Beruflich Dokumente
Kultur Dokumente
BELAGAVI
An Internship report on
TELECOM TECHNOLOGY
Submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Engineering
In
Information Science and Engineering
Submitted by
AMRUTHA R.S
USN:4VV15IS013
Under the guidance of
2017-2018
Vidyavardhaka College of Engineering
Gokulam III Stage, Mysuru-02
Department of Information Science and Engineering
CERTIFICATE
This is to certify that the Internship work entitled “ADVANCE TELECOM TECHNOLOGY”
is a bonafide work carried out by AMRUTHA RS, 4VV15IS013 of 6th semester, Information
Science and Engineering as prescribed by Vishveshwaraya Technological University Belagavi,
during the academic year 2017-18. It is certified that all the suggestions and corrections indicated
for the internal assessment have been incorporated in the report. The internship report has been
approved as it satisfies the requirements in respect of Internship work prescribed for the Bachelor
of Engineering
1.
2.
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mention of the people who made it possible, whose
constant guidance and encouragement crowned my efforts with success.
I express our sincere gratitude and appreciation to our principal Dr. B. SADASHIVE
GOWDA, Vidyavardhaka College of Engineering for providing necessary facilities,
creating competitive environment in our college and encouraging throughout this course.
I take this opportunity to express my sincere thanks to our beloved internal guide Dr.A B
Rajendra without whom the congenial atmosphere in which we worked have been
impossible.
I would also like to thank our beloved external internship guide Mr.Hanchinal C S and
all the teaching staff and non-teaching staff for their kind and support.
AMRUTHA R.S
CONTENTS
CHAPTER 1
1.1 INTRODUCTION
1.2 BSNL PROFILE
1.3 VISION & MISSION
1.31 VISSION
1.32 MISSION
1.4 OBJECTIVES
1.5 SERVICES
1.6 GROWTH PLAN
1.61 NEW SERVICES INTRODUCED BY BSNL
CHAPTER 2
2.1 RTTC PROFILE
2.2 VISION & MISSION
2.21 VISSION
2.22 MISSION
2.3 SERVICES PROVIDED
2.31 COURSES OFFERED
CHAPTER 3
3.1 INTRODUCTION
3.2 DATA COMMUNICATION
3.21 BASIC CONCEPTS
3.22 COMPONENTS
3.3 OSI MODEL
3.31 FUNCTIONS OF THE LAYER
3.4 TCP/IP PROTOCOL SUIT
3.5 IP ADDRESSING
3.51 IPV4
3.52 SUBNETS AND SUBMASK
3.6 LAN
3.61 INTRODUCTION
3.62 NEED
3.63 TYPES
3.64 EFFECTS
3.7 VLAN
3.8 CRIMPING
3.9 ROUTING PROTOCAL
3.91 GOALS
3.92 TYPES
3.93 AUTONOMOUS SYSTEM
3.94 BORDER GATEWAY PROTOCOL
CHAPTER 4
REFLECTION NOTES
CHAPTER 5
CONCLUSION
REFERENCES
LIST OF FIGURES
The BSNL is India's oldest and largest communication service provider (CSP). It
had a customer base of 95 million as of June 2011. It has footprints throughout India
except for the metropolitan cities of Mumbai and New Delhi, which are managed by
Mahanagar Telephone Nigam (MTNL).
The BSNL is a pioneer of rural telephony in India. BSNL has recently bagged
80% of US$ 580 m (INR 2,500 crores) Rural Telephony project of Government of
India.
1.3 VISION & MISSION
1.31 VISION
1.32 MISSION
⚫ To increasing sales revenue with focus on subscriber retention & acquisition by way
of strengthening sales & marketing, quality of service and customer delivery
⚫ Accelerate the pace of expansion of mobile & data services with up-gradation of
technology
⚫ Increasing BSNL visibility in urban, sub-urban and rural areas
⚫ Developing sales and marketing team with attitude towards customer care
⚫ To improve customer care by reducing fault rate, upgrading Customer service
Centres (CSCs) and introducing convergent billing
⚫ Providing a conducive work environment with strong focus on performance to
enhance customer delight towards BSNL services
⚫ Leverage data services to increase BSNL’s customer’s base & revenues by providing
higher bandwidths capabilities for wire line and wireless broadband customers
⚫ To strengthen company’s finances by gainful utilization of its assets through sharing
monetization of existing infrastructure like land, building and sharing of passive
infrastructure like towers etc.
⚫ Creating Wi-Fi Hot Spots and replacing Legacy wire line exchanges by Next
Generation Network.
⚫ Expanding the reach of fiber network near to the customer premises particularly in
apartment complexes through FTTH in order to meet the ever increasing bandwidth
requirement for both data & video applications
⚫ To leverage the existing infrastructure of BSNL thereby contributing towards nation
building by facilitating the execution of government programmes and initiatives viz.
National Optical Fiber Network (NOFN), Network for Spectrum (NFS), and dwelling
on Smart City concept
⚫ To improve productivity by training and skill development and redeployment of
legacy manpower
⚫ Developing knowledge pool exposed to latest technological advancements
⚫ To explore opportunities in international telecom in developing markets
⚫ To become preferred service provider to the Government for reliable and secure
service Network and to serve National security interests
1.5 SERVICES
The BSNL provides almost every telecom service in India. Following are the main
Telecom services provided by The BSNL:
⚫ Universal Telecom Services : Fixed wireline services and landline in local loop
(WLL) using CDMA Technology called 'b fone' and Tarang respectively. As of June
30, 2010, BSNL had 75% market share of fixed lines.
⚫ Cellular Mobile Telephone Services: The BSNL is major provider of Cellular
Mobile Telephone services using GSM platform under the brand name Cell one &
Excel (BSNL Mobile).As of June 30, 2010 BSNL has 13.50% share of mobile
telephony in the country.
⚫ Internet: The BSNL provides Internet access services through dial-up connection (as
Sancharnet through 2009) as Prepaid, Net One as Postpaid and ADSL broadband as
BSNL Broadband BSNL held 55.76% of the market share with reported subscriber
base of 9.19 million Internet subscribers with 7.79% of growth at the end of March
2010. Top 12 Dial-up Service providers, based on the subscriber base, It Also
Provides Online Games via its Games on Demand (GOD)
⚫ Intelligent Network (IN): The BSNL offers value-added services, such as Free
Phone Service (FPH), India Telephone Card (Prepaid card), Account Card Calling
(ACC), Virtual Private Network (VPN), Tele-voting, Premium Rae Service (PRM),
Universal Access Number (UAN).
⚫ 3G: The BSNL offers the '3G' or the'3rd Generation' services which includes
facilities like video calling, mobile broadband, live TV, 3G Video portal, streaming
services like online full length movies and video on demand etc.
⚫ IPTV: The BSNL also offers the 'Internet Protocol Television' facility which enables
watch television through internet.
⚫ FTTH:Fibre To The Home facility that offers a higher bandwidth for data transfer.
This idea was proposed on post-December 2009
3G Services : BSNL has covered 4519 cities with 3G services across the country and
all 2G customer have been enabled for 3G facilities.
Broadband services : The shift in demand from voice to data has revolutionized the
very nature of the network. BSNL is poised to cash on this opportunity & has
planned for extensive expansion of Broadband services. BSNL has increased
minimum download speed to 2 Mbps. BSNL has covered more than 1.73 lakh
villages with Broadband services. The Broadband customer base of BSNL has
reached to 21.86 Million customers in October, 2016.
Fibre to Home(FTTH) : To meet demand for high bandwidth services, BSNL has
rolled out FTTH services (GPON & GE-PON) in 2010 for the first time in the
country. As on 31.10.2016, BSNL has provided over one lakh FTTH connections in
the country.
CHAPTER 2
ABOUT RTTC
2.1 RTTC PROFILE
The Regional Telecom Training Centre (RTTC), Mysore is one of the pioneer
Telecom Training Centres in India serving for the training needs on different fields of
Telecommunication, Accounts, Computers, Civil, Electrical, Management and
Information Technology for the officers/Staff of the organizations of the Bharat Sanchar
Nigam Limited, India and other Telecom related organizations like TCIL, Dept Of
Electronics, ITI etc.RTTC, Mysore has been recognized as the "Centre for excellence in
Computers" by the Telecom directorate as a result of its excellent infrastructure in the
field of Computers. Co-functioning in the same premises is the Circle Telecom Training
Centre (CTTC), catering to the training needs of the staff of the Karnataka Telecom
Circle.
2.21 VISION
RTTC aspires to be one of the best telecom training centres in India by being responsive
and participant-centred institution dedicated to academic excellence, thereby enabling
participants to think critically, work creatively, communicate effectively and become
technologically competent so as to make BSNL a vibrant company.
2.22 MISSION
Telecom being the fastest-growing sector in India offers great opportunities for
job aspirants. Aspiring students will have to be conversant with latest telecom technology
and be industry ready with adequate practical exposure for availing this great opportunity.
4. IP NETWORKING
5. WIRELESS COMMUNICATION
CHAPTER 3
3.1 INTRODUCTION
Computer Networking is the buzz word of today and knowledge of various
components of Network, Protocols, layered architecture of N/W system, IP address (IPV4
& IPV6), routing and network security is absolutely essential for an aspiring network
engineer.
This course aims to make students familiar with above aspects along with extensive
hands on sessions on both simulators and actual components.
3.22 COMPONENTS
1. Message
2. Sender
3. Receiver
4. Medium/ communication channel
5. Encoder and decoder
Message
The message is the data or information to be communicated. It may consist of text, number,
pictures, sound, video or any a combination of these.
Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures
etc. it is also called source or transmitter. Normally, computer is use as sender in
information communication systems.
Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be
computer, printer or another computer related device. The receiver must be capable of
accepting the message.
Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data.
The medium can be a copper wire, a fiber optic cable, microwaves etc. it is also called
communication channel.
An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. Vendor specific protocols close
off communication between unrelated systems. The purpose of the OSI model is to open
communication between different systems without requiring changes to the logic of the
underlying hardware and software. The OSI model is not a protocol; it is a model for
understanding and designing a network architecture that is flexible, robust an interoperable.
The open systems interconnection model is a layered framework for the design of network
systems that allows for communication across all types of computer systems. It consists of
seven separate but related layers, each of which defines a segment of process of moving
information across a network. Understanding the fundamentals of the OSI model provides a
solid basis for exploration of data communications.
APPLICATION LAYER
PRESENTATION LAYER
SESSION LAYER
TRANSPORT LAYER
NETWORK LAYER
PHYSICAL LAYER
As the message travels from A to B, it may pass through many intermediate nodes. These
nodes usually involve only the first three layers of the OSI model. In developing the model,
the designers distilled the process of transmitting data down to its most fundamental
elements. They identified which networking functions had related uses and collected those
functions into discrete groups that became the layers. Each layer defines a family of
functions distinct from those of the other layers. By defining and localizing functionality in
this fashion, the designers created an architecture that is both comprehensive and flexible.
The OSI model allows complete transparency between otherwise incompatible system.
FIG 1.3 The layers involved in the message transfer from A to B
LAYER4 LAYER4
LAY LAY
ER3 ER3
LAYER3 LAYER3
LAY LAY
ER2 ER2
LAYER2 LAYER2
LAY LAY
LAYER1 ER1 ER1 LAYER1
3.31 FUNCTIONS OF THE LAYERS
Physical Layer
This layer coordinates the functions required to transmit a bit stream over a physical
medium. It deals with
• Mechanical and electrical specifications of the primary connections such as cables
and connectors
• Signaling options that physically link two nodes on a network.
The data link layer is responsible for delivering data units from one station to the
next without errors. It accepts a data unit from the third layer and adds meaningful bits to
the beginning and end that contain addresses and other control information. A data unit
with these additional informations is called a frame.Data link frame headers and trailers
contain the information necessary to move a data unit from one of these stations to the
next. In addition, the data link layer is responsible for flow control and error detection..
Network layer
The network layer is responsible for the source to destination delivery of a packet
across multiple network links. Whereas the data link layer oversees station-to-station
delivery (node to node), the network layer ensures that each packet gets from its
point of origin to its final destination successfully and efficiently.
Transport Layer
The transport layer is responsible for source to destination (end to end)
delivery of the entire message. The transport layer ensures that the whole message
arrives intact and in order; overseeing both errors control and flow control at the
source to destination level.
Session Layer:
Presentation Layer
Application Layer
TCP/IP protocols map to a four-layer conceptual model known as the DARPA model,
named after the U.S. government agency that initially developed TCP/IP. The four layers
of the DARPA model are: Application, Transport, Internet, and Network Interface. Each
layer in the DARPA model corresponds to one or more layers of the seven-layer Open
Systems Interconnection (OSI) model.
The TCP/IP protocol component that is installed in your network operating system is a
series of interconnected protocols called the core protocols of TCP/IP. All other
applications and other protocols in the TCP/IP protocol suite rely on the basic services
provided by the following protocols: IP, ARP, ICMP, IGMP, TCP, and UDP.
IP
ARP
ICMP
Internet Control Message Protocol (ICMP) provides troubleshooting facilities and error
reporting for packets that are undeliverable. For example, if IP is unable to deliver a
packet to the destination host, ICMP will send a Destination Unreachable message to the
source host. Table 4 shows the most common ICMP messages.
IGMP
TCP
UDP
3.5 IP ADDRESSING
• The network ID (also known as a network address) identifies the systems that are
located on the same physical network bounded by IP routers. All systems on the same
physical network must have the same network ID. The network ID must be unique to the
internetwork.
• The host ID (also known as a host address) identifies a workstation, server, router,
or other TCP/IP host within a network. The address for each host must be unique to the
network ID.
Note The use of the term network ID refers to any IP network ID, whether it is class-
based, a subnet, or a supernet.
3.51 IP v4
An IP address is 32 bits long. Rather than working with 32 bits at a time, it is a common
practice to segment the 32 bits of the IP address into four 8-bit fields called octets. Each
octet is converted to a decimal number (the Base 10 numbering system) in the range 0-
255 and separated by a period (a dot). This format is called dotted decimal notation. Table
10 provides an example of an IP address in binary and dotted decimal formats.
In an effort to create smaller broadcast domains and to better utilize the bits in the host
ID, an IP network can be subdivided into smaller networks, each bounded by an IP router
and assigned a new subnetted network ID, which is a subset of the original class-based
network ID.
This creates subnets, subdivisions of an IP network each with their own unique subnetted
network ID. Subnetted network IDs are created by using bits from the host ID portion of
the original class-based network ID.
Subnet Masks
With the advent of subnetting, one can no longer rely on the definition of the IP address
classes to determine the network ID in the IP address. A new value is needed to define
which part of the IP address is the network ID and which part is the host ID, regardless of
whether class-based or subnetted network IDs are being used.
RFC 950 defines the use of a subnet mask (also referred to as an address mask) as a 32-
bit value which is used to distinguish the network ID from the host ID in an arbitrary IP
address. The bits of the subnet mask are defined as:
3.6 LAN
Mobility: Wireless LANs can provide users with access to real-time information and
resources anywhere in their organization through designated access points.
Installation Speed and Simplicity: Installing a wireless LAN system can be fast and
easy and eliminates the need to pull cable through walls and ceilings.
Installation flexibility: Wireless technology allows the network to go where wires
cannot go.
Scalability: Configurations for wireless LANs are easily changed and range from peer-
to-peer networks suitable for a small number of users to full infrastructure networks of
thousands of users that enable roaming over a broad area.
Narrowband Technology
A narrowband radio system transmits and receives user information on a specific
radio frequency. Narrowband radio keeps the radio signal frequency as narrow as possible
just to pass the information. Undesirable crosstalk between communications channels is
avoided by coordinating different users on different channel frequencies. The drawback
to this type of technology is that the end-user must obtain an FCC license for each site
where it is employed.
Infrared Technology – little used in commercial wireless LANs, infrared (IR) systems
use very high frequencies, just below visible light in the electromagnetic spectrum, to
carry data.
3.64 EFFECTS
3.7 VLAN
As networks have grown in size and complexity, many companies have turned to
virtual local area networks (VLANs) to provide some way of structuring this growth
logically. Basically, a VLAN is a collection of nodes that are grouped together in a single
broadcast domain that is based on something other than physical location.
A broadcast domain is a network (or portion of a network) that will receive a broadcast
packet from any node located within that network. In a typical network, everything on the
same side of the router is all part of the same broadcast domain. A switch that you have
implemented VLANs on has multiple broadcast domains, similar to a router. But you still
need a router (or Layer 3 routing engine) to route from one VLAN to another -- the
switch can't do this by itself.
Here are some common reasons why a company might have VLANs:
Security - Separating systems that have sensitive data from the rest of the network
decreases the chances that people will gain access to information they are not authorized
to see.
Projects/Special applications - Managing a project or working with a specialized
application can be simplified by the use of a VLAN that brings all of the required nodes
together.
Performance/Bandwidth - Careful monitoring of network use allows the network
administrator to create VLANs that reduce the number of router hops and increase the
apparent bandwidth for network users.
Broadcasts/Traffic flow - Since a principle element of a VLAN is the fact that it does
not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces
broadcasts. Access lists provide the network administrator with a way to control who sees
what network traffic. An access list is a table the network administrator creates that lists
which addresses have access to that network.
Departments/Specific job types - Companies may want VLANs set up for departments
that are heavy network users (such as multimedia or engineering), or a VLAN across
departments that is dedicated to specific types of employees (such as managers or sales
people).
You can create a VLAN using most switches simply by logging into the switch via Telnet
and entering the parameters for the VLAN (name, domain and port assignments). After
you have created the VLAN, any network segments connected to the assigned ports will
become part of that VLAN.
3.8 CRIMPING
Crimping is joining two or more pieces of metal or other ductile material by deforming
one or both of them to hold the other. The bend or deformity is called the crimp.
FIG 1.6 CRIMPIMG TOOL
FIG 1.7(a)
FIG 1.7(b)
3.9 ROUTING PROTOCAL
A routing protocol is a protocol that specifies how routers communicate with
each other, disseminating information that enables them to select routes between any two
nodes on a computer network , the choice of the route being done by routing algorithms .
Each router has a priori knowledge only of networks attached to it directly. A routing
protocol shares this information first among immediate neighbors, and then throughout
the network. This way, routers gain knowledge of the topology of the network.
Routed protocols include:
Internet Protocol
⚫ Telnet
⚫ Remote Procedure Call (RPC)
⚫ SNMP
⚫ SMTP
⚫ Novell IPX
⚫ Open Standards Institute networking protocol
⚫ DECnet
⚫ Appletalk
⚫ Banyan Vines
⚫ Xerox Network System (XNS)
Distance Vector – finds the best path to a remote network using hop count. (RIP, IGRP)
Maximum Hop Count – prevents counting to infinity.
RIP maximum hop count = 15 (16 = infinity)
IGRP maximum hop count default = 100
Split Horizon – reduces incorrect routing information and routing overhead by enforcing
the rule that routing information cannot be sent back in the direction from which it was
received.
Route Poisoning – occurs when an “unreachable,” or “infinite,” message is distributed
when a link is down.
Holddown Timer – A holddown prevents regular update messages from reinstating a
route that is going up and down (called “flapping”). Typically, this happens on a serial
link that is losing connectivity and then coming back up. Network might never converge
otherwise.
3.93 Autonomous system (Internet)
FIG 1.8
A unique ASN is allocated to each AS for use in BGP routing. AS numbers are
important because the ASN uniquely identifies each network on the Internet.
Until 2007, AS numbers were defined as 16-bit integers, which allowed for a
maximum of 65536 assignments.Now introduced 32-bit AS numbers, which IANA has
begun to allocate.
3.94 Border Gateway Protocol
At the beginning of the internship I had set several learning goals regarding the
improvement of knowledge and skills on telecommunication service and operation
methodologies.so ,I do participate in 4 communication topics during training period.
Next, I performed some task which were assign by them. The major activities
were Drive Test,OTDR, and router configurations.
I have done the assessment on myself.this internship was useful and new
experience, gained knowledge and achieved many of my learning goals.
CHAPTER 5
CONCLUSION
Bharat Sanchar Nigam Ltd.formed in october 2000 is the world’s 7th largest
telecommunication company providing comprehensive range of telecom services in
india:wired line:CDMA mobile, GSM mobile,internet broadband, carrier service MPLS-
VPN,VSAT,VOIP services ,IN services etc. Presently it is one of the largest and leading
public sector unit in india
The training was aimed at providing the student with basic knowledge about
telecommunications and the working of telecom exchanges the various aspects regarding
the working of telecommunications the various modules In the telecom exchange and
their importance in the exchange process was explained. Both wired and wirelesses
(mobile) communication aspects were dealed with.mobile communication both CDMA
and GSM was extensively covered. Also, information about broad band, internet and its
requirements was provided .
Along with technical lecture session,practical session were also conducted
where the telecom exchanges and their equipment were shown and explained.
REFERENCES
DATA COMMUNICATION AND NETWORKING,4TH EDDITION ,BEHROUZ
A.FOROUZAN