Documente Academic
Documente Profesional
Documente Cultură
Data Communication
The term data communication means communication at a distance. The word data refers to
information presented in whatever form is agreed upon by the parties creating and using the
data. Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
1.1 Components of data communication:Data communication is made up of five components:
Message
Sender
Receiver
Medium
Protocol
1.2 Line configuration:It refers to attached to a link the way two or more communication devices attach to a link. A
link is the physical communication pathway that transfers data from one device to another.
There are two possible line configurations.
Multipoint: - It is the one in which more than two specific devices share a single link.
CTIEMT/1141478/2011-2015
Figure1.2:-Line configurations
1.3 Topology: It refers to the way network is laid out, either physically or logically. Two or more devices
connected to a link, two or more links form a topology.
Categories of topology:1.3.1 Mesh topology:-In this type of topology every device has a dedicated point to point
link to every other device.
CTIEMT/1141478/2011-2015
1.3.2 Star topology: - In this type of topology each device has a dedicated point- to-
point
CTIEMT/1141478/2011-2015
1.4 Transmission mode:The term transmission mode is used to define a direction of signal flow between two linked
devices. There are the three types of transmission modes:1.4.1 Simplex: - The communication is unidirectional as on a one way street. Only one
the two stations on a link can transmit, the other can only receive.
Figure1.4.1:-Simplex Mode
Figure1.4.2:-Half-duplex Mode
1.4.2 Half-duplex: - in this, each station can both transmit and receive but not at the same
time.
1.4.3 Full-duplex: - In it, both stations can transmit and receive simultaneously.
CTIEMT/1141478/2011-2015
Metropolitan area network (MAN):-It is designed to extend over an entire city. A man may
be owned and operated by a private company, or it may be a service provided by a public
company, such as a local telephone company.
CTIEMT/1141478/2011-2015
1.6.2 REPEATER:- A repeater is an electronic device that receives a signal and retransmits
it at a higher power level, or to the other side of an obstruction, so that the signal can
cover longer distances without degradation. In most twisted pair Ethernet
configurations, repeaters are required for cable which runs longer than 100 meters
Figure1.6.2:-Repeater
1.7 IP ADDRESSING
Each computer must have an IP address before it can connect to the Internet. Each IP packet
must have an address before it can be sent to another computer. Addressing is a fundamental
aspect of the communication process between two or more entities. It provides the means to
identify information sources and destinations while enabling dedicated resources to
appropriately link the two groups together. The Internet Architecture is based on the Internet
Protocol (IP). This protocol connects different network elements like router, servers, hosts,
computers, RFID devices, mobile phones, sensors etc. This protocol specifies that each device
should have a unique address to communicate globally with other devices on the Network. This
address is known as the IP Address. The IP address is also known as Protocol address. IP
addresses represent a finite resource used in identifying hosts within private or global networks.
The structure and allocation mechanisms of IP addresses are relevant in designing, deploying,
and operating IP networks.
1.7.1
ROLE OF IP ADDRESS: -
An IP address is used to identify any device that originates or receives a request or a message
over networks and the Internet (which comprises a very large group of networks). Each IP
address uses a unique set of hexadecimal characters to identify a network, a sub network (if
applicable), and a device within the network. An IP Address Contains four Numbers. Each
computer must have a unique IP address. This is your IP address: 59.95.160.151 32 Bits = 4
Bytes. A computer byte can contain 256 different values: 00000000, 00000001, 00000010,
00000011, 00000100, 00000101, and all the way up to 11111111. Now you know why a
TCP/IP address is four numbers between 0 and 255. An IP address enables the request or
message to be delivered to the correct destination. The receiving device to know where the
request or message originated and where to send a response if one is required.
6
CTIEMT/1141478/2011-2015
CHAPTER 2 GSM
Introduction to Mobile Communication
2.1
Figure2.1
The connectivity from exchange to customer premises is called Access Network or Local
Loop, and mostly comprises of underground cable from exchange up to DPs and insulated
copper wires (Drop Wires)later on This type of Access Network does not require separate
Authentication of customer before extending services. Whenever the cable capacity has reached
the maximum additional cable is laid to augment the capacity. Even though there are
advantages in introducing wireless connectivity in Subscribers loop, we have to tackle certain
issues Viz,
1. Duplexing methodology.
2. Multiple Access methods.
3. Cellular principle or reuse concept.
4. Techniques to cope with mobile environment.
Duplexing Methodology:
Duplexing is the technique by which the send and receive paths are separated over the medium,
since transmission entities (modulator, amplifiers, demodulators) are involved.
There are two types of duplexing.
CTIEMT/1141478/2011-2015
c
f
t
Figure2.2
FDMA Analogy
It may be easier to visualize FDMA by imagining a cocktail party where two people wish to
converse with each other. Then everyone in the room must be silent except for the speaker. The
speaker may talk as long as they wish, and when they finish someone else may start speaking,
but again only one at a time. New speakers must wait (or find another party) for the current
speaker to finish before starting. Everyone in the room can hear and understand the speaker,
unless they are too far away or the speaker's voice is too soft. If the intended listener is close
enough, the speaker may decide to whisper. Conversely, if the listener is too far away, the
speaker may have to shout. Since no one else should be talking, this presents no problem. If
someone talks out of turn, the listener will probably be confused and not be able to understand
either speaker.
Features Of Frequency Division Multiple Access (FDMA)
The transmission is simultaneous and continuous and hence duplexers are needed.
Continuous transmission leads to shortening of battery life.
CTIEMT/1141478/2011-2015
TDMA Analogy
In TDMA, everyone in the room agrees to watch a clock on the wall, and speak only during a
particular time. Each person wishing to talk is given a set period of time, and each person
listening must know what that time period will be. For example, everyone may agree on time
slots with duration of ten seconds. Speaker number one may talk for ten seconds starting from
the top of the minute. The listener who wishes to hear this speaker must also be made aware of
the schedule, and be ready to listen at the top of the minute. Speaker number two may speak
only from ten seconds after the minute until twenty seconds after. As with FDMA, only one
person at a time may speak, but each speaker's time is now limited and many persons may take
their turn. If someone in the room cannot see the clock, they will not be able to speak and will
have great difficulty understanding the speakers.
Features of TDMA
There can be only one carrier in the medium at any time, if a simple TDMA scheme is
followed.
10
CTIEMT/1141478/2011-2015
11
CTIEMT/1141478/2011-2015
Coverage Offered by CDMA System is more compared to TDMA and FDMA systems.
Capacity of CDMA System is more compared to TDMA and FDMA systems.
Duplexing and Multiple Access Techniques in use:
No
1
2
3
2.2
Name of System
GSM
CDMA
Cor-DECT
Multiple Access
FDMA-TDMA
CDMA
TDMA-multi carrier
Table2.1
Duplexing
FDD
FDD
TDD
Cellular Concepts:
Even though multiple access techniques allowed multiple users to share the medium
simultaneously, due to constraints in providing resources, an amount of blocking will exist. The
amount of blocking is called Grade Of Services(GOS). Based on GOS and resource
availability (no. of carriers/no. of timeslots/both) the traffic handling capacity of the system is
calculated. If this total traffic is divided by traffic per subscriber, we get number of subscribers
supported by the system. For these purposes Erlang B table (Blocking calls cleared) is useful
particularly in FDMA-TDMA.
What is a cell?
A cell is a base transceiver service area as seen by the mobile station (MS). A cell uses a
specific set of frequencies.
Main cell types
The two main cell types are:
12
CTIEMT/1141478/2011-2015
Omni cells: An Omni cell is a cell where the antenna transmits Omni-directional. The
coverage area of an Omni cell is in principle a hexagon/circle, but in reality a rough
pattern.
Sector cells: A sector cell is a cell where the antenna transmits directional.
Examples of sector cell types are:
- 2-sector cells (e.g. for highways)
- 3-sector cells.
The following figure shows examples of different cell types.
Figure2.3
Sector vs. Omni cells
Advantages of sector cells are (compared to Omni cells):
Increased coverage area per site (by the use of higher gain antennas)
CTIEMT/1141478/2011-2015
Coverage probability
The two -102 dBm 95% signal contours for cell site 1 and 2 coincide in the intersection points
A and A (see figure below). In these points the probability that at least one of the two signals
is -102 dBm or better equals:
P(x -102dBm) = 1- (1- 0.95)(1- 0.95) = 99.75%, assuming that the distributions for both
signals are independent. In the shaded area this probability will even be higher. The following
figure shows an example of a cell overlap region.
Handover neighbor cell signal must be stronger than the serving cell by approximately
the handover margin (e.g. 3-5 dB)
Hysteresis is included to avoid repeated ping pong handovers. To avoid this, handover
parameters do specify:
- a power budget difference between old and new cell during a certain time (default 6
dB).
- a minimum time between an unsuccessful handover and a retry (default 5 sec). Retries after unsuccessful handovers are only carried out after this time period.
14
CTIEMT/1141478/2011-2015
CHAPTER 3 BROADBAND
In telecommunications, broadband is wide bandwidth data transmission with an ability to
simultaneously transport multiple signals and traffic types. The medium can be coaxial
cable, optical fiber, twisted pair, or wireless broadband (wireless broadband includes Mobile
broadband). In contrast, baseband describes a communication system in which information is
transported across a single channel. Different criteria for "broad" have been applied in different
contexts and at different times. Its origin is in physics, acoustics, and radio systems
engineering, where it had been used with a meaning similar to "wideband". Later, with the
advent of digital telecommunications, the term was mainly used for transmission over multiple
channels. Whereas a passband signal is also modulated so that it occupies higher frequencies
(compared to a baseband signal which is bound to the lowest end of the spectrum, see line
coding), it is still occupying a single channel. The key difference is that what is typically
considered a broadband signal in this sense is a signal that occupies multiple (non-masking,
orthogonal) passbands, thus allowing for much higher throughput over a single medium but
with additional complexity in the transmitter/receiver circuitry. Finally, the term became
popularized through the 1990s as a marketing term for Internet access that was faster
than dialup access, the original Internet access technology, which was limited to 56 kbit/s. This
meaning is only distantly related to its original technical meaning. In telecommunications,
a broadband signaling method is one that handles a wide band of frequencies. Broadband is
a relative term, understood according to its context. The wider (or broader) the bandwidth of a
channel, the greater the information-carrying capacity, given the same channel quality.
3.1 LAN Setup
Preparation of Straight Cable used for Dissimilar devices such as PC and Switch.
a) Cut required length of cat 5 cable with Wire stripper or facility available in Crimping tool.
b) Get the cat5 cable properly stripped at both ends with help of Wire stripper or facility
available in Crimping tool. And Study internal Structure of cable.
c) Arrange the wires as per the colour code using T568 B Standard (or it is also called EIA 568
B standard) given on both sides for preparing straight cable. for both the ends. Unwind and
pair of the similar colours.
d) Get RJ 45 connector and find PIN No 1 on it.
e) Pinch the wires between your fingers and straighten them out as shown. (The wire colors line
up to form a straight through standard cat 5 cable as described below). Use scissors to make a
straight cut across the wires 1/2 Inch from the cut sleeve to the end of the wires.
f) Push the wires into the connector. Note the position of the blue plastic shielding. Also note
how the wires go all the way to the end.
g) View from the top. All the wires are all the way in. There are no short wires.
15
CTIEMT/1141478/2011-2015
h) CRIMPING THE CABLE ... carefully place the connector into the Ethernet Crimper and
cinch down on the handles tightly. The copper splicing tabs on the connector will pierce into
each of the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for
a tight compression fit. When you remove the cable from the crimper, the cable is ready to use.
i) Repeat all steps on the other end of the Ethernet cable exactly. There is no need to reverse
any order of the wires.
j) Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does
this quite well.
3.2 Preparation of cross cable used for Similar devices
a) Repeat all steps in (a) and (b) with new cable of required length.
c) Arrange the wires as per the color code using T568 B Standard (or it is also called EIA 568
B standard) on one end and T568 A Standard (or it is also called EIA 568 A standard) on
another end.
Figure3.1
d) Get RJ 45 connector and find PIN No 1 on it.
e) Pinch the wires between your fingers and straighten them out as shown. (The wire colors line
up to form a straight through standard cat 5 cable as described below). Use scissors to make a
straight cut across the wires 1/2 Inch from the cut sleeve to the end of the wires.
f) Push the wires into the connector. Note the position of the blue plastic shielding. Also note
how the wires go all the way to the end.
g) View from the top. All the wires are all the way in. There are no short wires.
h) CRIMPING THE CABLE ... carefully place the connector into the Ethernet Crimper and
cinch down on the handles tightly. The copper splicing tabs on the connector will pierce into
each of the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for
a tight compression fit. When you remove the cable from the crimper, the cable is ready to use.
16
CTIEMT/1141478/2011-2015
i) Repeat all steps on the other end (Use cable pair as per standard T568 A)
j) Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does
this quite well.
k) Cross cable will be as below
Figure3.2
3.3 Make connections at customer premises
- Observe & identify different ports on ASDL modem, splitter & PC. Connect the Telephone
Line to ADSL Modem & Phone instrument using splitter:a) Connect Telephone line coming from Telephone Jack/LJ unit to the Splitter port labeled as
LINE.
b) Connect RJ-11 Telephone cable coming from Telephone Instrument to the Splitter port
labeled as PHONE .
c) Connect RJ-11 Telephone cable coming from Modem to the Splitter port labeled as
MODEM.
- Check the status of connectivity
a) Test the telephone for dial tone
b) Check the status of DSL lamp on ADSL modem- Lamp should glow in case of proper
connection.
- Interchange any two of the above mentioned connections from Splitter. Broadband will not
work, if LPF & HPF outputs of splitter are interchanged.
- Connect telephone instrument first using a phone socket. Now from this socket, connect
splitter. Now connect ADSL modem & PC.
- Connect Broadband and start surfing and make an incoming call to the number on which
Broadband connection is working. With incoming call, Broadband will get disconnected.
- Try to connect parallel telephones
(1) Phone Socket (2) Phone (3) Phone (4) RJ-11 Tel Cable (5) Splitter (6) RJ-11 Tel Cable (7)
RJ-11 Tel Cable (8) Phone Jack (9) Modem
17
CTIEMT/1141478/2011-2015
Figure3.3
Identify the following components of the xDSL tester:a) LCD Display
b) LEDs for alarms/faults etc.
c) Keypad
d) Interface connectors (on the bottom)
e) Water Resistent Cover
f) External Power Supply/Battery charger
g) Serial Port connector
h) Battery pack cover
i) On/Off switch
- Switch on the tester using On/Off switch.
a) Examine all the 6 LEDs being tested by tester during booting, that may help you identify
any LED which is not working.
b) Wait till the tester completely boots up.
c) Once the tester is booted, you will find SYNC LED is blinking.
d) This LED will blink till the tester gets connected to a DSL line.
18
CTIEMT/1141478/2011-2015
e) Connect the DSL line you want to test to the interface connector labeled ADSL modem at
the bottom of tester.
f) Wait till the SYNC LED gets stable.
g) If SYNC LED is stable it means the line is DSL line otherwise it is not.
h) Select the auto test option available on the main screen display of tester using the enter key
available on the keypad.
i) Now select the DSL layer option by pressing the enter key. If it is already selected, no need
to press the enter key.
j) Press F1 Key to start the test.
k) As soon as the test is started, the tester tries to resynchronize with the line and you may find
SYNC LED starts blinking.
l) At the same time, on the top right corner of screen display, you may find label Seeking and
after some time training label will appear. This indicates that the tester is finding and
learning the parameters of the line.
m) The test gets completed hardly within 30 seconds. The completion of test is identified by
label on the screen as auto test finished. Also the tester gives three or more beeps to convey
the completion of test.
n) Now press F1 to view the test results.
o) The result will contain different parameters like Sno, DSL technology, upstream data rate,
downstream data rate, Power in upstream and downstream, Noise Margin in upstream and
downstream, ATUR (ADSL Terminal Unit- Remote) pass or fail.
p) This result is identified by the sno which is randomly given by tester and it is hard to be
remembered.
q) To save the session with other name, come back to home screen of tester.
r) Press F2 (Cp/Rv) key and select review result option.
s) You will get a list of last 20 session saved in the tester.
t) The last test you performed is available at the last of list.
u) Select the last test you want to name.
v) Press F1 to name the test and enter the name by using the keypad. Usually the name should
be the telephone number where the tested line was being used.
w) Press F1/F4 to save the name.
19
CTIEMT/1141478/2011-2015
(2)
(3)
(4)
(5)
(II)
(III)
(IV)
Electromagnetic Immunity :
-
No radiated energy.
Future upgradability.
Loss is low and same at all operating speeds within the fibre's specified bandwidth
long, unrepeated links (>70km is operation).
(v)
20
(vi)
(vii)
Security
Extremely difficult to tap a fibre as it does not radiate energy that can be
received by a nearby antenna.
-
Undersea cables.
Control systems.
Military applications.
Transmission Sequence :
(1)
(2)
(3)
(4)
(5)
21
CTIEMT/1141478/2011-2015
Repeater spacing increases along with operating speeds because low loss fibres are used
at high data rates.
Figure4.1
Fibre Geometry
An Optical fibre consists of a core of optically transparent material usually silica or borosilicate
glass surrounded by a cladding of the same material but a slightly lower refractive index.
Fibre themselves have exceedingly small diameters. Figure shows cross section of the core and
cladding diameters of commonly used fibres. The diameters of the core and cladding are as
follows.
22
Core (m)
Cladding ( m)
125
50
125
62.5
125
100
140
CTIEMT/1141478/2011-2015
1.1
125 8
125 62.5
125 50
1.3
Core
Cladding
1.4
Operational Wavelength
800nm - 900nm
850nm
1250nm - 1350nm
1300nm
1500nm - 1600nm
1550nm
Table4.1
Dispersion
Dispersion is the spreading of light pulse as its travels down the length of an optical fibre.
Dispersion limits the bandwidth or information carrying capacity of a fibre. The bit-rates must
be low enough to ensure that pulses are farther apart and therefore the greater dispersion can be
tolerated.
23
CTIEMT/1141478/2011-2015
Modal Dispersion
(II)
Material dispersion
(III)
Waveguide dispersion
Cable Construction
Cabling is an outer protective structure surrounding one or more fibres. Cabling protects fibres
environmentally and mechanically from being damaged or degraded in performance. Important
consideration in any cable are tensile strength, ruggedness, durability, flexibility, environmental
resistance, temperature extremes and even appearance.
Fibre Optic Cables have the following parts in common ;
(I)
Optical Fibre
(II)
Buffer
(III)
Strength member
(IV)
Jacket
Cable Components
Component
Function
Material
Buffer
Facilitate Stranding
Central Member
Temperature Stability
Steel, Fibreglass
Anti-Buckling
Primary Strength Member
Tensile Strength
Cable Core
Abrasion Resistance
Cable Filling
Compound
Prevent Moisture
intrusion and Migration
Water Blocking
Compound
Rodent Protection
Armoring
Crush Resistance
Steel Tape
Table4.2
24
CTIEMT/1141478/2011-2015
2.
Expansion Fiber/Plastics)
Figure4.4
3.
Figure4.5
NOTE : Additional Excess Length is Achieved when the "Buffered" Fibers are Stranded
together during the Cabling Operation.
It is the plastic coating applied to the coating. It protects fibre from outside stress. The cable
buffer is one of two types.
25
CTIEMT/1141478/2011-2015
(I)
Loose Buffer
(II)
Tight Buffer
The loose buffer uses a hard plastic tube having an inside diameter several times that of the
fibre. One or more fibres lie within the buffer tube. As the cable expands and shrinks with
temperature changes, it does not affect the fibre as much. The fibre in the tube is slightly longer
than the tube itself. Thus the cable can expand and contract without stressing the fibre. The
buffer becomes the load-bearing member.
The tight buffer has a plastic directly applied over the coating. This construction provides crush
and impact resistance. It is more flexible and allows tighter turn radius. It is useful for indoor
applications where temperature variations are minimum and the ability to make tight turns
inside walls is desired.
4.3 Splicing
Splices are permanent connection between two fibres. The splicing involves cutting of the
edges of the two fibres to be spliced.
Mechanical splicing.
Fusion splicing.
CTIEMT/1141478/2011-2015
3. Fusion Splicing
The fusion splicing technique is the most popular technique used for achieving very low splice
losses. The fusion can be achieved either through electrical arc or through gas flame. The
process involves cutting of the fibres and fixing them in micropositioners on the fusion
splicing machine. The fibres are then aligned either manually or automatically core aligning
process. Afterwards the operation that takes place involve withdrawal of the fibres to a
specified distance, preheating of the fibre ends through electric arc and bringing together of the
fibre ends in a position and splicing through high temperature fusion.
If proper care taken and splicing is done strictly as per schedule, then the splicing loss can be
minimized as low as 0.01 dB/joint. After fusion splicing, the splicing joint should be provided
with a proper protector to have following protections: Mechanical protection and Protection
from moisture.
There are several reasons for splicing a fiber cable. These include:
To reduce losses, a fusion splice has much lower losses than other methods. A Pigtail is a short
length of fiber with a factory fitted and polished connector. In the past these were used in
preference to field terminations because of the complexities at the time of manually terminating
optical fibers. These days pigtails are mainly used where the environment isn't suitable for
manual terminations or where speed is a factor.
As with all fiber termination methods, safety is very important so first some safety tips.
Fiber offcuts are hard to see and can easily penetrate the skin especially if they get into
your clothes, so care must be taken to ensure the safe disposal of all offcuts. Dispose of
fiber scraps immediately using a suitable container and do not throw into a waste paper
bin because of the dangers of ingesting a fiber, do not eat or drink in the termination
area.
Fusion splicers use an electric arc to fuse the fibers together so they should never be
used in an environment where flammable gases or liquids are present.* Never look into
27
CTIEMT/1141478/2011-2015
the end of a live fiber connector. Holding some multimode fibers up to a piece of paper
may prove the presence of light and therefore prove that it is live, but it doesn't prove
that it isn't live! Some laser powered equipment use light which is outside of the visible
spectrum, so err on the side of caution.
Steps for Splicing
1. Splicer Operation
It is awkward at first to hold, strip, cleave and place the fiber in the clamps. Practice makes
perfect. Here are five general steps to complete a fusion splice:
Strip, Clean, & Cleave
a.) Stripping
Strip back the external sheathing of the cable using a rotary stripping tool.
Cut back the aramid strength member using ceramic or kevlar scissors.
Strip the primary buffer from the fiber using fiber strippers not ordinary wire
strippers.
Do this a small section at a time to prevent the fiber breaking, about 10mm (3/8 in) on
each cut is fine until you get used to it.
28
CTIEMT/1141478/2011-2015
b.) Cleaning
Clean the fiber with Fiber-Clean towelettes or a lint-free wipe and isopropyl alcohol so that the
fiber squeaks.
Cleavers vary from manufacturer to manufacturer and you should read the instructions for the
one you are using. Basically the operation consists of putting the fiber into the groove and
clamping,
then
close
the
lid
and
press
the
lever.
Easy
eh!
CTIEMT/1141478/2011-2015
Load Splicer
Position tip of fiber near electrodes . Do not bump tips into anything . Ease placement by
bowing fibers in grooves.Once the fiber ends are prepared they are placed in the fusion splicer.
Press the button and the machine takes care of the rest of the fusion process automatically.
CTIEMT/1141478/2011-2015
The splicer aligns the fibers on one axis and then from another camera angle set at 90 degrees,
it aligns the other axis. This high precision alignment is critical for a low loss joint, any
mismatch of the fiber cores will significantly reduce the propagation of light through the joint.
Bearing in mind that we are dealing with two very small glass rods of only 125 microns in
diameter, it brings it home as to how extremely accurate these machines are. Once the fibers are
aligned the splicer fires an electric arc between the two ends which melts them immediately
and pushes them together, or fuses them into one piece of fiber.
The fusion splicer then tests for dB loss and tensile strength before giving the "OK" beeps for
you to remove the splice from the machine. The loss must be less than 0.1 dB and losses upto
0.01 dB are available.
The protective tube gives physical protection to the splice and further protection is provided by
placing the splice into a splice tray.
Once all of the fibres have been joined the whole tray is then fixed into a splice box which
protects the cable joint as a whole and the cable clamps are then tightened to prevent any
external forces from pulling on the splices.
31
CTIEMT/1141478/2011-2015
32
Before considering in detail the digital hierarchies under discussion we are going to
recapitulate in brief, why there are several digital hierarchies instead of one only. It has
always been pointed out that as far as the analogue FDM technique is concerned, the
C.C.I.T.T. recommends the world wide use of the 12-channel group (secondary group).
Relevant C.C.I.T.T. Recommendation exists also for channel assemblies with more than
60 channels so that with certain exceptions there is only one world-wide hierarchy for
the FDM system (although the term hierarchy is not used in the FDM technique).
Recommendation G.732 and 733, they do not only differ completely in their bit rates,
but also in the frame structures, in 33ierarchi, frame alignment, etc. Needless to say
that, as a consequence, the higher order digital multiplexers derived from the two
different PCM primary multiplexers and thus the digital hierarchies differ as well.
-
Since these two PCM primary multiplexers are available, two digital 33ierarchies only
would have to be expected. In reality, however, two digital hierarchies with several
variants are under discussion because the choice of the fundamental parameters of a
digital hierarchy depends not only on the PCM primary multiplex, which forms the
basic arrangement in that hierarchy, but on many other factors such as :
(a)
(b)
(c)
(d)
(e)
Since today these factors which are essential for forming digital hierarchies vary from
country to country, it is no wonder that we now have to consider more than two
proposals for digital hierarchies.
CTIEMT/1141478/2011-2015
To overcome these limitations, SDH was adopted and the main advantage of SDH is that it is
capable of transmitting existing PDH signals also. In SDH, there is one master clock and all
elements synchronize with it.
Advantages of SDH are:
No. of channels
Synchronous transport
module
63
1890
155.52
STM-1
252
7560
622.08
STM-4
1008
30240
2488.32
STM-16
4032
120960
9953.28
STM-64
Table5.1
In SDH systems data is transmitted in the form of frames in which no. of rows is 9 and no. of
columns is 270. Each cell has a capacity of 8 bytes.
Total no. of Bytes in a frame = 9*270
Total no. of bits in a frame = 9*270*8
Bits per second = (9*270*8)/ (125*10-6)
= 155520000 = 155.520 Mbps
Therefore, bit rate of STM-1 is 155.520 Mbps and bit rate of STM-N is (N*155.520) Mbps.
The bit rate of higher level system is exact multiple of bit rate of lower level system because of
this, the hierarchy is known as synchronous digital hierarchy.
34
CTIEMT/1141478/2011-2015
5.1
SDH STRUCTURE
PCMs are packed in different packages before transmission in SDH systems. There are various
units in which these PCMs and data streams are packed.
1. THE CONTAINER (C) :
It is the basic packaging unit for tributary signals (PDH). There are four types of
containers depending upon the data rate of input stream. In C1 container, PCM of
2mbps is packed.
C1 2 mbps.
C2 6 mbps.
C3 34 mbps.
C4 140 mbps.
2. VIRTUAL CONTAINER (VC):
When path overhead (POH) is added to the container (C), then whole package is known
as virtual container (VC). Path overhead contains address of source and destination.
VC1 C1 + POH
3. TRIBUTARY UNIT (TU):
When pointer is added to virtual container, the unit formed is tributary unit. The job of
pointer is to tell the system that from where information has started.
VC1 + Pointer -> TU1
4. TRIBUTARY UNIT GROUP (TUG):
Three tributary units are packed into one group which is known as tributary unit group. Each
TUG-2 can have three TUs. Therefore, TUG2 will have TU1, TU2 and TU3. Similarly TUG-3
can have three TU-3s also it can store seven TUG-2s. In the same way, VC-4 is the virtual
container for container of 140mb stream. It can store 140mb stream or three TUG-3s. After
adding pointer to TUG-3 it becomes AUG and then we add section overhead (SOH) to it and
finally a stream of STM-1 is form
Figure5.1
35
CTIEMT/1141478/2011-2015
CTIEMT/1141478/2011-2015
CTIEMT/1141478/2011-2015
ETH Interface:
This interface is commonly called as Ethernet interface. It is used for network management
purpose (NMS). In practical session we have used this interface for STM1configuration. This
port can be operated at 10Mbps in either full duplex or half duplex mode. We use shielded type
RJ-45 connector to connect this port with PC. 2Mbit/s or 2MHz synchronization port
Synchronization port interface: In sync port we have provision of two external
synchronization inputs, these are T3_1 and T3_2 along with two clock outputs at 2MHz at pins
named as T4_1 and T4_2. All these input and output clock are compliant with ITU-T G.703
Recommendations.
G.703 212Mbit/s traffic port: These ports on motherboard give us a provision for termination
and originating of 21 PCM on the mother board form the DDF (digital distribution frame).
Various features of these ports are given below:
Remote indication, remote control and station alarm port (LOOPS): This port is basically
used for the various alarm indication purpose. This facilitates us with four remote indication
inputs and two dry loops outputs for station alarm or remote control purpose.
2M Port: These are PCM ports carrying 2 Mbps data. These ports have 21 PCM capacities.
These data port function block is composed of the following functions:
Power supply access ports: "PWRA" and/or "PWRB" ports, used when the equipment is
powered from one or two 48 Voltage sources, the power source(s) should be limited to 100 VA.
"PWR" port used when the equipment is powered from a main voltage (230 V AC), via an
optional power block (100-240V//48V - 1.5A).
STM-DUAL
Figure6.5:- STM-DUAL
Each STM-DUAL provides connection for:
One STM-1 SFP optical interface
One STM-1 electrical interface
One 64Kbps access EOX/AUX order wire or auxiliary channel.
4E/FE
CTIEMT/1141478/2011-2015
CTIEMT/1141478/2011-2015
40
CTIEMT/1141478/2011-2015
To access the system, vendor provides it with two addresses - Ethernet IP address (ETH) and
Router IP address (R-IP). ETH is required to access the system locally and R-IP is used to
access the distance end system.
Step 1: Firstly, we connect the system and PC through LAN cable.
Step 2: Then, we change the IP address of the computer in such a way that both the systems IP
address and PCs IP address lie in the same subnet mask. Then we set default gateway. It is the
address of the system through which we enter the ring.
Step 3: Then, we open internet explorer and fill IP address of the STM system in the URL, and
then shelf view of STM system appears on the screen.
CTIEMT/1141478/2011-2015
6.5 OPERATION
As we know there are 21 PCMs terminating on each multiplexing card, now we can transmit
these PCMs to any port of any of the two OLT cards. OLT cards also have 63 ports each.
Firstly, we connect exchange circuits to exchange side of DDF through PCM cable and system
side of DDF to ports of multiplexing cards through PCM cable. After physical wiring we give
commands on the software to set up paths for different PCMs.
There are 3 STM-1 systems connected in the ring. Let us give them name Rajpura, Patiala and
Ambala. These three systems are connected via two patch cords, one for transmission and other
for reception.
CTIEMT/1141478/2011-2015
BYEPASS
Now in protection route as dont have to link OLT ports to MUX card ports because we have to
only bypass the PCMs. Therefore, at Ambala station we will link port B1 to port D1.
SETTING UP OF AN ETHERNET CONNECTION
For higher data rates we need to setup an Ethernet connection which can transmit the maximum
data rate of 100mbps. We can combine several PCMs and transmit them through single
Ethernet port.
Firstly, we select ETH ports in the shelf view. Then go to VCG and then lists.
In the list all the 63 ports in an ETH port will appear. We select those ports and add members to
them, those we want to include in the connection.
Then, we make cross connection similar to earlier.
43
CTIEMT/1141478/2011-2015
Figure6.14:- 63 PCMs
44
CTIEMT/1141478/2011-2015
CTIEMT/1141478/2011-2015
SYNCHRONIZATION
The role of synchronization plan is to determine the distribution of synchronization in a
network and to select the level of clocks and facilities to be used to time the network. This
involves the selection and location of master clocks for a network, the distribution of primary
and secondary timing throughout the network and an analysis of the network to ensure that
acceptable performance levels are achieved. Improper synchronization planning or the lack of
planning can cause severe performance problems resulting in excessive slips, long periods of
network downtime, elusive maintenance problems or high transmission error rates. Hence, a
proper synchronization plan which optimizes the performance is a must for the entire digital
network. The status of synchronization in the DOT network is as follows:
For synchronization of the SDH network, it has been decided to use the clock source available
through the TAXs at the major stations. The synchronization plan is based upon provision of
Synchronization Supply Units (SSUs) which will be deployed as an essential component of the
synchronization network which will support synchronized operation of the SDH network. The
architecture employed in the SDH requires that the timing of all the network clocks be
traceable to Primary Reference Clock (PRC) specified in accordance with ITU Rec.G.811. The
classical method of synchronizing network element clocks is the hierarchical method (master
slave synchronization) which is already adopted in the DOT network for the TAXs. This
masterslave synchronization uses a hierarchy of clocks in which each level of the hierarchy is
synchronized with reference to a higher level, the highest level being the PRC.
The hierarchical levels of clocks are defined by ITU as follows:
PRC: Also called the primary reference clock or stratum-1 clock. Usually an autonomous
cesium clock or a rubidium clock locked to GPS. Accuracy: 10^-11
SSUT: Transit clock or stratum2 clock. Accuracy: 10^-10
SSUL: Also, called local exchange clock or stratum3 clock. . Accuracy: 10^-9
SES: It is a special clock which is not a stratum clock whose specifications are specific to the
requirements of the SDH equipment. . Accuracy: 10^-8
DNU: Do not use.
CTIEMT/1141478/2011-2015
SAP (SYSTEM,
47
CTIEMT/1141478/2011-2015
CTIEMT/1141478/2011-2015
SOA is enabled by the SAP Net Weaver platform, and builds on the benefits of Web services.
SAP has positioned Enterprise SOA to deliver the benefits offered by service-oriented
architecture, including enabling both flexibility and business efficiency. SAP states that
Enterprise SOA provides companies with a "cost-effective blueprint for composing innovative
new applications by extending existing systems, while maintaining a level of flexibility that
makes future process changes cost-effective". SAP Solutions that currently use Enterprise SOA
are my SAP CRM, my SAP ERP, and my SAP SRM.
Partnerships
SAP partners include Global Services Partners with cross-industry multinational consulting
capabilities, Global Software Partners providing integrated products that complement SAP
Business Suite solutions, and Global Technology Partners providing user companies with a
wide range of products to support SAP technology, including vendors of hardware, database,
storage systems, networks, and mobile computing technology.
SAP PartnerEdge
SAP products for small businesses and midsize companies are delivered through its global
partner network. In 2008, SAP signed SAP Global Service partnership with HCL Technologies,
a $6 billion technology service provider, headquartered in India. SAP PartnerEdge has also
signed with ENFOS, Inc., a software as a service company, to develop their EcoHub Partner
Sustainability Solution platform. The SAP PartnerEdge program, SAP's partner program, offers
a set of business enablement resources and program benefits to help partners including value
added resellers (VARs) and independent software vendors (ISVs) be profitable and successful
in implementing, selling, marketing, developing and delivering SAP products to a broad range
of customers.
Communities
SAP Community Network (SCN) is a community of SAP customers, partners, employees, and
influencers typically in roles such as: developers, consultants, integrators, and business
analysts who gain and share knowledge about ABAP, Java, .NET, SOA, and other
technologies, plus analytics and dashboards, business process best practices, cloud, mobile, big
data, and a range of other topics via expert blogs, discussion forums, exclusive downloads and
code samples, training materials, and a technical library. Members of SCN represent a wide
range of roles and lines-of-business, from countries and territories all over the world, in 24
industries.
Organization
Functional units of SAP are split across different organizational units for R&D needs, field
activities and customer support. SAP Labs are mainly responsible for product development
whereas the field organizations spread across each country are responsible for field activities
such Sales, Marketing, Consulting etc. Head office located in SAP SE is responsible for overall
management as well as core Engineering activities related to Product Development. SAP
customer support, also called Active Global Support (AGS) is a global organization to provide
support to SAP customers worldwide.
49
CTIEMT/1141478/2011-2015
Industry Solutions
Allows easier global integration (barriers of currency exchange rates, language, and culture
can be bridged automatically)
Vendors have past knowledge and expertise on how to best build and implement a system
User interface is completely customizable allowing end users to dictate the operational
structure of the product
Disadvantages
Locked into relationship by contract and manageability with vendor - a contract can hold a
company to the vendor until it expires and it can be unprofitable to switch vendors
ifswitching costs are too high
Inflexibility - vendor packages may not fit a company's business model well and
customization can be expensive
50
CTIEMT/1141478/2011-2015
Financials
Human Resources
Customer Relationship Management
Supplier Relationship Management
Product Lifecycle Management
Supply Chain Management
Business Intelligence
51
CTIEMT/1141478/2011-2015
General ledger
Book close
Tax
Accounts receivable
Accounts payable
Consolidation
Special ledgers
Cost elements
Cost centres
Profit centres
Internal orders
Activity based costing
Product costing
Purchase
Sale
Depreciation
Tracking
Make to order
Plant shut downs (as a project)
52
Employment history
Payroll
Training
Career management
Succession planning
CTIEMT/1141478/2011-2015
Labour
Material
Down time and outages
Requisitions
Purchase orders
Goods receipts
Accounts payable
Inventory management
BOMs
Master raw materials,finished goods etc
Planning
Execution
Inspections
Certificates
Capacity planning
Master production scheduling
Material requirements planning
Shop floor
53
RFQ
Sales orders
Pricing
Picking (and other warehouse processes)
Packing shipping
CTIEMT/1141478/2011-2015
Figure7.2
7.3.2 Log On Window
Figure7.3
54
CTIEMT/1141478/2011-2015
Figure7.4
The asterisks in the password box cannot be deleted, just overwrite in the box.
7.3.4 Access More links.....
Figure7.5
55
CTIEMT/1141478/2011-2015
Figure7.6
Messages appear on the status bar.
Figure7.7
56
CTIEMT/1141478/2011-2015
Figure7.8
Figure7.9
57
CTIEMT/1141478/2011-2015
Figure7.10
i.
ii.
F1 Help
F4 Help
58
CTIEMT/1141478/2011-2015
2. Create Project
Menu path
Transaction
CJ01
CJ01
Table7.1
59
CTIEMT/1141478/2011-2015
Figure7.11
2. Select the appropriate coding mask (For example CM/10/00001) for project definition
in Start value.
Definition-Open Number-This is the vacant number available.
Enter to take proposed project definition
Figure7.12
60
CTIEMT/1141478/2011-2015
Figure7.13
Click on Open No.
Select the Project Profile
Figure7.14
3.
profile-This contain default values and control parameters for processing objects and functions
in the Project System)
4. Enter description/Short text for project:
5. Click on Basic data tab (Organization section) and, Enter Company code, Business Area &
Plant (Refer Fig.) For example.
61
CTIEMT/1141478/2011-2015
Field Description
Remarks
Person responsible
Start Date
Finish Date
Company code
Business area
Plant
6. Click on Details Project Definition customer fields & enter the data as per enclosed
sheet
CM CUSTOMER
ENHANCEMENT FIELDS.xlsx
Note: Please maintain the customer fields which are marked as mandatory.
62
CTIEMT/1141478/2011-2015
9. Create all other WBS Elements at Level-2 according to the survey report for the Root WBS
Element.
For WBS of Project Type Equipment(EQ), please select Person Responsible 31 to 34.
For WBS of Project Type Media(MD), please select Person Responsible 21 to 24.
For WBS of Project Type Civil(CW), please select Person Responsible 01 to 04.
For WBS of Project Type Electrical(EW), please select Person Responsible 06 to 09.
63
CTIEMT/1141478/2011-2015
Figure7.15
14. Now, Click on Dates Tab .Enter Basic start & Basic Finish Dates
Figure7.16
64
CTIEMT/1141478/2011-2015
CM CUSTOMER
ENHANCEMENT FIELDS.xlsx
CJ02
Menu path
Transaction
CJ02
Table7.2
For making any changes in the parameters once the project is created the above menu path OR
the Transaction is to be used.
4. Display Project
4 CJ03
Menu path
Transaction
CJ03
Table7.3
65
CTIEMT/1141478/2011-2015
5 CJ02
Menu path
Transaction
CJ02
Table7.4
Figure7.17
Select the WBS element & click on Customer fields
Figure7.18
Enter the WBS element and employee id of the person to whom the note sheet is to be sent.
66
CTIEMT/1141478/2011-2015
Figure7.19
Figure7.20
67
CTIEMT/1141478/2011-2015
Figure7.21
4. Choose the relevant Personnel Sub area from the input help.
Figure7.22
68
CTIEMT/1141478/2011-2015
Select the relevant Employee to whom Note sheet has to be sent and click on
Menu path
Office Workplace
Transaction
SBWP
Click on the
69
.
CTIEMT/1141478/2011-2015
The note sheet screen will appear. Add the details and forward it to next level.
7. Create & Assign Survey Report to Project
7 CV01N
Menu path
Transaction
CV01N
Document
Table7.5
1. In the entry screen, Enter the document Type
2. Enter the document version
3. Press Enter
Figure7.23
70
Figure7.24
Figure7.25
71
CTIEMT/1141478/2011-2015
Figure7.26
Figure7.27
Save the document. An internal no. will be generated. Note down the No.
Menu path
Transaction
CV02N
72
Table7.6
On the entry screen, enter the Document Number.
Enter the Document Type ZPS (Project Documents).
Press Enter.
CTIEMT/1141478/2011-2015
Figure7.28
Figure7.29
Click on Save
9.
9 CJ02
Menu path
Transaction
CJ02
CTIEMT/1141478/2011-2015
3. Click on details
4. Click on
10 CJ02
Menu path
Transaction
CJ02
Table7.7
74
CTIEMT/1141478/2011-2015
Figure7.30
Select the WBS element & click on Customer fields
Figure7.31
Enter the WBS element and employee id of the person to whom the note sheet is to be sent.
Figure7.32
Select the relevant Employee to whom Note sheet has to be sent and click on
75
CTIEMT/1141478/2011-2015
Figure7.33
Menu path
Office Workplace
Transaction
SBWP
1. The competent authority will receive a message .Click on inbox to read the message.
Figure7.34
2. If the same message has to be checked at later stage , then use the transaction SBWP to
go to Inbox & Click on Unread Documents.
76
CTIEMT/1141478/2011-2015
Figure7.35
3. Double click on mail & the double click on Attachment to View the file
12 CJ02
Menu path
Transaction
CJ02
Table7.8
Figure7.36
77
CTIEMT/1141478/2011-2015
4. Click on
Figure7.37
5. Check the Status Profile. Select the relevant status.
6. Click on Back & Check the new status
Figure7.38
7. Click on Save
8. Similarly change the status of other WBS elements.
78
CTIEMT/1141478/2011-2015
79
CTIEMT/1141478/2011-2015