Sie sind auf Seite 1von 37

VISVESWARAYA TECHNOLOGICAL UNIVERSITY,

BELAGAVI

An Internship report on
TELECOM TECHNOLOGY
Submitted in partial fulfillment of the requirements for the award of the degree of

Bachelor of Engineering

In
Information Science and Engineering
Submitted by

AMRUTHA R.S
USN:4VV15IS013
Under the guidance of

Internal Guide External Guide

Dr. A B Rajendra(BE,M.Tech,Ph.D) Mr.Hanchina CS(M.tech,MBA)


HOD & Prof Sub Divisional Engineer
Information Science RTTC ,BSNL
VVCE,Mysuru Kuvempunagar,Mysuru

DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING


VIDYAVARDHAKA COLLEGE OF ENGINEERING,
MYSURU – 570002

2017-2018
Vidyavardhaka College of Engineering
Gokulam III Stage, Mysuru-02
Department of Information Science and Engineering

CERTIFICATE

This is to certify that the Internship work entitled “ADVANCE TELECOM TECHNOLOGY”
is a bonafide work carried out by AMRUTHA RS, 4VV15IS013 of 6th semester, Information
Science and Engineering as prescribed by Vishveshwaraya Technological University Belagavi,
during the academic year 2017-18. It is certified that all the suggestions and corrections indicated
for the internal assessment have been incorporated in the report. The internship report has been
approved as it satisfies the requirements in respect of Internship work prescribed for the Bachelor
of Engineering

Signature of the Internal Guide Signature of the External Guide

Dr.RAJENDRA A.B Mr.Hanchinal C S


Head of the Department Sub Divisional Engineer
ISE,VVCE RTTC,BSNL
MYSURU MYSURU

Name of the examiners Signature with date

1.

2.
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mention of the people who made it possible, whose
constant guidance and encouragement crowned my efforts with success.

I express our sincere gratitude and appreciation to our principal Dr. B. SADASHIVE
GOWDA, Vidyavardhaka College of Engineering for providing necessary facilities,
creating competitive environment in our college and encouraging throughout this course.

I take this opportunity to express my sincere thanks to our beloved internal guide Dr.A B
Rajendra without whom the congenial atmosphere in which we worked have been
impossible.

I would also like to thank our beloved external internship guide Mr.Hanchinal C S and
all the teaching staff and non-teaching staff for their kind and support.

My Heartfull thanks to entire department of Information Science and Engineering for


their support.

AMRUTHA R.S
CONTENTS
CHAPTER 1
1.1 INTRODUCTION
1.2 BSNL PROFILE
1.3 VISION & MISSION
1.31 VISSION
1.32 MISSION
1.4 OBJECTIVES
1.5 SERVICES
1.6 GROWTH PLAN
1.61 NEW SERVICES INTRODUCED BY BSNL
CHAPTER 2
2.1 RTTC PROFILE
2.2 VISION & MISSION
2.21 VISSION
2.22 MISSION
2.3 SERVICES PROVIDED
2.31 COURSES OFFERED
CHAPTER 3
3.1 INTRODUCTION
3.2 DATA COMMUNICATION
3.21 BASIC CONCEPTS
3.22 COMPONENTS
3.3 OSI MODEL
3.31 FUNCTIONS OF THE LAYER
3.4 TCP/IP PROTOCOL SUIT
3.5 IP ADDRESSING
3.51 IPV4
3.52 SUBNETS AND SUBMASK
3.6 LAN
3.61 INTRODUCTION
3.62 NEED
3.63 TYPES
3.64 EFFECTS
3.7 VLAN
3.8 CRIMPING
3.9 ROUTING PROTOCAL
3.91 GOALS
3.92 TYPES
3.93 AUTONOMOUS SYSTEM
3.94 BORDER GATEWAY PROTOCOL
CHAPTER 4
REFLECTION NOTES
CHAPTER 5
CONCLUSION
REFERENCES
LIST OF FIGURES

1.1 COMPONENTS OF DATA COMMUNICATION


1.2 LAYERED ARCHITECTURE OF OSI MODEL
1.3 LAYERS INVOLVED IN MESSAGE TRANSFER
1.4 TCP/IP PROTOCOL ARCHITECTURE
1.5 IP ADDRESS
1.6 CRIMMPING TOOL
1.7 PREPARATION OF RJ45 CABLE
1.8 AUTONOMOUS SYSTEM
CHAPTER 1
COMPANY PROFILE
1.1 INTRODUCTION
Bharat Sanchar Nigam Limited (BSNL) formed in October, 2000 is an Indian
state-owned telecommunications company headquartered in New Delhi, India. It is the
largest provider of fixed telephony and fourth largest mobile telephony provider in India,
and is also a provider of broadband services. It is the World's seventh largest
Telecommunications Company providing comprehensive range of telecom services in
India. However, in recent years the company's revenue and market share plunged into
heavy losses due to intense competition in Indian telecommunications sector.

The BSNL is India's oldest and largest communication service provider (CSP). It
had a customer base of 95 million as of June 2011. It has footprints throughout India
except for the metropolitan cities of Mumbai and New Delhi, which are managed by
Mahanagar Telephone Nigam (MTNL).

1.2 BSNL PROFILE


The BSNL then known as the Department of Telecommunications had been a
near monopoly during the socialist period of the Indian economy. During this period,
DoT was the only telecom service provider in the country. MTNL was present only in
Mumbai and New Delhi. During this period the DoT operated as a typical state-run
organization, inefficient, slow, bureaucratic, and heavily unionised. As a result
subscribers had to wait for as long as five years to get a telephone connection the
corporation tasted competition for the first time after the liberalisation of Indian
economy in 1991. Faced with stiff competition from the private telecom service
providers, it has subsequently tried to increase efficiencies itself. The DoT veterans,
however, put the onus for the sorry state of affairs on the Government policies,
wherein all state-owned service providers were required to function as mediums for
achieving egalitarian growth across all segments of the society. The DoT, however,
failed to achieve this and India languished among the most poorly connected countries
in the world. So, the BSNL was born in 2000 after the corporatisation of DoT.

The corporatisation of BSNL was undertaken by an external international


consulting team consisting of a consortium of A.F.Ferguson & Co, JB Dadachanji and
NM Rothschild - and was probably the most complex corporatisation exercise of its
kind ever attempted anywhere because of the quantum of assets (said to be worth
USD 50 Billion in terms of breakup value) and over half a million directly and
indirectly employed staff. Satish Mehta, who led the team later, confessed that one big
mistake made by the consortium was to recommend the continuation of the state and
circle based geographical units which may have killed the synergies across regions
and may have actually made the organisation less efficient than had it been a seamless
national organisation. Vinod Vaish, then Chairman of the Telecom Commission made
a very bold decision to promote younger talent from within the organisation to take up
a leadership role and promoted the older leaders to a role in licensing rather than in
managing the operations of BSNL. The efficiency of the company has since
improved; however, the performance level is nowhere near the private players.

The corporation remains heavily unionised and is comparatively slow in


decision making and its implementation, which largely acts at the instances of unions
without bothering about outcome. Management has been reactive to the schemes of
private telecom players. Though it offers services at lowest tariffs, the private players
continue to notch up better numbers in all areas, years after year. BSNL has been
providing connections in both urban and rural areas. Pre-activated Mobile connections
are available at many places across India. BSNL has also unveiled cost-effective
broadband internet access plans (Data One) targeted at homes and small businesses.
At present BSNL enjoys around 60% of market share of ISP services.

The BSNL is a pioneer of rural telephony in India. BSNL has recently bagged
80% of US$ 580 m (INR 2,500 crores) Rural Telephony project of Government of
India.
1.3 VISION & MISSION

1.31 VISION

⚫ Be the leading telecom service provider in India with global presence.


⚫ Create a customer focused organization with excellence in customer care, sales and
marketing.
⚫ Leverage technology to provide affordable and innovative telecom. Services/products
across customer segments.

1.32 MISSION

⚫ Be the leading telecom service provider in India with global presence.


⚫ Becoming the most trusted, preferred and admired telecom brand
⚫ Providing reliable telecom services that are value for money
⚫ Generating value for all stakeholders – employees, shareholders, vendors & business
associates
⚫ Excellence in customer service -friendly, reliable, time bound, convenient and
courteous service
⚫ Offering differentiated products/services tailored to different service segments
⚫ Developing a marketing and sales culture that is responsive to customer needs
⚫ To explore International markets for Global presence
⚫ Maximizing return on existing assets with sustained focus on profitability
⚫ Changing policies and processes to enable transparent, quick and efficient decision
making.
1.4 OBJECTIVES

⚫ To increasing sales revenue with focus on subscriber retention & acquisition by way
of strengthening sales & marketing, quality of service and customer delivery
⚫ Accelerate the pace of expansion of mobile & data services with up-gradation of
technology
⚫ Increasing BSNL visibility in urban, sub-urban and rural areas
⚫ Developing sales and marketing team with attitude towards customer care
⚫ To improve customer care by reducing fault rate, upgrading Customer service
Centres (CSCs) and introducing convergent billing
⚫ Providing a conducive work environment with strong focus on performance to
enhance customer delight towards BSNL services
⚫ Leverage data services to increase BSNL’s customer’s base & revenues by providing
higher bandwidths capabilities for wire line and wireless broadband customers
⚫ To strengthen company’s finances by gainful utilization of its assets through sharing
monetization of existing infrastructure like land, building and sharing of passive
infrastructure like towers etc.
⚫ Creating Wi-Fi Hot Spots and replacing Legacy wire line exchanges by Next
Generation Network.
⚫ Expanding the reach of fiber network near to the customer premises particularly in
apartment complexes through FTTH in order to meet the ever increasing bandwidth
requirement for both data & video applications
⚫ To leverage the existing infrastructure of BSNL thereby contributing towards nation
building by facilitating the execution of government programmes and initiatives viz.
National Optical Fiber Network (NOFN), Network for Spectrum (NFS), and dwelling
on Smart City concept
⚫ To improve productivity by training and skill development and redeployment of
legacy manpower
⚫ Developing knowledge pool exposed to latest technological advancements
⚫ To explore opportunities in international telecom in developing markets
⚫ To become preferred service provider to the Government for reliable and secure
service Network and to serve National security interests
1.5 SERVICES

The BSNL provides almost every telecom service in India. Following are the main
Telecom services provided by The BSNL:
⚫ Universal Telecom Services : Fixed wireline services and landline in local loop
(WLL) using CDMA Technology called 'b fone' and Tarang respectively. As of June
30, 2010, BSNL had 75% market share of fixed lines.
⚫ Cellular Mobile Telephone Services: The BSNL is major provider of Cellular
Mobile Telephone services using GSM platform under the brand name Cell one &
Excel (BSNL Mobile).As of June 30, 2010 BSNL has 13.50% share of mobile
telephony in the country.

⚫ WLL-CDMA Telephone Services: BSNL's WLL (Wireless in Local Loop) service


is a service giving both fixed line telephony & Mobile telephony.

⚫ Internet: The BSNL provides Internet access services through dial-up connection (as
Sancharnet through 2009) as Prepaid, Net One as Postpaid and ADSL broadband as
BSNL Broadband BSNL held 55.76% of the market share with reported subscriber
base of 9.19 million Internet subscribers with 7.79% of growth at the end of March
2010. Top 12 Dial-up Service providers, based on the subscriber base, It Also
Provides Online Games via its Games on Demand (GOD)

⚫ Intelligent Network (IN): The BSNL offers value-added services, such as Free
Phone Service (FPH), India Telephone Card (Prepaid card), Account Card Calling
(ACC), Virtual Private Network (VPN), Tele-voting, Premium Rae Service (PRM),
Universal Access Number (UAN).

⚫ 3G: The BSNL offers the '3G' or the'3rd Generation' services which includes
facilities like video calling, mobile broadband, live TV, 3G Video portal, streaming
services like online full length movies and video on demand etc.

⚫ IPTV: The BSNL also offers the 'Internet Protocol Television' facility which enables
watch television through internet.
⚫ FTTH:Fibre To The Home facility that offers a higher bandwidth for data transfer.
This idea was proposed on post-December 2009

1.4 GROWTH PLAN


BSNL has continued its growth story ever since its formation and presently it is one of
the largest & leading public sector units in India, providing a bouquet of telecom services:
Wireline, GSM mobile, CDMA mobile, Internet, Broadband, Carrier service, MPLS-
VPN, VSAT, VoIP, IN Services, etc. BSNL has customer base of 109.26 million as on
31st October, 2016.

1.61 New Services introduced/planned by BSNL

3G Services : BSNL has covered 4519 cities with 3G services across the country and
all 2G customer have been enabled for 3G facilities.

Broadband services : The shift in demand from voice to data has revolutionized the
very nature of the network. BSNL is poised to cash on this opportunity & has
planned for extensive expansion of Broadband services. BSNL has increased
minimum download speed to 2 Mbps. BSNL has covered more than 1.73 lakh
villages with Broadband services. The Broadband customer base of BSNL has
reached to 21.86 Million customers in October, 2016.

Value Added Services : BSNL is focussing on provision of value added


services/features to attract high end customers and to double its revenues from VAS

Fibre to Home(FTTH) : To meet demand for high bandwidth services, BSNL has
rolled out FTTH services (GPON & GE-PON) in 2010 for the first time in the
country. As on 31.10.2016, BSNL has provided over one lakh FTTH connections in
the country.
CHAPTER 2
ABOUT RTTC
2.1 RTTC PROFILE
The Regional Telecom Training Centre (RTTC), Mysore is one of the pioneer
Telecom Training Centres in India serving for the training needs on different fields of
Telecommunication, Accounts, Computers, Civil, Electrical, Management and
Information Technology for the officers/Staff of the organizations of the Bharat Sanchar
Nigam Limited, India and other Telecom related organizations like TCIL, Dept Of
Electronics, ITI etc.RTTC, Mysore has been recognized as the "Centre for excellence in
Computers" by the Telecom directorate as a result of its excellent infrastructure in the
field of Computers. Co-functioning in the same premises is the Circle Telecom Training
Centre (CTTC), catering to the training needs of the staff of the Karnataka Telecom
Circle.

2.2 VISION & MISSION

2.21 VISION

RTTC aspires to be one of the best telecom training centres in India by being responsive
and participant-centred institution dedicated to academic excellence, thereby enabling
participants to think critically, work creatively, communicate effectively and become
technologically competent so as to make BSNL a vibrant company.

2.22 MISSION

To develop Confidence, Competence & Commitment of Human Resource through


training in Telecom Technology, Information Technology and Behavioral Science to
achieve the objectives of BSNL
2.3 SERVICES PROVIDED

Telecom being the fastest-growing sector in India offers great opportunities for
job aspirants. Aspiring students will have to be conversant with latest telecom technology
and be industry ready with adequate practical exposure for availing this great opportunity.

Regional Telecom Training Centre is a premier training institution of BSNL.


Equipped with world class state of art facilities / laboratories and experienced faculty.
RTTC, Mysuru offers excellent opportunity for the Engineering Students aspiring to be
Job ready in the field. It is one of the training setups identified by Govt. of India to play
lead role in delivery of skill development program.

2.31 COURSES OFFERED

1. TELECOM SUPPORT INFRASTRUCTURE

2. DIGITAL SWITCHING SYSTEM

3. DIGITAL TRANSMISION SYSTEM

4. IP NETWORKING

5. WIRELESS COMMUNICATION
CHAPTER 3

TASK PERFORMED- IP NETWORKING

3.1 INTRODUCTION
Computer Networking is the buzz word of today and knowledge of various
components of Network, Protocols, layered architecture of N/W system, IP address (IPV4
& IPV6), routing and network security is absolutely essential for an aspiring network
engineer.

This course aims to make students familiar with above aspects along with extensive
hands on sessions on both simulators and actual components.

A must for any student who wants to make a beginning in Networking.

3.2 DATA COMMUNICATION

3.21 BASIC CONCEPTS:

When we communicate,We are sharing Information.This sharing can be local or


remote. The term communication,which includes telephony,telegraphy,and
television,means communication at a distance.
The word data refers to information presented in whatever from is agreed upon by
parties creating and using the data.
Data communication are the exchange of data between two devices via some form
of transmission medium such as a wire cable.for data communication to occur,the
communicating devices must be part of a communication system made up of a combination
of hardware and software.
The effectiveness of data communications system depends on four fundamental
characteristics:delivery, accuracy, timeliness, and jitter.
1.Delivery: The system must deliver data to the correct destination.data must be
received by the intended device or user and only by that device or user.
2.Accuracy: the system must deliver the data accurately.data that have been
altered in transmission and left uncorrected are usable.
3.Timeliness: The system must deliver data in a timely manner.data delivered late
are useless.In case of video and audio,timely delivery means delivering data as they
produced,in the same order that they are produced,and without significance delay.this kind
of delivery is called is called real-time transmission.
4.jitter: jitter refers to the variation in the packet arrival time .it is the uneven
delay in the delivery of audio or video packets.

3.22 COMPONENTS

1. Message
2. Sender
3. Receiver
4. Medium/ communication channel
5. Encoder and decoder

Message
The message is the data or information to be communicated. It may consist of text, number,
pictures, sound, video or any a combination of these.
Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures
etc. it is also called source or transmitter. Normally, computer is use as sender in
information communication systems.

Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be
computer, printer or another computer related device. The receiver must be capable of
accepting the message.

Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data.
The medium can be a copper wire, a fiber optic cable, microwaves etc. it is also called
communication channel.

Encoder and decoder


The encoder is a device that converts digital signals in a form that can pass through a
transmission medium. The decoder is a device that converts the encoded signals into digital
form. The receiver can understand the digital form of message. Sender and receiver cannot
communicate successfully without encoder and decoder.
FIG 1.1 COMPONENTS OF DATA COMMUNICATION

3.3 OSI MODEL

An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. Vendor specific protocols close
off communication between unrelated systems. The purpose of the OSI model is to open
communication between different systems without requiring changes to the logic of the
underlying hardware and software. The OSI model is not a protocol; it is a model for
understanding and designing a network architecture that is flexible, robust an interoperable.

The open systems interconnection model is a layered framework for the design of network
systems that allows for communication across all types of computer systems. It consists of
seven separate but related layers, each of which defines a segment of process of moving
information across a network. Understanding the fundamentals of the OSI model provides a
solid basis for exploration of data communications.
APPLICATION LAYER

PRESENTATION LAYER

SESSION LAYER

TRANSPORT LAYER

NETWORK LAYER

DATA LINK LAYER

PHYSICAL LAYER

FIG 1.2 LAYERED ARCHITECTURE OF OSI MODEL

The OSI model is built of seven ordered layers:

Layer 1: Physical layer

Layer 2: Data Link Layer

Layer 3: Network Layer

Layer 4: Transport Layer

Layer 5: Session Layer

Layer 6: Presentation Layer

Layer 7: Application Layer

As the message travels from A to B, it may pass through many intermediate nodes. These
nodes usually involve only the first three layers of the OSI model. In developing the model,
the designers distilled the process of transmitting data down to its most fundamental
elements. They identified which networking functions had related uses and collected those
functions into discrete groups that became the layers. Each layer defines a family of
functions distinct from those of the other layers. By defining and localizing functionality in
this fashion, the designers created an architecture that is both comprehensive and flexible.
The OSI model allows complete transparency between otherwise incompatible system.
FIG 1.3 The layers involved in the message transfer from A to B

Device A intermediate node intermediate node Device B

LAYER 7 Peer to peer protocol layer7 LAYER7

Peer to peer protocol layer6


LAYER6 LAYER6
Peer to peer protocol layer5
LAYER5 LAYER5
Peer to peer protocol layer 4

LAYER4 LAYER4
LAY LAY
ER3 ER3
LAYER3 LAYER3

LAY LAY
ER2 ER2
LAYER2 LAYER2

LAY LAY
LAYER1 ER1 ER1 LAYER1
3.31 FUNCTIONS OF THE LAYERS

Physical Layer

This layer coordinates the functions required to transmit a bit stream over a physical
medium. It deals with
• Mechanical and electrical specifications of the primary connections such as cables
and connectors
• Signaling options that physically link two nodes on a network.

Data Link Layer

The data link layer is responsible for delivering data units from one station to the
next without errors. It accepts a data unit from the third layer and adds meaningful bits to
the beginning and end that contain addresses and other control information. A data unit
with these additional informations is called a frame.Data link frame headers and trailers
contain the information necessary to move a data unit from one of these stations to the
next. In addition, the data link layer is responsible for flow control and error detection..

Network layer

The network layer is responsible for the source to destination delivery of a packet
across multiple network links. Whereas the data link layer oversees station-to-station
delivery (node to node), the network layer ensures that each packet gets from its
point of origin to its final destination successfully and efficiently.

Transport Layer
The transport layer is responsible for source to destination (end to end)
delivery of the entire message. The transport layer ensures that the whole message
arrives intact and in order; overseeing both errors control and flow control at the
source to destination level.
Session Layer:

The session layer is the network dialog controller. It establishes, maintains


and synchronizes the interaction between communicating devices. It also ensures
that each session closes appropriately rather than shutting down abruptly and
leaving the user hanging. The session layer validates and establishes connections
between users.. The session layer also controls the exchange of data: whether the
exchange occurs in both directions simultaneously or only one direction at a time.
The header of this layer includes control information such as the type of the data
unit being sent and synchronization point information.

Presentation Layer

The presentation layer ensures interoperability among communicating devices.


Functions at this layer make it possible for two computers to communicate even if
their internal representations of data differ. It provides the necessary translation of
different control codes, character sets, and graphics characters and so on to allow
both devices to understand the same transmission the same way.

Application Layer

The application layer enables the user, whether human or software, to


access the network. It provides user interfaces and support for services
such as electronic mail, remote file transfers, shared database management
and other types of distributed information service.
3.4 TCP-IP PROTOCAL SUIT

TCP/IP is an industry-standard suite of protocols designed for large internetworks


spanning wide area network (WAN) links. TCP/IP was developed in 1969 by the U.S.
Department of Defense Advanced Research Projects Agency (DARPA), the result of a
resource-sharing experiment called Advanced Research Projects Agency Network
(ARPANET). The purpose of TCP/IP was to provide high-speed communication network
links. Since 1969, ARPANET has grown into a worldwide community of networks
known as the Internet.

TCP/IP PROTOCOL ARCHITECTURE

TCP/IP protocols map to a four-layer conceptual model known as the DARPA model,
named after the U.S. government agency that initially developed TCP/IP. The four layers
of the DARPA model are: Application, Transport, Internet, and Network Interface. Each
layer in the DARPA model corresponds to one or more layers of the seven-layer Open
Systems Interconnection (OSI) model.

FIG 1.4 shows the TCP/IP protocol architecture.


TCP/IP Core Protocols

The TCP/IP protocol component that is installed in your network operating system is a
series of interconnected protocols called the core protocols of TCP/IP. All other
applications and other protocols in the TCP/IP protocol suite rely on the basic services
provided by the following protocols: IP, ARP, ICMP, IGMP, TCP, and UDP.

IP

IP is a connectionless, unreliable datagram protocol primarily responsible for addressing


and routing packets between hosts. Connectionless means that a session is not established
before exchanging data. Unreliable means that delivery is not guaranteed. IP will always
make a best effort attempt to deliver a packet. An IP packet might be lost, delivered out of
sequence, duplicated, or delayed. IP does not attempt to recover from these types of
errors. The acknowledgment of packets delivered and the recovery of lost packets is the
responsibility of a higher-layer protocol, such as TCP. IP is defined in RFC 791.

ARP

When IP packets are sent on shared access, broadcast-based networking technologies


such as Ethernet or Token Ring, the Media Access Control (MAC) address corresponding
to a forwarding IP address must be resolved. ARP uses MAC-level broadcasts to resolve
a known forwarding IP address to its MAC address. ARP is defined in RFC 826.

ICMP

Internet Control Message Protocol (ICMP) provides troubleshooting facilities and error
reporting for packets that are undeliverable. For example, if IP is unable to deliver a
packet to the destination host, ICMP will send a Destination Unreachable message to the
source host. Table 4 shows the most common ICMP messages.
IGMP

Internet Group Management Protocol (IGMP) is a protocol that manages host


membership in IP multicast groups. An IP multicast group, also known as a host group, is
a set of hosts that listen for IP traffic destined for a specific multicast IP address.
Multicast IP traffic is sent to a single MAC address but processed by multiple IP hosts. A
given host listens on a specific IP multicast address and receives all packets to that IP
address.

TCP

TCP is a reliable, connection-oriented delivery service. The data is transmitted in


segments. Connection-oriented means that a connection must be established before hosts
can exchange data. Reliability is achieved by assigning a sequence number to each
segment transmitted. An acknowledgment is used to verify that the data was received by
the other host. For each segment sent, the receiving host must return an acknowledgment
(ACK) within a specified period for bytes received. If an ACK is not received, the data is
retransmitted. TCP is defined in RFC 793.

UDP

UDP provides a connectionless datagram service that offers unreliable, best-effort


delivery of data transmitted in messages. This means that the arrival of datagrams is not
guaranteed; nor is the correct sequencing of delivered packets. UDP does not recover
from lost data through retransmission. UDP is defined in RFC 768.

3.5 IP ADDRESSING

Each TCP/IP host is identified by a logical IP address. The IP address is a network


layer address and has no dependence on the data link layer address (such as a MAC
address of a network interface card). A unique IP address is required for each host and
network component that communicates using TCP/IP.
The IP address identifies a system’s location on the network in the same way a street
address identifies a house on a city block. Just as a street address must identify a unique
residence, an IP address must be globally unique and have a uniform format.

Each IP address includes a network ID and a host ID.

• The network ID (also known as a network address) identifies the systems that are
located on the same physical network bounded by IP routers. All systems on the same
physical network must have the same network ID. The network ID must be unique to the
internetwork.

• The host ID (also known as a host address) identifies a workstation, server, router,
or other TCP/IP host within a network. The address for each host must be unique to the
network ID.

Note The use of the term network ID refers to any IP network ID, whether it is class-
based, a subnet, or a supernet.

3.51 IP v4

An IP address is 32 bits long. Rather than working with 32 bits at a time, it is a common
practice to segment the 32 bits of the IP address into four 8-bit fields called octets. Each
octet is converted to a decimal number (the Base 10 numbering system) in the range 0-
255 and separated by a period (a dot). This format is called dotted decimal notation. Table
10 provides an example of an IP address in binary and dotted decimal formats.

Example of an IP address in binary and dotted decimal format

Binary Format Dotted Decimal Notation


11000000 10101000 00000011 192.168.3.24
00011000
The notation w.x.y.z is used when referring to a generalized IP address and shown in Figure 3.

FIG 1.5 The IP address

3.52 Subnets and Subnet Masks


The Internet Address Classes were designed to accommodate three different scales of IP
internetworks, where the 32 bits of the IP address are apportioned between network IDs
and host IDs depending on how many networks and hosts per network are needed.
However, consider the class A network ID, which has the possibility of over 16 million
hosts on the same network. All the hosts on the same physical network bounded by IP
routers share the same broadcast traffic; they are in the same broadcast domain. It is not
practical to have 16 million nodes in the same broadcast domain. The result is that most
of the 16 million host addresses are not assignable and are wasted. Even a class B
network with 65 thousand hosts is impractical.

In an effort to create smaller broadcast domains and to better utilize the bits in the host
ID, an IP network can be subdivided into smaller networks, each bounded by an IP router
and assigned a new subnetted network ID, which is a subset of the original class-based
network ID.

This creates subnets, subdivisions of an IP network each with their own unique subnetted
network ID. Subnetted network IDs are created by using bits from the host ID portion of
the original class-based network ID.

Subnet Masks
With the advent of subnetting, one can no longer rely on the definition of the IP address
classes to determine the network ID in the IP address. A new value is needed to define
which part of the IP address is the network ID and which part is the host ID, regardless of
whether class-based or subnetted network IDs are being used.
RFC 950 defines the use of a subnet mask (also referred to as an address mask) as a 32-
bit value which is used to distinguish the network ID from the host ID in an arbitrary IP
address. The bits of the subnet mask are defined as:

• All bits that correspond to the network ID are set to 1.


• All bits that correspond to the host ID are set to 0.

Each host on a TCP/IP network requires a subnet mask even on a single-segment


network. Either a default subnet mask, which is used when using class-based network
IDs, or a custom subnet mask, which is used when subnetting or supernetting, is
configured on each TCP/IP node.

3.6 LAN

3.61 Introduction to Wireless LAN

A wireless local area network (LAN) utilizes radio frequency (RF) as an


alternative for a wired LAN. Wireless LANs transmit and receive data over the air,
without the use of any cable, combining the benefits of data connectivity and user
mobility.

3.62 Need for Wireless LAN


The widespread reliance on networking in business and the explosive growth of
the Internet reveal the benefits of shared data and shared resources. With wireless LANs,
users can access shared information and resources without looking for a place to plug in,
and network managers can set up networks without installing or moving wires.
Wireless LANs provide all the functionality of wired LANs with the following benefits:

Mobility: Wireless LANs can provide users with access to real-time information and
resources anywhere in their organization through designated access points.
Installation Speed and Simplicity: Installing a wireless LAN system can be fast and
easy and eliminates the need to pull cable through walls and ceilings.
Installation flexibility: Wireless technology allows the network to go where wires
cannot go.
Scalability: Configurations for wireless LANs are easily changed and range from peer-
to-peer networks suitable for a small number of users to full infrastructure networks of
thousands of users that enable roaming over a broad area.

3.63 Types of Wireless LAN Technology


When evaluating wireless LAN solutions, there are a number of technologies to
choose from. Each comes with its own set of advantages and limitations:

Narrowband Technology
A narrowband radio system transmits and receives user information on a specific
radio frequency. Narrowband radio keeps the radio signal frequency as narrow as possible
just to pass the information. Undesirable crosstalk between communications channels is
avoided by coordinating different users on different channel frequencies. The drawback
to this type of technology is that the end-user must obtain an FCC license for each site
where it is employed.

Spread Spectrum Technology


Most wireless LAN systems use spread-spectrum technology, a wideband radio
frequency technique developed by the military for use in reliable, secure, mission-critical
communications systems. Spread-spectrum is designed to trade off bandwidth efficiency
for reliability, integrity and security. In other words, more bandwidth is consumed to
produce a louder and thus easier to detect broadcast signal. The drawback to this
technology is when the receiver is not tuned to the right frequency, a spread-spectrum
signal looks like background noise. There are two types of spread spectrum radio:
frequency hopping and direct sequence:
Frequency-hopping Spread Spectrum Technology – (FHSS) uses a narrowband carrier
that hops among several frequencies at a specific rate and sequence as a way of avoiding
interference. Properly synchronized, the net effect is to maintain a single logical channel.
To an unintended receiver, FHSS appears to be short-duration impulse noise.
Direct-Sequence Spread Spectrum Technology – (DSSS) uses a radio transmitter to
spread data packets over a fixed range of the frequency band. To an unintended receiver,
DSSS appears as low-power wideband noise and is rejected by most narrowband
receivers. The interoperability standard IEEE 802.11b is focusing on utilizing 11M bps
high rate DSSS technology as the standard for wireless networks.

Infrared Technology – little used in commercial wireless LANs, infrared (IR) systems
use very high frequencies, just below visible light in the electromagnetic spectrum, to
carry data.

3.64 EFFECTS

Effect of Wireless Transmission on Other Equipments


Wireless LAN products that comply with the IEEE 802.11b standard will not interfere
with cell phones, 900 MHz cordless phones, television, radio, etc. However, since
microwave ovens and 2.4GHz cordless phones use the same frequency band,
communication may be affected if they are used near wireless LAN equipment.

Effects of Wireless Technology on the Human Body


Wireless LAN products that comply with the IEEE 802.11b are in line with the standards
and guidelines of the FCC and will not affect the human body.

3.7 VLAN

As networks have grown in size and complexity, many companies have turned to
virtual local area networks (VLANs) to provide some way of structuring this growth
logically. Basically, a VLAN is a collection of nodes that are grouped together in a single
broadcast domain that is based on something other than physical location.
A broadcast domain is a network (or portion of a network) that will receive a broadcast
packet from any node located within that network. In a typical network, everything on the
same side of the router is all part of the same broadcast domain. A switch that you have
implemented VLANs on has multiple broadcast domains, similar to a router. But you still
need a router (or Layer 3 routing engine) to route from one VLAN to another -- the
switch can't do this by itself.
Here are some common reasons why a company might have VLANs:
Security - Separating systems that have sensitive data from the rest of the network
decreases the chances that people will gain access to information they are not authorized
to see.
Projects/Special applications - Managing a project or working with a specialized
application can be simplified by the use of a VLAN that brings all of the required nodes
together.
Performance/Bandwidth - Careful monitoring of network use allows the network
administrator to create VLANs that reduce the number of router hops and increase the
apparent bandwidth for network users.
Broadcasts/Traffic flow - Since a principle element of a VLAN is the fact that it does
not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces
broadcasts. Access lists provide the network administrator with a way to control who sees
what network traffic. An access list is a table the network administrator creates that lists
which addresses have access to that network.
Departments/Specific job types - Companies may want VLANs set up for departments
that are heavy network users (such as multimedia or engineering), or a VLAN across
departments that is dedicated to specific types of employees (such as managers or sales
people).
You can create a VLAN using most switches simply by logging into the switch via Telnet
and entering the parameters for the VLAN (name, domain and port assignments). After
you have created the VLAN, any network segments connected to the assigned ports will
become part of that VLAN.

3.8 CRIMPING

Crimping is joining two or more pieces of metal or other ductile material by deforming
one or both of them to hold the other. The bend or deformity is called the crimp.
FIG 1.6 CRIMPIMG TOOL

FIG 1.7 PREPARATION OF RJ45 CABLE

FIG 1.7(a)

FIG 1.7(b)
3.9 ROUTING PROTOCAL
A routing protocol is a protocol that specifies how routers communicate with
each other, disseminating information that enables them to select routes between any two
nodes on a computer network , the choice of the route being done by routing algorithms .
Each router has a priori knowledge only of networks attached to it directly. A routing
protocol shares this information first among immediate neighbors, and then throughout
the network. This way, routers gain knowledge of the topology of the network.
Routed protocols include:

Internet Protocol
⚫ Telnet
⚫ Remote Procedure Call (RPC)
⚫ SNMP
⚫ SMTP
⚫ Novell IPX
⚫ Open Standards Institute networking protocol
⚫ DECnet
⚫ Appletalk
⚫ Banyan Vines
⚫ Xerox Network System (XNS)

3.91 Main Goals of Routing Protocols


To fill the routing table with current best, loop-free routes
To notice when routes in the table are no longer valid and remove them from the routing
table
To add new routes or replace lost routes
The time for finding a working route is called convergence.
Static vs. Dynamic Routing
Static routing occurs when you manually add routes in each router’s routing table. It will
be covered in subsequent routing command procedures since it is mainly demonstrated
through routing commands.
Dynamic routing is when protocols are used to find networks and update routing tables on
routers.

3.92 TYPE of routing protocol.

The three types are: (routing algorithms)


Distance vector
Link-state
Hybrid

Distance Vector – finds the best path to a remote network using hop count. (RIP, IGRP)
Maximum Hop Count – prevents counting to infinity.
RIP maximum hop count = 15 (16 = infinity)
IGRP maximum hop count default = 100
Split Horizon – reduces incorrect routing information and routing overhead by enforcing
the rule that routing information cannot be sent back in the direction from which it was
received.
Route Poisoning – occurs when an “unreachable,” or “infinite,” message is distributed
when a link is down.
Holddown Timer – A holddown prevents regular update messages from reinstating a
route that is going up and down (called “flapping”). Typically, this happens on a serial
link that is losing connectivity and then coming back up. Network might never converge
otherwise.
3.93 Autonomous system (Internet)

FIG 1.8

Within the Internet, an Autonomous System (AS) is a collection of connected


Internet Protocol (IP) routing prefixes under the control of one or more network operators
that presents a common, clearly defined routing policy to the Internet.[1]

Originally, the definition required control by a single entity, typically an Internet


service provider or a very large organization with independent connections to multiple
networks, that adhere to a single and clearly defined routing policy, as originally defined
in RFC 1771.[2] The newer definition in RFC 1930 came into use because multiple
organizations can run BGP using private AS numbers to an ISP that connects all those
organizations to the Internet. Even though there may be multiple Autonomous Systems
supported by the ISP, the Internet only sees the routing policy of the ISP. That ISP must
have an officially registered Autonomous System Number (ASN).

A unique ASN is allocated to each AS for use in BGP routing. AS numbers are
important because the ASN uniquely identifies each network on the Internet.

Until 2007, AS numbers were defined as 16-bit integers, which allowed for a
maximum of 65536 assignments.Now introduced 32-bit AS numbers, which IANA has
begun to allocate.
3.94 Border Gateway Protocol

The Border Gateway Protocol is an inter-Autonomous System routing protocol.


The primary function of a BGP speaking system is to exchange network reachability
information with other BGP systems. This network reachability information includes
information on the list of Autonomous Systems (AS) that reachability information
traverses. This information is sufficient to construct a graph of AS connectivity from
which routing loops may be pruned and some policy decisions at the AS level may be
enforced.
BGP4 provides a set of mechanisms for supporting Classless Inter-Domain
Routing (CIDR ) defined in RFC 4632 . These mechanisms include support for
advertising a set of destinations as an IP prefix and eliminating the concept of network
"class" within BGP. BGP version 4 also introduces mechanisms which allow aggregation
of routes, including aggregation of AS paths.

Routing information exchanged via BGP supports only the destination-based


forwarding paradigm, which assumes that a router forwards a packet based solely on the
destination address carried in the IP header of the packet. This, in turn, reflects the set of
policy decisions that can (and can not) be enforced using BGP. BGP can support only the
policies conforming to the destination-based forwarding paradigm.
CHAPTER 4
REFLECTION NOTES

As a part of my study, I was interested to take internship on electronics and


communication subjects.it was a great opportunity for me to do 16 weeks internship in
BSNL mysuru. This is one of regional telecom training centre of BSNL organizations.
Here the internship was concentrated on the GSM systems, optical fibre cables,switching
systems and networking.

At the beginning of the internship I had set several learning goals regarding the
improvement of knowledge and skills on telecommunication service and operation
methodologies.so ,I do participate in 4 communication topics during training period.

Next, I performed some task which were assign by them. The major activities
were Drive Test,OTDR, and router configurations.

I have done the assessment on myself.this internship was useful and new
experience, gained knowledge and achieved many of my learning goals.
CHAPTER 5
CONCLUSION

Bharat Sanchar Nigam Ltd.formed in october 2000 is the world’s 7th largest
telecommunication company providing comprehensive range of telecom services in
india:wired line:CDMA mobile, GSM mobile,internet broadband, carrier service MPLS-
VPN,VSAT,VOIP services ,IN services etc. Presently it is one of the largest and leading
public sector unit in india
The training was aimed at providing the student with basic knowledge about
telecommunications and the working of telecom exchanges the various aspects regarding
the working of telecommunications the various modules In the telecom exchange and
their importance in the exchange process was explained. Both wired and wirelesses
(mobile) communication aspects were dealed with.mobile communication both CDMA
and GSM was extensively covered. Also, information about broad band, internet and its
requirements was provided .
Along with technical lecture session,practical session were also conducted
where the telecom exchanges and their equipment were shown and explained.

REFERENCES
DATA COMMUNICATION AND NETWORKING,4TH EDDITION ,BEHROUZ
A.FOROUZAN

Das könnte Ihnen auch gefallen