Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

Department of Electronics & Telecommunications Engineering

Industrial Training Report

Submitted By Submitted To
Bashir Ahammad Zabir Engr. Syed Zahidur Rashid
Matric ID: T163014 Chairman and Assistant Professor
Course Name: Industrial Training Department of Electronic and Telecommunications
Course Code: ETE-4804 Engineering International Islamic University Chittagong

Abu Zafar Md. Imran


Lecturer
Department of Electronic and Telecommunications
Engineering
International Islamic University Chittagong

1
Candidate Declaration
It is declared clearly that any part of this report is not shared anywhere for award this degree.

Bashir Ahammad Zabir


Matric ID: T163014
Department of Electronic and Telecommunications Engineering
International Islamic University Chittagong
Date: 15/02/2021

Industrial Training Committee:

Engr. Syed Zahidur Rashid


Chairman and Assistant Professor
Department of Electronic and Telecommunications Engineering
International Islamic University Chittagong

Abu Zafar Md. Imran


Lecturer
Department of Electronic and Telecommunications Engineering
International Islamic University Chittagong
Table of Contents
Company Introduction
Company Overview……………………….…………………..…-.7
Chapter: 01 IIG Overview in Bangladesh
1.1 IIG…………………………………………………....……………...8
1.2 International Internet Gateway Association of Bangladesh … …..9
Chapter: 02 ISP Giver Overview 10
2.1 ISP………………………………………………………...……….10
2.2 Intranet………………………………………………………...….11
2.3 Internet………………………………...…………....…..….……..12
2.4 ISP Service……………………………...………………………....13
2.5 BDIX……………...………………………...…………….....…….13
2.6 FTP...…………………..….……………………………………….15
2.7 Mail Service………………..….…………………………………..16
2.8 SMTP…………………..………………………………………….17
2.9 Proxy Giver….....………...……………...……………………….17
2.10 MRTG……………...………………………...…………………...18
2.11 DNS Giver………………………………..……………………...18
Chapter: 03 Network Model 19
3.1 Network Model Layer……………..………….………….………19
3.2 TCP/IP Model OSI Model………………..……………………...21
3.3 Data Processing of OSI Model..…………………………………24
3.4 Protocol of TCP/IP Model & OSI Model……….……………...25
3.5 Advantage & Disadvantage of OSI/IP Model….………………26
Chapter: 04 Internet Component 29
4.1 Router………………………..……………………………………29
4.2 Switch…...……..………………………………………….………30
4.3 Media Converter………………..………………………………..31
4.4 OTDR………………..……………………………………………33
4.5 Fusion Splicer………………………………………………..…...34

Chapter: 05 Conclusion
Server Visit…………………………………………………………35
Conclusion……………………..…………………..……………….37
References………………..…………………..…………….……...38
Abstract

Industrial training refers to the improvement, while still earning a specific degree, of practical skills
and first-hand industry experience related to a career. Industrial Training's primary objective is to
introduce students to the real working world and to improve their knowledge and skills from what
they have learned at college. Another ambition of this initiative is to ensure that honesty,
transparency and self-confidence are always good qualities. Students must respect all ethical
principles and good working practices. It is also to assist students in the safety practices and
regulations within the industry and in the sense of cooperation and good partnership between
students and staff.

Industrial training offers students with an opportunity to access practical experience employed in
the relevant field. Industrial training can be characterized as pre-graduation work experience that
is compatible with professional growth. The aim of industrial training is to be intimate with the
sector in question and to receive a certificate for potential records. It grants the student to learn
with various individuals about manners and attitudes, punctuality, transparency and cooperation.
It grants a graduate to technically manage material, installation and working processes at the
industry level.
Company Approval and Company Information (Candidate Attendance Sheet with Verified Signature by Trainer)

Company Information

Digital Dot Net (DDN)


Address: 332 Nowab Shirajuddullah Rd, Chattogram

Trainer Information
Engr. Ariful Islam
. Digital Dot Net

7
Acknowledgement

First and foremost, I'd like to express my gratitude to Almighty Allah (SWT), the Lord of the
Universe, for providing me with the opportunity to write this report. Then I'm sending Darood to
Mohammad, his beloved Prophet (PBUH). Mr. Syed Zahidur Rashid, Honorable Chairman of
our ETE Department, and Mr. Abu Zafar Mohammad Imran Sir, a member of the Industrial
Training Committee, are two people I'd like to thank. Our graduation is on the verge of being
postponed due to their hasty decision to schedule an Industrial Training course evaluation. I
would like to thank the former Chairman Mr. Mohammed Jashim Uddin Sir and our batchmate
Md. Arifur Rahman. We have got the opportunity to do industrial training in DDN Bangladesh
for quick permission, smooth completion of various official works of Mohammed Jashim
Uddin Sir and overall efforts of Mohammad Salahuddin.

8
Establish to the Company

Company Overview:
Digital Dot Net (DDN) is South-east Zone Licensed ISP and IT related services and solutions
provider. DDN was formed in June 2004. DDN shown the fastest growth and attained a high
level of customer confidence to become the preferred and the leading ISP in Chattogram.
This milestone has been achieved through a focused and dedicated approach to give an
efficient and unmatched level of customer support. After that DDN has introduced various
services one after one which made DDN is the most excellent ISP & IT enable service
provider in Chattogram. DDN has deployed a high-quality backbone of network
infrastructure consisting of a Wide Area Network (WAN) and City-wide optical fiber that
can deliver communication solutions. DDN has a client that extends through 12 districts and
celebrates the spirit of diversity to the heart. Over the years, this network has been
continuously strengthened and expanded to comply with our ambition of expanding our
outreach and accessing our services to clients located at various strategic points.

7
Chapter 01
IIG Overview in Bangladesh

1.1 IIG

An International Gateway is a phone number that routes calls in order to access lower
international long-distance rates[1] or to make international calls over voice over IP
(VOIP) networks. They are also successful in making an international call to the United
States look as if it originated from a local number rather than the actual venue.

While there are various legitimate applications, scammers and con artists of all kinds,
ranging from foreign fraudsters to lottery fraud and bogus money order overpayment
fraud, often use them. The caller ID will show the call on some occasions as INTL
GATEWAY; anonymous or unknown at other times. It will always look as if it is a
disconnected number if you call the number back. Using several websites on the Internet,
unknown phone numbers can be studied. [2]

1.2 International internet gateway association of Bangladesh


Bangladesh's telecommunications market is revealing itself more and more. Bangladesh
Telecommunication Regulatory Commission is the regulatory body in charge of this
sector (BTRC). In 2007, the BTRC issued an International Internet Gateway (IIG)
license, and the number of IIG operators in the country has risen since then.
In Bangladesh, there are currently 36 licensed IIG operators.

The few main operators of the International Internet Gateway (IIG) are:

\
SI OPERATOR NAME ADDRESS LICENSE NO. ISSUE DATE
1 Coronet Corporation Ltd 95, Kazi Nazrul Islam Avenue, BTRC/LL/201234/IIG(34)Coronet Apr 12 2012
1st Floor, KawranBazar, Dhaka-
1205

2 Novo Com Limited Konabari, Neelnagar, Gazipur BTRC/LL /IIG(33)Novo com2012-33 Apr 12 2012

3 Velocity Networks Limited Paragon House, 1st Floor, 5 BTRC/LL /IIG (30) Equitel /2012-30 Apr 12 2012
Mohakhali C/A Dhaka -1212

4 Summit Communications Ltd 18 Kawran Bazar C/A, Dhaka- BTRC/LL/IIG(17)Summit/2012-17 Apr 12 2012
1215

5 Rego Communications Ltd H-43, R-2A, Dhanmondi, Dhaka- BTRC/LL/IIG(14)Rego/2012-14 Apr 12 2012
1209

6 BD Hub limited 45 Gulshan South, Circle-1, BTRC/LL/IIG(7)BD Hub/2012-7 Apr 12 2012


Dhaka-1212

IIG providers mostly represent the country's ISPs, airlines, and large corporations.

On an international and local internet, they use robust transit and peering.
Customers can subscribe to bandwidth dependent on their traffic destination with
these operators. Their aim is to lower network traffic congestion and keep latencies as
low as possible.

9
Chapter 02
ISP Provider Overview

2.1 Internet Service Provider (ISP)

An Internet Service Provider is a business or company that enables the World Wide Web
to be linked to your computer. This offers connections to one or more high-speed Internet
lines for clients. An ISP can also give other services, such as web hosting and rental
services for digital storage space, and software access, among others. In terms of
bandwidth and coverage, ISPs compete with each other, which grants them to give the
best signal and transmission speed. An ISP can be likened to a water tap. There is water
running through the main drain, but unless you add a faucet, you can't get any.
An ISP makes accessing the Internet possible. Most ISP invest in miles of cables, build
suitable infrastructure, and employ knowledgeable technicians to give consumers with a
wide variety of Internet connection service packages that suit their personal and business
requirements.
In the past, only three forms of networks were delivered by ISP, dial-up, broadband cable
and wireless subscriber line. Due to sluggish access, even though it was highly
affordable, dial-up services were scarce, if not outdated. These are the various types of
ISP choices you can choose from so far:

1. Satellite
Satellite Internet access is an alternative that is often served in lieu of dial-up service to
those living in remote areas. However, it has a drawback, as it needs substantial
investment by the ISP in the infrastructure.

10
Satellite

2. DSL
The DSL connection grants use of current landline telephones in the homes of customers.
When linked to the Internet, they can still make and receive phone calls. This form of
connection grants users without high material costs to enjoy average-speed internet
access. Just consumers need to purchase a modem. The speed depends on how far from
the nearest switching station a customer is from.

3. Broadband Cable
Usually, providers of cable TV services give broadband cable access. Depending on the
number of users served at a given time, the connection speeds also differ. Note that the
speed of access often depends on the geographical area of a customer. The more users in
a given region there are, the slower the link is because they share bandwidth.

11
4. Fiber-Optic Cable
Perhaps the fastest and highly preferred form of Internet service ISPs give today is fiber-
optic connectivity. As it is relatively new, ISPs must first lay the groundwork for the
operation. Serviceable areas, as such, remain small. However, a monthly fiber-optic
service subscription does not cost any more than both DSL and broadband cable
connections in terms of price.

5. Wi-Fi Broadband
Another way of providing connectivity is Wi-Fi broadband. It grants for more flexibility
for multiple users to access the Internet. Users are free to switch about and remain
connected, since they don't have to stay connected to a modem. With a pocket Wi-Fi
system that gives them the ease of taking connectivity everywhere they go, most
customers do that. It depends on the needs and availability of users to select the right kind of
Internet service. Consumers must also ensure that the connection to which they subscribe
is secure.

2.2 Intranet

A computer network is an intranet used by an organization to exchange knowledge,


communication resources, operating systems, and other computer services, typically to
the exclusion of outsiders' access. Unlike public networks, such as the Internet, the word
is used but uses much of the same technologies based on the Internet Protocol Set.[3]

12
Fig2.1: An internet configuration [5]
A company-wide intranet can constitute an important focal point of internal
communication and collaboration, and give a single starting point to access internal and
external resources. In its simplest form, an intranet is established with the technologies
for local area networks (LANs) and wide area networks (WANs).[2][3][4] Many modern
intranets have search engines, user profiles, blogs, mobile apps with notifications, and
events planning within their infrastructure.

2.3 Internet
The Internet is a vast network linking computers around the globe. Via the Internet, people
with an Internet connection can exchange information and communicate from anywhere. The
internet is the larger network that enables corporations, governments, universities and other
organizations to speak to each other about computer networks around the world. The effect is
a mass of cables, computers, data centers, routers, providers, repeaters, satellites and wi-fi
towers that grant the world to move with digital information. You can order the weekly store,
post your life on Facebook, watch Outcast on Netflix, email your aunt in Wollongong, and
check the web for the tiniest cat in the world.

2.4 ISP service


The Internet Service Provider (ISP) is a company that offers a range of facilities for Internet
access, use or participation. Internet service providers may be structured in different ways,
such as commercial, non-profit, community-owned, or otherwise privately owned.
Usually served by ISPs, Internet services can include Internet connectivity, Internet
transit, registration of domain names, web hosting, Usenet service, and colocation.
Usually, an ISP acts as an entry point or gateway for a user to access anything on the
Internet.[4] 13
2.5 BDIX

BDIX is Bangladesh's very first Internet Exchange Point. It was founded to give its
members with physical interconnection to exchange and route local Internet traffic
through it locally. Over 130 different types of organizations are currently peering via
BDIX. Like most other IXPs of the world BDIX is run with membership fees paid by the
connected members, and are operated for the benefit of the members and the Internet
community at large. For its financial operations members pay a monthly or annual fee,
usually determined by the speed of the port or ports which they are using. SDNF is a
transformed body of the Sustainable Improvement Networking Program, a project
initiated by the Bangladesh Sustainable Environment Management Program of the
United Nations Improvement Program and implemented by the Bangladesh Institute of
Improvement Studies. Since 2004, BDIX has been working to improve Internet
infrastructure in Bangladesh by supporting the intercommunication between different
ISPs in the country. It also assists its improvement in several ways.

2.5 FTP

The File Transfer Protocol (FTP) is a standard Internet protocol for transferring files over
TCP/IP connections between computers on the Internet. FTP is a client-provider protocol
where a client asks for a file and it is supported by a local or remote provider. The end-
user computer is commonly referred to as the local host machine, connected to the
remote host through the internet, which is the second machine running the FTP program.
Anonymous FTP is a form of FTP that grants users, without having an ID or password,
to access files and other data. Some websites grant guests to use a guest ID or password-
this is granted through anonymous FTP.[5] Though a lot of file sharing is now done
using HTTP, FTP is also widely used by other applications to transfer data behind the
scenes—e.g., concealed behind banking user interfaces, a tool that helps create a website,
such as Wix or Square Room, or other services. It is also used for downloading new
applications via Web browsers.[5]
14
FTP is a client-provider protocol that relies on two client-provider communication
channels: the conversation control command channel and the file information
transmission data channel. A client is able to upload, download, remove, rename,
transfer, and copy files to a provider using FTP. FTP sessions work in passive or active
modes. In active mode, after a client initiates a session via a command channel request, the
provider initiates a data connection back to the client and begins transferring data. In passive
mode, the provider instead uses the command channel to send the client the information it
needs to open a data channel. Because passive mode has the client initiating all
connections, it works well across firewalls and Network Address Translation (NAT)
gateways.

2.7 E-mail provider

We may assume that your automated postal service is an email provider. It is a computer
or software responsible for managing messages. So, when you send an email, your
message usually goes through a series of email providers until it reaches the recipient.
The process is so quick and effective that it seems straightforward, but sending and
receiving emails is very complex.

Sometimes an email provider can mean a computer or a machine that has a complete
system that includes different services or applications. 15
Email provider forms.
o SMTP.
o POP3.
o IMAP.
2.8 SMPT Provider

An SMTP (Simple Mail Transfer Protocol) provider's primary function is to receive,


transmit, and/or relay outgoing email between email receivers.

The address (or addresses) of the SMTP provider can be set by the mail client or program
you're using, and is normally formatted as smtp.provideraddress.com. (For example,
smtp.gmail.com is Gmail's SMTP provider address, and smtp.sendgrid.com is Twilio
SendGrid's. Usually, you will find your SMTP provider address in your mail client's
account or settings section.)
The SMTP provider processes your email when you send an email, decides which
provider to send the message to and relays the message to that provider. The inbox
service provider of the recipient, such as Gmail or AOL, then downloads the message and
brings it into the inbox of the recipient.

2.9 Proxy Provider

A proxy provider is a client-to-internet intermediary provider. The following basic


functions are served by proxy providers:

 Filtering of the firewall and network data.


 Network connection sharing
 Data caching
 Proxy providers grant to hide, conceal and make your network id anonymous by
hiding your IP address.

Aim of Proxy Providers

Following are the reasons to use proxy providers:

 Improving performance
 Translation
 Accessing services anonymously
16
 Security
 Monitoring and Filtering

Proxy providers grant us to do several kind of filtering such as:

 Content Filtering
 Filtering encrypted data
 Bypass filters
 Logging and eavesdropping

Improving performance

It fastens the service by retrieving content from the cache process that was saved when
the client made the previous request.

18

Translation

By excluding source content or substituting source content with original local content, it
helps to configure the source site for local users. The source website receives traffic from
international users via Translation Proxy.

Security

Since the proxy provider conceals the user's identity, it also protects against spam and
attacks by hackers.

2.10 MRTG

The Multi Router Traffic Grapher (MRTG) is a free program for tracking and traffic load
calculation on network connections. It grants the user to see the load of traffic in
graphical form on a network over time. It was originally created to track router traffic by
Tobias Oetiker and Dave Rand, but it has grown into a tool that can generate graphs and
statistics for almost anything. MRTG runs on Windows, Linux, Unix, Mac OS and
NetWare and is written in Perl.

2.11 DNS Provider

17
The Domain Name System (DNS) is a hierarchical and decentralized system for the
classification of computers, utilities or other Internet-connected or private network
resources. It associates different data with the domain names assigned to each of the
organizations involved. Most notably, it converts more readily stored domain names to
the numerical IP addresses necessary for computer services and devices with underlying
network protocols to be located and recognized. The Domain Name System has been an
integral element of the functionality of the Internet since 1985 by offering a worldwide,
distributed directory service.[7]

By designating authoritative name providers for each domain, the Domain Name System
assigns the task of assigning domain names and mapping those names to Internet resources.

19

Network administrators can delegate authority to other name providers over the sub-
domains of their allocated name space. This mechanism offers a distributed, fault-tolerant
service and was designed to prevent a single large central database from being used.

The technical functionality of the database service at its heart is also specified in the
Domain Name System. It specifies, as part of the Internet Protocol Set, the DNS protocol,
a comprehensive specification of the data structures and data transmission exchanges
used in the DNS.

The Internet maintains two principal namespaces, the domain name hierarchy[1] and the
Internet Protocol (IP) address spaces.[5] The Domain Name System maintains the
domain name hierarchy and gives translation services between it and the address spaces.
Internet name providers and a communication protocol implement the Domain Name
System.[3] A DNS name provider is a provider that stores the DNS records for a domain;
a DNS name provider responds with answers to queries against its database.

`16
Chapter 03
OSI Model Layer

3.1 Network Model


The network model is the hierarchical system's extension, as it grants many-to-many
relationships to be managed in a tree-like structure that requires many parents. Two basic
principles of a network model are available-
• Records contain fields that need to be arranged hierarchically.
• Sets are used to describe one-to-many relationships that include one owner, many
members, between records.

In any number of sets, a record can function as an owner, and in any number of sets, a
member. With the aid of circular linked lists, a set is designed where one type of record, the
owner of the set also called as a parent, appears once in each circle, and a second type of
record, also known as the subordinate or infant, may appear in each circle several times.

The network model has the following essential characteristics:

• It can more accurately reflect redundancy in data than in the hierarchical model.
• There can be more than one path from a previous node to successor node/s.
• The network model operations are maintained by a linked list (circular) indexing
structure where a program maintains a current location and navigates from one
record to another by following the relationships in which the record participates.
• Records can be found by including key values as well.

A network model is illustrated in the following diagram. Many clients are served by an
agent and many entertainers are handled. Each customer schedules any number of
engagements for his or her services and makes payments to the agent. Each entertainer
performs many activities and can play a number of styles of music.

19
Fig3.1: A network model[7]

A node defines a record set, and a fixed structure aids in the formation of a network
relationship. By using one node as an owner and a member of the other, this creation aids
in the connection of two nodes.

A fixed structure manages a one-to-many relationship, which means that one or more
records in the member node can be linked to a record in the owner node, but only one
record in the owner node can be linked to a single record in the member node.
Furthermore, a record in the member node cannot exist unless it is linked to an existing
record in the owner node. A client may be assigned to an agent, for example, but the
database can always show an agent with no clients.

20
Fig3.2: basic set structure of network model[4]
A diagram of a fundamental set structure is shown in the diagram above. One or more
sets (connections) can be established between a specific pair of nodes, and other sets with
other nodes in the database can also include a single node.

With the help of an acceptable set structure, the data can be easily accessed within a
network model. There are no constraints on selecting the root node, you can access the
data from any node and use similar sets to run backwards or forward.

Advantages
• fast data access.
• It also enables users to generate more complicated queries than those they have
generated using a hierarchical database. So, this model can be run through a
number of queries.

Disadvantages

21
• A user must be very intimate with the structure of the database to work through
the set structures.
• Inside this database, upgrading is a boring job. Without affecting the application
programs that use this structure to navigate through the data, one can not alter a
fixed structure. You must also alter all references made from within the
application software to that structure if you change a fixed structure.

3.2 TCP/IP Model


TCP/IP stands for Protocol for Transmission Control and Internet Protocol. It is also the
network model used in the architecture of the modern Internet. Protocols are a series of
rules that control any potential network communication. The data movement between the
source and destination or the internet is represented in these protocols. They give quick
naming and addressing systems as well. The Transmission Control Protocol and Internet
Protocol (TCP/IP) were improveed as part of a network interconnection research project
by the Department of Defense's Project Research Agency (ARPA, later DARPA).

Fig3.3: TCP/IP Model[7]

22
The four layers that make up the TCP/IP reference model are discussed below:
Layer 1: Host-to-network Layer
• It is a layer all of them.
• Protocol is used to establish a connection with the host and send packets over it.
• Varies from network to network and host to host and.

• The internet layer is the selection of a packet switching network that is based on a
connectionless internetwork layer.
• The layer is that keeps the whole system together.
• It helps the packet to travel independently to the destination.
• The order in which packets arrive varies from the order in which they were sent.
• In this layer, IP (Internet Protocol) is used.
• The Internet Layer performs the following functions:
o Delivering IP packets
o Performing routing
o Avoiding congestion
Layer 3: Transport Layer
• It defines whether data should be transmitted in parallel or in a single direction.
• The transport layer performs functions such as segmenting, multiplexing and
splitting on data.
• The applications have access to the transport layer and can read and write to it.
• The header information is added to the data by the transport layer.
• The transport layer divides the message (data) into smaller units so that the
network layer can handle it more efficiently.
• In addition, the transport layer arranges the packets to be sent in order.

• The TCP/IP specifications specified a number of applications at the top of the


protocol stack. TELNET, FTP, DNS, SMTPand others were among them.

23
TELNET is a two-way communication protocol for connecting to and running
applications on a remote computer.
FTP (File Transfer Protocol) is a network-based file transfer protocol. It's
dependable, transparent, and efficient.
SMTP (Simple Mail Transport Protocol) is a protocol for transporting
electronic mail through a route between a source and a destination.
For Hosts linked over a network, DNS (Domain Name Provider) resolves an
IP address into a textual address.
• It helps peer entities to interact with one another.
• It defines two end-to-end protocols: TCP and UDP
TCP (Transmission Control Protocol): It is a reliable connection-oriented
protocol which handles byte-stream from source to destination without error
and flow control.

] UDP (User-Datagram Protocol): It's a shaky connectionless protocol that


refuses to use TCPs, sequencing, or flow control. For example, a one-time
request-reply service.

Merits of TCP/IP model


o It worked on its own.
o It is scalable.
o Client/provider architecture.
o A variety of routing protocols are supported.
o It can be used to build a connection between two computers.

Demerits of TCP/IP
o The transport layer does not guarantee packet delivery in this situation.
o There is no way to use the model in any other application.
o Replacing protocol is not easy.
o Its programs, interfaces, and protocols have not been clearly differentiated.

24
3.4 OSI model
OSI or Open System Interconnection model was improveed by International Standards
Organization (ISO). It gives a layered networking framework that conceptualizes how
communications should be done between heterogeneous systems. It has seven
interconnected layers. The seven layers of the OSI Model are a physical layer, data link
layer, network layer, transport layer, session layer, presentation layer, and application
layer, as shown in the following diagram –

Fig3.4: OSI model[6]

The main functions of each of the layers are as follows −

o Physical Layer − Its aim is to transfer individual bits over a physical medium from one
node to another.
o Data Link Layer − It is responsible for efficiently transferring data frames connected by
the physical layer from one node to another.
o Network Layer − It regulates the transmission of individual data packets from source to
destination by properly addressing and routing them.
o Transport Layer − It is responsible for the transmission to the destination host of the
entire message from the source host.

25
o Session Layer − It creates user sessions and gives services such as dialog control and
synchronization.
o Presentation Layer − By means of translation, compression, and encryption, it tracks the
syntax and semantics of transmitted content.
o Application Layer − It gives users with high-level (application program interface) APIs.

The advantages of the OSI model are

o It is a generic model and gives as an instrument for designing any network model as a
reference.
o It is a model that is layered. Changes are not influenced by other layers on one layer,
served that the interfaces between the layers do not shift significantly.
o It distinguishes services, interfaces, and protocols distinctly. Hence, in nature, it is
versatile. Depending on the design of the network, protocols in each layer may be
substituted quite easily.
o Both connection-oriented services and connectionless services are served.

The disadvantages of the OSI model are

o It is simply a theoretical model that does not take the availability of suitable technologies
into account. This limits its realistic execution.
o This model's launch timing was unacceptable. The TCP/IP protocols were already
implemented when OSI emerged. So, at first, the businesses were hesitant to use it.
o The OSI model is very intricate. Cumbersome, sluggish and expensive was the initial
implementation.
o Although there are several layers, when practically deployed, some layers such as the
session layer and presentation layer have very little functionality.
o In separate layers, there is a duplication of resources. Multiple layers give services
including addressing, flow control and error control.
o The OSI model standards are theoretical and do not give appropriate solutions for the
implementation of functional networks.
o After being introduced, both the functional needs and the TCP/IP model were not
addressed by the OSI model. It was therefore labelled as of poor quality.

26
o The academy liked the TCP/IP model very much. OSI was assumed to be a result of the
European communities and the US government, which tried to compel researchers and
programmers to follow an inferior model. There was, therefore, some opposition to it
being accepted.

3.5 Protocol of TCP model

o IP Protocol: In this layer, the IP protocol is used, and it is the most critical part of
the whole TCP/IP suite.

Following are the responsibilities of this protocol:

o IP Addressing: Logical host addresses known as IP addresses are introduced via


this protocol. The internet and higher layers use IP addresses to identify the
system and to give internet routing.
o Host-to-host communication: The direction by which the data is to be transmitted
is determined.
o Data Encapsulation and Formatting: The data from the transport layer protocol is
approved by the IP protocol. An IP protocol guarantees that the data is safely
transmitted and retrieved, encapsulating the information in a message known as an

o Fragmentation and Reassembly: The limit imposed by a data link layer protocol on
the size of the IP datagram is known as the Maximum Transmission Unit (MTU). If
the IP datagram size is larger than that of the MTU unit, then the datagram is broken
into smaller units by the IP protocol so that they can pass across the local
network. The sender or intermediate router may do fragmentation. All the pieces
are reassembled on the receiving side to form an initial message.
o Routing: It is known as direct delivery when IP datagrams are sent over the same
local network, such as LAN, MAN, WAN. The IP datagram is indirectly sent
when the source and destination are on the remote network. Routing the IP
datagram via various devices such as routers will accomplish this.

ARP Protocol

• ARP stands for Address Resolution Protocol.

27
• The two terms are mainly associated with the ARP Protocol:
o ARP request: It broadcasts the ARP request to the network when a sender wants to
know the physical address of the system.
o ARP reply: The ARP request is acknowledged and processed by any computer
connected to the network, but only the receiver recognizes the IP address and
sends back its physical address in the form of an ARP reply. The receiver attaches
both its cache memory and the datagram header to the physical address.

ICMP Protocol

• ICMP stands for Internet Control Message Protocol.


• It is a method used by hosts or routers to send updates back to the sender about
datagram issues.
• From router to router, a datagram moves before it reaches its destination. If, due to
any unusual circumstances, such as disabled connections, a router is unable to route
the data, a system is on fire or network congestion, then the ICMP protocol is used to
warn the sender that the datagram is undeliverable.

An ICMP protocol mainly uses two terms:

o ICMP Test: The ICMP test is used to test whether or not the destination can be reached.
o ICMP Reply: ICMP Reply is used to verify whether or not the destination system
responds.

The ICMP protocol's core obligation is to report, not correct, the issues. The
responsibility rests with the sender for the correction.

ICMP can only send messages to the source, but not to the intermediate routers, since the
IP datagram holds the source and destination addresses, but not the router to which it is
transferred.[4]

28
Chapter 04
Internet Component
4.1 Router

On computer networks, a router sends and receives data. Routers are sometimes confused
with network hubs, modems, or network switches. However, routers can combine the
functions of these components, and connect with these devices, to improve Internet
access or help create business networks.

Routers guide and direct network data, using packets that contain various kinds of data—
such as files, communications, and simple transmissions like web interactions. The data
packets have several layers, or sections, one of which carries identifying information such
as sender, data type, size, and most importantly, the destination IP (Internet protocol)
address. The router reads this layer, prioritizes the data, and chooses the best route to use
for each transmission.[3]

A common tool for modern network computing, routers connect employees to networks,
both local and the Internet, where just about every essential business activity takes place.
Without routers, we wouldn't be able to use the Internet to collaborate, communicate, or
gather information and learn.

Routers can also give security. Embedded firewall and content filtering software give an
additional protection from unwanted content and malicious websites without affecting
your online experience.

A router isn't just for data transmission or Internet connections, though. Most routers
grant you to connect hard drives and use them as file-sharing providers, or printers that
can then be accessed by anyone on the network. 29
Switch

Switches are network devices running on Layer 2 or on the OSI model's data link layer.
Network devices are connected and packet switching is used to transmit, receive or
forward data packets or data frames over the network.

There are several ports on a switch that are plugged into computers. When a data frame
arrives at any port of a network switch, the destination address is checked, the necessary
checks are carried out and the frame is sent to the corresponding device (s). Unicast,
multicast, and broadcast communications are served.

Features of Switches

o A switch operates in the layer 2, data link layer of the OSI model.
o It is a smart network system that can be conceived as a bridge for a multiport
network.
o To send data packets to selected destination ports, it uses MAC addresses
o It uses the technique of packet switching to receive and forward data packets from
the source to the target device.
o It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-
all) communications.
o The mode of transmission is full duplex, and contact in the channel takes place
simultaneously in both directions. Collisions do not occur due to this.
o Switches are active devices, equipped with network software and network
management capabilities.
o Switches can perform some error checking before forwarding data to the destined
port. 30
o The number of ports is higher – 24/48.

4.3 Media Converter

A media converter is a networking system that transforms Ethernet or other communication


protocols transparently from one cable type to another, most commonly copper CATx/UTP
to fiber. To increase cabling distances and improve sensitivity to electromagnetic
interference, media converters are often used in pairs to insert a fiber segment into copper
networks. They can also convert connection speeds and fiber modes, as well as extend
LANs.
A media converter is a device that connects media that would otherwise be incompatible.
It is used to link fiber optic cables to twisted pairs in order to support ethernet-compatible
devices.

Fig 4.1: Media Converter[1]

Types of Media Converters

• Copper-to-Fiber Media Converters

• Fiber-to-Fiber Media Converters


31
• PoE Media Converters

• Stand-Alone vs. Chassis-Based Media Converters

• Managed vs. Unmanaged Media Converters

• Commercial vs. Industrial Media

Converters Applications and Use Cases for Media

Converters

1. Overcoming Copper's Limits

2. Enterprise
3. Security and Surveillance

4. Government and Defense

5. Fiber Mode Conversion

Benefits of Media Converters

1. Fiber can be used to extend the LAN distance.

2. Maintain existing material investments.

3. Defend data from tampering.

4. Conversion of speed.

5. Ethernet-based power supply.

32
4.4 OTDR

The term OTDR refers to an optical time-domain reflectometer. An optical time-domain


reflectometer (OTDR) is a type of optoelectronic instrument that is used to classify
optical fibers. An optical time domain reflectometer, or OTDR, is the optical counterpart
of an electronic time domain reflectometer. Organizations use an Optical Time Domain
Reflectometer (OTDR) to certify the output of new fiber optics links and to identify
issues with existing fiber optics links.

Fig 4.2: Optical time-domain reflectometer

Types of OTDR

1. Full-feature OTDR

2. Hand-held OTDR and Fiber break locator

3. RTU in RFTSs

33
4.5 Fusion Splicer

The act of joining two optical fibers end-to-end is known as fusion splicing. The aim is to
fuse the two fibers together so that light passing through the fibers is not dispersed or
reflected back by the splice, and the splice and surrounding area are almost as powerful
as the intact fiber. The heat source used to melt and fuse the two glass fibers being
spliced is normally an electric arc, but it may also be a laser, a gas flame, or a current-
passing tungsten filament. As previously said, a fusion splicer is a system that joins two
optical fibers together by welding (fusing). Fusion splicing is the term for this procedure.
On the fusion splicer, the fiber ends are prepared, cleaved, and put in alignment fixtures.

Fig4.3: Fusion splicer machine[5]

34
Server Visit

35
36
Conclusion

In the telecommunications sector, communication engineer graduates work on research


and improvement, production, implementation and maintenance of the system. Industrial
preparation for students is very important for this aim.

We have gathered a lot of practical information about the communication side of this
training. The basic aspect of the ISP market is also known to us.

We have understood that PONs are used by Telecommunication Companies to give


customers with triple-play services like TV, VoIP phone, and Internet service. The
advantage is that much higher data rates are important for video distribution and other
Internet services. The low cost of passive components implies simpler systems that fail or
need maintenance with fewer components. The primary drawback, typically not more
than 20 km or 12 miles, is the shorter range possible. We've been using AONs for longer
distances. As the demand for faster Internet access and more video increases, PONs are
now becoming increasingly popular. GPON, such as Verizon's Foist scheme, is the most
common in the United States. In Asia and Europe, EPON systems are more prevalent.

37
References

[1] Luk, A. (9 May 1991). "Fujikama goes Unix". IEEE Pacific Rim Conference on Communications,
Computers and Signal Processing, 1991. Institute of Electrical and Electronics Engineers. 2: 783–786.
doi:10.1109/PACRIM.1991.160857. ISBN 978-0879426385. The internet and intranet Unix network give a
functioning email facility around the world.

[2] Callaghan, J (2002). Inside Intranets & Extranets: Knowledge Management AND the Struggle for Power.
Palgrave Macmillan. ISBN 0-333-98743-8.

[3] RFC 781, Internet Protocol - DARPA Internet Program Protocol Specification, Information Sciences
Institute, J. Postel (Ed.), The Internet Society (September 1981).

[4] 5.2 RM description for end stations". IEEE Std 802-2014, IEEE Standard for Local and
Metropolitan Area Networks: Overview and Architecture. ieee. doi:10.1109/IEEESTD.2014.6847097. ISBN 978-
0-7381-9219-2.

[5] Davies, Howard; Bressan, Beatrice (26 April 2010). A History of International Research Networking: The
People who Made it Happen. John Wiley & Sons. pp. 2–3. ISBN 978-3-527-32710-2.

[6] Roberts, Dr. Lawrence G. (November 1978). "The Evolution of Packet Switching" (PDF). IEEE Invited
Paper. Retrieved 10 September 2017.

[7] Walter Goralski. The Illustrated Network: How TCP/IP Works in a Modern Network (PDF). Morgan
Kaufmann. p. 26. ISBN 978-0123745415.

38

You might also like