SlideShare a Scribd company logo
SUPERVISED BY:
SIR IMRAN SHABBAR
PREPARED BY:
NAQASH ZAHEER
Internship Presentation
OSS
Operational Support System
Resource side
Group of computer programs used by
communications service providers for monitoring,
controlling, analyzing and managing telephone
network system
Supporting processes such as maintaining network
inventory, provisioning services, configuring
network components, and managing faults
The four key OSS elements are processes, data,
applications, technologies.
BSS
Business Support System
Customer side
Dealing with customers, supporting processes such
as taking orders, processing bills, and collecting
payments
Collective term for the telecoms software solutions
used to support customers
The term encompasses software that supports billing
& charging; customer management; product design
& management; sales & marketing; order & order
activation
ESS
Enterprise Support System
They deal with a range of issues that form the core of
enterprise support systems, such as availability of
finance, socio-cultural environment, personality
dimensions, education systems, enterprise clusters
and technology transfer
They are software applications
They allow for collaboration and communication
across the organization through collection of data
Resources in Network
There are two types of resources:
Logical Resources: Logical Resource represents
all the characteristics of a device that you can’t
physically touch as well as any actions on these
logical characteristics.
Physical Resources: Physical Resource is
anything you can touch which includes the cards, the
slots and the ports.
AAA
Authentication, Authorization, Accounting
Refers to security architecture for distributed
systems for controlling which users are allowed
access to which services, and tracking which
resources they have used
AAA server is a server program that handles user
requests for access to computer resources
Two network protocols providing this functionality
are particularly popular: the RADIUS protocol and
its newer Diameter counterpart
Authentication(AAA)
who the user is
Authentication refers to the process where an
entity's identity is authenticated
By providing evidence that it holds a specific digital
identity
Examples of types of credentials are passwords, one-
time tokens, digital certificates, digital signatures
and phone numbers
Authorization(AAA)
what the user can do
The authorization function determines whether a
particular entity is authorized to perform a given
activity
For example, granting read access to a specific file
for a specific authenticated user.
Accounting(AAA)
what the user did
Accounting refers to the tracking of network
resource consumption by users for the purpose of
capacity and trend analysis, cost allocation, billing
It may record events such as authentication and
authorization failures
It tracks traffic that passes through the security
appliance
RADIUS
Remote Authentication Dial-In User Service
client/server protocol
Enables remote access servers to communicate with
a central server to authenticate dial-in users and
authorize their access to the requested system or
service.
RADIUS is a client/server protocol that runs in the
application layer, using UDP as transport
RADIUS(Diagram)
Diameter
Diameter is an authentication, authorization, and
accounting protocol for computer networks
Replaces the much less capable RADIUS
Provides an upgrade path for RADIUS
Diameter is reliable transport protocols (TCP or
SCTP, not UDP)
TACACS+
Terminal Access Controller Access-Control System
Plus
An access control network protocol for routers,
network access servers and other networked
computing devices
TACACS+
Terminal Access Controller Access-Control System
Plus
An access control network protocol for routers,
network access servers and other networked
computing devices
MDF
Main Distribution Frame
A Main Distribution Frame (MDF) is the interface between
the subscriber cables coming from the local network (line
side) and the switching equipment in the exchange (system
side)
In telephony, a main distribution frame (MDF or main frame)
is a signal distribution frame for connecting equipment
(inside plant) to cables and subscriber carrier equipment
(outside plant).
All cable copper pairs supplying services through user
telephone lines are terminated at the MDF and distributed
through the MDF to equipment within the local exchange e.g.
repeaters and DSLAM
MDF(Picture)
Horizontal Blocks(MDF)
The horizontal blocks terminate the cables between
the switch and the MDF
Each connection corresponds to a telephone number
on the switch
The switch engineer shall determine the number of
horizontal blocks on the frame.
All horizontal blocks shall be stenciled to show the
termination IDs.
Vertical Blocks(MDF(
The vertical connectors are mounted on the vertical
side of the MDF
Each connector protects 100 or 200 pairs of the OSP
cables
The connector is equipped with tip cables.
The tip cables are routed from the MDF through the
floor to the cable vault or over the MDF to the wall,
where they are spliced to the OSP cable
The connectors for the tip cables shall be provided as
either stub-up or stub-down
OCS
Online charging system
System allowing a communications service provider
to charge their customers, in real time, based on
service usage
OSP
Outside Plant
Refers to all of the physical cabling and supporting
infrastructure (such as conduit, cabinets, tower or
poles)
located between a demarcation point in a switching
facility and a demarcation point in another switching
center or customer premises
acts as the communications equipment located
between a main distributions frames (MDF) and a
user end instrument
ONU
Optical Network Unit
An Optical Network Unit (ONU) converts optical signals
transmitted via fiber to electrical signals
To provide telecommunications services over an optical
fiber network
These electrical signals are then sent to individual
subscribers
ONU provides the subscribers with broadband Internet
access
An ONU is used in combination with an optical line
terminal (OLT).An optical network unit (ONU) but is
located near the customer.
OLT
Optical Line Terminal
Located in a central office and controls the
bidirectional flow of information across the network
Device which serves as the service provider endpoint
of a passive optical network
There are 32 ONU’s in one OLT.
OLT carries out 10-40 mbps.
ONU and OLU
PON
Passive Optical Network
System that brings optical fiber cabling and signals
all or most of the way to the end user
A PON reduces the amount of fiber and central office
equipment required compared with point-to-point
architectures.
A passive optical network is a form of fiber-optic
access network.
It carries out 2.5 Gbps.
It consist of OLT’s
SONET
Synchronous Optical Networking
SONET used in the United States
Protocol that is used to transmit a large volume of
data over relatively long distances using a fiber optic
medium
Multiple digital data streams are transferred at the
same time over optical fiber using LEDs and laser
beams
SDH
Synchronous Digital Hierarchy
Standard technology for synchronous data
transmission on optical media
Provides faster and less expensive network
interconnection than traditional PDH
(Plesiochronous Digital Hierarchy)
Synchronous means the bits from one call are
carried within one transmission frame
ISDN
Integrated Services for Digital Network
Set of communication standards for simultaneous
digital transmission of voice, video, data, and other
network services over the traditional circuits of the
public switched telephone network
ISDN supports data transfer rates of 64 Kbps
(64,000 bits per second).
There are two types of ISDN:
1.BRI 2. PRI
BRI
Basic Rate Interface
Consists of two 64-Kbps B-channels and one D-
channel for transmitting control information
Two channels are used for actual voice or data traffic
with each one operating at a rate of 64 KBPS
There is a third channel that is used for call
supervision (connecting, disconnecting, etc.). This
channel operates at a rate of 16 KBPS
PRI
Primary Rate Interface
standardized telecommunications service level
within the ISDN specification for carrying multiple
voice and data transmissions between a network and
a user
PRI is the standard for providing telecommunication
services to offices
The Primary Rate Interface consists of 23 B-channels
and one 64 Kbps D-channel using a T-1 line or 30 B-
channels and 1 D-channel using an E1 line
T1
Most commonly used digital transmission service in
the United States, Canada, and Japan
It has a data rate of about 1.544 megabits / second
It contains twenty four digital channels
The scalability of the T1 is up to 200 and above users
Broadband telecommunication connection used this
especially to connect ISP’s to internets infrastructure
Full duplex exchange of data over traditional wire
E1
E1 is similar to the T1
E1 is the European term for the transmission
The data rate of E1 is about 2 mega bits per second
It has 32 channels at the speed of 64 Kbps
2 channels among the 32 are already reserved
One channel is used for signaling while the other
channel is used for controlling
DSLAM
Digital Subscriber Line Access Multiplexer
Network device
Often located in telephone exchanges
Connects multiple customer digital subscriber line
(DSL) interfaces to a high-speed digital
communications channel using multiplexing
techniques
SMPP
Short Message Peer to Peer
Used in Mobile phones
Sending and receiving medium of SMS messages
SMPP is a standard protocol designed to provide
flexible data communication interface for the
transfer of short messages between external short
messaging and message centre's
Used as a third party
SMTP
Simple Mail Transfer Protocol
Internet standard for the electronic mail
transmission
FTP
File Transfer Protocol
Network protocol for transfer files from one host to
another host over TCP based network
FTAM
File Transfer Access Method(Management)
An ISO standard that specifies methods of
transferring files between networked computers
Similar to FTP and NFS
Network Elements
Logical entities uniting one or more physical devices
An equipment used in provisioning of a
telecommunication services
Telephone, routers computer clusters
MML
Man Machine Language
Specific language
Define to standardize the interfaces for managing a
telecommunications from a console
SOAP
Simple Object Access Protocol
XML based protocol for accessing web services
Protocol specification for exchanging structure
information in the implementation of web services in
computer networks
NGN
Next Generation Network
Packet based network
One network transport all information and services
by encapsulating these in to packets
Also known as “all-IP”
It is active network (electricity required)
GPON
Gigabit Passive Optical Network
High bandwidth
Point to multipoint access
From one single fiber from provider central office to
serve multiple homes and small business
2.5 Gbps downstream
1.2 Gbps upstream
DOCSIS
Data Over Cable Service Interface Specification
International telecom standard that permits the
addition of high speed data transfer to an existing
cable system
Cable modem standard
Downstream traffic transfer rate is between 27-
36Mbps
Synchronous
Transmission
Asynchronous
Transmission
Consistent and
continuous transfer of
data blocks
Faster
No start no stop bit
Communication over
telephone lines
Not consistent
Slower
Bit 1 for start and 0 for
stop
SONET and Ethernet
Synchronous Vs Asynchronous
SMSC
Short Message Service Center
Network element in mobile phone networks
Purpose is to store, forward, convert and deliver
SMS messages
Network element platform
SMTP
Simple Mail Transfer Protocol
Standard for electronic mail transmission
E-mail transmission
MMSC
Multimedia Messaging Services
Standard way to send messages that include
multimedia content to and from mobile phones
Only up to 160 characters in length
Camera equipped handset
MPLS
Multiprotocol Label Switching
Mechanism in high performance telecommunication
networks that directs data from one network node to
next based on short path labels
Speeding up network traffic flow
Combination of routing and switching techniques
Protocol independence transport
Encapsulate packets of various network protocols
CPE
Customer Premises Equipment
CPE device is telecommunications hardware located
at the home or business of a customer
Generally refers to devices such as telephones,
routers, and switches
SS7
Signaling System No.7
Set of telephony signally protocol
Used to set up most of the worlds PSTN telephone
calls
Set up and tear down the telephone calls
56-64 Kbps channel dedicated
Form of circuit switching
Binds all telecom network together
NMS
Network Management System
Remote monitoring and control of the network
If one part affect the rest of network also affect
NMS consist of:
1. Configuration management
2.Fault management
3.Performance management
4.Security management
5.Accounting management
SNMP
Simple Network Management Protocol
Protocol for exchanging information between
management solution and a number of agents
Formatting and storing management information
Cable Modem
Type of network bridge and modern that provides bi-
directional data communication via radio frequency
channels on an optical fiber and coaxial cable
Modem used for connecting to the internet and is
much faster than dial-up modem
Doesn't connect phone line
SSL
Secure Socket Layer
Cryptographic protocols or online security protocols
Provide data encryption and authentication between
applications and servers
Provide communication over the internet
By Port method is commonly referred to as “SSL”
SSL 3.1 is most common
TSL
Transport Layer Security
TSL is new name of SSL
TSL 1.0 is SSL 3.1
By Protocol method is commonly referred as “TLS”
Also cryptographic protocol
HLR
Home Location Register
Database from a mobile network in which
information from all mobile subscriber is stored
It stores subscriber identity, telephone number,
location of subscriber, subscriber status, subscriber
services
It stores permanent data
VLR
Visitor Location Register
Current subset of HLR
Current location is stored in VLR when call
Entity is removed when subscriber leaves that cell
It stores mobile status, temporary mobile subscriber
identity
Business Case
Capturing the reasoning for initiating a project or
task
Well structured written document
Help decision makers to ensure that:
1. Proposed initiative will have value
2.Performance indicators
SDP
Service Delivery Platform
Set of components that provide a services delivery
architecture for a type of services
Roles are manage and sell services
Provide middle ground for exchange of services
between users and service providers
Do not create and deliver services but provides
structure for service delivery
RAS
Remote Access Server
Access to a computer from remote distance
Type of services that allow users to gain access to
files and print services on the LAN from a remote
Location
MTOSI
Multi-Technology Operations System Interface
XML based operation system
Standard for implementing interfaces between OSS
Covers all communication technologies
Purpose is to ease system integration
OSS/J
OSS through JAVA
TM forum technical program whose primary goal is
to develop open interface standards for the
integration of BSS and OSS
OSS/J API’s are multi technology based and include
java, XML, and web services integration profiles

More Related Content

What's hot

Ipt Syllabus Changes Communications Systems
Ipt Syllabus Changes   Communications SystemsIpt Syllabus Changes   Communications Systems
Ipt Syllabus Changes Communications Systems
Liam Dunphy
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
Md Irfan Ansari
 
ISDN Integrated Services Digital Network
ISDN Integrated Services Digital NetworkISDN Integrated Services Digital Network
ISDN Integrated Services Digital Network
Madhumita Tamhane
 
Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyKristina Pesic
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
Jay Kumarr
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2MR Z
 
Networks
Networks Networks
Networks
Honey Mae Llanto
 
Ch4
Ch4Ch4
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
Sopon Tumchota
 
Data Communication
Data CommunicationData Communication
Data Communication
Annumchaudhary
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
Telecommunication network
Telecommunication networkTelecommunication network
Telecommunication network
sohitbasan
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
Basil John
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
DURYODHAN MAHAPATRA
 
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.QuizTransmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
mfridolfson
 
Data and computer communications and circuit switching by narender singh sandhu
Data and computer communications and circuit switching by narender singh sandhuData and computer communications and circuit switching by narender singh sandhu
Data and computer communications and circuit switching by narender singh sandhu
NarenderSinghSandhu2
 
Transmitting And Receiving By Alyce Muldoon And Sarah Bryant
Transmitting And Receiving By Alyce Muldoon And Sarah BryantTransmitting And Receiving By Alyce Muldoon And Sarah Bryant
Transmitting And Receiving By Alyce Muldoon And Sarah Bryant
mfridolfson
 
Networking
Networking Networking
Data communication and networking
Data communication and networkingData communication and networking
Data communication and networking
Dashbo
 

What's hot (20)

Ipt Syllabus Changes Communications Systems
Ipt Syllabus Changes   Communications SystemsIpt Syllabus Changes   Communications Systems
Ipt Syllabus Changes Communications Systems
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
ISDN Integrated Services Digital Network
ISDN Integrated Services Digital NetworkISDN Integrated Services Digital Network
ISDN Integrated Services Digital Network
 
Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technology
 
Communications
CommunicationsCommunications
Communications
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2
 
Networks
Networks Networks
Networks
 
Ch4
Ch4Ch4
Ch4
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Telecommunication network
Telecommunication networkTelecommunication network
Telecommunication network
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.QuizTransmitting And Receiving ( Sim And Han).Pptw.Quiz
Transmitting And Receiving ( Sim And Han).Pptw.Quiz
 
Data and computer communications and circuit switching by narender singh sandhu
Data and computer communications and circuit switching by narender singh sandhuData and computer communications and circuit switching by narender singh sandhu
Data and computer communications and circuit switching by narender singh sandhu
 
Transmitting And Receiving By Alyce Muldoon And Sarah Bryant
Transmitting And Receiving By Alyce Muldoon And Sarah BryantTransmitting And Receiving By Alyce Muldoon And Sarah Bryant
Transmitting And Receiving By Alyce Muldoon And Sarah Bryant
 
Networking
Networking Networking
Networking
 
Data communication and networking
Data communication and networkingData communication and networking
Data communication and networking
 

Viewers also liked

BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.
Shubham Singh
 
D3_Chapter 2_routing and switching in the enterprise
D3_Chapter 2_routing and switching in the enterpriseD3_Chapter 2_routing and switching in the enterprise
D3_Chapter 2_routing and switching in the enterprise
Michele Berner
 
Bsnl training by keshav
Bsnl training  by keshavBsnl training  by keshav
Bsnl training by keshav
Keshav Katiyar
 
PTCL Report final
PTCL Report finalPTCL Report final
PTCL Report final
Syed Muhammad Zaidi
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
Subhash Chandra Tank
 
Bsnl
BsnlBsnl
Training ppt bsnl
Training ppt  bsnlTraining ppt  bsnl
Training ppt bsnl
manish katara
 
New final bsnl training report
New final bsnl training report New final bsnl training report
New final bsnl training report manish katara
 

Viewers also liked (8)

BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.BSNL Industrial Training ppt 2014.
BSNL Industrial Training ppt 2014.
 
D3_Chapter 2_routing and switching in the enterprise
D3_Chapter 2_routing and switching in the enterpriseD3_Chapter 2_routing and switching in the enterprise
D3_Chapter 2_routing and switching in the enterprise
 
Bsnl training by keshav
Bsnl training  by keshavBsnl training  by keshav
Bsnl training by keshav
 
PTCL Report final
PTCL Report finalPTCL Report final
PTCL Report final
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
 
Bsnl
BsnlBsnl
Bsnl
 
Training ppt bsnl
Training ppt  bsnlTraining ppt  bsnl
Training ppt bsnl
 
New final bsnl training report
New final bsnl training report New final bsnl training report
New final bsnl training report
 

Similar to Networking

group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
AshrafulIslam196006
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdf
WendieEscaliente
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
PushpendraSingh483
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_systemSelim Reza
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_systemSelim Reza
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_systemSelim Reza
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Using The Internet7
Using The Internet7Using The Internet7
Using The Internet7guest4a9cdb
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
Data communications
Data communicationsData communications
Data communications
Ashwini
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
Baji Babu
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
Sopon Tumchota
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
MohdSyaifuadJasemi
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
Techglyphs
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Prabakara Pandian
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
Sachin Morya
 

Similar to Networking (20)

group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdf
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_system
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_system
 
Copy of mcse 514 communication_system
Copy of mcse 514 communication_systemCopy of mcse 514 communication_system
Copy of mcse 514 communication_system
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Using The Internet7
Using The Internet7Using The Internet7
Using The Internet7
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Itm 4
Itm 4Itm 4
Itm 4
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communications
Data communicationsData communications
Data communications
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Networking

  • 1. SUPERVISED BY: SIR IMRAN SHABBAR PREPARED BY: NAQASH ZAHEER Internship Presentation
  • 2. OSS Operational Support System Resource side Group of computer programs used by communications service providers for monitoring, controlling, analyzing and managing telephone network system Supporting processes such as maintaining network inventory, provisioning services, configuring network components, and managing faults The four key OSS elements are processes, data, applications, technologies.
  • 3. BSS Business Support System Customer side Dealing with customers, supporting processes such as taking orders, processing bills, and collecting payments Collective term for the telecoms software solutions used to support customers The term encompasses software that supports billing & charging; customer management; product design & management; sales & marketing; order & order activation
  • 4. ESS Enterprise Support System They deal with a range of issues that form the core of enterprise support systems, such as availability of finance, socio-cultural environment, personality dimensions, education systems, enterprise clusters and technology transfer They are software applications They allow for collaboration and communication across the organization through collection of data
  • 5. Resources in Network There are two types of resources: Logical Resources: Logical Resource represents all the characteristics of a device that you can’t physically touch as well as any actions on these logical characteristics. Physical Resources: Physical Resource is anything you can touch which includes the cards, the slots and the ports.
  • 6. AAA Authentication, Authorization, Accounting Refers to security architecture for distributed systems for controlling which users are allowed access to which services, and tracking which resources they have used AAA server is a server program that handles user requests for access to computer resources Two network protocols providing this functionality are particularly popular: the RADIUS protocol and its newer Diameter counterpart
  • 7. Authentication(AAA) who the user is Authentication refers to the process where an entity's identity is authenticated By providing evidence that it holds a specific digital identity Examples of types of credentials are passwords, one- time tokens, digital certificates, digital signatures and phone numbers
  • 8. Authorization(AAA) what the user can do The authorization function determines whether a particular entity is authorized to perform a given activity For example, granting read access to a specific file for a specific authenticated user.
  • 9. Accounting(AAA) what the user did Accounting refers to the tracking of network resource consumption by users for the purpose of capacity and trend analysis, cost allocation, billing It may record events such as authentication and authorization failures It tracks traffic that passes through the security appliance
  • 10. RADIUS Remote Authentication Dial-In User Service client/server protocol Enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport
  • 12. Diameter Diameter is an authentication, authorization, and accounting protocol for computer networks Replaces the much less capable RADIUS Provides an upgrade path for RADIUS Diameter is reliable transport protocols (TCP or SCTP, not UDP)
  • 13. TACACS+ Terminal Access Controller Access-Control System Plus An access control network protocol for routers, network access servers and other networked computing devices
  • 14. TACACS+ Terminal Access Controller Access-Control System Plus An access control network protocol for routers, network access servers and other networked computing devices
  • 15. MDF Main Distribution Frame A Main Distribution Frame (MDF) is the interface between the subscriber cables coming from the local network (line side) and the switching equipment in the exchange (system side) In telephony, a main distribution frame (MDF or main frame) is a signal distribution frame for connecting equipment (inside plant) to cables and subscriber carrier equipment (outside plant). All cable copper pairs supplying services through user telephone lines are terminated at the MDF and distributed through the MDF to equipment within the local exchange e.g. repeaters and DSLAM
  • 17. Horizontal Blocks(MDF) The horizontal blocks terminate the cables between the switch and the MDF Each connection corresponds to a telephone number on the switch The switch engineer shall determine the number of horizontal blocks on the frame. All horizontal blocks shall be stenciled to show the termination IDs.
  • 18. Vertical Blocks(MDF( The vertical connectors are mounted on the vertical side of the MDF Each connector protects 100 or 200 pairs of the OSP cables The connector is equipped with tip cables. The tip cables are routed from the MDF through the floor to the cable vault or over the MDF to the wall, where they are spliced to the OSP cable The connectors for the tip cables shall be provided as either stub-up or stub-down
  • 19. OCS Online charging system System allowing a communications service provider to charge their customers, in real time, based on service usage
  • 20. OSP Outside Plant Refers to all of the physical cabling and supporting infrastructure (such as conduit, cabinets, tower or poles) located between a demarcation point in a switching facility and a demarcation point in another switching center or customer premises acts as the communications equipment located between a main distributions frames (MDF) and a user end instrument
  • 21. ONU Optical Network Unit An Optical Network Unit (ONU) converts optical signals transmitted via fiber to electrical signals To provide telecommunications services over an optical fiber network These electrical signals are then sent to individual subscribers ONU provides the subscribers with broadband Internet access An ONU is used in combination with an optical line terminal (OLT).An optical network unit (ONU) but is located near the customer.
  • 22. OLT Optical Line Terminal Located in a central office and controls the bidirectional flow of information across the network Device which serves as the service provider endpoint of a passive optical network There are 32 ONU’s in one OLT. OLT carries out 10-40 mbps.
  • 24. PON Passive Optical Network System that brings optical fiber cabling and signals all or most of the way to the end user A PON reduces the amount of fiber and central office equipment required compared with point-to-point architectures. A passive optical network is a form of fiber-optic access network. It carries out 2.5 Gbps. It consist of OLT’s
  • 25. SONET Synchronous Optical Networking SONET used in the United States Protocol that is used to transmit a large volume of data over relatively long distances using a fiber optic medium Multiple digital data streams are transferred at the same time over optical fiber using LEDs and laser beams
  • 26. SDH Synchronous Digital Hierarchy Standard technology for synchronous data transmission on optical media Provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) Synchronous means the bits from one call are carried within one transmission frame
  • 27. ISDN Integrated Services for Digital Network Set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network ISDN supports data transfer rates of 64 Kbps (64,000 bits per second). There are two types of ISDN: 1.BRI 2. PRI
  • 28. BRI Basic Rate Interface Consists of two 64-Kbps B-channels and one D- channel for transmitting control information Two channels are used for actual voice or data traffic with each one operating at a rate of 64 KBPS There is a third channel that is used for call supervision (connecting, disconnecting, etc.). This channel operates at a rate of 16 KBPS
  • 29. PRI Primary Rate Interface standardized telecommunications service level within the ISDN specification for carrying multiple voice and data transmissions between a network and a user PRI is the standard for providing telecommunication services to offices The Primary Rate Interface consists of 23 B-channels and one 64 Kbps D-channel using a T-1 line or 30 B- channels and 1 D-channel using an E1 line
  • 30. T1 Most commonly used digital transmission service in the United States, Canada, and Japan It has a data rate of about 1.544 megabits / second It contains twenty four digital channels The scalability of the T1 is up to 200 and above users Broadband telecommunication connection used this especially to connect ISP’s to internets infrastructure Full duplex exchange of data over traditional wire
  • 31. E1 E1 is similar to the T1 E1 is the European term for the transmission The data rate of E1 is about 2 mega bits per second It has 32 channels at the speed of 64 Kbps 2 channels among the 32 are already reserved One channel is used for signaling while the other channel is used for controlling
  • 32. DSLAM Digital Subscriber Line Access Multiplexer Network device Often located in telephone exchanges Connects multiple customer digital subscriber line (DSL) interfaces to a high-speed digital communications channel using multiplexing techniques
  • 33. SMPP Short Message Peer to Peer Used in Mobile phones Sending and receiving medium of SMS messages SMPP is a standard protocol designed to provide flexible data communication interface for the transfer of short messages between external short messaging and message centre's Used as a third party
  • 34. SMTP Simple Mail Transfer Protocol Internet standard for the electronic mail transmission
  • 35. FTP File Transfer Protocol Network protocol for transfer files from one host to another host over TCP based network
  • 36. FTAM File Transfer Access Method(Management) An ISO standard that specifies methods of transferring files between networked computers Similar to FTP and NFS
  • 37. Network Elements Logical entities uniting one or more physical devices An equipment used in provisioning of a telecommunication services Telephone, routers computer clusters
  • 38. MML Man Machine Language Specific language Define to standardize the interfaces for managing a telecommunications from a console
  • 39. SOAP Simple Object Access Protocol XML based protocol for accessing web services Protocol specification for exchanging structure information in the implementation of web services in computer networks
  • 40. NGN Next Generation Network Packet based network One network transport all information and services by encapsulating these in to packets Also known as “all-IP” It is active network (electricity required)
  • 41. GPON Gigabit Passive Optical Network High bandwidth Point to multipoint access From one single fiber from provider central office to serve multiple homes and small business 2.5 Gbps downstream 1.2 Gbps upstream
  • 42. DOCSIS Data Over Cable Service Interface Specification International telecom standard that permits the addition of high speed data transfer to an existing cable system Cable modem standard Downstream traffic transfer rate is between 27- 36Mbps
  • 43. Synchronous Transmission Asynchronous Transmission Consistent and continuous transfer of data blocks Faster No start no stop bit Communication over telephone lines Not consistent Slower Bit 1 for start and 0 for stop SONET and Ethernet Synchronous Vs Asynchronous
  • 44. SMSC Short Message Service Center Network element in mobile phone networks Purpose is to store, forward, convert and deliver SMS messages Network element platform
  • 45. SMTP Simple Mail Transfer Protocol Standard for electronic mail transmission E-mail transmission
  • 46. MMSC Multimedia Messaging Services Standard way to send messages that include multimedia content to and from mobile phones Only up to 160 characters in length Camera equipped handset
  • 47. MPLS Multiprotocol Label Switching Mechanism in high performance telecommunication networks that directs data from one network node to next based on short path labels Speeding up network traffic flow Combination of routing and switching techniques Protocol independence transport Encapsulate packets of various network protocols
  • 48. CPE Customer Premises Equipment CPE device is telecommunications hardware located at the home or business of a customer Generally refers to devices such as telephones, routers, and switches
  • 49. SS7 Signaling System No.7 Set of telephony signally protocol Used to set up most of the worlds PSTN telephone calls Set up and tear down the telephone calls 56-64 Kbps channel dedicated Form of circuit switching Binds all telecom network together
  • 50. NMS Network Management System Remote monitoring and control of the network If one part affect the rest of network also affect NMS consist of: 1. Configuration management 2.Fault management 3.Performance management 4.Security management 5.Accounting management
  • 51. SNMP Simple Network Management Protocol Protocol for exchanging information between management solution and a number of agents Formatting and storing management information
  • 52. Cable Modem Type of network bridge and modern that provides bi- directional data communication via radio frequency channels on an optical fiber and coaxial cable Modem used for connecting to the internet and is much faster than dial-up modem Doesn't connect phone line
  • 53. SSL Secure Socket Layer Cryptographic protocols or online security protocols Provide data encryption and authentication between applications and servers Provide communication over the internet By Port method is commonly referred to as “SSL” SSL 3.1 is most common
  • 54. TSL Transport Layer Security TSL is new name of SSL TSL 1.0 is SSL 3.1 By Protocol method is commonly referred as “TLS” Also cryptographic protocol
  • 55. HLR Home Location Register Database from a mobile network in which information from all mobile subscriber is stored It stores subscriber identity, telephone number, location of subscriber, subscriber status, subscriber services It stores permanent data
  • 56. VLR Visitor Location Register Current subset of HLR Current location is stored in VLR when call Entity is removed when subscriber leaves that cell It stores mobile status, temporary mobile subscriber identity
  • 57. Business Case Capturing the reasoning for initiating a project or task Well structured written document Help decision makers to ensure that: 1. Proposed initiative will have value 2.Performance indicators
  • 58. SDP Service Delivery Platform Set of components that provide a services delivery architecture for a type of services Roles are manage and sell services Provide middle ground for exchange of services between users and service providers Do not create and deliver services but provides structure for service delivery
  • 59. RAS Remote Access Server Access to a computer from remote distance Type of services that allow users to gain access to files and print services on the LAN from a remote Location
  • 60. MTOSI Multi-Technology Operations System Interface XML based operation system Standard for implementing interfaces between OSS Covers all communication technologies Purpose is to ease system integration
  • 61. OSS/J OSS through JAVA TM forum technical program whose primary goal is to develop open interface standards for the integration of BSS and OSS OSS/J API’s are multi technology based and include java, XML, and web services integration profiles