Documente Academic
Documente Profesional
Documente Cultură
AFFILIATED TO
GURU GOVIND SINGH INDRAPRASTHA UNIVERSITY,DELHI
ACKNOWLEDGEMENT
During the entire period of my training in MTNL ,I received endless help from Mr.
Kaushal Kassi(training in charge, MTNL, Harinagar) .he provided me with his timely
suggestions, constant encouragement and invaluable guidance in the successful
completion of the training thank him for the endeavor and zeal he filled me with
throughout the work.
A profound sense of gratitude is due to Ms. Jayna Chawla, for her valuable suggestion
and corporation for the report preparation.
Alok Abhinav.
(0631022806)
IV year(VII sem.)
Electronics and Communication Engineering
ABSTRACT
LIST OF FIGURES
LIST OF TABLES
CONTENT
CHAPTER-1. INTRODUCTION
1.1. Company Profile
About MAHANAGAR TELEPHONE NIGAM LIMITED
1.2.5. Intelligent Network: Through this network MTNL provides Toll Free
phone service, Premium rate Service (PRM) e.g. KBC2 etc. , Virtual Card
Calling Service (VCC) etc.
Commercially introduced in 1995, CDMA quickly became one of the world's fastest-
growing wireless technologies. In 1999, the International Telecommunications Union
selected CDMA as the industry standard for new "third-generation" (3G) wireless
systems. Many leading wireless carriers are now building or upgrading to 3G CDMA
networks in order to provide more capacity for voice traffic, along with high-speed data
capabilities.
3.2.1. The signal occupies a bandwidth much greater than that which is necessary to
send the information. This results in many benefits, such as immunity to interference and
jamming and multi-user access, which we'll discuss later on.
3.2.2. The bandwidth is spread by means of a code which is independent of the data. The
independence of the code distinguishes this from standard modulation schemes in which
the data modulation will always spread the spectrum somewhat.
3.2.3. The receiver synchronizes to the code to recover the data. The use of an
independent code and synchronous reception allows multiple users to access the same
frequency band at the same time.
In order to protect the signal, the code used is pseudo-random. It appears random, but is
actually deterministic, so that the receiver can reconstruct the code for synchronous
detection. This pseudo-random code is also called pseudo-noise (PN).
Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals
are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept
or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than
narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features
are why the military has used Spread Spectrum for so many years. Spread signals are
intentionally made to be much wider band than the information they are carrying to
make them more noise-like. Spread Spectrum signals use fast codes that run many times
the information bandwidth or data rate. These special "Spreading" codes are called
"Pseudo Random" or "Pseudo Noise" codes. They are called "Pseudo" because they are
not real Gaussian noise. Spread Spectrum transmitters use similar transmit power levels
to narrow band transmitters. Because Spread Spectrum signals are so wide, they transmit
at a much lower spectral power density, measured in Watts per Hertz, than narrowband
transmitters. This lower transmitted power density characteristic gives spread signals a
big plus. Spread and narrow band signals can occupy the same band, with little or no
interference. This capability is the main reason for all the interest in Spread Spectrum
today.
In cellular service there are two main competing network technologies: Global
System for Mobile Communications (GSM) and Code Division Multiple Access
(CDMA). Cellular carriers including Sprint PCS, Cingular Wireless, Verizon and T-
Mobile use one or the other. Understanding the difference between GSM and CDMA
will allow you to choose a carrier that uses the preferable network technology for your
needs.The GSM Association is an international organization founded in 1987, dedicated
to providing, developing, and overseeing the worldwide wireless standard of GSM.
CDMA, a proprietary standard designed by Qualcomm in the United States, has been the
dominant network standard for North America and parts of Asia. However, GSM
networks continue to make inroads in the United States, as CDMA networks make
progress in other parts of the world. There are camps on both sides that firmly believe
either GSM or CDMA architecture is superior to the other. That said, to the non-invested
consumer who simply wants bottom line information to make a choice, the following
considerations may be helpful.
3.4.1. Coverage: The most important factor is getting service in the areas you will be
using your phone. Upon viewing competitors' coverage maps you may discover that
only GSM or CDMA carriers offer cellular service in your area. If so, there is no
decision to be made, but most people will find that they do have a choice.
3.4.2. Data Transfer Speed: With the advent of cellular phones doing double and triple
duty as streaming video devices, podcast receivers and email devices, speed is important
to those who use the phone for more than making calls. CDMA has been traditionally
faster than GSM, though both technologies continue to rapidly leapfrog along this path.
Both boast "3G" standards, or 3rd generation technologies. EVDO, also known as
CDMA2000, is CDMA's answer to the need for speed with a downstream rate of about 2
megabits per second, though some reports suggest real world speeds are closer to 300-
700 kilobits per second (kbps). This is comparable to basic DSL. As of fall 2005, EVDO
is in the process of being deployed. It is not available everywhere and requires a phone
that is CDMA2000 ready. GSM's answer is EDGE (Enhanced Data Rates for GSM
Evolution), which boasts data rates of up to 384 kbps with real world speeds reported
closer to 70-140 kbps. With added technologies still in the works that include UMTS
(Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet
Access), speeds reportedly increase to about 275—380 kbps. This technology is also
known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone
is required.In the case of EVDO, theoretical high traffic can degrade speed and
performance, while the EDGE network is more susceptible to interference. Both require
being within close range of a cell to get the best speeds, while performance decreases
with distance.
3.4.3. Subscriber Identity Module (SIM) cards: In the United States only GSM
phones use SIM cards. The removable SIM card allows phones to be instantly activated,
interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself
is tied to the network, rather than the actual phone. Phones that are card-enabled can be
used with any GSM carrier.
The CDMA equivalent, a R-UIM card, is only available in parts of Asia but remains on
the horizon for the U.S. market. CDMA carriers in the U.S. require proprietary handsets
that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone,
the carrier must deactivate the old phone then activate the new one. The old phone
becomes useless.
3.4.4. Roaming: For the most part, both networks have fairly concentrated coverage in
major cities and along major highways. GSM carriers, however, have roaming contracts
with other GSM carriers, allowing wider coverage of more rural areas, generally
speaking, often without roaming charges to the customer. CDMA networks may not
cover rural areas as well as GSM carriers, and though they may contract with GSM cells
for roaming in more rural areas, the charge to the customer will generally be
significantly higher.
The terms rating, re-rating, billing, and invoice formatting are left without boundaries
above. They are in time-order but different business models change the amount of work
that these functions perform.
There is an important distinction that defines the boundaries between rating and
billing. The fundamental distinction is whether we have aggregate information available
to you. Aggregate information includes the sum of the customer's spending, minutes of
usage, bandwidth transported or other total amounts for the billing period. This
aggregate information is needed to calculate volume-based discounts and it is often
necessary when calculating taxes.
Rating is the calculation of charges for the customer that can be performed
without knowledge of the aggregate. If a usage event can be priced without knowledge
of any other usage event, this is Unit Rating. Each transaction can be rated as an
independent unit. It also refers to the computers of the 1940's and 1950's where
transactions were processed on unit record machines. Each transaction was a punched
paper card. Telephone charges are largely unit rated. You can rate these in any order and
at any time during the billing cycle with the results ending up the same. Each chargeable
event stands alone.
Here we have the aggregate traveling forward along with each usage event. The final
aggregate plays a part in the volume discounting and taxing and the like, but an
intermediate aggregate is used to rate each event. The rating result is now dependent on
the order in which you process the usage events. This is Aggregate Rating. The
aggregate needed is just the total usage of the resource being rated.Most service
providers unit rate the airtime and then back out the charges at the end of the billing
period, but the above is the most streamlined method of rating.
In a prepaid services environment we have have the final aggregate after every
event. The taxes and other fees must either be included in the rating of every transaction
or handled by some other process (i.e. taxes are included in the price for services). In
this case rating and billing are done after each usage event. We even collect payment
from the customer by reducing their deposit balance.
4.6. Re-Rating
Figure 4.5. The use of re-rating minimizes loss of business to price comparisons
This re-rating scenario has occurred when a service provider is losing business based on
price comparisons where the competitor offers to compare the cost of a portion of the
calls from the customer's bill. The competitor comes back with call-by-call comparisons
showing the incumbent service provider is priced higher, but the results are false. The
competitor has discounted their base rate. The incumbent provider is discounting the
total bill based on usage, but this discount doesn't affect the price shown for any single
usage event. In this environment, the service provider protects itself from this unfair
comparison by re-rating calls based on volume discounts.
M o b ile Base
TE BSC MSC PCF PDSN/ R A D IU S /
S t a t io n S t a t io n
R A D I U S c lie n t A A A s e r v e r
O r ig in a t e
c a ll O r ig in a t io n M essage
C M S e r v ic e
R equest
A s s ig n m e n t
C h a n n e l A s s ig n m e n t M eRs es qa ug e s t O v e r t h e a ir
(C A M /E C A M ) c a ll s e t u p
d e la y
S e r v ic e C o n n e c t M e s s a g e
(S C M )
S e r v ic e C o n n e c t C o m p le t io n
M essage A 9 - S e tu p - A 8
A 9 - C onnect - A 8
L C P C o n f ig u r e R e q u e s t
L C P C o n f ig u r e R e q u e s t
L C P C o n f ig u r e A c k
L C P C o n f ig u r e A c k P P P d e la y
P A P / C H A P R e q u e s t - S e r v ic e L a y e r A u t h e n t ic a tio n R A D IU S - A c c e s s
M S I D @ d o m a in . c o m ( N e t w o r k A c c e s s I d e n t if ie r ) R equest S e r v ic e
P A P /C H A P re s p o n s e R A D IU S - A c c e s s
L a y e r A u th
A ccept
I P C P C o n f ig u r e R e q u e s t d e la y
I P C P C o n f ig u r e R e q u e s t
I P C P C o n f ig u r e A c k
I P C P C o n f ig u r e A c k
STR-3
STR-2
2950 SW-2
3510
2950 SW-2 PUBLIC NETWORK Storage
172.14.14.33 172.14.14.5
STR-1
2950 SW-1
2950 SW-1
172.14.14.30
SAN-1
172.14.14.9
SAN-2
172.14.14.10
PUBLIC NETWORK
WAN LINK
Tcerminal Concentrator
172.14.14.4 TC Cable
Fiber cable
ce2 172.14.14.132
Fiber cable
ce2:1 172.14.14.6
LTBB01
ce0 172.14.14.1
ce0:1 172.14.14.131
CE1 172.14.14.22
CE2 172.14.14.134
LTAPPS
LTBB02
CE0 172.14.14.19 ce0 172.14.14.3
ce0:1 172.14.14.133
CE1 172.14.14.23
CLUSTER INTERCONNECT
3COM SWITCH
LTBATCH
CE0 172.14.14.20 BMS-DELHI
CE2 172.14.14.136
ce2:1 172.14.14.7
CE1 172.14.14.24
CE0 172.14.14.21
CHAPTER-5. SECURITY OF CDMA NETWORKS
The security protocols with CDMA-IS-41 networks are among the best in the
industry. By design, CDMA technology makes eavesdropping very difficult, whether
intentional or accidental.Unique to CDMA systems, is the 42-bit PN (Pseudo-Random
Noise) Sequence called “Long Code” to scramble voice and data. On the forward link
(network to mobile), data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps)
and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second
(Mcps). CDMA network security protocols rely on a 64-bit authentication key (A-Key)
and the Electronic Serial Number (ESN) of the mobile. A random binary number called
RANDSSD, which is generated in the HLR/AC, also plays a role in the authentication
procedures. The A-Key is programmed into the mobile and is stored in the
Authentication Center (AC) of the network. In addition to authentication, the A-Key is
used to generate the sub-keys for voice privacy and message encryption.CDMA uses the
standardized CAVE (Cellular Authentication and Voice Encryption) algorithm to
generate a 128-bit sub-key called the “Shared Secret Data” (SSD). The A-Key, the ESN
and the network-supplied RANDSSD are the inputs to the CAVE that generates SSD.
The SSD has two parts: SSD_A (64 bit), for creating authentication signatures and
SSD_B (64 bit), for generating keys to encrypt voice and signaling messages. The SSD
can be shared with roaming service providers to allow local authentication.
5.1.Authentication
In CDMA networks, the mobile uses the SSD_A and the broadcast RAND* as inputs to
the CAVE algorithm to generate an 18-bit authentication signature
AUTH_SIGNATURE), and sends it to the base station. This signature is then used by
the base station to verify that the subscriber is legitimate. Both Global Challenge (where
all mobiles are challenged with same random number) and Unique Challenge (where a
specific RAND is used for each requesting mobile) procedures are available to the
operators for authentication. The Global Challenge method allows very rapid
authentication. Also, both the mobile and the network track the Call History Count (a 6-
bit counter). This provides a way to detect cloning, as the operator gets alerted if there is
a mismatch.
Chapter-6. Electronic Exchanges:
6.1.1.3. Toll (Outgoing Call) Restriction. The facility of toll restriction or blocking of
subscriber line for specific types of outgoing traffic, viz., long distance STD calls, can
be availed of by all subscribers. This can be easily achieved by keying-in certain service
codes.
6.1.1.5. Abbreviated Dialing. Most subscribers very often call only limited group of
telephone numbers. By dialing only prefix digit followed by two selection digits,
subscribers can call up to 100 predetermined subscribers connected to any automatic
exchange. This shortens the process of dialing all the digits.
6.1.1.6. Call Forwarding. The subscriber having the call forwarding facility can keep
his telephone in the transfer condition in case he wishes his incoming calls to be
transferred to another telephone number during his absence.
6.1.1.7. Do Not Disturb.This service enables the subscriber to free himself from
attending to his incoming calls. In such a case, the incoming calls are routed to an
operator position or a talking machine. This position or machine informs the caller that
called subscriber is temporarily inaccessible.
6.1.1.8. Conference Calls. Subscribers can set up connections to more than one
subscriber and conduct telephone conferences under the provision of this facility.
6.1.1.9. Camp On Busy. Incoming call to a busy subscriber can be “Camped on” until
the called subscriber gets free. This avoids wastage of time in redialing a busy telephone
number.
6.1.1.10. Call Waiting. The ‘Call Waiting’ service notifies the already busy subscriber
of a third party calling him. He is fed with a special tone during his conversation. It is
purely his choice either to ignore the third party or to interrupt the existing connection
and have a conversation with the third party while holding the first party on the line.
6.1.1.12. Third party Inquiry. This system permits consultation and the transfer of call
to other subscribers. Consultation can be initiated by means of a special signal from the
subscriber telephone and by dialing the directory number of the desired subscriber
without disconnecting the previous connection.
6.1.1.15. Call Charge printout or immediate Billing. The subscriber can request
automatic post call charge notification in the printout form for individual calls or for all
calls. The information containing called number, date and time, and the charges can be
had on a Tele-type-write.
6.1.1.18. Connection without Dialing. This allows the subscribers to have a specific
connection set up, after lifting the handset, without dialing. If the subscriber wishes to
dial another number, then he has to start dialing within a specified time period, say 10
seconds, after lifting the handset.
6.1.1.20. Hot Line or Private Wire. Hot line service enables the subscriber to talk to a
specific subscriber by only lifting the handset. This service cannot be used. along with
normal dialing facility. The switching starts as soon as the receiver is lifted.
6.1.1.21. Denied Incoming Call. A Subscriber may desire that no incoming call should
come on a particular line. He can ask for such a facility so that he can use the line for
making only outgoing calls.
6.1.1.22. Instrument Locking. A few subscribers may like to have their telephone sets
locked up against any misuse. Dialing of a secret code will extend such a facility to
them.
6.1.1.23. Free of charge Calls. Calls free of charge are possible on certain special
services such as booking of complaints , booking of telegrams, etc.
6.1.1.24. Collect call. If so desired, the incoming subscriber is billed for all the calls
made to him, instead of the calling subscriber.
6.1.2.2. Faster installation and Easy Extension. The reduced volume of equipment,
plug-in assemblies for interconnecting cables, printed cards and automatic testing of
exchange equipment result in faster installation (about six months for a 10,000 line
exchange) Due to modular structure, the expansion is also easier and quicker.
6.1.2.3. Economic Consideration. The switching speed being much faster as compared
to Cross-bar system, the use of principle of full availability of trunk circuits and other
equipment makes the system economically superior to electromechanical systems.
6.1.2.4. Automatic test of Subscriber line. Routine testing of subscriber lines for
Insulation, capacitance, foreign potential, etc., are automatically carried out during night.
The results of the testing can be obtained in the printout form, the next day.
6.1.3.Maintenance Facilities
6.1.3.1. Fault Processing. Automatic fault processing facility is available for checking
all hardware components and complete internal working of the exchange. Changeover
from a faulty sub-system to stand-by sub-system is automatically affected without any
human intervention. Only information is given out so that the maintenance staff is able
to attend to the faulty sub-system.
6.1.3.2. Diagnostics. Once a fault is reported by the system, ‘on demand’ programs are
available which help the maintenance staff to localize the fault, who can replace the
defective printed card and restore the faulty sub-system. The faulty card is attended at a
centralized maintenance centre specifically equipped for this purpose.
6.2.2. Power Supply. The power supply should be highly stable for trouble free
operation as the components are sensitive to variations beyond +10%. It is almost
essential to have a stand-by power supply arrangement.
6.2.3. Total Protection from Dust. All possible precautions should be observed for
ensuring dust-free environment.
6.2.4. Temperature and Humidity Control. Due to the presence of quiescent current
in the components and because of their compactness., heat generated per unit volume is
highest in electronic exchanges. Moreover, as the component characteristics drift
substantially with the temperature and humidity, the air-conditioning load is higher.
Obviously, the air-conditioning system should be highly reliable and preferably there
should be a stand-by arrangement. The installation is also carried out in air-conditioned
environment.
6.2.6. PCB Repair. The repair of PCB’s is extremely complicated and sophisticated
equipments are required for diagnosing the faults. This results in having costly
inventory and a costly repair centre. With the frequent improvement and changes in the
cards, proper documentation of cards becomes essential.
The main objectives of the IN are the introduction and modification of new
services in a manner which leads to substantial reduction in lead times and hence
development costs, and to introduce more complex network functions. An objective of
IN is also to allow the inclusion of the additional capabilities and flexibility to facilitate
the provisioning of services independent of the underlying network's details. Service
independence allows the service providers to define their own services independent of
the basic call handling implementation of the network owner.
The key needs that are driving the implementation of IN are :
• Cost Reduction
Because the IN services are designed from the beginning to be reusable, many
new services can be implemented by building on or modifying an existing
service. Reusability reduces the overall cost of developing services. Also, IN is
an architecture independent concept, i.e. it allows a network operator to choose
suitable development hardware without having to redevelop a service in the
event that the network configuration changes.
• Customization
With IN, the process of modifying the service or customization of service for a
specific customer is much less expensive and time consuming.The customization
of services is further facilitated by the integration of advanced peripherals in the
IN through standard interfaces. Facilities such as voice response system,
customized announcements and text to speech converters lead to better call
completion rate and user-friendliness of the services.
7.3. IN Architecture
Building upon the discussion in the previous section, one can envisage that an IN
would consist of the following nodes :
• Specialized computer system for – holding service logic, feature control, service
creation, customer data, and service management.
The physical realization of the various nodes and the functions inherent in them
is flexible. This accrues form the "open" nature of IN interfaces. Let us now look at the
nodes that are actually to be found in an IN implementation. The service logic is
concentrated in a central node called the Service Control Point (SCP0. The switch with
basic call handling capability and modified call processing model for querying the SCP
is referred to as the Service Switching Point (SSP). Intelligent Peripheral (IP) is also a
central node and contains specialized resources required for IN service call handling. It
connects the requested resource towards a SSP upon the advice of the SCP. Service
Management Point (SMP) is the management node which manages services logic,
customers data and traffic and billing data. The concept of SMP was introduced in order
to prevent possible SCP malfunction due to on-the-fly service logic or customer data
modification. These are first validated at the SMP and then updated at the SCP during
lean traffic hours. The user interface to the SCP is thus via the SMP. All the nodes
communicate via standard interfaces at which protocols have been defined by
international standardization bodies. The distributed functional architecture, which is
evident from the above discussion, and the underlying physical entities are best
described in terms of layers or planes. The following sections are dedicated to the
discussion of the physical and functional planes.
Fig 14.IN Architecture
7.4. Physical Plane
7.4.1. Service Switching Point (SSP). The SSP serves as an access point for IN
services. All IN services calls must first be routed through the PSTN to the "nearest"
SSP. The SSP identifies the incoming call as an IN service call by analysing the initial
digits (comprising the "Service Key") dialled by the calling subscriber and launches a
Transaction Capabilities Application Part (TCAP) query to the SCP after suspending
further call processing. When a TCAP response is obtained from the SCP containing
advice for further call processing, SSP resumes call processing. The interface between
the SCP and the SSP is G.703 digital trunk. The MTR, SCCP, TCAP and INAP
protocols of the CCS7 protocol stack are defined in this interface.
The IP provides enhanced services to all the SSPs in an IN under the control of the SCP.
It is centralized since it is more economical for several users to share the specialized
resources available in the IP which may be too expensive to replicate in all the SSPs.
The following are examples of resources that may be provided by an IP:
• Voice response system
• Announcements
• Voice mail boxes
• Speech recognition system
• Text-to-speech converters
IN Services
Charging
The IN services can be broadly divided into three categories for charging purposes :
- No charging for calling user
- Charging of calling user as per local call
- Charging of calling user at higher rates
No charging for calling user : FPH, VCC and VPN services fall under this category.
Level ‘160’ is free at present and is proposed to be allotted to such services. Local
exchanges need to analyse only ‘160’ and route the call to SSP. This level has to be
created as charge free. New services of this type can be introduced in future without any
requirement of further modification in local exchanges
Charging of calling user as per local call : UN (local) falls under this category. Level
‘190’ is free at present and is proposed to be allotted to such services. Local exchanges
need to analyse only ‘190’ and route the call to SSP. This level has to be created as local
charge. New services of this type can be introduced in future without any requirement of
further modification in local exchanges.
Charging of calling user at higher rates : PRM and UN (long distance) falls under this
category. Since the charging is at higher rate it is proposed that prefix ‘0’ may be used to
have barring facility. Level ‘090’ may be used for such purpose. Local exchange will
analyse ‘090’ and route the call to SSP. This level has to be created as ‘charge on
junction pulses’. New services of this type can be introduced in future without any
requirement of further modification in local exchanges.
The access code of various IN services as proposed is as follows :
No charging for calling user :
FPH 1600
VCC 1601
Password change for VCC 1602
VPN 1603
Charging of calling user as per local call :
UN (local) 1901
Televoting 1902
Charging of calling user at higher rates :
PRM 0900
UN (Long distance) 0901
Most usage transactions in the world are processed in a unit rating environment. Even
the "aggregate rated" wireless phone calls are usually unit rated and then the free
minutes allocation are used to back out charges at the time of billing. The choice of unit
rating is a choice that reduces complexity and reduces the costs of processing
transactions. It also the traditional method of implementation.
REFERENCES