Sunteți pe pagina 1din 36

1.

ABOUT RELIANCE JIOINFOCOMM


LIMITED
Reliance JioInfocomm Limited popularly known as Jio (Joint Implementation
Opportunities) is an Indian mobile network operator. It operates a national LTE network
with coverage across all 22 telecom circles. Jio does not offer 2G or 3G service, and instead
utilizes voice over LTE (VoLTE) to provide voice service on its network.

Jio soft launched a beta on 27 December 2015, on the occasion of 83rd birthday of Reliance
Industries founder Dhirubhai Ambani, which was for partners and employees, and became
publicly available on 5 September 2016.

1.1 HISTORY
In June 2010, Reliance Industries (RIL) bought a 96% stake in Infotel Broadband Services
Limited (IBSL) for ₹4,800 crores. Although unlisted, IBSL was the only company that won
broadband spectrum in all 22 circles in India in the 4G auction that took place earlier that
year. Later continuing as RIL's telecom subsidiary, Infotel Broadband Services Limited was
renamed as Reliance JioInfocomm Limited (RJIL) in January 2013.The 4G services were
launched internally to Jio's partners, its staff and their families on 27 December 2015. The
company commercially launched its services on 5 September 2016. Within the first month,
Jio announced that it had acquired 16 million subscribers. This is the fastest ramp-up by any
mobile network operator anywhere in the world. Jio crossed 50 million subscriber mark in 83
days since its launch, subsequently crossing 100 million subscribers on 22 February 2017. By
October 2017 it had about 130 million subscribers.

Jio shares spectrum with Reliance Communications. The sharing deal is for 800 MHz band
across seven circles other than the 10 circles for which Jio already owns. In September 2016,
Jio signed a pact with BSNL for intra-circle roaming which would enable users of the
operators to use each other's 4G and 2G spectrum in national roaming mode. In February
2017, Jio announced a partnership with Samsung to work on LTE - Advanced Pro and 5G.
1.2 PRODUCTS AND SERVICES

 JioPhone
Jio introduced its first affordable 4G feature phone, powered by KaiOS, named as
JioPhone on 21 July 2017. The price announced for it is ₹0 with a security deposit of
₹1500 which can be withdrawn back by the user by returning the JioPhone at Jio stores
only after three years. This phone was released for beta users on 15 August 2017 and pre-
booking for regular users started on 24 August 2017.

 4G broadband
The company launched its 4G broadband services throughout India in September 2016.
Jio offers fourth-generation (4G) data and voice services, along with peripheral services

1
like instant messaging and streaming movies and music. The company has a network of
more than 250,000 km of fiber optic cables in the country, over which it will be
partnering with local cable operators to get broader connectivity for its broadband
services. With its multi-service operator (MSO) licence, Jio will also serve as a TV
channel distributor and will offer television-on-demand on its network.

 LYF smartphones
Jio entered into an agreement with domestic handset maker Intex to supply 4G handsets
capable of voice over LTE (VoLTE) in 2015. However, in October 2015, Jio announced
that it would be launching its own mobile handset brand named LYF. On 25 January
2016, the company launched its LYF smartphone series starting with Water 1. Three
more handset models have been released so far, namely Water 2, Earth 1, and Flame 1.

 Jionet WiFi
JioNet is a public Hotspot service from Reliance Jio. JioNet Hotspots are usually created
in locations like malls, coffee shops, stadiums, airports, and parks to name a few.

1.3 VISION
Affordable Devices: Jio has worked with all the leading device manufacturers of the world
to ensure availability of 4G LTE smartphones across all price points – from ultra-premium
models on one hand, to entry level models on the other.

Digital Currency: Jio envisions a new India which will use digital currency instead of paper
money for a more secure and convenient way to transact. Jio Money, Jio’s digital currency
and digital payments business, will play a crucial role in this by offering a platform for
ubiquitous, affordable and secure digital payments.

Jio Drive: Micro and small businesses will soon have access to cutting-edge cloud storage
technologies which were once affordable to big companies only, giving them a new edge to
compete on a global landscape.

Digital Education: Teachers and students from far flung areas can connect with each other,
crowd-source knowledge and adapt new age learning techniques and thus lift the level of
education to a completely different plane.

Digital Healthcare: Expert medical advice would be available anytime, anywhere - with
medical practitioners able to grow their practice without constraint, and provide quality of life
to the crores that make up our country.

Digital Entertainment and social connectivity: Jio Chat is a powerful communication


application that integrates chat, voice, video calling, conferencing, file sharing, photo sharing
and much more. Jio Play enables users to watch HD TV anytime, anywhere on any device,
from hundreds of channels, across categories and languages. Jio Beats is a premier digital
music streaming service that gives instant access to millions of songs and curated playlists.
Jio Mags and Jio News provide access to the most popular collection of magazines and news
from leading publishing houses across multiple languages.

2
2. TELECOMMUNICATION TECHNOLOGY

Telecommunications, also known as telecom, is the exchange of information over significant


distances by electronic means and refers to all types of voice, data and video transmission.
This is a broad term that includes a wide range of information transmitting technologies such
as telephones (wired and wireless), microwave communications, fiber optics, satellites, radio
and television broadcasting, the internet and telegraphs.

A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station may be combined into a
single device called a transceiver. The medium of signal transmission can be via electrical
wire or cable (also known as "copper"), optical fiber, electromagnetic fields or light. The free
space transmission and reception of data by means of electromagnetic fields is called wireless
communications.

2.1 PSTN (Public Switched Telephone Network)

PSTN (Public Switched Telephone Network) is the world's collection of interconnected


voice-oriented public telephone networks, both commercial and government-owned. It's also
referred to as the Plain Old Telephone Service (POTS).A telephone, or phone, is
a telecommunications device that permits two or more users to conduct a conversation when
they are too far apart to be heard directly. A telephone converts sound, typically and most
efficiently the human voice, into electronic signals that are transmitted via cables and other
communication channels to another telephone which reproduces the sound to the receiving
user. When a person speaks into a telephone, the sound waves created by his voice enter the
mouthpiece. An electric current carries the sound to the telephone of the person he is talking
to. A telephone has two main parts: transmitter and receiver.
The Transmitter of a telephone serves as a sensitive "electric ear." It lies behind the
mouthpiece of the phone. Like the human ear, the transmitter has an 14 eardrum." The
eardrum of the telephone is a thin, round metal disk called a diaphragm. When a person talks
into the telephone, the sound waves strike the diaphragm and make it vibrate. The diaphragm
vibrates at various speeds, depending on the variations in air pressure caused by the varying
tones of the speaker's voice.

3
2.2 1G

The First generation of wireless telecommunication technology is known as 1G was


introduced in 1980. 1G networks (NMT, C-Nets, AMPS, TACS) are considered to be the
first analog cellular systems, whose network were conceived and designed purely for voice
calls with almost no consideration of data services. The main difference between then
existing systems and 1G was invent of cellular technology and hence it is also known as First
generation of analog cellular telephone. In 1G or First generation of wireless
telecommunication technology the network contains many cells (Land area was divided into
small sectors, each sector is known as cell, a cell is covered by a radio network with one
transceiver) and so same frequency can be reused many times which results in great spectrum
usage and thus increased the system capacity i.e. large number of users could be
accommodated easily.

Use of cellular system in 1G or First generation of wireless telecommunication technology


resulted in great spectrum usage. The First generation of wireless telecommunication
technology used analog transmission techniques which were basically used for transmitting
voice signals. 1G or first generation of wireless telecommunication technology also consist
of various standards among which most popular were Advance Mobile Phone Service
(AMPS), Nordic Mobile Telephone (NMT), Total Access Communication System (TACS).
All of the standards in 1G use frequency modulation techniques for voice signals and all the
handover decisions were taken at the Base Stations (BS). The spectrum within cell was
divided into number of channels and every call is allotted a dedicated pair of channels. Data
transmission between the wire part of connection and PSTN (Packet Switched Telephone
Network) was done using packet-switched network.

2.3 2G

2G networks (GSM, CDMAOne, D-AMPS) are the first digital cellular systems launched
early 1990s, offering improved sound quality, better security and higher total capacity.
GSM supports circuit-switched data (CSD), allowing users to place dial-up data calls
digitally, so that the network's switching station receives actual ones and zeroes rather
than the screech of an analog modem. The most notable upgrade of 2G over its
predecessor is the digital encryption of telephone conversations, and considerably
higher efficiency on the spectrum, which allows for greater penetration level for mobile
phones. 2G also introduced mobile data services, beginning with SMS text messaging.

2G is primarily divided into two technologies. Time division multiple access (TDMA)
standards include GSM which is predominant worldwide, the Japan-exclusive PDC, iDen
which is used in some parts of the US and Canada, and D-AMPs which is a predecessor to
GSM. The other 2G slice is code division multiple access (CDMA), which is now in lesser
use compared to TDMA because of GSM. The downside of 2G is that it is very dependent on
proximity and location to towers, and its digital nature will only compound that problem.
Analog signals degenerate over distance, consistently resulting in static until the signal

4
becomes unintelligible, while digital signal cuts off or loses and distorts dramatically because
of its jagged, on-off nature. This means that as 2G signal becomes lesser, the frequency of
dropped calls and robotic-sounding voice becomes more prevalent.

2.4 3G

3G networks (UMTS FDD and TDD) are newer cellular networks that have data rates of
384kbit/s and more. The UN's International Telecommunications Union IMT-2000 standard
requires stationary speeds of 2Mbps and mobile speeds of 384kbps for a "true" 3G.

The bandwidth and location information available to 3G devices gives rise to applications not
previously available to mobile phone users. Some of the applications are:

 Global Positioning System (GPS)


 Location-based services
 Mobile TV
 Telemedicine
 Video Conferencing
 Video on demand.

2.5 4G
4G technology refers to the fourth generation of mobile phone communication standards.
LTE and WiMAX are marketed as parts of this generation, even though they fall short of the
actual standard. A 4G system must provide capabilities defined by ITU in IMT Advanced.
Potential and current applications include amended mobile web access, IP telephony, gaming
services, high-definition mobile TV, video conferencing, and 3D television. Mobile 4G
network using several frequencies which are 700 MHz,850 MHz, 1800 MHz, 2100 MHz,
2300 MHz, 2600 MHz. In case of Australia, The 700 MHz band was previously used for
analogue television and became operational with 4G in December 2014. The 850 MHz band
is currently operated as a 3G network by Telstra and as a 4G network by Vodafone in
Australia.
4G LTE

4G LTE, or fourth-generation long term evolution, sometimes is referred to as “the gold


standard of wireless technology,” thanks to its ability to deliver both speed and power in
more places of the world. Specifically, 4G stands for the fourth generation of data technology
for cellular networks, as defined by the radio sector of the International Telecommunication
Union (ITU-R). 4G follows 3G, or the third generation. 4G LTE is noticeably faster than 3G.
However, for people not living in major metropolitan areas, it can be difficult to receive 4G
LTE service. And, while some networks offer LTE and others are new 4G networks, users
won’t necessarily notice a difference in upload or download speeds between the two.

Regardless of the network offering LTE or 4G services, they must package and send data so
that all network points can interpret it. Older networks utilize circuit-switching technology,
which establishes a connection directly to the target through the network so the entire
connection occurs through that connection. That’s why users of older networks that utilize

5
only circuit-switching technologies must reconnect if a call drops. On the other hand, newer
networks utilize packet-switching technology that takes advantage of a greater number of
connected points around the world. Packet-switching networks break up information into
small chunks and send them along the most efficient path, so when a node drops out, the
packet finds an alternate route and users don’t suffer dropped calls.

To solve the circuit-switching versus packet-switching challenge with 4G LTE, mobile


carriers are using a combination of the two network types. Voice networks traditionally used
circuit-switching technology. They do this by allowing the phone to rely on circuit-switching
standards for calls, but to use packet-switching communication for data.

4G VoLTE

VoLTE stands for voice over LTE and it’s more or less exactly what it says on the tin. It's
voice calls over a 4G LTE network, rather than the 2G or 3G connections which are usually
used.

Benefits of VoLTE

Superior call quality

The big advantage of VoLTE is that call quality is superior to 3G or 2G connections as far
more data can be transferred over 4G than 2G or 3G. Up to three times as much data as 3G
and up to six times as much as 2G to be precise, making it easier to make out not only what
the person on the other end of the line is saying, but also their tone of voice.

Improved coverage and connectivity

VoLTE can connect calls up to twice as fast as the current methods and as 2G and 3G
connections will still be available when there’s no 4G signal it simply means that there’s
greater mobile coverage overall, as currently places with a 4G signal but no 2G or 3G means
that on you can’t make or receive calls.

Better battery life

Anyone who currently uses 4G could also find their battery life increased with VoLTE, as
without it whenever you make or receive a call your phone has to switch from 4G to 2G or
3G, since 4G calls aren’t supported and then once the call is finished it switches back again.
All that switching, plus the need to search for a different signal each time, can give the
battery a significant hit.
Video calling

It’s also theoretically possible to make video calls over 4G, much like a Skype call except
you’d just use your mobile number and be able to use the regular dialler and call interface, so
you can make and receive video calls from anyone else with VoLTE, rather than relying on
separate accounts.

6
3. HARDWARE OVERVIEW
Telecommunications equipment (also telecoms equipment or communications equipment) is
hardware used for the purposes of telecommunications. Since the 1990s the boundary
between telecoms equipment and IT hardware has become blurred as a result of the growth of
the internet and its increasing role in the transfer of telecoms data.

Telecommunications equipment can be broadly broken down into the following categories:

3.1 Public Switching Equipment

3.1.1 Repeaters

A network device used to regenerate or replicate a signal. Repeaters are used in transmission
systems to regenerate analog or digital signals distorted by
transmission loss. Analog repeaters frequently can only
amplify the signal while digital repeaters can reconstruct a
signal to near its original quality.
In a data network, a repeater can relay messages between
subnetworks that use different protocols or cable
types. Hubs can operate as repeaters by relaying messages
to all connected computers. A repeater cannot do the
intelligent routing performed by bridges and routers.

3.1.2 Hubs

A hub, also called a network hub, is a common connection point for devices in a network.
Hubs are devices commonly used to connect segments of a LAN. The hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Hubs and switches serve as a central connection for all of your network equipment and
handles a data type known as frames. Frames carry your data. When a frame is received, it is
amplified and then transmitted on to the port of the destination PC. In a hub, a frame is
passed along or "broadcast" to every one of its
ports. It doesn't matter that the frame is only
destined for one port. The hub has no way of
distinguishing which port a frame should be sent
to. Passing it along to every port ensures that it
will reach its intended destination. This places a
lot of traffic on the network and can lead to poor
network response times.

7
Compared to a standard switch, the hub is slower as it can send or receive information just
not at the same time, but typically costs more than a hub.

Passive, Intelligent and Switching Hubs

A passive hub serves simply as a conduit for the data, enabling it to go from one device (or
segment) to another. So-called intelligent hubs include additional features that enables an
administrator to monitor the traffic passing through the hub and to configure each port in the
hub. Intelligent hubs are also called manageable hubs.A third type of hub, called a switching
hub, actually reads the destination address of each packet and then forwards the packet to the
correct port.

Home and Small Business Hubs

Hubs can be used as a standalone device or connected to compatible hubs and switches to
form a larger network. Hubs are generally easy to install and maintain, making these devices
a good option for home networking. A hub is also easily configured for small business branch
office networking.

3.1.3 Bridges
In telecommunication networks, a bridge is a product that connects a local area network to
another local area network that uses the same protocol (for example, Ethernet or token ring).
You can envision a bridge as being a device that decides whether a message from you to
someone else is going to the local area network in your building or to someone on the local
area network in the building across the street. A bridge examines each message on a LAN,
"passing" those known to be within the same LAN, and forwarding those known to be on the
other interconnected LAN (or LANs).

In bridging networks, computer or node addresses have no specific relationship to location.


For this reason, messages are sent out to every address on the network and accepted only by
the intended destination node. Bridges learn which addresses are on which network and
develop a learning table so that subsequent messages can be forwarded to the right network.

Bridging networks are generally always interconnected local area networks since
broadcasting every message to all possible destinations would flood a larger network with

8
unnecessary traffic. For this reason, router networks such as the Internet use a scheme that
assigns addresses to nodes so that a message or packet can be forwarded only in one general
direction rather than forwarded in all directions.

A bridge works at the data-link (physical network) level of a network, copying a


data frame from one network to the next network along the communications path.

A bridge is sometimes combined with a router in a product called a brouter.

3.1.4 Switches
In a telecommunications network, a switch is a device that channels incoming data from any
of multiple input ports to the specific output port that will take the data toward its intended
destination. In the traditional circuit-switched telephone network, one or more switches are
used to set up a dedicated though temporary connection or circuit for an exchange between
two or more parties. On an Ethernet local area network (LAN), a switch determines from the
physical device (Media Access Control or MAC) address in each incoming message frame
which output port to forward it to and out of. In a wide area packet-switched network such as
the Internet, a switch determines from the IP address in each packet which output port to use
for the next part of its trip to the intended destination.

In the Open Systems Interconnection (OSI) communications model, a switch performs the
Layer 2 or Data-link layer function. That is, it simply looks at each packet or data unit and
determines from a physical address (the "MAC address") which device a data unit is intended
for and switches it out toward that device. However, in wide area networks such as the
Internet, the destination address requires a look-up in a routing table by a device known as a
router. Some newer switches also perform routing functions (Layer 3 or the Network layer
functions in OSI) and are sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop.
The time a switch takes to figure out where to forward a data unit is called its latency. The
price paid for having the flexibility that switches provide in a network is this latency.
Switches are found at the backbone and gateway levels of a network where one network
connects with another and at the subnetwork level where data is being forwarded close to its
destination or origin. The former are often known as core switches and the latter as desktop
switches. In the simplest networks, a switch is not required for messages that are sent and
received within the network. For example, a local area network may be organized in a token
ring or bus arrangement in which each possible destination inspects each message and reads
any message with its address.

3.2 Transmission Equipments

9
3.2.1 Twisted Pair

Twisted pairs are commonly used for terrestrial telephone communications. In such cables,
many pairs are grouped together in a single cable, from two to several thousand. The format
is also used for data network distribution inside buildings. Twisted pair cables are quite
literally a pair of insulated wires that are twisted together to help reduce noise from outside
sources. While this does help some, these cables are still very susceptible to outside noise.
Twisted pair cables are the most cost-effective option of the three but that also brings about
lower bandwidth and high attenuation.
There are two types of twisted pair cables:

a) Unshielded Twisted Pair (UTP)

 ‘Unshielded’ meaning it does not rely on physical shielding to block interference


 Most commonly used cable of the two, often utilized for both residential and business
use
 There are several UTP categories, which increase in bandwidth as you move up the
scale.

b) Shielded Twisted Pair (STP)

 ‘Shielded’ with a foil jacket to cancel any external interference


 Commonly used for large-scale enterprises for high-end applications as well as
exterior cabling that may be exposed to environmental elements.

Advantages :

1. Cheaper and far easier to splice


2. Less susceptible to electrical interference caused by nearby equipment or wires.

10
3. In turn are less likely to cause interference themselves.
4. Because it is electrically "cleaner", STP wire can carry data at a faster speed.

Disadvantages:

1. STP wire is that it is physically larger and more expensive than twisted pair
wire.
2. STP is more difficult to connect to a terminating block.

3.2.2 Coaxial Cables


Coaxial cables are high-frequency transmission cables made up of a single solid-copper core.
Data is transferred electrically over the inner conductor and has 80X more transmission
capacity than twisted cable.

This type of cable is commonly used to deliver TV signals (its higher bandwidth makes it
more suitable for video applications) and to connect computers in a network. Along with
stable transmission of data, coaxial cables also have anti-jamming capabilities and can
effectively protect signals from being interfered. The cost is slightly higher than twisted
pair but still considered more economical than fiber. There are also two types of coaxial
cables:

75 Ohm

 Most commonly used to transmit video signals.


 Often connects video signals between different components like DVDs, VCRs, or
receivers commonly known as A/V cables.

50 Ohm

 Primarily utilized to transmit a data signal in a 2-way communication system.


 Most commonly used for computer ethernet backbones, AM/FM radio receivers, GPS
antenna, police scanners, and cell phone systems.

11
Advantages :

1. Coaxial cable can support greater cable lengths between network devices than twisted pair
cable.
2. Thick coaxial cable has an extra protective plastic cover that help keep moisture
away.

Disadvantage:

1. Thick coaxial is that it does not bend easily and is difficult to install.

3.2.3 Fiber Optical Cables


Fiber is the newest form of transmission cable technology. Instead of transferring data over
copper wires, these cables contain optical fibers that transmit data via light, rather than pulses
of electricity. Each optical fiber is individually coated with plastic layers and contained in a
protective tube, making it extremely resistant to external interference. The result is a very
reliable and super fast connection that has 26,000X more transmission capacity than twisted-
pair cables, but that also comes with a much higher cost. Again, there are two types of fiber
cables:

a) Single mode

 Has a small core and only allows one mode of light to propagate at a time.
 Because of this, the number of light reflections decrease as they pass through the core.
 The result is low attenuation and data that is able to travel further and faster.
 Commonly used in telecom, CATV networks, and Universities.

b) Multi mode
12
 Has a larger core diameter that lets multiple modes of light propagate.
 The amount of light reflections increase as they travel through the core, which allows
more data to pass through.
 Because of its high dispersion, multimode cables have lower bandwidth, higher
attenuation and reduced signal quality further it travels.
 Most commonly used for communication over short distances such as LAN, security
systems, and general fiber networks.

Advantages:

1. One single mode fiber can replace a metal of time larger and heavier.
2. Multi-mode optical cable has a larger diameter and can be used to carry signal
over short distance.

Disadvantages:

1. Fiber optic versus metal cable is that it is difficult to make connections to


fiber optic cable.
2. The optical fiber must be highly polished to allow light to pass with little loss.

3.2.4 SPF Cable

SFP cable is a form of high speed cable with Small Form Factor Pluggable Plus on either end.
They are suitable for in-rack connections between servers and switches. A small transceiver
that plugs into the SFP port of a network switch and connects to Fibre Channel and Gigabit
Ethernet (GbE) optical fiber cables at the other end. Superseding the GBIC transceiver, SFP
modules are also called "mini-GBIC" due to their smaller size. By choosing the appropriate
SFP module, the same electrical port on the switch can connect to fibers of different types
(multimode or singlemode) and different wavelengths. If the fiber is upgraded, the SFP
module is replaced. SFP twinax cable which replaces two optical modules and a

13
connectorized optical fiber with a twinaxial copper cable assembly offers the higher density,
lower cost, and lower power 10 Gigabit Ethernet solution.

3.2.5 Ethernet Cable

An Ethernet cable is one of the most popular forms of network cable used on wired networks.
Ethernet cables connect devices together within a local area network, like PCs, routers,
and switches. Given that these are physical cables, they do have their limitations, both in the
distance that they can stretch and still carry proper signals, and their durability. This is one
reason there are different types of Ethernet cables; to perform certain tasks in particular
situations.

Types:

Ethernet cables normally support one or more industry standards including Category 5
(CAT5) and Category 6 (CAT6).
A crossover cable is a special type of Ethernet cable specially designed for connecting two
computers to each other. By contrast, most Ethernet cables are designed to connect one
computer to a router or switch.
Ethernet cables are physically manufactured in two basic forms called solid and stranded.
Solid Ethernet cables offer slightly better performance and improved protection against
electrical interference. They're also more commonly used on business networks, wiring inside
office walls, or under lab floors to fixed locations
Stranded Ethernet cables are less prone to physical cracks and breaks, making them more
suitable for travellers or in home networking setups.

Limitations of Ethernet Cables:

A single Ethernet cable, like an electric power cord, has a limited maximum distance
capacity, meaning they have an upper limit to how long they can be before signal loss

14
(called attenuation) happens. This is due to their electrical transmission characteristics and is
directly affected by interference around the cable.

Both ends of the cable should be close enough to each other to receive signals quickly, but far
enough away from electrical interferences to avoid interruptions. However, this alone doesn't
limit the size of a network because hardware like routers or hubs can be used to join multiple
Ethernet cables together within the same network. This distance between two devices is
called the network diameter.

The maximum length of a single CAT5 cable, before attenuation occurs, is 324 feet. CAT6
can go up to around 700 feet. Keep in mind that Ethernet cables can be longer but they might
suffer from signal loss, especially if there are other electrical appliances that the cable passes
by.

3.2.6 Patch Cord

The Patch cord (sometimes called a patch cable) is a length of cable with connectors on the
ends that is used to connect an end device to something else, such as a power source. One of
the most common uses is connecting a laptop, desktop or other end device to a wall outlet.
Fiber patch cords are typically called fiber jumpers and are either standard jumpers or mode
conditioning jumpers.

A patch cord may also be used to connect a switch port or a server to the structured cabling
system. Although the new standards do not recommend doing so, sometimes a patch cord is
used to connect a server directly to a switch port. When cabling channel is tested, it is a called
channel test if patch cords are included, but a permanent link test otherwise. Special
connectors are required to test patch cords, which should not be tested using other test
methods

Ethernet and patch cables are usually referred to interchangeably, although there can be
differences between the two. A patch cable is a generic term that can be used for multiple
types of cabling.

15
3.2.7 Microwave

The term microwave refers to electromagnetic energy having a frequency higher than
1 gigahertz (billions of cycles per second), corresponding to wavelength shorter than 30
centimeters. Microwave signals
propagate in straight lines and are
affected very little by the troposphere.
They are not refracted or reflected by
ionized regions in the upper
atmosphere. Microwave beams do not
readily diffract around barriers such as
hills, mountains, and large human-made
structures. Some attenuation occurs
when microwave energy passes through trees and frame houses. Radio-frequency (RF)
energy at longer wavelengths is affected to a lesser degree by such obstacles.
The microwave band is well suited for wireless transmission of signals having
large bandwidth. This portion of the RF electromagnetic radiation spectrum encompasses
many thousands of megahertz. Compare this with the so-called shortwave band that extends
from 3 MHz to 30 MHz, and whose total available bandwidth is only 27 MHz. In
communications, a large allowable bandwidth translates into high data speed. The short
wavelengths allow the use of dish antennas having manageable diameters. These antennas
produce high power gain in transmitting applications, and have excellent sensitivity and
directional characteristics for reception of signals.

16
Microwaves are widely used for point-to-point communications because their
small wavelength allows conveniently-sized antennas to direct them in narrow beams, which
can be pointed directly at the receiving antenna. This allows nearby microwave equipment to
use the same frequencies without interfering with each other, as lower frequency radio waves
do. Another advantage is that the high frequency of microwaves gives the microwave band a
very large information-carrying capacity; the microwave band has a bandwidth 30 times that
of all the rest of the radio spectrum below it. A disadvantage is that microwaves are limited
to line of sight propagation; they cannot pass around hills or mountains as lower frequency
radio waves can.

3.2.8 Dragon Wave

DragonWave is a multinational corporation headquartered


in Ottawa, Ontario and a global supplier of packet
microwave radio systems for mobile and access IP
networks. DragonWave designs and builds Ethernet
microwave products to support existing and emerging
backhaul requirements employing three key technologies:
packet microwave, hybrid microwave and small cell
solutions.

17
3.2.9 WiMAX

WiMAX supports mobile, nomadic and fixed wireless applications. A mobile user, in this
context, is someone in transit, such as a commuter on a train. A nomadic user is one that
connects on a portable device but does so only while stationary -- for example, connecting to
an office network from a hotel room and then again from a coffee shop. Fixed
wireless typically refers to wireless connectivity among non-mobile devices in homes or
businesses.
The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to
promote conformity and interoperability of the standard, including the definition of
predefined system profiles for commercial vendors. The forum describes WiMAX as "a
standards-based technology enabling the delivery of last mile wireless broadband access as an
alternative to cable and DSL". IEEE 802.16m or WirelessMAN-Advanced was a candidate
for the 4G, in competition with the LTE Advanced standard.
WiMAX was initially designed to provide 30 to 40 megabit-per-second data rates, with the
2011 update providing up to 1 Gbit/s for fixed stations.

The bandwidth and range of WiMAX make it suitable for the following potential
applications:

 Providing portable mobile broadband connectivity across cities and countries through
various devices.
 Providing a wireless alternative to cable and digital subscriber line (DSL) for "last
mile" broadband access.
 Providing data, telecommunications (VoIP) and IPTV services (triple play).
 Providing Internet connectivity as part of a business continuity plan.
 Smart grids and metering.

WiMAX can provide at-home or mobile Internet access across whole cities or countries. In
many cases this has resulted in competition in markets which typically only had access
through an existing incumbent DSL (or similar) operator. Additionally, given the relatively

18
low costs associated with the deployment of a WiMAX network (in comparison
with 3G, HSDPA, xDSL, HFC or FTTx), it is now economically viable to provide last-mile
broadband Internet access in remote locations.

Devices that provide connectivity to a WiMAX network are known as subscriber stations
(SS). Portable units include handsets (similar to cellular smartphones); PC peripherals (PC
Cards or USB dongles); and embedded devices in laptops, which are now available for Wi-Fi
services. In addition, there is much emphasis by operators on consumer electronics devices
such as Gaming consoles, MP3 players and similar devices. WiMAX is more similar to Wi-Fi
than to other 3G cellular technologies. The WiMAX Forum website provides a list of
certified devices. However, this is not a complete list of devices available as certified
modules are embedded into laptops, MIDs (Mobile Internet devices), and other private
labeled devices.

3.2.10 UBR

Telecom’s Unspecified Bit Rate Backhaul (UBR Backhaul) service allows the Service
Provider to transit traffic from any Unbundled Bitstream Service (UBS) or Basic UBA Parent
Handover Point to a Handover Point in a Coverage Area where the Service Provider has a
Handover Link. The UBR Backhaul service provides transmission capacity from the trunk
side of the Parent Handover Point to the Service Provider’s chosen Handover Link.

UBR Terminal UBR Base

Each End User is located in a Coverage Area. The End Users traffic from numerous
DSLAMs in a Coverage Area is carried to the Handover Point over Local Aggregation Paths
dimensioned to support the throughput rate for UBS or Basic UBA. The Service Provider
may interface to each of the Handover Points directly. Alternatively, the Service Provider
may choose to purchase Telecom’s UBR Backhaul service for the delivery of traffic
aggregated to another Coverage Area where the Service Provider has a Handover Link. The
Telecom access network is currently divided into 34 Coverage Areas. These Coverage Areas,

19
when combined, provide national coverage of the Telecom DSL network. Telecom may
change the location of Handover Points and related Coverage Areas in the future.

Service Providers can combine a number of Handover Links with UBR Backhaul to achieve
national service coverage. For each Coverage Area, Service Providers specify the Handover
Coverage Area where they have established a Handover Link at the Handover Point where
traffic is to be handed over. Each Coverage Area has a Handover Point for ATM (STM1 or
STM4) and Ethernet. In some cases the ATM and Ethernet Handover Points are at different
exchange locations. For Ethernet Handover, traffic from multiple Coverage Areas can be
handed over on the same Handover Link as separate VLANs.

20
4. PROTOCOL

Protocol is a system of rules that allow two or more entities of a communications system to
transmit information via any kind of variation of a physical quantity. The protocol defines the
rules syntax, semantics and synchronization of communication and possible error recovery
methods. Protocols may be implemented by hardware, software, or a combination of both.
Communicating systems use well-defined formats (protocol) for exchanging various
messages. Each message has an exact meaning intended to elicit a response from a range of
possible responses pre-determined for that particular situation. The specified behavior is
typically independent of how it is to be implemented. Communication protocols have to be
agreed upon by the parties involved. To reach agreement, a protocol may be developed into a
technical standard. A programming language describes the same for computations, so there is
a close analogy between protocols and programming languages: protocols are to
communication what programming languages are to computations.

Protocols exist at several levels in a telecommunication connection. For example, there are
protocols for the data interchange at the hardware device level and protocols for data
interchange at the application program level. In the standard model known as Open Systems
Interconnection (OSI), there are one or more protocols at each layer in the telecommunication
exchange that both ends of the exchange must recognize and observe. Protocols are often
described in an industry or international standard. The TCP/IP Internet protocols, a common
example, consist of:

 Transmission Control Protocol (TCP), which uses a set of rules to exchange


messages with other Internet points at the information packet level.
 Internet Protocol (IP), which uses a set of rules to send and receive messages at
the Internet address level.
 Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File
Transfer Protocol (FTP), each with defined sets of rules to use with corresponding
programs elsewhere on the Internet.
 There are many other Internet protocols, such as the Border Gateway Protocol
(BGP) and the Dynamic Host Configuration Protocol (DHCP).

4.1 Internet Protocol


Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of
successfully transmission of data. In order to make it reliable, it must be paired with reliable
protocol such as TCP at the transport layer.

Internet Protocol (IP) is the principal set (or communications protocol) of digital message
formats and rules for exchanging messages between computers across a single network or a
series of interconnected networks, using the Internet Protocol Suite (often referred to as
TCP/IP). Messages are exchanged as datagrams, also known as data packets or just packets.
21
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite, which is a set of
communications protocols consisting of four abstraction layers: link layer (lowest), Internet
layer, transport layer and application layer (highest). The main purpose and task of IP is the
delivery of datagrams from the source host (source computer) to the destination host
(receiving computer) based on their addresses. To achieve this, IP includes methods and
structures for putting tags (address information, which is part of metadata) within datagrams.
The process of putting these tags on datagrams is called encapsulation.

Internet protocol transmits the data in form of a datagram as shown in the following diagram:

4.1.1 IP Versions:

Internet Protocol Version 4 (IPv4)

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one
of the core protocols of standards-based internetworking methods in the Internet, and was the
first version deployed for production in the ARPANET in 1983. It still routes most Internet
traffic today, despite the ongoing deployment of a successor protocol, IPv6. IPv4 is a
connectionless protocol for use on packet-switched networks. It operates on a best effort
delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or
avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an
upper layer transport protocol, such as the Transmission Control Protocol (TCP).

IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses.
IPv4 reserves special address blocks for private networks and multicast addresses. IPv4
addresses may be represented in any notation expressing a 32-bit integer value. They are

22
most often written in the dot-decimal notation, which consists of four octets of the address
expressed individually in decimal numbers and separated by periods.

IPv4 address classes:

1. A IP addresses, where the 1st bit is 0, encompass the range of 0.0.0.0 to


127.255.255.255. This class is for large networks and has 8 bits for network and 24
bits for hosts.
2. Class B IP addresses, where the 1st two bits are 10, are in the range of 128.0.0.0 to
191.255.255.255. This class is for medium networks and has 16 bits for network and
16 bits for hosts.
3. Class C IP addresses, where the 1st three bits are 110, are in the range of 192.0.0.0 to
223.255.255.255. This class is for smaller networks and has 24 bits for network and 8
bits for hosts.
4. Class D or multicast IP addresses, where the 1st four bits are 1110 are in the range of
254.0.0.0 to 239.255.255.255.
5. Class E or experimental IP addresses, where the 1st four bits are 11110, are in the
range of 192.0.0.0 to 254.255.255.255.

Internet Protocol Version 6 (IPv6)

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers
on networks and routes traffic across the Internet. IPv6 is an Internet Layer protocol
for packet-switched internetworking and provides end-to-end datagram transmission across
multiple IP networks, closely adhering to the design principles developed in the previous
version of the protocol, Internet Protocol Version 4 (IPv4).

The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32
bits to 128 bits. This extension anticipates considerable future growth of the Internet and
provides relief for what was perceived as an impending shortage of network addresses. IPv6
also supports auto-configuration to help correct most of the shortcomings in version 4, and it
has integrated security and mobility features.

IPv6 features include:

 Supports source and destination addresses that are 128 bits (16 bytes) long.
 Requires IPSec support.
 Uses Flow Label field to identify packet flow for QoS handling by router.
 Allows the host to send fragments packets but not routers.
 Doesn't include a checksum in the header.
 Uses a link-local scope all-nodes multicast address.
 Does not require manual configuration or DHCP.

23
 Uses host address (AAAA) resource records in DNS to map host names to IPv6
addresses.
 Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6
addresses to host names.
 Supports a 1280-byte packet size (without fragmentation).
 Moves optional data to IPv6 extension headers.
 Uses Multicast Neighbor Solicitation messages to resolve IP addresses to link-layer
addresses.

24
5. JIO ARCHITECTURE

5.1 Terminology

 Layers of the Architecture:

a. Access layer
b. Aggregation layer
c. Core layer

 EnodeB:

E-UTRAN Node B, also known as Evolved Node B (abbreviated as eNodeB or eNB), is the
element in E-UTRA of LTE that is the evolution of the element Node B in UTRA of UMTS.
It is the hardware that is connected to the mobile phone network that communicates directly
wirelessly with mobile handsets (UEs), like a base transceiver station (BTS) in GSM
networks.

Traditionally, a Node B has minimum functionality, and is controlled by a Radio Network


Controller (RNC). However, with an eNB, there is no separate controller element. This
simplifies the architecture and allows lower response times.

25
LTE vendors are now offering eNodeB with a choice of either separate controller + Remote
Radio Head(s) for Macro Sites, or fully integrated controller with RF, for Small Cell
applications. The choice depends typically on the scale of coverage required.

 Small cell:

Small cells are low-powered cellular radio access nodes that operate in licensed and
unlicensed spectrum that have a range of 10 meters to a few kilometers. Single sector is with
120°. They are "small" compared to a mobile macrocell, partly because they have a shorter
range and partly because they typically handle fewer concurrent calls or sessions. They make
best use of available spectrum by re-using the same frequencies many times within a
geographical area. Fewer new macrocell sites are being built, with larger numbers of small
cells recognised as an important method of increasing cellular network capacity, quality and
resilience with a growing focus using LTE Advanced. There are two types of small cells-
Indoor small cells and Outdoor small cells

Benefits:

1- Lower delay: users will experience lower latency for data services and will enjoy faster
download and upload time.

2- In-building coverage: small cells provide better outdoor-to-indoor coverage. Considering


that 40 per cent of mobile traffic originates from home and 25 per cent from work, this can
represent a significant source of revenue for network operators.

26
3- Better cell-edge coverage: Macro base stations provide poor service at the cell edge
which includes a large percentage of the cell area. Small cells provide better cell-edge
performance, particularly for the uplink than large cells.

There are different router collaboration at different location for data transmission from main
server to our devices. These are connected through Ring and Mesh Topology. There are
different rings of routers to reach communication at our door . There are maximum limit of
router in each ring.

Some are:

 Maximum 10 AG1 ring per AG2 Pair


 Maximum 4 AG1 per AG1 Pair
 Maximum 4 CSR ring per AG1 Pair
 Maximum 5 CSR per CSR Pair

5.2 Data Transmission


The data is reached to us from data storage location within just moments. This whole process
passes through different router at different location with different signalling capacity. The
flow network is:

Network Classification –

 Core Network- Nexus, SAR, AG3


 Aggregation Network- AG3, AG2, AG1,
 Access Network- AG1, CSR, AP.

Nexus SAR AG3 AG2 AG1

eNB CSR

Network Flow
Small Cell L2 Switch

27
5.3 JIO’s AG3
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference to
addresses based on predetermined criteria. Aggregating routes limits the number of routes
available to service providers. When a service provider receives IP addresses occurs in a
contiguous block. The service provider can then divide IP addresses into smaller allocated
blocks and lease them to other Internet service providers.

Route aggregation offers stability to network. Additionally, reducing the number of routers
minimizes the overhead related to routing protocol and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.

Aggregation Node 3(AG3) routers are the largest aggregation routers used in JIO. AG3
routers are place in 11 super core cities.

Topology used in AG3

MESH TOPOLOGY

In a mesh network topology, each of the network node,


computer and other devices, are interconnected with one
another. Every node not only sends its own signals but also
relays data from other nodes. In fact a true mesh topology is the
one where every node is connected to every other node in the
network. This type of topology is very expensive as there are
many redundant connections, thus it is not mostly used in
computer networks. It is commonly used in wireless networks. Flooding or routing technique
is used in mesh topology.

Advantages:

 Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
 Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
 Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages:

 There are high chances of redundancy in many of the network connections.


 Overall cost of this network is way too high as compared to other network topologies.
 Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.

28
11 supercore cities with 2*AG3 POPs

NEW DELHI

NOIDA

LUCKNOW
W

AHEMDABAD

KOLKATA

NAGPUR

HYDERABAD

MUMBAI MUMBAI

CHENNAI

BANGLURU
U

29
5.4 JIO’s AG2
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference based on
predetermined criteria. Aggregating route limits the number of routes available to service
providers. When a service provider receives IP addresses, the allocation of these IP addresses
occurs in a contagious block. The service provider can then divide the IP addresses into
smaller allocated block and lease them to other Internet service providers.

Route aggregation offers stability to networks. Additionally, reducing the number of routers
minimizes the overhead related to routing protocols and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.
AG2 Routers collects the data from the AG1 routers transfers them to the next higher
level that is the AG3 router. AG2 router are the next biggest routers after AG3 routers
used in JIO.

Topology used in AG2

RING TOPOLOGY

Ring topology, also known as Ring network, is a type of network


topology where each node is exactly connected to two other
nodes, forward and backward, thus forming a single continuous
path for signal transmission.
There are two types of the Ring Topology based on the data flow:
 Unidirectional and,
 Bidirectional
A Unidirectional ring topology handles data traffic in either clockwise or anticlockwise
direction. This data network, thus, can also be called as a half-duplex network.

Advantages:

 Reduced chances of data collision as each node release a data packet after receiving
the token.
 Token passing makes ring topology perform better than bus topology under heavy
traffic.
 Equal access to the resources.

Disadvantages of Ring topology:

 In Unidirectional Ring, a data packet must pass through all the nodes.

30
5.5 JIO’s AG1
Route aggregation tries to organize a network by replacing multiple routes with a single,
general route. This process uses a hierarchical categorization that gives preference to
addresses based on predetermined criteria. Aggregating routes limits the number of routes
available to service providers. When a service provider receives IP addresses occurs in a
contiguous block. The service provider can then divide IP addresses into smaller allocated
blocks and lease them to other Internet service providers.

Route aggregation offers stability to network. Additionally, reducing the number of routers
minimizes the overhead related to routing protocol and reduces the number of updates
required as a result of network changes such as upgrades or downgrades. Aggregation also
reduces workload on the system by requiring less power, memory, storage and bandwidth.
AG1 Routers collect the data from the small cell routers and transfers them to the next
higher level that is the AG2 routers.

Topology used in AG1

RING TOPOLOGY

A ring topology is a network configuration in which device


connections create a circular data path. Each networked
device is connected to two others, like points on a circle.
Together, devices in a ring topology are referred to as a
ring network. In a ring network, packets of data travel from
one device to the next until they reach their destination.
Most ring topologies allow packets to travel only in one
direction, called a unidirectional ring network. Others
permit data to move in either direction, called bidirectional.

In the past, the ring topology was most commonly used in schools, offices, and smaller
buildings where networks were smaller. However, today, the ring topology is seldom used,
having been switched to another type of network topology for improved performance,
stability, or support.

Advantages of ring topology

 All data flows in one direction, reducing the chance of packet collisions.
 A network server is not needed to control network connectivity between each
workstation.
 Data can transfer between workstations at high speeds.
 Additional workstations can be added without impacting performance of the network.

Disadvantages of ring topology

31
 All data being transferred over the network must pass through each workstation on the
network, which can make it slower than a star topology.
 The entire network will be impacted if one workstation shuts down.
 The hardware needed to connect each workstation to the network is more expensive
than Ethernet cards and hubs/switches

32
6. ROUTERS USED IN JIO
6.1 AG1 Router (Cisco ASR 903)

Slots per Chassis 16

Rack Size 3 RU
Max Capacity Up to 480 Gbps

Size (H x W x D)5.22 x 17.44 x 9.22 in.


(132.6 x 443 x 234.2 mm)
Weight 34.17lb(15.5 kg) with two RSPs, two DC power
supplies, and typical combination of interface module
cards
Empty Chassis 11.2 lb(5.1 kg)

Power AC or DC Up to 2 power supplies


*Modules operate in load-share mode
**System can operate on a single power supply and
supports mixing of AC and DC power supplies in a
single chassis.
Fans 1 fan tray with fan redundancy 4 dry contact input
alarms on the fan tray
Airflow Side-to-side

Software IOS XE

Cisco ASR 903

33
6.2 AG2 Router (Cisco ASR 9010)

Slots 8 Lines Cards


2 RSP
Rack Size 21 RU

Bandwidth per slot 880 Gbps

Max Capacity 14 Tbps

Size (H x W x D ) 36.75in. x 17.5 in. x 28.65 in.

Fan 2 fan trays

Airflow Front to Back

RSP/RP 2 (1+1 RSP redundancy )

Fabric 1+1 fabric redundancy


Architecture
Software IOS XR

Cisco ASR 9010

34
6.3 AG3 Router (Cisco ASR 9900 and ASR 9922)

The Cisco ASR 9900 Route Processor is the first generation of system processors available
for the Cisco ASR 9912
Router and ASR 9922 Router
chassis. The Cisco ASR 9900
Route Processor is designed
with a system architecture to
accommodate convergence of
Layer 2 and Layer 3 services
as required by today’s service providers in wireline, data center interconnect (DCI), and
Radio Access Network (RAN) aggregation applications.

The Cisco ASR 9900 Route Processor brings the time-tested and robust carrier-class
capabilities of Cisco IOS XR Software to the Carrier Ethernet edge. The operating system
supports true software process modularity. The capabilities of Cisco IOS XR Software allow
each process to run in separate protected memory, including each routing protocol along with
multiple instances of control, data, and management planes supported. The software also
supports distributed route processing. The Cisco ASR 9900 Route Processor is designed to
deliver the high scalability, performance, and fast convergence required for today’s and
tomorrow’s demanding video, cloud, and mobile services.

The Cisco ASR 9922 Router is the largest of the Cisco ASR 9000 Series
Routers at 43 rack units (RUs). This high-capacity platform is designed
to deliver the services of tomorrow.

 A flexible programming infrastructure


 High-density Ethernet and advanced Ethernet services
 Robust Hierarchical Quality of Service (H-QoS)

Providing increased bandwidth capabilities for network devices at low


prices is one of the primary criteria for true carrier-transport platforms.
The ASR 9000 Series can scale up to 96 Tbps per system, which
provides an ideal foundation for a full suite of next-generation services.

35
7. SCCM SERVER

Microsoft System Centre Configuration Manager is a windows product that enables


administrator to manage the deployment and security of device and applications across an
enterprise.

WORKING: Packages are created among the SCCM console which contain the executable
files and the command lines for the application to be installed. These packages are then
replicated on “distribution points”. Distribution points are nothing but sort of file server
which are used to store the content of the packages for a particular region. Therefore, if a
bunch of machines are remotely located then they can locally download the application from
a distribution point, rather than connecting all the way to the SCCM primary server.

All the machine in a SCCM environment will have an SCCM client agent installed on them,
which essentially helps a machine to be able to communicate with the SCCM server.
Therefore a deployment is created by the SCCM admin where an application is targeted on a
bunch of machines. With the help of the SCCM client agent installed on the end user
machine, it keeps checking for new policies or deployments. Once the policy has reached the
end machine, it will be evaluated and it will reach out to its respective regional distribution
point for downloading the content of the packages. Once the executable files are downloaded
in a temp folder (C:\Windows\ccmcache) they are installed locally and status for the same is
sent back to the SCCM server to be updated in the database

36

S-ar putea să vă placă și