Two Months industrial Training At CONNECT, Jalandhar
Submitted By : Pavitter Pal Kaur
Submitted To : Er. Atul Mahajan
Roll Number : 6010404617
1
ABOUT HFCL INFOTEL LTD.
HFCL Infotel Ltd. (Infotel) is part of the HFCL Group. Established in the year 1987, Himachal Futuristic Communications Ltd. has developed a vast base for manufacturing indigenous telecom equipment in India. It started with manufacturing Transmission Equipment and soon expanded its product portfolio to manufacture Access Equipment, Optical Fiber Cable, Accessories and Terminal Equipment. It also provides turnkey solutions for setting up various types of telecom networks. HFCL is a prominent supplier of Telecom Equipment to the state owned Incombent Telecom Companies and Private Operators. It provides turnkey services to various telecom operators and public enterprises such as the Indian Railways, Ministry of Defence and other government departments. It has established a diverse customer base. Infotel is a "Total Telecom Solutions Provider" offering Fixed Line telephony (Telephone Services), Mobile telephony, Broadband Services, Customized Data Services and Value Added Services. Infotel was launched in Punjab in the year 2000 under the Connect brand name. Infotel has set up state-of-the-art networks with coverage in over 136 towns of Punjab with extensive optical fiber network coverage of over 3,500 km. Today, Infotel is one of Punjab's leading private sector telecommunication service providers with an aggregate customer base of 330,000(March 2007). Infotel Broadband network supports interactive multi media services, and can handle high quality content, high speed internet access and a large number of interactive applications.
2
Infotel supports a wide Public Call Office (PCO) network across the state of Punjab & Chandigarh. Now with over 45,000 PCOs, Infotel is deemed to have the largest PCO network in India among all private fixedline services operator in a single circle.
PRODUCTS AND SERVICES: 1. Voice Services: These include ℘ Fixedline Telephony ℘ Mobile Telephony ℘ ISDN ℘ Centrex (an alternative for EPABX) ℘ Telemeet (audio conference service) 2. Data & Internet Services: These include ℘ Mailing Solutions ℘ Leased Line ℘ Internet Leased Line ℘ ISDN ℘ Videomeet (Video conferencing) ℘ Customized Solutions
3
HIGHLIGHTS: October 2000
Launch of Telecom services in Punjab
January 2001
Launch of Internet services
February 2001
Launch of Limited mobility CDMA services
July 2004
Launch of Broadband data services
October 2005
Test Launch of Triple play services
September 2007
Launch of Ping Mobile
Technology Used: CONNECT uses Optical Fiber Technology in the state of Punjab and Chandigarh. Unlike conventional technologies, optical fiber supports Broadband applications, which gives you the advantage of using a single line for all your communication needs. HFCL, Lucent Technologies USA and Huawei Technologies China also support it. The PING Mobile Service: HFCL launched their mobile service for Punjab and Chandigarh under the brand name “Ping”. It offers call charges of 1 paisa per second with the benefit of single second billing. This means users will pay for exact usage
time – in
seconds rather than in minutes. It has also launched a new SIM-based color mobile handset on which the ‘Ping’ mobile service will be made available. The service will be available on the CDMA platform across 150 towns and 5,000 villages in Punjab and Chandigarh.
4
SUMMARY OF WORK Connect is a leading telecommunications organization of Punjab. It provides both wireline and wireless services in Punjab. For this there are various departments including switching and O&M departments. The O&M deptt. further has many sub deptts. like Transmission Deptt., corDECT Deptt., BSS Deptt., NE Deptt., ISP Deptt., etc. During our industrial training, we studied and worked in these different departments.
Transmission Deptt. This department basically controls all the transmission media for the transfer of data and voice. The transmission media used is optical fiber. This is because, there are minimum number of losses in this and is also not frequently damaged. The data travels through E1s which is a 2Mbps PCM signal. There are many transmission standards used: a. PDH (Pleisochronous Digital Hierarchy) b. SONET (Synchronous Optical Networking) c. SDH (Synchronous Digital Hierarchy) PDH was used earlier. It had limitations like insufficient capacity for network management. Thus SONET and SDH were discovered. SDH is the mostly used standard. Its basic structure level is Synchronous Transfer Module (STM-1) having a bit rate of 155Mbps. Bit Rate
SDH
SDH Capacity
155.5 Mbps
STM-1
63 E1s
622 Mbps
STM-4
252 E1s i.e. 4x63
2.5 Gbps
STM-16
1008 E1s i.e. 16x63
5
Physically STM-4 is commonly used. It is a network device that converts optical signal into electrical E1 and vice-versa. The E1s from STM are terminated on an MDF (Main Distribution Frame). Here E1s are cross-patched. Physically, each E1 has two wires – one for transmission and the other for reception. While patching two E1s on a krone module of MDF, the trans of one E1 is patched with receive of the other. There are two types of alarms that may be shown in case an E1 goes down. They are as follows: LOS (Loss of Signal): This is shown when patching is not done at the local terminal. Such a time slot is deleted first. Then to re-establish the connection, cross-connection is made. Then a protection is created for it. This is done to make it revertive, i.e., in case connection breaks from one direction, it diverts to the other direction. AIS (Alarm Indication Signal): This signal is shown when the patching is not done at the remote terminal. The multiplexer registers this alarm and then stops transmission of signal and transmits a continuous sequence of 1s. This causes multiplexer at the other end to show an AIS alarm. Study of Different equipments used in transmission: 1.) EDFA (Erbium Doped Fiber Amplifier): This is used to increase the power level of signal traveling through a medium. Power Meter: This is used to measure the level of power through a medium such as optical fiber. Attenuator: This is used to lower the level of power in order to avoid damage to equipments. OTDR (Optical Time Domain Reflectometer):
6
This is a device used to measure losses in an optical fiber of given length. It also gives the approx. location where the loss has occurred. E1 Tester: This is used to check if loop has been established and to see if there are any errors in the connection. FDS (Fiber Distribution System): Here individual nodes are connected to each other through spliced fibers using connectors. DSLAM (Digital Subscriber Line Access Multiplexer): Earlier dial-up connections were used at homes i.e. a customer could either use phone to make a call or connect it to the computer to access the internet. Also the maximum speed that could be given was just around 56 kbps. Thus DSLAM came to be used. These allow faster access to internet and user can use both phone and internet at the same time. The DSLAMs used earlier were based on ATM technology and now they are IP based. ATM DSLAMs allowed lesser speeds and also lesser number of subscribers. IP DSLAM supports more number of customers and also gives faster access to internet (approx. 2Mbps). DLC (Digital Local Circuit): This is a network device used to provide internet access as well as wireline services to customers. For this, it has many cards which control different functions. To connect two branches of an organization, point-to-point connectivity is required. This is provided by using radio modems.
7
B. BSS Controlling: Erlang is the unit of traffic. Erlang is the resource (voice channel) which is used continuously by one subscriber for one hour. For wireless services, the main network devices are: ℘ MSC (Mobile Switching Center) ℘ BSC (Base Station Controller) ℘ BTS (Base Transceiver Station) ℘ Mobile Station One MSC controls many BSCs which in turn control many BTSs. Each BTS gives an alarm in case of any problem like increase in power, etc. These BTSs are continuously monitored using iManager 2000 software. BSCs are connected to BTS through two-layer switches, three-layer switches, STM and MDF. From MDF, E1s are given to the BTS. BSCs may be E1 based or IP based. E1 based BSCs provide less speed as compared to IP based BSCs. One complete BSC has a capacity of 9600 erlangs. All BSCs, BTSs have a number of cards to control different functions. For example, CSPU card of BSC is used for signal processing, CBIE card is used for E1 interfacing in E1 based BSCs, etc. A BTS acts as an interface to connect the mobile units to the BSC. The BTS has the following main parts: Duplexer Amplifier Transceiver Clock Rectifier Power Supply Unit
8
Fans Call Processor These all parts are included in different cards of the BTS. GSM (Global System for Mobile Communication): It is a communication standard used for mobile communication. Uplink Frequency – Mobile to BTS – 890 MHz to 915 MHz Downlink Frequency – BTS to mobile – 935 MHz to 960 MHz It consists of four main parts: a. Mobile Station: It includes the SIM and the handset. b. Base Station Subsystem (BSS): It consists of BSC and BTS. c. Network Subsystem: It consists of MSC, HLR (Home Location Register), VLR (Visitor Location Register), AUC (Authentication Center) and EIR. d. OMC (Operation and Maintenance Center): It controls and maintains the MSC, BSC and BTS. The important features of GSM are roaming, handover, frequency hopping and frequency reuse. Another standard of communication CDMA was also studied.
C. corDECT System: The corDECT system is designed to provide a cost effective wireless high quality voice and data connection in dense urban as well as sparse rural areas. The system enables wireless subscriber to be connected to the PSTN in a cost effective manner. Its different parts are as follows: 1. DECT interface unit (DIU) 2. Compact Base Station (CBS) 3. Relay Base Station (RBS) 4. Base Station Distributor (BSD) 5. Wallset All these parts have been studied in detail. 9
ADSL (Asynchronous Digital Subscriber Line) is the main technology used in HFCL to provide internet access to its customers. It is a high speed replacement for modem or ISDN adapter that allows us to access the internet faster. It is a transmission technique used on the line from modem to the service provider. It is called “Asymmetrical” since the speed of transmission is not the same in both directions. A small amount of data sent by the customer can result in the receipt of a large amount of data from the internet. ADSL modems operate on a bit stream and are intended for carrying digital information between digital equipment such as PCs. Hence the word “Digital” is used. ADSL itself operates over the subscriber’s normal telephone line to the local exchange. The telephone line can continue to be used for voice calls through the use of devices called ‘Splitters’ that separate the data and voice on the line. Thus the name- Asynchronous Digital Subscriber Line.
PC
ADSL Modem
Local Loop
Service Provider
Internet
Figure: Components of ADSL. ADSL exploits the unused analogue bandwidth that is potentially available in the wires that run from the user premises to the local exchange. The various components of ADSL are ADSL modem, DSLAM, Broadband Access Server (BAS) and ISP. D. ISP: This department controls all the IP configurations for all the BTS. This includes giving new IPs and using subnetting to configure different BTS. This also checks links between various BTS from time to time to check for any losses. In case losses occur these are reported to the BSS deptt. to take further actions. In case losses occur, it indicates that
10
the link between two sites is not correct. There may be some problem with the transmission media.
TERMS OF REFERENCES
The major aim of the industrial training was to get to practically know the working of the mobile phones and landline phones that have now become a basic necessity for one and all. These systems otherwise seem to be very simple. But practically doing all the controlling has given us a vast knowledge about the technologies behind these systems. We came to know about the media used for voice. E1s and optical fibers are used for this purpose. The controlling of these media is done both through hardware and software. Various equipments like E1 tester, OTDR, etc. are used for the testing of transmission media. We came to know how mobile calls originate and are carried on through different network devices like BSC, BTS, etc. The working of landline phones is through corDECT Wireless Access System. This uses the ADSL technology. Broadband services are provided using DSLAMs. The DSLAMs may be based on IP technology or ATM technology. Also the concept of IP addressing is used to configure new BTS.
11
ANALYSIS OF GENERAL FINDINGS
12
TRANSMISSION Basic Definition: Transmission is an act of transfer of signal through a medium using electrical or optical pulses.
Transmission Media: There are four types of media that can be used in transmitting information in the telecommunications world: • Copper wire • Coaxial cable • Optical fiber • Wireless Earlier, copper wire was the only means of transmitting information. Technically known as unshielded twisted pair (UTP), this consisted of a large number of pairs of copper wire of varying size in a cable. The cable did not have a shield and therefore the signal primarily the high-frequency part of the signal was able to leak out. Coaxial cable consists of a single strand of copper running down the axis of the cable. This strand is separated from the outer shielding by an insulator made of foam or other dielectrics. A conductive shield covers the cable. Usually an outer insulating cover is applied to the overall cable. Fiber is the third transmission media. Whereas transmission over copper utilizes frequencies in the megahertz range, transmission over fiber utilizes frequencies a million times higher. This difference permits transmission speeds of immense magnitudes. Transmission speeds of as high as 9.9Gbps have become common place in the industry
13
today. The tremendous capacity of fiber certainly makes for more efficient communications; however, placing so much traffic on a single strand makes for greater vulnerability. Most of the disruptions in the long-distance network are a result of physical interruption of a fiber run. Wireless communications is the final option as a transmission medium. This can take several forms: microwave, synchronous satellites, low-earth-orbit satellites, cellular, personal communications service (PCS), etc. In every case, however, a wireless system obviates the need for a complex wired infrastructure. In the case of synchronous satellites, transmission can take place across oceans or deserts. With microwave there is no need to plant cable, and in mountainous territories this is a significant advantage. Cellular and PCS afford mobility. There are advantages and disadvantages to each.
Transmission Standards: Certain standards are to be used for the transmission of signals from one place to another. These are as follows: PDH (Plesiochronous digital hierarchy) SONET (Synchronous optical Network) SDH (Synchronous digital hierarchy)
1) Plesiochronous Digital Hierarchy (PDH): PDH stands for Plesiochronous Digital Hierarchy. PDH signals with a high transmission rate are obtained by multiplexing several lower-rate signals. The input signals of the tributaries are plesiochronous to each other, i.e. their clock rates have the same nominal value, but there is, however, a slight amount of variation between the two. The Plesiochronous Digital Hierarchy is a digital communication technology. PDH is based on the fundamental concepts of Time Division Multiplexing (TDM). Plesiochronous Digital Hierarchy is a technology used in telecommunication networks to transport large quantities of data over digital transport equipment such as
14
fiber optic and microwave radio systems. The term plesiochronous is derived from Greek plesio, meaning near, and chronous, time. Plesiochronous means nearly synchronous. The topology of a PDH network is the mesh topology where every multiplexer in each site worked with its own clock. In order to synchronize between two multiplexers that work together, usually the transmission was made according to the local clock and the reception was made according to the recovered clock that was recovered from the received data. The
plesiochronous
digital
hierarchy
(PDH)
has
two
primary
communication systems as its foundation. These are the T1 system based on 1544 kbit/s that is recommended by ANSI and the E1 system based on 2048 kbit/s that is recommended by ITU-T. The T1 system is used mainly in the USA, Canada and Japan. European and certain non-European countries use the E1 system.
CONCEPT OF E1s: An E1, logically, is a PCM signal that has been sampled, quantized and encoded. Each E1 has got 30 channels, each sampled at 8 KHz, compressed according to A-law. These 30 communications are byte interleaved. Each is of 8 bits. The frame has two more channels; they are used for synchronization and signaling. The total bit rate is 2.048 Mbit/s.
0
1
-------------
FRAME
15
16
17
SIGNALLING
ALLIGNMENT (SYNCHRONIZATION)
256 bits, 125 µsec.
Figure: Frame structure of E1 15
-------------
31
This is also the basic principle of V5 protocol. Physically, each E1 has two wires – one for transmission and the other for reception. While patching two E1s on a krone module of MDF, the trans of one E1 is patched with receive of the other. Bit rates used for PDH: Bit rates in accordance with ANSI: 1.5 Mbit/s, 6 Mbit/s and 45 Mbit/s. Bit rates in accordance with CEPT: 2 Mbit/s, 8 Mbit/s, 34 Mbit/s and 140 Mbit/s. Every signal has a separate frame structure and there is no frame synchronization of the tributary signal inputs. But PDH had many disadvantages. 1.) Interface: a. There are only some regional provisions, instead of universal standards for electrical interface. The present PDH digital signal hierarchy has three rate levels: European Series, North American Series and Japanese Series. Each of them has different electrical interface rate levels, frame structures and multiplexing
methods. This makes it difficult for international
connections. b. No universal standards for optical interfaces. All PDH equipment manufacturers use their own line codes to monitor the transmission performance in the optical links. 2.) Multiplexing Method: a. As PDH adopts asynchronous multiplexing method, the locations of the low rate signals are neither regular nor fixed when they are multiplexed into higher-rate signals. b. Since adding/dropping low-rate signals to high-rate ones must go through many stages of multiplexing and de-multiplexing, impairment to the signals during multiplexing/de-multiplexing processes will increase and
16
transmission performance will deteriorate. This is unbearable in large capacity transmission. 3.) No universal network management interface: When buying a set of equipment from a vendor, you have to buy its network management system. Different parts of the network may use different network management systems, which are obstacles in forming an integrated telecommunication management system (TMN). Thus there came the reason for the invention of a new standard SDH (Synchronous Digital
Hierarchy).
Synchronous
Digital Hierarchy
(SDH) and
Synchronous Digital Network (SONET) are new transmission systems that provide for standardized high-speed optical transport. The goal of SDH and SONET is to provide ease of networking, intervendor compatibility, standardized interfaces, and standardized overhead for operations, administration, maintenance, and provisioning. In HFCL, SDH is used.
2) Synchronous Digital Hierarchy (SDH): SDH is a standard for telecommunication formulated by the International Telecommunication Union (ITU). SDH was first introduced in telecommunications network in 1992. SDH is based on overlaying a synchronous multiplexed signal onto a light stream transmitted over optical fiber cable. SDH is also defined for use on radio links, satellite links and at electrical interfaces between equipments. SDH transmission network is composed by connecting different types of NE (network elements) that are connected through optical fiber. The transmission function of SDH is performed through different NEs. Synchronous Digital Hierarchy allows multi-vendor interworking and allows one SDH-compatible network element to communicate with another. Also, it is synchronous hierarchy; therefore it allows single-stage multiplexing and de-multiplexing. This eliminates hardware complexity, thus decreasing cost of equipment while improving signal quality. It also provides network self-healing function. The so called self-healing implies that when fault develops in the network, human intervention is not needed. The network automatically restores transmission of service during the fault in an extremely
17
short time. The subscriber is practically unaware of the fact that a fault has occurred in the network. Synchronous Transport Module ( STM): The basic structure level of SDH is Synchronous Transfer Module (STM-1) having a bit rate of 155Mbps. Bit Rate
SDH
SDH Capacity
155.5 Mbps
STM-1
63 E1s
622 Mbps
STM-4
252 E1s i.e. 4x63
2.5 Gbps
STM-16
1008 E1s i.e. 16x63
STM is used to generate E1s that is it converts the electrical signal to optical signal and optical signal to electrical signals. From STM E1s go to MDF (Main Distribution Frame)
STM 1 (155.5Mbps) × 4
STM 4 (622 Mbps) × 4
STM 16(2.5 Gbps) D W D M
100 Gbps
×4
STM 64 (10 Gbps)
18
Figure: Synchronous Digital Hierarchy
As we know optical fiber is most widely used as the transmission medium for transfer over long distances, therefore, STM has to be used at certain points. This is because in mobile communication, the signal coming from one user is to be shifted to other user for a communication to be established between them. This is done through a Main Distribution Frame (MDF). An MDF can only receive electrical signals in the form of E1s. An MDF is a platform where the E1s coming from different parts are patched i.e., connected to each other. E1s physically have two terminals; one trans and the other receive. To patch 2 E1s to one-another, trans of one is connected to receive of other and vice versa. Thus STM is required to convert optical signal coming from far-off distances to electrical or E1 form. An E1 is nothing but a 2Mbps PCM signal.
19
TU12-1 TU2-1
TU12-2
TU2-2
TU12-3
TU2-3 TU3-1
TU2-4 TU2-5 TU2-6 TU2-7
TU2-1 TU2-2 TU2-3 AU-4
TU2-4
TU3-2
TU2-5 TU2-6 TU2-7 TU2-1 TU2-2
TU2-3 TU3-2
TU2-4 TU2-5 TU2-6 TU2-7
Figure: Structure of STM-1 20
AU stands for Administrative Unit TU12-1, TU12-2 and TU12-3 are the time slots. The path is determined by the last digits. For example- 1-2-3-2, this is represented as: AU4-1 TU3-2 TU2-3 TU12-2
The general method to connect two different areas: First of all, optical fiber is laid underground in between the two areas. Both the fibers are terminated on the FMS (Fiber Management System). From here the fiber goes to the STM. STM converts optical signals into electrical E1s and vice-versa. Electrical E1s go to the krone modules on the MDF (Main Distribution Frame). On the MDF, E1s of all areas are connected to each other through patching.
Fiber Distribution System (FDS): The Fiber Distribution System consists of a number of patch panels. A patch panel is a panel in which adapters are arranged in such a way so that they are connected to individual fibers spliced through connectors. These adapters could be connected to patch cords or pig tails as per requirements. The ports through which these are connected are called FCPC ports. There are three types of ports: 1. FCPC ports – used on patch panels of FDS. 2. FCLC ports – used in STM-4 (layer switches). 3. FCSC ports – used in EDFA (Erbium Doped Fiber Amplifier).
Point of Interconnection (POI): It is used to interconnect two different networks. For e.g., for connecting Spice to BSNL, etc. These are of two types: 1.
Backbone (BB): This is used to connect two cities to one another i.e. intercity. For e.g., for connecting Chandigarh to Jalandhar, etc.
2.
Backhaul (BH): This is used to connect various sites within a city i.e. intracity. For e.g., connecting different nodes within a city.
In both the above cases, rings are used. 21
In case any E1 goes down, it is indicated by alarms: 1.) LOS (Loss of Signal): This is shown when patching is not done at the local terminal. Such a time slot is deleted first. Then to re-establish the connection, cross-connection is made. Then a protection is created for it. This is done to make it revertive, i.e., in case connection breaks from one direction, it diverts to the other direction. 2.) AIS (Alarm Indication Signal): This signal is shown when the patching is not done at the remote terminal. The multiplexer registers this alarm and then stops transmission of signal and transmits a continuous sequence of 1s. This causes multiplexer at the other end to show an AIS alarm. Advantages of SDH network: o High speed o Backup circuits o Dynamic bandwidth utilization o Compatibility o Simple multiplexing o Integration with PDH and SONET
OPTICAL FIBERS Optical fibers are the most suitable medium for electrical communication nowadays since they provide large bandwidth which is required for communication at long distances. These work on the principle of Total Internal Reflection. An optical fiber consists of three basic parts: 1. The core – where the actual propagation of light occurs. 2. The cladding – is present both to protect the core against external mechanical forces and to limit the losses of energy due to some imperfections at the core surface. 3. The jacket – protects and isolates cladding from the environment.
22
Optical fibers come in different standards as 6F, 12F, 24F, 36F and 48F. Each standard fiber has the same number of tubes of optical fiber inside it. For e.g., a 6F fiber has 6 tubes of fibers inside it and so on. The color coding for a 6F is Blue, Orange, Green, Brown, Grey and Natural. For a 12F fiber the color coding is Blue, Orange, Green, Brown, Grey, White, Red, Black, Yellow, Violet, Pink and Natural.
TUBES
w 6
w 5 w 4
B 1
w 3
O 2
Figure: A 6F Optical Fiber with 6 tubes. In the above diagram, B stands for Blue, O stands for Orange and W stands for White. The first tube is always of blue color which indicates that this is the first tube and eases the installation. Each tube further has got four optical fibers. These have the color coding – Blue, Orange, Green and Natural. For connecting two optical fibers, color coding has to be kept in mind. The blue tube of one fiber is connected to blue of another fiber. This is the first tube, second is orange and then cyclic order is followed. For a wavelength of 1550 nm, the loss in an optical fiber is assumed to be 0.25 db/km, while for a wavelength of 1310 nm it is assumed to be 0.35 db/km. If losses are found more than these values, then the route is changed onto some other fiber until that fiber is repaired.
Different equipments used in transmission: a. Power Meter: Power meter is used to measure the optical power. It consists of a display unit and a calibrated sensor. In case the power is more, then an attenuator is 23
used to reduce the power and in case the power is low then optical fiber is changed in order to increase the power. b. Attenuator: In case the power measured inside an optical fiber comes high, then it becomes necessary to reduce the level of power in order to avoid the various equipments from getting damaged. This is because devices have a fixed value of tolerance power. c. E1 Tester: E1 tester is used to check the connection between the two points. It consists of transmitter and receiver. Transmitter of the E1 is connected to the receiver of the tester and receiver of E1 is connected to the transmitter of the tester. It gives ok if there is no error. If it shows green light then it indicates that the loop has been established. If it shows red light then it indicates that the loop has not been recognized. d. EDFA (Erbium Doped Fiber Amplifier): It is a fiber amplifier used to increase the level of power going through an optical fiber so that it could cover large distances. If the power level is positive, it increases power to around +17 db. However if the power level is negative, it increases it to around +10 db. Increase in power level is required since the acceptable power level for most devices is -8 db to -28 db. If the level is less than this, then the power is not detected by most of the devices. Also power more than -8 db damages the equipment. Therefore EDFA is used only where distances involved are very large. If at the receiver level power is still more, then attenuator is used. If power is less, then the signal can be routed to another fiber. A power meter is used to measure optical power. EDFA optically amplifies signals without having to first convert them into electrical form. Optical amplification usually produces less noise than electrical amplification. An Erbium Doped Fiber Amplifier (EDFA) consists of a solid state material (typically glass) which is drawn into a fiber. The core of the fiber is doped with an ion (Er 3+) that emits at wavelength 1550 nm. The fiber is pumped by a 24
strong beam at a shorter wavelength (980 nm or 1480 nm), which excites the Erbium ion to a higher energy level. During the transition state, the photons are emitted either by spontaneous emission or by simulated emission. The long lifetime of the excited state, approximately 10 ms, assures that instead of emitting noise by spontaneous emission, stimulated emission (amplification) is dominant.
e. OTDR (Optical Time Domain Reflectometer): An Optical Time Domain Reflectometer (OTDR) is used in fiber optics to measure the time and intensity of the light reflected on an optical fiber. Basically, it is used as a troubleshooting device to find faults, splices, and bends in fiber optic cables, with an eye toward identifying light loss. Light loss is especially important in fiber optic cables because it can interfere with the transmission of data. An OTDR can detect such light loss and pinpoint trouble areas, making repairs easy. An OTDR takes advantage of the scattering of light in the optic fiber to make its measurements. The OTDR emits a high-power pulse that hits the fiber and bounces back. What comes back is measured, factoring in time and distance, and the result is "trouble spots," which radiate and can be targeted for repair. In general, the data take the form of a wave, with trouble spots clearly visible as aberrations in the wave.
Thus it can create a display of the amount of backscattered light at any point in the fiber as follows.
25
The slope of the fiber trace shows the attenuation coefficient of the fiber and is calibrated in dB/km by the OTDR. In order to measure fiber attenuation, a fairly long length of fiber with no distortions on either end from the OTDR resolution or overloading due to large reflections. If the fiber looks nonlinear at either end, especially near a reflective event like a connector, avoid that section when measuring loss.
26
DIGITAL LOCAL CARRIER (DLC) Definition: The local loop is the physical connection between the main distribution frame in the user’s premises to the telecommunications network provider. Digital Loop Carrier (DLC) technology makes use of digital techniques to bring a wide range of services to users via twisted-pair copper phone lines.
Structure of DLC: The DLC developed by UTStarcom is called the AN2000. The AN2000 uses a modular physical design with multiple racks integrated into full racks that form an Access Node. Each AN2000 shelf consists of two common control slots & 16 universal slots. One control shelf provides common control and distribution of services in a multishelf Assembly. More than one control/Expansion shelf group may be housed in 1 Rack in order to increase E1 capacity or BRI (V5) capacity per rack. AN2000 has got many shelves. These shelves have many cards which perform all the functions. They are as follows: Foreign Exchange & Subscriber Module(FXS) Each FXS card contains 16 interface circuits i.e., serves 16 customers. These cards are used to support voice. It also provides battery feed and ringing. It helps to detect on hook and off hook subscribers using loop start signaling which is indicated by the LEDs on these cards. A blinking LED shows that the subscriber is dialing other subscriber’s number. System Control Module (SCM) The SCM card occupies a single “B” slot in the control shelf. It contains the system clock and collects alarms and performance information and reports it to network management system. E1 Module The E1 module monitors performance of each E1 lines and detects errors and alarms on E1 lines. It provides LEDs for module and port status and alarms.
27
Synchronous Data Transfer (SDT) Module The SDT module offers an East bound and West bound transmit receive pair. It supports self healing ring capability. Power Supply Module (PSM) The PSM module uses a DC-DC converter to convert -48 V to +/-5V to provide power needed by modules in shelf. It also provides failure alarm signals. ISDN-BRI/IDSL Module ( BRI) The BRI module contains 8 interface circuits. It is used for ISDN customers. Power Supply Module with Ring Generator(PRM) The PRM module provides the ringer tone. Power Distribution & Alarm Panel(PDP) The PDP module distributes –48 V DC from external supply to the system. It provides system audible alarm. Bus Adapter Modules(MBAM & EBAM) The EBAM card provides connectivity of E1 with FXS cards. Remote Testing Unit(RTU) The RTU module is used to perform electrical tests of the subscriber loop and FXS line circuitry.
28
The UTStarcom Data Circuit is used for point-to-point connectivity. For e.g., consider an organization having two offices, one in Jalandhar and another in Chandigarh. The organization wants a point-to-point connectivity between the two offices. For this, a radio modem is used. The radio modem is of two types, one indoor unit and one outdoor unit. The indoor unit has one output port and two LAN ports. The output is connected to the input of the outdoor unit. The outdoor unit is connected to an antenna. One such set-up is made at the node and another at the customer end. The customer connects the two LAN ports of his indoor unit to his network of computers. But the data in this case travels in form of E1s between Jalandhar and Chandigarh. The computers can accept only digital data. Thus there is a need of E1 to Ethernet converter. The E1s coming from a place reach the MDF from where they are given to the E1 to Ethernet converter. The E1 to Ethernet Converter converts E1s to Ethernet and vice versa. There is another DLC made by Huawei which is called the F02A shelf. It has got A32 cards in place of FXS cards. Each A32 card serves 24 customers. Instead of BRI card, it uses the DSL card for ISDN. There is also an ASU card where the fiber is terminated. This card is also responsible for formation of rings so that in case the fiber communication breaks in one direction it can be reverted onto the other direction. DSLAM is used for internet connection. ICM (Integrated Controller Module) Card is used to store the configuration of DSLAM. The DSLAM has 16 cards each of which serves 24 customers. The front card is called the IPDSL card. It is the basic internet card. At the back of DSLAM, there is a splitter card which splits voice and data. A splitter card basically performs multiplexing. In case a user wants to use both voice telephony and internet connection, then the voice coming from the A32 card is sent to simple voice modules and then to the DSLAM which splits the voice and data and then through the data modules sends them to the customer through the MDF. But if a customer wants to use only vice, then voice coming from FXS or A32 card is sent to the simple voice modules from where it is sent to the customer through the MDF.
29
DIGITAL SUBSCRIBER LINE ACCESS MUTIPLEXER (DSLAM) Introduction: A Digital Subscriber Line Access Multiplexer (DSLAM) allows telephone lines to make faster connections to the Internet. It is a network device, located near the customer's location that connects multiple customer Digital Subscriber Lines (DSLs) to a high-speed Internet backbone line using multiplexing techniques. By locating DSLAMs at locations remote to the telephone company central office (CO), telephone companies are now providing DSL service to consumers who previously did not live close enough for the technology to work
Path taken by data to DSLAM Residential/commercial source: DSL modem plugged into the customer's computer. Local loop: The telephone company wires from a customer to the telephone company's central office, often called the "last mile". DSLAM: a device for DSL service. Sending on the customer or downstream side, it intermixes voice traffic and VDSL traffic onto the customer's DSL line. Receiving on that side, it accepts and separates outgoing phone and data signals from the customer. It directs the data signals upstream towards the appropriate carrier's network, and the phone signals towards the voice switch. Main Distribution Frame (MDF): a wiring rack that connects outside subscriber lines with internal lines. It is used to connect public or private lines coming into the building to internal networks. At the telco, the MDF is generally in proximity to the cable vault and not far from the telephone switch.
Hardware details Customers connect to the DSLAM through ADSL modems or DSL routers, which are connected to the PSTN network via typical unshielded twisted pair telephone lines. Each DSLAM has multiple aggregation cards, and each such card can have multiple ports to which the customer lines are connected. Typically a single 30
DSLAM aggregation card has 24 ports, but this number can vary with each manufacturer. The most common DSLAMs are housed in a telco-grade chassis, which are supplied with (nominal) 48 volts DC. Hence a typical DSLAM setup may contain power converters, DSLAM chassis, aggregation cards, cabling, and upstream links. The most common upstream links in these DSLAMs use gigabit ethernet or multi-gigabit fiber optic links.
Ustarcom AN20001B DSLAM Earlier dial-up connections were used. These provided speeds of not more than 56 kbps and also narrow bandwidth. Thus these were narrowband services. DSLAM allows telephone lines to make faster connections to the internet. HFCL uses UStarcom AN20001B DSLAM. It contains 16 aggregation cards and each card serves 24 customers. Each card creates its own VLAN (Virtual Local Area Network). The advantage of using VLANs is in case of broadcasts. As we all know viruses spread through broadcasts. In case a virus broadcasts in DSLAM, the 24 customers in one particular VLAN are only affected.
31
There is one controller card ICM which contains two giganet ethernet ports and two straight cable ports.
V L A N
V L A N
V L A N
ISP Router IC M
VLAN :- Virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment. Network reconfiguration can be done through software instead of physically relocating devices. VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain.
The earlier DSLAMs used ATM technology. But such DSLAMs used four E1 ports instead of Gigabit Ethernet ports. Thus they could serve limited number of
32
subscribers and that too with limited speeds. Gigabit ports can provide speeds of upto 1000Mbps. The internet connection is provided through modems at the customer side. These modems also contain RAS (Remote Access Server). This is responsible for authentication of the user through password and then the speed is assigned according to the policies configured in the DSLAM.
The V5 Protocol 33
Definition: V5 is an Access Network Technology. The V5 standard specifies interfaces between the access network and the Local Exchange. Two interfaces to support narrowband services have been specified, V5.1 and V5.2, both based on 64 Kbit/s channels and 2.048 Mbit/s links. V5.1 is a 2.048 Mbit/s interface intended for access networks which support PSTN and ISDN BRI user ports and provide for managed flexibility of bearer channel allocation but which do not perform a traffic concentration function. V5.2 is a multi-2.048 Mbit/s interface for access networks which additionally may support ISDN PRA user ports and which have traffic concentration capability. The major differences between the V5.1 and V5.2 interfaces are: • V5.1 uses only one 2.048 Mbit/s link whereas V5.2 may use up to sixteen 2.048 Mbit/s links on one interface. •V5.1 does not support concentration whereas V5.2 is inherently designed to support it. •V5.1 does not support ISDN primary rate access user ports whereas V5.2 does. Physical (timeslots): The 2.048 Mbit/s interfaces utilise the usual 32 time-slot frame structure defined in G.703/G.704. Time slot 0 is used for frame alignment and timeslot 16 of the first 2.048 Mbit/s link is utilised by the V5 ‘control protocol’ which performs a number of housekeeping functions. V5 Characteristics: Facility: A V5 interface connection consists of full digital, 2,048 kbit/s facility or E1s (1 for V5.1 up to 16 for V5.2). Each facility has 32 64-kbps channels. Exchange: The exchange provide switching and call processing functionality, including, for example, supplementary services, charging announcements and DTMF decoding Access Network: The access network is responsible for maintenance of the access network and subscriber lines. Access network deals with the physical connection (or
34
termination) of the subscriber lines. It is also responsible for testing of digital lines and transport of subscriber speech data and subscriber line signals.
OPTICAL NETWORKING UNIT (ONU) HFCL uses HONET 160B ONU. It is one type of transmission unit. It is used to provide landline services to the customers. It has following cards:1. ASU: In ONU, 5 ASU cards are used. Each card has 8 E1 ports. These convert optical signal to electrical signal. 2. EMU: 1 EMU card is used. It stands for Environment Monitoring Unit. 3. SDH card: This card serves 15 customers. 4. AC TO DC: It converts 220V AC to - 48 DC. 5. DC TO DC: It converts -48V to +12V or +5V DC. 6. RSP card: It serves up to 5 customers. It convert optical signal to electrical signal.
35
OPTIX Metro 1000 optix
Overview: The OptiX 155/622H system developed by Huawei is a new generation of STM-1/STM-4 compatible multi-service transmission equipment. It supports STM1/STM-4 optical synchronous transmission and on-line upgrade from STM-1 to STM-4. The OptiX 155/622H system provides abundant interfaces and powerful cross-connect capability. Via its SDH interface, the OptiX 155/622H system can build a transmission network with Optix 155/622, OptiX 2500+(metro3000) and OptiX 10G systems. Via its PDH, ATM or Ethernet interfaces, it can interwork with access network equipment, GSM base station, ETS base station, exchange and router to form a communication network. Through OptiX iManager T2000, a subnetwork-level integration NMS for transmission network, a user can configure, maintain and monitor the equipment and the network. An authorized user can use the OptiX iManager T2000 system to maintain the whole network at any NE or remote NMS center of transmission network.
36
Features: 1.) Interface The OptiX 155/622H system provides abundant service interfaces and auxiliary interfaces.
SDH interface A single OptiX 155/622H supports STM-1 SDH optical interfaces, or STM-1 SDH electrical interfaces, or STM-4 SDH optical interfaces, or combination of the STM1/STM-4 SDH interface.
PDH interfaces The OptiX 155/622H provides PDH interfaces operating at E1 and T1 rates. A single OptiX 155/622H can provide a maximum of 80 E1 interfaces, or 64 T1 interfaces, or combination of the above PDH interfaces.
ATM service interface The OptiX 155/622H provides the STM-1 optical interfaces that can access ATM service.
Ethernet service interfaces The OptiX 155/622H provides 10M/100M self-adaptive Ethernet electrical interfaces with VC-12 or VC-3 as the mapping unit, or 100M Ethernet optical interfaces with VC12 as the mapping unit.
Environment monitoring unit interfaces
37
The OptiX155/622 provides primary power voltage monitoring, environment temperature monitoring, Boolean value signal input, Boolean value signal output, and RS-232 or RS422 serial communication interface
Clock input/output interfaces The OptiX 155/622H provides clock input interfaces and clock output interfaces, which can be set to 2MHz or 2Mbit/s mode.
Power input interfaces The OptiX 155/622H provides two -48V DC or +24V DC power input interfaces.
Abundant auxiliary interfaces The OptiX 155/622H provides several data interfaces for the user with its powerful overhead processing capability: •
RJ-45 Ethernet interface
•
user-defined asynchronous RS-232 data interfaces
•
Modem interface with X.25 characteristics
For two networks not connected together via optical fiber, inter-network DCC communication can be established by interconnecting the Ethernet interfaces.
2.) Services The OptiX 155/622H supports the access of PDH signals, SDH signals, ATM service and Ethernet service which supports V.35/X.21protocol. In addition, it supports the hybrid transmission of PDH signals, SDH signals, and ATM services within the same equipment.
3.) Networking and Protection Flexible networking capability
38
With a large-capacity cross-connect matrix, the OptiX 155/622H can provide powerful networking capability. It supports multiple network topologies such as point-to-point, chain, ring, hub, and mesh networks. Ideal protection mechanism
The OptiX 155/622H provides network protection, including ring Path Protection (PP), Subnetwork Connection Protection (SNCP),shared fiber virtual trail protection, and VPRing protection of an ATM ring network. •
4 EFS board Provides 10M/100M self-adaptive Ethernet electrical interfaces
•
Supports GFP (General Frame Processor) /LAPS (Link Access Processor SDH) /HDLC(High-level Data Link Control) mapping protocol. The mapping protocol is optional
•
Supports LCAS (Link Capacity Adjustment Scheme) protocol
•
Supports CAR (Committed Access Rate)
39
Base Station Subsystem (BSS) The main technologies used are GSM and CDMA. These have been explained below:
Global System for Mobiles Introduction: In this day and age, many folks need to be accessible everywhere, whether they're at work or play, in the office or at home. To meet this demand, the GSM standard (Global System for Mobile Communications) for mobile telephony was introduced in the mid-1980s. Today, GSM is the most popular mobile radio standard in the world. Before GSM networks there were public mobile radio networks (cellular). They normally used analog technologies, which varied from country to country and from manufacturer to another. These analog networks did not comply with any uniform standard. There was no way to use a single mobile phone from one country to another. The speech quality in most networks was not satisfactory. GSM became popular very quickly because it provided improved speech quality and, through a uniform international standard, made it possible to use a single telephone number and mobile unit around the world. Benefits of GSM: 1. Support for international roaming 2. Distinction between user and device identification 3. Excellent speech quality 4. Wide range of services 5. Interworking (e.g. with ISDN, DECT)
40
6. Extensive security features GSM also stands out from other technologies with its wide range of services: 1. Telephony 2. Asynchronous and synchronous data services (2.4/4.8/9.6 kbit/s) 3. Access to packet data network (X.25) 4. Telematic services (SMS, fax, videotext, etc.) 5. Many value-added features (call forwarding, caller ID and voice mailbox) 6. E-mail and Internet connections.
Frequency Ranges for GSM: GSM-900 Standard: Uplink Frequency: 890 MHz – 915 MHz Downlink Frequency: 935 MHz – 960MHz GSM-1800 Standard: Uplink Frequency: 1710 MHz – 1785 MHz Downlink Frequency: 1805 MHz – 1880 MHz Uplink: Signal flow from Mobile Station (MS) to Base Transceiver Station (BTS). Downlink: Signal flow from Base Transceiver Station (BTS) to Mobile Station (MS). The simultaneous use of separate uplink and downlink frequencies enables communication in both the transmit (TX) and receive (RX) directions. The radio carrier frequencies are arranged in pairs and the difference between these two frequencies (uplink-downlink) is called the Duplex Frequency. In GSM 900 the duplex frequency (the difference between uplink and downlink frequencies) is 45 MHz. In GSM 1800 it is 95 MHz. The lowest and highest channels are not used to avoid interference with services using neighbouring frequencies, both in GSM 900 and GSM 1800. Modulation used is
41
GMSK. It also uses linear predictive coding (LPC). The purpose of LPC is to reduce the bit rate. The total number of carriers in GSM 900 is 124, whereas in GSM 1800 the number of carriers is 374. The devices in the Base Transceiver Station (BTS) that transmit and receive the radio signals in each of the GSM channels (uplink and downlink together) are known as Transceivers (TRX).
GSM System Architecture:
A GSM network can be divided into three groups: The mobile station (MS), the base station subsystem (BSS) and the network subsystem. They are characterized as follows: a. The mobile station (MS): A mobile station may be referred to as a handset, a mobile, a portable terminal or mobile equipment (ME). It also includes a subscriber identity module (SIM). Each SIM card has a unique identification number called IMSI (International Mobile Subscriber Identity). The SIM card contains the identification numbers of the user, a list of the services that the user has subscribed to and a list of available networks. In addition, the SIM card contains tools needed for authentication and ciphering and, depending on the type of the card, there is also storage space for messages such as phone numbers, etc.
42
In addition, each MS is assigned a unique hardware identification called IMEI (international mobile equipment identity). Besides providing a transceiver (TRX) for transmission and reception of voice and data, the mobile also performs a number of very demanding tasks such as authentication, handover, encoding and channel encoding. b. The base station subsystem (BSS): The base station subsystem (BSS) is made up of the base station controller (BSC) and the base transceiver station (BTS). GSM uses a series of radio transmitters called BTSs to connect the mobiles to a cellular network. Their tasks include channel coding/decoding and encryption/decryption. A BTS is comprised of radio transmitters and receivers, antennas, the interface to the PCM facility, etc. The BTS may contain one or more transceivers to provide the required call handling capacity. A cell site may be omni directional or split into typically three directional cells. A group of BTSs are connected to a particular BSC which manages the radio resources for them. Today's new and intelligent BTSs have taken over many tasks that were previously handled by the BSCs. The primary function of the BSC is call maintenance. The mobile stations normally send a report of their received signal strength to the BSC every 480 ms. With this information the BSC decides to initiate handovers to other cells, change the BTS transmitter power, etc. c. The network subsystem. The mobile switching center (MSC): It acts like a standard exchange in a fixed network and additionally provides all the functionality needed to handle a mobile subscriber. The main functions are registration, authentication, location updating, handovers and callrouting to a roaming subscriber. The signaling between functional entities (registers) in the network subsystem uses Signaling System 7 (SS7). If the MSC also has a gateway function for communicating with other networks, it is called Gateway MSC (GMSC). The home location register (HLR): It is a database used for management of mobile subscribers. It stores the international mobile subscriber identity (IMSI), mobile station
43
ISDN number (MSISDN) and current visitor location register (VLR) address. The main information stored there concerns the location of each mobile station in order to be able to route calls to the mobile subscribers managed by each HLR. The HLR also maintains the services associated with each MS. One HLR can serve several MSCs. The visitor location register (VLR): It contains the current location of the MS and selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. A VLR is connected to one MSC and is normally integrated into the MSC's hardware. The authentication center (AUC): It is a protected database that holds a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. The AUC provides additional security against fraud. It is normally located close to each HLR within a GSM network. The equipment identity register (EIR): The EIR is a database that contains a list of all valid mobile station equipment within the network, where each mobile station is identified by its international mobile equipment identity (IMEI). The EIR has three databases: White list: approved, error-free IMEIs, without restrictions. Black list: Unapproved or bad/stolen handsets. Grey list: for handsets/IMEIs that are uncertain. Operation and Maintenance Center (OMC): The OMC is a management system that oversees the GSM functional blocks. The OMC assists the network operator in maintaining satisfactory operation of the GSM network. Hardware redundancy and intelligent error detection mechanisms help prevent network down-time. The OMC is responsible for controlling and maintaining the MSC, BSC and BTS. It can be in charge of an entire public land mobile network (PLMN) or just some parts of the PLMN.
44
Physical Channels and Logical Channels: Time Division Multiple Access (TDMA) divides one radio frequency channel into consecutive periods of time, each one called a "TDMA Frame". Each TDMA Frame contains eight shorter periods of time known as "Timeslots". The TDMA timeslots are called "Physical Channels" as they are used to physically move information from one place to another. In GSM the logical channels can be divided into two types: •
Dedicated Channels
•
Common Channels
Logical Channels: There are twelve different types of Logical Channels, which are mapped into Physical Channels in the radio path. Logical channels comprise of Common Channels and Dedicated Channels. Common Channels are those, which are used for broadcasting different information to mobile stations and setting up of signaling channels between the MSC/VLR and the mobile station. LOGICAL LOGICAL CHANNELS CHANNELS Logical Channels COMMON COMMON CHANNELS CHANNELS
BROADCAST BROADCAST CHANNELS CHANNELS
FCCH FCCH
SCH SCH
DEDICATED DEDICATED CHANNELS CHANNELS
COMMON COMMON CONTROL CONTROL CHANNELS CHANNELS
SDCCH SDCCH
BCCH BCCH
PCH PCH
RACH RACH
45
TRAFFIC TRAFFIC CHANNELS CHANNELS
DEDICATED DEDICATED CONTROL CONTROL CHANNELS CHANNELS
AGCH AGCH
SACCH SACCH
FACCH FACCH
TCH/F TCH/F
TCH/H TCH/H
TCH/EFR TCH/EFR
Over the radio path, different type of signaling channels is used to facilitate the discussions between the mobile station and the BTS, BSC and MSC/VLR. All these signaling channels are called Dedicated Control Channels. Traffic channels are also Dedicated Channels as each channel is dedicated to only one user to carry speech or data. Broadcast Channels Base Stations can use several TRXs but there is always only one TRX, which can carry Common Channels. They contain general information about the network and the broadcasting cell. There are three types of broadcast channels: 1. Frequency Correction Channel (FCCH) FCCH bursts consist of all "0"s which are transmitted as a pure sine wave. This acts like a flag for the mobile stations, which enables them to find the TRX among several TRXs, which contains the Broadcast transmission. The MS scans for this signal after it has been switched on since it has no information as to which frequency to use. 2. Synchronization Channel (SCH) The SCH contains the Base Station Identity Code (BSIC) and a reduced TDMA frame number. The BSIC is needed to identify that the frequency strength being measured by the mobile station is coming from a particular base station. 3. Broadcast Control Channel (BCCH) The BCCH contains detailed network and cell specific information such as: frequencies used in the particular cell and neighbouring cells, channel combination, paging groups, etc. Common Control Channels Common Control Channels comprise the second set of logical channels. They are used to set up a point-to-point connection. There are three types of common control channels: 1. Paging Channel (PCH)
46
The PCH is a downlink channel, which is broadcast by all the BTSs of a Location Area in the case of a mobile terminated call. 2. Random Access Channel (RACH) The RACH is the only uplink and the first point-to-point channel in the common control channels. It is used by the mobile station in order to initiate a transaction, or as a response to a PCH. 3. Access Grant Channel (AGCH) The AGCH is the answer to the RACH. It is used to assign a mobile a Stand-alone Dedicated Control Channel (SDCCH). Additional information in the AGCH is the frequency hopping sequence. It is a downlink, point-to-point channel. Dedicated Control Channels Dedicated Control Channels compose the third group of channels. There are three dedicated channels. They are used for call set-up, sending measurement reports and handover. They are all bi-directional and point-to-point channels. 1. Stand-alone Dedicated Control Channel (SDCCH) The SDCCH is used for system signaling: call set-up, authentication, location update, and assignment of traffic channels and transmission of short messages. 2. Slow Associated Control Channel (SACCH) An SACCH is associated with each SDCCH and Traffic Channel (TCH). It transmits measurement reports and is also used for power control, time alignment and in some cases to transmit short messages. 3. Fast Associated Control Channel (FACCH) The FACCH is used when a handover is required. Traffic Channels (TCH) Traffic Channels are logical channels that transfer user speech or data, which can be either in the form of Half rate traffic (5.6 kbits/s) or Full rate traffic (13 kbits/s). Another form of traffic channel is the Enhanced Full Rate (EFR) Traffic Channel. The speech coding in EFR is still done at 13Kbits/s, but the coding mechanism is different than that
47
used for normal full rate traffic. EFR coding gives better speech quality at the same bit rate than normal full rate. Traffic channels can transmit both speech and data and are bidirectional channels.
Services provided by GSM: GSM is a multiservice system that allows various types of communication that can be distinguished by the nature of the transmitted information. Generally, based on the nature of the transmitted information, services can be grouped as speech services, where the transmitted data is speech and data services which cover the rest of the information types such as text, facsimile, etc. Also there are the following services: Basic Services, which are individual functions and may be automatically available and included in the basic rights of the subscriber as soon as he registers. Supplementary Services, which are extra services, those are not included as basic features, but are associated with the basic services by enhancing and/or adding extra features to the basic services. Teleservices: Speech (Telephony): The most important service for mobile systems, normal speech service, including emergency calls. Speech, Emergency calls: Emergency calls are possible automatically. Short message Service: For the reception and sending of Short messages. Group 3 Facsimile transmission (with alternate speech) Bearer Services: Bearer Services come into the picture when data transmission services are needed and there are a number of different types of data services available. The distinctions between these data services are based on the users (which can be connected to the PSTN, ISDN or
48
a PSPDN network) and the mode of transmission (packet or circuit switched, whether end-to-end digital or not, synchronous or asynchronous). The bearer services are used for data communication in a similar fashion as in the PSTN and are essentially used for data communication between GSM networks and PSTN. Since the PSTN network is designed for voice communication with a bandwidth of 3.1Khz, digital data has to be modulated with an audio frequency carrier in order to enable transmission via the PSTN. Thus it is necessary for the GSM users to be able to use this function while communicating with the PSTN. However, this is not easily realized in GSM networks because of the radio characteristics of the Air Interface. This interface is based on a special speech-coding algorithm that ensures the best quality with the lowest possible bit rate e.g. 13 kbits/s, which makes it incompatible for modem signals. Thus a GSM user will never need a modem for data communication. The connection between the mobile station and the GSM network is fully digital. Supplementary services: Supplementary
services
enhance
or
supplement
the
basic
telecommunication services. The same supplementary services may or may not be employed by a number of different basic services such as basic telephony or T62 automatic facsimile service. The following list covers most of the common services, as well as the essential supplementary services. Barring of all incoming calls Barring of all Incoming calls when roaming Barring of Incoming Calls when abroad Barring of outgoing calls Barring of outgoing International Calls Call forwarding on mobile subscriber busy Call forwarding on no answer 49
Call Hold Call Waiting Conference call
System features This section provides a brief description of the GSM network features. 1. Roaming: The roaming feature allows a user to make and receive calls in any GSM network and to use the same user-specific services worldwide. 2. Handover: In a cellular network, the radio and fixed voice connections are not permanently allocated for the duration of a call. Handover, or handoff as it is called in North America, means switching an ongoing call to a different channel or cell. The execution and measurements required for handover are a basic function of the RR protocol layer. There are four different types of handovers in GSM, which involve transferring a connection between: a. Channels (timeslots) in the same cell (intra-BTS handover) b. Cells under the control of the same BSC (inter-BTS handover). c. Cells under the control of different BSCs, but belonging to the same MSC (interBSC handover) d. Cells under the control of different MSCs (inter-MSC handover) Handovers can be initiated by either the BSC or the MSC (as a means of traffic load balancing). During its idle timeslots, the mobile scans the broadcast control channel of up to 16 neighboring cells, and forms a list of the six best candidates for possible handover, based on the received signal strength. This information is passed to the BSC and MSC, at least once per second, and is used by the handover algorithm. The decision on when to initiate a handover is a function of the following parameters: receive quality, receive level. Successful handovers in GSM can take place at propagation speeds of up to 250 km/h.
50
3. Frequency hopping: The mobile station has to be frequency-agile, meaning it can move between different frequencies in order to transmit and receive data, etc. A normal handset is able to switch frequencies 217 times per second. GSM makes use of this frequency agility to implement slow frequency hopping, where the mobile and the BTS transmit each TDMA frame on a different carrier frequency. The frequency hopping algorithm is broadcast on the broadcast control channel. Since multipath fading is dependent on the carrier frequency, slow frequency hopping helps alleviate the problem. In addition, co-channel interference is in effect randomized. The broadcast and common control channels are not subject to frequency hopping and are always transmitted on the same frequency. 4. Authentication: Authentication normally takes place when the MS is turned on with each incoming call and outgoing call. A verification that the »Ki« (security code) stored in the AuC matches the »Ki« stored in SIM card of the MS completes this process. The user must key in a PIN code on the handset in order to activate the hardware before this automatic procedure can start. 5. Frequency Reuse: There are a limited number of frequencies available to each Base Station Subsystem and they must be distributed between the cells to ensure a balanced coverage throughout the BSS. The frequencies have to be reused. If you do not distribute the frequencies properly throughout the network the result will be a high level of interference caused by overlapping frequencies. To avoid this, the GSM network includes a specification of the Frequency reuse patterns, one of which is presented in figure below.
51
6 7 3 4
•
1 5 9 6
7 3 4
•
6 8
•
4
5
•
3 4
6 7
1
•
2
3 8
9
•
7
•
8 1 5 9
2 6 7
3 4
•
•
•
6
4
5
•
5 9
3 8
1
2 7
1
•
8
•
•
2
•
2
• 8
1 5 9
2
9
Figure: Frequency reuse pattern example
The next step involves the dimensioning of the Location Areas. This is carried out according to the traffic characteristics of each area. The final phase is the dimensioning of the Fixed Network on the basis of the traffic requirements and dimensioning of the entire radio network.
52
CODE DIVISION MULTIPLE ACCESS Introduction: CDMA is a driving technology behind the rapidly advancing personal communications industry. Because of its greater bandwidth, efficiency, and multiple access capabilities, CDMA is becoming a leading technology for relieving the spectrum congestion caused by the explosion in popularity of cellular mobile phones, fixed wireless telephones, and wireless data terminals. Since becoming an officially recognized digital cellular protocol, CDMA is being rapidly implemented in the wireless communications networks of many large communications corporations. CDMA stands for "Code Division Multiple Access". It is a form of spread-spectrum, an advanced digital wireless transmission technique. Instead of using frequencies or time slots, it uses mathematical codes to transmit and distinguish between multiple wireless conversations. Its bandwidth is much wider than that required for simple point-to-point communications at the same data rate because it uses noise-like carrier waves to spread the information contained in a signal of interest over a much greater bandwidth. However, because the conversations taking place are distinguished by digital codes, many users can share the same bandwidth simultaneously.
CDMA CHANNELS:
53
CDMA logical channels: Many users share a common CDMA carrier. Each physical channel supports approximately 20 users with current technology. Each physical channel is divided into several logical channels by the Walsh functions (downlink) or the unique long code (uplink). Theoretically, on the downlink each physical channel can be divided into 64 logical channels using every Walsh function. However, interference begins to degrade user signals when more that 20 users share one IS-95 carrier. The logical channels can be broken down into two groups: •
Control Channels used for transmission of control and system setup information such as timing or synchronization and to pass control messages between the base station and mobile unit when the mobile unit is not on a traffic channel.
•
Traffic Channels used for transmission of user data (speech) once the mobile unit is in an active talking state. The traffic channel also passes associated signaling over the uplink and downlink once it is setup for a call.
IS-95 defines four control channels for CDMA. They are as follows: •
Pilot Channel (downlink) - The pilot channel helps mobile units to acquire the timing of the downlink traffic channel. One pilot channel is transmitted on each individual RF carrier. It uses the short code and Walsh code 0 to continuously transmit an all zeros (0's) signal for mobiles to lock onto. It provides a phase reference for coherent demodulation and provides a means for signal strength comparisons between base stations for determining handoff.
•
Sync Channel (downlink) - The sync channel is used by the mobile unit to acquire synchronization to the frames of information sent on the traffic channels. It also broadcasts important overhead information that all mobiles need to know
54
to successfully access the base station. Up to one sync channel is transmitted on each individual RF carrier using Walsh code 32. •
Page Channel (downlink) - The page channel is used for the transmission of control information from the base station to the mobile if the mobile is not currently using a traffic channel. For example, if the mobile has an incoming call, the base station will send the mobile a page message on an assigned page channel.
•
Access Channel (uplink) - The access channel is used by the mobile to send control messages and information to the base station if it is not currently using a traffic channel. It is used to gain access or register.
The Traffic Channels are used to send user data (speech) between the base station and the mobiles, along with signaling traffic. Four different rates are possible: Rate 1, Rate 1/2, Rate 1/4, and Rate 1/8. The downlink traffic channel is referred to as the forward traffic channel. On uplink it is called the reverse traffic channel. There are three types of associated signaling sent over the traffic channels: •
Blank-and Burst - all of the user speech or data in a frame is replaced by signaling or control information.
55
•
Dim-and-Burst - only part of the user speech or data in a frame is replaced by signaling or control information.
•
Power Control (downlink) - Every 1.25 milliseconds (or 800 times a second) two bits are inserted which allows the mobile to adjust its transmitted power ± 1 dB.
How CDMA works CDMA uses codes to convert between analog voice signals and digital signals. CDMA also uses codes to separate (or divide) voice and control data into data streams called "channels."
Generating a CDMA signal: There are five steps in generating a CDMA signal. √ analog to digital conversion √ vocoding √ encoding and interleaving √ channelizing the signals √ conversion of the digital signal to a Radio Frequency (RF) signal
Analog to digital conversion The first step of CDMA signal generation is analog to digital conversion, sometimes called A/D conversion. CDMA uses a technique called Pulse Code Modulation (PCM) to accomplish A/D conversion.
Voice Compression The second step of CDMA signal generation is voice compression. CDMA uses a device called a vocoder to accomplish voice compression. The term "vocoder" is a contraction of the words "voice" and "code."
56
Vocoders are located at the BSC and in the phone.
How compression works People pause between syllables and words when they talk. CDMA takes advantage of these pauses in speech activity by using a variable rate vocoder.
Variable Rate Vocoder 57
A CDMA vocoder varies compression of the voice signal into one of four data rates based on the rate of the user's speech activity. The four rates are: Full, 1/2, 1/4 and 1/8. The vocoder uses its full rate when a person is talking very fast. It uses the 1/8 rate when the person is silent or nearly so.
Vocoder types CDMA systems can use either an 8 kbps (kilobytes per second) or a 13 kbps vocoder. The earliest CDMA systems used the 8kbps vocoder to maximize capacity. The 13 kbps vocoder was later developed to provide a more land-line quality voice signal. The great improvement in quality was worth the slight reduction in capacity. Recently the CDMA community adopted a new 8 kbps vocoder. This new vocoder is usually referred to as the EVRC (Extended Variable Rate Coding). It combines the quality of 13 kbps vocoding with the capacity of the 8kbps data rate.
Encoding and interleaving Encoders and interleavers are built into the BTS and the phones. The purpose of the encoding and interleaving is to build redundancy into the signal so that information lost in transmission can be recovered.
How encoding works The type of encoding done at this stage is called "convolutional encoding." A simplified encoding scheme is shown here.
58
A digital message consists of four bits (A, B, C, D) of vocoded data. Each bit is repeated three times. These encoded bits are called symbols. The decoder at the receiver uses a majority logic rule. Thus, if an error occurs, the redundancy can help recover the lost information.
Burst errors A burst error is a type of error in received digital telephone signals. Burst errors occur in clumps of adjacent symbols. These errors are caused by fading and interference. Encoding and interleaving reduce the effects of burst errors.
How interleaving works Interleaving is a simple but powerful method of reducing the effects of burst errors and recovering lost bits. In the example shown here the symbols from each group are interleaved (or scrambled) in a pattern that the receiver knows. De-interleaving at the receiver unscrambles the bits, spreading any burst errors that occur during transmission.
59
Two kinds of codes
CDMA uses two important types of codes to channelize users. Walsh codes channelize users on the forward link (BTS to mobile). Pseudorandom Noise (PN) codes channelize users on the reverse link (mobile to BTS). Walsh codes Walsh codes provide a means to uniquely identify each user on the forward link. Walsh codes have a unique mathematical property--they are "orthogonal." In other words, Walsh codes are unique enough that the voice data can only be recovered by a receiver applying the same Walsh code. All other signals are discarded as background noise PN codes
60
Pseudorandom Noise (PN) codes uniquely identify users on the reverse link. A PN code is one that appears to be random, but isn't. The PN codes used in CDMA yield about 4.4 trillion combinations of code. This is a key reason why CDMA is so secure. Digital to Radio Frequency (RF) conversion The BTS combines channelized data from all calls into one signal. It then converts the digital signal to a Radio Frequency (RF) signal for transmission. Digital to analog conversion After the CDMA signal is transmitted, the receiver must reverse the signal generation process to recover the voice, as follows: 1. Conversion of RF signal to digital signal 2. Despreading the signal 3. Deinterleaving and decoding 4. Voice decompression 5. Digital to analog voice recovery
POWER CONTROL IN CDMA: THE NEAR-FAR PROBLEM: Let's assume there are two users, one near the base and one far from the base. The propagation path loss difference between these extreme users may be many tens of dB. In general, the strongest received mobile signal will capture the demodulator at the base station. In CDMA, stronger received signal levels raise the noise floor at the base station demodulators for the weaker signals, thereby decreasing the probability that weaker signals will be received. To help eliminate the "Near-Far Problem", CDMA uses power control. The base station rapidly samples the radio signal strength indicator levels of each mobile and then sends a power change command over the forward radio link. The purpose of this is so that the received powers from all users are roughly equal. This solves the problem of a nearby subscriber overpowering the base station receiver and drowning out the signals of far away subscribers. An extra benefit is extended battery life. That is, when a mobile unit is close to a base station, its power output is lower. In other words, the mobile unit transmits only at the power necessary to maintain connection. 61
Handoffs in CDMA The act of transferring support of a mobile from one base station to another is termed handoff. In other words, Handoff occurs when a call has to be handed off from one cell to another as the user moves between cells. In a traditional "hard" handoff, the connection to the current cell is broken, and then the connection to the new cell is made. This is known as a "break-before-make" handoff. Since all cells in CDMA use the same frequency, it is possible to make the connection to the new cell before leaving the current cell. This is known as a "make-before-break" or "soft" handoff. Soft handoffs require less power, which reduces interference and increases capacity. The implementation of handoff is different between the narrowband standards and the CDMA standards.
corDECT Wireless Access System Introduction: corDECT Wireless in Local Loop System is based on Digital Enhanced Cordless Telecommunications (DECT) standard of European Telecommunications standards Institute (ETSI) which was initially designed for the use of cordless telephones. corDECT wireless access system provides telephone and internet service to the subscriber. The distance between the subscriber unit and the base station is rated at 2 to 3 km. A relay base station can be used to extend the distance further.
62
The CBS is connected to DIU normally using three twisted pair wires which carry signal as well as power from DIU to CBS. Alternatively it can be connected to DIU through BSD (base station distributor). BSD is connected to DIU through standard E1 interface. For long range communication a WS-IP or WS can also be connected to CBS using a two hop DECT wireless link, one between WS-IP and Relay Base Station and other one between Relay Base Station (RBS) and Compact Base Station (CBS). The range supported between a CBS and RBS is 25 km.
System Architecture: The CorDECT system is designed to provide a cost effective wireless high quality voice and data connection in dense urban as well as sparse rural areas. The system enables wireless subscriber to be connected to the PSTN in a cost effective manner. The following are the basic parts of corDECT system: Dect Interface Unit (DIU) Compact Base Station (CBS) Relay Base Station (RBS) Base Station Distributor (BSD)
1. DECT INTERFACE UNIT (DIU): The DIU is a DECT exchange for Wireless subscriber and provides an interface to a public Switched Telephone Network (PSTN). Its important functions are such as call processing, CBS powering and PCM transcoding. System operation and Maintenance (O&M) and remote fault monitoring can be performed from the DIU or alternatively from a remote location using the Network Management System. The DIU is the heart of the system and supports upto 1000 subscribers through 20 bases stations and is a fully redundant switch.
63
The interface to the PSTN is via E1 digital links. Interface for connecting upto 6 E1 lines are provided. With 4 E1 lines, the system can typically cater to about 1000 subscribers with 0.1 Erlang per subscriber and a Grade of Service of 1%. An optional subscriber MUX (SMUC) unit in the DIU converts the E1 interface to 30 junction lines, which can be connected to two-wire subscriber lines of an exchange. The DIU consists of between three to six standard sub-racks in one or two cabinets depending on the corDECT system configuration. All critical cards have a standby so that system availability is ensured in case of failure. The system is powered by 48V power supply. E1 link(s)
-48V Power Supply
Alarm Panel
BSNL
The DIU has got many cards to perform various functions. Each DIU has 5 BIMC cards. Each BIMC card controls 1 site. Each BSD is controlled by a BIMC card. Each DIU has 20 BUIC (Base Station U-Interface Controller) cards. Each BUIC card controls 1 CBS.
64
Expansion Sub-rack 0
Main Subrack
Expansion Sub-rack 1
BI BU BU
PI
C L C K
C L C K
S W C H
PI
S W C H
BI BU BU
BU
BU
T O C N
BU
BI BU
BU BU
T O C N
PI
PI
BU
BI BU
BU BU
PI
BU
PI
BI BU
BU BU BU
P W R F
P W R F
P W R F
BU
PWRF is the Power Supply Card. There are three PWRF cards in load sharing mode. Maximum of two cards can supply required power under full load. They have -48 V Input & 5V Output. SWCH (SWitCH or Central Switching and Control Card) Card is the heart of DIU. It communicates/co-ordinates the cards through PCM Streams. Clock Card: It generates common clock pulses (20 MHz Crystal Oscillator). BUIC - Base Station (U Interface) Controller provides power to the base-station as well as links CBS through 3 twisted pair copper wires. Alarm Panel: It operates on -48V and displays critical and major alarms. OMC PCs: There are two OMC PCs to provide redundancy. They work on operating platform of Linux. They support tape drive for taking backup of billing files, log files and also support online diagnosis of the status of all the cards. There are two PCs, one is active and the other is passive. The active controls the current calls while the passive takes data from the active on a daily basis. If active goes down, then the work is shifted to passive. The active is then rescued using Linux Rescue using the linux commands.
65
2. COMPACT BASE STATION (CBS): It provides wireless access in an area and supports twelve simultaneous full duplex channels. The CBS is a small unobtrusive pole mounted or wall mounted unit. Each CBS serves one cell providing upto 12 simultaneous speech channel gain of the handset. Typically it ranges from 150m-5kms. The CBS has two antennas for diversity. A direction antenna with significant gain can be used when coverage required is either confined to certain directions, or the coverage area is divided into sector covered by different CBSs. Otherwise an omni-directional antenna could be used. The CBS is interfaced to the DIU using 3 standard subscriber pair from the existing loop plant. The pairs also supply power to the CBS from the DIU. The maximum distance between CBS and DIU is 4kms. with 0.4 mm dia copper twisted pairs. Alternatively the CBSs are interfaced the DIU through the base station distributor (BSD) unit. In this case, the BSD is connected to DIU with an E1 link using radio or fiber and CBS are connected to the BSD using three pairs of twisted pair copper able each of which carries both the power as well as signal to the CBS. The maximum distance between CBSW and BSD is 1km when 0.6mm twisted pair copper cable is used. 3. RELAY BASE STATION (RBS): For coverage in large areas, two wireless links are used. An RBS is mounted between CBS and Wallset-IP. Thus one wireless link is between WS-IP and RBS and the other between RBS and CBS. An RBS can handle 11 calls simultaneously. It has two units:
RBS Air Unit (mounted on a tower and has baseband and RF subsystems).
RBS Ground Unit (supplies power and provides maintenance support and is mounted at the bottom of the tower.
An RBS Air Unit has three antennas: o
Directional Antenna with high gain (towards the serving CBS).
o
Two antennas for diversity (for communication with subscriber units).
66
4. BASE STATION DISTRIBUTOR (BSD): The base station distributor is an optional unit used when a cluster of the CBSs are to be located some distance away from the DIU. The BSD is connected to the DIU on E1 lines & each E1 line carries signals for four CBSs. The BSD demultiplexes the signal on the E1 line and fides it to the four CBS. The four CBS are connected to the BSD each using 3 pairs of 0.6mm twisted pair copper wires. The maximum distance supported is 1km. The copper wires carry both power and signals from BSD to CBS. The health of the BSD as well as the CBSs can be upgraded from the DIU. One base station distributor can support upto 4 CBS. Interface between the DIU and BSD is E1 interface which can be copper fiber or radio.BSD is designed to extend CORDECT coverage to the subscribers away from DIU.
Asynchronous Digital Subscriber Line (ADSL) It is a high speed replacement for modem or ISDN adapter that allows us to access the internet faster. It is a transmission technique used on the line from modem to the service provider.
67
It is called Asymmetrical since the speed of transmission is not the same in both directions. A small amount of data sent by the customer can result in the receipt of a large amount of data from the internet. ADSL modems operate on a bit stream and are intended for carrying digital information between digital equipment such as PCs. Hence the word Digital is used. ADSL itself operates over the subscriber’s normal telephone line to the local exchange. The telephone line can continue to be used for voice calls through the use of devices called ‘Splitters’ that separate the data and voice on the line. Thus the nameAsynchronous Digital Subscriber Line. How does ADSL work? ADSL exploits the unused analogue bandwidth that is potentially available in the wires that run from the user premises to the local exchange. This wiring was designed to carry that portion of the frequency spectrum that is occupied by normal speech. The wires can, however, carry frequencies above this rather limited spectrum. This is the portion that ADSL uses.
68
A comparison of ADSL with PSTN & ISDN: 1. PSTN and ISDN are dial-up technologies. •ADSL is 'always-on'. •ADSL is un-metered and charged at a flat-rate. 2. PSTN and ISDN allow you to use fax, data, voice, data to the Internet, data to other devices. •ADSL is just about data to the Internet. 3. PSTN and ISDN allow you to choose the Internet Service Provider you want to use. •ADSL connects you to a pre-defined ISP. 4. ISDN runs at 64kbps or 128kbps. •ADSL can potentially download at 8Mbps. •Many home ADSL services are provided at around 512kbps. 5. PSTN stops you using your phone. •ADSL allows you to surf and phone at the same time.
ADSL Components: PC
ADSL
Local Loop
Modem
Service Provider
Figure: Components of ADSL.
69
Internet
1. ADSL Modem: ADSL modem is connected to the telephone wiring (called the 'local loop') that connects you to the local exchange equipment. The ADSL modem uses a combination of several advanced signal processing techniques in order to achieve the required throughput speeds on ordinary telephone wiring at distances up to several miles from the local exchange. ADSL works by implementing many modems in parallel, each of which uses its own slice of the available bandwidth. ADSL uses many individual modems working in parallel to exploit maximum bandwidth and deliver very high speed. ‘Local Loop’ is the term applied to the ordinary telephone wires that go from a user's premises to the telephone company. It is only on the local loop that ADSL communications actually take place. 2.
Service Provider: The service provider has three important components:
•DSLAM - DSL Access Multiplexer •BAS - Broadband Access Server •ISP - Internet Service Provider 1. The DSLAM is the piece of equipment at your local exchange that is at the other end of your ADSL connection. It houses a bank of ADSL modems on one side and has a single fibre-optic data connection on the other. The DSLAM consolidates a number of ADSL user connections onto a single fibre connection. This fibre will normally be connected to a Broadband Access Server or BAS. 2. The Broadband Access Server (BAS) is the piece of equipment that sits between the DSLAM at the telephone exchange and the ISP that connects you to the Internet. A single BAS will probably handle connections from several DSLAMs. The purpose of the BAS is to unwrap the various protocols inside which your data travels over the ADSL connection. 3. The Broadband Access Servers are connected to an Internet Service Provider or ISP. This is the place where your connection to the Internet is made. The ISP usually provides other services like mail and news servers, and may cache frequently-used pages from the Internet so that you can access them more quickly.
70
How do voice and data co-exist in ADSL? If you are surfing the Internet using an ADSL modem, then a telephone call can still be made on the same line. Splitters that separate the high frequencies used by ADSL from the low frequencies used by voice are situated at each end of the local loop. At your end of the connection, the low frequencies go to your phone and the high frequencies go to your ADSL modem. At the local exchange, the low frequencies go to the normal telephone network while the high frequencies go to the service provider.
IP Addressing An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address can be private - for use on a local area network (LAN) - or public - for use on the Internet or other wide area network (WAN). IP addresses can be determined statically (assigned to a
71
computer by a system administrator) or dynamically (assigned by another device on the network on demand). An IP address consists of 32 bits of information. These bits are divided into four sections, referred to as octets or bytes, each containing 1 byte (8 bits). Octets can take any value between 0 and 255. An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private uses by Internet standards groups. These private IP address ranges exist: 1. 10.0.0.0 through 10.255.255.255 2. 169.254.0.0 through 169.254.255.255 3. 172.16.0.0 through 172.31.255.255 4. 192.168.0.0 through 192.168.255.255 Private IP addresses are typically used on local networks including home, school and business LANs including airports and hotels. Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. Instead, access to such devices must be brokered by a router or similar device that supports Network Address Translation (NAT). NAT allows an Internet Protocol (IP) network to maintain public IP addresses separately from private IP addresses. NAT allows computers on the home LAN to share a single Internet connection. Additionally, it enhances home network security by limiting the access of external computers into the home IP network space.
Classes of Network Address: The IPv4 address space can be subdivided into 5 classes - Class A, B, C, D and E. Each class consists of a contiguous subset of the overall IPv4 address range. Class A B
Leftmost bits 0xxx 10xx
Start Address 0.0.0.0 128.0.0.0
72
Finish Address 127.255.255.255 191.255.255.255
C D E
110x 1110 1111
192.0.0.0 224.0.0.0 240.0.0.0
223.255.255.255 239.255.255.255 255.255.255.255
Ranges of different classes: Class A: If the first octet of the IP address is in the range 0 to 127, both inclusive. Class B: If the first octet of the IP address is in the range 128 to 191, both inclusive. Class C: If the first octet of the IP address is in the range 192 to 223, both inclusive. Classes D and E: The addresses between 224 and 255 are reserved for Class D and E networks. Class D (224-239) is used for multicast addresses and Class E (240-255) for scientific purposes. 8 bits
8 bits
8 bits
8 bits
Class A
NETWORK
HOST
HOST
HOST
Class B
NETWORK
NETWORK
HOST
HOST
Class C
NETWORK
NETWORK
NETWORK
HOST
Class D
MULTICAST
Class E
RESEARCH
RECOMMENDATIONS It is recommended that the following changes be made on the basis of the studies: Since more and more customers are using internet nowadays, so it becomes necessary to provide good internet services to them. The services must be reliable and at good speeds.
73
The systems used for wireless telephony like BSC, BTS must be reliable. They must be checked for faults frequently. The network of wireless services should be good. The wireline services provided must also be reliable.
REFERENCES Technical Manuals of network devices’ manufacturers - Huawei, UTStarcom, Dellcron. www.wikipedia.org www.huawei.com 74
www.dellcron.com www.google.com
75