile subscriber wants to access the network, the VLR verifies whether its SIM card is
approved via the authentication procedure. For this procedure, the VLR uses authentication
parameters, called triples that are generated continuously for each subscriber by the Authentication
Center (AC). The triples consist of RAND (Random Number), SRES (Signed Response) and Kc
(Cipher Key).
The Equipment Identification Register (EIR) is a database that stores the International Mobile
Equipment Identity (IMEI) numbers for all registered Mobile Equipment (ME). The IMEI
uniquely identifies all registered ME. There is generally one EIR per PLMN. It interfaces to the
various HLRs in the PLMN. Every mobile device contains a worldwide unambiguous
identification number which contains data such as country of vendor, vendor device number, etc.
For instance, in order to make the further application of a stolen device impossible, the device
numbers are entered in the EIR. Upon various actions of the mobile subscriber (example
originating traffic (mobile originating call)), this device number is sent to the EIR and checked
whether it has been entered in one of several lists of suspicious devices. If this is the case, the
service claim of the subscriber can be rejected and, depending on the case, information is sent to
the operator. In the EIR, the IMEI of the whole mobile equipment used are categorized into three
lists.
The GIWU corresponds to an interface to various networks for data communications. During these
communications, the transmission of speech and data can be alternated.
Starting with the mobile station with the antenna is electromagnetic wave. After the signal arrive
to the antenna the antenna is connected to the BTS with two cable
- First is called feeder because it is hard to bend easily so they use it outdoor.
64
- The second cable which called jamper because it bend easily so they use it indoor to connect
the antenna with the BTS.
From the BTS to the microwave they us E1 cable which hold 32time slut and they can connect to
BSC using line of sight microwave and the BSC is connected to MSC. However if the BTS is in
the place of BSC there is no need for microwave.
4. Transport cost.
3) Getting help from Eng.Shoghi Al-Faqih by contact with the support engineer Ali AL-Aqwaa.
65
Work Experience
Report 6
Prepared by
Ibrahim Taha
Ahmed Alhammadi
Hussam Alhaj
Hamza Farouk
Suhail Ahmed
Hesham Rawas
Supervised by
66
Title: Training in SABAFON, Yemen Company for Mobile Telephony.
67
4.6. Operation and Maintenance Subsystem (OMS) in SABAFON Company.
The Operation and Maintenance Subsystem (OMS) is a monitor and control the GSM system,
which connected to the different components of the SSS and to the BSC, in addition, charge of
controlling the traffic load of the BSS. NMC and OMC of a certain defined geographical area form
the third subsystem, the Operation and Maintenance Subsystem OMS.
The Operation and Maintenance Center (OMC) is the functional entity, through which the Network
Operator can monitor and control the Base Station Subsystem (BSS) entities and the Switching
Subsystem (SSS) entities. It performs the network element management functions.
The GSM network is monitored and controlled from a central point. This is the Operation and
Maintenance Center (OMC).
1. The Fault Management system analyses alarms from the BSS elements. When faults occur, they
are eliminated when necessary via software command or in situ by technicians.
68
2. The Configuration Management function installs the software when new BSS network elements
are implemented, manages hardware inventory lists, and changes operation parameters, for
example for radio frequencies of a BTS.
3. The Software Management system feeds in new software or updates and manages the software
inventory lists.
The Network Management Center (NMC) assumes special functions in the context of OMS which
are not defined in the GSM standard but are based on definitions of the International
Standardization Organization (ISO), and on recommendations of the International
Telecommunication Union (ITU).
- The service quality is monitored, for example the Dropped Call Rate in percent. Depending on
the network operator, the NMC functions are carried out in a centralized or decentralized way in
the geographical areas.
69
4. The Functions of OMC.
The OMC centralizes all the operation and maintenance functions of a telecommunication network.
It collects all data about alarms, traffic, maintenance and configuration.
- Produces reports.
- Define the base station in air by using database from the radio department. This is the main
task of the OMC.
- Acquisition and acknowledgement of the events, coming from the network elements.
5. Components of OMC
- OMC-BSS (OMC-B) which contains the functionality to control and supervise BSS.
- Web interface.
70
The supported functionalities are database access, command line interface (CLI), graphical user
interface (GUI) for fault management, performance management and configuration management.
The RC also provides a CORBA-based interface to allow external offline applications to be
integrated.
- Microwave equipment.
It supports standardized interfaces for remote SQL database access, remote UNIX login and
remote CLI access.
The operation and maintenance terminal (OMT) is, as already mentioned, connected via an LAN
interface to the OMP. The OMTs have access to the individual network entities of either the BSS
or the SSS via the OMP. The OMT has a graphic window surface for entering operation &
maintenance commands to the individual network entities or soliciting database states of the
network entity, for instance. For displaying alarms in the individual network entities, the OMT
also has an alarm text and graphic window.
The OMC-B Operators interact with the system on the video terminal of a color graphical
workstation, which functionally constitutes the OMT. In the OMC, the Operation & Maintenance
Terminals (OMT) for the entry of operation and maintenance commands are interconnected via a
71
Local Area Network (LAN). The interface to the X.25 Packet Switched Public Data Network
(PSPDN) is the Operation & Maintenance Processor (OMP).
The operation and maintenance processor is on the one hand connected via an X.25 interface to
the BSS or SSS. On the other hand, the OMP makes an LAN interface (10 base 2) available, to
which the corresponding operating and maintenance terminals (OMT) are connected. The OMP is
responsible for the transfer (routing) of information to the corresponding input devices (OMTs)
and in the reverse direction to the corresponding network elements of the SSS and BSS. The OMP
can also assume the function of an OMT.
The switch commander includes the SC servers, which are commercial computers (Windows NT
servers). In addition to their O&M functions (central management of the SSS network elements),
they handle the communication with the SSS network elements via TCP/IP or X.25 based networks.
The SC is a highly scalable system and can be configured from a small expansion unit up to a large
telecommunication management system and operations system (TMN-OS) for many network
elements. The smallest configuration possible is a single workplace system. In a 100 Mbit/s LAN
the SC can have up to 40 communication servers and 300 clients.
O&M functions (central management of the SSS network elements), they handle communication
with the SSS network elements via TCP/IP based networks. The SC is a highly scalable system
and can be configured from a small expansion unit up to a large TMN-OS for many network
elements. In a 100 Mbit/s LAN the SC can have up to 40 communication servers and 300 clients.
The CTs are commercial computers (Windows-NT PCs). They provide the man-machine interface
between the operator and the SC server, and with the network elements of the SSS. This interface
is implemented with the functions of a graphical user interface (GUI). The OMC is linked to the
SSS and BSC network elements via an X.25 packet data network.
72
14. Difficulties and Facilities
3) Transport cost.
The goals of the work experience gain have been archived which was:
2- To use the skills and knowledge gained in their four years, and see how they are applied to real
world problems.
73
Chapter 5
74
5.1 Introduction
This chapter contains the difficulties and facilities that are faced during the training. It includes the
Academic difficulties and facilities. Also, field difficulties and facilities.
5.2 Difficulties
2. Our knowledge was not good because most of information was new about us we have not studied
before.
4. The Researchers Did Not Have Knowledge About The OMS in GSM Network.
1. Facing difficult in getting the permission to enter the Public Telecommunication Corporation.
3. Because the war it was difficult to visit some site with the engineers.
5. Facing difficult in getting the permission to enter the SABAFON, Yemen Company for Mobile
Telephony.
6. Transport cost.
75
5.3 Facilities
1. Engineers were helpful with as and work hard to help us in our training.
Attachment
76