SlideShare a Scribd company logo
A SUMMER TRAINING REPORT ON 
BSNL EXCHANGE, FAIZABAD (U.P) 
BY 
AVANEESH KUMAR RAI 
(University Roll No. 1102931035) 
A report submitted in partial fulfillment 
of the requirements 
for the degree of 
Bachelor of Technology in Electronics & Communication Engineering 
Submitted to: 
Dr. Padma Batra 
Industrial Training Head 
Department of Electronics & Communication Engineering 
Krishna Institute of Engineering & Technology, Ghaziabad 
2014-2015 
1
ACKNOWLEDGEMENT 
It is with profound gratitude that I express my deep indebtedness to all the 
employees of B.S.N.L. without their support and guidance it would not have been 
possible for this training to have materialized and taken a concrete shape. I owe my 
personal thanks to my trainers in charge – Mr. N. N. Srivastav (SDE), and Mr. Vinod 
Yadav (JTO) who extended full support and co-operation at every stage of my 
training period. I would also like to take this opportunity to acknowledge the 
guidance from Dr. Sanjay Sharma (HOD of Electronics and Communication) and Dr. 
Padma Batra (Industrial Training Head of Electronics and Communication) for 
undergoing training at a reputed company like B.S.N.L. 
I am also indebted to my parents and friends for their constant encouragement and 
helping me in my endeavor. Last, but not the least, I would like to thank everyone 
who has contributed for the successful completion of my training. 
AVANEESH KUMAR RAI 
1102931035 
(B.TECH VII SEMESTER - ECE) 
2
PREFACE 
Organizations are made up of people and function through people. Without people, 
organizations cannot exist. The resources of men, money, material, machinery, and 
mechanism are connected, coordinated and utilized through people. Engineers need 
to concentrate more on mechanism and the way in which things have been made. 
The need of training arises for doing things yourself, understanding its way. 
Practical exposure for doing things makes a person conversant to the technicalities 
involved in any job. In view of such benefits, imparting of vocational training has 
been made an integral part of any academic structure. 
In B.S.N.L., training is given to Engineering Aspirants to secure future in the dynamic 
world of telecommunications. Today telecommunication industry is one of the very 
fastest growing industries in the world. 
In this order I have taken 28 days BSNL training. In my report I try to introduce 
C-DOT MAXWELL, WLL, POWER PLANT, BROAD-BAND, Leased line concepts, WIMAX, 
Wi-Fi, optical fiber concepts and overview of Intranet. 
3
Bharat Sanchar Nigam Ltd. was incorporated on 15th September 2000. It took over the business of 
providing of telecom services and network management from the erstwhile Central Government 
Departments of Telecom Services (DTS) and Telecom Operations (DTO), with effect from 1st 
October 2000 on going concern basis. It is one of the largest & leading public sector units providing 
comprehensive range of telecom services in India. 
BSNL has installed Quality Telecom Network in the country & now focusing on improving it, 
expanding the network, introducing new telecom services with ICT applications in villages & 
winning customer's confidence. Today, it has about 43.74 million line basic telephone capacity, 
8.83 million WLL capacity, 72.60 million GSM capacity, 37,885 fixed exchanges, 68,162 GSM BTSs, 
12,071 CDMA Towers, 197 Satellite Stations, 6,86,644 RKm. of OFC, 50,430 RKm. of microwave 
network connecting 623 districts, 7330 cities/towns & 5.8 lakhs villages . 
BSNL is the only service provider, making focused efforts & planned initiatives to bridge the rural-urban 
digital divide in ICT sector. In fact there is no telecom operator in the country to beat its 
reach with its wide network giving services in every nook & corner of the country & operates across 
India except New Delhi & Mumbai. Whether it is inaccessible areas of Siachen glacier or North- 
Eastern regions of the country, BSNL serves its customers with a wide bouquet of telecom services 
namely Wireline, CDMA mobile, GSM mobile, Internet, Broadband, Carrier service, MPLS-VPN, 
VSAT, VoIP, IN Services, FTTH, etc. 
BSNL is number one of India in all services in its license area. The company offers wide ranging & 
most transparent tariff schemes designed to suit every customer. BSNL has 90.09 million cellular & 
5.06 million WLL customers as on 31.07.2011. 3G Facility has been given to all 2G connections of 
BSNL. In basic services, BSNL is miles ahead of its rivals, with 24.58 million wireline 
phone subscribers i.e. 71.93% share of the wireline subscriber base. 
4 
About BSNL
BSNL has set up a world class multi-gigabit, multi-protocol convergent IP infrastructure that 
provides convergent services like voice, data & video through the same Backbone & Broadband 
Access Network. At present there are 8.09 million broadband customers. 
The company has vast experience in planning, installation, network integration & maintenance of 
switching & transmission networks & also has a world class ISO 9000 certified Telecom Training 
Institute. 
During the 2010-11, turnover of BSNL is around Rs. 29,700 Crores. 
VISSION: 
· Be the leading telecom service provider in India with global presence. 
· Create a customer focused organization with excellence in customer care, sales and 
marketing. 
· Leverage technology to provide affordable and innovative telecom. Services/products across 
customer segments. 
MISSION: 
Be the leading telecom service provider in India with global presence. 
· Generating value for all stakeholders - employees, shareholders, vendors & business 
associates 
· Maximizing return on existing assets with sustained focus on profitability 
· Becoming the most trusted, preferred and admired telecom brand 
· To explore International markets for Global presence 
Creating a customer focused organization with excellence in customer care, sales& marketing. 
· Developing a marketing and sales culture that is responsive to customer needs mere care, 
sales& marketing 
· Excellence in customer service-”friendly, reliable, time bound, convenient and courteous 
service” 
Leveraging technology to provide affordable and innovative products/ services across customer 
segments 
· Offering differentiated products/services tailored to different service segments 
· Providing reliable telecom services that are value for money 
Providing a conducive work environment with strong focus on performance 
· Attracting talent and keeping them motivated 
· Enhancing employees skills and utilizing them effectively 
· Encouraging and rewarding individual and team/group performance 
Establishing efficient business processes enabled by IT 
· Changing policies and processes to enable transparent, quick and efficient decision making 
· Building effective IT systems and tools 
5
OBJECTIVES: 
· To be the Leading Telecom Services provider by achieving higher rate of growth so as to 
become a profitable enterprise. 
· To provide quality and reliable fixed telecom service to our customer and thereby increase 
customers confidence. 
· To provide customer friendly mobile telephone service of high quality and play a leading 
role as GSM operator in its area of operation. 
Strategy for: 
· Rightsizing the manpower 
· Providing greater customer satisfaction>/li> 
Contribute towards: 
· Broadband customers base of 20 MN in India by the end of 2011-12 as per broadband policy 
2004. 
· Providing telephone connections in villages as per Government policy. 
To leverage the existing infrastructure of BSNL for facilitating implementation of other 
government programmes and initiatives particularly in the rural areas. 
6
INDEX 
1. BROADBAND 
1. Introduction.............................................................9 
2. Definition.................................................................9 
2. GSM.......................................................................................10 
3. Antenna 
1. What is antenna.................................................................11 
2. Types..................................................................................11 
3. CELLULAR CONCEPTS.............................................................13 
4. GSM ARHITECTURE................................................................14 
5. Radio link ..............................................................................16 
6. MOBILITY MANAGEMENT.....................................................17 
7. CALL MANAGEMENT............................................................20 
8. HISTORY OF WIRELESS COMMUNICATION ..........................21 
9. CDMA....................................................................................24 
i) WCDMA………………………………………………………………………………….25 
ii) 3G MOBILE.................................................................................26 
iii) IMS............................................................................................26 
iv) WIRELESS LAN AND 
BLUETOOTH...................................................................................27 
V) BEYOND 3G INTRODUCTION.....................................................33 
7
10. GPRS 
i).INTRODUCTION..........................................................................34 
11. DSL...........................................................................................35 
12. ADSL.........................................................................................36 
13. NGN.........................................................................................40 
14. WIRELESS 
TECNOLOGY...................................................................................44 
i) WIFI............................................................................................45 
ii) WIMAX.......................................................................................45 
15. CABLE MODEM 
BASICS............................................................................................46 
1. PPPOE............................................................................47 
16. INTRODUCTION TO 
MULTIPLAY....................................................................................49 
17. FTTH.........................................................................................52 
18. SMPS........................................................................................53 
19. SDH..........................................................................................56 
20. PROJECT on 
CDOT..............................................................................................61 
8
BROADBAND 
INTRODUCTION 
In 1960s people started thinking of potential value in allowing 
computers to share information on research and development in scientific 
and military fields. Internet was the result. Leaving what happened in 
between, the next milestone was in 1965 when Lawrence Roberts 
connected a computer at Massachusetts with a computer at California over 
dial-up telephone lines. The feasibility of wide area networking was proved. 
The Internet matured in the 70's as a result of the TCP/IP architecture 
replacing the earlier Network Control Protocol (NCP) and universally 
adopted by 1983. 
The National Science Foundation funded NSF Net as a cross-country 
56 Kbps backbone for the Internet in 1986. As the commands for e-mail, 
FTP , and telnet were standardized, it became a lot easier for non-technical 
people to learn to use the nets. 
So people were able to make good use of the nets - to communicate 
with people around the world and to share files and resources. An arc hiver 
for ftp sites was created in 1989. The commands to search Archie were 
UNIX commands, and it required some knowledge of UNIX to use it to its 
full capability. Followed were 
1. Wide Area Information Server (WAIS), which would index the full text of files in a 
database and allow searches of the files 
2. Gopher, which needed no knowledge of UNIX or computer architecture to use. 
3. VERONICA searchable index of Gopher menus 
Definition of Broadband 
The definition of broadband has changed over time to time. In the 1980s and early 1990s, 
broadband referred to rates greater than 45 megabits per second (Mbps), and "wideband" referred 
to rates between 1.5 and 45 Mbps. In 1995, broadband commonly referred to anything 1.5 Mbps 
and higher. In 2000, it was defined as a service that is at least 200 kbps in each direction. 
(Reference: BROADBAND BRINGING HOME THE BITS - NATIONAL ACADEMY PRESS, Washington, 
D.C.)In India, TRAI defines Broadband as: 
“An ‘always-on’ data connection that is able to support interactive services including Internet 
access and has the capability of the minimum download speed of 256 kilobits per second (kbps) to 
an individual subscriber from the Point Of Presence (POP) of the service provider intending to 
provide Broadband service where multiple such individual Broadband connections are aggregated 
and the subscriber is able to access these interactive services including the Internet through this 
POP. The interactive services will exclude any services for which a separate license is specifically 
required, for example, real-time voice transmission, except to the extent that it is presently 
permitted under ISP license with Internet Telephony.” 
9
Applications 
A question to be necessarily considered is whether "broadband" refers exclusively to Internet 
service or is a more inclusive term that refers to a set of data communications services. Whether 
broadband is used to bring the Internet to the home or small business at much higher speed and 
with characteristics such as always-on, or is it really about delivering to the home a bundle of digital 
services. Definitely, it is going to offer many services such as Video on demand, live telecast or 
Interactive games in addition to a fast web browsing service. 
What is GSM? 
The Global System for Mobile communications (GSM: originally from Group Special 
Mobile) is the most popular standard for mobile phones in the world. GSM service is used 
by over 2 billion people across more than 212 countries and territories. Its ubiquity makes 
international roaming very common between mobile phone operators, enabling 
subscribers to use their phones in many parts of the world. 
GSM differs significantly from its predecessors in that both signaling and speech channels 
are digital call quality, and so is considered a second generation (2G) mobile phone 
system. This has also meant that data communication was built into the system from the 
3rd Generation Partnership Project (3GPP). 
The main differentiator to previous mobile telephone systems, retrospectively dubbed 
1G, is that the radio signals that 1G networks use are analog, while 2G networks are 
digital. Note that both systems use digital signaling to connect the radio towers (which 
listen to the handsets) to the rest of the telephone system. 
History of GSM 
GSM standard is a European standard which has addressed many problems directly related to 
compatibility, especially with the development of digital radio technology. 
From 1982 to 1985 discussions were held to decide between building an analog or digital system. 
After multiple field tests, a digital system was adopted for GSM. The next task was to decide 
between a narrow or broadband solution. In May 1987, the narrowband time division multiple 
access (TDMA) solution was chosen. Although standardized in Europe, GSM is not only a European 
standard. GSM networks are operational or planned in Europe, the Middle East, the Far East, Africa, 
North and South America, and Australia. The acronym GSM now aptly stands for Global System for 
Mobile communications 
10
WHAT IS ANTENNA? 
Antennas transform wire-propagated waves 
into space-propagated waves. They receive 
electromagnetic waves and pass them onto a receiver or they transmit electromagnetic waves, 
which have been produced by a transmitter. All the features of passive antennas can be applied for 
reception and transmission alike (reciprocally). On one side RF cable is connected and the other 
side it is the environment, therefore the surroundings of the antenna have a strong influence on 
the antenna's electrical features. 
Principle of an antenna 
A) A transmitter sends a high frequency wave into a co-axial cable. A pulsing electrical field is 
created between the wires, which cannot free itself from the cable 
b) the end of the cable is bent open. The field lines become longer and are orthogonal to the wires. 
c) The cable is bent open at right angles. The field lines have now reached a length, which allows 
the wave to free itself from the cable. The apparatus radiates an electromagnetic wave, whereby 
the length of the two bent pieces of wire corresponds to half of the wavelength. This is the basic 
principle of l/2-dipole antenna. 
Polarization can be defined as the direction of oscillation of the electrical field vector and 
has been discussed earlier. 
For Mobile communications generally vertical polarization is used. 
For Broadcast systems horizontal polarization is used. 
Omni directional Antennas: 
The classical Omni directional lambda/2 antennas are of two types 
1. Ground Plane 
2. l/4-skirt Antenna 
The names indicate how the antenna is decoupled from the mast. In both cases the horizontal 
radiation pattern covers 360 ° and vertical half power beam width is 78 °.Hence there will be lot of 
waste of energy both upwards and downwards in the desired horizontal plane. 
Ground Plane Omni Directional Antenna 
In this case, a conductive plane is achieved via 3 counterweighted poles. The ground plane antenna 
can cover the complete frequency range because it is a wideband antenna. 
11
Directional Antennas 
Directional antennas are provided with reflectors behind the radiating element. This focuses the 
energy in a desired direction avoiding transmission in the rear side of the antenna. The directional 
antennas are classified into the following types: 
1. Grid Parabolic Reflector antennas 
2. Parabolic Reflector antennas. 
3. Cassegrain antennas. 
4. Array antennas. 
Directional Antennas 
12
The first two types of antennas are mainly used in fixed point-to-point 
radio links and the grid types are employed up to 2GHz 
whereas the solid parabolic reflector antennas are used for higher 
frequencies. The connectivity between the antennas to the 
equipment’s is by coaxial cable up to 2GHz and for higher 
frequencies it is by hollow copper tube called wave-guide. The 
beam width of these antennas depends on the diameter of the 
antenna and frequency of operation. They produce very narrow 
beams. 
Directional Antennas 
Cassegrain antennas are associated with Satellite communication are comparatively larger which 
makes them to be fixed on the ground or roof tops and orient themselves towards the satellite by 
operating gear arrangement either manually or using motors 
Directional Antennas 
Array antennas are more predominantly used in broadcasting and mobile communications. There 
are two types (i) End Fire Arrays, (ii) Panel Antennas 
End-fire Arrays: Yagi Antennas 
Yagi antennas are very common due to their simple and cheap method of construction. The gain 
and bandwidth of Yagi antennas are electrically coupled with one other which is an electrical 
disadvantage, i.e. one criterion is weighed off the other. The mechanical concept is not suitable for 
extreme climatic conditions. 
Disadvantages of Copper Based Access Networks 
13
Even though there is a vast and extensive copper based access network, there are several 
disadvantages 
1. Copper is costly and its resources are diminishing. 
2. Installation of copper network is time consuming and costly affair 
Advantages of wireless 
1. Provisioning of connectivity is faster. 
2. Since there is no physical medium, fault liability is reduced. 
3. Mobility is inherent. 
4. Reconfiguration is simple. 
5. Cost of installation is independent of distance. 
6. Connections can be at longer distances than copper based network. 
Cellular Concepts - Introduction 
Even though multiple access techniques allowed multiple users to share the medium 
simultaneously, due to constraints in providing resources, an amount of blocking will exist. The 
amount of blocking is called “Grade Of Services” (GOS). 
GOS is a measure of the probability that a percentage of the offered traffic will be blocked or 
delayed. It is commonly expressed as the fraction of calls or demands that fail to receive immediate 
service. The aim is to achieve the GOS equal to 0 
Based on GOS and resource availability (no. of carriers/no. of timeslots/both) the traffic handling 
capacity of the system is calculated. If this total traffic is divided by traffic per subscriber, we get 
number of subscribers supported by the system. For these purposes Erlangen B table (Blocking calls 
cleared) is useful. 
Cellular Concepts - What is a cell? 
Cell is the basic geographic unit. They are base stations transmitting over that small area. Cells are 
usually represented on paper as hexagon. In reality the shape is not so because of the landscape 
and man-made structures. The base stations can be employing Omni directional or directional 
antenna. 
Cell size depends on sub density and demand in that given area. To start with cell can be of 
maximum size 30Km radius and subsequently can be split into smaller cells. Usually in rural areas 
the cells are big and in urban will be smaller. 
GSM Architecture 
The figure represents a GSM reference model for a PLMN (Public Land Mobile Network). 
14
The GSM network is divided into four major systems 
1. Switching system (SS) 
2. Base station system (BSS) 
3. Mobile station (MS) 
4. Operation and maintenance Centre(OMC) 
The switching system (SS) also called as Network and Switching System (NSS) is responsible for 
performing call processing and Subscriber-related functions. The switching system includes the 
following functional units 
1. Mobile Switching Centre 
2. Home Location Register 
3. Visitor Location Register 
4. Equipment Identity Register 
5. Authentication Centre 
6. GSM Architecture - The Functions Of MSC 
1. Call handling that copes with the mobile nature of subscribers considering Location 
Registration, Authentication of subscribers and equipment, Handover and Prepaid 
service. 
Home location register contains 
1. The identity of mobile subscriber called IMSI (International Mobile Sub Identity) 
2. ISDN directory number of mobile station. 
3. Subscription information on services. 
4. Service restrictions. 
5. Location Information for call routing 
One HLR per GSM network is recommended and it may be a distributed database. Permanent data 
in HLR changed by man-machine interface. Temporary data like location information changes 
15
It refers to the terminal equipment used by the wireless subscriber. It 
consists of 
1. SIM -Subscriber Identity Module 
2. Mobile Equipment. 
SIM is removable and with appropriate SIM, the network can be 
accessed using various mobile equipment’s. 
The equipment identity is not linked to the subscriber. 
The equipment is validated separately with IMEI and EIR. 
The SIM contains an integrated circuit chip with a microprocessor, 
random access memory (RAM) and read only memory (ROM). 
SIM should be valid and authenticate the validity of MS while 
accessing the network. 
SIM also stores subscriber related information like IMSI, cell location 
identity etc. 
GSM RADIO LINK 
Introduction 
BTS and MS are connected through radio link this air interface is 
called Um. A radio wave is subject to attenuation, reflection, Doppler 
shift and interference from other transmitter. These effects causes 
loss of signal strength and distortion which will impact the quality of 
voice or data. To cope with the harsh conditions, GSM make use of an 
efficient and protective signal processing. Proper cellular design must 
ensure that sufficient radio coverage is provided in the area. 
Special Features of GSM 
1. Authentication. 
2. Encryption 
3. Time Slot Staggering 
4. Timing Advance 
5. Discontinuous transmission 
6. Power Control 
7. Adoptive equalization 
8. Slow Freq. Hopping 
16
Authentication 
Since the air interface is vulnerable to fraudulent access, it is 
necessary to employ authentication before extending the services to 
this subscriber. Authentication is built around the following notions. 
1. Authentication Key (Ki) resides only in two places, SIM card and 
Authentication Centre. 
2. Authentication Key (Ki) is never transmitted over air. 
It is virtually impossible for unauthorized individuals to obtain this 
key to impersonate a given mobile subscriber. 
Authentication Parameters 
The MS is authenticated by the VLR with a process that uses 
three parameters: 
1. RAND which is completely random number 
2. SRES which is an authentication signed response. It is generated by applying 
an authentication algorithm (A3) to RAND and Ki 
3. Kc which is cipher key. The Kc parameter generated by applying the cipher 
key generation algorithm (A8) to RAND and Ki. 
Encryption/Ciphering 
Data is encrypted at the transmitter side in blocks of 114 bits by taking 114-bit plain text 
data bursts and performing an EXOR (Exclusive OR) logical function operation with a 114-bit 
cipher block. 
The decryption function at the receiver side is performed by taking the encrypted data block 
of 114 bits and going through the same “exclusive OR “operation using the same 114-bit 
cipher block that was used at the transmitter. 
The cipher block used by both ends of transmission path for a given transmission direction is 
produced at the BSS and MS by an encryption algorithm called A5.The A5 algorithm uses a 
64-bit cipher key (Kc), produced during the authentication process during call setup and the 
22-bit TDMA frame number (COUNT) which takes decimal values from 0 through 2715647 
and has a repetition time 3.48 hours (hyper frame interval).The A5 algorithm actually 
produce two cipher blocks during each TDMA period. One for the uplink path and the other 
for the downlink path. 
Frequency Hopping 
The mobile station already has to be frequency agile, meaning it can move between a 
transmit, receive, and monitor time slot within one TDMA frame, which normally are on 
different frequencies. GSM makes use of this inherent frequency agility to implement slow 
frequency hopping, where the mobile and BTS transmit each TDMA frame on a different 
carrier frequency. 
MOBILITY MANAGEMENT 
17
Network Attachment 
Network attachment is a process of selecting an appropriate 
cell(radio frequency)by the mobile station to provide the available 
services, and making its location known to the network 
The process starts when the mobile station is switched on, and 
ends when the mobile station enters the idle mode. In idle mode the 
mobile station does not have a traffic channel allocated to make or 
receive a call, but the Public Land Mobile Network (PLMN) is aware of 
the existence of the mobile station within the chosen cell. 
Cell Identification 
When a mobile station is switched on it attempts to make 
contact with a GSM PLMN by performing the following action 
1. Measures the BCCH channels. 
2. Search for a suitable cell. 
The mobile station measures the signal strength of the BCCH 
(Broadcast Control Channel) channels received. It stores in a list of 
information of about 30 of these BCCH channels, such as the signal 
strength and the frequency corresponding to these BCCH channels. 
Call to an active Mobile Station 
As an active Mobile Station (MS) moves around in the coverage 
area of a Public Land Mobile Network (PLMN), it reports its 
movements so that it can be located when required using the 
Locations Update procedure. 
When a Mobile Services Switching Center(MSC) in the network 
needs to establish a call to an MS operating in its area the following 
Happens: 
Location area 
To eliminate the need for network-wide paging broadcasts, the 
PLMN needs to know the approximate positions of the MSs that are 
active within its coverage area. To enable the approximate positions 
of any MS to be represented by a single parameter, the total area 
covered by the network is divided into location areas. 
A Location area (LA) is a cluster of one or more radio cells. The 
cell cluster fulfills the following requirements: 
1. The BTSs in a location area are controlled by one or more BSCs 
2. BSCs that serve the same location area are always connected to the same 
18
MSC 
3. Radio cells with BTSs controlled by a common BSC can lie in different location 
areas. 
Location area Identity 
Every radio transmitter in the PLMN broadcast, via a control channel, a Location Area 
Identity (LAI) code to identify the location area that it serves. 
When an MS is not engaged in a call, it automatically scans the BCCH transmitted by the 
base stations in the locality and selects the channel that is delivering the strongest signal. 
The LAI code broadcast by the selected channel identifies the location area in which the MS 
is currently situated. This LAI code is stored in the Subscriber Identity Module (SIM) of the 
mobile equipment. 
. 
Types of Identification Numbers 
During the performance of the location update procedure and 
the processing of a mobile call different types of numbers are used: 
1. Mobile station ISDN Number(MSISDN) 
2. Mobile Subscriber Roaming Number(MSRN) 
3. International Mobile Subscriber Identity(IMSI) 
4. Temporary Mobile Subscriber Identity(TMSI) 
5. Local Mobile Station Identity(LMSI) 
Each number is stored in the HLR and/or VLR. 
Mobile Station ISDN Number 
The MSISDN is the directory number allocated to the mobile subscriber. It is dialed to make a 
telephone call to the mobile subscriber. 
The number consists of Country Code(CC) of the country in which the mobile station is 
registered(for example India 91) followed by national mobile number which consists of 
Network Destination Code(NDC) and Subscriber Number(SN).A NDC is allocated to each GSM 
PLMN. 
The composition of the MSISDN is such that it can be used as a global title address in the 
Signaling Connection Control Part(SCCP) for routing message to the HLR of the mobile 
subscriber 
Mobile Station Roaming Number 
The MSRN is the number required by the gateway MSC to route an incoming call to a MS 
that is not currently under the gateway's control 
Using the MSISDN a mobile terminated call is routed to the gateway MSC. Based on this 
MSISDN the gateway MSC requests for a MSRN to route the call to the current visited MSC 
International Mobile Subscriber Identity 
A MS is identified by its IMSI. The IMSI is embodied in the SIM of the mobile equipment. It is 
provided by the MS anytime it accesses the network 
Mobile Country Code (MCC): The MCC component of the IMSI is a 3-digit code that uniquely 
identifies the country of the domicile of the subscriber. It is assigned by the ITU-T 
Mobile Network Code (MNC): The MNC component is a 2-digit code that identifies the home 
GSM PLMN of the mobile subscriber. It is assigned by the government of each country. For 
19
GSM-1900 a 3-digit MNC is used. 
Mobile Subscriber Identification Number (MSIN): The MSIN is a code that identifies the 
subscriber within a GSM PLMN.I t is assigned by the operator. 
Hand Over 
The process of automatically switching a call in progress from 
one traffic channel to another to neutralize the adverse effects of the 
user movements. Hand over process will be started only if power 
control is not helpful anymore. 
The Hand Over process is MAHO(Mobile Assisted Hand Over).It 
starts with the Down Link Measurements by the MS(Strength of the 
signal from BTS, Quality of the signal from BTS).MS can measure the 
Signal Strength of the 6 best neighboring BTS down link(candidate 
list) 
CALL MANAGEMENT 
Mobile To Land Call Scenario (Mobile Origination) 
Phases of Mobile To Land Call. The following table lists the 
phases of a Mobile To Land Call 
1. Request for services; the MS requests to setup a call 
2. Authentication: the MSC/VLR requests the AUC for authentication parameters, 
using these parameters the MS is authenticated. 
3. Ciphering : using the parameters, which were made available earlier during 
the authentication, the uplink and the downlink are ciphered 
4. Equipment Validation :the MSC/VLR requests the EIR to check the IMEI for 
validity 
5. Call setup: the MSC establishes a connection to the MS. 
6. Handover(s) 
7. Call release; the speech path is released 
Mobile To Land Call Scenario-Phases of Mobile To Land Call 
The user enters the digits of the telephone with STD code 
incase of land line or without STD code incase of mobile and presses 
the "send" key after all digits have been entered 
1. MS transmits a channel request message over the Random Access 
Channel(RACH) 
2. Once the BSS receives the Channel Request message, it allocates a Stand-alone 
Dedicated Control Channel (SDCCH) and forwards this channel 
assignment information to the MS over the access Grant Channel (AGCH).It is 
over the SDCCH that the MS will communicate with the BSS and MSC until a 
20
traffic channel is assigned. 
3. The MS transmits a service request message to the BSS over the SDCCH. 
Included in this message is the MS TMSI and Location Area Identification 
(LAI).The BSS forwards the service request message to the MSC/VLR. 
Mobile To Land Call Scenario-Phases of Mobile To Land Call 
The IMEI code is secure and physically protected against 
The Equipment Identity Register (EIR) is responsible for storing 
the IMEI codes that identify the mobile-equipment deployed in the 
GSM system. 
History of Wireless 
Communication 
The idea of cell-based mobile radio systems appeared at Bell Laboratories (in USA) in the early 
1970s. However, mobile cellular systems were not introduced for commercial use until the 1980s. 
During the early 1980s, analog cellular telephone systems experienced a very rapid growth in 
Europe, particularly in Scandinavia and the United Kingdom. Today cellular systems still represent 
one of the fastest growing telecommunications systems. 
But in the beginnings of cellular systems, each country developed its own system, which was an 
undesirable situation for the following reasons: 
1. The equipment was limited to operate only within the boundaries of each country. 
2. The market for each mobile equipment was limited. 
In order to overcome these problems, the Conference of European Posts and Telecommunications 
(CEPT) formed, in 1982, the Group Special Mobile (GSM) in order to develop a pan-European 
mobile cellular radio system (the GSM acronym became later the acronym for Global System for 
Mobile communications). The standardized system had to meet certain criteria: 
Cellular systems 
The cellular structure 
In a cellular system, the covering area of an operator is divided into cells. A cell corresponds to the 
covering area of one transmitter or a small collection of transmitters. The size of a cell is 
determined by the transmitter's power. 
The concept of cellular systems is the use of low power transmitters in order to enable the efficient 
reuse of the frequencies. In fact, if the transmitters used are very powerful, the frequencies cannot 
be reused for hundreds of kilometers as they are limited to the covering area of the transmitter. 
The frequency band allocated to a cellular mobile radio system is distributed over a group of cells 
and this distribution is repeated in all the covering area of an operator. The whole number of radio 
channels available can then be used in each group of cells that form the covering area of an 
operator. Frequencies used in a cell will be reused several cells away. The distance between the 
21
cells using the same frequency must be sufficient to avoid interference. The frequency reuse will 
increase considerably the capacity in number of users. 
Compatibility with other systems such as ISDN 
The decision of adopting a digital technology for GSM was made in the course of developing the 
standard. During the development of GSM, the telecommunications industry converted to digital 
methods. The ISDN network is an example of this evolution. In order to make GSM compatible with 
the services offered by ISDN, it was decide that the digital technology was the best option. 
Additionally, a digital system allows, easily than an analog one, the implementation of future 
improvements and the change of its own characteristics. 
Architecture of the GSM network 
The GSM technical specifications define the different entities that form the GSM network by 
defining their functions and interface requirements. 
The GSM network can be divided into four main parts: 
The architecture of the GSM network is presented in figure 
Mobile Station 
A Mobile Station consists of two main elements: 
1. The Terminal 
There are different types of terminals distinguished principally by their power and application: 
1. The `fixed' terminals are the ones installed in cars. Their maximum allowed output 
power is 20 W. 
2. The GSM portable terminals can also be installed in vehicles. Their maximum 
allowed output power is 8W. 
3. The handheld terminals have experienced the biggest success thanks to the weight 
and volume, which are continuously decreasing. These terminals can emit up to 2 W. 
The evolution of technologies allows decreasing the maximum allowed power to 0.8 
W. 
2. The SIM 
The SIM is a smart card that identifies the terminal. By inserting the SIM card into the terminal, the 
user can have access to all the subscribed services. Without the SIM card, the terminal is not 
operational. The SIM card is protected by a four-digit Personal Identification Number (PIN). In order 
to identify the subscriber to the system, the SIM card contains some parameters of the user such as 
its International Mobile Subscriber Identity (IMSI). Another advantage of the SIM card is the 
mobility of the users. In fact, the only element that personalizes a terminal is the SIM card. 
Therefore, the user can have access to its subscribed services in any terminal using its SIM card. 
The Base Station Subsystem 
The BSS connects the Mobile Station and the NSS. It is in charge of the transmission and reception. 
The BSS can be divided into two parts: 
The Base Transceiver Station 
The BTS corresponds to the transceivers and antennas used in each cell of the network. A BTS is 
usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has 
between one and sixteen transceivers depending on the density of users in the cell. 
The Base Station Controller 
22
The BSC controls a group of BTS and manages their radio resources. A BSC is principally in charge of 
handovers, frequency hopping, exchange functions and control of the radio frequency power levels 
of the BTSs. 
The Network and Switching Subsystem 
Its main role is to manage the communications between the mobile users and other users, such as 
mobile users, ISDN users, fixed telephony users, etc. It also includes data bases needed in order to 
store information about the subscribers and to manage their mobility. The different components of 
the NSS are described below. 
The Mobile services Switching Center (MSC) 
It is the central component of the NSS. The MSC performs the switching functions of the network. It 
also provides connection to other networks. 
The Gateway Mobile services Switching Center (GMSC) 
A gateway is a node interconnecting two networks. The GMSC is the interface between the mobile 
cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a GSM 
user. The GMSC is often implemented in the same machines as the MSC. 
Home Location Register (HLR) 
The HLR is considered as a very important database that stores information of the subscribers 
belonging to the covering area of a MSC. It also stores the current location of these subscribers and 
the services to which they have access. The location of the subscriber corresponds to the SS7 
address of the Visitor Location Register (VLR) associated to the terminal 
Visitor Location Register (VLR) 
The VLR contains information from a subscriber's HLR necessary in order to provide the subscribed 
services to visiting users. When a subscriber enters the covering area of a new MSC, the VLR 
associated to this MSC will request information about the new subscriber to its corresponding HLR. 
The VLR will then have enough information in order to assure the subscribed services without 
needing to ask the HLR each time a communication is established. 
The VLR is always implemented together with a MSC; so the area under control of the MSC is also 
the area under control of the VLR. 
The Authentication Center (AuC) 
The AuC register is used for security purposes. It provides the parameters 
needed for authentication and encryption functions. These parameters help to 
verify the user's identity. 
The Equipment Identity Register (EIR) 
The EIR is also used for security purposes. It is a register containing 
information about the mobile equipments. More particularly, it contains a list of 
all valid terminals. A terminal is identified by its International Mobile Equipment 
Identity (IMEI). The EIR allows then to forbid calls from stolen or unauthorized 
terminals (e.g., a terminal which does not respect the specifications concerning 
the output RF power). 
The GSM Inter-working Unit (GIWU) 
23
The GIWU corresponds to an interface to various networks for data 
communications. During these communications, the transmission of speech and 
data can be alternated. 
The GSM functions 
In this paragraph, the description of the GSM network is focused on the different functions to fulfill 
by the network and not on its physical components. In GSM, five main functions can be defined: 
Mobility Management 
The MM function is in charge of all the aspects related with the mobility of the user, specially the 
location management and the authentication and security. 
The GSM radio interface 
The radio interface is the interface between the mobile stations and the fixed infrastructure. It is 
one of the most important interfaces of the GSM system. 
One of the main objectives of GSM is roaming. Therefore, in order to obtain a complete 
compatibility between mobile stations and networks of different manufacturers and operators, the 
radio interface must be completely defined. 
The spectrum efficiency depends on the radio interface and the transmission, more particularly in 
aspects such as the capacity of the system and the techniques used in order to decrease the 
interference and to improve the frequency reuse scheme. The specification of the radio interface 
has then an important influence on the spectrum efficiency. 
CDMA 
Introduction 
Code Division Multiple Access(CDMA) is a access method in which large 
number of transmissions are combined on the same RF channel at the same 
time but are separated by unique assigned “codes”. This CDMA Access 
method is used to provide mobile telephony and works on the cellular 
principle. 
Overview of CDMA System 
Access network, the network between local exchange and subscriber, in the Telecom Network 
accounts for a major portion of resources both in terms of capital and manpower. So far, the 
subscriber loop has remained in the domain of the copper cable providing cost effective solution in 
past. Quick deployment of subscriber loop, coverage of inaccessible and remote locations coupled 
with modern technology has led to the emergence of new Access Technologies. The various 
technological options available are as follows: 
1. Multi Access Radio Relay 
2. Wireless In Local Loop 
3. Fiber In the Local Loop 
24
Wireless in Local Loop (WILL) 
Fixed Wireless telephony in the subscriber access network also known as Wireless in Local Loop 
(WLL) is one of the hottest emerging market segments in global telecommunications today. WLL is 
generally used as “the last mile solution” to deliver basic phone service expeditiously where none 
has existed before. Flexibility and expediency are becoming the key driving factors behind the 
deployment of WILL. 
WLL shall facilitate cordless telephony for residential as well as commercial complexes where 
people are highly mobile. It is also used in remote areas where it is uneconomical to lay cables and 
for rapid development of telephone services. The technology employed shall depend upon various 
radios accesses techniques, like FDMA, TDMA and CDMA. 
Different technologies have been developed by the different countries like CT2 from France, PHS 
from Japan, DECT from Europe and DAMPS & CDMA from USA. Let us discuss CDMA technology in 
WILL application as it has a potential ability to tolerate a fair amount of interference as compared 
to other conventional radios. This leads to a considerable advantage from a system point of view. 
Advantages of CDMA System 
CDMA wireless access provides the following unique advantages: 
WCDMA 
Background 
There has been a tremendous growth in wireless communication 
technology over the past decade. The significant increase in subscribers 
and traffic, new bandwidth consuming applications such as gaming, 
music down loading and video streaming will place new demands on 
capacity. The answer to the capacity demand is the provision of new 
spectrum and the development of a new technology – Wideband CDMA 
or hereinafter referred to as WCDMA. WCDMA was developed in order 
to create a global standard for real time multimedia services that 
ensured international roaming. 
With the support of ITU (International Telecommunication Union) a 
specific spectrum was allocated – 2GHz for 3G telecom systems. The 
work was later taken over by the 3GPP (3rd Generation Partnership 
Project), which is now the WCDMA specification body with delegates 
from all over the world. Ericsson has for a long time played a very active 
role in both ITU and 3GPP and is a major contributor to WCDMA and 
the fulfillment of the vision of a global mobile telecommunication 
system. 
Code Division Multiple Access and WCDMA 
Code Division Multiple Access (CDMA) is a multiple access technology where the users are 
separated by unique codes, which means that all users can use the same frequency and transmit at 
the same time. With the fast development in signal processing, it has become feasible to use the 
technology for wireless communication, also referred to as WCDMA and CDMA2000. In cdma One 
and CDMA2000, a 1.25 MHz wide radio signal is multiplied by a spreading signal (which is a pseudo-noise 
code sequence) with a higher rate than the data rate of the message. The resultant signal 
25
appears as seemingly random, but if the intended recipient has the right code, this process is 
reversed and the original signal is extracted. Use of unique codes means that the same frequency is 
repeated in all cells, which is commonly referred to as a frequency re-use of 1. 
WCDMA is a step further in the CDMA technology. It uses a 5 MHz wide radio signal and a chip rate 
of 3.84 Mbps, which is about three times higher than the chip rate of CDMA2000 (1.22 Mbps). The 
main benefits of a wideband carrier with a higher chiprate are: 
1. Support for higher bit rates 
2. Higher spectrum efficiency thanks to improved trunking efficiency (i.e. a better 
statistical averaging) 
3. Higher QoS 
Further, experience from second-generation systems like GSM and cdmaOne has enabled 
improvements to be incorporated in WCDMA. Focus has also been put on ensuring that as much as 
possible of WCDMA operators’ investments in GSM equipment can be reused. Examples are the re-use 
and evolution of the core network, the focus on co-sitting and the support of GSM handover. In 
order to use GSM handover the subscribers need dual mode handsets. 
3 G MOBILE (UMTS) 
1. UMTS is the convergence of mobile communications, Information Technology (IT) 
and multimedia technologies. UMTS creates new opportunities for network 
operators, service providers and content providers to generate revenue and seize 
market share. The benefit of UMTS is richer, more powerful communication. UMTS 
is a suite of radio and network technologies that provide: 
2. better spectrum efficiency, 
3. high data transmission rates (up to 2 Mbit/s), worldwide roaming capability, 
4. the capability to offer new multimedia applications and services, 
5. Interoperability with both fixed and mobile telecommunications services. 
UMTS is the natural evolution from GSM and other second generation (2G) mobile systems. It 
provides interconnection with 2G networks as well as other terrestrial nd satellite-based networks. 
UMTS presents a unique opportunity to cater to the needs of individuals in the Information Society. 
As a multi-national, multi-sector system that supports numerous protocols and transport 
technologies, UMTS eliminates barriers that one posed problems for communications and enables 
the creation and delivery of fully personalized communication services to both mass 
Limitations of 2G systems 
The limitations of 2G mobile systems such as GSM include: 
1. Congestion, There are more than 300 million wireless subscribers worldwide and 
thus a need to increase system capacity. 
2. limited mobility around the world, 
3. There is a need for global standardization. 
4. Limited services. 
5. There is a need for new multimedia applications and services. 
Wideband - Code Division Multiple Access (WCDMA) 
26
WCDMA optimally divides the available radio spectrum on the air interface into a number of 
channels and defines how these channels are allocated to the many users accessing the network. 
WCDMA allows for variable bit rates and variable Quality of Service (QoS). WCDMA provides: 
1. better spectrum efficiency, 
2. wider coverage, 
3. support for all types of services (circuit, packet and multimedia), 
4. enhanced privacy, 
IP Multimedia subsystem (IMS) 
IMS (IP Multimedia Subsystem) enables and drives efficient converged service offerings. It is the key 
to delivering multimedia services with telecom-grade quality of service across fixed and mobile 
accesses. It creates new opportunities for operators who want to deliver attractive, easy-to-use, 
reliable and profitable multimedia services – including voice, pictures, text and video, or any 
combination of these –with existing services. Users benefit by being able to enjoy attractive 
converged multiple services regardless of access network and device. Service success is very much 
dependent on the ability of operators to create and deliver an experience that fulfills or exceeds 
users’ expectations. To maintain their position as service provider, operators need to climb up the 
value chain and take a more active part in service delivery. IMS is designed precisely for that 
purpose. IMS is access-independent: it is the only open standardized way to deliver IP-based 
consumer and enterprise services, enabled by one common core and control, to the fixed, mobile 
and cable communities. 
It combines the quality and interoperability of telecoms with the quick and innovative development 
of the Internet. IMS does this by making the unique values of the telecom industry easily available 
to the application development community. When implemented according to agreed standards, 
IMS enables operators to mix and match equipment and applications from multiple vendors, and 
enables mobile users to access their personal set of services wherever they roam, whichever 
operator network they are connected to. IMS includes the tools and functions needed to handle 
numerous non-standardized services in a standardized way – ensuring the interoperability, access 
awareness, policy support, charging, security and quality of service functionality required to meet 
consumer demand for attractive and convenient offerings. 
Why IMS? 
‘Why IMS?’ is one of the top strategic questions for any operator these days. There are many good 
answers, but perhaps the key one is that IMS delivers innovative multimedia services over fixed and 
mobile networks using open standards. IMS addresses key issues such as convergence, service 
creation and delivery, service interconnection and open standards. IMS can allow an operator to 
retain its existing business models, or evolve towards new ones. 
WIRELESS LAN & Bluetooth 
WIRELESS LAN INTRODUCTION 
Over recent years, the market for wireless communications has enjoyed tremendous growth. 
Wireless technology now reaches or is capable of reaching virtually every location on the face of 
the earth. Hundreds of millions of people exchange information every day using pagers, cellular 
telephones, and other wireless communication products. With tremendous success of wireless 
telephony and messaging services, it is hardly surprising that wireless communication is beginning 
to be applied to the realm of personal and business computing. No longer bound by the harnesses 
27
of wired networks, people will be able to access and share information on a global scale nearly 
anywhere they venture. This article will try to answer some basic questions of why and where 
wireless local area networks can be used, and present a brief description of some protocols that 
have been developed, with emphasis on IEEE 802.11. 
Mobile IP 
Mobile IP was suggested as a means to attain wireless networking. It focuses its attention at the 
Network Layer, working with the current version of the Internet Protocol (IP version 4). In this 
protocol, the IP address of the mobile machine does not change when it moves from a home 
network to a foreign network. In order to maintain connections between the mobile node and the 
rest of the network, a forwarding routine is implemented. 
When a person in the physical world moves, they let their home post office know to which remote 
post office their mail should be forwarded. When the person arrives at their new residence, they 
register with the new post office. This same operation happens in Mobile IP. When the mobile 
agent moves from its home network to a foreign (visited) network, the mobile agent tells a home 
agent on the home network to which foreign agent their packets should be forwarded. In addition, 
the mobile agent registers itself with that foreign agent on the foreign network. Thus the home 
agent forwarded all packets, intended for the mobile agent, to the foreign agent, foreign agent 
sends them to the mobile agent on the foreign network. When the mobile agent returns to its 
original network, it informs both agents (home and foreign) that the original configuration has been 
restored. No one on the outside networks need to know that the mobile agent moved. This 
configuration works, but it has some drawbacks. Depending on how far the mobile agent moves, 
there may need to be some store and forwarding of packets while the mobile agent is on neither 
the home nor the foreign network. In addition, Mobile IP works only for IPv4 and does not take 
advantage of the features of the newer IPv6. 
BLUETOOTH 
Introduction 
Bluetooth is an open standard and specification for small-form factor, low-cost, short range radio 
links between mobile PCs, mobile phones and other portable devices. The technology allows users 
to form wireless connections between various communication devices, in order to transmit real-time 
voice and data communications. It extends a new era of communication that eliminates and 
replaces cables which connects mobile phones, laptops, palmtops, desktops and printers. It 
provides an absolute synchronization between connecting devices. 
In February 1998, five companies as Bluetooth promoters - Ericsson, IBM, Intel, Nokia and Toshiba 
have organized and founded a group known as the Bluetooth SIG (Special Interest Group). The aim 
of this group is to study and develop a single standard for short range radio connectivity, ensuring 
interoperability between devices of different manufacturers. Since that time 3Com, Lucent, 
Microsoft, Motorola and more than 2000 member (adopters) companies have joined the 
organization. In July 1999 first version of the Bluetooth specification incorporating both radio 
protocols and control software was published. 
Concept 
The Bluetooth radio is built into a small microchip and operates in the 2.4 GHz band, a globally 
available frequency band ensuring communication compatibility worldwide. It uses frequency 
hopping spread spectrum, which changes its signal 1600 times per second, which helps to avoid 
interception by unauthorized parties. In addition software controls and identity coding built into 
each microchip ensure that only those units preset by their owners can communicate. 
The specification has two power levels defined; a lower power level that covers the shorter 
personal area within a room, and a higher power level that can cover a medium range, such as 
within a home. It supports both point-to-point and point-to-multipoint connections and provides up 
to 720 Kbps data transfer within a range of 10 meters (up to 100 meters with a power boost). The 
28
technology uses Omni directional radio waves that can transmit through walls and other non-metal 
barriers. If there is interference from other devices, the transmission speed decreases but does not 
stop 
With the current specification, up to seven slave devices can be set to 
communicate with a master radio in one device. This connection of devices 
(slaves and master) is called a piconet. Several piconets can be linked together 
to form scatternets, which allow communication between other device 
configurations. 
Bluetooth range diagram is shown in figure 1. 
Frequency Hopping 
Bluetooth communicates on a frequency of 2.45 GHz (starting from 2.402 GHz and stopping at 
2.480 GHz), which has been set aside by international agreement for the use of industrial, scientific 
and medical devices (ISM). A number of devices that you may already use take advantage of this 
same radio-frequency band. Baby monitors, garage-door openers and the newest generation of 
cordless phones all make use of frequencies in the ISM band. Making sure that Bluetooth and these 
other devices don't interfere with one another has been a crucial part of the design process. 
Bluetooth devices will coexist in the same frequency as wireless LAN and microwave oven 
consequently the band has to be very robust. 
Each channel is 1 MHz wide and so there are 79 different channels. Spread spectrum technologies 
help to avoid interference between radio technologies. A Bluetooth device changes its frequency in 
a pseudo random way 1600times per second. Interference often occurs in a small portion of 
frequency band so hoping between different frequencies makes the channel insensitive. Corrupt 
packets are resent on another frequency on which the same interference may not exist. Packets are 
also small. 
A Bluetooth channel always consists of a master and one or more slaves. Master initiates the 
connection. The master decides on a hoping scheme that is related to its internal clock. The slave 
calculate an offset which is the difference between master and slave clocks, and uses this 
information to determine the frequency to which it will hop. This process enables the master and 
its slaves to hop to the same frequencies at all times. The uplink and downlink channels for one 
device are time multiplexed and use the Time Division Duplex and hence use the same frequency 
hopping scheme. 
Working Principle 
Bluetooth uses radio medium to link devices instead of physical cable medium. Bluetooth 
technology is hardware independent. For example, if a digital camera is to be connected to a 
laptop/desktop, a cable system is necessary which is compatible with both devices each device 
follows a different set of interface/configuration to be connected. In the Bluetooth approach, the 
devices are Bluetooth enabled thus eliminating the interface/configuration conflict. This is true for 
all the hand-held devices which are communicating with each other in Bluetooth mode technology. 
This is possible by embedding a tiny inexpensive chip in a short-range transceiver into the mobile. 
Bluetooth enabled devices are connected in two different networks ‘A’ and ‘B’ Up to eight devices 
can be connected in a network. In order to communicate w with other devices, all devices should 
work on the same frequency. The device, which initiates the connection, is called ‘Master Device’ 
and the devices, which are connected to master device, are called ‘Slave Devices’ which are 
switched to the specified frequency for further communication. 
29
If a subscriber is trying to connect his services (known device), then the 
master device will send a ‘Page’ command which checks whether the device is 
within the range. If so, the communication is established. However, if an 
unknown device is trying to connect then the master device sends an ‘inquiry’ 
command and gets all the information about the unknown device and the 
database is updated. Thus, the devices within the network or from other 
networks talk with each other. As seen earlier, Master device sets hop sequence 
for the Slave devices on the network and controls whether or not each device is 
active or inactive within the network. Despite of Master/Slave designation, the 
network behaves more of peer to peer relation. Instead of one device 
designated to control and manage all resources. Each device has equal access 
to the entire network. A slave device in a network can establish connection to 
the other networks also. Thus, each slave device can participate with up to 
eight different networks. 
Application for End Users 
Bluetooth technology supports all multimedia applications used by end users. A few applications 
are as given below. 
1. Provides an absolute synchronization among various digital devices (like mobile 
phone, desktop, laptop and PDA). 
2. Bluetooth enabled mobile phone can be used as a mobile router placed in a suit 
case. 
3. Internet surfing is possible from laptop from anywhere 
4. Passing on print command remotely for printing jobs. 
Advantages of Bluetooth 
1. Bluetooth provides flexible network that allows up to eight devices to share the 
information. 
2. The network architecture allows one to add or remove nodes without additional 
infrastructure involved. 
3. The size of the implementation is small. 
4. Power consumption is low. 
5. It has the support of the security considerations like ‘encryption’ 
Conclusion 
Bluetooth is going to emerge as one of the largest growing area in the field of telecommunications 
in providing device to device wireless connectivity.2This standard is now available for 2G networks 
and is in the process of evolution for 3G network standards tool. 
Broadband through WI FI and WIMAX 
WI FI Introduction 
30
Any two computers can be directly wired to each other using a crossover cable. When number of 
computer exceeds, cables must be run from each computer to another computer or to the central 
device. It can be time-consuming and difficult to run cables under the floor or through walls, 
especially when computers sit in different rooms. The correct cabling configuration for a wired LAN 
varies depending on the mix of devices, the type of Internet connection, and whether internal or 
external modems are used. 
Look around us at the moment, we have our keyboard connected to the computer, as well as a 
printer, mouse, monitor and so on. What (literally) joins all of these together?, they are connected 
by cables. Cables have become the bane of many offices. Most of us have experienced the 'joys' of 
trying to figure out what cable goes where, and getting tangled up in the details. Is there a 
technology to replace cable? 
Wireless is the answer. 
Wireless isn't just about the freedom to stay connected as we move around the office. It's also 
about the freedom to connect our mobile laptop PC to the Internet from any room in our home or 
whenever we take it on the road. Going wireless used to be complicated. It meant dealing with 
different wireless standards and all the resultant hardware and software. But the wireless industry 
settled on 802.11b (or Wi-Fi) as the predominant standard in 1999, sending prices downward as 
demand surged. 
Wi-Fi (or Wi-fi, WiFi, Wifi, wifi), short for "Wireless Fidelity", is a set of product compatibility 
standards for wireless local area networks (WLAN). 
Wi-Fi was intended to be used for mobile devices and LANs, but is now often used for Internet and 
wireless VoIP phone access. It enables a person with a wireless-enabled computer, a personal 
digital assistant (PDA), or a wireless VoIP phone to connect to the Internet when in proximity of an 
access point the geographical region covered by one or several access points is called a hotspot. 
Wi-Fi is a trademark of the Wi-Fi Alliance (formerly the Wireless Ethernet Compatibility Alliance), 
the trade organization that tests and certifies equipment compliance with the 802.11x standards. 
Today WLAN technologies all follow one of the three main Wi-Fi communication standards. The 
benefits of wireless networking depend on the standard employed: 
802.11b was the first standard to be widely used in WLANs. The 802.11a standard is faster but 
more expensive than 802.11b; 802.11a is more commonly found in business networks. The newest 
standard, 802.11g, attempts to combine the best of both 802.11a and 802.11b, though it too is 
more a more expensive home networking option. 
Difference between WI FI and WIMAX 
The main problem with WiFi access is that hot spots are very small, so coverage is sparse. Is there a 
new technology that would provide high speed of broadband service, Wireless rather than wired 
access, so it would be a lot less expensive than cable or DSL and much easier to extend to suburban 
and rural areas and Broad coverage like the cell phone network instead of the tiny little hotspots of 
WiFi. This technology is called WiMAX, short for Worldwide Interoperability for Microwave Access. 
The big difference between Wi-Fi and WiMAX is that we're going to use licensed spectrum to 
deliver WiMAX. To date, all Wi-Fi technology has been delivered in unlicensed spectrum. WiMAX 
will use one of the unlicensed frequencies, but we're also supporting two other frequencies that are 
licensed. What that means is that you can turn up the output power and broadcast longer 
distances. So where Wi-Fi is something that is measured in hundreds of feet, usually WiMAX will 
have a very good value proposition and bandwidth up to several miles. 
Also WiMAX is designed to be a carrier-grade technology, which requires a higher level of reliability 
and quality of service than are now available in typical Wi-Fi implementations. 
Those fundamental differences make WiMAX more of a metropolitan area access technology versus 
hotspot. 
31
Thus WiMAX has the potential to do to broadband Internet access what cell phones have done to 
phone access. In the same way that many people have given up their "land lines" in favor of cell 
phones, WiMAX could replace cable and DSL services, providing universal Internet access just about 
anywhere you go. WiMAX will also be as painless as WiFi -- turning your computer on will 
automatically connect you to the closest available WiMAX antenna. 
A WiMAX system consists of two parts: A WiMAX tower, similar in concept 
to a cell-phone tower - A single WiMAX tower can provide coverage to a very 
large area -- as big as 3,000 square miles (~8,000 square km). A WiMAX 
receiver - The receiver and antenna could be a small box or PCMCIA card, or 
they could be built into a laptop the way WiFi access is today. 
A WiMAX tower station can connect directly to the Internet using a high-bandwidth, 
wired connection (for example, a T3 line). It can also connect to 
another WiMAX tower using a line-of-sight, microwave link. This connection to a 
second tower (often referred to as a), along with the ability of a single tower to 
cover up to 3,000 square miles, is what allows WiMAX to provide coverage to 
remote rural areas. 
What this points out is that WiMAX actually can provide two forms of 
wireless service: 
WiFi-style access will be limited to a 4-to-6 mile radius (perhaps 25 
square miles or 65 square km of coverage, which is similar in range to a cell-phone 
zone). Through the stronger line-of-sight antennas, the WiMAX 
transmitting station would send data to WiMAX-enabled computers or routers 
set up within the transmitter's 30-mile radius (3,600 square miles or 9,300 
square km of coverage). This is what allows WiMAX to achieve its maximum 
range. 
WiMAX outdistances WiFi by miles. WiFi's range is about 100 feet (30 m). 
WiMAX will blanket a radius of (50 km) with wireless access. The increased 
range is due to the frequencies used and the power of the transmitter. 
Wi-Fi kind of lives by what we call the "five minute rule". If you live in a 
city, most likely you can walk five minutes and find a hotspot. Or if you're in 
your car in the suburbs or a village, you can usually drive within five minutes 
and find one of those. With WiMAX we're trying to offer that same type of 
service without having to drive or walk five minutes. Even though it's only five 
minutes, it's still five minutes. Eventually, you can just open your notebook and 
get a connection, wherever you may be. 
Wi-Fi is based on the IEEE 802.11 specifications. There are currently four 
deployed 802.11 variations: 802.11a, 802.11b, 802.11g, and 802.11n. 
Bluetooth uses Frequency Hop Spread Spectrum (FHSS) to avoid any 
interference. A Bluetooth channel is divided into time slots each 625 micro 
second in length. The devices hop through these timeslots making 1600 hops 
per second. This trades bandwidth efficiency for reliability, integrity and 
security. 
32
The range for Bluetooth communication is 0-30 feet (10 meters) with a 
power consumption of 0dBm (1mW). This distance can be increased to 100 
meters by amplifying the power to 20dBm. The Bluetooth radio system is 
optimized for mobility. Bluetooth communication occurs between a master radio 
and a slave radio. Bluetooth radios are symmetric in that the same device may 
operate as a master and also the slave. Each radio has a 48-bit unique device 
address (BD_ADDR) that is fixed. 
Two or more radio devices together form ad-hoc networks called 
piconets. All units within a piconet share the same channel. Each piconet has 
one master device and one or more slaves. There may be up to seven active 
slaves at a time within a piconet. Thus, each active device within a piconet is 
identifiable by a 3-bit active device address. 
Beyond 3G Introduction 
Introduction 
New data services, interactive TV and evolving Internet behavior will influence mobile data usage. 
Long sessions in always-on mode will force a re-think of radio access technology to achieve the 
required but not easy to attain capacity (Gbit/s/km) at low cost. The ideas presented in this article 
can increase capacity by a factor of 500 with regard to expected cellular deployments. 
Coverage will be based on large umbrella cells (3G, WiMAX) and numerous Pico cells 
interconnected to provide the user with seamless high data rate (several Mbs) sessions. Scalable 
and progressive deployments are possible while protecting the operator’s long-term investment. 
The 4G infrastructure operator will mix several technologies, each of which has its optimal usage. 
The connection to one of them will result in a real-time trade-off which will offer the user the best 
possible service. Some tools that genuinely improve the user’s multimedia quality of experience 
(availability, response time, definition, etc.) are also presented in this article. 
4G MOBILE 
4G will deliver low cost multi-megabit/s sessions any time, any place, using any terminal. 
Operational Excellence 
Voice was the driver for second generation mobile and has been a considerable success. Today, 
video and TV services are driving forward third generation (3G) deployment and in the future, low 
cost, high speed data will drive forward the fourth generation (4G) as short-range communication 
emerges. 
Service and application ubiquity, with a high degree of personalization and synchronization 
between various user appliances, will be another driver. At the same time, it is probable that the 
radio access network will evolve from a centralized architecture to a distributed one. 
Service Evolution 
The evolution from 3G to 4G will be driven by services that offer better quality (e.g. video and 
sound) thanks to greater bandwidth, more sophistication in the association of a large quantity of 
information, and improved personalization. Convergence with other network (enterprise, fixed) 
services will come about through the high session data rate. It will require an always-on 
33
connection and a revenue model based on a fixed monthly fee. The impact on network capacity is 
expected to be significant. 
Machine-to-machine transmission will involve two basic equipment types: 
1. sensors (which measure parameters) 
2. tags (which are generally read/write equipment) 
It is expected that users will require high data rates, similar to those on fixed networks, for data and 
streaming applications. Mobile terminal usage (laptops, Personal digital assistants, hand-held) is 
expected to grow rapidly as they become more user friendly. Fluid high quality video and network 
reactivity are important user requirements. 
4G MOBILE 
Some of the key technologies required for 4G are briefly described below: 
GPRS BASIC 
Introduction 
The General Packet Radio System (GPRS) provides actual packet 
radio access for Global System for Mobile Communications (GSM) 
and time-division multiple access (TDMA) users. 
The main benefits of GPRS are that it reserves radio resources only 
when there is data to send and it reduces reliance on traditional 
circuit-switched network elements. GPRS 
GPRS is a data service for GSM, the European standard digital cellular service. It is a packet-switched 
mobile data service, a wireless packet based network. GPRS, further enhancing GSM 
networks to carry data, is also an important component in the GSM evolution entitled GSM+. High-speed 
mobile data usage is enabled with GPRS. 
IF GPRS is compared to GSM data services, the following applies: 
In GSM all the data that has to be sent, is sent via a circuit switched 
connection. This means, that a link has to be established and is used and 
maintained from setup until release. The data is sent via one physical timeslot 
and has a maximum data rate of 9.6 kbps. 
In GPRS all the data that has to be sent, is split into several smaller data 
packets first. Those packets are then sent individually across the GPRS network 
and each of those packets can travel on a different route. 
34
The packets arrive at the right destination address and could be 
reassembled in the right order, because every single packet contains the 
destination address and information about the sequencing of the different 
packets. 
In GPRS, one user can occupy more than one timeslot or more than one 
user can be on a single timeslot. 
Depending on different aspects, a maximum data rate of 171.2 kbps 
could be achieved. 
For GPRS the ETSI Standard introduces two new elements, the Serving 
GPRS Support Node (SGSN) and the Gateway GPRS Support Node (GGSN) 
(Shown in the diagram below as shadowed objects) is introduced to create an 
end-to-end packet transfer mode. 
The HLR is enhanced with GPRS subscriber data and routing information. 
Two services are provided; 
Point -To-Point (PTP) 
Point-To-Multipoint (PTM) (not yet specified by the Standards) 
The European Telecommunications Standards Institute (ETSI) has 
specified GPRS as an overlay to the existing GSM network to provide packet 
data services. In order to operate a GPRS service over a GSM network, new 
functionality has to be introduced into existing GSM network elements and new 
network elements have to be integrated into the existing operators GSM 
networks. The Base Station Subsystem (BSS) of GSM has to be upgraded to 
support GPRS. The BSS works with the GPRS Support Node (GSN) to provide 
GPRS service in a similar manner to its interaction with the Switching 
subsystem for the circuit switched services. 
DIGITAL SUBSCRIBER LOOP 
The Digital Subscriber Line (DSL) technology is widely regarded as a 
vehicle for offering wired broadband services to the mass market. The 
services include high-speed access to the Internet, voice and telephony 
services, interactive video services, e-commerce, and messaging, alerting 
and other multimedia services. Success of the Internet and the World Wide 
Web has created the market demand and high expectations for high-speed 
data services through DSL 
35
Twisted pair - voice 
Twisted pair - voice and data 
It uses the existing copper pair for providing Broadband. The 
previous diagram showed how the twisted pair is used for transmitting 
voice and data. The DSL technology is now mature, poised for rapid 
deployment and industry growth in the near future. There are number of 
DSL types available to address the various network environments and 
applications in the light of trade-offs between rate and reach 
1. HDSL -- High-rate DSL 
2. ADSL-- Asymmetric DSL 
3. SDSL – Symmetric DSL 
4. RADSL – Rate Adaptive DSL 
ADSL (Asymmetric Digital Subscriber Line) 
Asymmetric Digital Subscriber Line (ADSL) technology was first 
introduced in 1992 as a system capable of delivering Video-on-Demand 
(VoD) service over telephone networks. ADSL utilizes the same twisted 
two-wire facility (called the subscriber loop) as the traditional telephone 
service. The traditional telephone service is often referred to as “Plain Old 
Telephone Service” or POTS. With the initial system architecture and 
design of ADSL, the same twisted pair could simultaneously support both 
POTS and data. This is made possible due to a frequency multiplexing 
technique that supports POTS in the base band and data in a high 
frequency band above the telephone service. 
The ADSL data service is asymmetrical, in that, it has a higher 
downstream data rate (up to 6 Mbps towards the subscriber) than the 
upstream data rate (up to 640 kbps towards the service provider). The 
main objective is to use ADSL as a technology choice for offering VoD 
service. In 1994 it was proved that ADSL technology could be used to offer 
high speed data services including video. (Click to view flash movie on 
36
speed comparison ). Mass-market success of the Internet technologies – 
World Wide Web, the Internet browser, and the Universal Resource Locator 
(URL) led to high residential as well as business demand for broadband 
services. 
SDSL (Symmetric DSL) 
A variation of ADSL technology more suitable for the T1/E1 market was envisioned via a symmetric 
offering of ADSL, known as SDSL. The SDSL technology was envisioned to be a 2-wire equivalent to 
the 4-wire HDSL service. The market expectations were Ubiquitous and consistent high-speed data 
offering, support for internet access protocols, automated provisioning, dynamic access to services 
without requiring telephone company intervention, and inexpensive pricing to enable a wider 
deployment of service. Note that all of these expectations have shifted from service provider 
ADSL ARCHITECTURE 
In POTS, with the available voice band of 3.5 kHz and allowed S/N = 
30dB, the theoretical upper limit on data rate will be roughly 35Kbps. 
Copper access lines can pass frequencies into the MHz region. This feature 
is precisely what ADSL focuses on. 
ADSL technology offers the asymmetric bandwidth characteristics 
that are 1.544-8.448Mb/s in downstream and 32-768kb/s in the upstream. 
This feature fits in with the requirements of client-server applications, in 
which the client typically receives much more data from the server then he 
is able to generate 
ADSL System Architecture 
The ADSL functions at the network end (central office end) are 
performed by an ADSL Terminal Unit-Central office type (ATU-C) together 
with a splitter function (S-C). The ATU-C interfaces with the network 
switching, transport, and multiplexing functions and network operations. 
The ATU-C functions are usually integrated within a higher level network 
element, e.g. DSL access multiplexer (DSLAM). 
Although copper pairs are widely available, 
several line conditions may prevent the delivery of ADSL: first, if the 
telephone line to the customer premises is longer than 5.5km, second, 
existing of the load coils or an excessive number of bridged taps and third, 
that some portions of the telephone line is carried to the premises on fiber 
optic cable . 
DSLAM contains the access interface (network termination – NT) to 
the appropriate next device in the network, e.g., Tier2, Tier1 Switch etc. 
ADSL functions at the customer end (remote end) are performed by an 
ADSL Terminal Unit-Remote end type (ATU-R) together with a splitter 
function (S-R). At the customer premises, ATU-R may present the 
interfaces to the local distribution for broadband services via service 
37
modules (SM). The SM contains necessary decoders and terminal interfaces 
for the given service and customer control interfaces. 
Splitters are three node devices that allow the telephony signals and 
the ADSL signal to reside on the same copper loop without interfering one 
with the other. The splitter provides a low pass filter to the basic voice and 
control telephony signal (below 4 kHz) and a high pass filter for the ADSL 
signals, starting approximately at 25 kHz or above. Most POTS splitter 
designs are passive, that is without powering requirements. The 
advantages of passive filters are in their reliability, because they enable 
continuous telephone service even if the modem fails (for example, due to 
a power outage). 
The connectivity architecture of DSLAMs is as shown in figure. The 
DSLAMs are connected to the Tier 2 Switches and again, the Tier2 switches 
are connected to Tier1 Switch. In turn the Tier1 Switch is connected to 
"Broadband Remote Access Server"(BBRAS) which is routed to core router 
through which it gets access to the International Gateway. 
The below diagram shows the connectivity portion of DSLAM with the 
Tier2 switch. If the distance between the DSLAM and the Tier2 switch is 
less than 10 Kms, then Dark Fibre could be used for connectivity. (Dark 
fibre means a spare fibre). If the distance exceeds 10 Kms, then we can 
use the STM medium with electrical to optical converters at both the ends, 
as both DSLAM as well as Tier2 switch has optical interface whereas the 
output from STM is electrical. 
38
There are a large number of different kinds of servers that can be 
accessed by an ADSL system Video on Demand service is one of the most 
interesting aspect of ADSL. By using MPEG coded video it is possible to 
deliver video quality movies over existing copper loops to customers. A 
video quality can be achieved by only 1.5 Mbps data rate. Together with 
pure VoD services there might exist combined movie information and 
advertiser services in which commercial and non-commercial information 
that providers and advertisers can deliver their information. 
Full-rate ADSL: 
The downstream uses DMT tones 7 - 255 (echo cancellation) or 32 - 255 (FDM). The upstream 
channel uses tones 7 - 31. Bit loading is adaptive and varies from 2 to 15 bits per tone (sub channel) 
depending on the relative noise of each carrier. When high noise levels are detected in a given sub 
channel, the DMT modem can shut down a particular sub channel altogether. 
ADSL MODEM 
The ADSL transmission signal is modulated onto discrete multi-tones 
(DMT). As already seen, there are 256 independent parallel sub channels 
available in the 1.1MHz ADSL bandwidth. Each sub channel is separated by 
approximately 4 kHz and has a distinct carrier frequency in the center of 
this 4 kHz band. While DMT is the physical transmission level, framing and 
encoding (error correction) occurs at a higher level. The modulation 
technique used in each of the discrete multi-tone (DMT) channels is 
Quadrature Amplitude Modulation (QAM) where both the phase angle and 
the amplitude of the carrier band are modulated to represent the 
information being transmitted. 
In a typical ADSL modem, the main sections are 
1. The Digital Interface (e.g. ATM) 
2. The Framer/FEC plus Encoder/Decoder 
3. The DMT Modulator 
4. The AFE (Analog Front End) 
The Framer multiplexes serial data into frames, generates FEC 
(Forward Error Correction), and interleaves data. FEC and data interleaving 
corrects for burst errors. This allows DMT-based ADSL technology to be 
suitable for support of MPEG-2 and other digital video compression 
techniques 
For the transmit signal 
The Encoder encodes frames to produce the constellation data for the DMT Modulator. It assigns 
the maximum number of bits per tone (based on measured SNR of each carrier) and generates a 
QAM constellation where each point represents a digital value. Each constellation point is one of N 
39
complex numbers, x + iy, where x and y are the phase and amplitude components. The summation 
of bits in all carriers, multiplied by the frame rate (4 kHz), represents the data rate 
For the receive signal 
The Decoder converts QAM symbols back into the data bit stream. 
In the DMT Modulator, a frequency domain processor implements FFT/IFFT and associated 
processing. In the transmit path, the Inverse Fast Fourier Transform (IFFT) module accepts input as 
a vector of N QAM constellation points and duplicates each carrier with its conjugate counterpart 
so the 2N output samples are real. The 2N time domain samples have the last 2N/16 samples 
appended as a cyclic prefix, and are then delivered to the DAC (Digital to Analog converter). The set 
of time domain samples represents a summation of all the modulated sub channels, for the 
duration of one data frame 
NGN BASIC CONCEPTS 
Definition & Features of NGN 
40
BSNL's Plan 
1. Tender for 200 KC IP TAX equipment, which is Pilot Project for introduction of NGN 
in transit network, has been awarded 
2. Plan to introduce 6.4 million circuits capacity in 2007-2008 through IP TAX 
3. Strengthen SSTP Networks 
4. Trials for migration of PSTN access to NGN and for introduction of NGN in access 
network underway 
5. Migration to IMS expected to roll out from 2009 
6. Full migration to NGN with replacement of PSTN by 2012 
7. IP Multimedia Subsystems 
WiMAX-Access to NGN 
41
8. 
WHAT IS NGN? 
9. NGN is a network infrastructure that will enable the provisioning of 
the existing telecommunications services and innovative applications 
of the next generation. It is a converged network capable of carrying 
voice, data and video over the same physical network, with all traffic 
carried as IP (Internet Protocol).NGN is a multi-service network, 
which enables operators to implement converged and new services in 
addition to POTS. From the users’ perspective, the convergence of 
services will enable the “desired” services from any type of access 
network. 
10. NGN i.e. the Next Generation Network refers to the convergence of 
different telecom services i.e. voice, data and video over a unified 
packet network utilizing Internet Protocol (IP). NGN can be thought 
of as a packet-based network where the packet switching and 
transport elements (e.g. routers, switches and gateways) are 
logically and physically separated from the service/ call control 
intelligence. This control intelligence is used to support all types of 
services over the packet-based transport network including 
everything from the basic voice telephony services to data, video, 
multimedia, advanced broadband 
ARCHITECTURE OF NGN 
The architecture of Next Generation Network is shown below. 
42
It is a horizontally layered network architecture instead of the 
present vertically separated networks for each service. It uses packet-based 
transport for all services (including voice).The access, switching, 
transport, control and service functions which are integrated in today’s 
switches are separated into individual network layers, which inter-work via 
interfaces based on open standards. The most significant aspect is the separation of call control 
from switching and transport functions 
NGN APPLICATIONS – THE KEY TO 
COMPETITIVE DIFFERENTIATION 
1. Voice Telephony 
NGNs will likely need to support various existing voice 
telephony services (e.g., Call Waiting, Call Forwarding, 3-Way 
Calling, various AIN features, various Centrex features, and various 
CLASS features).Note, however, that NGNs are not trying to duplicate 
each and every traditional voice telephony service currently offered. 
Rather, they will likely attempt to support only a small percentage of 
these traditional services, with an initial focus on the most 
marketable voice telephony features and the features required from a 
regulatory perspective. 
2. Data (Connectivity) Services 
Allows for the real-time establishment of connectivity between 
endpoints, along with various value-added features (e.g., bandwidth-on- 
demand, connection reliability/resilient Switched Virtual 
Connections [SVCs], and bandwidth management/call admission 
control). 
1. Multimedia Services 
43
Allows multiple parties to interact using voice, video, and/or 
data. This allows customers to converse with each other while 
displaying visual information. 
2. Virtual Private Networks (VPNs) 
Voice VPNs improve the inter location networking capabilities of 
businesses by allowing large, geographically dispersed organizations 
to combine their existing private networks with portions of the PSTN, 
thus providing subscribers with uniform dialing capabilities. Data 
VPNs provide added security and networking features that allow 
customers to use a shared IP network as a VPN. 
1. Unified Messaging 
Supports the delivery of voice mail, email, fax, and pages 
through common interfaces. Through such interfaces, users will 
access, as well as be notified of, various message types (voice mail, 
email, fax, etc.), independent of the means of access (i.e., wire line 
or mobile phone, computer, or wireless data device). 
1. Call Center Services 
A subscriber could place a call to a call center agent by clicking 
on a Web page. The call could be routed to an appropriate agent, 
who could be located anywhere, even at home (i.e., virtual call 
centers).Voice calls and e-mail messages could be queued uniformly 
for the agents. Agents would have electronic access to customer, 
catalog, stock, and ordering information, which could be transmitted 
back and forth between the customer and the agent. 
1. Interactive gaming 
Offers consumers a way to meet online and establish interactive 
gaming sessions (e.g., video games). 
2. Home Manager 
With the advent of in-home networking and intelligent 
appliances, these services could monitor and control home security 
systems, energy systems, home entertainment systems, and other 
home appliances 
IP Multimedia subsystem (IMS) 
IMS (IP Multimedia Subsystem) enables and drives efficient converged service offerings. It is the key 
to delivering multimedia services with telecom-grade quality of service across fixed and mobile 
44
accesses. It creates new opportunities for operators who want to deliver attractive, easy-to-use, 
reliable and profitable multimedia services – including voice, pictures, text and video, or any 
combination of these –with existing services. Users benefit by being able to enjoy attractive 
converged multiple services regardless of access network and device. eService success is very much 
dependent on the ability of operators to create and deliver an experience that fulfills or exceeds 
users’ expectations. IMS is designed precisely for that purpose. IMS is access-independent: it is the 
only open standardized way to deliver IP-based consumer and enterprise services, enabled by one 
common core and control, to the fixed, mobile and cable communities. 
It combines the quality and interoperability of telecoms with the quick and innovative development 
of the Internet. IMS does this by making the unique values of the telecom industry easily available 
to the application development community. When implemented according to agreed standards, 
IMS enables operators to mix and match equipment and applications from multiple vendors, and 
enables mobile users to access their personal set of services wherever they roam, whichever 
operator network they are connected to. IMS includes the tools and functions needed to handle 
numerous non-standardized services in a standardized way – ensuring the interoperability, access 
awareness, policy support, charging, security and quality of service functionality required to meet 
consumer demand for attractive and convenient offerings. 
IMS offers a standardized way to deliver convenient IP-based consumer and enterprise services to 
fixed, mobile and cable community – enabled by one common core and control. It is the 
cornerstone of the evolution of current networks to a single, all-IP based network where all types of 
services (messaging, telephony, etc.) and media (voice, video, pictures, text etc.) can be integrated 
into a single user experience. For consumer, IMS opens communication options that seamlessly 
combine ongoing voice sessions with multimedia elements (sharing video while talking, for 
example) or enrich shared applications with voice communication (for instance, talking while 
playing a multiplayer game). 
WIRELESS TECHNOLOGY 
Wireless broadband technology sends data over a 'wireless' 
communications network, typically using radio frequency. 
These technologies are a strong and popular platform for delivery of 
high-speed Internet services and wireless broadband, is emerging as a 
legitimate local access platform for the delivery of high-quality digital data, 
video and voice services. 
In many regional areas where telecommunications infrastructure 
such as fibre optic or coaxial cable is limited, wireless technologies offer a 
competitive broadband access solution. Rather than stringing thousands of 
miles of fiber, coax or twisted-pair wiring, a wireless operator installs a 
headed and transmission tower and is open for business. 
Wireless technologies can provide area coverage from anywhere 
between 5km to 40km depending on the local terrain and strength of the 
transmitter signal. 
45
The advantages of wireless broadband: 
1. Access - a wireless network provides high-speed access to the Internet without the 
need for expensive wire or cable infrastructure. 
2. Flexibility - the capacity (number of customers) of a wireless network can be 
expanded when required. 
3. Versatility - wireless services are suitable for both lightly populated areas, but can 
also be deployed to provide customized services in highly populated areas. 
4. Costs - without the need for expensive equipment and/or infrastructure, the cost of 
wireless broadband products can be lower than wired products. 
Wi-Fi 
Short for wireless fidelity, Wi-Fi technologies include the approved IEEE 802.11a, b and g 
specifications, as well as the yet-to-be-ratified 802.11n specification. Wi-Fi is the first high-speed 
wireless technology to enjoy broad deployment, most notably in hotspots around the world 
including homes and offices, and increasingly cafes, hotels, and airports. 
Wi-Fi hotspots became popular almost immediately and have been applauded by road warriors for 
their ability to improve productivity. Wi-Fi is limited, however, by its range: high-speed connectivity 
is possible only as long as a user remains within range of the wireless access point, which is 
optimum within 300 feet. 
Wi-Fi was one of the earliest high-speed wireless data technologies and now benefits from a broad 
availability of supporting products and technologies. Some of the newest platforms even support 
multiple Wi-Fi standards (e.g. 802.11a, b and/or g) for compatibility among several wireless 
networks. 
WiMAX 
WiMAX is an emerging technology that will deliver last mile broadband connectivity in a larger 
geographic area than Wi-Fi, enabling T1 type service to business customers and cable/DSL-equivalent 
access to residential users. Providing canopies of coverage anywhere from one to six 
miles wide (depending on multiple variables), WiMAX will enable greater mobility for high-speed 
data applications. With such range and high throughput, WiMAX is capable of delivering backhaul 
for carrier infrastructure, enterprise campuses and Wi-Fi hotspots. 
WiMAX will be deployed in three phases. Phase one will see WiMAX technology using the IEEE 
802.16d specification deployed via outdoor antennas that target known subscribers in a fixed 
location. Phase two will roll out indoor antennas, broadening the appeal of WiMAX technology to 
carriers seeking simplified installation at user sites. Phase three will launch the IEEE 802.16e 
specification, in which WiMAX-Certified* hardware will be available in portable solutions for users 
who want to roam within a service area, enabling more persistent connectivity akin to Wi-Fi 
capabilities today. 
CABLE MODEM BASICS 
46
Current Internet access via a 28.8–, 33.6–, or 56–kbps modem is 
referred to as voice band modem technology. Like voiceband modems, 
cable modems modulate and demodulate data signals. However, cable 
modems incorporate more functionality suitable for today's high-speed 
Internet services. 
Cable modem is capable of delivering up to 30 to 40 Mbps of data 
this is approximately 500 times faster than a 56–kbps modem 
In the conventional case the TV set receives the signal directly from 
the cable operator through Co-axial cable as shown in the figure1. When 
internet data combined with the TV signal is received a splitter is required 
to separate the signals(figure 2). 
FIGURE 1 
FIGURE 
CABLE MODEM BASICS 
FIGURE 1 
FIGURE 2 
The separated data is taken through co-axial cable to the cable-modem 
which in turn is connected to the PC through Ethernet/USB port 
A subscriber can continue to receive cable television service while 
simultaneously receiving data on cable modems to be delivered to a 
personal computer (PC) with the help of a simple one-to-two splitter 
A device called a cable modem termination system (CMTS), located 
at the local cable operator's network hub, controls access to cable modems 
on the network. It is for support of data services that integrates upstream 
and downstream communication over a cable data network. The number of 
47
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh
Bsnl avaneesh

More Related Content

What's hot

BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
Subhash Chandra Tank
 
Bsnl (1)
Bsnl (1)Bsnl (1)
Bsnl (1)
Suraj Soni
 
Industrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNLIndustrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNL
Anshul Joshi
 
Bsnl inplant-training-report srm
Bsnl inplant-training-report srm Bsnl inplant-training-report srm
Bsnl inplant-training-report srm
Aswinkumar R
 
Bsnl
BsnlBsnl
BSNL Training Project
BSNL Training ProjectBSNL Training Project
BSNL Training Project
Dushmanta Nath
 
DESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORTDESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORT
Deshbandhu Kumar
 
Bsnl
BsnlBsnl
BSNL Industrial Training
BSNL Industrial Training BSNL Industrial Training
BSNL Industrial Training
Moulik .
 
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRABSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
Kanav Mansotra
 
Introduction to bsnl
Introduction to bsnlIntroduction to bsnl
Introduction to bsnl
Ankit Kumar
 
Bsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.pptBsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.ppt
Aswinkumar R
 
BSNL training report
BSNL training reportBSNL training report
BSNL training report
ravi kant
 
bsnl broadband documentation
bsnl broadband documentationbsnl broadband documentation
bsnl broadband documentationsatish 486
 
BSNL training report
BSNL training reportBSNL training report
BSNL training report
Shubham Singh
 
Training report on bsnl
Training report on bsnl Training report on bsnl
Training report on bsnl
Suraj Singh Solanki
 
Bsnl training report
Bsnl training reportBsnl training report
Bsnl training report
Shubham Singh
 
BSNL
BSNLBSNL
BSNL SUMMER TRAINING PRESENTATION
BSNL SUMMER TRAINING PRESENTATIONBSNL SUMMER TRAINING PRESENTATION
BSNL SUMMER TRAINING PRESENTATION
Deshbandhu Kumar
 

What's hot (20)

BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
 
Bsnl (1)
Bsnl (1)Bsnl (1)
Bsnl (1)
 
Industrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNLIndustrial training report on GSM Techology at BSNL
Industrial training report on GSM Techology at BSNL
 
Bsnl inplant-training-report srm
Bsnl inplant-training-report srm Bsnl inplant-training-report srm
Bsnl inplant-training-report srm
 
Bsnl
BsnlBsnl
Bsnl
 
BSNL Training Project
BSNL Training ProjectBSNL Training Project
BSNL Training Project
 
DESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORTDESHBANDHU BSNL SUMMER TRAINING REPORT
DESHBANDHU BSNL SUMMER TRAINING REPORT
 
Bsnl
BsnlBsnl
Bsnl
 
BSNL Industrial Training
BSNL Industrial Training BSNL Industrial Training
BSNL Industrial Training
 
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRABSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
BSNL SUMMER TRAINING REPORT BY KANAV MANSOTRA
 
Introduction to bsnl
Introduction to bsnlIntroduction to bsnl
Introduction to bsnl
 
Bsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.pptBsnl ppt-by aswin.ppt
Bsnl ppt-by aswin.ppt
 
BSNL training report
BSNL training reportBSNL training report
BSNL training report
 
bsnl broadband documentation
bsnl broadband documentationbsnl broadband documentation
bsnl broadband documentation
 
BSNL training report
BSNL training reportBSNL training report
BSNL training report
 
Alttc report
Alttc report Alttc report
Alttc report
 
Training report on bsnl
Training report on bsnl Training report on bsnl
Training report on bsnl
 
Bsnl training report
Bsnl training reportBsnl training report
Bsnl training report
 
BSNL
BSNLBSNL
BSNL
 
BSNL SUMMER TRAINING PRESENTATION
BSNL SUMMER TRAINING PRESENTATIONBSNL SUMMER TRAINING PRESENTATION
BSNL SUMMER TRAINING PRESENTATION
 

Similar to Bsnl avaneesh

Industrial Training Record BSNL Kodad
Industrial Training Record BSNL KodadIndustrial Training Record BSNL Kodad
Industrial Training Record BSNL Kodad
Gopi Krishna
 
BSNL Supply Chain Mgt PPT
BSNL Supply Chain Mgt PPTBSNL Supply Chain Mgt PPT
BSNL Supply Chain Mgt PPTShreyash Gupta
 
Performance appriasal (mustaquim)
Performance appriasal (mustaquim)Performance appriasal (mustaquim)
Performance appriasal (mustaquim)
Sonu MustQm
 
Performance appraisal (mustaquim)
Performance appraisal (mustaquim)Performance appraisal (mustaquim)
Performance appraisal (mustaquim)Sonu MustQm
 
Customer satisfaction of bsnl
Customer satisfaction of bsnlCustomer satisfaction of bsnl
Customer satisfaction of bsnlpiyushtiwari169
 
BSNL Training Report file
BSNL Training Report fileBSNL Training Report file
BSNL Training Report file
Ojas Maheshwari
 
Summer Internship Project (SIP)
Summer Internship Project (SIP)Summer Internship Project (SIP)
Summer Internship Project (SIP)
Abhishek Roy Choudhury
 
47082503 summer-project-reliance-communication
47082503 summer-project-reliance-communication47082503 summer-project-reliance-communication
47082503 summer-project-reliance-communicationSoumya Sahoo
 
bsnl by vidu
 bsnl by vidu bsnl by vidu
bsnl by vidu
mostreturnvidu
 
Bsnl report
 Bsnl report Bsnl report
Bsnl report
rajuatgnes
 
Research methodology. Research Study of Indian telecom Industry
Research methodology. Research Study of Indian telecom IndustryResearch methodology. Research Study of Indian telecom Industry
Research methodology. Research Study of Indian telecom Industry
Debjit Das
 
An Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in IndiaAn Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in India
k33a
 
Presentation on ntc(edited anuj)
Presentation on ntc(edited anuj)Presentation on ntc(edited anuj)
Presentation on ntc(edited anuj)
Anuj STha
 
Strategy Analysis on BSNL
Strategy Analysis on BSNLStrategy Analysis on BSNL
Strategy Analysis on BSNL
Sharath Murali
 
Mobilink strategic management report
Mobilink strategic management reportMobilink strategic management report
Mobilink strategic management report
Noorulain Adnan
 
Reliance Communication sip report
Reliance Communication sip reportReliance Communication sip report
Reliance Communication sip report
Vicky Sharma
 
BSNL
BSNLBSNL
RESEARCH REPORT
RESEARCH REPORT RESEARCH REPORT
RESEARCH REPORT
Mansi Tyagi
 
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Neeraj Bhandari
 

Similar to Bsnl avaneesh (20)

Industrial Training Record BSNL Kodad
Industrial Training Record BSNL KodadIndustrial Training Record BSNL Kodad
Industrial Training Record BSNL Kodad
 
BSNL Supply Chain Mgt PPT
BSNL Supply Chain Mgt PPTBSNL Supply Chain Mgt PPT
BSNL Supply Chain Mgt PPT
 
Performance appriasal (mustaquim)
Performance appriasal (mustaquim)Performance appriasal (mustaquim)
Performance appriasal (mustaquim)
 
Performance appraisal (mustaquim)
Performance appraisal (mustaquim)Performance appraisal (mustaquim)
Performance appraisal (mustaquim)
 
Customer satisfaction of bsnl
Customer satisfaction of bsnlCustomer satisfaction of bsnl
Customer satisfaction of bsnl
 
BSNL Training Report file
BSNL Training Report fileBSNL Training Report file
BSNL Training Report file
 
Summer Internship Project (SIP)
Summer Internship Project (SIP)Summer Internship Project (SIP)
Summer Internship Project (SIP)
 
47082503 summer-project-reliance-communication
47082503 summer-project-reliance-communication47082503 summer-project-reliance-communication
47082503 summer-project-reliance-communication
 
bsnl by vidu
 bsnl by vidu bsnl by vidu
bsnl by vidu
 
Vduvin
VduvinVduvin
Vduvin
 
Bsnl report
 Bsnl report Bsnl report
Bsnl report
 
Research methodology. Research Study of Indian telecom Industry
Research methodology. Research Study of Indian telecom IndustryResearch methodology. Research Study of Indian telecom Industry
Research methodology. Research Study of Indian telecom Industry
 
An Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in IndiaAn Overview of Consumer Privacy Regulations for TSPs in India
An Overview of Consumer Privacy Regulations for TSPs in India
 
Presentation on ntc(edited anuj)
Presentation on ntc(edited anuj)Presentation on ntc(edited anuj)
Presentation on ntc(edited anuj)
 
Strategy Analysis on BSNL
Strategy Analysis on BSNLStrategy Analysis on BSNL
Strategy Analysis on BSNL
 
Mobilink strategic management report
Mobilink strategic management reportMobilink strategic management report
Mobilink strategic management report
 
Reliance Communication sip report
Reliance Communication sip reportReliance Communication sip report
Reliance Communication sip report
 
BSNL
BSNLBSNL
BSNL
 
RESEARCH REPORT
RESEARCH REPORT RESEARCH REPORT
RESEARCH REPORT
 
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
Report on Nepal Telecom by Neeraj Bhandari (Surkhet, Nepal)
 

Recently uploaded

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Bsnl avaneesh

  • 1. A SUMMER TRAINING REPORT ON BSNL EXCHANGE, FAIZABAD (U.P) BY AVANEESH KUMAR RAI (University Roll No. 1102931035) A report submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Electronics & Communication Engineering Submitted to: Dr. Padma Batra Industrial Training Head Department of Electronics & Communication Engineering Krishna Institute of Engineering & Technology, Ghaziabad 2014-2015 1
  • 2. ACKNOWLEDGEMENT It is with profound gratitude that I express my deep indebtedness to all the employees of B.S.N.L. without their support and guidance it would not have been possible for this training to have materialized and taken a concrete shape. I owe my personal thanks to my trainers in charge – Mr. N. N. Srivastav (SDE), and Mr. Vinod Yadav (JTO) who extended full support and co-operation at every stage of my training period. I would also like to take this opportunity to acknowledge the guidance from Dr. Sanjay Sharma (HOD of Electronics and Communication) and Dr. Padma Batra (Industrial Training Head of Electronics and Communication) for undergoing training at a reputed company like B.S.N.L. I am also indebted to my parents and friends for their constant encouragement and helping me in my endeavor. Last, but not the least, I would like to thank everyone who has contributed for the successful completion of my training. AVANEESH KUMAR RAI 1102931035 (B.TECH VII SEMESTER - ECE) 2
  • 3. PREFACE Organizations are made up of people and function through people. Without people, organizations cannot exist. The resources of men, money, material, machinery, and mechanism are connected, coordinated and utilized through people. Engineers need to concentrate more on mechanism and the way in which things have been made. The need of training arises for doing things yourself, understanding its way. Practical exposure for doing things makes a person conversant to the technicalities involved in any job. In view of such benefits, imparting of vocational training has been made an integral part of any academic structure. In B.S.N.L., training is given to Engineering Aspirants to secure future in the dynamic world of telecommunications. Today telecommunication industry is one of the very fastest growing industries in the world. In this order I have taken 28 days BSNL training. In my report I try to introduce C-DOT MAXWELL, WLL, POWER PLANT, BROAD-BAND, Leased line concepts, WIMAX, Wi-Fi, optical fiber concepts and overview of Intranet. 3
  • 4. Bharat Sanchar Nigam Ltd. was incorporated on 15th September 2000. It took over the business of providing of telecom services and network management from the erstwhile Central Government Departments of Telecom Services (DTS) and Telecom Operations (DTO), with effect from 1st October 2000 on going concern basis. It is one of the largest & leading public sector units providing comprehensive range of telecom services in India. BSNL has installed Quality Telecom Network in the country & now focusing on improving it, expanding the network, introducing new telecom services with ICT applications in villages & winning customer's confidence. Today, it has about 43.74 million line basic telephone capacity, 8.83 million WLL capacity, 72.60 million GSM capacity, 37,885 fixed exchanges, 68,162 GSM BTSs, 12,071 CDMA Towers, 197 Satellite Stations, 6,86,644 RKm. of OFC, 50,430 RKm. of microwave network connecting 623 districts, 7330 cities/towns & 5.8 lakhs villages . BSNL is the only service provider, making focused efforts & planned initiatives to bridge the rural-urban digital divide in ICT sector. In fact there is no telecom operator in the country to beat its reach with its wide network giving services in every nook & corner of the country & operates across India except New Delhi & Mumbai. Whether it is inaccessible areas of Siachen glacier or North- Eastern regions of the country, BSNL serves its customers with a wide bouquet of telecom services namely Wireline, CDMA mobile, GSM mobile, Internet, Broadband, Carrier service, MPLS-VPN, VSAT, VoIP, IN Services, FTTH, etc. BSNL is number one of India in all services in its license area. The company offers wide ranging & most transparent tariff schemes designed to suit every customer. BSNL has 90.09 million cellular & 5.06 million WLL customers as on 31.07.2011. 3G Facility has been given to all 2G connections of BSNL. In basic services, BSNL is miles ahead of its rivals, with 24.58 million wireline phone subscribers i.e. 71.93% share of the wireline subscriber base. 4 About BSNL
  • 5. BSNL has set up a world class multi-gigabit, multi-protocol convergent IP infrastructure that provides convergent services like voice, data & video through the same Backbone & Broadband Access Network. At present there are 8.09 million broadband customers. The company has vast experience in planning, installation, network integration & maintenance of switching & transmission networks & also has a world class ISO 9000 certified Telecom Training Institute. During the 2010-11, turnover of BSNL is around Rs. 29,700 Crores. VISSION: · Be the leading telecom service provider in India with global presence. · Create a customer focused organization with excellence in customer care, sales and marketing. · Leverage technology to provide affordable and innovative telecom. Services/products across customer segments. MISSION: Be the leading telecom service provider in India with global presence. · Generating value for all stakeholders - employees, shareholders, vendors & business associates · Maximizing return on existing assets with sustained focus on profitability · Becoming the most trusted, preferred and admired telecom brand · To explore International markets for Global presence Creating a customer focused organization with excellence in customer care, sales& marketing. · Developing a marketing and sales culture that is responsive to customer needs mere care, sales& marketing · Excellence in customer service-”friendly, reliable, time bound, convenient and courteous service” Leveraging technology to provide affordable and innovative products/ services across customer segments · Offering differentiated products/services tailored to different service segments · Providing reliable telecom services that are value for money Providing a conducive work environment with strong focus on performance · Attracting talent and keeping them motivated · Enhancing employees skills and utilizing them effectively · Encouraging and rewarding individual and team/group performance Establishing efficient business processes enabled by IT · Changing policies and processes to enable transparent, quick and efficient decision making · Building effective IT systems and tools 5
  • 6. OBJECTIVES: · To be the Leading Telecom Services provider by achieving higher rate of growth so as to become a profitable enterprise. · To provide quality and reliable fixed telecom service to our customer and thereby increase customers confidence. · To provide customer friendly mobile telephone service of high quality and play a leading role as GSM operator in its area of operation. Strategy for: · Rightsizing the manpower · Providing greater customer satisfaction>/li> Contribute towards: · Broadband customers base of 20 MN in India by the end of 2011-12 as per broadband policy 2004. · Providing telephone connections in villages as per Government policy. To leverage the existing infrastructure of BSNL for facilitating implementation of other government programmes and initiatives particularly in the rural areas. 6
  • 7. INDEX 1. BROADBAND 1. Introduction.............................................................9 2. Definition.................................................................9 2. GSM.......................................................................................10 3. Antenna 1. What is antenna.................................................................11 2. Types..................................................................................11 3. CELLULAR CONCEPTS.............................................................13 4. GSM ARHITECTURE................................................................14 5. Radio link ..............................................................................16 6. MOBILITY MANAGEMENT.....................................................17 7. CALL MANAGEMENT............................................................20 8. HISTORY OF WIRELESS COMMUNICATION ..........................21 9. CDMA....................................................................................24 i) WCDMA………………………………………………………………………………….25 ii) 3G MOBILE.................................................................................26 iii) IMS............................................................................................26 iv) WIRELESS LAN AND BLUETOOTH...................................................................................27 V) BEYOND 3G INTRODUCTION.....................................................33 7
  • 8. 10. GPRS i).INTRODUCTION..........................................................................34 11. DSL...........................................................................................35 12. ADSL.........................................................................................36 13. NGN.........................................................................................40 14. WIRELESS TECNOLOGY...................................................................................44 i) WIFI............................................................................................45 ii) WIMAX.......................................................................................45 15. CABLE MODEM BASICS............................................................................................46 1. PPPOE............................................................................47 16. INTRODUCTION TO MULTIPLAY....................................................................................49 17. FTTH.........................................................................................52 18. SMPS........................................................................................53 19. SDH..........................................................................................56 20. PROJECT on CDOT..............................................................................................61 8
  • 9. BROADBAND INTRODUCTION In 1960s people started thinking of potential value in allowing computers to share information on research and development in scientific and military fields. Internet was the result. Leaving what happened in between, the next milestone was in 1965 when Lawrence Roberts connected a computer at Massachusetts with a computer at California over dial-up telephone lines. The feasibility of wide area networking was proved. The Internet matured in the 70's as a result of the TCP/IP architecture replacing the earlier Network Control Protocol (NCP) and universally adopted by 1983. The National Science Foundation funded NSF Net as a cross-country 56 Kbps backbone for the Internet in 1986. As the commands for e-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. So people were able to make good use of the nets - to communicate with people around the world and to share files and resources. An arc hiver for ftp sites was created in 1989. The commands to search Archie were UNIX commands, and it required some knowledge of UNIX to use it to its full capability. Followed were 1. Wide Area Information Server (WAIS), which would index the full text of files in a database and allow searches of the files 2. Gopher, which needed no knowledge of UNIX or computer architecture to use. 3. VERONICA searchable index of Gopher menus Definition of Broadband The definition of broadband has changed over time to time. In the 1980s and early 1990s, broadband referred to rates greater than 45 megabits per second (Mbps), and "wideband" referred to rates between 1.5 and 45 Mbps. In 1995, broadband commonly referred to anything 1.5 Mbps and higher. In 2000, it was defined as a service that is at least 200 kbps in each direction. (Reference: BROADBAND BRINGING HOME THE BITS - NATIONAL ACADEMY PRESS, Washington, D.C.)In India, TRAI defines Broadband as: “An ‘always-on’ data connection that is able to support interactive services including Internet access and has the capability of the minimum download speed of 256 kilobits per second (kbps) to an individual subscriber from the Point Of Presence (POP) of the service provider intending to provide Broadband service where multiple such individual Broadband connections are aggregated and the subscriber is able to access these interactive services including the Internet through this POP. The interactive services will exclude any services for which a separate license is specifically required, for example, real-time voice transmission, except to the extent that it is presently permitted under ISP license with Internet Telephony.” 9
  • 10. Applications A question to be necessarily considered is whether "broadband" refers exclusively to Internet service or is a more inclusive term that refers to a set of data communications services. Whether broadband is used to bring the Internet to the home or small business at much higher speed and with characteristics such as always-on, or is it really about delivering to the home a bundle of digital services. Definitely, it is going to offer many services such as Video on demand, live telecast or Interactive games in addition to a fast web browsing service. What is GSM? The Global System for Mobile communications (GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. GSM service is used by over 2 billion people across more than 212 countries and territories. Its ubiquity makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs significantly from its predecessors in that both signaling and speech channels are digital call quality, and so is considered a second generation (2G) mobile phone system. This has also meant that data communication was built into the system from the 3rd Generation Partnership Project (3GPP). The main differentiator to previous mobile telephone systems, retrospectively dubbed 1G, is that the radio signals that 1G networks use are analog, while 2G networks are digital. Note that both systems use digital signaling to connect the radio towers (which listen to the handsets) to the rest of the telephone system. History of GSM GSM standard is a European standard which has addressed many problems directly related to compatibility, especially with the development of digital radio technology. From 1982 to 1985 discussions were held to decide between building an analog or digital system. After multiple field tests, a digital system was adopted for GSM. The next task was to decide between a narrow or broadband solution. In May 1987, the narrowband time division multiple access (TDMA) solution was chosen. Although standardized in Europe, GSM is not only a European standard. GSM networks are operational or planned in Europe, the Middle East, the Far East, Africa, North and South America, and Australia. The acronym GSM now aptly stands for Global System for Mobile communications 10
  • 11. WHAT IS ANTENNA? Antennas transform wire-propagated waves into space-propagated waves. They receive electromagnetic waves and pass them onto a receiver or they transmit electromagnetic waves, which have been produced by a transmitter. All the features of passive antennas can be applied for reception and transmission alike (reciprocally). On one side RF cable is connected and the other side it is the environment, therefore the surroundings of the antenna have a strong influence on the antenna's electrical features. Principle of an antenna A) A transmitter sends a high frequency wave into a co-axial cable. A pulsing electrical field is created between the wires, which cannot free itself from the cable b) the end of the cable is bent open. The field lines become longer and are orthogonal to the wires. c) The cable is bent open at right angles. The field lines have now reached a length, which allows the wave to free itself from the cable. The apparatus radiates an electromagnetic wave, whereby the length of the two bent pieces of wire corresponds to half of the wavelength. This is the basic principle of l/2-dipole antenna. Polarization can be defined as the direction of oscillation of the electrical field vector and has been discussed earlier. For Mobile communications generally vertical polarization is used. For Broadcast systems horizontal polarization is used. Omni directional Antennas: The classical Omni directional lambda/2 antennas are of two types 1. Ground Plane 2. l/4-skirt Antenna The names indicate how the antenna is decoupled from the mast. In both cases the horizontal radiation pattern covers 360 ° and vertical half power beam width is 78 °.Hence there will be lot of waste of energy both upwards and downwards in the desired horizontal plane. Ground Plane Omni Directional Antenna In this case, a conductive plane is achieved via 3 counterweighted poles. The ground plane antenna can cover the complete frequency range because it is a wideband antenna. 11
  • 12. Directional Antennas Directional antennas are provided with reflectors behind the radiating element. This focuses the energy in a desired direction avoiding transmission in the rear side of the antenna. The directional antennas are classified into the following types: 1. Grid Parabolic Reflector antennas 2. Parabolic Reflector antennas. 3. Cassegrain antennas. 4. Array antennas. Directional Antennas 12
  • 13. The first two types of antennas are mainly used in fixed point-to-point radio links and the grid types are employed up to 2GHz whereas the solid parabolic reflector antennas are used for higher frequencies. The connectivity between the antennas to the equipment’s is by coaxial cable up to 2GHz and for higher frequencies it is by hollow copper tube called wave-guide. The beam width of these antennas depends on the diameter of the antenna and frequency of operation. They produce very narrow beams. Directional Antennas Cassegrain antennas are associated with Satellite communication are comparatively larger which makes them to be fixed on the ground or roof tops and orient themselves towards the satellite by operating gear arrangement either manually or using motors Directional Antennas Array antennas are more predominantly used in broadcasting and mobile communications. There are two types (i) End Fire Arrays, (ii) Panel Antennas End-fire Arrays: Yagi Antennas Yagi antennas are very common due to their simple and cheap method of construction. The gain and bandwidth of Yagi antennas are electrically coupled with one other which is an electrical disadvantage, i.e. one criterion is weighed off the other. The mechanical concept is not suitable for extreme climatic conditions. Disadvantages of Copper Based Access Networks 13
  • 14. Even though there is a vast and extensive copper based access network, there are several disadvantages 1. Copper is costly and its resources are diminishing. 2. Installation of copper network is time consuming and costly affair Advantages of wireless 1. Provisioning of connectivity is faster. 2. Since there is no physical medium, fault liability is reduced. 3. Mobility is inherent. 4. Reconfiguration is simple. 5. Cost of installation is independent of distance. 6. Connections can be at longer distances than copper based network. Cellular Concepts - Introduction Even though multiple access techniques allowed multiple users to share the medium simultaneously, due to constraints in providing resources, an amount of blocking will exist. The amount of blocking is called “Grade Of Services” (GOS). GOS is a measure of the probability that a percentage of the offered traffic will be blocked or delayed. It is commonly expressed as the fraction of calls or demands that fail to receive immediate service. The aim is to achieve the GOS equal to 0 Based on GOS and resource availability (no. of carriers/no. of timeslots/both) the traffic handling capacity of the system is calculated. If this total traffic is divided by traffic per subscriber, we get number of subscribers supported by the system. For these purposes Erlangen B table (Blocking calls cleared) is useful. Cellular Concepts - What is a cell? Cell is the basic geographic unit. They are base stations transmitting over that small area. Cells are usually represented on paper as hexagon. In reality the shape is not so because of the landscape and man-made structures. The base stations can be employing Omni directional or directional antenna. Cell size depends on sub density and demand in that given area. To start with cell can be of maximum size 30Km radius and subsequently can be split into smaller cells. Usually in rural areas the cells are big and in urban will be smaller. GSM Architecture The figure represents a GSM reference model for a PLMN (Public Land Mobile Network). 14
  • 15. The GSM network is divided into four major systems 1. Switching system (SS) 2. Base station system (BSS) 3. Mobile station (MS) 4. Operation and maintenance Centre(OMC) The switching system (SS) also called as Network and Switching System (NSS) is responsible for performing call processing and Subscriber-related functions. The switching system includes the following functional units 1. Mobile Switching Centre 2. Home Location Register 3. Visitor Location Register 4. Equipment Identity Register 5. Authentication Centre 6. GSM Architecture - The Functions Of MSC 1. Call handling that copes with the mobile nature of subscribers considering Location Registration, Authentication of subscribers and equipment, Handover and Prepaid service. Home location register contains 1. The identity of mobile subscriber called IMSI (International Mobile Sub Identity) 2. ISDN directory number of mobile station. 3. Subscription information on services. 4. Service restrictions. 5. Location Information for call routing One HLR per GSM network is recommended and it may be a distributed database. Permanent data in HLR changed by man-machine interface. Temporary data like location information changes 15
  • 16. It refers to the terminal equipment used by the wireless subscriber. It consists of 1. SIM -Subscriber Identity Module 2. Mobile Equipment. SIM is removable and with appropriate SIM, the network can be accessed using various mobile equipment’s. The equipment identity is not linked to the subscriber. The equipment is validated separately with IMEI and EIR. The SIM contains an integrated circuit chip with a microprocessor, random access memory (RAM) and read only memory (ROM). SIM should be valid and authenticate the validity of MS while accessing the network. SIM also stores subscriber related information like IMSI, cell location identity etc. GSM RADIO LINK Introduction BTS and MS are connected through radio link this air interface is called Um. A radio wave is subject to attenuation, reflection, Doppler shift and interference from other transmitter. These effects causes loss of signal strength and distortion which will impact the quality of voice or data. To cope with the harsh conditions, GSM make use of an efficient and protective signal processing. Proper cellular design must ensure that sufficient radio coverage is provided in the area. Special Features of GSM 1. Authentication. 2. Encryption 3. Time Slot Staggering 4. Timing Advance 5. Discontinuous transmission 6. Power Control 7. Adoptive equalization 8. Slow Freq. Hopping 16
  • 17. Authentication Since the air interface is vulnerable to fraudulent access, it is necessary to employ authentication before extending the services to this subscriber. Authentication is built around the following notions. 1. Authentication Key (Ki) resides only in two places, SIM card and Authentication Centre. 2. Authentication Key (Ki) is never transmitted over air. It is virtually impossible for unauthorized individuals to obtain this key to impersonate a given mobile subscriber. Authentication Parameters The MS is authenticated by the VLR with a process that uses three parameters: 1. RAND which is completely random number 2. SRES which is an authentication signed response. It is generated by applying an authentication algorithm (A3) to RAND and Ki 3. Kc which is cipher key. The Kc parameter generated by applying the cipher key generation algorithm (A8) to RAND and Ki. Encryption/Ciphering Data is encrypted at the transmitter side in blocks of 114 bits by taking 114-bit plain text data bursts and performing an EXOR (Exclusive OR) logical function operation with a 114-bit cipher block. The decryption function at the receiver side is performed by taking the encrypted data block of 114 bits and going through the same “exclusive OR “operation using the same 114-bit cipher block that was used at the transmitter. The cipher block used by both ends of transmission path for a given transmission direction is produced at the BSS and MS by an encryption algorithm called A5.The A5 algorithm uses a 64-bit cipher key (Kc), produced during the authentication process during call setup and the 22-bit TDMA frame number (COUNT) which takes decimal values from 0 through 2715647 and has a repetition time 3.48 hours (hyper frame interval).The A5 algorithm actually produce two cipher blocks during each TDMA period. One for the uplink path and the other for the downlink path. Frequency Hopping The mobile station already has to be frequency agile, meaning it can move between a transmit, receive, and monitor time slot within one TDMA frame, which normally are on different frequencies. GSM makes use of this inherent frequency agility to implement slow frequency hopping, where the mobile and BTS transmit each TDMA frame on a different carrier frequency. MOBILITY MANAGEMENT 17
  • 18. Network Attachment Network attachment is a process of selecting an appropriate cell(radio frequency)by the mobile station to provide the available services, and making its location known to the network The process starts when the mobile station is switched on, and ends when the mobile station enters the idle mode. In idle mode the mobile station does not have a traffic channel allocated to make or receive a call, but the Public Land Mobile Network (PLMN) is aware of the existence of the mobile station within the chosen cell. Cell Identification When a mobile station is switched on it attempts to make contact with a GSM PLMN by performing the following action 1. Measures the BCCH channels. 2. Search for a suitable cell. The mobile station measures the signal strength of the BCCH (Broadcast Control Channel) channels received. It stores in a list of information of about 30 of these BCCH channels, such as the signal strength and the frequency corresponding to these BCCH channels. Call to an active Mobile Station As an active Mobile Station (MS) moves around in the coverage area of a Public Land Mobile Network (PLMN), it reports its movements so that it can be located when required using the Locations Update procedure. When a Mobile Services Switching Center(MSC) in the network needs to establish a call to an MS operating in its area the following Happens: Location area To eliminate the need for network-wide paging broadcasts, the PLMN needs to know the approximate positions of the MSs that are active within its coverage area. To enable the approximate positions of any MS to be represented by a single parameter, the total area covered by the network is divided into location areas. A Location area (LA) is a cluster of one or more radio cells. The cell cluster fulfills the following requirements: 1. The BTSs in a location area are controlled by one or more BSCs 2. BSCs that serve the same location area are always connected to the same 18
  • 19. MSC 3. Radio cells with BTSs controlled by a common BSC can lie in different location areas. Location area Identity Every radio transmitter in the PLMN broadcast, via a control channel, a Location Area Identity (LAI) code to identify the location area that it serves. When an MS is not engaged in a call, it automatically scans the BCCH transmitted by the base stations in the locality and selects the channel that is delivering the strongest signal. The LAI code broadcast by the selected channel identifies the location area in which the MS is currently situated. This LAI code is stored in the Subscriber Identity Module (SIM) of the mobile equipment. . Types of Identification Numbers During the performance of the location update procedure and the processing of a mobile call different types of numbers are used: 1. Mobile station ISDN Number(MSISDN) 2. Mobile Subscriber Roaming Number(MSRN) 3. International Mobile Subscriber Identity(IMSI) 4. Temporary Mobile Subscriber Identity(TMSI) 5. Local Mobile Station Identity(LMSI) Each number is stored in the HLR and/or VLR. Mobile Station ISDN Number The MSISDN is the directory number allocated to the mobile subscriber. It is dialed to make a telephone call to the mobile subscriber. The number consists of Country Code(CC) of the country in which the mobile station is registered(for example India 91) followed by national mobile number which consists of Network Destination Code(NDC) and Subscriber Number(SN).A NDC is allocated to each GSM PLMN. The composition of the MSISDN is such that it can be used as a global title address in the Signaling Connection Control Part(SCCP) for routing message to the HLR of the mobile subscriber Mobile Station Roaming Number The MSRN is the number required by the gateway MSC to route an incoming call to a MS that is not currently under the gateway's control Using the MSISDN a mobile terminated call is routed to the gateway MSC. Based on this MSISDN the gateway MSC requests for a MSRN to route the call to the current visited MSC International Mobile Subscriber Identity A MS is identified by its IMSI. The IMSI is embodied in the SIM of the mobile equipment. It is provided by the MS anytime it accesses the network Mobile Country Code (MCC): The MCC component of the IMSI is a 3-digit code that uniquely identifies the country of the domicile of the subscriber. It is assigned by the ITU-T Mobile Network Code (MNC): The MNC component is a 2-digit code that identifies the home GSM PLMN of the mobile subscriber. It is assigned by the government of each country. For 19
  • 20. GSM-1900 a 3-digit MNC is used. Mobile Subscriber Identification Number (MSIN): The MSIN is a code that identifies the subscriber within a GSM PLMN.I t is assigned by the operator. Hand Over The process of automatically switching a call in progress from one traffic channel to another to neutralize the adverse effects of the user movements. Hand over process will be started only if power control is not helpful anymore. The Hand Over process is MAHO(Mobile Assisted Hand Over).It starts with the Down Link Measurements by the MS(Strength of the signal from BTS, Quality of the signal from BTS).MS can measure the Signal Strength of the 6 best neighboring BTS down link(candidate list) CALL MANAGEMENT Mobile To Land Call Scenario (Mobile Origination) Phases of Mobile To Land Call. The following table lists the phases of a Mobile To Land Call 1. Request for services; the MS requests to setup a call 2. Authentication: the MSC/VLR requests the AUC for authentication parameters, using these parameters the MS is authenticated. 3. Ciphering : using the parameters, which were made available earlier during the authentication, the uplink and the downlink are ciphered 4. Equipment Validation :the MSC/VLR requests the EIR to check the IMEI for validity 5. Call setup: the MSC establishes a connection to the MS. 6. Handover(s) 7. Call release; the speech path is released Mobile To Land Call Scenario-Phases of Mobile To Land Call The user enters the digits of the telephone with STD code incase of land line or without STD code incase of mobile and presses the "send" key after all digits have been entered 1. MS transmits a channel request message over the Random Access Channel(RACH) 2. Once the BSS receives the Channel Request message, it allocates a Stand-alone Dedicated Control Channel (SDCCH) and forwards this channel assignment information to the MS over the access Grant Channel (AGCH).It is over the SDCCH that the MS will communicate with the BSS and MSC until a 20
  • 21. traffic channel is assigned. 3. The MS transmits a service request message to the BSS over the SDCCH. Included in this message is the MS TMSI and Location Area Identification (LAI).The BSS forwards the service request message to the MSC/VLR. Mobile To Land Call Scenario-Phases of Mobile To Land Call The IMEI code is secure and physically protected against The Equipment Identity Register (EIR) is responsible for storing the IMEI codes that identify the mobile-equipment deployed in the GSM system. History of Wireless Communication The idea of cell-based mobile radio systems appeared at Bell Laboratories (in USA) in the early 1970s. However, mobile cellular systems were not introduced for commercial use until the 1980s. During the early 1980s, analog cellular telephone systems experienced a very rapid growth in Europe, particularly in Scandinavia and the United Kingdom. Today cellular systems still represent one of the fastest growing telecommunications systems. But in the beginnings of cellular systems, each country developed its own system, which was an undesirable situation for the following reasons: 1. The equipment was limited to operate only within the boundaries of each country. 2. The market for each mobile equipment was limited. In order to overcome these problems, the Conference of European Posts and Telecommunications (CEPT) formed, in 1982, the Group Special Mobile (GSM) in order to develop a pan-European mobile cellular radio system (the GSM acronym became later the acronym for Global System for Mobile communications). The standardized system had to meet certain criteria: Cellular systems The cellular structure In a cellular system, the covering area of an operator is divided into cells. A cell corresponds to the covering area of one transmitter or a small collection of transmitters. The size of a cell is determined by the transmitter's power. The concept of cellular systems is the use of low power transmitters in order to enable the efficient reuse of the frequencies. In fact, if the transmitters used are very powerful, the frequencies cannot be reused for hundreds of kilometers as they are limited to the covering area of the transmitter. The frequency band allocated to a cellular mobile radio system is distributed over a group of cells and this distribution is repeated in all the covering area of an operator. The whole number of radio channels available can then be used in each group of cells that form the covering area of an operator. Frequencies used in a cell will be reused several cells away. The distance between the 21
  • 22. cells using the same frequency must be sufficient to avoid interference. The frequency reuse will increase considerably the capacity in number of users. Compatibility with other systems such as ISDN The decision of adopting a digital technology for GSM was made in the course of developing the standard. During the development of GSM, the telecommunications industry converted to digital methods. The ISDN network is an example of this evolution. In order to make GSM compatible with the services offered by ISDN, it was decide that the digital technology was the best option. Additionally, a digital system allows, easily than an analog one, the implementation of future improvements and the change of its own characteristics. Architecture of the GSM network The GSM technical specifications define the different entities that form the GSM network by defining their functions and interface requirements. The GSM network can be divided into four main parts: The architecture of the GSM network is presented in figure Mobile Station A Mobile Station consists of two main elements: 1. The Terminal There are different types of terminals distinguished principally by their power and application: 1. The `fixed' terminals are the ones installed in cars. Their maximum allowed output power is 20 W. 2. The GSM portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W. 3. The handheld terminals have experienced the biggest success thanks to the weight and volume, which are continuously decreasing. These terminals can emit up to 2 W. The evolution of technologies allows decreasing the maximum allowed power to 0.8 W. 2. The SIM The SIM is a smart card that identifies the terminal. By inserting the SIM card into the terminal, the user can have access to all the subscribed services. Without the SIM card, the terminal is not operational. The SIM card is protected by a four-digit Personal Identification Number (PIN). In order to identify the subscriber to the system, the SIM card contains some parameters of the user such as its International Mobile Subscriber Identity (IMSI). Another advantage of the SIM card is the mobility of the users. In fact, the only element that personalizes a terminal is the SIM card. Therefore, the user can have access to its subscribed services in any terminal using its SIM card. The Base Station Subsystem The BSS connects the Mobile Station and the NSS. It is in charge of the transmission and reception. The BSS can be divided into two parts: The Base Transceiver Station The BTS corresponds to the transceivers and antennas used in each cell of the network. A BTS is usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has between one and sixteen transceivers depending on the density of users in the cell. The Base Station Controller 22
  • 23. The BSC controls a group of BTS and manages their radio resources. A BSC is principally in charge of handovers, frequency hopping, exchange functions and control of the radio frequency power levels of the BTSs. The Network and Switching Subsystem Its main role is to manage the communications between the mobile users and other users, such as mobile users, ISDN users, fixed telephony users, etc. It also includes data bases needed in order to store information about the subscribers and to manage their mobility. The different components of the NSS are described below. The Mobile services Switching Center (MSC) It is the central component of the NSS. The MSC performs the switching functions of the network. It also provides connection to other networks. The Gateway Mobile services Switching Center (GMSC) A gateway is a node interconnecting two networks. The GMSC is the interface between the mobile cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a GSM user. The GMSC is often implemented in the same machines as the MSC. Home Location Register (HLR) The HLR is considered as a very important database that stores information of the subscribers belonging to the covering area of a MSC. It also stores the current location of these subscribers and the services to which they have access. The location of the subscriber corresponds to the SS7 address of the Visitor Location Register (VLR) associated to the terminal Visitor Location Register (VLR) The VLR contains information from a subscriber's HLR necessary in order to provide the subscribed services to visiting users. When a subscriber enters the covering area of a new MSC, the VLR associated to this MSC will request information about the new subscriber to its corresponding HLR. The VLR will then have enough information in order to assure the subscribed services without needing to ask the HLR each time a communication is established. The VLR is always implemented together with a MSC; so the area under control of the MSC is also the area under control of the VLR. The Authentication Center (AuC) The AuC register is used for security purposes. It provides the parameters needed for authentication and encryption functions. These parameters help to verify the user's identity. The Equipment Identity Register (EIR) The EIR is also used for security purposes. It is a register containing information about the mobile equipments. More particularly, it contains a list of all valid terminals. A terminal is identified by its International Mobile Equipment Identity (IMEI). The EIR allows then to forbid calls from stolen or unauthorized terminals (e.g., a terminal which does not respect the specifications concerning the output RF power). The GSM Inter-working Unit (GIWU) 23
  • 24. The GIWU corresponds to an interface to various networks for data communications. During these communications, the transmission of speech and data can be alternated. The GSM functions In this paragraph, the description of the GSM network is focused on the different functions to fulfill by the network and not on its physical components. In GSM, five main functions can be defined: Mobility Management The MM function is in charge of all the aspects related with the mobility of the user, specially the location management and the authentication and security. The GSM radio interface The radio interface is the interface between the mobile stations and the fixed infrastructure. It is one of the most important interfaces of the GSM system. One of the main objectives of GSM is roaming. Therefore, in order to obtain a complete compatibility between mobile stations and networks of different manufacturers and operators, the radio interface must be completely defined. The spectrum efficiency depends on the radio interface and the transmission, more particularly in aspects such as the capacity of the system and the techniques used in order to decrease the interference and to improve the frequency reuse scheme. The specification of the radio interface has then an important influence on the spectrum efficiency. CDMA Introduction Code Division Multiple Access(CDMA) is a access method in which large number of transmissions are combined on the same RF channel at the same time but are separated by unique assigned “codes”. This CDMA Access method is used to provide mobile telephony and works on the cellular principle. Overview of CDMA System Access network, the network between local exchange and subscriber, in the Telecom Network accounts for a major portion of resources both in terms of capital and manpower. So far, the subscriber loop has remained in the domain of the copper cable providing cost effective solution in past. Quick deployment of subscriber loop, coverage of inaccessible and remote locations coupled with modern technology has led to the emergence of new Access Technologies. The various technological options available are as follows: 1. Multi Access Radio Relay 2. Wireless In Local Loop 3. Fiber In the Local Loop 24
  • 25. Wireless in Local Loop (WILL) Fixed Wireless telephony in the subscriber access network also known as Wireless in Local Loop (WLL) is one of the hottest emerging market segments in global telecommunications today. WLL is generally used as “the last mile solution” to deliver basic phone service expeditiously where none has existed before. Flexibility and expediency are becoming the key driving factors behind the deployment of WILL. WLL shall facilitate cordless telephony for residential as well as commercial complexes where people are highly mobile. It is also used in remote areas where it is uneconomical to lay cables and for rapid development of telephone services. The technology employed shall depend upon various radios accesses techniques, like FDMA, TDMA and CDMA. Different technologies have been developed by the different countries like CT2 from France, PHS from Japan, DECT from Europe and DAMPS & CDMA from USA. Let us discuss CDMA technology in WILL application as it has a potential ability to tolerate a fair amount of interference as compared to other conventional radios. This leads to a considerable advantage from a system point of view. Advantages of CDMA System CDMA wireless access provides the following unique advantages: WCDMA Background There has been a tremendous growth in wireless communication technology over the past decade. The significant increase in subscribers and traffic, new bandwidth consuming applications such as gaming, music down loading and video streaming will place new demands on capacity. The answer to the capacity demand is the provision of new spectrum and the development of a new technology – Wideband CDMA or hereinafter referred to as WCDMA. WCDMA was developed in order to create a global standard for real time multimedia services that ensured international roaming. With the support of ITU (International Telecommunication Union) a specific spectrum was allocated – 2GHz for 3G telecom systems. The work was later taken over by the 3GPP (3rd Generation Partnership Project), which is now the WCDMA specification body with delegates from all over the world. Ericsson has for a long time played a very active role in both ITU and 3GPP and is a major contributor to WCDMA and the fulfillment of the vision of a global mobile telecommunication system. Code Division Multiple Access and WCDMA Code Division Multiple Access (CDMA) is a multiple access technology where the users are separated by unique codes, which means that all users can use the same frequency and transmit at the same time. With the fast development in signal processing, it has become feasible to use the technology for wireless communication, also referred to as WCDMA and CDMA2000. In cdma One and CDMA2000, a 1.25 MHz wide radio signal is multiplied by a spreading signal (which is a pseudo-noise code sequence) with a higher rate than the data rate of the message. The resultant signal 25
  • 26. appears as seemingly random, but if the intended recipient has the right code, this process is reversed and the original signal is extracted. Use of unique codes means that the same frequency is repeated in all cells, which is commonly referred to as a frequency re-use of 1. WCDMA is a step further in the CDMA technology. It uses a 5 MHz wide radio signal and a chip rate of 3.84 Mbps, which is about three times higher than the chip rate of CDMA2000 (1.22 Mbps). The main benefits of a wideband carrier with a higher chiprate are: 1. Support for higher bit rates 2. Higher spectrum efficiency thanks to improved trunking efficiency (i.e. a better statistical averaging) 3. Higher QoS Further, experience from second-generation systems like GSM and cdmaOne has enabled improvements to be incorporated in WCDMA. Focus has also been put on ensuring that as much as possible of WCDMA operators’ investments in GSM equipment can be reused. Examples are the re-use and evolution of the core network, the focus on co-sitting and the support of GSM handover. In order to use GSM handover the subscribers need dual mode handsets. 3 G MOBILE (UMTS) 1. UMTS is the convergence of mobile communications, Information Technology (IT) and multimedia technologies. UMTS creates new opportunities for network operators, service providers and content providers to generate revenue and seize market share. The benefit of UMTS is richer, more powerful communication. UMTS is a suite of radio and network technologies that provide: 2. better spectrum efficiency, 3. high data transmission rates (up to 2 Mbit/s), worldwide roaming capability, 4. the capability to offer new multimedia applications and services, 5. Interoperability with both fixed and mobile telecommunications services. UMTS is the natural evolution from GSM and other second generation (2G) mobile systems. It provides interconnection with 2G networks as well as other terrestrial nd satellite-based networks. UMTS presents a unique opportunity to cater to the needs of individuals in the Information Society. As a multi-national, multi-sector system that supports numerous protocols and transport technologies, UMTS eliminates barriers that one posed problems for communications and enables the creation and delivery of fully personalized communication services to both mass Limitations of 2G systems The limitations of 2G mobile systems such as GSM include: 1. Congestion, There are more than 300 million wireless subscribers worldwide and thus a need to increase system capacity. 2. limited mobility around the world, 3. There is a need for global standardization. 4. Limited services. 5. There is a need for new multimedia applications and services. Wideband - Code Division Multiple Access (WCDMA) 26
  • 27. WCDMA optimally divides the available radio spectrum on the air interface into a number of channels and defines how these channels are allocated to the many users accessing the network. WCDMA allows for variable bit rates and variable Quality of Service (QoS). WCDMA provides: 1. better spectrum efficiency, 2. wider coverage, 3. support for all types of services (circuit, packet and multimedia), 4. enhanced privacy, IP Multimedia subsystem (IMS) IMS (IP Multimedia Subsystem) enables and drives efficient converged service offerings. It is the key to delivering multimedia services with telecom-grade quality of service across fixed and mobile accesses. It creates new opportunities for operators who want to deliver attractive, easy-to-use, reliable and profitable multimedia services – including voice, pictures, text and video, or any combination of these –with existing services. Users benefit by being able to enjoy attractive converged multiple services regardless of access network and device. Service success is very much dependent on the ability of operators to create and deliver an experience that fulfills or exceeds users’ expectations. To maintain their position as service provider, operators need to climb up the value chain and take a more active part in service delivery. IMS is designed precisely for that purpose. IMS is access-independent: it is the only open standardized way to deliver IP-based consumer and enterprise services, enabled by one common core and control, to the fixed, mobile and cable communities. It combines the quality and interoperability of telecoms with the quick and innovative development of the Internet. IMS does this by making the unique values of the telecom industry easily available to the application development community. When implemented according to agreed standards, IMS enables operators to mix and match equipment and applications from multiple vendors, and enables mobile users to access their personal set of services wherever they roam, whichever operator network they are connected to. IMS includes the tools and functions needed to handle numerous non-standardized services in a standardized way – ensuring the interoperability, access awareness, policy support, charging, security and quality of service functionality required to meet consumer demand for attractive and convenient offerings. Why IMS? ‘Why IMS?’ is one of the top strategic questions for any operator these days. There are many good answers, but perhaps the key one is that IMS delivers innovative multimedia services over fixed and mobile networks using open standards. IMS addresses key issues such as convergence, service creation and delivery, service interconnection and open standards. IMS can allow an operator to retain its existing business models, or evolve towards new ones. WIRELESS LAN & Bluetooth WIRELESS LAN INTRODUCTION Over recent years, the market for wireless communications has enjoyed tremendous growth. Wireless technology now reaches or is capable of reaching virtually every location on the face of the earth. Hundreds of millions of people exchange information every day using pagers, cellular telephones, and other wireless communication products. With tremendous success of wireless telephony and messaging services, it is hardly surprising that wireless communication is beginning to be applied to the realm of personal and business computing. No longer bound by the harnesses 27
  • 28. of wired networks, people will be able to access and share information on a global scale nearly anywhere they venture. This article will try to answer some basic questions of why and where wireless local area networks can be used, and present a brief description of some protocols that have been developed, with emphasis on IEEE 802.11. Mobile IP Mobile IP was suggested as a means to attain wireless networking. It focuses its attention at the Network Layer, working with the current version of the Internet Protocol (IP version 4). In this protocol, the IP address of the mobile machine does not change when it moves from a home network to a foreign network. In order to maintain connections between the mobile node and the rest of the network, a forwarding routine is implemented. When a person in the physical world moves, they let their home post office know to which remote post office their mail should be forwarded. When the person arrives at their new residence, they register with the new post office. This same operation happens in Mobile IP. When the mobile agent moves from its home network to a foreign (visited) network, the mobile agent tells a home agent on the home network to which foreign agent their packets should be forwarded. In addition, the mobile agent registers itself with that foreign agent on the foreign network. Thus the home agent forwarded all packets, intended for the mobile agent, to the foreign agent, foreign agent sends them to the mobile agent on the foreign network. When the mobile agent returns to its original network, it informs both agents (home and foreign) that the original configuration has been restored. No one on the outside networks need to know that the mobile agent moved. This configuration works, but it has some drawbacks. Depending on how far the mobile agent moves, there may need to be some store and forwarding of packets while the mobile agent is on neither the home nor the foreign network. In addition, Mobile IP works only for IPv4 and does not take advantage of the features of the newer IPv6. BLUETOOTH Introduction Bluetooth is an open standard and specification for small-form factor, low-cost, short range radio links between mobile PCs, mobile phones and other portable devices. The technology allows users to form wireless connections between various communication devices, in order to transmit real-time voice and data communications. It extends a new era of communication that eliminates and replaces cables which connects mobile phones, laptops, palmtops, desktops and printers. It provides an absolute synchronization between connecting devices. In February 1998, five companies as Bluetooth promoters - Ericsson, IBM, Intel, Nokia and Toshiba have organized and founded a group known as the Bluetooth SIG (Special Interest Group). The aim of this group is to study and develop a single standard for short range radio connectivity, ensuring interoperability between devices of different manufacturers. Since that time 3Com, Lucent, Microsoft, Motorola and more than 2000 member (adopters) companies have joined the organization. In July 1999 first version of the Bluetooth specification incorporating both radio protocols and control software was published. Concept The Bluetooth radio is built into a small microchip and operates in the 2.4 GHz band, a globally available frequency band ensuring communication compatibility worldwide. It uses frequency hopping spread spectrum, which changes its signal 1600 times per second, which helps to avoid interception by unauthorized parties. In addition software controls and identity coding built into each microchip ensure that only those units preset by their owners can communicate. The specification has two power levels defined; a lower power level that covers the shorter personal area within a room, and a higher power level that can cover a medium range, such as within a home. It supports both point-to-point and point-to-multipoint connections and provides up to 720 Kbps data transfer within a range of 10 meters (up to 100 meters with a power boost). The 28
  • 29. technology uses Omni directional radio waves that can transmit through walls and other non-metal barriers. If there is interference from other devices, the transmission speed decreases but does not stop With the current specification, up to seven slave devices can be set to communicate with a master radio in one device. This connection of devices (slaves and master) is called a piconet. Several piconets can be linked together to form scatternets, which allow communication between other device configurations. Bluetooth range diagram is shown in figure 1. Frequency Hopping Bluetooth communicates on a frequency of 2.45 GHz (starting from 2.402 GHz and stopping at 2.480 GHz), which has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM). A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors, garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. Making sure that Bluetooth and these other devices don't interfere with one another has been a crucial part of the design process. Bluetooth devices will coexist in the same frequency as wireless LAN and microwave oven consequently the band has to be very robust. Each channel is 1 MHz wide and so there are 79 different channels. Spread spectrum technologies help to avoid interference between radio technologies. A Bluetooth device changes its frequency in a pseudo random way 1600times per second. Interference often occurs in a small portion of frequency band so hoping between different frequencies makes the channel insensitive. Corrupt packets are resent on another frequency on which the same interference may not exist. Packets are also small. A Bluetooth channel always consists of a master and one or more slaves. Master initiates the connection. The master decides on a hoping scheme that is related to its internal clock. The slave calculate an offset which is the difference between master and slave clocks, and uses this information to determine the frequency to which it will hop. This process enables the master and its slaves to hop to the same frequencies at all times. The uplink and downlink channels for one device are time multiplexed and use the Time Division Duplex and hence use the same frequency hopping scheme. Working Principle Bluetooth uses radio medium to link devices instead of physical cable medium. Bluetooth technology is hardware independent. For example, if a digital camera is to be connected to a laptop/desktop, a cable system is necessary which is compatible with both devices each device follows a different set of interface/configuration to be connected. In the Bluetooth approach, the devices are Bluetooth enabled thus eliminating the interface/configuration conflict. This is true for all the hand-held devices which are communicating with each other in Bluetooth mode technology. This is possible by embedding a tiny inexpensive chip in a short-range transceiver into the mobile. Bluetooth enabled devices are connected in two different networks ‘A’ and ‘B’ Up to eight devices can be connected in a network. In order to communicate w with other devices, all devices should work on the same frequency. The device, which initiates the connection, is called ‘Master Device’ and the devices, which are connected to master device, are called ‘Slave Devices’ which are switched to the specified frequency for further communication. 29
  • 30. If a subscriber is trying to connect his services (known device), then the master device will send a ‘Page’ command which checks whether the device is within the range. If so, the communication is established. However, if an unknown device is trying to connect then the master device sends an ‘inquiry’ command and gets all the information about the unknown device and the database is updated. Thus, the devices within the network or from other networks talk with each other. As seen earlier, Master device sets hop sequence for the Slave devices on the network and controls whether or not each device is active or inactive within the network. Despite of Master/Slave designation, the network behaves more of peer to peer relation. Instead of one device designated to control and manage all resources. Each device has equal access to the entire network. A slave device in a network can establish connection to the other networks also. Thus, each slave device can participate with up to eight different networks. Application for End Users Bluetooth technology supports all multimedia applications used by end users. A few applications are as given below. 1. Provides an absolute synchronization among various digital devices (like mobile phone, desktop, laptop and PDA). 2. Bluetooth enabled mobile phone can be used as a mobile router placed in a suit case. 3. Internet surfing is possible from laptop from anywhere 4. Passing on print command remotely for printing jobs. Advantages of Bluetooth 1. Bluetooth provides flexible network that allows up to eight devices to share the information. 2. The network architecture allows one to add or remove nodes without additional infrastructure involved. 3. The size of the implementation is small. 4. Power consumption is low. 5. It has the support of the security considerations like ‘encryption’ Conclusion Bluetooth is going to emerge as one of the largest growing area in the field of telecommunications in providing device to device wireless connectivity.2This standard is now available for 2G networks and is in the process of evolution for 3G network standards tool. Broadband through WI FI and WIMAX WI FI Introduction 30
  • 31. Any two computers can be directly wired to each other using a crossover cable. When number of computer exceeds, cables must be run from each computer to another computer or to the central device. It can be time-consuming and difficult to run cables under the floor or through walls, especially when computers sit in different rooms. The correct cabling configuration for a wired LAN varies depending on the mix of devices, the type of Internet connection, and whether internal or external modems are used. Look around us at the moment, we have our keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally) joins all of these together?, they are connected by cables. Cables have become the bane of many offices. Most of us have experienced the 'joys' of trying to figure out what cable goes where, and getting tangled up in the details. Is there a technology to replace cable? Wireless is the answer. Wireless isn't just about the freedom to stay connected as we move around the office. It's also about the freedom to connect our mobile laptop PC to the Internet from any room in our home or whenever we take it on the road. Going wireless used to be complicated. It meant dealing with different wireless standards and all the resultant hardware and software. But the wireless industry settled on 802.11b (or Wi-Fi) as the predominant standard in 1999, sending prices downward as demand surged. Wi-Fi (or Wi-fi, WiFi, Wifi, wifi), short for "Wireless Fidelity", is a set of product compatibility standards for wireless local area networks (WLAN). Wi-Fi was intended to be used for mobile devices and LANs, but is now often used for Internet and wireless VoIP phone access. It enables a person with a wireless-enabled computer, a personal digital assistant (PDA), or a wireless VoIP phone to connect to the Internet when in proximity of an access point the geographical region covered by one or several access points is called a hotspot. Wi-Fi is a trademark of the Wi-Fi Alliance (formerly the Wireless Ethernet Compatibility Alliance), the trade organization that tests and certifies equipment compliance with the 802.11x standards. Today WLAN technologies all follow one of the three main Wi-Fi communication standards. The benefits of wireless networking depend on the standard employed: 802.11b was the first standard to be widely used in WLANs. The 802.11a standard is faster but more expensive than 802.11b; 802.11a is more commonly found in business networks. The newest standard, 802.11g, attempts to combine the best of both 802.11a and 802.11b, though it too is more a more expensive home networking option. Difference between WI FI and WIMAX The main problem with WiFi access is that hot spots are very small, so coverage is sparse. Is there a new technology that would provide high speed of broadband service, Wireless rather than wired access, so it would be a lot less expensive than cable or DSL and much easier to extend to suburban and rural areas and Broad coverage like the cell phone network instead of the tiny little hotspots of WiFi. This technology is called WiMAX, short for Worldwide Interoperability for Microwave Access. The big difference between Wi-Fi and WiMAX is that we're going to use licensed spectrum to deliver WiMAX. To date, all Wi-Fi technology has been delivered in unlicensed spectrum. WiMAX will use one of the unlicensed frequencies, but we're also supporting two other frequencies that are licensed. What that means is that you can turn up the output power and broadcast longer distances. So where Wi-Fi is something that is measured in hundreds of feet, usually WiMAX will have a very good value proposition and bandwidth up to several miles. Also WiMAX is designed to be a carrier-grade technology, which requires a higher level of reliability and quality of service than are now available in typical Wi-Fi implementations. Those fundamental differences make WiMAX more of a metropolitan area access technology versus hotspot. 31
  • 32. Thus WiMAX has the potential to do to broadband Internet access what cell phones have done to phone access. In the same way that many people have given up their "land lines" in favor of cell phones, WiMAX could replace cable and DSL services, providing universal Internet access just about anywhere you go. WiMAX will also be as painless as WiFi -- turning your computer on will automatically connect you to the closest available WiMAX antenna. A WiMAX system consists of two parts: A WiMAX tower, similar in concept to a cell-phone tower - A single WiMAX tower can provide coverage to a very large area -- as big as 3,000 square miles (~8,000 square km). A WiMAX receiver - The receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today. A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link. This connection to a second tower (often referred to as a), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas. What this points out is that WiMAX actually can provide two forms of wireless service: WiFi-style access will be limited to a 4-to-6 mile radius (perhaps 25 square miles or 65 square km of coverage, which is similar in range to a cell-phone zone). Through the stronger line-of-sight antennas, the WiMAX transmitting station would send data to WiMAX-enabled computers or routers set up within the transmitter's 30-mile radius (3,600 square miles or 9,300 square km of coverage). This is what allows WiMAX to achieve its maximum range. WiMAX outdistances WiFi by miles. WiFi's range is about 100 feet (30 m). WiMAX will blanket a radius of (50 km) with wireless access. The increased range is due to the frequencies used and the power of the transmitter. Wi-Fi kind of lives by what we call the "five minute rule". If you live in a city, most likely you can walk five minutes and find a hotspot. Or if you're in your car in the suburbs or a village, you can usually drive within five minutes and find one of those. With WiMAX we're trying to offer that same type of service without having to drive or walk five minutes. Even though it's only five minutes, it's still five minutes. Eventually, you can just open your notebook and get a connection, wherever you may be. Wi-Fi is based on the IEEE 802.11 specifications. There are currently four deployed 802.11 variations: 802.11a, 802.11b, 802.11g, and 802.11n. Bluetooth uses Frequency Hop Spread Spectrum (FHSS) to avoid any interference. A Bluetooth channel is divided into time slots each 625 micro second in length. The devices hop through these timeslots making 1600 hops per second. This trades bandwidth efficiency for reliability, integrity and security. 32
  • 33. The range for Bluetooth communication is 0-30 feet (10 meters) with a power consumption of 0dBm (1mW). This distance can be increased to 100 meters by amplifying the power to 20dBm. The Bluetooth radio system is optimized for mobility. Bluetooth communication occurs between a master radio and a slave radio. Bluetooth radios are symmetric in that the same device may operate as a master and also the slave. Each radio has a 48-bit unique device address (BD_ADDR) that is fixed. Two or more radio devices together form ad-hoc networks called piconets. All units within a piconet share the same channel. Each piconet has one master device and one or more slaves. There may be up to seven active slaves at a time within a piconet. Thus, each active device within a piconet is identifiable by a 3-bit active device address. Beyond 3G Introduction Introduction New data services, interactive TV and evolving Internet behavior will influence mobile data usage. Long sessions in always-on mode will force a re-think of radio access technology to achieve the required but not easy to attain capacity (Gbit/s/km) at low cost. The ideas presented in this article can increase capacity by a factor of 500 with regard to expected cellular deployments. Coverage will be based on large umbrella cells (3G, WiMAX) and numerous Pico cells interconnected to provide the user with seamless high data rate (several Mbs) sessions. Scalable and progressive deployments are possible while protecting the operator’s long-term investment. The 4G infrastructure operator will mix several technologies, each of which has its optimal usage. The connection to one of them will result in a real-time trade-off which will offer the user the best possible service. Some tools that genuinely improve the user’s multimedia quality of experience (availability, response time, definition, etc.) are also presented in this article. 4G MOBILE 4G will deliver low cost multi-megabit/s sessions any time, any place, using any terminal. Operational Excellence Voice was the driver for second generation mobile and has been a considerable success. Today, video and TV services are driving forward third generation (3G) deployment and in the future, low cost, high speed data will drive forward the fourth generation (4G) as short-range communication emerges. Service and application ubiquity, with a high degree of personalization and synchronization between various user appliances, will be another driver. At the same time, it is probable that the radio access network will evolve from a centralized architecture to a distributed one. Service Evolution The evolution from 3G to 4G will be driven by services that offer better quality (e.g. video and sound) thanks to greater bandwidth, more sophistication in the association of a large quantity of information, and improved personalization. Convergence with other network (enterprise, fixed) services will come about through the high session data rate. It will require an always-on 33
  • 34. connection and a revenue model based on a fixed monthly fee. The impact on network capacity is expected to be significant. Machine-to-machine transmission will involve two basic equipment types: 1. sensors (which measure parameters) 2. tags (which are generally read/write equipment) It is expected that users will require high data rates, similar to those on fixed networks, for data and streaming applications. Mobile terminal usage (laptops, Personal digital assistants, hand-held) is expected to grow rapidly as they become more user friendly. Fluid high quality video and network reactivity are important user requirements. 4G MOBILE Some of the key technologies required for 4G are briefly described below: GPRS BASIC Introduction The General Packet Radio System (GPRS) provides actual packet radio access for Global System for Mobile Communications (GSM) and time-division multiple access (TDMA) users. The main benefits of GPRS are that it reserves radio resources only when there is data to send and it reduces reliance on traditional circuit-switched network elements. GPRS GPRS is a data service for GSM, the European standard digital cellular service. It is a packet-switched mobile data service, a wireless packet based network. GPRS, further enhancing GSM networks to carry data, is also an important component in the GSM evolution entitled GSM+. High-speed mobile data usage is enabled with GPRS. IF GPRS is compared to GSM data services, the following applies: In GSM all the data that has to be sent, is sent via a circuit switched connection. This means, that a link has to be established and is used and maintained from setup until release. The data is sent via one physical timeslot and has a maximum data rate of 9.6 kbps. In GPRS all the data that has to be sent, is split into several smaller data packets first. Those packets are then sent individually across the GPRS network and each of those packets can travel on a different route. 34
  • 35. The packets arrive at the right destination address and could be reassembled in the right order, because every single packet contains the destination address and information about the sequencing of the different packets. In GPRS, one user can occupy more than one timeslot or more than one user can be on a single timeslot. Depending on different aspects, a maximum data rate of 171.2 kbps could be achieved. For GPRS the ETSI Standard introduces two new elements, the Serving GPRS Support Node (SGSN) and the Gateway GPRS Support Node (GGSN) (Shown in the diagram below as shadowed objects) is introduced to create an end-to-end packet transfer mode. The HLR is enhanced with GPRS subscriber data and routing information. Two services are provided; Point -To-Point (PTP) Point-To-Multipoint (PTM) (not yet specified by the Standards) The European Telecommunications Standards Institute (ETSI) has specified GPRS as an overlay to the existing GSM network to provide packet data services. In order to operate a GPRS service over a GSM network, new functionality has to be introduced into existing GSM network elements and new network elements have to be integrated into the existing operators GSM networks. The Base Station Subsystem (BSS) of GSM has to be upgraded to support GPRS. The BSS works with the GPRS Support Node (GSN) to provide GPRS service in a similar manner to its interaction with the Switching subsystem for the circuit switched services. DIGITAL SUBSCRIBER LOOP The Digital Subscriber Line (DSL) technology is widely regarded as a vehicle for offering wired broadband services to the mass market. The services include high-speed access to the Internet, voice and telephony services, interactive video services, e-commerce, and messaging, alerting and other multimedia services. Success of the Internet and the World Wide Web has created the market demand and high expectations for high-speed data services through DSL 35
  • 36. Twisted pair - voice Twisted pair - voice and data It uses the existing copper pair for providing Broadband. The previous diagram showed how the twisted pair is used for transmitting voice and data. The DSL technology is now mature, poised for rapid deployment and industry growth in the near future. There are number of DSL types available to address the various network environments and applications in the light of trade-offs between rate and reach 1. HDSL -- High-rate DSL 2. ADSL-- Asymmetric DSL 3. SDSL – Symmetric DSL 4. RADSL – Rate Adaptive DSL ADSL (Asymmetric Digital Subscriber Line) Asymmetric Digital Subscriber Line (ADSL) technology was first introduced in 1992 as a system capable of delivering Video-on-Demand (VoD) service over telephone networks. ADSL utilizes the same twisted two-wire facility (called the subscriber loop) as the traditional telephone service. The traditional telephone service is often referred to as “Plain Old Telephone Service” or POTS. With the initial system architecture and design of ADSL, the same twisted pair could simultaneously support both POTS and data. This is made possible due to a frequency multiplexing technique that supports POTS in the base band and data in a high frequency band above the telephone service. The ADSL data service is asymmetrical, in that, it has a higher downstream data rate (up to 6 Mbps towards the subscriber) than the upstream data rate (up to 640 kbps towards the service provider). The main objective is to use ADSL as a technology choice for offering VoD service. In 1994 it was proved that ADSL technology could be used to offer high speed data services including video. (Click to view flash movie on 36
  • 37. speed comparison ). Mass-market success of the Internet technologies – World Wide Web, the Internet browser, and the Universal Resource Locator (URL) led to high residential as well as business demand for broadband services. SDSL (Symmetric DSL) A variation of ADSL technology more suitable for the T1/E1 market was envisioned via a symmetric offering of ADSL, known as SDSL. The SDSL technology was envisioned to be a 2-wire equivalent to the 4-wire HDSL service. The market expectations were Ubiquitous and consistent high-speed data offering, support for internet access protocols, automated provisioning, dynamic access to services without requiring telephone company intervention, and inexpensive pricing to enable a wider deployment of service. Note that all of these expectations have shifted from service provider ADSL ARCHITECTURE In POTS, with the available voice band of 3.5 kHz and allowed S/N = 30dB, the theoretical upper limit on data rate will be roughly 35Kbps. Copper access lines can pass frequencies into the MHz region. This feature is precisely what ADSL focuses on. ADSL technology offers the asymmetric bandwidth characteristics that are 1.544-8.448Mb/s in downstream and 32-768kb/s in the upstream. This feature fits in with the requirements of client-server applications, in which the client typically receives much more data from the server then he is able to generate ADSL System Architecture The ADSL functions at the network end (central office end) are performed by an ADSL Terminal Unit-Central office type (ATU-C) together with a splitter function (S-C). The ATU-C interfaces with the network switching, transport, and multiplexing functions and network operations. The ATU-C functions are usually integrated within a higher level network element, e.g. DSL access multiplexer (DSLAM). Although copper pairs are widely available, several line conditions may prevent the delivery of ADSL: first, if the telephone line to the customer premises is longer than 5.5km, second, existing of the load coils or an excessive number of bridged taps and third, that some portions of the telephone line is carried to the premises on fiber optic cable . DSLAM contains the access interface (network termination – NT) to the appropriate next device in the network, e.g., Tier2, Tier1 Switch etc. ADSL functions at the customer end (remote end) are performed by an ADSL Terminal Unit-Remote end type (ATU-R) together with a splitter function (S-R). At the customer premises, ATU-R may present the interfaces to the local distribution for broadband services via service 37
  • 38. modules (SM). The SM contains necessary decoders and terminal interfaces for the given service and customer control interfaces. Splitters are three node devices that allow the telephony signals and the ADSL signal to reside on the same copper loop without interfering one with the other. The splitter provides a low pass filter to the basic voice and control telephony signal (below 4 kHz) and a high pass filter for the ADSL signals, starting approximately at 25 kHz or above. Most POTS splitter designs are passive, that is without powering requirements. The advantages of passive filters are in their reliability, because they enable continuous telephone service even if the modem fails (for example, due to a power outage). The connectivity architecture of DSLAMs is as shown in figure. The DSLAMs are connected to the Tier 2 Switches and again, the Tier2 switches are connected to Tier1 Switch. In turn the Tier1 Switch is connected to "Broadband Remote Access Server"(BBRAS) which is routed to core router through which it gets access to the International Gateway. The below diagram shows the connectivity portion of DSLAM with the Tier2 switch. If the distance between the DSLAM and the Tier2 switch is less than 10 Kms, then Dark Fibre could be used for connectivity. (Dark fibre means a spare fibre). If the distance exceeds 10 Kms, then we can use the STM medium with electrical to optical converters at both the ends, as both DSLAM as well as Tier2 switch has optical interface whereas the output from STM is electrical. 38
  • 39. There are a large number of different kinds of servers that can be accessed by an ADSL system Video on Demand service is one of the most interesting aspect of ADSL. By using MPEG coded video it is possible to deliver video quality movies over existing copper loops to customers. A video quality can be achieved by only 1.5 Mbps data rate. Together with pure VoD services there might exist combined movie information and advertiser services in which commercial and non-commercial information that providers and advertisers can deliver their information. Full-rate ADSL: The downstream uses DMT tones 7 - 255 (echo cancellation) or 32 - 255 (FDM). The upstream channel uses tones 7 - 31. Bit loading is adaptive and varies from 2 to 15 bits per tone (sub channel) depending on the relative noise of each carrier. When high noise levels are detected in a given sub channel, the DMT modem can shut down a particular sub channel altogether. ADSL MODEM The ADSL transmission signal is modulated onto discrete multi-tones (DMT). As already seen, there are 256 independent parallel sub channels available in the 1.1MHz ADSL bandwidth. Each sub channel is separated by approximately 4 kHz and has a distinct carrier frequency in the center of this 4 kHz band. While DMT is the physical transmission level, framing and encoding (error correction) occurs at a higher level. The modulation technique used in each of the discrete multi-tone (DMT) channels is Quadrature Amplitude Modulation (QAM) where both the phase angle and the amplitude of the carrier band are modulated to represent the information being transmitted. In a typical ADSL modem, the main sections are 1. The Digital Interface (e.g. ATM) 2. The Framer/FEC plus Encoder/Decoder 3. The DMT Modulator 4. The AFE (Analog Front End) The Framer multiplexes serial data into frames, generates FEC (Forward Error Correction), and interleaves data. FEC and data interleaving corrects for burst errors. This allows DMT-based ADSL technology to be suitable for support of MPEG-2 and other digital video compression techniques For the transmit signal The Encoder encodes frames to produce the constellation data for the DMT Modulator. It assigns the maximum number of bits per tone (based on measured SNR of each carrier) and generates a QAM constellation where each point represents a digital value. Each constellation point is one of N 39
  • 40. complex numbers, x + iy, where x and y are the phase and amplitude components. The summation of bits in all carriers, multiplied by the frame rate (4 kHz), represents the data rate For the receive signal The Decoder converts QAM symbols back into the data bit stream. In the DMT Modulator, a frequency domain processor implements FFT/IFFT and associated processing. In the transmit path, the Inverse Fast Fourier Transform (IFFT) module accepts input as a vector of N QAM constellation points and duplicates each carrier with its conjugate counterpart so the 2N output samples are real. The 2N time domain samples have the last 2N/16 samples appended as a cyclic prefix, and are then delivered to the DAC (Digital to Analog converter). The set of time domain samples represents a summation of all the modulated sub channels, for the duration of one data frame NGN BASIC CONCEPTS Definition & Features of NGN 40
  • 41. BSNL's Plan 1. Tender for 200 KC IP TAX equipment, which is Pilot Project for introduction of NGN in transit network, has been awarded 2. Plan to introduce 6.4 million circuits capacity in 2007-2008 through IP TAX 3. Strengthen SSTP Networks 4. Trials for migration of PSTN access to NGN and for introduction of NGN in access network underway 5. Migration to IMS expected to roll out from 2009 6. Full migration to NGN with replacement of PSTN by 2012 7. IP Multimedia Subsystems WiMAX-Access to NGN 41
  • 42. 8. WHAT IS NGN? 9. NGN is a network infrastructure that will enable the provisioning of the existing telecommunications services and innovative applications of the next generation. It is a converged network capable of carrying voice, data and video over the same physical network, with all traffic carried as IP (Internet Protocol).NGN is a multi-service network, which enables operators to implement converged and new services in addition to POTS. From the users’ perspective, the convergence of services will enable the “desired” services from any type of access network. 10. NGN i.e. the Next Generation Network refers to the convergence of different telecom services i.e. voice, data and video over a unified packet network utilizing Internet Protocol (IP). NGN can be thought of as a packet-based network where the packet switching and transport elements (e.g. routers, switches and gateways) are logically and physically separated from the service/ call control intelligence. This control intelligence is used to support all types of services over the packet-based transport network including everything from the basic voice telephony services to data, video, multimedia, advanced broadband ARCHITECTURE OF NGN The architecture of Next Generation Network is shown below. 42
  • 43. It is a horizontally layered network architecture instead of the present vertically separated networks for each service. It uses packet-based transport for all services (including voice).The access, switching, transport, control and service functions which are integrated in today’s switches are separated into individual network layers, which inter-work via interfaces based on open standards. The most significant aspect is the separation of call control from switching and transport functions NGN APPLICATIONS – THE KEY TO COMPETITIVE DIFFERENTIATION 1. Voice Telephony NGNs will likely need to support various existing voice telephony services (e.g., Call Waiting, Call Forwarding, 3-Way Calling, various AIN features, various Centrex features, and various CLASS features).Note, however, that NGNs are not trying to duplicate each and every traditional voice telephony service currently offered. Rather, they will likely attempt to support only a small percentage of these traditional services, with an initial focus on the most marketable voice telephony features and the features required from a regulatory perspective. 2. Data (Connectivity) Services Allows for the real-time establishment of connectivity between endpoints, along with various value-added features (e.g., bandwidth-on- demand, connection reliability/resilient Switched Virtual Connections [SVCs], and bandwidth management/call admission control). 1. Multimedia Services 43
  • 44. Allows multiple parties to interact using voice, video, and/or data. This allows customers to converse with each other while displaying visual information. 2. Virtual Private Networks (VPNs) Voice VPNs improve the inter location networking capabilities of businesses by allowing large, geographically dispersed organizations to combine their existing private networks with portions of the PSTN, thus providing subscribers with uniform dialing capabilities. Data VPNs provide added security and networking features that allow customers to use a shared IP network as a VPN. 1. Unified Messaging Supports the delivery of voice mail, email, fax, and pages through common interfaces. Through such interfaces, users will access, as well as be notified of, various message types (voice mail, email, fax, etc.), independent of the means of access (i.e., wire line or mobile phone, computer, or wireless data device). 1. Call Center Services A subscriber could place a call to a call center agent by clicking on a Web page. The call could be routed to an appropriate agent, who could be located anywhere, even at home (i.e., virtual call centers).Voice calls and e-mail messages could be queued uniformly for the agents. Agents would have electronic access to customer, catalog, stock, and ordering information, which could be transmitted back and forth between the customer and the agent. 1. Interactive gaming Offers consumers a way to meet online and establish interactive gaming sessions (e.g., video games). 2. Home Manager With the advent of in-home networking and intelligent appliances, these services could monitor and control home security systems, energy systems, home entertainment systems, and other home appliances IP Multimedia subsystem (IMS) IMS (IP Multimedia Subsystem) enables and drives efficient converged service offerings. It is the key to delivering multimedia services with telecom-grade quality of service across fixed and mobile 44
  • 45. accesses. It creates new opportunities for operators who want to deliver attractive, easy-to-use, reliable and profitable multimedia services – including voice, pictures, text and video, or any combination of these –with existing services. Users benefit by being able to enjoy attractive converged multiple services regardless of access network and device. eService success is very much dependent on the ability of operators to create and deliver an experience that fulfills or exceeds users’ expectations. IMS is designed precisely for that purpose. IMS is access-independent: it is the only open standardized way to deliver IP-based consumer and enterprise services, enabled by one common core and control, to the fixed, mobile and cable communities. It combines the quality and interoperability of telecoms with the quick and innovative development of the Internet. IMS does this by making the unique values of the telecom industry easily available to the application development community. When implemented according to agreed standards, IMS enables operators to mix and match equipment and applications from multiple vendors, and enables mobile users to access their personal set of services wherever they roam, whichever operator network they are connected to. IMS includes the tools and functions needed to handle numerous non-standardized services in a standardized way – ensuring the interoperability, access awareness, policy support, charging, security and quality of service functionality required to meet consumer demand for attractive and convenient offerings. IMS offers a standardized way to deliver convenient IP-based consumer and enterprise services to fixed, mobile and cable community – enabled by one common core and control. It is the cornerstone of the evolution of current networks to a single, all-IP based network where all types of services (messaging, telephony, etc.) and media (voice, video, pictures, text etc.) can be integrated into a single user experience. For consumer, IMS opens communication options that seamlessly combine ongoing voice sessions with multimedia elements (sharing video while talking, for example) or enrich shared applications with voice communication (for instance, talking while playing a multiplayer game). WIRELESS TECHNOLOGY Wireless broadband technology sends data over a 'wireless' communications network, typically using radio frequency. These technologies are a strong and popular platform for delivery of high-speed Internet services and wireless broadband, is emerging as a legitimate local access platform for the delivery of high-quality digital data, video and voice services. In many regional areas where telecommunications infrastructure such as fibre optic or coaxial cable is limited, wireless technologies offer a competitive broadband access solution. Rather than stringing thousands of miles of fiber, coax or twisted-pair wiring, a wireless operator installs a headed and transmission tower and is open for business. Wireless technologies can provide area coverage from anywhere between 5km to 40km depending on the local terrain and strength of the transmitter signal. 45
  • 46. The advantages of wireless broadband: 1. Access - a wireless network provides high-speed access to the Internet without the need for expensive wire or cable infrastructure. 2. Flexibility - the capacity (number of customers) of a wireless network can be expanded when required. 3. Versatility - wireless services are suitable for both lightly populated areas, but can also be deployed to provide customized services in highly populated areas. 4. Costs - without the need for expensive equipment and/or infrastructure, the cost of wireless broadband products can be lower than wired products. Wi-Fi Short for wireless fidelity, Wi-Fi technologies include the approved IEEE 802.11a, b and g specifications, as well as the yet-to-be-ratified 802.11n specification. Wi-Fi is the first high-speed wireless technology to enjoy broad deployment, most notably in hotspots around the world including homes and offices, and increasingly cafes, hotels, and airports. Wi-Fi hotspots became popular almost immediately and have been applauded by road warriors for their ability to improve productivity. Wi-Fi is limited, however, by its range: high-speed connectivity is possible only as long as a user remains within range of the wireless access point, which is optimum within 300 feet. Wi-Fi was one of the earliest high-speed wireless data technologies and now benefits from a broad availability of supporting products and technologies. Some of the newest platforms even support multiple Wi-Fi standards (e.g. 802.11a, b and/or g) for compatibility among several wireless networks. WiMAX WiMAX is an emerging technology that will deliver last mile broadband connectivity in a larger geographic area than Wi-Fi, enabling T1 type service to business customers and cable/DSL-equivalent access to residential users. Providing canopies of coverage anywhere from one to six miles wide (depending on multiple variables), WiMAX will enable greater mobility for high-speed data applications. With such range and high throughput, WiMAX is capable of delivering backhaul for carrier infrastructure, enterprise campuses and Wi-Fi hotspots. WiMAX will be deployed in three phases. Phase one will see WiMAX technology using the IEEE 802.16d specification deployed via outdoor antennas that target known subscribers in a fixed location. Phase two will roll out indoor antennas, broadening the appeal of WiMAX technology to carriers seeking simplified installation at user sites. Phase three will launch the IEEE 802.16e specification, in which WiMAX-Certified* hardware will be available in portable solutions for users who want to roam within a service area, enabling more persistent connectivity akin to Wi-Fi capabilities today. CABLE MODEM BASICS 46
  • 47. Current Internet access via a 28.8–, 33.6–, or 56–kbps modem is referred to as voice band modem technology. Like voiceband modems, cable modems modulate and demodulate data signals. However, cable modems incorporate more functionality suitable for today's high-speed Internet services. Cable modem is capable of delivering up to 30 to 40 Mbps of data this is approximately 500 times faster than a 56–kbps modem In the conventional case the TV set receives the signal directly from the cable operator through Co-axial cable as shown in the figure1. When internet data combined with the TV signal is received a splitter is required to separate the signals(figure 2). FIGURE 1 FIGURE CABLE MODEM BASICS FIGURE 1 FIGURE 2 The separated data is taken through co-axial cable to the cable-modem which in turn is connected to the PC through Ethernet/USB port A subscriber can continue to receive cable television service while simultaneously receiving data on cable modems to be delivered to a personal computer (PC) with the help of a simple one-to-two splitter A device called a cable modem termination system (CMTS), located at the local cable operator's network hub, controls access to cable modems on the network. It is for support of data services that integrates upstream and downstream communication over a cable data network. The number of 47