Professional Documents
Culture Documents
Jio Report
Jio Report
Jio soft launched a beta on 27 December 2015, on the occasion of 83rd birthday of Reliance
Industries founder Dhirubhai Ambani, which was for partners and employees, and became
publicly available on 5 September 2016.
1.1 HISTORY
In June 2010, Reliance Industries (RIL) bought a 96% stake in Infotel Broadband Services
Limited (IBSL) for ₹4,800 crores. Although unlisted, IBSL was the only company that won
broadband spectrum in all 22 circles in India in the 4G auction that took place earlier that
year. Later continuing as RIL's telecom subsidiary, Infotel Broadband Services Limited was
renamed as Reliance JioInfocomm Limited (RJIL) in January 2013.The 4G services were
launched internally to Jio's partners, its staff and their families on 27 December 2015. The
company commercially launched its services on 5 September 2016. Within the first month,
Jio announced that it had acquired 16 million subscribers. This is the fastest ramp-up by any
mobile network operator anywhere in the world. Jio crossed 50 million subscriber mark in 83
days since its launch, subsequently crossing 100 million subscribers on 22 February 2017. By
October 2017 it had about 130 million subscribers.
Jio shares spectrum with Reliance Communications. The sharing deal is for 800 MHz band
across seven circles other than the 10 circles for which Jio already owns. In September 2016,
Jio signed a pact with BSNL for intra-circle roaming which would enable users of the
operators to use each other's 4G and 2G spectrum in national roaming mode. In February
2017, Jio announced a partnership with Samsung to work on LTE - Advanced Pro and 5G.
1.2 PRODUCTS AND SERVICES
JioPhone
Jio introduced its first affordable 4G feature phone, powered by KaiOS, named as
JioPhone on 21 July 2017. The price announced for it is ₹0 with a security deposit of
₹1500 which can be withdrawn back by the user by returning the JioPhone at Jio stores
only after three years. This phone was released for beta users on 15 August 2017 and pre-
booking for regular users started on 24 August 2017.
4G broadband
The company launched its 4G broadband services throughout India in September 2016.
Jio offers fourth-generation (4G) data and voice services, along with peripheral services
1
like instant messaging and streaming movies and music. The company has a network of
more than 250,000 km of fiber optic cables in the country, over which it will be
partnering with local cable operators to get broader connectivity for its broadband
services. With its multi-service operator (MSO) licence, Jio will also serve as a TV
channel distributor and will offer television-on-demand on its network.
LYF smartphones
Jio entered into an agreement with domestic handset maker Intex to supply 4G handsets
capable of voice over LTE (VoLTE) in 2015. However, in October 2015, Jio announced
that it would be launching its own mobile handset brand named LYF. On 25 January
2016, the company launched its LYF smartphone series starting with Water 1. Three
more handset models have been released so far, namely Water 2, Earth 1, and Flame 1.
Jionet WiFi
JioNet is a public Hotspot service from Reliance Jio. JioNet Hotspots are usually created
in locations like malls, coffee shops, stadiums, airports, and parks to name a few.
1.3 VISION
Affordable Devices: Jio has worked with all the leading device manufacturers of the world
to ensure availability of 4G LTE smartphones across all price points – from ultra-premium
models on one hand, to entry level models on the other.
Digital Currency: Jio envisions a new India which will use digital currency instead of paper
money for a more secure and convenient way to transact. Jio Money, Jio’s digital currency
and digital payments business, will play a crucial role in this by offering a platform for
ubiquitous, affordable and secure digital payments.
Jio Drive: Micro and small businesses will soon have access to cutting-edge cloud storage
technologies which were once affordable to big companies only, giving them a new edge to
compete on a global landscape.
Digital Education: Teachers and students from far flung areas can connect with each other,
crowd-source knowledge and adapt new age learning techniques and thus lift the level of
education to a completely different plane.
Digital Healthcare: Expert medical advice would be available anytime, anywhere - with
medical practitioners able to grow their practice without constraint, and provide quality of life
to the crores that make up our country.
2
2. TELECOMMUNICATION TECHNOLOGY
A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station may be combined into a
single device called a transceiver. The medium of signal transmission can be via electrical
wire or cable (also known as "copper"), optical fiber, electromagnetic fields or light. The free
space transmission and reception of data by means of electromagnetic fields is called wireless
communications.
3
2.2 1G
2.3 2G
2G networks (GSM, CDMAOne, D-AMPS) are the first digital cellular systems launched
early 1990s, offering improved sound quality, better security and higher total capacity.
GSM supports circuit-switched data (CSD), allowing users to place dial-up data calls
digitally, so that the network's switching station receives actual ones and zeroes rather
than the screech of an analog modem. The most notable upgrade of 2G over its
predecessor is the digital encryption of telephone conversations, and considerably
higher efficiency on the spectrum, which allows for greater penetration level for mobile
phones. 2G also introduced mobile data services, beginning with SMS text messaging.
2G is primarily divided into two technologies. Time division multiple access (TDMA)
standards include GSM which is predominant worldwide, the Japan-exclusive PDC, iDen
which is used in some parts of the US and Canada, and D-AMPs which is a predecessor to
GSM. The other 2G slice is code division multiple access (CDMA), which is now in lesser
use compared to TDMA because of GSM. The downside of 2G is that it is very dependent on
proximity and location to towers, and its digital nature will only compound that problem.
Analog signals degenerate over distance, consistently resulting in static until the signal
4
becomes unintelligible, while digital signal cuts off or loses and distorts dramatically because
of its jagged, on-off nature. This means that as 2G signal becomes lesser, the frequency of
dropped calls and robotic-sounding voice becomes more prevalent.
2.4 3G
3G networks (UMTS FDD and TDD) are newer cellular networks that have data rates of
384kbit/s and more. The UN's International Telecommunications Union IMT-2000 standard
requires stationary speeds of 2Mbps and mobile speeds of 384kbps for a "true" 3G.
The bandwidth and location information available to 3G devices gives rise to applications not
previously available to mobile phone users. Some of the applications are:
2.5 4G
4G technology refers to the fourth generation of mobile phone communication standards.
LTE and WiMAX are marketed as parts of this generation, even though they fall short of the
actual standard. A 4G system must provide capabilities defined by ITU in IMT Advanced.
Potential and current applications include amended mobile web access, IP telephony, gaming
services, high-definition mobile TV, video conferencing, and 3D television. Mobile 4G
network using several frequencies which are 700 MHz,850 MHz, 1800 MHz, 2100 MHz,
2300 MHz, 2600 MHz. In case of Australia, The 700 MHz band was previously used for
analogue television and became operational with 4G in December 2014. The 850 MHz band
is currently operated as a 3G network by Telstra and as a 4G network by Vodafone in
Australia.
4G LTE
Regardless of the network offering LTE or 4G services, they must package and send data so
that all network points can interpret it. Older networks utilize circuit-switching technology,
which establishes a connection directly to the target through the network so the entire
connection occurs through that connection. That’s why users of older networks that utilize
5
only circuit-switching technologies must reconnect if a call drops. On the other hand, newer
networks utilize packet-switching technology that takes advantage of a greater number of
connected points around the world. Packet-switching networks break up information into
small chunks and send them along the most efficient path, so when a node drops out, the
packet finds an alternate route and users don’t suffer dropped calls.
4G VoLTE
VoLTE stands for voice over LTE and it’s more or less exactly what it says on the tin. It's
voice calls over a 4G LTE network, rather than the 2G or 3G connections which are usually
used.
Benefits of VoLTE
The big advantage of VoLTE is that call quality is superior to 3G or 2G connections as far
more data can be transferred over 4G than 2G or 3G. Up to three times as much data as 3G
and up to six times as much as 2G to be precise, making it easier to make out not only what
the person on the other end of the line is saying, but also their tone of voice.
VoLTE can connect calls up to twice as fast as the current methods and as 2G and 3G
connections will still be available when there’s no 4G signal it simply means that there’s
greater mobile coverage overall, as currently places with a 4G signal but no 2G or 3G means
that on you can’t make or receive calls.
Anyone who currently uses 4G could also find their battery life increased with VoLTE, as
without it whenever you make or receive a call your phone has to switch from 4G to 2G or
3G, since 4G calls aren’t supported and then once the call is finished it switches back again.
All that switching, plus the need to search for a different signal each time, can give the
battery a significant hit.
Video calling
It’s also theoretically possible to make video calls over 4G, much like a Skype call except
you’d just use your mobile number and be able to use the regular dialler and call interface, so
you can make and receive video calls from anyone else with VoLTE, rather than relying on
separate accounts.
6
3. HARDWARE OVERVIEW
Telecommunications equipment (also telecoms equipment or communications equipment) is
hardware used for the purposes of telecommunications. Since the 1990s the boundary
between telecoms equipment and IT hardware has become blurred as a result of the growth of
the internet and its increasing role in the transfer of telecoms data.
Telecommunications equipment can be broadly broken down into the following categories:
3.1.1 Repeaters
A network device used to regenerate or replicate a signal. Repeaters are used in transmission
systems to regenerate analog or digital signals distorted by
transmission loss. Analog repeaters frequently can only
amplify the signal while digital repeaters can reconstruct a
signal to near its original quality.
In a data network, a repeater can relay messages between
subnetworks that use different protocols or cable
types. Hubs can operate as repeaters by relaying messages
to all connected computers. A repeater cannot do the
intelligent routing performed by bridges and routers.
3.1.2 Hubs
A hub, also called a network hub, is a common connection point for devices in a network.
Hubs are devices commonly used to connect segments of a LAN. The hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Hubs and switches serve as a central connection for all of your network equipment and
handles a data type known as frames. Frames carry your data. When a frame is received, it is
amplified and then transmitted on to the port of the destination PC. In a hub, a frame is
passed along or "broadcast" to every one of its
ports. It doesn't matter that the frame is only
destined for one port. The hub has no way of
distinguishing which port a frame should be sent
to. Passing it along to every port ensures that it
will reach its intended destination. This places a
lot of traffic on the network and can lead to poor
network response times.
7
Compared to a standard switch, the hub is slower as it can send or receive information just
not at the same time, but typically costs more than a hub.
A passive hub serves simply as a conduit for the data, enabling it to go from one device (or
segment) to another. So-called intelligent hubs include additional features that enables an
administrator to monitor the traffic passing through the hub and to configure each port in the
hub. Intelligent hubs are also called manageable hubs.A third type of hub, called a switching
hub, actually reads the destination address of each packet and then forwards the packet to the
correct port.
Hubs can be used as a standalone device or connected to compatible hubs and switches to
form a larger network. Hubs are generally easy to install and maintain, making these devices
a good option for home networking. A hub is also easily configured for small business branch
office networking.
3.1.3 Bridges
In telecommunication networks, a bridge is a product that connects a local area network to
another local area network that uses the same protocol (for example, Ethernet or token ring).
You can envision a bridge as being a device that decides whether a message from you to
someone else is going to the local area network in your building or to someone on the local
area network in the building across the street. A bridge examines each message on a LAN,
"passing" those known to be within the same LAN, and forwarding those known to be on the
other interconnected LAN (or LANs).
Bridging networks are generally always interconnected local area networks since
broadcasting every message to all possible destinations would flood a larger network with
8
unnecessary traffic. For this reason, router networks such as the Internet use a scheme that
assigns addresses to nodes so that a message or packet can be forwarded only in one general
direction rather than forwarded in all directions.
3.1.4 Switches
In a telecommunications network, a switch is a device that channels incoming data from any
of multiple input ports to the specific output port that will take the data toward its intended
destination. In the traditional circuit-switched telephone network, one or more switches are
used to set up a dedicated though temporary connection or circuit for an exchange between
two or more parties. On an Ethernet local area network (LAN), a switch determines from the
physical device (Media Access Control or MAC) address in each incoming message frame
which output port to forward it to and out of. In a wide area packet-switched network such as
the Internet, a switch determines from the IP address in each packet which output port to use
for the next part of its trip to the intended destination.
In the Open Systems Interconnection (OSI) communications model, a switch performs the
Layer 2 or Data-link layer function. That is, it simply looks at each packet or data unit and
determines from a physical address (the "MAC address") which device a data unit is intended
for and switches it out toward that device. However, in wide area networks such as the
Internet, the destination address requires a look-up in a routing table by a device known as a
router. Some newer switches also perform routing functions (Layer 3 or the Network layer
functions in OSI) and are sometimes called IP switches.
On larger networks, the trip from one switch point to another in the network is called a hop.
The time a switch takes to figure out where to forward a data unit is called its latency. The
price paid for having the flexibility that switches provide in a network is this latency.
Switches are found at the backbone and gateway levels of a network where one network
connects with another and at the subnetwork level where data is being forwarded close to its
destination or origin. The former are often known as core switches and the latter as desktop
switches. In the simplest networks, a switch is not required for messages that are sent and
received within the network. For example, a local area network may be organized in a token
ring or bus arrangement in which each possible destination inspects each message and reads
any message with its address.
9
3.2.1 Twisted Pair
Twisted pairs are commonly used for terrestrial telephone communications. In such cables,
many pairs are grouped together in a single cable, from two to several thousand. The format
is also used for data network distribution inside buildings. Twisted pair cables are quite
literally a pair of insulated wires that are twisted together to help reduce noise from outside
sources. While this does help some, these cables are still very susceptible to outside noise.
Twisted pair cables are the most cost-effective option of the three but that also brings about
lower bandwidth and high attenuation.
There are two types of twisted pair cables:
Advantages :
10
3. In turn are less likely to cause interference themselves.
4. Because it is electrically "cleaner", STP wire can carry data at a faster speed.
Disadvantages:
1. STP wire is that it is physically larger and more expensive than twisted pair
wire.
2. STP is more difficult to connect to a terminating block.
This type of cable is commonly used to deliver TV signals (its higher bandwidth makes it
more suitable for video applications) and to connect computers in a network. Along with
stable transmission of data, coaxial cables also have anti-jamming capabilities and can
effectively protect signals from being interfered. The cost is slightly higher than twisted
pair but still considered more economical than fiber. There are also two types of coaxial
cables:
75 Ohm
50 Ohm
11
Advantages :
1. Coaxial cable can support greater cable lengths between network devices than twisted pair
cable.
2. Thick coaxial cable has an extra protective plastic cover that help keep moisture
away.
Disadvantage:
1. Thick coaxial is that it does not bend easily and is difficult to install.
a) Single mode
Has a small core and only allows one mode of light to propagate at a time.
Because of this, the number of light reflections decrease as they pass through the core.
The result is low attenuation and data that is able to travel further and faster.
Commonly used in telecom, CATV networks, and Universities.
b) Multi mode
12
Has a larger core diameter that lets multiple modes of light propagate.
The amount of light reflections increase as they travel through the core, which allows
more data to pass through.
Because of its high dispersion, multimode cables have lower bandwidth, higher
attenuation and reduced signal quality further it travels.
Most commonly used for communication over short distances such as LAN, security
systems, and general fiber networks.
Advantages:
1. One single mode fiber can replace a metal of time larger and heavier.
2. Multi-mode optical cable has a larger diameter and can be used to carry signal
over short distance.
Disadvantages:
SFP cable is a form of high speed cable with Small Form Factor Pluggable Plus on either end.
They are suitable for in-rack connections between servers and switches. A small transceiver
that plugs into the SFP port of a network switch and connects to Fibre Channel and Gigabit
Ethernet (GbE) optical fiber cables at the other end. Superseding the GBIC transceiver, SFP
modules are also called "mini-GBIC" due to their smaller size. By choosing the appropriate
SFP module, the same electrical port on the switch can connect to fibers of different types
(multimode or singlemode) and different wavelengths. If the fiber is upgraded, the SFP
module is replaced. SFP twinax cable which replaces two optical modules and a
13
connectorized optical fiber with a twinaxial copper cable assembly offers the higher density,
lower cost, and lower power 10 Gigabit Ethernet solution.
An Ethernet cable is one of the most popular forms of network cable used on wired networks.
Ethernet cables connect devices together within a local area network, like PCs, routers,
and switches. Given that these are physical cables, they do have their limitations, both in the
distance that they can stretch and still carry proper signals, and their durability. This is one
reason there are different types of Ethernet cables; to perform certain tasks in particular
situations.
Types:
Ethernet cables normally support one or more industry standards including Category 5
(CAT5) and Category 6 (CAT6).
A crossover cable is a special type of Ethernet cable specially designed for connecting two
computers to each other. By contrast, most Ethernet cables are designed to connect one
computer to a router or switch.
Ethernet cables are physically manufactured in two basic forms called solid and stranded.
Solid Ethernet cables offer slightly better performance and improved protection against
electrical interference. They're also more commonly used on business networks, wiring inside
office walls, or under lab floors to fixed locations
Stranded Ethernet cables are less prone to physical cracks and breaks, making them more
suitable for travellers or in home networking setups.
A single Ethernet cable, like an electric power cord, has a limited maximum distance
capacity, meaning they have an upper limit to how long they can be before signal loss
14
(called attenuation) happens. This is due to their electrical transmission characteristics and is
directly affected by interference around the cable.
Both ends of the cable should be close enough to each other to receive signals quickly, but far
enough away from electrical interferences to avoid interruptions. However, this alone doesn't
limit the size of a network because hardware like routers or hubs can be used to join multiple
Ethernet cables together within the same network. This distance between two devices is
called the network diameter.
The maximum length of a single CAT5 cable, before attenuation occurs, is 324 feet. CAT6
can go up to around 700 feet. Keep in mind that Ethernet cables can be longer but they might
suffer from signal loss, especially if there are other electrical appliances that the cable passes
by.
The Patch cord (sometimes called a patch cable) is a length of cable with connectors on the
ends that is used to connect an end device to something else, such as a power source. One of
the most common uses is connecting a laptop, desktop or other end device to a wall outlet.
Fiber patch cords are typically called fiber jumpers and are either standard jumpers or mode
conditioning jumpers.
A patch cord may also be used to connect a switch port or a server to the structured cabling
system. Although the new standards do not recommend doing so, sometimes a patch cord is
used to connect a server directly to a switch port. When cabling channel is tested, it is a called
channel test if patch cords are included, but a permanent link test otherwise. Special
connectors are required to test patch cords, which should not be tested using other test
methods
Ethernet and patch cables are usually referred to interchangeably, although there can be
differences between the two. A patch cable is a generic term that can be used for multiple
types of cabling.
15
3.2.7 Microwave
The term microwave refers to electromagnetic energy having a frequency higher than
1 gigahertz (billions of cycles per second), corresponding to wavelength shorter than 30
centimeters. Microwave signals
propagate in straight lines and are
affected very little by the troposphere.
They are not refracted or reflected by
ionized regions in the upper
atmosphere. Microwave beams do not
readily diffract around barriers such as
hills, mountains, and large human-made
structures. Some attenuation occurs
when microwave energy passes through trees and frame houses. Radio-frequency (RF)
energy at longer wavelengths is affected to a lesser degree by such obstacles.
The microwave band is well suited for wireless transmission of signals having
large bandwidth. This portion of the RF electromagnetic radiation spectrum encompasses
many thousands of megahertz. Compare this with the so-called shortwave band that extends
from 3 MHz to 30 MHz, and whose total available bandwidth is only 27 MHz. In
communications, a large allowable bandwidth translates into high data speed. The short
wavelengths allow the use of dish antennas having manageable diameters. These antennas
produce high power gain in transmitting applications, and have excellent sensitivity and
directional characteristics for reception of signals.
16
Microwaves are widely used for point-to-point communications because their
small wavelength allows conveniently-sized antennas to direct them in narrow beams, which
can be pointed directly at the receiving antenna. This allows nearby microwave equipment to
use the same frequencies without interfering with each other, as lower frequency radio waves
do. Another advantage is that the high frequency of microwaves gives the microwave band a
very large information-carrying capacity; the microwave band has a bandwidth 30 times that
of all the rest of the radio spectrum below it. A disadvantage is that microwaves are limited
to line of sight propagation; they cannot pass around hills or mountains as lower frequency
radio waves can.
17
3.2.9 WiMAX
WiMAX supports mobile, nomadic and fixed wireless applications. A mobile user, in this
context, is someone in transit, such as a commuter on a train. A nomadic user is one that
connects on a portable device but does so only while stationary -- for example, connecting to
an office network from a hotel room and then again from a coffee shop. Fixed
wireless typically refers to wireless connectivity among non-mobile devices in homes or
businesses.
The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to
promote conformity and interoperability of the standard, including the definition of
predefined system profiles for commercial vendors. The forum describes WiMAX as "a
standards-based technology enabling the delivery of last mile wireless broadband access as an
alternative to cable and DSL". IEEE 802.16m or WirelessMAN-Advanced was a candidate
for the 4G, in competition with the LTE Advanced standard.
WiMAX was initially designed to provide 30 to 40 megabit-per-second data rates, with the
2011 update providing up to 1 Gbit/s for fixed stations.
The bandwidth and range of WiMAX make it suitable for the following potential
applications:
Providing portable mobile broadband connectivity across cities and countries through
various devices.
Providing a wireless alternative to cable and digital subscriber line (DSL) for "last
mile" broadband access.
Providing data, telecommunications (VoIP) and IPTV services (triple play).
Providing Internet connectivity as part of a business continuity plan.
Smart grids and metering.
WiMAX can provide at-home or mobile Internet access across whole cities or countries. In
many cases this has resulted in competition in markets which typically only had access
through an existing incumbent DSL (or similar) operator. Additionally, given the relatively
18
low costs associated with the deployment of a WiMAX network (in comparison
with 3G, HSDPA, xDSL, HFC or FTTx), it is now economically viable to provide last-mile
broadband Internet access in remote locations.
Devices that provide connectivity to a WiMAX network are known as subscriber stations
(SS). Portable units include handsets (similar to cellular smartphones); PC peripherals (PC
Cards or USB dongles); and embedded devices in laptops, which are now available for Wi-Fi
services. In addition, there is much emphasis by operators on consumer electronics devices
such as Gaming consoles, MP3 players and similar devices. WiMAX is more similar to Wi-Fi
than to other 3G cellular technologies. The WiMAX Forum website provides a list of
certified devices. However, this is not a complete list of devices available as certified
modules are embedded into laptops, MIDs (Mobile Internet devices), and other private
labeled devices.
3.2.10 UBR
Telecom’s Unspecified Bit Rate Backhaul (UBR Backhaul) service allows the Service
Provider to transit traffic from any Unbundled Bitstream Service (UBS) or Basic UBA Parent
Handover Point to a Handover Point in a Coverage Area where the Service Provider has a
Handover Link. The UBR Backhaul service provides transmission capacity from the trunk
side of the Parent Handover Point to the Service Provider’s chosen Handover Link.
Each End User is located in a Coverage Area. The End Users traffic from numerous
DSLAMs in a Coverage Area is carried to the Handover Point over Local Aggregation Paths
dimensioned to support the throughput rate for UBS or Basic UBA. The Service Provider
may interface to each of the Handover Points directly. Alternatively, the Service Provider
may choose to purchase Telecom’s UBR Backhaul service for the delivery of traffic
aggregated to another Coverage Area where the Service Provider has a Handover Link. The
Telecom access network is currently divided into 34 Coverage Areas. These Coverage Areas,
19
when combined, provide national coverage of the Telecom DSL network. Telecom may
change the location of Handover Points and related Coverage Areas in the future.
Service Providers can combine a number of Handover Links with UBR Backhaul to achieve
national service coverage. For each Coverage Area, Service Providers specify the Handover
Coverage Area where they have established a Handover Link at the Handover Point where
traffic is to be handed over. Each Coverage Area has a Handover Point for ATM (STM1 or
STM4) and Ethernet. In some cases the ATM and Ethernet Handover Points are at different
exchange locations. For Ethernet Handover, traffic from multiple Coverage Areas can be
handed over on the same Handover Link as separate VLANs.
20
4. PROTOCOL
Protocol is a system of rules that allow two or more entities of a communications system to
transmit information via any kind of variation of a physical quantity. The protocol defines the
rules syntax, semantics and synchronization of communication and possible error recovery
methods. Protocols may be implemented by hardware, software, or a combination of both.
Communicating systems use well-defined formats (protocol) for exchanging various
messages. Each message has an exact meaning intended to elicit a response from a range of
possible responses pre-determined for that particular situation. The specified behavior is
typically independent of how it is to be implemented. Communication protocols have to be
agreed upon by the parties involved. To reach agreement, a protocol may be developed into a
technical standard. A programming language describes the same for computations, so there is
a close analogy between protocols and programming languages: protocols are to
communication what programming languages are to computations.
Protocols exist at several levels in a telecommunication connection. For example, there are
protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level. In the standard model known as Open Systems
Interconnection (OSI), there are one or more protocols at each layer in the telecommunication
exchange that both ends of the exchange must recognize and observe. Protocols are often
described in an industry or international standard. The TCP/IP Internet protocols, a common
example, consist of:
Internet Protocol (IP) is the principal set (or communications protocol) of digital message
formats and rules for exchanging messages between computers across a single network or a
series of interconnected networks, using the Internet Protocol Suite (often referred to as
TCP/IP). Messages are exchanged as datagrams, also known as data packets or just packets.
21
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite, which is a set of
communications protocols consisting of four abstraction layers: link layer (lowest), Internet
layer, transport layer and application layer (highest). The main purpose and task of IP is the
delivery of datagrams from the source host (source computer) to the destination host
(receiving computer) based on their addresses. To achieve this, IP includes methods and
structures for putting tags (address information, which is part of metadata) within datagrams.
The process of putting these tags on datagrams is called encapsulation.
Internet protocol transmits the data in form of a datagram as shown in the following diagram:
4.1.1 IP Versions:
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one
of the core protocols of standards-based internetworking methods in the Internet, and was the
first version deployed for production in the ARPANET in 1983. It still routes most Internet
traffic today, despite the ongoing deployment of a successor protocol, IPv6. IPv4 is a
connectionless protocol for use on packet-switched networks. It operates on a best effort
delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or
avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an
upper layer transport protocol, such as the Transmission Control Protocol (TCP).
IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses.
IPv4 reserves special address blocks for private networks and multicast addresses. IPv4
addresses may be represented in any notation expressing a 32-bit integer value. They are
22
most often written in the dot-decimal notation, which consists of four octets of the address
expressed individually in decimal numbers and separated by periods.
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers
on networks and routes traffic across the Internet. IPv6 is an Internet Layer protocol
for packet-switched internetworking and provides end-to-end datagram transmission across
multiple IP networks, closely adhering to the design principles developed in the previous
version of the protocol, Internet Protocol Version 4 (IPv4).
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32
bits to 128 bits. This extension anticipates considerable future growth of the Internet and
provides relief for what was perceived as an impending shortage of network addresses. IPv6
also supports auto-configuration to help correct most of the shortcomings in version 4, and it
has integrated security and mobility features.
Supports source and destination addresses that are 128 bits (16 bytes) long.
Requires IPSec support.
Uses Flow Label field to identify packet flow for QoS handling by router.
Allows the host to send fragments packets but not routers.
Doesn't include a checksum in the header.
Uses a link-local scope all-nodes multicast address.
Does not require manual configuration or DHCP.
23
Uses host address (AAAA) resource records in DNS to map host names to IPv6
addresses.
Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6
addresses to host names.
Supports a 1280-byte packet size (without fragmentation).
Moves optional data to IPv6 extension headers.
Uses Multicast Neighbor Solicitation messages to resolve IP addresses to link-layer
addresses.
24
5. JIO ARCHITECTURE
5.1 Terminology
a. Access layer
b. Aggregation layer
c. Core layer
EnodeB:
E-UTRAN Node B, also known as Evolved Node B (abbreviated as eNodeB or eNB), is the
element in E-UTRA of LTE that is the evolution of the element Node B in UTRA of UMTS.
It is the hardware that is connected to the mobile phone network that communicates directly
wirelessly with mobile handsets (UEs), like a base transceiver station (BTS) in GSM
networks.
25
LTE vendors are now offering eNodeB with a choice of either separate controller + Remote
Radio Head(s) for Macro Sites, or fully integrated controller with RF, for Small Cell
applications. The choice depends typically on the scale of coverage required.
Small cell:
Small cells are low-powered cellular radio access nodes that operate in licensed and
unlicensed spectrum that have a range of 10 meters to a few kilometers. Single sector is with
120°. They are "small" compared to a mobile macrocell, partly because they have a shorter
range and partly because they typically handle fewer concurrent calls or sessions. They make
best use of available spectrum by re-using the same frequencies many times within a
geographical area. Fewer new macrocell sites are being built, with larger numbers of small
cells recognised as an important method of increasing cellular network capacity, quality and
resilience with a growing focus using LTE Advanced. There are two types of small cells-
Indoor small cells and Outdoor small cells
Benefits:
1- Lower delay: users will experience lower latency for data services and will enjoy faster
download and upload time.
26
3- Better cell-edge coverage: Macro base stations provide poor service at the cell edge
which includes a large percentage of the cell area. Small cells provide better cell-edge
performance, particularly for the uplink than large cells.
There are different router collaboration at different location for data transmission from main
server to our devices. These are connected through Ring and Mesh Topology. There are
different rings of routers to reach communication at our door . There are maximum limit of
router in each ring.
Some are:
Network Classification –
eNB CSR
Network Flow
Small Cell L2 Switch
27
5.3 JIO’s AG3
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference to
addresses based on predetermined criteria. Aggregating routes limits the number of routes
available to service providers. When a service provider receives IP addresses occurs in a
contiguous block. The service provider can then divide IP addresses into smaller allocated
blocks and lease them to other Internet service providers.
Route aggregation offers stability to network. Additionally, reducing the number of routers
minimizes the overhead related to routing protocol and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.
Aggregation Node 3(AG3) routers are the largest aggregation routers used in JIO. AG3
routers are place in 11 super core cities.
MESH TOPOLOGY
Advantages:
Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
Expansion and modification in topology can be done without disrupting other nodes.
Disadvantages:
28
11 supercore cities with 2*AG3 POPs
NEW DELHI
NOIDA
LUCKNOW
W
AHEMDABAD
KOLKATA
NAGPUR
HYDERABAD
MUMBAI MUMBAI
CHENNAI
BANGLURU
U
29
5.4 JIO’s AG2
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference based on
predetermined criteria. Aggregating route limits the number of routes available to service
providers. When a service provider receives IP addresses, the allocation of these IP addresses
occurs in a contagious block. The service provider can then divide the IP addresses into
smaller allocated block and lease them to other Internet service providers.
Route aggregation offers stability to networks. Additionally, reducing the number of routers
minimizes the overhead related to routing protocols and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.
AG2 Routers collects the data from the AG1 routers transfers them to the next higher
level that is the AG3 router. AG2 router are the next biggest routers after AG3 routers
used in JIO.
RING TOPOLOGY
Advantages:
Reduced chances of data collision as each node release a data packet after receiving
the token.
Token passing makes ring topology perform better than bus topology under heavy
traffic.
Equal access to the resources.
In Unidirectional Ring, a data packet must pass through all the nodes.
30
5.5 JIO’s AG1
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference to
addresses based on predetermined criteria. Aggregating routes limits the number of routes
available to service providers. When a service provider receives IP addresses occurs in a
contiguous block. The service provider can then divide IP addresses into smaller allocated
blocks and lease them to other Internet service providers.
Route aggregation offers stability to network. Additionally, reducing the number of routers
minimizes the overhead related to routing protocol and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.
AG1 Routers collect the data from the small cell routers and transfers them to the next
higher level that is the AG2 routers.
RING TOPOLOGY
In the past, the ring topology was most commonly used in schools, offices, and smaller
buildings where networks were smaller. However, today, the ring topology is seldom used,
having been switched to another type of network topology for improved performance,
stability, or support.
All data flows in one direction, reducing the chance of packet collisions.
A network server is not needed to control network connectivity between each
workstation.
Data can transfer between workstations at high speeds.
Additional workstations can be added without impacting performance of the network.
31
All data being transferred over the network must pass through each workstation on the
network, which can make it slower than a star topology.
The entire network will be impacted if one workstation shuts down.
The hardware needed to connect each workstation to the network is more expensive
than Ethernet cards and hubs/switches
32
6. ROUTERS USED IN JIO
6.1 AG1 Router (Cisco ASR 903)
Rack Size 3 RU
Max Capacity Up to 480 Gbps
Software IOS XE
33
6.2 AG2 Router (Cisco ASR 9010)
34
6.3 AG3 Router (Cisco ASR 9900 and ASR 9922)
The Cisco ASR 9900 Route Processor is the first generation of system processors available
for the Cisco ASR 9912
Router and ASR 9922 Router
chassis. The Cisco ASR 9900
Route Processor is designed
with a system architecture to
accommodate convergence of
Layer 2 and Layer 3 services
as required by today’s service providers in wireline, data center interconnect (DCI), and
Radio Access Network (RAN) aggregation applications.
The Cisco ASR 9900 Route Processor brings the time-tested and robust carrier-class
capabilities of Cisco IOS XR Software to the Carrier Ethernet edge. The operating system
supports true software process modularity. The capabilities of Cisco IOS XR Software allow
each process to run in separate protected memory, including each routing protocol along with
multiple instances of control, data, and management planes supported. The software also
supports distributed route processing. The Cisco ASR 9900 Route Processor is designed to
deliver the high scalability, performance, and fast convergence required for today’s and
tomorrow’s demanding video, cloud, and mobile services.
The Cisco ASR 9922 Router is the largest of the Cisco ASR 9000 Series
Routers at 43 rack units (RUs). This high-capacity platform is designed
to deliver the services of tomorrow.
35
7. SCCM SERVER
WORKING: Packages are created among the SCCM console which contain the executable
files and the command lines for the application to be installed. These packages are then
replicated on “distribution points”. Distribution points are nothing but sort of file server
which are used to store the content of the packages for a particular region. Therefore, if a
bunch of machines are remotely located then they can locally download the application from
a distribution point, rather than connecting all the way to the SCCM primary server.
All the machine in a SCCM environment will have an SCCM client agent installed on them,
which essentially helps a machine to be able to communicate with the SCCM server.
Therefore a deployment is created by the SCCM admin where an application is targeted on a
bunch of machines. With the help of the SCCM client agent installed on the end user
machine, it keeps checking for new policies or deployments. Once the policy has reached the
end machine, it will be evaluated and it will reach out to its respective regional distribution
point for downloading the content of the packages. Once the executable files are downloaded
in a temp folder (C:\Windows\ccmcache) they are installed locally and status for the same is
sent back to the SCCM server to be updated in the database
36