You are on page 1of 24

Industrial Training Report

ALTTC Project Report on Integrated Telecom/Data


Networks and Cybersecurity

Completed under the supervision and guidance of:

Mr. K K Yadav
Industry Trainer and Teacher
Advanced Level Telecom Training Centre (BSNL),
Rajnagar, Ghaziabad,
U.P. India

Submitted by:

Divya Mehra
20BCM020
Institute of Technology,
Nirma University,
Ahmedabad
TABLE OF CONTENTS

● Preface

● Acknowledgement

● Integrated Telecom

● Technologies utilized in IT
○ Media of communication
○ Devices used in Telecom
○ Types of Cables

● Live Telecom Network Topology (LT-NT)


○ Components of a Telephone Exchange
○ Types of calls
○ Path of a call

● Computer Networking
○ Comparison between traditional network and current
network systems
○ Telephone Numbers
○ IP Address
○ Network Elements

● Types of Networks
○ Wide Area Network (WAN)
○ Local Area Network (LAN)
■ Server Room (AAA Principle of working)
○ OSI Layer Model
○ Routing
○ DHP and DNS
○ Introduction to VOIP, ACL and VLAN/VP

● Conclusion

1
PREFACE

This project report will provide a brief description of Telecom/Data


Networks and Cyber Security. Firstly, we will try to understand the
different types of devices and their functionalities. Then we’ll discuss the
IP address and its types and how they’re allotted. We will then discuss
different types of networks, how the internet is distributed, what all
different components are involved and how it works. We will also discuss
various types of protection layers called OSI layers and at last we will
discuss what VPN is and how the internet reaches our home.

2
ACKNOWLEDGEMENT

I would like to express my special thanks and gratitude towards my


Industry Trainer and Teacher Mr. K K Yadav who gave me opportunity
and fruitful guidance to do this project. He not only offered his kind
support, but also insightful guidance throughout the whole training
session.
Also, I will always remain thankful to the ALTTC (BSNL), for
giving me the opportunity for getting training here, and giving a chance
to have Hands-On to the Real Technology like, Live Servers, Live Server
Racks, etc.

3
Integrated Telecom

Integrated telecommunications is the system of transmitting


information from point-to-point or point-to-multipoint over distances.
The key aspect that separates integrated telecommunications systems
from other systems is the concept of using multiple formats. Modern
methods primarily deal with the merging of mobile and stationary
telecommunications systems. However, traditional methods of
integrating communications networks have existed for thousands of
years.
The basic principle of all telecommunications requires information
to be sent from one location to another. For integrated
telecommunications, two distinct systems must be in place and used to
transmit the information. This can take the form of one person sending a
signal from one place to a single other person or multiple people. For
example, a person can send a fax via a fax machine to a number of people
who receive the information in the form of email.

4
Technologies utilized in IT

Media of communication
Different types of media are utilized for communication purposes. All
have their pros and cons, making them fit for different purposes.

1. Air - It is widely utilized but it is also the weakest medium. It works


in a range of 30-50m, making it unfit for long distance
communication.
2. Copper Wire - Pure copper is never used to make wires for
communication; it is doped with elements like Cadmium(most
common in current times), Aluminium, Lead etc. It can be used for
connecting a distance of 5-6 kms with a speed of 1000GBps,
making it a very important medium.
3. EM/Microwave - It can be used for communicating over a distance
of 1-40 kms, depending on the antenna or the technology.
4. Coaxial cable - It is a replacement for Copper wires as Copper often
suffers from EM disturbances.
5. Optical Fiber Cable(OFC) - It can offer a maximum speed of
400GBps with no limits on the distance of transmission.

Devices used in Telecom


1.Intelligent devices: Those electronic devices that have a sense and a
memory(have memory chip) are called intelligent devices. For e.g., AC
can sense pressure and temperature.

2.smart devices: Smart devices are electronic devices that have the
features of intelligent devices but in addition, they can also be connected
to the internet. For e.g., Smart TVs, Fridges etc.

3.Server: A server is a computer that provides resources, data ,services


known as a client over a network.

5
4.Router: A network device that routes traffic from one sub network to
another.

Types of Cables

STRAIGHT CABLE: When you connect two devices of different types


together, you use a straight through cable

CROSSOVER CABLE: When you connect two devices of the same type
together, you use a crossover cable

CONSOLE CABLE: They connect devices to terminals or PCs for


configuration

LAN CABLE: A LAN cable is used for connecting to computers and


hardware to form a LAN. LAN is a Local Area Network of devices and
which help connect the network together

VARIOUS LAN CABLES:


CAT5 -provides/support speed up to maximum 10Mbps
CAT- 6 - provides/support speed up to maximum 100Mbps
CAT- 7 - provides/support speed up to maximum 300-1000Mbps
CAT- 8 - provides/support speed up to maximum 5000M

6
FIG: Internal structure of different types of cable

7
Live Telecom Network Topology (LT-NT)

Components of a Telephone Exchange


1. Switch Room
It is the most important part of a telephone exchange. It is an air
conditioned room and only authorities are allowed entry.

2. MDF Room
The Main Distribution Frame (MDF) room serves as the
demarcation point location for the building. It is a room that
contains the wires of each and every customer.

3. Power Plant
In a place such as a telephone exchange, continuous power supply
is a mandatory requirement for all machinery to operate. Thus the
purpose of a power plant is to ensure uninterrupted power supply.
Its standard power supply is -48 Volt DC supply.

Types of calls
References :
MDF - MDF Room
S/w - Switch Room
Tx - Telephone Exchange

1. Local call

Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w > MDF >
Cabinet > Pillar > DP > LJU > Phone2

Copper alloyed with Cd is used for telephone lines. The wires of all
the customers are different. Five cables from five different
customers are collected in a DP. Wires from all DP’s are collected

8
in a pillar and from all pillars within 5 km, in a cabinet. Wires from
all the cabinets are collected in the MDF room in a telephone
exchange, which is then joined to the switch room of the same.

A call is a local call if and only if the wires of the calling party and
call receiving party are present in the switch room of the same
telephone exchange.

2. Trunk call intra-city(within SSA)

Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w 1 > D-Tax S/w
> S/w 2 > MDF > Cabinet > Pillar > DP > LJU > Phone2

The whole system is the same except that the wire from the first
local Tx to the main Tx of the city via optical fiber cable and in the
same way to the desired telephone exchange to connect to the
receiver.

3. Trunk call inter-city(out of SSA/ within same region)

The Indian Telegraph Act, 1885 divided india into four regions,
namely:
- NTR
- STR
- WTR
- ETR
These regions are further divided into circles, metro circles, A, B
and C respectively in decreasing order of population size.

Phone1 > LJU > DP > Pillar > Cabinet > MDF > S/w 1 > D-Tax
S/w1 > Main Tx 1 > Main Tx 2 > D-Tax S/w2 > S/w 2 > MDF >
Cabinet > Pillar > DP > LJU > Phone2

The main Tx of each city in the same Region is connected via


optical fiber.

4. Transformation from PSTN to mobile

9
Mobile1 > Tower1 > BSC1 > MSC1> D-Tax S/w1 > Main Tx 1 >
Main Tx 2 > D-Tax S/w2 > MSC2 > BSC2 >Tower2 > Mobile2

Mobile phones are connected to towers on a wireless basis, further


from where they are connected through optical fiber.

5. International calls

Inter calls take place through under-sea optical fiber cables.

Path of a call
The human ear can only hear sounds in the range of 20Hz- 20kHz.
Taking advantage of this fact, in the current calling system, the sound
waves of a call are mixed or modulated with very high frequency sound
inaudible by the human ear. This is because, higher the frequency,
higher is the speed of sound waves. Thus the sound waves travel at a
speed comparable to the speed of light and transmitted within a fraction
of second.

10
Pulse Code Modulation(PCM) has been used in communication
since 1986. It works on the concept of Time Division Multiplexing
(TDM). It modulates as well as prevents cross connection in the call.
If the person to be called is not from the same exchange, the call
goes through a PCM card present in the switch room. Eight wires are
grouped together, including one spare, and four such groups with a
maximum of 30 require one PCM card to further send a non local call to
the main telephone exchange. The PCM card performs multiplexing, i.e.
sending all the calls one by one, sending them to the DDF Rack. A 4*1
multiplexer is used with the DDF Rack converting it into a single output
which is then converted into an optical signal. A pair of fibers is present -
one to send the signal and one to receive it.
An avalanche photodiode is present to convert the optical signal
into electrical signal which then goes through a 1*4 demultiplexer and
demodulated by the PCM card and sent to the receiver.

Thus the following process if followed:

Sender > PCM Card > DDF Rack > MUX Card > Single Output > Source
for OFC > Tx OFC > Rx OFC > Detector for OFC > Single Output >
DeMUX Card > DDF Rack > PCM Card > Receiver

11
Computer Networking

Comparison between traditional network and current network


systems

Traditional Network Current Network


Telephone Line Data Network (ex: NIB-I, NIB-II
etc)
Telephone Number IP address
Telephone Instruments Computer, Smart phone, Tablet,
Router, Switch etc
ISD + STD + Area Code (i.e. Fix Network Part of IP address
Part or Same for all subscriber in
a particular area)
Customer Telephone Number Host ID

Telephone Numbers
A number assigned to a particular telephone and is used in making
connections to it. Traditional network
It is rooted in fixed function network devices such as a switch or
router.The functions of traditional networking are primarily
implemented from dedication of devices like routers, an-d application
delivery controllers.

In above example there are four parts which gives us information as


follows:

12
a. This part tells us the area code. Like 0120 is the code of Ghaziabad
in UP.
b. This part tells us about the subarea within a vast area. Ex. 27 is
area code of Rajnagar in Ghaziabad
c. This part tells us about the exchange from which landline is given
d. This part tells us the number with which customer is registered in
the exchange

An exchange can only distribute 998 numbers, or it can only


handle only 998 customers with a given exchange code.
The number whose ending with 000 or 999 ex ( 0120-2705000
and 0120-2705999 ) are not distributed to the public, because number
ending with 000 is the exchange ID of the particular exchange and
number ending with 999 is called the broadcast ID which is used by
government for making public announcements

IP Address
The binary version of telephone number is known as IP address. Today,
the standard IP is known as IPv4. The address architecture uses the
binary and dotted-decimal versions. It is a 32-bit address written using
dotted-decimal notations. Each IP address is divided into four groups of
eight bits, for example, 192.168.5.4, 10.10.5.4, 192.168.45.25

Network ID:
Network Id is the portion of an IP address that identifies the TCP/IP
network on which a host resides. The network ID portion of an IP
address uniquely identifies the host’s network on an internetwork, while
the host ID portion of the IP address identifies the host within its
network. For e.g., for 192.168.5.4/24, the Network ID is 192.168.5.0/24.

Broadcast ID:
The IP address is a series of 4 numbers with their values ranging from 0
to 255 separated by “.” . It is the last IP address of the subnet. For e.g.,
for 192.168.5.4/24, the broadcast ID is 192.168.5.255/24

IP Range/ IP Pool :

13
Each number in the set can range from 0 to 255. For e.g., for the IP
address 10.10.5.4/24, the IP Range is from 10.10.5.1/24 to
10.10.5.254/24

Number of IP:
It is the total number of IP addresses in an IP range
For e.g., for the IP address 10.10.5.4/24, the IP Range is from
10.10.5.1/24 to 10.10.5.254/24
Thus the number of IPs will be 254.

Subnet Mask:
A subnet mask is a 32-bit number used to differentiate the network
component of an IP address by dividing the IP address into a network
address

Network Elements
● Switch : Switches are networking devices operating at layer 2 or a
data link layer of the OSI model. They connect devices in a network
and use packet switching to send, receive or forward data packets
or data frames over the network. A switch has many ports, to which
computers are plugged
in.

● Hub: A hub is a physical


layer networking device
which is used to connect
multiple devices in a
network. They are
generally used to connect
computers in a LAN. A
hub has many ports in it.
A computer which
intends to be connected
to the network is plugged
into one of these ports.

14
● Bridge: A bridge is a network device that connects multiple LANs
(local area networks) together to form a larger LAN. The process of
aggregating networks is called network bridging. A bridge connects
the different components so that they appear as parts of a single
network.

● Router : A bridge is a network device that connects multiple LANs


(local area networks) together to form a larger LAN. The process of
aggregating networks is called network bridging. A bridge connects
the different components so that they appear as parts of a single
network.

● Modem: Modem is a device that enables a computer to send or


receive data over telephone or cable lines. The modulator converts
digital data into analog data when the data is being sent by the
computer. The demodulator converts analog data signals into
digital data when it is being received by the computer.

● End user device like mobile,pc, laptop

15
Types of Area network

The types of area network are :

LAN: Local Area Network


WAN: Wide Area Network
CAN: Controller Ar3ea Network
PAN: Personal Area Network
SAN: State Area Network
MAN: Metropolitan Area Network

WAN (Wide Area Network )


A network that connects two or more local-area networks over a
potentially large geographic distance Often one particular node on a LAN
is set up to serve as a gateway to handle all communication going
between that LAN and other networks Communication between
networks is called internetworking The Internet, as we know it today, is
essentially the ultimate wide area network, spanning the entire globe

LAN (Local Area Network )


A Local area network supplies networking capability to a group of
computers in close proximity to each other such as in an office building,
a school or a home. A lan is useful for sharing resources like files,
printers, games or other applications. A LAN in turn is often connected
to another LAN or to the internet or another WAN.
Distance of the LAN is 100 m but in today's scenario the distance doesn’t
matter.

Various configurations, called topologies, have been used to


administer LANs –
- Ring topology :A configuration that connects all nodes in a
closed loop on which messages travel in one direction

16
- Star topology: A configuration that centers around one node to
which all others are connected and through which all messages are
sent
- Bus topology : All nodes are connected to a single communication
line that carries messages in both directions

A LAN consists of a shared transmission medium. Majority of the


internet uses a protocol suite called internet protocol suite. The standard
internet protocol is known as TCP/IP. The original tcp/ip is thought of as
a five layer model with the layers names similar to the OSI model.

Server Room
Through an optical fibre media a 100mbps internet is given to ALTTC
Ghaziabad router from main BSNL Ghaziabad centre . Now the router is
connected to a proxy server also known as AAA server through a CAT-6
cable which is further connected to the SWITCH . All the customers or
we can say user devices are connected to the switch.
The proxy server works on the AAA principle:
● Authentication: when a user connects to the internet it asks for a
username password to verify the user this is known as authentication .
As soon as the username and password is given the user get the access to
the internet.
● Authorization: the restriction on some sites, data usage limit, timing ,
and internet speed comes under authorization.
● Accounting: The login information which is stored in the proxy server
is known as accounting .

17
OSI Model
It stands for Open System iInterconnection (OSI). It is an ISO
standard that covers all aspects of network communications and models.
It was first introduced in the late 1970’s.

The OSI model consists of seven layers which constitute three groups in
total. The seven layers are :

Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical

The first 3 layers, tha are layers 1, 2 and 3 form the network support
layer.
The 4th layer is the intermediate layer.
The last 3 layers, that are layers 6, 7 and 8 form the user support layer.

The layers are meant for the following purposes:


1. Physical Layer : To transmit bits over a medium. It provides
mechanical and electrical specifications.
2. Data Link : To organize bits into frames and to provide hop-to-hop
delivery.
3. Network layers : To move from source to destination and also
provide internet working.
4. Transport layer : To provide process-to-process message delivery
and error recovery.
5. Session: To establish, manage and terminate sessions.
6. Presentation Layer : To translate, encrypt and compress data.
7. Application layer : To allow access to network resources.

18
Routing
Routing refers to establishing the routes that data packets take on
their way to a particular destination. This term can be applied to data
traveling on the Internet, over 3G or 4G
networks, or over similar networks used for telecom and
other digital communications setups. Routing can also take place within
proprietary networks.

Routing can be of two types : -

1. Static- In which we manually define the path for the router to


follow, this type of routing is very secure and mainly used in
military areas, but it only works between 5 routers and is slow.

2. Dynamic – In this type we don’t manually define the path, but we


define a rule for the router to follow to reach the other network.
This routing is very fast but is less secure and it works between 20
routers.

Types of Dynamic routing:-


1. RIP – it stands for Routing Information Protocol
2. OSPF – It stands for Open Shortest Path First.

DHP and DNS


DHCP: The Dynamic Host Configuration Protocol (DHCP) is a network
management protocol used on Internet Protocol (IP) networks for
automatically assigning IP addresses and other communication
parameters to devices connected to the network using a client–server
architecture.

DHCP can be enabled in two ways.


1. Router can be configured to act as a DHCP server which
automatically assigns the IP Address.
2. A separate server can be used with Router so that router is not
overloaded.

19
DNS: The Domain Name System (DNS) is the phonebook of the Internet.
Humans access information online through domain names, like
nytimes.com or espn.com. Web browsers interact through Internet
Protocol (IP) addresses. DNS translates domain names to IP addresses
so browsers can load Internet resources.

Introduction to VOIP, ACL and VLAN/VP

VOIP:
The term “VoIP” stands for Voice over Internet Protocol is a great
technology that allows you to make and receive telephone calls over the
Internet and has been in the mainstream now for 9 years. It can also be
referred to as an Internet Phone.
Today, people use VoIP to make calls that include content and video,
using the reliable and secure connections offered by SIP. Today’s users
can access their VoIP tools on their smartphones and through soft-phone
technology .

20
ACL:
An ACL provides the ability to selectively permit or deny traffic for a
virtual machine endpoint. This packet filtering capability provides an
additional layer of security.

There are two types of ACL -

● Standard ACL: These are the Access-lists which are made using the
source IP address only. These ACLs permit or deny the entire
protocol suite. They don’t distinguish between the IP traffic such as
TCP, UDP, Https etc. By using numbers 1-99 or 1300-1999, the
router will understand it as a standard ACL and the specified
address as source IP address.

● Extended ACL: An “Extended” ACL provides greater control over


what traffic is prioritized. Extended ACLs can use any or all of the
following parameters:
1.Source IP address
2.Destination IP address
3.TCP/UDP Source port
4.TCP/UDP Destination port.
5.Protocol ID

VLAN/VPN (VIRTUAL LOCAL AREA NETWORK/VIRTUAL PRIVATE


NETWORK):

VLANs allow network administrators to automatically limit access to a


specified group of users by dividing workstations into different isolated
LAN segments. When users move their workstations, administrators
don't need to reconfigure the network or change VLAN groups.

21
22
CONCLUSION

The major goal of this training report is to learn the basics of the
Networks and Cyber Security. Along with this we also got to know some
new definitions. We also got some information about the Models which
deals with exchange of the Data & Information(that too at different
levels) .

23

You might also like