Daman 123
Daman 123
Submitted by
DAMAN KHURANA
42914802717
of
BACHELOR OF TECHNOLOGY
IN
1
Bharat Sanchar Nigam Limited Sangrur
BONAFIDE CERTIFICATE
Certified that the summer training project report entitled “Telecommunication” is a bonafide
record of the work done by Mr. DAMAN, atBHARAT SANCHAR NIGAM LIMITED, SANGRUR,
for the partial fulfillment of the requirements for the award of the four year degree of
Bachelors in Technology in COMPUTER SCIENCE ENGINEERING, carried out under my
supervision during June 10,2019 to July 6, 2019
Dy G.M. TELECOM
2
ACKNOWLEDGEMENT
I would like to thank Bharat Sanchar Nigam Limited (BSNL), SANGRUR that gave me
The honor of completing my summer training. I would like to thank all the employees and
hearties thanks are due to MR. GURSHARN SINGH (JTO) who encouraged me to cope up with
DAMAN
3
ABOUT THE COMPANY (BSNL)
4
nook & corner of the country & operates across India except
New Delhi & Mumbai. Whether it is inaccessible areas of
Siachen glacier or North-Eastern regions of the country, BSNL
serves its customers with a wide bouquet of telecom services
namely Wireline, CDMA mobile, GSM mobile, Internet,
Broadband, Carrier service, MPLS-VPN, VSAT, VoIP, IN
Services, FTTH, etc.
5
ABSTRACT
This study is about the telecommunication and its advantages and also its types.
Telecommunication means making communication over the telephone lines and
signal. The telecommunication aims at the economic development of the country
and its aim is provide communication at the wider level. Telecommunications have
improved people's ability to stay in touch with friends and family. Telecom is one of
the fastest growing industries in India. Today India stands as the second-largest
telecommunications market in the world.
Telecommunication is communication at a distance by technological means,
particularly through electrical signals or electromagnetic waves. The word is often
used in its plural form, telecommunications, because it involves many different
technologies
Early means of communicating over a distance included visual signals, such as
beacons, smoke signals, semaphore telegraphs,signal flags, and optical heliographs.
Modern technologies for long-distance communication usually involve electrical
and electromagnetic technologies, such as telegraph, telephone, and teleprinter ,
networks, radio,microwave transmission, fiber optics, and communications
satellites.
The focus on telecom reflects the significant contribution that this sector can make
to economic growth in the country.There is substantial evidence that telecom
significantly enhances economic opportunities in both rural and urban areas.
6
TABLE OF CONTENTS
1 ACKNOWLEDGEMENT v
3 ABSTRACT vii
4 CONTENTS viii
5 LIST OF FIGURES ix
6 LIST OF TABLES ix
8 12-15
WORKING OF BASIC TELECOMMUNICATION NETWORK
10 INTRANET 18-20
13 WIMAX 27-31
14 GSM 32-34
15 (GPRS) 35
16 CDMA 36-37
18 REFERENCE 41
7
LIST OF FIGURES
LIST OF TABLES
8
9
CHAPTER-1 INTRODUCTION TO BSNL
India is the fourth largest telecom market in Asia after China, Japan and South Korea.
COUNTRY: INDIA
WEBSITE: www.bsnl.co.in
It is defined as the system of formal laws, regulations, and procedures, and informal
conventions, customs, and norms, that broaden, mold, and restrain socio-economic activity
and behavior. The country has been divided into units called Circles, Metro Districts,
Secondary Switching Areas (SSA), Long Distance Charging Area (LDCA) and Short Distance
10
Charging Area (SDCA). In India, DoT is the nodal agency for taking care of telecom sector on
behalf of government.
Its basic functions are:
· Policy Formulation
· Review of performance
· Licensing
· Standardization/Validation of Equipment
● BSNL has a customer base of over 11.62 crore and is the fourth largest integrated
telecom operator in the country.
● BSNL is the market leader in Broadband, landline and national transmission
network.
● BSNL is also the only operator covering over 5 lakh village with telecom
connectivity.
11
CHAPTER-2 WORKING OF BASIC TELECOMMUNICATION NETWORK
This section includes brief introduction of how a call is processed when we dial a call from
basic telephone to another basic telephone or from basic to mobile or vice versa.
Function OfEchange
12
· Exchange of information with subscriber lines with other exchange. This is done by two
type of signaling:
1. Inchannelsignaling
2. Common channel signaling
3. Processing of signaling information and controlling the operation of signaling
network.
4. Charging and billing.
13
● Route can be changed by the computer software
● In Hisar Gate Exchange, we have 3 VMUX of type II.
14
● It consists of local connection and broadband connection frames for the main Exchange
area.
● The MDF usually holds central office protective devices including heat coil and
functions as a test point between a line and the office.
● It provides testing of calls.
● It checks whether fault is indoor or external.
● All lines terminate individually.
15
CHAPTER-3 LEASED LINES
3.1 Introduction
A leased line (dedicated line) is a permanent fiber optic or telephone connection between
two points set up by a telecommunications carrier. They can be used for telephone, data, or
Internet services. Businesses use a leased line to connect to geographically distant offices
because it guarantees bandwidthfor network traffic. For example, a bank may use a leased
line in order to easily transfer financial information from one office to another. Customers
generally pay a flat monthly rate for the service depending on the distance between the two
points. Leased lines do not have telephone numbers. The information sent through the
leased line travels along dedicated secure channels, eliminating the congestion that occurs in
shared networks.
16
3.3.1 MLLN Features
● MLLN is an integrated, fully managed, multi service digital network platform
through which service provider can offer a wide range of service at an optimal cost
to business subscriber.
● Using NMS, MLLN can provide high speed Leased Line with improved QoS, high
availability & reliability.
● Except for connecting the local lead to the MODEM all operations & maintenance is
carried out through ROT (Remote Operating Terminal).
● NMS supports service provisioning, Network optimization, planning & service
monitoring.
● System offers end to end circuit creation and modification, circuit loop testing &
fault isolation, automatic rerouting of traffic in case of trunk failure, software
programmability of NTU etc.
● Banking, Financial institution, Stock market, paper industry, broadcasting & Internet
service Provider are the main customers for MLLN.
17
CHAPTER-4 INTRANET
4.1 Intranet
● Smaller private version of Internet. It uses Internet protocols to create enterprise-
wide network which may consists of interconnected LANs.
● It may or may not include connection to Internet.
● Intranet is an internal information system based on Internet technology and web
protocols for implementation within a corporate organization.
● This implementation is performed in such a way as to transparently deliver the
immense informational resources of an organization to each individual’s desktop
with minimal cost, time and effort.
● The Intranet defines your organization and displays it for everyone to see.
Features Of Intranet
● It is scalable.
● It is Interchangeable.
● It is platform independent
● It is Hardware independent.
● It is vendor independent.
● Quick access to voice, video, data and other resources needed by users.
● Variety of valuable Intranet applications improves communication and productivity
across all areas of an enterprise.
● A 21st Century Telephone.
● An ISO Tool.
● A Target Marketing Tool.
● A Decision Making Tool.
● A Complete Communication Tool.
18
Fig 4.1 Intranet network
Applications Of Intranet
● Publishing Corporate documents.
● Access into searchable directories.
● Excellent Mailing Facilities.
● Proper Sharing of Information.
● Developing Groupware Applications.
19
Intranet Applications In A Circle
● Every circle must have an intranet server which should have the following:
● All posting/transfer/relieving orders issued within circle to be hosted on the
intranet.
● All letters circulars/letters issued from different sections of the circle office to be
hosted on the server for immediate access by SSAs. Each section in circle office
Administration, Operations, Marketing, Finance, Planning, Computersetc can have
web pages hosted on the server.
● A database can be maintained for MIS reports and all other reports to be sent
periodically by
SSAs to circle office. The database can have front end forms designed in ASP or PHP
for the SSAs to input the data. Separate programs can be developed to consolidate
the data fed by SSAs.
● All data prepared and /or distributed during SSA heads meetings can be hosted on
the Intranet.
● The implementation of the above will reduce the usage of paper and also reduce
the usage of FAX.
20
CHAPTER-5 CORPORATE NETWORK
5.1 Introduction
A corporate network (CN0) is a closed and private computer network that affords secure
communications between geographically dispersed LANs of an enterprise.
● Informal ● Formal
● Socially oriented ● Business oriented
● Had geographical boundaries ● International infrastructure &
● Were expertise specific exposure
● No access to corporate resources ● Comprehensive expertise
● Not self sufficient ● Access to substantial corporate
resources self sufficient Self
● Not self sustainable No sustainable
● corporate governance
●
policies
●
21
● More than one network protocol (IP or IPX).
● OSPF-configured areas, if it uses IP.
● Dial-up connectivity for users connecting from home or while traveling.
● Connectivity to external networks.
● Demand-dial connections to branch offices.
● Dedicated circuits to branch offices.
· A corporate network typically uses different types of network media. The different office
segments can be on 10-MB Ethernet or Token Ring networks, but the backbone
network used for connecting the different networks and hosting servers is usually
made up of 100-MB Ethernet . Connectivity to external networks (the Internet) is over
leased lines. Connectivity to branch offices is either over dial-up line or dedicated
media (leased lines).
·
22
● Executable patches can be easily uploaded to all your remote computers and
executed remotely. Easy and intuitive configuration without lots of complicated
configuration files. Everything is configured through the stand-alone GUI interface
from any location where TCP/IP connection to your corporate network can be
established.
● You do not need to physically visit your workstations when you need to change
security settings or install patches.
● The remote client service application is bullet-proof. Your users will not be able to
disable, uninstall or delete it.
● All traffic between the server and the clients is encrypted. All local files are
encrypted as well.
● The server service application and the remote client service application work as NT
services under Windows NT/2000/XP and higher therefore they will keep working in
the log off mode.
23
6.1 Wi-Fi Network
A Wi-Fi network provides the features and benefits of traditional LAN technologies such as
Ethernet and Token Ring without the limitations of wires or cables. It provides the final few
meters of connectivity between a wired network and the mobile user. WIFI is a wireless LAN
Technology to deliver wireless broadband speeds up to 54 Mbps to Laptops, PCs, PDAs, dual
mode Wi-Fi enabled phones etc.
24
Fig 6.1 Wi-Fi Network
End users access the Wi-Fi network through Wi-Fi adapters, which are implemented as cards
adapters provide an interface between the client Network Operating System (NOS) and the
● Installation Speed and Simplicity: Installing a Wi-Fi system can be fast and easy and
can eliminate the need to pull cable through walls and ceilings.
cannot go.
hardware can be higher than the cost of wired LAN hardware, overall installation
and range from peer-to-peer networks suitable for a small number of users to full
area.
● It offers much high speed up to 54 Mbps which is very much greater than other
wireless access technologies like CORDECT, GSM and CDMA.
25
6.4 Limitations Of Wi-Fi
● Coverage: A single Access Point can cover, at best, a radius of only about 60 meters.
For 10 square kms area roughly 650 Access Points are required, where as
CDMA2000 1xEV-DO requires just 09 sites.
● Roaming: It lacks roaming between different networks hence wide spread coverage
by one service provider is not possible, which is the key to success of wireless
technology.
● Backhaul: Backhaul directly affects data rate service. Wi-Fi real world data rates are
at least half of the their theoretical peak rates due to factors such as signal strength,
further..
CHAPTER-7 WIMAX
26
WI-MAX is an acronym that stands for World -wide Interoperability forMicrowave Access
applications.
27
2. FIRST-GENERATION BROADBAND SYSTEMS: As DSL and cable modems began to be
deployed, wireless systems had to evolve to support much higher speeds to be
competitive. Very high speed systems, called local multipoint distribution systems
(LMDS), supporting up to several hundreds of megabits per second, were
developed. In the late 1990s, one of the more important deployments of wireless
broadband happened in the so-called multichannel multipoint distribution services
(MMDS) band at 2.5GHz. The MMDS band was historically used to provide wireless
cable broadcast video services, especially in rural areas The first generations of
these fixed broadband wireless solutions were deployed using the same towers that
served wireless cable subscribers. These towers were typically several hundred feet
tall and enabled LOS coverage to distances up to miles, using high-power
transmitter. The advent of satellite TV ruined the wireless cable business, and
operators were looking for alternative ways to use this spectrum. A few operators
began to offer one-way wireless Internet-access service, using telephone line as the
return path.
3. SECOND-GENERATION BROADBAND SYSTEMS: Second-generation broadband
wireless systems were able to overcome the LOS issue and to provide more
capacity. This was done through the use of a cellular architecture and
implementation of advanced-signal processing techniques to improve the link and
system performance under multipath conditions. Many solved the NLOS problem by
using such techniques as orthogonal frequency division multiplexing (OFDM), code
division multiple access (CDMA), and multi antenna processing.
middle ground between Wi-Fi and 3G technologies when compared in the key
1. Mobile Stations (MS) used by the end user to access the network.
2. The access service network (ASN), which comprises one or more base stations and
one or more ASN gateways that form the radio access network at the edge.
28
3. Connectivity service network (CSN), which provides IP connectivity and all the IP
core network functions.
Base Station (BS): The BS is responsible for providing the air interface to theMSS. Additional
functions that may be part of the BS are micro mobility management functions, such as
handoff triggering and tunnel establishment, radio resource management, QoS policy
enforcement, traffic classification, DHCP (Dynamic Host Control Protocol) proxy, key
Access Service Network Gateway (ASN-GW): The ASN gatewaytypically acts as a layer 2
traffic aggregation points within an ASN. Additional functions that may be part of the ASN
gateway include intra-ASN location management and paging, radio resource management
and admission control, caching of subscriber profiles and encryption keys, AAA client
functionality, establishment and management of mobility tunnel with base stations, QoS and
29
policy enforcement, and foreign agent functionality for mobile IP, and routing to the selected
CSN.
Connectivity Service Network (CSN): The CSN provides connectivity to the Internet, ASP,
other public networks, and corporate networks. The CSN is owned by the NSP and includes
AAA servers that support authentication for the devices, users, and specific services. The CSN
also provides per user policy management of QoS and security. The CSN is also responsible
for IP address management, support for roaming between different NSPs, location
management between ASNs, and mobility and roaming between ASNs, subscriber billing and
inter operator settlement, inter-CSN tunneling to support roaming between different NSPs.
Reference Points: The WiMAX NWG defines a reference point as a conceptual link that
connects two groups of functions that reside in different functional entities of the ASN, CSN
or MS. Reference points may not be a physical interface except when the functional entities
802.16e) specifications.
30
heterogenous ASNs.
In wireless communication every region is divided into cells. Cell size is constant for whole
system. GSM is a form of multiplexing, which divides the available bandwidth among the
different channels. Most of the times the multiplexing used is either TDM (Time division
technologies in that both signaling and speech channels are digital, and thus GSM is
31
Fig 8.1 Basic GSM network
● Better frequency efficiency, smaller cells and more customers per cell
● High audio quality and reliability for wireless, uninterrupted phone calls at higher
speeds (e.g. from cars, trains) i.e. high transmission quality.
● Authentication via chip-card and PIN. · Worldwide connectivity.
A mobile unit is a transmitter as well as receiver too. It has a SIM (Subscriber Identity
Module) which gives a unique identity of a subscriber. Every mobile unit has a unique IMIE
(International Mobile Equipment Identity) number.
● A base transceiver station or cell site (BTS) is a piece of equipment that facilitates
wireless communication between user equipment (UE) and a network.
● It encodes, encrypts, modulates and feeds the RF signal to antenna.
32
● It does power control and frequency hopping too.
Components
1. Mobile Services Switching Centre (MSC):
It controls all connections via a separated network to/from a mobile terminal within the
domain of the MSC – several BSC can belong to a MSC.
2. Database:
Home Location Register (HLR):
Central master database containing user data, permanent and semi-permanent data of all
subscribers assigned to the HLR (one provider can have several HLRs).
Local database for a subset of user data, including data about all user currently in the domain
of the VLR.
33
8.3 Features GSM:
● GSM is already used worldwide with over 450 million subscribers.
● GSM is mature, having started in the mid-80s. This maturity means a more stable
network with robust features. CDMA is still building its network.
● The availability of Subscriber Identity Modules, which are smart cards that provide
secure data encryption give GSM m-commerce advantages.
● General packet radio service (GPRS) is a packet oriented mobile data service available to
users of the 2G cellular communication systems, global system for mobile
communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data
rates of 56-114 kbps. It provides moderate speed data transfer, by using unused time
division multiple access (TDMA) channels.
● Its supported protocols are Internet Protocol (IP), Point to Point Protocol (PPP) and X.25.
34
● GPRS data transfer is typically charged per megabyte of traffic transferred, while data
communication via traditional circuit switching is billed per minute of connection time,
independent of whether the user actually is using the capacity or is in an idle state. GPRS
is a best effort packet switched service, as opposed to circuit switching, where a certain
Quality of service (QoS) is guaranteed during the connection for non-mobile users.
● GPRS extends the GSM circuit switched data capabilities and makes the following
services possible:
● “ Always on” Internet access
● Internet applications for smart devices through wireless application protocol (WAP)
●Point to Point (P2P) service: inter-networking with the internet (IP).
Code Division Multiple Access (CDMA) consistently provides better capacity for voice and
data communications that other commercial mobile technologies, allowing more subscribers
to connect at any given time, and it is the common platform on which 3G technologies are
built.
CDMA is a spread spectrum technology, allowing many users to occupy the same time and
frequency allocations in a given band/space. As it name implies, CDMA assigns unique codes
35
to each communication to differentiate it from others in the same spectrum resources,
CDMA enables many more people to share the airwaves at the same time than do alternative
technologies.
36
CHAPTER- 11 FIBER OPTIC TRANSMISSION SYSTEM
11.1 Introduction
Optical Fiber is new medium, in which information (voice, Data or Video) is transmitted
through a glass or plastic fiber, in the form of light, following the transmission sequence give
below :
(1) Information is encoded into Electrical Signals.
37
(2) Electrical Signals are converted into light Signals.
38
Fig 11.2 Propagation of light through fibre
11.3 Classification
There are three types of fibers:
(I) Step-Index Multimode Fiber: It has a large core, up to 100 microns indiameter. As a
result, some of the light rays that make up the digital pulse may travel a direct route,
whereas others zigzag as they bounce off the cladding. This type of fiber is best suited for
transmission over short distances, in an endoscope, for instance.
(III) Single-Mode Fiber: It has a narrow core (eight microns or less), and theindex of
refraction between the core and the cladding changes less than it does for multimode
fibers. Light thus travels parallel to the axis, creating little pulse dispersion. Telephone and
cable television networks install millions of kilometers of this fiber every year.
strengthened.
39
● MAINTENANCE:Fiber optic cables costs much less to maintain.
40
REFERENCE
❖ https://en.wikipedia.org/wiki/Bharat_Sanchar_Nigam_Limited
❖ http://www.bsnl.co.in/
❖ https://searchtelecom.techtarget.com/definition/broadband
❖ https://www.britannica.com/science/fiber-optics
❖ www.dot.gov.in/
41