68
SEMINAR ON BSNL EETP TRAINING NALANDA INSTITUTE OF TECHNLOGY Presented by: Amir Mustafa Registration No: 1101297141

Seminar on BSNL-EETP

Embed Size (px)

Citation preview

Presentation on: Modern Broad

SEMINAR ON BSNL EETP TRAININGNALANDA INSTITUTE OF TECHNLOGYPresented by: Amir MustafaRegistration No: 1101297141

1

(D)Optical Fiber Technology(OFT)MODULES

(A) Digital Switching System(DSS)(B) Digital Transmission System(DTS)(C)Telecom Support Infrastructure(TSI)(G)Information and Cyber Security(F)Mobile Communication(E)Broadband Technology

(A) DIGITAL SWITCHING SYSTEM

A Telecommunication Network:This network allows us to speak or send faxes or other data is an aggregation of interconnected networks of different types.

A telecommunication consists of three subsystems:TransmissionSwitchingSignaling

Public Switched Telephone Network(PSTN):Components of PSTN Network: Customer Premises Equipment(CPE) Distribution Point External Plant Structure in Local Telephone Exchange SystemSubscriber LineDirect Junction CircuitMain Distribution Frame(MDF)

Signaling:Signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.

Customer Line SignalingConditions:1. Idle: no current 2. Busy: line current 3. Calling or answering: change from idle to busy 4. Clearing (i.e., disconnecting at the end of a call): change from busy to idle

Channel-associated Signaling 1.Call request or seize (forward) 2.Address signal (forward) 3. Answer (backward) 4.Clear (forward and backward)

Common-channel Signaling 1.Signals can be exchanged much more quickly than with channel-associated signaling.

2. A much wider variety of signals can therefore be used. As a result, customers can be offered more services.

3. Signals may be sent while a call is in progress. This enables customers to alter connections that have already been set up (e.g., to transfer a call elsewhere or to enable an additional party to join in).

4. Signals can be exchanged between processors for purposes other than call processing (e.g., for maintenance or network management functions).

Facilities Offered by Electronic Exchanges:1. Facilities to the Subscribers:Abbreviated DialingCall ForwardingDo Not Disturb(DND)Conference CallsCall WaitingHotline2. Facilities to the AdministrationReduced Switch Mode AccommodationFaster Installation and Easy ExtensionAutomatic Test of Subscriber Line3. Facilities to the Maintenance PersonnelFault ProcessingDiagnosticsStatistical ProgramsBlocking and Overloading Security

(B) DIGITAL TRANSMISSION SYSTEM(DTS)

Evolution of Transmission SystemsOpen Wire SystemCoaxial SystemMicrowave SystemDigital Transmission SystemOptical Fiber SystemSatellite System

Transmission Fundamentals Transmission ImpairmentAttenuation, Noise and Distortion Signal to Noise Ratio(SNR) Digital Performance ParametersBit Error Ratio(BER)JitterQuality ParametersError Seconds(ES)Severely Error Seconds(SES)Non Severely Error Seconds(NSES)Degraded Minutes(DM)

Types of MultiplexingSpace Division MultiplexingFrequency Division MultiplexingTime Division MultiplexingCode Division Multplexing

Components of Transmission NetworkDigital Distribution Frame(DDF)Fiber Distribution Frame(FDF)Transmission Equipments Transmission Lines-Optical Fiber Microwave Stations MultiplexersConnectors

Devices used in Transmission SystemsFilters Passive Filters: 1. Low Pass Filter 2. High Pass Filter 3. Notch/Band Reject Filter Active Filters: Amplifying elements such Om-Amp Digitals Filters Quartz Filters and Piezoe Electrics SAW(Surface Acoustic Wave)Filter BAW(Bulk Acoustic Wave)

17

Atomic FiltersOptical FiltersWaveguides and Transmission Lines: 1.Coaxial Transmission Lines-Band upto 2GHz& 2.2 cm diameter 2. Waveguides- Band higher than 2GHz 3. Rectangular Guides-Bands are 4Ghz, 6Ghz, 7 to 8 Ghz, 11 Ghz, 12 to 13 Ghz 4.Circular guide 5.Elliptical Guide

Antennas:

AmplifiersValve amplifierTransistor amplifiersOp-AmpsFully Differential amplifierVideo amplifiersOscilloscope vertical amplifiersDistributed amplifiersSwitched mode amplifiersMicrowave amplifiersTravelling Wave tube amplifiersKlystronsMusical instrument amplifiersOptical amplifiersSemi-conductor optical amplifiersErbium-doped fiber amplifierRaman amplifier

FTTX(Fiber to the X)FTTH(Fiber To The Home)FTTC(Fiber to the Curb)FTTB(Fiber to the Building)

Services on FTTH NetworkTV over IP Service (MPEG2).Video on Demand (VoD)Audio on Demand ServiceBandwidth on Demand (User and or service configurable)Remote EducationPoint to Point and Point to Multi Point Video Conferencing, virtual classroom.Interactive Gaming.VPN on broadbandVirtual Private LAN Service (VPLS)

24

Wave Division Multiplexing(WDM)WDM systems are wide-spread with 2, 4, 8, 12, and 16 channel counts being the normal deployments. This technique usually has a distance limitation of less than 100 km.WDM are of two types : CWDM(Coarse WDM):It typically uses 20-nm spacing (3000 GHz) of up to 18 channels. It is made up of 18 wavelengths defined within the range 1270 nm to 1610 nm spaced by 20 nm. DWDM(Dense WDM): common spacing may be 200, 100, 50, or 25 GHz with channel count reaching up to 128 or more channels at distances of several thousand kilometers.

(C)TELECOM SUPPORT INFRASTRUCTURE(TSI)

Components of TSI

These are some of the components:SMPS (SWITCHED MODE POWER SUPPLY) POWER PLANT: It is used to rectify the ac input supply to desired output dc (-48v). It has following advantages over conventional methods 1. Average size 2. Light weight 3. Higher Efficiency 4. Scope for Modular ExpansionBATTERY: Battery used in mobiles are VRLA (Valve Regulated Lead Acid Battery) Generally life of battery is 1. Batteries up to 200AH: 4 Years 2. Batteries more than 200 AH: 6 years INVERTERS: 1. In most of the telecom installations, inverters are installed to provide uninterrupted AC supply to OMC terminals . 2. Capacity of invertors used varies from 1KVA to 10KVA

ENGINE ALTERNATOR: 1. This is another backup for uninterrupted power supply. 2.Capacity of invertors used varies from 1KVA to 10KVA

EARTHING: It plays a vital role in the protection of equipment and the personnel. It also helps in the following purposes: 1.Reduction of Crosstalk and Noise 2.Protection of costly apparatus and persons against foreign voltages and leaa.leakage currents from power wirings touching the metallic frame of the equi equipment 3.Protection of buildings and equipments from lightning strikes. AIR- CONDITIONING SYSTEM:

These are used to maintain different temperature for different equipment These are of following types: 1. Window Type Units 2. Split Type Units. 3. Package Type unit 4. Central Air-conditioning System

FIRE SAFETY : These are used for the protection of equipments as well as humans.TOWERS: These are of two types: 1. Ground-Based Tower(GBT) : Mostly installed in rural areas and semi urban areas It is typically 200 to 400 feet It is also called 4 leg tower 2. Roof Top Tower(RTT): These are installed in urban and highly populated areas. These are shorter than GBT(about 50 to 150 feet) It is also called 3 leg towerSHELTERS: These are small building that contains the major telecom equipment located well awaaway from the main power lines. They hold backup power and heat management.

(D)OPTICAL FIBER TECHNOLOGY An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to transmit light between the two ends of the fiber. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference.

Fiber-Optic Applications Fiber optic interconnects. Fiber optic networking. Gigabit Ethernet. Data transfer tests.Fiber optics for data storage equipments.Premise networkBroadcast fiber opticsAutomotive fiber opticsFiber optics for sensingFTTXHDTVCATV Fiber optics

Advantages of Optical Fiber Communication Wider bandwidth: 10^13 to 10^15 HzLow transmission lossDielectric waveguideSignal securitySmall size and weight.Basic Optical Fiber Communication System Information is encoded into Electrical Signals. Electrical Signals are converted into light Signals. Light Travels down the Fiber. A Detector Changes the Light Signals into Electrical Signals. Electrical Signals are decoded into Information.

Principles of Operations:The basic law of light depends on Snells LawEquation for Snells Law is where, n1 and n2 are different dielectric mediumsPropogation of Light through Fiber:

Types of Fibers:There are three types of Fibers:Step Index Fiber: These have large core(about 100 microns in diameter) The light ray easily travels and those are zig-zag bounces off cladding

Graded Index Fibers: It contains a core in which the refractive index diminishes gradually from the center axis out toward the cladding .

Single Mode Fiber: It has a narrow core (eight microns or less). Light thus travels parallel to the axis, creating little pulse dispersion

Splicing:Splices are permanent connection between two fibres. The splicing involves cutting of the edges of the two fibres to be spliced. This cut has to be carefully made to have a smooth surface and is generally achieved by a special cutting tool. There are two types of Fiber Splicing: 1. Mechanical Splicing 2. Fusion SplicingMechanical Splicing: Mechanical splicing doesnt physically fuse two optical fibers together, rather two fibers are held butt-to-butt inside a sleeve with some mechanical mechanism. Used for emergency repairs and fiber testing. Fusion Splicing:In fusion splicing, two fibers are literally welded (fused) together by an electric arc.

(E)BROADBAND TECHNOLOGY:The termbroadbandrefers to the widebandwidth characteristics of atransmission mediumand its ability to transport multiple signals and traffic typessimultaneously.The medium can becoax,optical fiber,twisted pairorwireless.Broadband refers to a communication bandwidth of at least 256 kbit/s

Components of Broadband Access Technologies

Broadband Remote Access Server(BBRAS). Gigabit & Fast Ethernet Aggregation Switches(LAN Switches). Digital Subscriber Line Access Multiplexers (DSLAMs). SSSS/SSSC (Subscriber Service Selection System/ Centre). DSL CPEs (MODEM).

IP4 Addressing: Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol(IP). The IPv4 address is 32 bits long. In decimal the address range is 0.0.0.0 to 255.255.255.255.It is of the form IPv4 Addressing Scheme Classful Classless

ADSL(Asymmetric Digital Subscriber Line )

Digital Subscriber Line (DSL) is a broadband high speed Internet technology that brings high-bandwidth information to home & offices over existing twisted-pair telephone lines as the access media. The word "asymmetric" means that the capacity to send data upstream and downstream is not equivalent. Downstream channel(ranges from 1.5 to 8 Mbps) Upstream channel(ranges from 16 kbps to 1 Mbps).

Common Elements of ADSL:

Key Features DSL:Distance-sensitive technology.Internet connection is always ON.Simultaneous use of the phone line for voice as well as data traffic.Internet Connection is highly reliable and secure.High Speed (Mbps).

ADSL(Contd..)

The Broadband service are available on DSL technology (on the same copper cable that is used for connecting telephone). Services available through broadband are: High speed Internet Access. Bandwidth on Demand.Multicasting.Dial VPN Service.Video and Audio Conferencing.Video on Demand.Audio on Demand.TV channels through broadband connection

Broadband Services

The different Broadband access technologies are: Landline Broadband Dial-up Broadband Mobile Broadband(3G/4G) EVDO( Evolution of Data only) Wi-Max FTTH(Fiber to the Home)

Broadband Access Technologies

Wi-Max stands for Worldwide Interoperability for Microwave Access. IP based Wireless Broadband Access Technology. There are three types of Customer Premises Equipment-Indoor equipment,Dongle equipment and Outdoor equipment. Range of Wi-Max is 15 Kms for Rural area (LOS) and 4 Kms for Urban area. Broadband access speeds ranging from 256 Kbps to 2 Mbps.

Wi-Max

1.First we will ping the connectivity between Computer and Wi-max CPE.

Some replica of Wi-Max connection:

2. If Login window appears . Enter admin as user id and password. Press enter

3. If Login window appears . Enter admin as user id and password. Press enter. Check status-Device status

Convenience: Can be easily accessed in home, office. No Wire Required. Quick setup & activation. Quality Connection.

Benefits of Wi-Max:

(F)MOBILE COMMUNICATION

Two aspects of mobility:user mobility: users communicate (wireless) anytime, anywhere, with anyonedevice portability: devices can be connected anytime, anywhere to the networkHandover:A handover takes place during a call, i.e. when the mobile phone is in active (dedicated) mode. Location Update:The process, where the mobile phone informs the network about its new location is called Location Update Procedure (LUP). The registration of the Mobile is done at the VLR (Visitor Location Register) associated with the Mobile Switching Network.

Mobile Handset

The mobile handset is the only mobile part in the mobile communication system. A mobile phone (also known as a cellular phone or cell phone) is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. Common components found on all phones:

An input mechanism to allow the user to interact with the phone. Most common input mechanism is a keypad, but touch screens are also found in some high-end Smart phones. Antenna to transmit and receive RF signals. Display: Today, we have displays of different sizes and Compositions

Associated Terms: AMOLED, LCD, Super LCD, Retina, PPI, Clear Black. Processor: The processor is the engine that drives phone. As phones become more powerful, processors are getting into dual core and quad core territory.

Associated Terms: Dual Core, Quad Core, 800 MHz, 1/1.2/1.5GHz, Snapdragon, Tegra, Intel, Qualcomm. RAM: The RAM allows the phone to run multiple applications simultaneously and do various tasks in the background.

Associated Terms: 256 MB, 512 MB, 768 MB, 1 GB

Camera: Once considered a luxury in Smartphones, the Camera is now an integral part of Smartphones.

Associated terms: 3.2/5/8/12/41 Megapixels, Auto Focus, Shooting Modes, HD video, LED/Xenon flash. Battery: The battery (with a capacity expressed in mAh or milli ampere hour)

determines how long your phone keeps working on a single charge. Associated terms: Li-ion, mAh, removable, non-removable. Device Connectivity: There are various wired and wireless technologies embedded today on mobile devices to connect them with other phones, tablets, televisions or various accessories.

Associated terms: USB On-The-Go, HDMI, Bluetooth 2.0/2.1/3.0, Wi-Fi. Mobile Internet Connectivity: Phones are no longer used to just make calls and swap texts. Almost every Smartphone now comes with some sort of Internet connectivity via the operator's data services.

Associated terms: GPRS/EDGE , 3G, 3.5G , HSPA, HSDPA, 4G.

OS/Platform : Windows, Macintosh, Android, Linux etc.SIM (SUBSCRIBER IDENTITY MODULE) :A SIM is an integrated circuit that securely stores the Information related to the subscribers identity which is used to identify and authenticate the subscriber within the GSM Networks. What is inside the SIM? Hardware: CPU, I/O Devices, ROM, RAM, EEPROM Software: IMSI, PIN, PUK, Authentication Keys e.g. Ki, Kc, Algorithms like A3, A8. IDENTIFIERS :The Handset and SIM are identified in the network with a set of identifiers. The Handset is identified with IMEI (International Mobile Equipment Identity). Whereas SIM is identified with ICCID (Integrated Circuit Card Identifier) and IMSI (International Mobile Subscriber Identity).

GSM Network Architecture:A GSM network comprises of various subsystems as described below: (1) Mobile Station (MS): Comprises Mobile Handset and SIM (Subscriber Identity Module) (2) Base Station Subsystem (BSS): BTS - Base Transceiver Station BSC - Base Station Controller (3) Network Switching Subsystem (NSS): MSC - Mobile Switching Centre VLR - Visitor Location Register HLR - Home Location Register AuC - Authentication Centre EIR - Equipment Identity Register (4) OSS - Operation & Support Subsystem (5) Important Interfaces: Interface Interfacing Nodes Um - MS and BTS Abis - BTS and BSC A - BSC and MSC

GSM Frequency Bands:

58

(G) INFORMATION & CYBER SECURITY

Management of Information and its SecurityNetworking System is used for sharing information among the users

INTRODUCTION SECURITY COMPONENTS :

Information Security Components/ Qualities are (CIA) :Confidentiality - Preventing disclosure of information to unauthorized individuals or systems Integrity - Data shall not modified without authorization. Availability - Information must be available when it is needed

SOURCES OF INFORMATION FOR INTRUDERS Intruder can hack your Information by using techniques such as:- Dumpster diving Social Engineering Information System Networked PCsTYPES OF ATTACKS ON INFORMATION SYSTEM : Malicious Code Attacks Known Vulnerabilities Configuration Errors

INDICATION OF INFECTIONS: Poor System Performance Crashing of Applications Abnormal System Behavior Unknown Services are running Change in file extension or contents Automatic shutdown of System System Not Shutting Down Hard Disk is Busy

FRAMEWORK FOR INFORMATION SECURITY:

CYBER SECURITY :

NETWORK SCENARIO :LAN WAN INTERNET INTRANET Network Elements Communication Links Client Server Middleware, Workgroup, Cloud OS, Applications (Web based), Databases, Protocols Services

HACKER:hacker who breaks into your computer could Delete your files, Read your documents, View your passwords or crash your system. A hacker can do by using a Malware.

SECURITY THREATS : High profile virus attacks in the recent past have forced a few businesses to shut down connections to the Internet. New viruses and malicious code are used to commit cybercrime and criminal acts.It pays to be aware of the various security threats. Viruses Worms Trojan Horses Spam Location Of Defense Perimeter Defense Host Defense Application & Data Server Defense

ATTACK PROCESS AND TOOLS 1.Spoofing 2.Phishing 3.Denial of Services 4.Spyware 5.Keylogger 6.Zombie computer 7.Information Disclosure 8.Elevation of Privilege

THANK YOU