Professional Documents
Culture Documents
Report File On Network System
Report File On Network System
On
Submitted By
i
TABLE OF CONTENTS
2.1 Components 5
2.2 Basic Telecom Network (PSTN) 5
2.3 Basic Mobile Network 6
2.4 Wired and Wireless Technology wise Data Speed Chart 6
2.5 Signaling and Switching 6
2.6 Pillars of Telecom Transmission 7
2.7 FDM, TDM, SDM and CDM 7
2.8 Transmission Modes 8
ii
4. GSM Basics 14-18
5. IP Addressing 19-23
iii
LIST OF FIGURES
iv
ABSTRACT
v
CHAPTER-1
OVERVIEW OF OPTICAL FIBER COMMUNICATION
Information is received in the form of Voice, Data and Video, passes through
“Encoder” thus producing sequences of Pulses called BITS. These BITS then travel
inside the OPTICAL FIBRE CABEL and reaches a device called Decoder where they
are converted into “Output Pulses of Current” which we are familiar as Voice, Data
and Video.
1.2 Construction:
The Basic parts in an OFC is:
1. CORE: the internal part of the OFC in which the main phenomenon of Total Internal
Reflection takes place which is the main process of the OFC functioning.
2. CLADDING: the outer part of the OFC which acts like a covering to the core. It has more
radius than that of the Core.
Fig 1.1
The phenomenon of Total Internal Reflection in which a ray of light experiences reflection inside a
medium and travels within the same medium throughout the process.
Fig 1.2
1
1.4 Window Concept in Spectrum of OF:
Optical windows are flat, optically transparent plates that are typically designed to maximize
transmission in a specified wavelength range, while minimizing reflection and absorption.
There are mainly three types of Windows in an OF:
1. The first optical window is defined from 800-900nm, where the minimum signal loss is
4dB/km. In early 1970’s this window was used for operation of optical sources and
detectors.
2. The second optical window is centered at 1310nm also called O-band, which offers
0.5dB/km.
3. The third optical window is centered at 1550nm also called C-band, which gives the loss of
0.2dB/km.
2
2. Video Transmission:
Television broadcast, Cable television, Remote monitoring etc.
3. Broadband Services:
Provisioning of broadband services, such as video request services, home study courses,
medical facilities and train timetables etc.
5. Military Applications:
Fiber sensors are used.
• The basic elements in transmitters: Electronic interfaces, Electronics processing circuitry, Drive
circuitry, light source, optical interfaces, output sensing and stabilization, Temperature sensing and
control.
Fig 1.3
3
1.9 Optical Sources:
• Most common light sources: – light-emitting diodes (LEDs) & Light Amplification by Stimulated
Emission of Radiation (laser) diodes.
• It is particularly required in lasers to maintain stable output power by way of feedback mechanism.
1.10 DETECTORS:
The detectors that are used in fiber optic communications are semiconductor photodiodes or
photodetectors. And they convert the received optical signal into a proper electrical signals.They are
such as:
Pin photodiode; cheaper, less temperature sensitive, and requires lower reverse bias voltage. –
Avalanche photodiode APD); used where receiver is to detect lower power.
Fig 1.4
• Power budget: for a link to be feasible. Source Transmitting Power Less coupling Loss to
fiber+Connectors Losses + Fiber Loss + Splicing Loss Maintenance Margin Receiver Sensitivity
• Rise time Budget: to check total link rise-time to be within permissible limit.
4
CHAPTER – 2
2.1 COMPONENTS:
Fig 2.1
Fig 2.2
5
2.3 Basic Mobile Network:
An overall cellular network contains a number of different elements from the Base Transceiver
Station [BTS] itself with its antennae back through a Base Station Control [BSC], and a Mobile
Switching Centre [MSC] to the Location Registers [HLR&VLR] and the link to the Public Switched
Telephone Network [PSTN].
Fig 2.3
Signaling:
The telecom network establishes and releases connections based on the various instructions received
on the form of signals. The interchange of such instructions are in a well defined pattern and follows
the certain syntax and protocols. They are used for call request, call set up, call connections and
release etc. the main functions of Signaling are: Supervising, Alerting and Addressing.
Switching:
It is the method which is used to establish a connections between subscribers within a desires or a
particular network.
Fig 2.4
6
2.6 Pillars of Telecom:
1. MODULATION:
It is the process of varying a high frequency carrier waveform in a relation to low frequency
signal waveform. The three parameters of a sine wave are “Amplitude”, “Phase” and
“Frequency”, thus they are named as AM, PM & FM.
2. MULTIPLEXING:
Combining multiple signals into high capacity signals is called “Multiplexing”. Data from
several of customers travels on a shared medium and thus multiplexing is used for efficient
and fast transfer of data. There are four types of multiplexing techniques- FDM,
TDM,SDM,CDM.
FDM:
Fig 2.5
TDM:
Fig 2.6
SDM:
Fig 2.7
7
CDM:
Fig 2.8
8
CHAPTER-3
Fig 3.1
9
3.2 History and Evolution:
The very first concept of the satellite was proposed by a 27 year old Royal Air Force officer Arthur
C. Clarke in a paper titles “Extra-Terrestrial Relays: Can Rocket Station Give World-wide Radio
Coverage?” published in the October 1945 issue of wireless world. He peoposed that a satellite
should be kept at an altitude of 35,786 km above earth’s surface would be moving at the same speed
as earth’s rotation. At this altitude the satellite would remain in a fixed position relative to a point on
earth. This orbit, now called a “geostationary orbit”, is ideal for satellite communications, since an
antenna on the ground can be pointed to a satellite 24 hours a day without having to track its
position. Clarke calculated in his paper that thre satellites spaced equidistant in orbit would be able to
provide radio coverage that would be almost worldwide with the sole exception of some of the polar
regions.
Fig 3.2
The first artificial satellite Sputnik1 was launched by the U.S. government from Cape Canaveral,
Florida on December 19, 1958.
On April 6, 1965 the first Intelsat satellite was launched it was launched and was designed and buit
by Rosen’s team at Hughes Aircraft Company. Nineteen days after Intelsat 3 F-3 was placed over the
Indian Ocean, the landing of the first human on the Moon on July 20, 1969, was broadcast live
through the global network of Intelsat satellites to over 600 million television viewers.
Fig 3.3
10
3.3 Frequency Bands:
With the variety of satellite frequency bands that can be used, designations have been developed so
that they can be referred to easily.
The higher frequency bands typically give access to wider bandwidths, but are also more susceptible
to signal degradation due to ‘rain fade’ (the absorption of radio signals by atmospheric rain, snow or
ice).
Because of satellites’ increased use, number and size, congestion has become a serious issue in the
lower frequency bands. New technologies are being investigated so that higher bands can be used.
C- Band : U/L : 5.925 – 6.425 GHz. D/L : 3.7 – 4.2 G Hz. Total 500 M Hz BW.
Extended C- Band : U/L : 6.725 – 7.025 GHz. D/L : 4.5 – 4.8 G Hz. Additional 300 MHz BW.
Ku band : U/L : 14.0 - 14.5 G Hz. D/L : 10.95 – 11.2 and 11.45 - 11.7 GHz. A total of 500 MHz
BW in Ku band.
Antennas: Satellite antenna systems are used to receive and transmit signals to and from Earth.
Command and Data Handling: The operational heart of a satellite, command and control systems
monitor every aspect of the satellite and receive commands from Earth for operation.
Guidance and Stabilization: Sensors monitor the satellite’s position to ensure it remains in the
correct orbit and is oriented toward the correct target. If necessary, thrusters and other manoeuvres
allow a satellite to fine-tune its position and orientation.
Housing: Constructed from strong materials that can withstand the harsh space environment.
Power: Most satellites rely on a solar array to convert sunlight into energy.
Thermal Control: Guards satellite equipment against extreme changes in temperature.
Transponders: Uplink and downlink signals arrive and depart at different frequencies.
Transponders convert uplinked frequencies to downlink frequencies and then amplify the converted
transmission for sending to Earth.
Fig 3.4
11
3.5 Applications of Satellite Communication:
Fig 3.5
Fig 3.6
12
Services through Satellite Communication:
• VSAT: Very Small Aperture Terminals Provide voice and B/B services in remote inaccessible
areas. The majority of VSAT antennas range from 75 cm to 1.2 m. Data rates typically range from 56
Kbit/s up to 4 Mbit/s. VSATs access satellites in geosynchronous orbit .
• DSPT: Digital Satellite Phone Terminals in general what we call as "Satellite Phone". It is useful in
remote areas where you do not have landline or cell phone signals.
• SCPC: Single Channel per Carrier (for dedicated connections for VSAT).
•MCPC: Multi Channel per Carrier -each carrier is utilized to transmit multiple channels. MCPC is
used much more than SCPC because it makes much more efficient use of expensive satellite
bandwidth.
•DCME: Digital Circuit Multiplication Equipment is a type of voice compression equipment that is
installed at either end of a long distance link typically communications satellite.
Fig 3.7
13
CHAPTER – 4
GSM BASICS
Fig 4.1
MS = ME + SIM
Fig 4.2
14
4.3 GSM interfaces:
1. Abis Interface [BTS-BSC]:
If the BTS and BSC are not combined, A-bis interface will be used. Otherwise, BS interface will
be used. Several frame unit channels are multiplexed on the same PCM support and BSC and BTS
can be remote from each other. Its main functions are:
• Conversion of 260 – bit encoded blocks (corresponding to 160x8 – bit samples for 20ms)
• Encoded block synchronization
• Vocal activity detection
• Alarm dispatch to BSC via PCM
• Test loop back operation
2. B-Interface [MSC-VLR]:
The VLR is the location and management data base for the mobile subscribers roaming in the area
controlled by the associated MSC(s). Whenever the MSC needs data related to a given mobile station
currently located in its area, it interrogates the VLR. When a mobile station initiates a location
updating procedure with an MSC, the MSC informs its VLR which stores the relevant information.
This procedure occurs whenever an MS roams to another location area. Also, when a subscriber
activates a specific supplementary service or modifies some data attached to a service, the MSC
informs (via the VLR) the HLR which stores these modifications and updates the VLR if required.
3. C-Interface [HLR-MSC]:
The Gateway MSC must interrogate the HLR of the required subscriber to obtain routing
information for a call or a short message directed to that subscriber.
4. D-Interface [HLR-VLR]:
This interface is used to exchange the data related to the location of the mobile station and to the
management of the subscriber. The main service provided to the mobile subscriber is the capability
to set up or to receive calls within the whole service area. To support this, the location registers have.
to exchange data. The VLR informs the HLR of the location of a mobile station managed by the
latter and provides it (either at location updating or at call set-up) with the roaming number of that
station. The HLR sends to the VLR all the data needed to support the service to the mobile
subscriber. The HLR then instructs the previous VLR to cancel the location registration of this
subscriber. Exchanges of data may occur when the mobile subscriber requires a particular service,
when he wants to change some data attached to his subscription or when some parameters of the
subscription are modified by administrative means
5. E-Interface [MSC_MSC]:
When a mobile station moves from one MSC area to another during a call, a handover procedure has
to be performed in order to continue the communication. For that purpose the MSCs have to
exchange data to initiate and then to realize the operation. After the handover operation has been
completed, the MSCs will exchange information to transfer A-interface signaling as necessary.
When a short message is to be transferred between a Mobile Station and Short Message Service
Centre (SC), in either direction, this interface is used to transfer the message between the MSC
serving the Mobile Station and the MSC which acts as the interface to the SC.
15
6. F-Interface [MSC-EIR]:
This interface is used between MSC and EIR to exchange data, in order that the EIR can verify the
status of the IMEI retrieved from the Mobile Station.
7. G-Interface [VLR-VLR]:
When a mobile subscriber moves from a VLR area to another Location Registration procedure will
happen. This procedure may include the retrieval of the IMSI and authentication parameters from the
old VLR.
8. H-Interface [HLR-AUC]:
When an HLR receives a request for authentication and ciphering data for a Mobile Subscriber and it
does not hold the requested data, the HLR requests the data from the AuC. The protocol used to
transfer the data over this interface is not standardized.
Fig 4.3
16
4.5 Billing Centre:
Charging analysis is the process of analyzing the Charging Case and then ultimately generating the
TT (Toll Ticketing) record so that an itemized bill can be produced and then sent on to the customer.
The tariff structure consists of two parts: • The network access component • The network utilization
component
CC NDC SN CC NDC SN
17
CGI – CELL GLOBAL Identity
Each Cell Area within the PLMN has an associated internationally unique identifier (CGI). The CGI
is broadcast regularly by BTSs on the Broadcast Control channel (BCCH), thus uniquely identifying
each cell with an associated LA.
CGI = LAI+CI
CGI = MCC+MNC+LAC+CI
Fig 4.5
Fig 4.4
18
CHAPTER – 5
IP Addressing
An Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet. An IP address definition is a numeric label assigned to devices that use the
internet to communicate. Computers that communicate over the internet or via local networks share
information to specific location using IP addresses.
IP addresses have two distinct versions or standards. The Internet Protocol version 4 (IPv4) address
is the older of the two, which has space for up to 4 billion IP addresses and is assigned to all
computers. The more recent Internet Protocol version 6 (IPv6) has space for trillions of IP addresses,
which accounts for the new breed of devices in addition to computers. There are also several types of
IP addresses, including public, private, static, and dynamic IP addresses.
Every device with an internet connection has an IP address, whether it's a computer, laptop, IoT
device, or even toys. The IP addresses allow for the efficient transfer of data between two connected
devices, allowing machines on different networks to talk to each other.
Each host on the internet is assigned a 32-bit or 128 bit address called its internet address or IP
address.
5.2 Sources
Fig 5.1
19
INTERNET ENGINEERING TASK FORCE [IETF]:
It develops and promotes voluntary internet standards in a particular way that comprise of the
internet protocal i.e IP/TCP. It is an open standard organization with no formal membership or any
requirements. The IETF started out as an activity supported by the U.S. federal government but since
1993 it has operated as a standard development function under the guidance of the internet society.
Prefix: The prefix part of IP address identifies the physical network to which the computer is
attached. . Prefix is also known as a network address.
Suffix: The suffix part identifies the individual computer on the network. The suffix is also
called the host address.
Fig 5.2
20
5.4 Subnetting
5.5 Supernetting
Fig 5.3
21
IMPLEMENTATION OF IP ADDRESS:
The number of machines you expect to support will affect several decisions you will need to make at
this stage of setting up a network for your site. Your organization may require a small network of
several dozen standalone machines located on one floor of a single building. Alternatively, you may
need to set up a network with more than 1000 hosts in several buildings. This arrangement may
require you to further divide your network into subdivisions called subnets. The size of your
prospective network will affect the:
Network class you apply for
Network number you receive
IP addressing scheme you use for your network
Obtaining a network number and then establishing an IP addressing scheme is one of the most
important tasks of the planning phase of network administration.
5.7 IPv6
An IPv6 address is made of 128 bits divided into eight 16-bits blocks. Each block is then converted
into 4-digit Hexadecimal numbers separated by colon symbols.
For example, given below is a 128 bit IPv6 address represented in binary format and divided into
eight 16-bits blocks:
– 0010000000000001 0000000000000000 0011001000111000
1101111111100001 0000000001100011 0000000000000000
0000000000000000 1111111011111011
Total Addresses = 2^128 = 3.4x10^38
Why IPv6?
IP version 4 was designed in the early 80’s. it is 32 bits long. It has issues like:
Space saturation due to exponential internal growth
Security concern
Data priority
It does not have a mechanism to configure a device which has globally unique IP address.
It does not provide mobility.
As IPv6 also reserves blocks of numbers for particular purpose or prohibits using specific numbers
entirely, the total number of IPv6 addresses should be slightly less. Nonetheless, the amount of IPv6
addresses is almost endless, so future demand should be met.
5.8 IPv4
Internet Protocol version 4 (IPv4) is the fourth edition of the Internet Protocol. It is a system of
identifying individual computers and digital devices on the Internet by assigning each one with a
unique address. IPv4 address consists of a set of four numbers separated by a period character (“.”),
often referred to as a “dot.” Each number can be from 0 to 254. Some addresses may not be assigned
because they are reserved for special uses. IPv4 can accommodate up to 4 billion unique addresses,
but these have already been used up as the Internet continues to grow.
You can think of IPv4 as the unique ID which a computer, smartphone, or game console displays to
communicate with similar devices.
22
DIFFERENCE BETWEEN IPV4 AND IPV6
Fig 5.4
23
CHAPTER – 6
System Architecture Evolution (SAE) is the term used to describe the evolution of the core network
into the Evolved Packet Core (EPC).
Fig 6.1
24
The LTE Network consists of mainly two parts:
•The Enhanced UTRAN part which is composed of only EnodeB.
•The EPC part which includes the main components of the LTE
EnodeB –
The EnodeB provides the Radio physical layer and Radio resource management of the formal
NodeB
Through the new Added X2 interface , the EnodeB can do a call handover without the EPC
involvement.
Enode B provides the user data routing through the SAE-GW.
Provide the MME Selection Algorithm.
SAE Gateway –
The serving gateway is a network element that manages the user data path (SAE bearers)
within EPC.
It is connected to eNB via the S1-U interface. It receives uplink packet data from here and
transmits downlink packet data on it.
Thus the serving gateway is some kind of distribution and packet data anchoring function
within EPC.
It relays the packet data within EPC via the S5/S8 interface to or from the PDN gateway.
A serving gateway is controlled by one or more MMEs via S11 interface.
Fig 6.2
25
PDN-SAE Gateway –
The PDN gateway provides the connection between EPC and a number of external data
networks. It is comparable to GGSN in 2G/3G networks.
A major functionality provided by a PDN gateway is the QoS coordination between the
external PDN and EPC.
PDN gateway can be connected via S7 to a PCRF(Policy and Charging Rule Function).
Fig 6.3
Fig 6.4
26
6.5 Basic Functions of different Nodes
There are multiple types of nodes in LTE but the mains ones are EnodeB , SGW, PGW & HSS.
Three of them have been explained above in the subheading “Network Architecture”.
HSS:
It stands for Home Subscriber Service.
Some of the functions of HSS are-
Provides the subscriber Data Management and mobility information(User Number, Location,
Profile, Qos etc.
Contains the Authentication Center (AuC) functionality.
The HSS is already introduced by UMTS release 5. With LTE/SAE the HSS will get additionally
data per subscriber for SAE mobility and service handling and can be accessed by the MME via S6a
interface.
Fig 6.5
THANK YOU
27