Professional Documents
Culture Documents
Mr. K K Yadav
Industry Trainer and Teacher
Advanced Level Telecom Training Centre (BSNL),
Rajnagar, Ghaziabad,
U.P. India
Submitted by:
Divya Mehra
20BCM020
Institute of Technology,
Nirma University,
Ahmedabad
TABLE OF CONTENTS
● Preface
● Acknowledgement
● Integrated Telecom
● Technologies utilized in IT
○ Media of communication
○ Devices used in Telecom
○ Types of Cables
● Computer Networking
○ Comparison between traditional network and current
network systems
○ Telephone Numbers
○ IP Address
○ Network Elements
● Types of Networks
○ Wide Area Network (WAN)
○ Local Area Network (LAN)
■ Server Room (AAA Principle of working)
○ OSI Layer Model
○ Routing
○ DHP and DNS
○ Introduction to VOIP, ACL and VLAN/VP
● Conclusion
1
PREFACE
2
ACKNOWLEDGEMENT
3
Integrated Telecom
4
Technologies utilized in IT
Media of communication
Different types of media are utilized for communication purposes. All
have their pros and cons, making them fit for different purposes.
2.smart devices: Smart devices are electronic devices that have the
features of intelligent devices but in addition, they can also be connected
to the internet. For e.g., Smart TVs, Fridges etc.
5
4.Router: A network device that routes traffic from one sub network to
another.
Types of Cables
CROSSOVER CABLE: When you connect two devices of the same type
together, you use a crossover cable
6
FIG: Internal structure of different types of cable
7
Live Telecom Network Topology (LT-NT)
2. MDF Room
The Main Distribution Frame (MDF) room serves as the
demarcation point location for the building. It is a room that
contains the wires of each and every customer.
3. Power Plant
In a place such as a telephone exchange, continuous power supply
is a mandatory requirement for all machinery to operate. Thus the
purpose of a power plant is to ensure uninterrupted power supply.
Its standard power supply is -48 Volt DC supply.
Types of calls
References :
MDF - MDF Room
S/w - Switch Room
Tx - Telephone Exchange
1. Local call
Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w > MDF >
Cabinet > Pillar > DP > LJU > Phone2
Copper alloyed with Cd is used for telephone lines. The wires of all
the customers are different. Five cables from five different
customers are collected in a DP. Wires from all DP’s are collected
8
in a pillar and from all pillars within 5 km, in a cabinet. Wires from
all the cabinets are collected in the MDF room in a telephone
exchange, which is then joined to the switch room of the same.
A call is a local call if and only if the wires of the calling party and
call receiving party are present in the switch room of the same
telephone exchange.
Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w 1 > D-Tax S/w
> S/w 2 > MDF > Cabinet > Pillar > DP > LJU > Phone2
The whole system is the same except that the wire from the first
local Tx to the main Tx of the city via optical fiber cable and in the
same way to the desired telephone exchange to connect to the
receiver.
The Indian Telegraph Act, 1885 divided india into four regions,
namely:
- NTR
- STR
- WTR
- ETR
These regions are further divided into circles, metro circles, A, B
and C respectively in decreasing order of population size.
Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w 1 > D-Tax
S/w1 > Main Tx 1 > Main Tx 2 > D-Tax S/w2 > S/w 2 > MDF >
Cabinet > Pillar > DP > LJU > Phone2
9
Mobile1 > Tower1 > BSC1 > MSC1> D-Tax S/w1 > Main Tx 1 >
Main Tx 2 > D-Tax S/w2 > MSC2 > BSC2 >Tower2 > Mobile2
5. International calls
Path of a call
The human ear can only hear sounds in the range of 20Hz- 20kHz.
Taking advantage of this fact, in the current calling system, the sound
waves of a call are mixed or modulated with very high frequency sound
inaudible by the human ear. This is because, higher the frequency,
higher is the speed of sound waves. Thus the sound waves travel at a
speed comparable to the speed of light and transmitted within a fraction
of second.
10
Pulse Code Modulation(PCM) has been used in communication
since 1986. It works on the concept of Time Division Multiplexing
(TDM). It modulates as well as prevents cross connection in the call.
If the person to be called is not from the same exchange, the call
goes through a PCM card present in the switch room. Eight wires are
grouped together, including one spare, and four such groups with a
maximum of 30 require one PCM card to further send a non local call to
the main telephone exchange. The PCM card performs multiplexing, i.e.
sending all the calls one by one, sending them to the DDF Rack. A 4*1
multiplexer is used with the DDF Rack converting it into a single output
which is then converted into an optical signal. A pair of fibers is present -
one to send the signal and one to receive it.
An avalanche photodiode is present to convert the optical signal
into electrical signal which then goes through a 1*4 demultiplexer and
demodulated by the PCM card and sent to the receiver.
Sender > PCM Card > DDF Rack > MUX Card > Single Output > Source
for OFC > Tx OFC > Rx OFC > Detector for OFC > Single Output >
DeMUX Card > DDF Rack > PCM Card > Receiver
11
Computer Networking
Telephone Numbers
A number assigned to a particular telephone and is used in making
connections to it. Traditional network
It is rooted in fixed function network devices such as a switch or
router.The functions of traditional networking are primarily
implemented from dedication of devices like routers, an-d application
delivery controllers.
12
a. This part tells us the area code. Like 0120 is the code of Ghaziabad
in UP.
b. This part tells us about the subarea within a vast area. Ex. 27 is
area code of Rajnagar in Ghaziabad
c. This part tells us about the exchange from which landline is given
d. This part tells us the number with which customer is registered in
the exchange
IP Address
The binary version of telephone number is known as IP address. Today,
the standard IP is known as IPv4. The address architecture uses the
binary and dotted-decimal versions. It is a 32-bit address written using
dotted-decimal notations. Each IP address is divided into four groups of
eight bits, for example, 192.168.5.4, 10.10.5.4, 192.168.45.25
Network ID:
Network Id is the portion of an IP address that identifies the TCP/IP
network on which a host resides. The network ID portion of an IP
address uniquely identifies the host’s network on an internetwork, while
the host ID portion of the IP address identifies the host within its
network. For e.g., for 192.168.5.4/24, the Network ID is 192.168.5.0/24.
Broadcast ID:
The IP address is a series of 4 numbers with their values ranging from 0
to 255 separated by “.” . It is the last IP address of the subnet. For e.g.,
for 192.168.5.4/24, the broadcast ID is 192.168.5.255/24
IP Range/ IP Pool :
13
Each number in the set can range from 0 to 255. For e.g., for the IP
address 10.10.5.4/24, the IP Range is from 10.10.5.1/24 to
10.10.5.254/24
Number of IP:
It is the total number of IP addresses in an IP range
For e.g., for the IP address 10.10.5.4/24, the IP Range is from
10.10.5.1/24 to 10.10.5.254/24
Thus the number of IPs will be 254.
Subnet Mask:
A subnet mask is a 32-bit number used to differentiate the network
component of an IP address by dividing the IP address into a network
address
Network Elements
● Switch : Switches are networking devices operating at layer 2 or a
data link layer of the OSI model. They connect devices in a network
and use packet switching to send, receive or forward data packets
or data frames over the network. A switch has many ports, to which
computers are plugged
in.
14
● Bridge: A bridge is a network device that connects multiple LANs
(local area networks) together to form a larger LAN. The process of
aggregating networks is called network bridging. A bridge connects
the different components so that they appear as parts of a single
network.
15
Types of Area network
16
- Star topology: A configuration that centers around one node to
which all others are connected and through which all messages are
sent
- Bus topology : All nodes are connected to a single communication
line that carries messages in both directions
Server Room
Through an optical fibre media a 100mbps internet is given to ALTTC
Ghaziabad router from main BSNL Ghaziabad centre . Now the router is
connected to a proxy server also known as AAA server through a CAT-6
cable which is further connected to the SWITCH . All the customers or
we can say user devices are connected to the switch.
The proxy server works on the AAA principle:
● Authentication: when a user connects to the internet it asks for a
username password to verify the user this is known as authentication .
As soon as the username and password is given the user get the access to
the internet.
● Authorization: the restriction on some sites, data usage limit, timing ,
and internet speed comes under authorization.
● Accounting: The login information which is stored in the proxy server
is known as accounting .
17
OSI Model
It stands for Open System iInterconnection (OSI). It is an ISO
standard that covers all aspects of network communications and models.
It was first introduced in the late 1970’s.
The OSI model consists of seven layers which constitute three groups in
total. The seven layers are :
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
The first 3 layers, tha are layers 1, 2 and 3 form the network support
layer.
The 4th layer is the intermediate layer.
The last 3 layers, that are layers 6, 7 and 8 form the user support layer.
18
Routing
Routing refers to establishing the routes that data packets take on
their way to a particular destination. This term can be applied to data
traveling on the Internet, over 3G or 4G
networks, or over similar networks used for telecom and
other digital communications setups. Routing can also take place within
proprietary networks.
19
DNS: The Domain Name System (DNS) is the phonebook of the Internet.
Humans access information online through domain names, like
nytimes.com or espn.com. Web browsers interact through Internet
Protocol (IP) addresses. DNS translates domain names to IP addresses
so browsers can load Internet resources.
VOIP:
The term “VoIP” stands for Voice over Internet Protocol is a great
technology that allows you to make and receive telephone calls over the
Internet and has been in the mainstream now for 9 years. It can also be
referred to as an Internet Phone.
Today, people use VoIP to make calls that include content and video,
using the reliable and secure connections offered by SIP. Today’s users
can access their VoIP tools on their smartphones and through soft-phone
technology .
20
ACL:
An ACL provides the ability to selectively permit or deny traffic for a
virtual machine endpoint. This packet filtering capability provides an
additional layer of security.
● Standard ACL: These are the Access-lists which are made using the
source IP address only. These ACLs permit or deny the entire
protocol suite. They don’t distinguish between the IP traffic such as
TCP, UDP, Https etc. By using numbers 1-99 or 1300-1999, the
router will understand it as a standard ACL and the specified
address as source IP address.
21
22
CONCLUSION
The major goal of this training report is to learn the basics of the
Networks and Cyber Security. Along with this we also got to know some
new definitions. We also got some information about the Models which
deals with exchange of the Data & Information(that too at different
levels) .
23