+ All Categories
Home > Documents > Bsnl Training Report (2)

Bsnl Training Report (2)

Date post: 28-Oct-2014
Category:
Upload: shahid-siddiqui
View: 214 times
Download: 16 times
Share this document with a friend
Popular Tags:
118
INDEX 1. Telephone Exchange 2. CDOT 3. PCM, Signaling And Multiplexing 4. OFC Communication System 5. GSM 6. CDMA 7. BROAD BAND 8. INTERNET 9. Wi-Fi 10. Wi-Max 11. NGN 12. microwave 1
Transcript
Page 1: Bsnl Training Report (2)

INDEX

1. Telephone Exchange

2. CDOT

3. PCM, Signaling And Multiplexing

4. OFC Communication System

5. GSM

6. CDMA

7. BROAD BAND

8. INTERNET

9. Wi-Fi

10. Wi-Max

11. NGN

12. microwave

1

Page 2: Bsnl Training Report (2)

TELEPHONE EXCHANGE

INTRODUCTION

The main function of an exchange is to process call from a calling subscriber and make the

connection to the called subscriber. This connection can be direct or via another exchange.

This requires all parts of the exchange to work as a unit to ensure the call is properly handled.

CALL PROCESSING ARCHITECTURE

The main function of the exchange is to process subscriber calls. The exchange does this by

connecting an incoming line or trunk to another line or trunk.

However call processing involves much more than simply connecting subscribers. In order to

process the calls the exchange must perform four basic switching function.

Supervision:

Detects and reports service requests, acknowledgements and requests to terminate

service.

Signaling:

Transmits information about lines and trunks and information about other aspects of

call handling to control switching equipment.

Routing:

Converts address information to the location of the corresponding call line or to the

location of a trunk on the way to that line.

Alerting.

Notifies a subscriber of incoming calls.

BASIC CALL TYPES

Subscriber calls are grouped in to categories that distinguish one call from another. These

categories are referred to as call types. The basic call types are

Intra exchange calls: - these are calls between two subscribers served by the same

exchange. These calls are normally line to line calls.

2

Page 3: Bsnl Training Report (2)

Inter exchange calls: - these are calls that involve two or more exchanges. Within a

given exchange there are different types of inter exchange calls.

An outgoing call is a call that goes out of the exchange via a trunk. If the call originated in the

same exchange, it is called an originating outgoing call.

An incoming call is a call that comes into the exchange via a trunk. A tandem call is a call that

comes into the exchange on one trunk and leaves the exchange on another trunk. Thus a

tandem call is both incoming and outgoing.

CALL PROCESSING STAGES

An intra exchange call which is the simplest of the call types mentioned above, progresses

through four basic stages :

FIG.BASIC CALL SAGES INTRA EXCHANGE CALL

Idle

Digit reception and analysis

Ringing talking

3

Page 4: Bsnl Training Report (2)

Inter exchange calls are more complex, and their call processing stages are somewhat

different.

SERVICE CATEGORY

Residence and business subscriber services: - Example of this category are individual,

2-party and multiparty lines, abbreviated dialing, call waiting, 3-way calling all

diversion, call barring and multi line hunting.

Extended business services: - Examples of these services are PBX, indirect inward

dialing and toll diversion.

Public safety services: - Examples of this category are basic emergency service, out

going call trace, and in-progress call trace and in progress call trace.

Miscellaneous local system services: - it like loop-range services, integrated and

universal pair gain interface and line signaling.

Inter exchange services: - Various inter exchange signaling types.

Call processing services: - Generalized screening, digit interpretation timing, routing

and remote switching modules.

4

Page 5: Bsnl Training Report (2)

Toll services: - Toll exchange trunks, auxiliary service trunks, and operator trunks. Of

termination: trunk and line. The trunk termination involves selecting an idle member

in the trunk group and out pulsing the received digits. For a trunk, the particular

selected trunk group, the no. of members in the trunk group and the digits to be out

pulsed and the way the trunk group is selected, are of utmost importance.

The line termination involves checking to find whether the line is busy and applying

rin2ging to the line.

DESCRIPTION OF VARIOUS BLOCKS

(i)DP (Distribution Panel)

Distribution point box commonly know as D.P. box is a terminal arrangement where under

ground cable pairs are connected to overhead wires or drop wires for providing connections at

subscribers premises.

It is a cast iron box with a facility for termination of distribution cable on pins fitted on an

insulating plate. The distribution cable pairs can be connected to these pins by soldering at the

rear. The overhead wires are connected by means of screwing nuts provided on the front side

of insulating plate.

Types of D.Ps.

There are two types of D.Ps. suitable for external/internal use. These are called internal D.P.

and external D.Ps. and are generally available in 10 or 20 pair sizes.

Location of D.Ps.

External D.Ps. are fitted on posts by means of suitable size of U backs. Internal D.Ps. are

fitted in side buildings on the wall at suitable location. In case of multi storied buildings

where the telephone demand is very high, the distribution cables or some times even the

primary cabled are terminated on distribution frames at suitable location, from where the

distribution cables of 20 pairs or 10 pairs sizes are taken to different floors or block and

terminated on 10 or 20 pair subs D.Ps. Individual wire are further provided from the subs

D.Ps. to the location of the telephone.

(ii)Pillar

5

Page 6: Bsnl Training Report (2)

Pillar is fabricated from steel or cast from casings enclosing a frame-work on which cable

terminal boxes are mounted. The term "pillar" is used with reference to a flexibility point

where MDF's cables and DP's cables are interconnected.

(iii)MDF (Main Distribution frame)

The Subscriber's lines enter an exchange through a number of large capacity U/G cables, each

of which serves a different part of the exchange area. The numbers given to the subscriber's

lines do not bear any relationship to the geographical location of the subscriber. Hence, the

exchange numbers included in any one cable are entirely haphazard. Moreover, as subscribers

cease to have telephones and new subscribers are connected, the exchange numbering of the

external cable pairs is constantly changing. On the other hand, all lines within the exchange

are in strict numerical order. It is, therefore, necessary that some means must be provided for

temporary connection between the two. This conversion from the geographical order of the

external pairs to the numerical order within the exchange is carried out on a main distribution

frame. MDF is separately explained in another section

(iv)Exchange

Card is a basic functional unit of the exchange. Various cards are utilized for various purposes

e.g. Subscriber cards are utilized for termination of subscriber's cables coming from MDF.

(v)PCM

Various subscriber's cables coming out from the subscriber's cards (After processing) are

terminated into the DDF (Digital Distribution Frame) located inside PCM in between these

two PCM tag block is there, which provide connectivity between these two. Various DDF's

cables combine together and terminated into the OFC module (which is combination of

electrical to light converter (Multiplexer and Demultiplexer). PCM is separately explained in

another section.

MAIN DISTRIBUTION FRAME

INTRODUCTION

To obtain flexibility in interconnecting, external line plants and the exchange equipment and

between different circuits in the exchange itself, certain arrangements is made by the use of

iron frames. These iron frames are called main distribution frames, intermediate distributions

6

Page 7: Bsnl Training Report (2)

frames or combined main and intermediate distribution frames, depending upon their

functions.

MAIN DISTRIBUTION FRAME (M.D.F.)

The subscriber’s line enter an exchange through a number of large capacity cables, each of

which serves a different part of the exchange area. The numbers given to the subscriber’s

lines do not bear any relationship to the geographical location of the subscriber. Hence the

exchange numbers include in any one cable are entirely haphazard. Moreover, as subscribers

cease to have telephones and new subscribers are connected, the exchange numbering of the

external cable pairs is constantly changing. On the other hand, all lines within the exchange

are in strict numerical order. It is, therefore, necessary that some means must be provided for

temporary connection between the two. This conversion from the geographical order of the

external pairs to the numerical order within the exchange is carried out on a main distribution

frame.

FACILITIES PROVIDED BY M.D.F.

The M.D.F. provides for the following requirements:

A means for permanently terminating the external cables.

For mounting the protective devices connected to the incoming circuits.

Providing the connection between the exchange side and the line side by the jumpers.

An interception point for use in connection with fault locating tests.

7

Page 8: Bsnl Training Report (2)

Main distribution frame is mainly divided in two parts.

(1) Vertical Side or Line side

(2) LEN side or Exchange side

VERTICAL SIDE

All the part from vertical side to the subscriber are generally called outdoor section.

1 vertical has 10 tag block.

Each tag block has 10 rows and each row has 10 tags. So each tag block has 100 tags.

Connection between vertical side & subscribers are provided by jelly filled cables.

This wires are first terminated in cabinet box, then according to requirements the

group of the wires (e.g. 200 wires, 100 wires etc.) are terminated in pillar box & from

here connections are given to the subscribers via DP box.

LEN SIDE

All the parts from LEN to the exchange is called indoor section.

The connection of subscriber from exchange is terminated on this side of MDF.

In 1 tag block there are 128 tags. Each tag block is divided in 4 segments. That is 0, 1,

2 & 3 and in each segments. There are sixteen tags.

On the vertical side there is 100 tag in one vertical tag block where as on the LEN side

there is 128 tags on each LEN block. The reason for this difference is that there is

always a reserve of spare capacity in the external cables to cover fluctuations in the

8

Page 9: Bsnl Training Report (2)

distribution of the subscribers lines as between the different localities served by the

cables.

DIFFERENT TYPES OF FAULTS

The faults are given below which are established in communication of subscriber with

exchange.

LOOP FAULT:-If two wires are joined together because of improper connection, storming

air etc. then this type of fault occur.

EARTH FAULT:-If two wires get scrape at some places and if this wire comes in contact

with tree, pillar or any metal objects then this type of fault occurs.

CABLE FAULT:-For outdoor connections, jelly filled wires are used which are affected by

natural causes such as rain, earthquake etc. At such time this fault occurs.

DISCONNECT FAULT:-This type of fault occurs due to the breaking of wires between the

vertical side & LEN side.

LOCATION OF FAULTS:-This can be determined by putting pack up. If pack up is put in

one of the tag of LEN side and if dial tone is received only upto the LEN side then fault is in

the outdoor side and if tone is received from the subscriber only upto the vertical side then

fault is in the indoor side. This faults are also identify by either subscriber line tester or by

using the computerized programme.

PROTECTIVE DEVICE USED ON M.D.F.

Fuses

These are the devices used to protect apparatus and wiring from excessive currents. A fuse is

a small length of thin wire which melts if there is an excess of current and disconnect the

9

Page 10: Bsnl Training Report (2)

equipment before possible damage. The rated current of fuse is the maximum current which it

can carry without melting or fusing.

The types of fuses used for connecting line to equipment are:

Glass type

Gate type

GAS DISCHARGE TUBE (GD TUBE)

In case of heavy lighting discharges or induction of high voltages, gas discharge protectors are

used as protective device to protect the communication lines and equipments from damages

due to high voltages. The gas discharge protector essentially consists of two of three tungsten

electrodes sealed in a special glass envelope or ceramic envelop[e containing a mixure of inert

gases , mainly neon. In case of three pin G.D. tube, Two of the electrodes are for connections

to the lines and third is the earth electrode and in case of two pin device, one electrode is

connected to a limb of a line and other electrode is connected to earth. If the potential

difference across the electrodes rises to a certain critical value, the gas is ionized and becomes

conducting. This condition will continue till the potential difference across the electrodes falls

to the extinction voltage value.

For voltages less than striking value, it will not conduct. For normal operating voltages on the

lines, it offers extremely high impedance and thus does not introduce any transmission loss.

APPLICATIONS

a) MDF mainly provide connection between outdoor and indoor.

b) MDF is basically the protection system for exchange.

c) It uses Fuse as a protection device which prevents to reach the high current from

outside to exchange.

d) It uses Gas Discharge Tube (GD Tube) which provide protection against high

excessive voltage.

10

Page 11: Bsnl Training Report (2)

C-DOT MAX-XL

1.1 The C-DOT DSS Family

C-DOT DSS MAX is a universal digital switch which can be configured for different

applications as local, transit, or integrated local and transit switch. High traffic/load handling

capacity up to 8,00,000 BHCA with termination capacity of 40,000 Lines as Local Exchange

or 15,000 trunks as Trunk Automatic Exchange, the C-DOT DSS family is ideally placed to

meet the different requirements of any integrated digital network. The design of C-DOT DSS

MAX has envisaged a family concept. The advantages of family concept are standardized

components, commonality in hardware, documentation, training, installation and field support

for all products and minimization of inventory of spares. In fact this modular design has been

consciously achieved by employing appropriate hardware, software, and equipment practices.

The equipment practices provide modular packaging. Common cards and advanced

components have been used in the system hardware in order to reduce the number and type of

cards. Standard cards, racks, frames, cabinets and distribution frames are used which facilitate

flexible system growth. Interconnection technology has been standardized at all levels of

equipment packaging. All these features, together with ruggedised design, make C-DOT DSS

MAX easy to maintain and highly reliable.

1.2. BASIC GROWTH/BUILDING MODULES

C-DOT DSS MAX exchanges can be configured using four basic modules

11

Page 12: Bsnl Training Report (2)

Base Module

Central Module

Administrative Modulei)

BASE MODULE

The Base Module (BM) is the basic growth unit of the system. It interfaces the external world

to the switch. The interfaces may be subscriber lines, analog and digital trunks, CCM and

PBX lines. Each Base Module can interface upto 2024 terminations. The number of Base

Modules directly corresponds to the exchange size. It carries out majority of call processing

functions and, in a small-exchange application, it also carries out operation and maintenance

functions with the help of the Input Output Module.

In Single Base Module (SBM) exchange configuration, the Base Module acts as an

independent switching system and provides connections to 1500 lines and 128 trunks. In such

a configuration, the Base Module directly interfaces with the Input Output Module for bulk

data storage, operations and maintenance functions. Clock and synchronization is provided by

a source within the Base Module. It is a very useful application for small urban and rural

environments. With minimum modifications in hardware through only one type of card, a

Base Module can be remotely located as a Remote Switch Unit (RSU), parented to the main

exchange using PCM links.

CENTRAL MODULE

Central Module (CM) consists of a message switch and a space switch to provide inter-

module communication and perform voice and data switching between Base Modules. It

provides control message communication between any two Base Modules, and between Base

Modules and Administrative Module for operation and maintenance functions. It also

provides clock and synchronization on a centralized basis.

ADMINISTRATIVE MODULE

Administrative Module (AM) performs system-level resource allocation and processing

function on a centralized basis. It performs all the memory and time intensive call processing

support functions and also administration and maintenance functions. It communicates with

the Base Module via the Central Module. It supports the Input Output Module for providing

12

Page 13: Bsnl Training Report (2)

man- machine interface. It also supports the Alarm Display Panel for the audio-visual

indication of faults in the system.

1.3. SYSTEM FEATURES

1.3.1 GENERAL FEATURES

This section includes system features related to the CTOD DSS MAX. They are:

TYPES OF SERVICES

The CDOT DSS of different capacities can be put to use at various switching nodes in the

telecommunication network.

MAX

Main Automatic Exchange MAX is expandable to large capacities of order of 2000 lines or

beyond. The MAX may have Remote Modules (RM) and Remote Line Concentrators (RLC)

connected to it.

RAX

Rural Automatic Exchange (RAX) is a small exchange and is expandable upto 2000 lines

capacity. Single Base Module configuration (i.e. CDOT SBM RAX with or without

concentration) comes under the RAX category.

TYPE OF SYSTEM

The system is Stored Programme Controlled (SPC) which makes it possible to work in

attended/non-attended type of working environment.

TYPE OF NETWORK

The switching network within the system is 4-wire digital.

TYPE OF COMPONENTS

The different type of components used includes integrated circuits, miniature relays, PCB, etc.

The connecting scheme between various modules emphasis connectorised hardware.

NORMAL LINE

13

Page 14: Bsnl Training Report (2)

Line resistance including subscriber’s instrument may go upto 1200 ohms for which

minimum 30 mA loop current is guaranteed. Insulation resistance between (‘a’ wire or ‘b’

wire) and ground or between ‘a’ and ‘b’ wires may be as low as 20K ohms.

1.3.2 LINE SERVICE FEATURES

This section relates to various types of lines that the exchange can cater to, and briefly,

services offered to such lines.

ORDINARY LINE

A subscriber may have an ordinary telephone instrument connected to his/her line.

COIN TELEPHONE (CCB LINE)

The system provides a service by means of a special telephone permitting outgoing calls after

insertion of adequate coin(s) or token(s) and incoming calls without payment. The two classes

of service are:

Local-calls within Unit Fee Zone (UFZ) can be made from coin collection box telephone.

STD – from STD coin box telephones, the STD calls and calls to some special services are

permitted (Not available presently).

14

Page 15: Bsnl Training Report (2)

15

SYSTEM

ARCHITECTURE

Page 16: Bsnl Training Report (2)

2.1 CDOT SYSTEM CAPACITY

2.1.1 INTRODUCTION

The capacity of C-DOT DSS is defined in terms of the following parameters:

• .The termination capacity expressed as the number of lines and trunks

• The amount of traffic (in Erlangs) that can be switched

• The number of Busy Hour Call Attempts (BHCA) that can be processed with a given call-

mix while meeting the overall service quality requirements

This section indicates the maximum capacity of different system elements as well as that of

complete exchange, equipped to its ultimate termination capacity. It has been ensured that the

specified parameters are valid to meet overall reliability objectives for the C-DOT DSS as

specified in ITU-T recommendations.

2.1.2. TERMINATION CAPACITY

A Terminal Card is the basic system element. It interfaces/ terminates the lines and trunks.

The next higher element is a Terminal Unit. The types of terminal cards and terminal units

used in C-DOT DSS along with its functions are explained in H/W description. Termination

capacity of a BM is 488 analog terminals and that of LM is 768 analog terminals. A BM can

be concentrated with 2 LMs to provide maximum termination capacity of 2024 analog lines.

In case of a BM, a maximum of 256 B- channels can be provided for ISDN terminations at the

cost of 128 analog lines. In its maximum configuration of one BM and 2 LMs with

termination capacity of 2024 analog lines, 256 B-channels are provided at the cost of 512

analog lines. One to one replacement of B-channels is planned in immediate future.

Base Module and Line Module are the highest level of system elements Each Base Module

has four Terminal Units whereas a Line Module has six Terminal Units.

A maximum of 16 BMs can be connected in MAX-L and 32 BMs can be connected in MAX-

XL configurations.

Table2.1 summarises the termination capacities of the various system elements of CDOT

DSS MAX.

2.1.3 EXCHANGE CONFIGURATIONS

C-DOT DSS MAX can be configured to support any combination of lines and trunks. For

different applications in the network as Local Exchange, Local cum Tandem Exchange. Trunk

Automatic Exchange (TAX) or Integrated Local cum Transit (ILT) Exchange.

16

Page 17: Bsnl Training Report (2)

In its maximum configuration, upto 40,000 lines and 5.500 trunks are supported when

configured as Local/Local cum Tandem. When configured as TAX, 14,500 trunks are

supported.

Table 2.1Termination Capacity of System Elements

Sl System Element Termination Capacity

1 Termination Cards (TC):

A Analog Line CardLCC – 8 Analog Subscribers

CCM – 8 CCB subscribers with last two ports

supporting 16-kHz metering pulsesB Analog Trunk Card TWT/ EMF – 8 Trunks

C A set of DTS/DTC Cards One 2-Mbps E-1 link as CAS/CCS trunks

D #7 PHC Card (SHM) 8 Protocol Handlers/ Signalling Links

E ISDN-BRI Card 8 BRI (2B+D) Interface i.e. 16 B-channels

F ISDN-PRI Card One PRI (30B+D) Interface i.e. 30 B-channels

2 Terminal Unit (TU):

A Analog TU (ATU)16 Analog Terminal Cards (LCC/ CCM/ TWT/

EMF) to support any combination of Lines &

Trunks in multiple of 8 terminationsB Digital TU (DTU) Four 2-Mbps E-1 links as CAS/ CCS7

C #7 Signalling Unit Module

(SUM)

64 Nos., #7 Protocol Handlers/signalling links

D ISDN Terminal Unit (ISTU) 256 Bearer Channels to be configured as BRI,

PRI or any combination3 Base Module (BM):

A Base Module (Line)480 Analog Subscribers. A maximum of 256

B-Channels for ISDN interface can be

provided at the cost of 128 subscriber lines.

B Line Module (LM)768 Analog subscriber lines. A maximum of

two LMs connected with BM supports 2024

lines.C BM (Analog Trunks) 488 Analog Trunks

D BM (Digital Trunks) Fifteen 2-Mbps E-1 links as CAS/ CCS7

E BM (Analog + Digital) Three possible configurations as 360 AT+ 4

PCMs/ 232 AT+ 8 PCMs/ 104 AT+ 12 PCMs

17

Page 18: Bsnl Training Report (2)

Table-2.2

Termination Capacity of Exchange Configurations

Sl Exchange Configuration Termination Capacity

1 Single Base Module (SBM)1,500 Lines & 128 Trunks. The trunks can be

analog and/or digital. The number of trunks can

be increased at the cost of subscribers.

2

Multi-Base Module (MBM) (DSS MAX)

i) MAX-XL

Ideal configuration to support 40,000 lines and

5,500 trunks with 20 Line BMs and 12 Trunk

BMs. The trunk capacity can be increased by 450

at the cost of 2,000 subscribers or vice versa.

ii) MAX-L

Ideal configuration to support 20,000 lines and

2,700 trunks with 10 Line BMs and 6 Trunk BMs.

The trunk capacity can be increased by 450 at the

cost of 2,000 subscribers or vice versa.

3 Remote Switching Unit (RSU) 2,000 subscriber lines. Trunk interface at the cost

of subscriber lines.4 Multi-Base Module TAX 14,500 Trunks

Note: out of the total equipped capacity, a maximum of 30,000 lines may be remote

subscribers through RSUs in MAX-XL whereas 14000 lines may be Remote Subscriber

through RSUs in MAX-L.

2.1.4. TRAFFIC CARRYING CAPACITY

The traffic carrying capacity of C-DOT DSS MAX is ideally 8000 Erlangs in case of MAX-

XL and 4000 Erlangs in case of MAX-L exchanges.

This figure is based on the ideal traffic of one Erlang per switched circuit. But the actual

traffic carrying capacity of one switched path is always less than one in practical application.

Accordingly capacities are reduced to not less than 7,500Erlangs incase of MAX-XL and to

3800 in case of MAX-L exchanges.

18

Page 19: Bsnl Training Report (2)

2.1.5. BHCA HANDLING CAPABILITY

The basic processing elements of the exchange are the Base Processor (in the Base Module).

Base processor has the capability of handling 12,500 Busy Hour Call Attempts which can be

increased to 30,000 using upgraded processor card. The C-DOT DSS MAX (MAX-XL)

exchange with 32 Base Modules can handle upto 3,00,000 BHCA. By upgrading the

processor card in BM/CM/AM/SUM and message switch in all the BMs, it is increased to

8,00,000 BHCA. In case of MAX-L exchanges with 16 BMs connectivity, the BHCA

handling capability is 1,50,000.

Various exchange configurations and their traffic capacities are summarised in Table2.3.

Table 2.3 Traffic Capacity of Exchange Configurations

Sl.No. Exchange Configuration Traffic Capacity Description

I. SBM-RAX 250 Erlangs. The BHCA capacity depends on

the type of processor used and it may be 12,500 or

30,000.

2. Remote Switching Unit

(RSU)

250 Erlangs. The BHCA capacity depends on

the type of processor used. It may be 12,600 or

30,000.

3. DSS-MAX/TAX

i) MAX-XL

Not less than 7,500 Erlangs. The BHCA

capacity is more than 3,00,000 and upgradable to

8,00,000 by upgrading only processor cards.

ii) MAX-L Not less than 3800 Erlangs. The BHCA capacityis

1,50,000.

Note: For some of the sites already commissioned with one of the first three configurations,

overall BHCA handling capacity may be lower due to use of old processor cards.

19

Page 20: Bsnl Training Report (2)

2.1.6 SYSTEM RELIABILITY

The C-DOT DSS MAX is designed to meet the reliability standards as defined in the

specifications. The system uses fully digital techniques for switching including the subscriber

stage. The system is built using a minimal number of standard units/modules which allow

flexible growth of the exchange and easy upgradation in technology and new features.

A very important feature of C-DOT DSS MAX architecture is the extensive duplication of

units. All controller units are duplicated or have n+1 redundancy. Software design matches

the high degree of redundancy provided by hardware to minimize the system down time.

To minimize failures caused by human and/or software errors the C-DOT DSS MAX has

extensive software maintenance functions. The design of software is such that propagation of

software faults is contained and it provides sufficient checks to monitor the correct

functioning of the system. The facilities are in-built to ensure automatic software recovery on

detection of software faults. Whenever a faulty condition occurs the software provides for the

isolation of the faulty subsystem and automatically initiates diagnostic programs for

diagnostic purposes. The diagnostic programs have a design objective of localizing 95 of the

faults to a single PCB level and the rest to a two PCB level. Provision is also made for safety

of charge-records. The charging information is dumped at regular intervals to non-volatile

duplicated back-up memories automatically. The software maintenance functions include data

audits as well; as system integrity monitors and controls.

Alarm Display Panel is provided for a continuous indication of the system status. Audio-

visual alarms are provided.

3. SUBSCRIBER FEATURES

The C-DOT Digital Switching Systems offer a wide range of telephony features and

supplementary services. Further capabilities can be developed to meet specific customer

needs. Due to mandatory requirement of exchange of messages between the switching

systems and user's equipment, some of the services are exclusively offered to ISDN-

subscribers. In case of few of the services offered to PSTN and ISDN subscribers, the

implementation of services to PSTN subscribers may be partial and invocation procedure may

also differ.

20

Page 21: Bsnl Training Report (2)

PSTN (ANALOG) AND ISDN SUBSCRIBER SERVICES

The subscriber services provided by C-DOT DSS MAX exchanges for PSTN (Analog) as

well as ISDN subscribers are-explained as per their logical grouping:

3.1 Number Identification Services

i) Calling Line Identification Presentation (CLIP)

When this service is subscribed by a user as terminating facility, all the incoming calls are

offered to the user along with the details of calling party's identity.

In exceptional cases as the calling party has subscribed CLIR or interworking constraints in

the network, it will not be possible to provide caller's identity.

ii) Calling Line Identification Restriction (CLIR)

This service is offered to the calling party to restrict presentation of it's number to the called

party. When CLIR is subscribed, the originating exchange notifies the destination exchange

that the calling party's number is not allowed to be presented to the called party. The

terminating local exchange may indicate to the called user that the calling user identity is

unavailable due to restriction.

iii) Calling Line Identification Restriction Override (CLIRO)

Subscriber with CLIRO as terminating facility instead of CLIP, receives the call with the

calling line identification even if the calling party has requested that his (the calling party's)

identification should not b« presented to the called user.

The CLIRO facility is offered at the discretion of the administration to special category

subscribers like the police, hospitals, operator positions and other emergency centres.

iv) Malicious Call Identification (MCID)

This facility is used for ascertaining the origin of malicious calls. During conversation the

subscriber has to use suitable procedure to notify the exchange about the malicious call. The

detail of the call is recorded in the exchange which can be retrieved later on. If the caller is

from an exchange which does not support identification of calling line, "junction identity" is

found and an "identification request" may be sent to the originating exchange by tee exchange

personnel.

21

Page 22: Bsnl Training Report (2)

3.2 Call Offering Supplementary Services

Call offering services permit the served user to request the network to divert the incoming calls

to a specific number. In call forwarding, the network forwards the call to a pre-registered

number which can be specified by the user or exchange administrator.

(i)Call forwarding unconditional (CFU)

This service permits the served user to request the exchange to forward all incoming calls to

other Number. The served user's originating service remains unaffected. The other number

could be a fixed pre-determined number or a number specified by the subscriber in the

activation request.

(ii)Call Forwarding Busy (CFB)

This service permits the served user to request the exchange to forward all incoming calls to

other number if the served users number is not free. The served user's originating service

remains unaffected.

iii)Call forwarding no reply (CFNR)

This service permits the served user to request the exchange to forward all incoming calls

which are not replied with in ring timeout period. The served user's originating service

remains unaffected.

3.3 Call Completion Services

i) Call Waiting

A subscriber engaged in an existing call, is given an indication (Call Waiting tone or ZIP

tone) that another caller is attempting to connect to his number. The caller will hear ring back

tone. By flashing the hook-switch the called subscriber can talk with either party while

keeping the other on hold (acceptance without clearing). If the called subscriber replaces his

handset in response to the tone (acceptance by clearing), the exchange will automatically

extend ring to the subscriber and re-establish the connection on answer with the party waiting.

ii) Call Hold

This facility is used by the user to put the existing conversation on hold for the time being and

initiate a new call or receive a call in waiting. The call, which has been put on hold, is

retrieved by the user as and when it is required. The procedure of invocation to put the

conversation on hold and its subsequent retrieval is different for ISDN and PSTN subscribers.

22

Page 23: Bsnl Training Report (2)

3.4 Multi-Party Services

(i)Three party conference

The three party call service enables the served user to establish, participate in, and control a

simultaneous communication involving the served user and two other parties. The served

user can request to convert two party conversation into a three party conference. During the

three party conversation, the served user can disconnect one party, disconnect the 3-way

conversation or choose to communicate privately with one of the parties, in which case the

call to the other party is held.

(ii)Multi party conference (Add-on conference)

The CONF (Add-on conference) service enables the served user to establish and control a

conference i.e. a simultaneous communication, involving of users (max. up to 6).

When the CONF service is invoked, the serving local exchange allocates conference

resources to the served user and add any existing call indicated by the served user to the

conference. On successful invocation of conference the served user becomes the 'conference

controller'. The conference Controller may then add, drop, isolate, and reattach parties from

the conference. The conference controller can also hold and retrieve the conference (e.g. to

add parties) and finally end the conference.

4. ISDN-SUPPLEMENTARY SERVICES

In addition to the services available for PSTN/Analog as well as ISDN subscribers, a number

of supplementary services are offered only to ISDN-subscribers.

Charging Related Supplementary Services

The Advice Of Charge service provides charging information to the user paying for a call.

The option of providing the information at a predefined stage of the call is based on the type

of AOC facility subscribed.

i) AOC-E, Charging information at the end of the call

The charging information is provided by the serving local exchange at the end of a call. It is

sent in the charge advice information element of the call clearing message.

23

Page 24: Bsnl Training Report (2)

ii) AOC-D, Charging information during a call

In this case the charging information is provided by the serving local exchange every time a

quantum of charge has been added. The charging information is sent in an appropriate

message. When the call is cleared, the remaining number of charge units (incremental case) or

the total charge units (cumulative case) is transferred to the user in the call clearing message.

5.Hardware Architecture

5.1 GENERAL

The hardware architecture of C-DOT DSS MAX is mapped closely on the System Overview

described in the previous chapter. In the following sections, the hardware architecture of each

constituent module is described.

5.2 BASE MODULE (BM)

Base Module (BM) is the basic building block of C-DOT DSS MAX. It interfaces the

subscribers, trunks and special circuits. The subscribers may be individual or grouped PBX

lines, analog or digital lines. The trunks may be Two Wire Physical, E&M Four Wire, E&M

Two Wire, Digital CAS or CCS.

The basic functions of a Base Module:

Analog to digital conversion of all signals on analog lines and trunks

Interface to digital trunks and digital subscribers

Switching the calls between terminals connected to the same Base Module

Communication with the Administrative Module via the Central Module for

administrative and maintenance functions and also for majority of inter-BM switching

(i.e. call processing) functions

Provision of special circuits for call processing support e.g. digital tones,

announcements, MF/DTMF senders/receivers

24

Page 25: Bsnl Training Report (2)

Provision for local switching and metering in stand alone mode of Remote Switch

Unit as well as in case of Single Base Module Exchange (SBM-RAX)

Analog Terminal Unit - to interface analog lines/trunks, and providing special circuits

as conference, announcements and terminal tester.

Digital Terminal Unit - for interfacing digital trunks i.e. 2Mbps E-1/PCM

SS7 Signalling Unit Module - to support SS7 protocol handlers and some call

processing functions for CCS7 calls.

ISDN Terminal Unit - to support termination of BRI/PRI interfaces and

implementation of lower layers of DSS1 signalling protocol.

Time Switch Unit - for voice and message switching and provision of service circuits.

Base Processor Unit - for control message communication and call processing

functions.

6. Cards discription

Analog Subscriber Line Cards:

Two variants of subscriber line cards as LCC or CCM with interfaces upto 8 subscribers,

provide basic BORSCHT functions for each line. Analog to digital conversion is done by per-

channel CODEC according to A-law of Pulse Code Modulation. Each CCM card has the

provision of battery reversal for all the 8 lines with the last two lines having provision to

generate 16 KHz metering pulses to be sent to subscriber's metering equipment.

The 8-bit digital (voice) output of four LCCs is multiplexed to form a 32-channel, 2 Mbps

PCM link - also called a terminal group (TG). Since a Terminal Unit has a maximum of 16

terminal cards, there are four such terminal groups. The signalling information is separated by

a scan/drive logic circuit and is sent to the signalling processor on four different scan/drive

signals. The LCC/CCM also provides test access relay to isolate the exchange side and line

side to test it separately by using the Terminal Test Controller (TTC).

25

Page 26: Bsnl Training Report (2)

Analog Trunk Cards :

Analog trunk cards interface analog inter-exchange trunks which may be of three types as

TWT, EMT and EMF. These interfaces are similar to Subscriber Line Card, with only

difference that the interfaces are designed to can/drive events on the trunks as per predefined

signalling requirement.

Signalling Processor (SP) Card

Signalling Processor (SP) processes the signalling information received from he terminal

cards. This signalling information consists of scan/drive functions like origination detection,

answer detection, digit reception, reversal detection, etc. The validated events are reported to

Terminal Interface Controller for further processing to relieve itself from real-time intensive

functions. Based on the information received from the Terminal Interface Controller, it also

drives the event on the selected terminal through scan/drive signals.

Terminal Interface Controller (TIC) Card

Terminal Interface Controller (TIC) controls the four terminal groups (TG) of 32 channels,

and multiplex them to form a duplicated 128-channel, 8 Mbps link towards the Time Switch

(TS). For signalling information of 128- channels, it communicates with Signalling Processor

(SP) to receive/send the signalling event on analog terminations. It also uses one of the 64

kbps channel out of 128 channels towards Time Switch, to communicate with Base Processor

Unit (BPU). In concentration mode, three other Terminal Units share this 128-channel link

towards the Time Switch to have 4:1 concentration.

Terminal Interface Controller is built around 8-bit microprocessor with associated memory

and interface and it is duplicated for redundancy.

Special Service Cards:

A Terminal Unit has some special service cards such as Conference (CNF) Card to provide

six party conference. Speech samples from five parties are added by inbuilt logic and sent to

the sixth party to achieve conferencing. Terminal Test Controller (TTC) Card is used to test

analog terminal interfaces via the test access relays on the terminal cards.

Announcement Controller (ANN) Card provides 15 announcements on broadcast basis. Only

one service card of each type is equipped in a Base Module with provision of fixed slot for

TTC and variable slots for CNF/ANNC.

26

Page 27: Bsnl Training Report (2)

Announcement and Conference Cards are equipped in Terminal Unit through S/W MMC

command. Two slots are occupied by each card i.e. 16 channels for each card is used out of

128 channels available on a Bus between a TU &TS.

BASE MODULE (BM) CONFIGURATION

1 2 3 4 5 6 7 8 9 1

0

1

1

1

2

1

3

1

4

1

5

1

6

1

7

1

8

1

9

2

0

2

1

2

2

2

3

2

4

2

5

2

6

P

S

U

I

T

C

T

C

T

C

T

C

T

C

T

C

T

C

T

C

T

I

C

S

P

C

/

I

S

P

T

U

I

T

U

I

T

I

C

S

P

C

/

I

S

P

T

C

T

C

T

C

T

C

T

C

T

C

T

C

T

C

P

S

U

I

NOTE: 1) TC MAY BE LCC, CCM, TWT or EMF

2) IN CASE OF TU4 AS ATU IN BM, SLOT 24 WILL BE TTC

FIG: ANALOG TERMINAL UNIT (ATU) CONFIGURATION

Digital Terminal Unit (DTU)

Digital Terminal Unit (DTU) is used exclusively to interface digital trunks. One set of Digital

Trunk Synchronization (DTS) card along with the Digital Trunk Controller (DTC) card is

used to provide one E-1 interface.

27

Page 28: Bsnl Training Report (2)

1 2 3 4 5 6 7 8 9 1

0

1

1

1

2

1

3

1

4

1

5

1

6

1

7

1

8

1

9

2

0

2

1

2

2

2

3

2

4

2

5

2

6

P

S

U

I

D

T

S

0

D

T

C

0

D

T

S

1

D

T

C

1

T

U

C

T

U

I

T

U

I

T

U

C

D

T

S

2

D

T

C

2

D

T

S

3

D

T

C

3

P

S

U

I

Each interface occupies one TG of 32 channels and four such interfaces share 4 TGs in a

Digital Terminal Unit. The functions performed by TIC and SP in Analog Terminal Unit, are

collectively performed by the Terminal Unit Controller (TUC) in the Digital Terminal Unit.

The scan functions are - HDB3 to NRZ code conversion, frame alignment and reconstitution

of the received frame. The drive functions include insertion of frame alignment pattern and

alignment information. Each interface can be configured as CAS or CCS interface.

FIG: DIGITAL TERMINAL UNIT (DTU) CONFIGURATION

SS7 Signalling Unit Module (SUM)

Any one of the ATU or DTU in a BM can be replaced by SUM frame to support CCS7

signalling. Only one such unit is equipped in the exchange irrespective of its configuration or

capacity. For details of SUM architecture, refer to chapter no.4.

28

Page 29: Bsnl Training Report (2)

FIG: SS7SU CONFIGURATION

1 2 3 4 5 6 7 8 9 1

0

1

1

1

2

1

3

1

4

1

5

1

6

1

7

1

8

1

9

2

0

2

1

2

2

2

3

2

4

2

5

2

6

P

S

U

1

P

S

U

2

B

M

E

S

H

M

1

S

H

M

2

S

H

M

3

S

H

M

4

H

P

C

/

B

P

C

T

U

C

T

U

I

T

U

I

T

U

C

H

P

C

/

B

P

C

S

H

M

5

S

H

M

6

S

H

M

7

S

H

M

8

B

M

E

P

S

U

4

P

S

U

3

NOTE: 1) SHM IS #7 PROTOCOL HANDLER CARD

2) WITH BPC, ONLY SHM 1-4 CAN BE EQUIPPED

3) HPC IS USED TO SUPPORT SHM1-8 CARDS AND HIGHER MESSAGE

PROCESSING CAPABILITY

ISDN - Terminal Unit (ISTU)

One of the four ATUs/ DTUs in a BM can be replaced by ISTU to provide BRI/PRI interfaces

in C-DOT DSS. The only constraint is that ISTU has to be principal TU i.e. directly

connected to TSU on 8 Mbps PCM link. The ATU/DTU cannot be used in concentration with

ISTU. By equipping one ISTU in the exchange, a max. of 256 B channels are available to the

administrator which can be configured as BRI, PRI or any mix as per site requirement.

Depending on the requirement of number of ISDN-Interfaces, one or more ISTUs can be

integrated in C-DOT DSS, either in one BM or distributed across different BMs.,

29

Page 30: Bsnl Training Report (2)

FIG: 3.2C ISTU CONFIGURATION

NOTE: LC MAY BE BRL or PRL CARDS

Time Switch Unit (TSU)

Time Switch Unit (TSU) implements three basic functions as time switching within the Base

Module, routing of control-messages within the Base Module and across Base Modules and

support services like MF/DTMF circuits, answering circuits, tones, etc. These functions are

performed by three different functional units, integrated as time switch unit in a single frame

1 2 3 4 5 6 7 8 9 1

0

1

1

1

2

1

3

1

4

1

5

1

6

1

7

1

8

1

9

2

0

2

1

2

2

2

3

2

4

2

5

2

6P

S

U

II

T

G

A

M

F

C

M

F

C

S

C

I

C

A

F

B

M

S

D

M

S

C

T

S

I

T

S

M

T

S

C

T

S

S

T

S

S

T

S

C

T

S

M

T

S

I

M

S

C

M

S

D

A

F

B

S

C

I

C

M

F

C

M

F

C

T

G

A

P

S

U

II

FIG: 3.2F TIME SWITCH UNIT (TSU) CONFIGURATION

NOTE: 1) REPLACE TSS CARDS BY ETS CARDS IN CASE OF REMOTE BASE

MODULES (RSU)

2) MSC AND MSD CARDS ARE REPLACED BY HMS FOR 800K BHCA

Base Processor Unit (BPU)

Base Processor Unit (BPU) is the master controller in the Base Module. It is implemented as a

duplicated controller with memory units. These duplicated sub-units are realised in the form

of the following cards:

Base Processor Controller (BPC) Card

Base Memory Extender (BME) Card

BPC controls time switching within the Base Module via the Base Message Switch and the

Time Switch Controller. It communicates with the Administrative Processor via Base

Message Switch for operations and maintenance functions. In a SBM configuration, BPC

directly interfaces with the Alarm Display Panel and the Input Output Module.

30

Page 31: Bsnl Training Report (2)

To support 8,00,000 BHCA, the BPC card is replaced by High performance Processor Card

(HPC). It is pin to pin compatible for hardware and also for software so that they are

interchangeable at any site to meet specific traffic requirement.

1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2

P

S

U

I

I

B

M

E

H

P

C

/

B

P

C

H

P

C

/

B

P

C

B

M

E

P

S

U

II

FIG: BASE PROCESSOR UNIT (BPU) CONFIGURATION

NOTE: HPC USED TO SUPPORT 800K BHC

31

Page 32: Bsnl Training Report (2)

32

Page 33: Bsnl Training Report (2)

PCM, Signaling And MultiplexingINTRODUCTION

A long distance or local telephone conversation between two persons could be provided by

using a pair of open wire lines or underground cable as early as early as mid of 19th century.

However, due to fast industrial development and increased telephone awareness, demand for

trunk and local traffic went on increasing at a rapid rate.

To cater to the increased demand of traffic between two stations or between two subscribers

at the same station we resorted to the use of an increased number of pairs on either the open

wire alignment, or in underground cable. This could solve the problem for some time only as

there is a limit to the number of open wire pairs that can be installed on one alignment due to

headway consideration and maintenance problems. Similarly increasing the number of open

wire pairs that can be installed on one alignment due to headway consideration and

maintenance problems. Similarly increasing the number of pairs to the underground cable is

uneconomical and leads to maintenance problems.

It, therefore, became imperative to think of new technical innovations which could exploit the

available bandwidth of transmission media such as open wire lines or underground cables to

provide more number of circuits on one pair. The technique used to provide a number of

circuits using a single transmission link is called Multiplexing.

MULTIPLEXING TECHNIQUES

There are basically two types of multiplexing techniques

i. Frequency Division Multiplexing (FDM)

ii Time Division Multiplexing (TDM)

Frequency Division Multiplexing Techniques (FDM)

The FDM techniques is the process of translating individual speech circuits (300-3400 Hz)

into pre- assigned frequency slots within the bandwidth of the transmission medium. The

frequency translation is done by amplitude modulation of the audio frequency with an

appropriate carrier frequency. At the output of the modulator a filter network is connected to

select either a lower or an upper side band. Since the intelligence is carried in either side band,

single side band suppressed carrier mode of AM is used.

33

Page 34: Bsnl Training Report (2)

This results in substantial saving of bandwidth mid also permits the use of low power

amplifiers. Please refer Fig. 2.1. FDM techniques usually find their application in analogue

transmission systems. An analogue transmission system is one which is used for transmitting

continuously varying signals.

Figure : 2.1 FDM Principle

Time Division Multiplexing (TDM)

Basically, time division multiplexing involves nothing more than sharing a transmission

medium by a number of circuits in time domain by establishing a sequence of time slots

during which individual channels (circuits) can be transmitted. Thus the entire bandwidth is

periodically available to each channel. Normally all time slots are equal in length. Each

channel is assigned a time slot with a specific common repetition period called a frame

interval. This is illustrated in Fig.

34

Page 35: Bsnl Training Report (2)

Fig Time Divison Multiplexing

SAMPLING

It is the most basic requirement for TDM. Suppose we have an analogue signal Fig.2. 3 (b),

which is applied across a resistor R through a switch S as shown in Fig. 2.3 (a) . Whenever

switch S is closed, an output appears across R. The rate at which S is closed is called the

sampling frequency because during the make periods of S, the samples of the analogue

modulating signal appear across R. Fig. 2.3(d) is a stream of samples of theinput signal which

appear across R. The amplitude of the sample is depend upon the amplitude of the input signal

at the instant of sampling. The duration of these sampled pulses is equal to the duration for

which the switch S is closed. Minimum number of samples are to be sent for any band limited

signal to get a good approximation of the original analogue signal and the same is defined by

the sampling Theorem.

35

Page 36: Bsnl Training Report (2)

Fig 2.3: Sampling Process

"If a band limited signal is sampled at regular intervals of time and at a rate equal toor more

than twice the highest signal frequency in the band, then the sample contains all the

information of the original signal." Mathematically, if fH is the highest frequency in the signal

to be sampled then the sampling frequency Fs needs to be greater than 2 fH.

i.e. Fs>2fH

Let us say our voice signals are band limited to 4 KHz and let sampling frequency be 8 KHz.

Time period of sampling Ts = 1 sec / 8000

or Ts = 125 micro seconds

If we have just one channel, then this can be sampled every 125 microseconds and the

resultant samples will represent the original signal. But, if we are to sample N.

PULSE CODE MODULATION (PCM) PROCESS

Pulse Code Modulation (PCM) converts analog signals to a digital format (signal). This

process has four major steps.

36

Page 37: Bsnl Training Report (2)

• STEP ONE:- FILTERING

Frequencies below 300Hz and above 3400Hz (Voice Frequency range) are filtered from the

analog signal.. The lower frequencies are filtered out to remove electrical noise induced from

the power lines. The upper frequencies are filtered out because they require additional bits and

add to the cost of a digital transmission system. The actual bandwidth of the filtered signal is

3100Hz (3400- 300). It is often referred to as 4kHz.

• STEP TWO:- SAMPLING

The analog signal is sampled 8000 times per second. The rate at which the analog signal is

sampled is related to the highest frequency present in the signal. This is based on Nyquist

Sampling Theorem. In his calculations, Nyquist used a voice frequency range of 4000Hz

(which represents the voice frequency range that contains “intelligent” speech). Thus, the

standard became a sampling rate of 8000Hz, or twice the bandwidth. The signal that is the

result of the sampling process contains sufficient information to accurately represent the

information contained in the original signal. The output of this sampling procedure is a Pulse

Amplitude Modulated, or, PAM signal.

• STEP THREE:- QUANTIZING

In the third step of the A/D conversion process, we quantize the amplitude of the incoming

samples to one of 225 amplitudes on quantizing scale (figure 3.13). Thus, in this step the

sampled signal is matchrd to the segmented scale. The purpose of step three is to measure the

amplitude (or height) of the PAM signal and assign a decimal value that defines the

amplitude. Based on the quantizing scale, each sampled signal is assigned a number between

0 and +127 to define its amplitude.

• STEP FOUR:- ENCODING

In the fourth step of A/D conversion process, the quantized samples are encoded into a digital

bit stream (series of electrical pulses).

37

Page 38: Bsnl Training Report (2)

A DIGITAL ENCODER-

It recognizes the 255 different voltage levels of the quantized samples. Converts each into a

specific string of 8 bits (1s and 0s) that represent a particular voltage value. Fig. is helpful for

understanding the binary code used in the encoding step. Each bit position in the 8-bit word

(byte) iis given a decimal weight (2 to some power ), except for the first bit position. Using

this coding scheme, we can code any number between +127 and –127 and zero.

For example:- If the PAM signal measures +45 on the quantizing scale, the output of the

encoding step is 10101101 (fig 3.15). This binary number (or 8 bit word) ism transmitted over

the network as a series of electrical or optical pulses. This series of pulses is called a digital

bit stream. The PCM process requires a 64000bps channel to encode a 4kHz audio input

signal because 8000samples/sec.*8 bits/word=64000bps. This is known as the DS0 (Digital

Signal 0) or VF (Voice Frequency) in the digital hierarchy. It is the basic building block of the

digital network.

DIGITAL-TO-ANALOG CONVERSION-

At the receive end of the transmission, the digital signal may need to be converted back into

its analog form. The digital-to-analog (D/A) conversion consists of two steps . Each 8-bit

word (byte) that enters the decoder results in one PAM signal value. The decoder: Reads the

8-bit binary word inputs ,creates a sream of 8000 pulses per second. These pulses have an

amplitude of +127 to –127. The filtering process smoothes out the stream of 8000 pulses per

second into an analog waveform that closely resembles the waveform that was input into the

A/D converter at the originating end. The filter stores a part of each pulse’s energy and slowly

releases it until the next pulse arrives. The filter thus reconstructs the analog signal at a rate of

8000 times per second.

SIGNALING IN PCM SYSTEMS

In a telephone network,-the signaling information is used for proper routing of a call between

two subscribers, for providing certain status information like dial tone, busy tone, ring back.

NU tone, metering pulses, trunk offering signal etc. All these functions are grouped under the

general terms "signaling" in PCM systems. The signaling information can be transmitted in

the form of DC pulses (as in step by step exchange) or multi-frequency pulses (as in cross bar

systems) etc.

38

Page 39: Bsnl Training Report (2)

The signaling pulses retain their amplitude for a much longer period than the pulses carrying

speech information. It means that the signaling information is a slow varying signal in time

compared to the speech signal which is fast changing in the time domain. Therefore, a

signaling channel can be digitized with less number of bits than a voice channel. In a 30 chl

PCM system, time slot Ts 16 in each frame is allocated for carrying signaling information.

The time slot 16 of each frame carries the signaling data corresponding to two VF channels

only. Therefore, to cater for 30 channels, we must transmit 15 frames, each having 125

microseconds duration. For carrying synchronization data for all frames, one additional

frame is used. Thus a group of 16 frames (each of 125 microseconds) is formed to make a

"multi-frame". The duration of a multi-frame is 2 milliseconds. The multi-frame has 16 major

time slots of 125 microseconds duration. Each of these (slots) frames has 32 time slots

carrying, the encoded samples of all channels plus the signaling and synchronization data.

Each sample has eight bits of duration 0.400 microseconds (3.9/8 = 0.488) each. The

relationship between the bit duration frame and multi-frame is illustrated in Fig. 2.4(a) & 2.4

(b)

Fig 2.4(a) Multyframe Concept

39

Page 40: Bsnl Training Report (2)

Fig 2.4(b) 2.048 Mbps PCM Multyframe

We have 32 time slots in a frame; each slot carries an 8 bit word.

The total number of bits per frame = 32 x 8 = 256

The total number of frames per seconds is 8000

The total number of bits per second is 256 x 8000 = 2048 K/bits.

Thus, a 30 channel PCM system has 2048 K bits/sec.

40

Page 41: Bsnl Training Report (2)

OPTICAL FIBER COMMUNICATION

HISTORY

The use of visible optical carrier waves or light for communication has been common for

many years. Simple systems such as signal fires, reflecting mirrors and, more recently

signaling lamps have provided successful, if limited, information transfer. Moreover as early

as 1880 Alexander Graham Bell reported the transmission of speech using a light beam. The

photo phone proposed by Bell just for years after the invention of the telephone modulated

sunlight with a diaphragm giving speech transmission over a distance of 200m.

However, although some investigation of the optical communication continued in the early

part of the 20th century its use was limited to mobile, low capacity communication links. This

was due to both the lack of suitable light sources and the problem that light transmission in

the atmosphere is restricted to line of sight and severely affected by disturbances such as rain,

snow, fog dust and atmospheric turbulence.

A renewed interest in optical communication was stimulated in the early 1960s with the

invention of the laser. This device provided a coherent light source, together with the

possibility of the modulation at high frequency.

The proposals for optical communication via optical fibers fabricated from glass to avoid

degradation of the optical signal by the atmosphere were made almost simultaneously in 1966

by Kao and Hock ham and Werts. Such systems were viewed as a replacement for coaxial

cable system, initially the optical fibers exhibited very high attenuation and were therefore

not comparable with the coaxial cable they were to replace. There were also problems

involved in jointing the fiber cables in a satisfactory manner to achieve low loss and to enable

the process to be performed relatively easily and repeatedly in the field.

In coaxial system the channel capacity is 300 to 10800 and the disadvantages of the coaxial

system are digging, electrical disturbance, in winter cable contracts and breaks mutual

induction. The coaxial cable loss is 0.3db per every km.

(i)In microwave system if we double the distance the loss will be increased by 6db.

(ii)For the shorter distance the loss is higher.

(iii)In ofc system Optical wire is small size, light weight, high strength and flexibility. Its

41

Page 42: Bsnl Training Report (2)

transmission benefits includes wide band width, low loss and low cost.

(iv)They are suitable for both analog and digital transmission.

(v)It is not suffered by digging, electrical interference etc. problems.

Fiber Optic System :

Optical Fibre is new medium, in which information (voice, Data or Video) is transmitted

through a glass or plastic fibre, in the form of light, following the transmission sequence give

below

(1)Information is Encoded into Electrical Signals.

(2)Electrical Signals are Coverted into light Signals.

(3)Light Travels Down the Fiber.

(4)A Detector Changes the Light Signals into Electrical Signals.

(5)Electrical Signals are Decoded into Information.

- Inexpensive light sources available.

- Repeater spacing increases along with operating speeds because low loss fiber are used at

high datarates.

Fig: 4.1 Fiber optic system

42

Page 43: Bsnl Training Report (2)

OFC types

The refractive Index profile describes the relation between the indices of the core and

cladding. Two main relationship exists :

(I) Step Index

(II) Graded Index

The step index fibre has a core with uniform index throughout. The profile shows a sharp step

at the junction of the core and cladding. In contrast, the graded index has a non-uniform core.

The Index is highest at the center and gradually decreases until it matches with that of the

cladding. There is no sharp break in indices between the core and the cladding. By this

classification there are three types of fibres :

(I) Multimode Step Index fibre (Step Index fibre)

(II) Multimode graded Index fibre (Graded Index fibre)

(III) Single- Mode Step Index fibre (Single Mode Fibre)

1 .STEP-INDEX MULTIMODE FIBER has a large core, up to 100 microns in diameter. As

a result, some of the light rays that make up the digital pulse may travel a direct route,

whereas others zigzag as they bounce off the cladding. These alternative pathways cause the

different groupings of light rays, referred to as modes, to arrive separately at a receiving point.

The pulse, an aggregate of different modes, begins to spread out, losing its well-defined

shape. The need to leave spacing between pulses to prevent overlapping limits bandwidth that

is, the amount of information that can be sent. Consequently, this type of fiber is best suited

for transmission over short distances, in an endoscope, for instance.

Fig :- STEP-INDEX MULTIMODE FIBER

2. GRADED-INDEX MULTIMODE FIBER contains a core in which the refractive index

diminishes gradually from the center axis out toward the cladding. The higher refractive index

at the center makes the light rays moving down the axis advance more slowly than those near

the cladding.

43

Page 44: Bsnl Training Report (2)

Fig:- GRADED-INDEX MULTIMODE FIBER

3. SINGLE-MODE FIBER has a narrow core (eight microns or less), and the index of

refraction between the core and the cladding changes less than it does for multimode fibers.

Light thus travels parallel to the axis, creating little pulse dispersion. Telephone and cable

television networks install millions of kilometers of this fiber every year.

Fig:- . SINGLE-MODE FIBER

OPTICAL FIBRE PARAMETERS

Optical fiber systems have the following parameters.

(I) Wavelength

(II) Frequency

(III) Window

1 WAVELENGTH

It is a characteristic of light that is emitted from the light source and is measures in

nanometers (nm). In the visible spectrum, wavelength can be described as the colour of the

light.

For example, Red Light has longer wavelength than Blue Light, Typical wavelength for fibre

use are 850nm, 1300nm and 1550nm all of which are invisible.

2 FREQUENCIES

It is number of pulse per second emitted from a light source. Frequency is measured in units

of hertz (Hz). In terms of optical pulse 1Hz = 1 pulse/ sec.

3 WINDOWS

A narrow window is defined as the range of wavelengths at which a fibre best operates.

Typical windows are given below :

44

Page 45: Bsnl Training Report (2)

FEATURES

The fiber optics has become a preferred medium due to its some important features like:

(1) The bandwidth of the fiber and light beam is extremely wide. It is possible to handle

signals which turn on and off at gigabit per second rates (1 gigabit, gbit =1000 Mbitts).

(2)The fiber itself is very thin and not expensive. The thinness means that it is easy to handle,

and many fibers can be put in the trenches or narrow conduits.

(3)The light signal is absolutely immune to electrical noise from any sources. Even if there

are sources of electrical noise directly touching the cable, the electric fields of the noise

source cannot affect the light beam in the fiber.

(4)The signal in the cable is secure from unauthorized listeners. It is relatively hard to tap into

the cable without being noticed, and the entire light signal is confined within the fiber. No

light escapes to the outside where someone else could see it.

(5)Since there is no electricity or electrical energy in the fiber, it can be run in hazardous

atmospheres where the danger of explosion from spark may exist. Also, the fiber itself is

immune to many types of poisonous gases, chemicals, and water.

OFC SPLICING

Splices are permanent connection between two fibres. The splicing involves cutting of the

edges of the two fibres to be spliced.

Splicing Methods

The following three types are widely used :

45

Page 46: Bsnl Training Report (2)

1. Adhesive bonding or Glue splicing.

2. Mechanical splicing.

3. Fusion splicing.

Adhesive Bonding or Glue Splicing

This is the oldest splicing technique used in fibre splicing. After fibre end preparation, it is

axially aligned in a precision V–groove. Cylindrical rods or another kind of reference surfaces

are used for alignment. During the alignment of fibre end, a small amount of adhesive or glue

of same refractive index as the core material is set between and around the fibre ends. A two

component epoxy or an UV curable adhesive is used as the bonding agent. The splice loss of

this type of joint is same or less than fusion splices. But fusion splicing technique is more

reliable, so at present this technique is very rarely used.

Mechanical Splicing

This technique is mainly used for temporary splicing in case of emergency repairing. This

method is also convenient to connect measuring instruments to bare fibres for taking various

measurements. The mechanical splices consist of 4 basic components :

(i) An alignment surface for mating fibre ends.

(ii) A retainer

(iii) An index matching material.

(iv) A protective housing

A very good mechanical splice for M.M. fibres can have an optical performance as good as

fusion spliced fibre or glue spliced. But in case of single mode fibre, this type of splice cannot

have stability of loss.

Fusion Splicing

The fusion splicing technique is the most popular technique used for achieving very low

splice losses. The fusion can be achieved either through electrical arc or through gas

flame.The process involves cutting of the fibres and fixing them in micro–positioners on the

fusion splicing machine. The fibres are then aligned either manually or automatically core

aligning (in case of S.M. fibre) process. Afterwards the operation that takes place involve

withdrawal of the fibres to a specified distance, preheating of the fibre ends through electric

46

Page 47: Bsnl Training Report (2)

arc and bringing together of the fibre ends in a position and splicing through high temperature

fusion.

EQUIPMENT REQUIRE FOR OFC JOINT

1) Optical fiber fusion splicer specification ( spicer machine )

• AC input – 100 to 240v, frequency – 50/60Hz

•DC input 12v/aA

2) Fiber cutter

•It converts irregular shaped fiber end into smooth & flat end.

3) Chemicals used in OFC joint

• HAXENE : To remove jelly from the fiber

• ACETONE : For cleaning the OFC

• ISO PROPENOT: For smoothness of optical glass.

4) Sleeve: - To enclose fiber joint.

5) Tool Kit

6) Joint kit.

• Joint encloser

• Buffer

• Adhesive tap.

7) Generator /12V Battery

8) Cotton clothes for fiber cleaning.

ADVANTAGES OF OPTICAL FIBER COMMUNICATION

• Enormous Potential Bandwidth: - The optical carrier frequency in the range 1013 to 1016

Hz (generally in the near infrared around 1014 Hz or 105 GHz) yields a far grater potential

transmission bandwidth than metallic cable systems. (i.e. coaxial cable bandwidth up to

around 500 MHz) or even millimetre wave radio systems (i.e. systems currently operating

with modulation bandwidths of 700 MHz ). At present, the bandwidth available to fiber

systems is not fully utilized but modulation at several gigahertz over a hundred kilometers and

hundreds of megahertz over three hundred kilometers without intervening electronics

(repeaters) is possible. Therefore, the information – carrying capacity of optical fiber systems

has proved far superior to the best copper cable systems. By comparison the losses in

47

Page 48: Bsnl Training Report (2)

wideband coaxial cable systems restrict the transmission distance to only a few kilometers at

bandwidths over one hundred megahertz.

Although the usable fiber bandwidth will be extended further towards the optical carrier

frequency, it is clear that this parameter is limited by the use of a signal optical carrier signal.

Hence a much enhanced bandwidth utilization for an optical fiber can be achieved by

transmitting several optical signals, each at different centre wavelengths, in parallel on the

same fiber. This wavelength division multiplexed operation, particularly with dense packing

of the optical wavelengths ( or, essentially, fine frequency spacing ), offers the potential for a

fiber information carrying capacity which is many orders of magnitude in excess of that

obtained using copper cables or a wideband radio system.

• Small Size and Weight: - Optical fibers have very small diameters which are often no

grater than the diameter of a human hair. Hence, even when such fibers are covered with

protective coatings they are far smaller and much lighter than corresponding copper cables.

This is a tremendous boon towards the alleviation of duct congestion in cities, as well as

allowing for an expansion of signal transmission within mobiles such as aircraft, satellites and

even ships.

• Electrical Isolation: - Optical fibers which are fabricated from glass, or sometimes a plastic

polymer, are electrical insulators and therefore, unlike their metallic counterparts, they do not

exhibit earth loop and interface problems. Furthermore, this property makes optical fiber

transmission ideally suited for communication in electrically hazardous environments as the

fibers create no arching or spark hazard at abrasions or short circuits.

• Immunity To Interference And Crosstalk :- Optical fibers form a dielectric waveguide

and are therefore free from electromagnetic interference (EMI), radiofrequency interference

(RFI), or switching transients giving electromagnetic pulses (EMP). Hence the operation of an

optical fiber communication system is unaffected by transmission through an electrically

noisy environment and the fiber cable requires no shielding from EMI. The fiber cable is also

not susceptible to lightning strikes if used overhead rather than underground. Moreover, it is

fairly easy to ensure that there is no optical interference between fibers and hence, unlike

communication using electrical conductors, crosstalk is negligible, even when many fibers are

cabled together.

• Signal Security: - The light from optical fibers does not radiate significantly and therefore

they provide a high degree of signal security. Unlike the situation with copper cables, a

48

Page 49: Bsnl Training Report (2)

transmitted optical signal cannot be obtained from a fiber in a noninvasive manner (i.e.

without drawing optical power from the fiber). Therefore, in theory, any attempt to acquire a

message signal transmitted optically may be detected. This feature is obviously attractive for

military, banking and general data transmission (i.e. computer network) application.

• Low Transmission Loss :- The development of optical fibers over the last twenty years has

resulted in the production of optical fiber cables which exhibit very low attenuation or

transmission loss in comparison with the best copper conductors. Fibers have been fabricated

with losses as low as 0.2 dB km-1 (see Section 3.3.2) and this feature has become a major

advantage of optical fiber communications. It facilitates the implementation of

communication links with extremely wide repeater spacing ( long transmission distances

without intermediate electronics), thus reducing both system cost and complexity. Together

with the already proven modulation bandwidth capability of fiber cable this property provides

a totally compelling case for the adoption of optical fiber communication in the majority of

long-haul telecommunication applications.

• Ruggedness and Flexibility :- Although protective coatings are essential, optical fibers may

be manufactured with very high tensile strengths. Perhaps surprisingly for a glassy substance,

the fibers may also be bent to quite small radii or twisted without damage. Furthermore cable

structures have been developed which have proved flexible, compact and extremely rugged.

Taking the size and weight advantage into account, these optical fiber cables are generally

superior in terms of storage, transportation, handling and installation to corresponding copper

cables, whilst exhibiting at least comparable strength and durability.

• System Reliability And Ease Of Maintenance :- These features primarily stem from the

low loss property of optical fiber cables which reduces the requirement for intermediate

repeaters or line amplifiers to boost the transmitted signal strength. Hence with fewer

repeaters, system furthermore, the reliability of the optical components is no longer a problem

with predicted lifetimes of 20 to 30 years now quite common. Both these factors also tend to

reduce maintenance time and costs.

• Potential Low Cost :- The glass which generally provides the optical fiber transmission

medium is made from sand – not a scarce resource. So, in comparison with copper

conductors, optical fibers offer the potential for low cost line communication. Although over

recent years this potential has largely been realized in the costs of the optical fiber

transmission medium which for bulk purchases is now becoming competitive with copper

49

Page 50: Bsnl Training Report (2)

wires (i.e. twisted pairs), it has not yet been achieved in all the other component areas

associated with optical fiber communication. For example, the costs of high performance

semiconductor lasers and detector photodiodes are still relatively high, as well as some of

those concerned with the connection technology ( demountable connectors, couplers, etc. ).

DRAWBACKS OF OPTICAL FIBER COMMUNICATION

The use of fibers for optical communication does have some drawbacks in practice. Hence to

provide a balance picture these disadvantages must be considered. They are

• The fragility of the bare fibers;

• The small size of fibers and cables which creates some difficulties with splicing and forming

connectors;

• Some problems involved with forming low loss T- couplers;

• Some doubts in relations to the long term reliability of optical fibers in the presence of

moisture;

• An independent electrical power feed is required for any electronic repeaters;

• New equipment and field practice are required;

• Testing procedures tend to be more complex.

APPLICATION OF THE OPTICAL FIBER COMMUNICATION

TRUNK NETWORK

The trunk or toll network is used for carrying telephone traffic between major conurbations.

Hence there is generally a requirement for the use of transmission systems which have a high

capacity in order to minimize costs per circuit. The transmission distance for trunk systems

can very enormously from under 20 km to over 300 km, and occasionally to as much as 1000

km. Therefore transmission systems which exhibit low attenuation and hence give a

maximum distance of unrepeatered operation are the most economically viable. In this context

optical fiber systems with their increased bandwidth and repeater spacing offer a distinct

advantage.

JUNCTION NETWORK

The junction or interoffice network usually consists of routes within major conurbations over

distances of typically 5 to 20 km. However, the distribution of distances between switching

50

Page 51: Bsnl Training Report (2)

centers (telephone exchanges ) or offices in the junction network of large urban areas varies

considerably for various countries.

MILITARY APPLICATION

In these applications, although economics are important, there are usually other, possibly

overriding, considerations such as size, weight, deployability, survivability (in both

conventional and nuclear attack and security. The special attributes of optical fiber

communication system therefore often lend themselves to military use.

•MOBILES

One of the most promising areas of milita5ry application for optical fiber communication

is within military mobiles such as aircraft, ships and tanks. The small size and weight of

optical fibers provide and attractive solution to space problems in these mobiles which are

increasingly equipped with sophisticated electronics. Also the wideband nature of optical

fiber transmission will allow the multiplexing of a number of signals on to a common bus.

Furthermore, the immunity of optical transmission to electromagnetic interference (EMI) in

the often noisy environment of military mobiles is a tremendous advantage. This also applies

to the immunity of optical fiber to lighting and electromagnetic pulses (EMP) especially

within avionics. The electrical isolation, and therefore safety, aspect of optical fiber

communication also proves invaluable in these applications, allowing routing through both

fuel tanks and magazines.

•COMMUNICATION LINKS

The other major area for the application of optical fiber communication in the military sphere

includes both short and long distance communication links. Short distance optical fiber

systems may be utilized to connect closely spaced items of electronics equipment in such

areas as operations rooms and computer installations. A large number of this system have

already been installed in military installations in the united kingdom. These operate over

distances from several centimeters to a few hundred meters at transmission rates between 50

bauds and 4.8 kbits-1. In addition a small number of 7 MHz video links operating over

distances of up to 10 m are in operation. There is also a requirement for long distance

communication between military installations which could benefit from the use of optical

fibers. In both these advantages may be gained in terms of bandwidth, security and immunity

to electrical interference and earth loop problems over conventional copper systems.

51

Page 52: Bsnl Training Report (2)

CIVIL APPLICATION

The introduction of optical fiber communication systems into the public network has

stimulated investigation and application of these transmission techniques by public utility

organizations which provide their own communication facilities over moderately long

distances. For example these transmission techniques may be utilized on the railways and

along pipe and electrical power lines. In these applications, although high capacity

transmission is not usually required, optical fibers may provide a relatively low cost solution,

also giving enhanced protection in harsh environment, especially in relation to EMI and EMP.

Experimental optical fiber communication systems have been investigated within a number of

organizations in Europe, North America and Japan. For instance, British Rail has successfully

demonstrated a 2 Mbits-1 system suspended between the electrical power line gantries over a

6 km route in Cheshire. Also, the major electric power companies have shown a great deal of

interest with regard to the incorporation of optical fibers within the metallic earth of overhead

electric power lines.

52

Page 53: Bsnl Training Report (2)

GSM

INTRODUCTION

A GSM system is basically designed as a combination of three major subsystems: the network

subsystem, the radio subsystem, and the operation support subsystem. In order to ensure that

network operators will have several sources of cellular infrastructure equipment, GSM

decided to specify not only the air interface, but also the main interfaces that identify different

parts. There are three dominant interfaces, namely, an interface between MSC and the base

Transceiver Station (BTS), and an Um interface between the BTS and MS.

GSM NETWORK STRUCTURE

Every telephone network needs a well-designed structure in order to route incoming called to

the correct exchange and finally to the called subscriber. In a mobile network, this structure is

of great importance because of the mobility of all its subscribers [1-4]. In the GSM system,

the network is divided into the following partitioned areas.

• GSM service area;

• PLMN service area;

• MSC service area;

• Location area;

• Cells.;

Fig:- GSM Architechture

53

Page 54: Bsnl Training Report (2)

MS(Mobile Station)

The MS includes radio equipment and the man machine interface (MMI) that a subscribe

needs in order to access the services provided by the GSM PLMN. MS can be installed in

Vehicles or can be portable or handheld stations. The MS may include provisions for data

communication as well as voice. A mobile transmits and receives message to and from the

GSM system over the air interface to establish and continue connections through the system.

BASE STATION SYSTEM(BSS)

The BSS is a set of BS equipment (such as transceivers and controllers) that is in view by the

MSC through a single A interface as being the entity responsible for communicating with

MSs in a certain area. The radio equipment of a BSS may be composed of one or more cells.

A BSS may consist of one or more BS. The interface between BSC and BTS is designed as an

A-bis interface. The BSS includes two types of machines: the BTS in contact with the MSs

through the radio interface and the BSC, the latter being in contact with the MSC. The

function split is basically between transmission equipment, the BTS, and managing equipment

at the BSC. A BTS compares radio transmission and reception devices, up to and including

the antennas, and also all the signal processing specific to the radio interface. A single

transceiver within BTS supports eight basic radio channels of the same TDM frame. A BSC is

a network component in the PLMN that function for control of one or more BTS. It is a

functional entity that handles common control functions within a BTS.

BTS(Base Transreceive System)

As stated, the primary responsibility of the BTS is to transmit and receive radio signals from a

mobile unit over an air interface. To perform this function completely, the signals are

encoded, encrypted, multiplexed, modulated, and then fed to the antenna system at the cell

site. Trans-coding to bring 13- kbps speech to a standard data rate of 16 kbps and then

combining four of these signals to 64 kbps is essentially a part of BTS, though, it can be done

at BSC or at MSC. The voice communication can be either at a full or half rate over logical

speech channel. In order to keep the mobile synchronized, BTS transmits frequency and time

synchronization signals over frequency correction channel (FCCH and BCCH logical

channels. The received signal from the mobile is decoded, decrypted, and equalized for

channel impairments. Random access detection is made by BTS, which then sends the

54

Page 55: Bsnl Training Report (2)

message to BSC. The channel subsequent assignment is made by BSC. Timing advance is

determined by BTS. BTS signals the mobile for proper timing adjustment. Uplink radio

channel measurement corresponding to the downlink measurements made by MS has to be

made by BTS.

BTS-BSC Configurations

There are several BTS-BSC configurations: single site; single cell; single site; multicell; and

multisite, multicell. These configurations are chosen based on the rular or urban application.

These configurations make the GSM system economical since the operation has options to

adapt the best layout based on the traffic requirement. Thus, in some sense, system

optimization is possible by the proper choice of the configuration. These include Omni

directional rural configuration where the BSC and BTS are on the same site; chain and

multidrop loop configuration in which several BTSs are controlled by a single remote BSC

with a chain or ring connection topology; rural star configuration in which several BTSs are

connected by individual lines to the same BSC; and sectorized urban configuration in which

three BTSs share the same site amd are controlled by either a collocated or remote BSC.

BSC(Base Switching Controller)

The BSC, as discussed, is connected to the MSC on one side and to the BTS on the other. The

BSC performs the Radio Resource (RR) management for the cells under its control. It assigns

and release frequencies and timeslots for all MSs in its own area. The BSC performs the

intercell handover for MSs moving between BTS in its control. It also reallocates frequencies

to the BTSs in its area to meet locally heavy demands during peak hours or on special events.

The BSC controls the power transmission of both BSSs and MSs in its area. The minimum

power level for a mobile unit is broadcast over the BCCH. The BSC provides the time and

frequency synchronization reference signals broadcast by its BTSs. The BSC also measures

the time delay of received MS signals relative to the BTS clock. If the received MS signal is

not centered in its assigned timeslot at the BTS, The BSC can direct the BTS to notify the MS

to advance the timing such that proper synchronization takes place.

55

Page 56: Bsnl Training Report (2)

MSC(Mobile Switching Controler)

As stated, the main function of the MSC is to coordinate the set up of calls between GSM

mobile and PSTN users. Specifically, it performs functions such as paging, resource

allocation, location registration, and encryption. Specifically, the call-handling function of

paging is controlled by MSC. MSC coordinates the set up of call to and from all GSM

subscribers operating in its areas. The dynamics allocation of access resources is done in

coordination with the BSS. More specifically, the MSC decides when and which types of

channels should be assigned to which MS. The channel identity and related radio parameters

are the responsibility of the BSS, The MSC provides the control of interworking with

different networks. It is transparent for the subscriber authentication procedure. The MSC

supervises the connection transfer between different BSSs for MSs, with an active call,

moving from one call to another. This is ensured if the two BSSs are connected to the same

MSC but also when they are not . In this latter case the procedure is more complex, since

more then one MSC in involved. The MSC performs billing on calls for all subscribers based

in its areas. When the subscriber is roaming elsewhere, the MSC obtains data for the call

billing from the visited MSC. Encryption parameters transfers from VLR to BSS to facilitate

ciphering on the radio interface are done by MSC. The exchange of signaling information on

the various interface toward the other network elements and the management of the interface

themselves are all controlled by the MSC. Finally, the MSC serves as a SMS gateway to

forward SMS messages from Short Message Service Centers (SMSC) to the subscribers and

from the subscribers to the SMSCs. It thus acts as a message mailbox and delivery system.

VLR(Visitor Lacation Register)

The VLR is collocated with an MSC. A MS roaming in an MSC area is controlled by the

VLR responsible for that area. When a MS appears in a LA, it starts a registration procedure.

The MSC for that area notices this registration and transfers to the VLR the identify of the LA

where the MS is situated. A VLR may be in charge of one or several MSC LA’s. The VLR

constitutes the databases that support the MSC in the storage and retrieval of the data of

subscribers present in its area. When an MS enters the MSC area borders, it signals its arrival

to the MSC that stores its identify in the VLR. The information necessary to manage the MS

is contained in the HLR and is transferred to the VLR so that they can be easily retrieved if so

required.

56

Page 57: Bsnl Training Report (2)

HLR(Home Location Register)

The HLR is a database that permanently stores data related to a given set of subscribers. The

HLR is the reference database for subscriber parameters. Various identification numbers and

addresses as well as authentication parameters, services subscribed, and special routing

information are stored. Current subscriber status including a subscriber’s temporary roaming

number and associated VLR if the mobile is roaming, are maintained.

The HLR provides data needed to route calls to all MS-SIMs home based in its MSC area,

even when they are roaming out of area or in other GSM networks. The HLR provides the

current location data needed to support searching for and paging the MS-SIM for incoming

calls, wherever the MS- SIM may be. The HLR is responsible for storage and provision of

SIM authentication and encryption parameters needed by the MSC where the MS-SIM is

operating. It obtains these parameters from the AUC. The HLR maintains record of which

supplementary service each user has subscribed to and provides permission control in

granting services. The HLR stores the identification of SMS gateways that have messages for

the subscriber under the SMS until they can be transmitted to the subscriber and receipt is

knowledge. Some data are mandatory, other data are optional. Both the HLR and the VLR can

be implemented in the same equipment in an MSC (collocated). A PLMN may contain one or

several HLRs.

AUC(Authentic Unit Controller)

The AUC stores information that is necessary to protect communication through the air

interface against intrusions, to which the mobile is vulnerable. The legitimacy of the

subscriber is established through authentication and ciphering, which protects the user

information against unwanted disclosure. Authentication information and ciphering keys are

stored in a database within the AUC, which protects the user information against unwanted

disclosure and access. In the authentication procedure, the key Ki is never transmitted to the

mobile over the air path, only a random number is sent. In order to gain access to the system,

the mobile must provide the correct Signed Response (SRES) in answer to a random number

(RAND) generated by AUC. Also, Ki and the cipher key Kc are never transmitted across the

air interface between the BTS and the MS. Only the random challenge and the calculated

response are transmitted. Thus, the value of Ki and Kc are kept secure. The cipher key, on the

other hand, is transmitted on the SS7 link between the home HLR/AUC and the visited MSC,

57

Page 58: Bsnl Training Report (2)

which is a point of potential vulnerability. On the other hand, the random number and cipher

key is supposed to change with each phone call, so finding them on one call will not benefit

using them on the next call. The HLR is also responsible for the “authentication” of the

subscriber each time he makes or receives a call. The AUC, which actually performs this

function, is a separate GSM entity that will often be physically included with the HLR. Being

separate, it will use separate processing equipment for the AUC database functions.

EIR (EQUIPMENT IDENTIFY REGISTER)

EIR is a database that stores the IMEI numbers for all registered ME units. The IMEI

uniquely identifies all registered ME. There is generally one EIR per PLMN. It interfaces to

the various HLR in the PLMN. The EIR keeps track of all ME units in the PLMN. It

maintains various lists of message. The database stores the ME identification and has nothing

do with subscriber who is receiving or originating call. There are three classes of ME that are

stored in the database, and each group has different characteristics.

• White List: contains those IMEIs that are known to have been assigned to valid MS’s. This

is the

category of genuine equipment.

• Black List: contains IMEIs of mobiles that have been reported stolen.

• Gray List: contains IMEIs of mobiles that have problems (for example, faulty software,

wrong make

of the equipment). This list contains all MEs with faults not important enough for barring.

58

Page 59: Bsnl Training Report (2)

CDMA

INTRODUCTION

Access network, the network between local exchange and subscriber, in the Telecom Network

accounts for a major portion of resources both in terms of capital and manpower. So far, the

subscriber loop has remained in the domain of the copper cable providing cost effective

solution in past. Quick deployments of subscriber loop, coverage of inaccessible and remote

locations coupled with modern technology have led to the emergence of new Access

Technologies. The various technological options available are as follows :

1. Multi Access Radio Relay

2. Wireless In Local Loop

3. Fibre In the Local Loop

Different Codes

Walsh Code :

In CDMA the traffic channels are separated by unique “Walsh” code. All such codes are

orthogonal to each other. The individual subscriber can start communication using one of

these codes. These codes are traffic channel codes and are used for orthogonal spreading of

the information in the entire bandwidth. Orthogonality provides nearly perfect isolation

between the multiple signals transmitted by the base station. The basic concept behind

creation of the code is as follows:

(a) Repeat the function right

(b) Repeat the function below

(c) Invert function (diagonally)

Long code :

the long pseudo random noise (PN) sequence is based on 242 characteristic polynomial. With

this long code the data in the forward direction (Base to Mobile) is scrabled. The PN codes

59

Page 60: Bsnl Training Report (2)

are generated using linear shift registers. The long code is unique for the subscribers and is

known as users address mask.

Short Code :

The short pseudo random noise (PN) sequence is based on 215 characteristic polynomial. This

short code differentiates the cells & the sectors in a cell. It also consists of codes for I & Q

channel feeding the modulator.

Advantages

CDMA wireless access provides the following unique advantages:

1. Larger Capacity :

let us discuss this issue with the help of Shannon’s Theorem. It states that the channel

capacity is related to product of available band width and S/N ratio.

C = W log 2 (1+S/N)

Where C = channel capacity

W = Band width available

S/N = Signal to noise ratio.

It is clear that even if we improve S/N to a great extent the advantage that we are expected to

get in terms of channel capacity will not be proportionally increased. But instead if we

increase the bandwidth (W), we can achieve more channel capacity even at a lower S/N. That

forms the basis of CDMA approach, wherein increased channel capacity is obtained by

increasing both W & S/N. The S/N can be increased by devising proper power control

methods.

2.Vocoder and variable data rates:

As the telephone quality speech is band limited to 4 Khz when it is digitized with PCM its bit

rate rises to 64Kb/s Vocoding compress it to a lower bit rate to reduce bandwidth. The

transmitting vocoder takes voice samples and generates an encoded speech/packet for

transmission to the receiving vocoder. The receiving Vocoder decodes the received speech

packet into voice samples. One of the important feature of the variable rate vocoder is the use

of adaptive threshold to determine the required data rate. Vocoders are variable rate vocodes.

By operating the vocoder at half rate on some of the frames the capacity of the system can be

60

Page 61: Bsnl Training Report (2)

enhanced without noticeable degradation in the quality of the speech. This phenomenon helps

to absorb the occasional heavy requirement of traffic apart from suppression of background

noise. Thus the capacity advantage makes spread spectrum an ideal choice for use in areas

where the frequency spectrum is congested.

3.Seamless Hand-off :

CDMA provides soft hand-off feature for the mobile crossing from one cell to another cell by

combining the signals from both the cells in the transition areas. This improves the

performance of the network at the boundaries of the cells, virtually eliminating the dropped

calls.

4.No Frequency Planning :

A CDMA system requires no frequency planning as the adjacent cells use the same common

frequency. A typical cellular system (with a repetition rate of 7) and a CDMA system is

shown in the following figures which clearly indicates that in a CDMA network no frequency

planning is required.

Fig: CDMA 38frequency

Fig: GSM Frequency

61

Page 62: Bsnl Training Report (2)

5. High Tolerance to Interference :

The primary advantage of spread spectrum is its ability to tolerate a fair amount of interfering

signals as compared to other conventional systems. This factor provides a considerable

advantage from a system point of view.

BROAD BAND

INTRODUCTION

With the evolution of computer networking and packet switching concept a new era of

integrated communication has emerged in the telecom world. Rapid growth of data

communication market and popularity of Internet, reflect the needs of enhanced infrastructure

to optimize the demand of traffic. Integration of telecom and computer networking technology

trend has further amplified the importance of telecommunications in the field of information

communication. It becomes a tool for the conveyance of information, and thus can be critical

to the development process.Telecommunications has become one of the most important

infrastructures that are very essential to the socio-economic well being of any nation. As the

Internet market continues to explode, demand for greater bandwidth and faster connection

speeds have led to several technological approaches developed to provide broadband access to

all consumers. The demand for high-speed bandwidth is growing at a fast pace, driven mostly

by growth in data volumes as the Internet and related networks become more central to

business operations. The rapid growth of distributed business applications, e-commerce, and

bandwidth-intensive applications (such as multimedia, videoconferencing, and video on

demand) generate the demand for bandwidth and access network.

IMPLEMENTATION OF BROADBAND

To Strengthen Broadband Penetration, the Government of India has formulated a Broadband

Policy whose main objectives are to:-

• Establish a regulatory framework for the carriage and the content of information in the

scenario of convergence.

• Facilitate development of national infrastructure for an information based society.

• Make available broadband interactive multimedia services to users in the public network.

62

Page 63: Bsnl Training Report (2)

• Provide high speed data and multimedia capability using new technologies to all towns with

a population greater than 2 lakhs.

• Make available Internet services at panchayat (village) level for access to information to

provide product consultancy and marketing advice.

TECHNOLOGY OPTIONS FOR BROADBAND SERVICES

• Narrow Band :2.4 kbps – 128kbps

• Broadband: 256kbps – 8000kbps

• LAN: 1000kbps – 100Mbps / Giga Ethernet Various Access Technologies are used for the

delivery of broadband services. Broadband communications technology can be divided

broadly in to Following categories: -

• Wireline Technology

• Wireless Technologies Service providers according to available technology and access

provide the broadband services to customers. The access technologies that are adopted by the

services providers are mainly Optical Fiber Technologies, DSL on copper loop, Cable TV

Network, Satellite Media, cellular and fixed wireless, Terrestrial Wireless etc. Technology

options for broadband services may be classified according to the mode of access. Wire line

Technologies include

• Digital Subscriber Lines (DSL) on copper loop

• Optical Fiber Technologies

• Cable TV Network

• PLC (Power Line Communication) Wireless Technologies include

• Satellite Media

• Terrestrial Wireless

• 3G Mobile

• Wi-Fi (Wireless Fidelity)

• WiMax

• LMDS and MMDS

• FSO (Free Space Optics)

63

Page 64: Bsnl Training Report (2)

BROADBAND NETWORK

The broadband services reached to customer from the three providers. Basically these are

Service Provider, Network Provider and Access Provider. The role of Network Provider is to

provide the services offered to customer through the access extended by Access Provider.

There are various types of networks which are capable of transmitting and managing the

broadband traffic to desired nodes or locations.

Wire line access technology through DSL, Fiber, Cable etc are generally adopts:

• IP based Network

• ATM Network

Wireless access technology through Wi-Fi, Wi-Max. 3G mobile etc provides wireless access

to ingress point of any core network any migrates to Internet world.

64

Page 65: Bsnl Training Report (2)

INTERNET

INTRODUCTION

• Smaller private version of Internet. It uses Internet protocols to create enterprise-wide

network which may consists of interconnected LANs.

• It may or may not include connection to Internet.

• Intranet is an internal information system based on Internet technology and web protocols

for implementation within a corporate organization.

• This implementation is performed in such a way as to transparently deliver the immense

informational resources of an organization to each individual’s desktop with minimal cost,

time and effort.

• The Intranet defines your organization and display it for everyone to see.

WHO NEEDS AN INTRANET:

In an Intranet environment is used to communicate over two or more networks across

different locations.

1. Users having multi-locations with multi-networks.

2. Users having single locations with multi-networks.

3. Users having single locations with single networks.

WHAT’S REALLY COOL ABOUT INTRANET:

From a technology point of view, an Intranet is simply beautiful Because:

1. It is saleable.

2. It is Interchangeable.

3. It is platform independent

4. It is Hardware independent.

5. It is vendor independent.

WHY INTRANET FOR AN ORGANIZATION:

• Quick access to voice, video, data and other resources needed by users.

• Variety of valuable applications of Intranet applications improve communication and

productivity across all areas of an enterprise. An Intranet can give immediate access to

products specifications, pricing charts and new collateral’s, sales lead, competitive

65

Page 66: Bsnl Training Report (2)

information and list of customer wins Including profit/loss analysis, thus boosting the success

of the business.

APPLICATIONS OF INTRANET

1. Publishing Corporate documents Corporate documents such as newsletters, annual reports,

maps, company facilities, price lists, product’s information literature can be easily published

and propagated across an organization. Intranet technology facilitates efficient, timely and

accurate communication across the entire corporate organization and cuts down on the cost of

publishing the information on paper every now and then.

2. Access into searchable directories Intranet provides rapid access to corporate phone books

and the like. By using this technology, information can be made more widely available.

Excellent Mailing Facilities .With Intranet mail products mailing attachment of documents,

sound, vision And other multimedia is facilitated. With the evolution of this web technology

one-to-many communication has become more effective.

3. Proper Sharing of Information Using Intranet technology, applications such as Bulletin

Board Services can help every individual in an organization to put forth his views on various

topics and discuss it with others in the organization.

4. Developing Groupware Applications The flow of documents can be automated by

incorporating intranet in an organization. Thus the overall efficiency of an organization

increases as less manual and paper involvement will be required. Typical examples are

sanctioning of expense reports/travel reports, Conference room booking, etc.

FIG: TYPICAL INTERANET SETUP

66

Page 67: Bsnl Training Report (2)

TECHNICAL OVERVIEW OF THE INTRANET TECHNOLOGY

Intranet runs on open TCP/IP network, enable companies to employ the same type of servers

and browser used for World Wide Web for internal applications distributed over the corporate

LAN . A typical Intranet implementation involves a high end machine called a server which

can be accessed by individual PCs commonly referred to as clients, through the network.

The Intranet site setup can be quite inexpensive, especially if your users are already connected

by LAN. Most popular Intranet web servers can run on a platform widely found in most

organizations. Basic requirements for setting up an intranet site are:

REQUIREMENTS :

Software :

• Server : OS can be Windows server, Unix, LINUX .Web Server s/w should be installed

• Client : OS can be Windows workstation, LINUX .Web Browser software

HARDWARE:

• Server: 4 GB RAM, 360 GB secondary storage, Pentium processor with CD ROM .

• Client: 1GB RAM, 180 GB Secondary storage, Pentium processor .

67

Page 68: Bsnl Training Report (2)

Wi-Fi

INTRODUCTION

Scope:Wi-Fi is a registered trademark by the Wi-Fi Alliance. The products tested and

approved as "Wi-Fi Certified" are interoperable with each other, even if they are from

different manufacturer. It is Short form for “Wireless-Fidelity” and is meant to generically

refer to any type of ‘802.11’ network, whether ‘802.11’b, ‘802.11’a, dual-band, etc. Initially

the term "Wi-Fi" was used in place of the 2.4GHz ‘802.11’b standard, in the same way that

"Ethernet" is used in place of IEEE 802.3 but Alliance has expanded the generic use of the

term to cover ‘802.11’a, dual-band etc.

GENERAL DESCRIPTION OF WI-FI NETWORK:

A Wi-Fi network provides the features and benefits of traditional LAN technologies such as

Ethernet and Token Ring without the limitations of wires or cables. It provides the final few

metres of connectivity between a wired network and the mobile user thereby providing

mobility, scalability of networks and the speed of installation. WIFI is a wireless LAN

Technology to deliver wireless broad band speeds up to 54 Mbps to Laptops, PCs, PDAs ,

dual mode wifi enabled phones etc. In a typical Wi-Fi configuration, a transmitter/receiver

(transceiver) device, called the Access Point (AP), connects to the wired network from a fixed

location using standard cabling. A wireless Access Point combines router and bridging

functions, it bridges network traffic, usually from Ethernet to the airwaves, where it routes to

computers with wireless adapters. The AP can reside at any node of the wired network and

acts as a gateway for wireless data to be routed onto the wired network as shown in Figure-It

supports only 10 to 30 mobile devices per Access Point (AP) depending on the network

traffic. Like a cellular system, the Wi-Fi is capable of roaming from the AP and re-

connecting to the network through another AP. The Access Point (or the antenna attached to

the Access Point) is usually mounted high but may be mounted essentially anywhere that is

practical as long as the desired radio coverage is obtained.

68

Page 69: Bsnl Training Report (2)

Fig: A typical Wi-Fi network

Fig: Extending Wi-Fi coverage with multiple AP

Wi-Fi Network Configuration:

(1.) A Wireless Peer-To-Peer Network: This mode is also known as ADHOC mode. Wi-Fi

networks can be simple or complex. At its most basic, two PCs equipped with wireless

adapter cards can set up an independent network whenever they are within range of one

another. This is called a peer-to-peer network. It requires no administration or pre-

configuration. In this case, each client would only have access to the resources of the other

69

Page 70: Bsnl Training Report (2)

client and not to a central server as shown in Figure-

Fig: Peer to Peer network

(2.)Client and Access Point: This is known as INFRASTUCTURE mode and is normally

employed. However, wireless gateway can be configured to enable peer to peer

communication in this mode as well. In this mode, one Access Point is connected to the wired

network and each client would have access to server resources as well as to other clients. The

specific number client depends on the number and nature of the transmissions involved. Many

real-world applications exist where a single Access Point services from 15 to 50 client devices

as shown in Figure-

Fig: Server and Client network in Wi-Fi

(3.) Multiple Access Points and Roaming: Access points can be connected to each other

through UTP cable or they can be connected to each other over radio through wireless

bridging. There is an option to connect access points in a mesh architecture where in event of

a fault in an access point the network heals itself and connectivity is ensured through other

access point. This changeover takes place dynamically.

70

Page 71: Bsnl Training Report (2)

Fig:- Multiple Access Points and Roaming in Wi-Fi

BENEFITS OF WI-FI:

In a Wi-Fi users can access shared information without looking for a place to plug in, and

network managers can set up or augment networks without installing or moving wires. Wi-Fi

offers the following productivity, conveniences, and cost advantages over traditional wired

networks:

• Mobility: Wi-Fi systems can provide LAN users with access to real-time information

anywhere in their organization. This mobility supports productivity and service opportunities

not possible with wired networks.

• Installation Speed and Simplicity: Installing a Wi-Fi system can be fast and easy and can

eliminate the need to pull cable through walls and ceilings.

• Installation Flexibility: Wireless technology allows the network to go where wire cannot go.

• Reduced Cost-of-Ownership: While the initial investment required for Wi-Fi hardware can

be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle

costs can be significantly lower. Long-term cost benefits are greatest in dynamic

environments requiring frequent moves, adds, and changes.

LIMITATION OF WI-FI NETWORKS:

• Coverage: A single Access Point can cover, at best, a radius of only about 60 metres.

Hundreds of Access Points are necessary to provide seamless coverage in small area. For 10

71

Page 72: Bsnl Training Report (2)

square kms area roughly 650 Access Points are required, where as CDMA 2000 1xEV-DO

requires just 09 sites.

• Roaming: It lacks roaming between different networks hence wide spread coverage by one

service provider is not possible, which is the key to success of wireless technology.

• Backhaul: Backhaul directly affects data rate service provider used Cable or DSL for

backhaul. Wi- Fi real world data rates are at least half of the their theoretical peak rates due to

factors such as signal strength, interference and radio overhead .Backhaul reduces the

remaining throughput further.

• Interference: Wi-Fi uses unlicensed spectrum, which mean no regulator recourse against

interference. The most popular type of Wi-Fi, ‘802.11’b uses the crowded 2.4 GHz band

which is already used in Bluetooth, cordless phones and microwave ovens.

• Security: Wi-Fi Access Points and modems use the Wired Equivalent Privacy (WEP)

Standards, which is very susceptible to hacking and eavesdropping.

• Security: WEP (Wired Equivalent Privacy) is not very secure. WPA (WIFI Protected

Access) offers much better security with the help of dynamic key encryption and mutual

authentication.

72

Page 73: Bsnl Training Report (2)

Wi-Max

SCOPE:

The Wi-MAX certification mark is given to product that pass conformity and Interoperability

test for the IEEE 802-16 standard which caters for the Air interface standard for point-to-

multipoint broad- band Internet access over a wireless connection.

GENERAL DETAILS OF WI-MAX:

Wi-MAX is an acronym that stands for World-wide Interoperability for Microwave Access. It

is an ideal method for ISP to deliver high speed broadband to locations where wired

connections would be difficult or costly. Wi-MAX delivers a point-to-multipoint architecture.

It doesn't require a direct line of sight between the source and endpoint and it has a service

range of 50 Kms. It provides a shared data rate of up to 70 Mbps, which is enough to service

up to a thousand homes with high-speed access.

THE MAIN ADVANTAGES OF WI-MAX ARE:

• High speed of broadband service upto 70 Mbps.

• Wireless rather than wired access, so that it would be a lot less expensive than cable or

Digital Subscriber Line (DSL) and much easier to extend to suburban and rural areas.

• Broad coverage like the cell phone network instead of small Wi-Fi hotspots , 50 Kms.

There are following, two corresponding Wi-MAX standards:

1. IEEE 802.16-2004 is for fixed point-to-point and point-to-multipoint wireless access. It is

akin to a faster, airborne version of Digital Subscriber Line (DSL) or cable-modem services,

It is also called first Non Line of Sight (NLOS), Broad-Band Wireless access (BWA)

standard.

2. IEEE 802.16e is for mobile wireless access from laptops and hand held. It is analogous to a

faster version of third-generation (3G) telecommunications technology. (Wi-Max proponent

Intel Corp. has promised 802.16e-enabled laptops by early 2007)

WORKING OF WI-MAX:

Wi-MAX operates similar to Wi-Fi but at higher speeds, over greater distances and for a

greater number of users. It consists of following two parts:

73

Page 74: Bsnl Training Report (2)

a) A Wi-MAX tower, similar in concept to a cell-phone tower, and which can provide

coverage to a very large area as big as 3,000 square miles (~8,000 square km).

b) A Wi-MAX receiver, and antenna could be like a PCMCIA (Personal Computer Memory

Card International Association) card, or they could be built into a laptop similar to Wi-Fi

access.

It can provide two forms of wireless service:

a) The non-line-of-sight, Wi-Fi sort of service, where a small antenna on your computer

connects to the tower. In this mode, Wi-MAX uses a lower frequency range - 2 GHz to 11

GHz (similar to Wi- Fi). As lower-wavelength transmissions are not as easily disrupted by

physical obstructions they provided non line of sight coverage.

b) The line-of-sight service, where a fixed dish antenna points straight at the Wi-MAX tower

from a rooftop or pole. The line-of-sight connection is stronger and more stable, so it is able

to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies,

with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and

lots more bandwidth as shown in Figure

Fig Working of Wi-Max

74

Page 75: Bsnl Training Report (2)

WI-MAX (IEEE 802.16) SPECIFICATIONS:

• Range: 30 miles (50-kms) radius from base station.

• Speed: 70 Mbps.

• Line-of-sight not needed between user and base station.

• Frequency bands: 2 to 11 GHz and 10 to 66 GHz (licensed and unlicensed Bands)

NGN

INTRODUCTION

Telecommunication industry is changing at a rapid pace. This change in the industry is

basically driven by demand of new services from subscriber's side and urge to reduce CAPEX

(Capital Expenditure) and OPEX (Operational Expenditure) from carrier side. Today All most

all telecommunication giants are maintaining at least three kinds of basic Network.

PSTN: Public Switch Telephone Network was basically developed and engineered for giving

voice connectivity to the wire line subscribers. The network consists of Local exchange/RSU

as a part of Access Network and TAXs as a part of core Network. Already huge amount of

money has been invested in PSTN setup. Because of tough competition from Mobile & Voice

over IP, it is becoming white elephant day by day for the operators. Another fact about PSTN

is that most of its equipment are going to exhaust their lives in coming years.

PLMN: (Public Land Mobile Network): PLMN has been developed to provide voice services

for wireless subscribers, though in recent times SMS has emerged as killer application for

mobile. PLMN includes BTS/BSC as access network and MSC as a core Network.

NGN Definition

A Next Generation Network (NGN) is a packet-based network able to provide

Telecommunication Services to users and able to make use of multiple broadband, QoS-

enabled transport technologies and in which service-related functions are independent of the

underlying transport-related technologies. It enables unfettered access for users to networks

75

Page 76: Bsnl Training Report (2)

and to competing service providers and services of their choice. It supports generalized

mobility which will allow consistent and ubiquitous provision of services to users.

Fig: NGN Architecture

1. Access Layer:

Access Layers is responsible for direct subscriber attachment function. NGN can support all

kind of existing access as well as upcoming access. In fact NGN does not matter about type of

access. NGN is capable of processing traffic originated from PSTN, GSM, CDMA, xDSL,

WiMAX or any other access system. Depending upon the type of access, protocol conversion

and/or media conversion may be required at the NGN Gateways. Access Layer consists of

Gateways. Examples of gateways are media Gateway, Access gateway and Signaling gateway

Media gateway terminates media, coming from PSTN/PLMN in E1 / STM. Here it is

responsible for packetisation of media under the instruction of control layer. After

packetisation of information it throws packets to the transport Network. Subscriber can

directly be terminated in Access Gateway. All the required configuration of such subscribers

should be done at control layer. Access Gateway and Media Gateways are responsible for

carriage of Media whereas Signaling gateway is carrying signaling generated by PSTN and

informs Control Layer about the signaling in required format.

76

Page 77: Bsnl Training Report (2)

Media Gateway :

The media gateway (MG) supports packetized voice and the interface to whatever medium the

voice is to be transported on. The MG performs the task of packetizing voice and providing

connections from switched circuits (TDM) to packetized circuits (IP, Frame Relay, or ATM).

Following functions are performed by Media Gateway:

• Media Conversion

The MC must be able to provide conversion from TDM circuit-switched connections to ATM,

IP, or Frame Relay connections. This includes the packetization of the voice itself. Media

processing includes transcoding, conferencing, interactive voice recognition, and other audio

resource functions.

• Resource Allocation

Resource allocation includes the reservation and release of all resources. It is important to

understand that although the MG is responsible for resource allocation and management, it

does so under the direction of the MGC. The MGC holds the ultimate responsibility of

defining what resources are to be allocated for a call. The MG is capable of providing either

point-to-point connections or point-to-multipoint connections (such as in a conference call).

The MC must also support voice, data, video, and facsimile.

• Event Notification

The MG must also maintain the state of all resources and report the state to the MGC. If a

particular resource fails, the MG reports the failure to the MGC. The MGC maintains a state

table for all resources within the MGs in its zone.

Signaling gateway :

The IETF defines the signaling gateway (SG) as being the bridge to the PSTN. It supports

STP functions to the network. The SG should be capable of providing conversions between

SS7 addresses (point codes) and IP addresses. The addressing in IP signaling networks

provides far more flexibility than in conventional SS7 networks. All entities in the SS7

environment are addressed through the use of point codes. The point code administrator in

each country issues point codes. When a carrier uses an IP network, the entities in the IP

network are addressed by IP addresses rather than point codes. This requires the use of an SG

77

Page 78: Bsnl Training Report (2)

to resolve the addresses from the SS7 network to the addresses in the IP network. For

transporting CCS7 signaling information within NGN SIGTRAN architecture is used between

SGW and MGC.

Access Gateway :

Performs the functions of Media conversion , Codec Negotiation and termination of line side

interfaces like phones, devices and PBXs.

2. Transport Layer

Transport Layer of NGN is based on IP. It can utilize the advantage of MPLS. Transport

Layer forms the core of the Network. It basically consists of Routers, which are responsible

for carrying traffic originated by access layer. As the same core network is going to be used

for all kinds of subscribers enjoying different kind of real time and non real time services, it

should be able to make use of band width policies and Qos policies. Operator has to think of

managed Network for its subscribers. It is basically an assembly of routers connected with

optical network. Traffic coming from gat ways is properly routed by those routers.

3. Control Layer

It is responsible of call setup, routing and charging policies and other controls in NGN

environment. It consists of call servers where all information of the network resides. These

call servers are responsible for setting up, modifying, charging and tear down of the calls.

NGN may work on soft switch principle. It consists of MGC (Media Gateway Controller) as

an overall controller and MGs(Media Gateway) for termination of traffic MGC is basically a

server and it is having all the necessary information of network MGC instructs MGs for

establishing the call. SIP (Session Initiation Protocol) is used for communication between

two MGCs and between a SIP enabled user terminal and MGC. Under the control of MGC,

MG performs different call related tasks such as connection modification and termination of

media streams, packetisation of media etc.

78

Page 79: Bsnl Training Report (2)

PSTN versus NGN:

• As shown in above figure PSTN Switch consists of interface, Switching and call control. All

the functional entities are shown in one box that means they are interacting with each other

using proprietary protocol. Where as in NGN model entities are interacting using standard

protocols.

• In PSTN each node should have call control separately whereas NGN may have centralized

call control .

• PSTN is dedicated network for providing voice services to the subscribers whereas NGN is

developing with the idea of carrying all kind of traffic over it.

• PSTN is working on circuit switched principle whereas NGN is working on Packet

switching.

• PSTN provides excellent quality of voice and it is tested in all conditions whereas NGN will

provide good quality of voice and it is to be tested in adverse network conditions.

• In PSTN service integration is very difficult and because of vendor dependent technologies

it is difficult to introduce services easily. Whereas NGN shall be able to provide separate

service platform for introduction of services without depending upon underlying network

related technologies.

79

Page 80: Bsnl Training Report (2)

CONCLUSION:

It is understood that in near future operators will migrate to complete IP communication. But

it is to be ensured that during this migration should be smooth. At present there should not be

any hurry to implement NGN immediately. Operator’s first work out for building reliable IP

backbone and then process of migration can be started.

80


Recommended