32
Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20 Page 1 of 32 continued… ABSTRACT of Project No. 1 Convergence of IPv6 Network through IPv4 Network Importance of Network. The Internet is a worldwide publicly accessible system of interconnected computer networks, since IPV4 in network enables data sharing between two or more computers, which minimize time and energy wastages. Limitation. The existing IPv4 network has the following limitations More latency, Less security Less address space and No auto configuration facility. Proposed system: IPv6 network is proposed in this in these projects that overcomes all the limitation available in existing network Hardware: Host, Switches and Routers Software: System software-Router ver 12.2 and Host – OS ver. window 7 Simulation software – GNS-3 and Problem definition When any organization wants to implement ipv6 network in his service area, it is not possible to implement all of sudden in entire area. It needs slowly migration from ipv4 to ipv6 without much affecting service. Solution: The Dual stack and tunneling concept is proposed in this project to transmit IPv6 packet through IPv4 Network that enables and achieves fully convergence in IPv6 network. Future scope This concept involves less nos. of commands and it is very simple to configure and not add any extra cost. So all network developer may use this concept

ABSTRACT of Project No. 1

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 1 of 32 continued…

ABSTRACT of Project No. 1

Convergence of IPv6 Network through IPv4 Network

Importance of Network.

The Internet is a worldwide publicly accessible system of interconnected computer

networks, since IPV4 in network enables data sharing between two or more computers,

which minimize time and energy wastages.

Limitation. The existing IPv4 network has the following limitations

� More latency,

� Less security

� Less address space and

� No auto configuration facility.

Proposed system: IPv6 network is proposed in this in these projects that overcomes all the limitation

available in existing network

Hardware: � Host, Switches and Routers

Software: � System software-Router ver 12.2 and Host – OS ver. window 7

� Simulation software – GNS-3 and

Problem definition When any organization wants to implement ipv6 network in his service area, it is

not possible to implement all of sudden in entire area. It needs slowly migration from ipv4

to ipv6 without much affecting service.

Solution: The Dual stack and tunneling concept is proposed in this project to transmit IPv6

packet through IPv4 Network that enables and achieves fully convergence in IPv6 network.

Future scope This concept involves less nos. of commands and it is very simple to configure and

not add any extra cost. So all network developer may use this concept

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 2 of 32 continued…

ABSTRACT of Project No. 2

Implementation of IPv6 Internet services (6PE) over existing MPLS Network

Importance of Network.

This project work is about implementation of IPV6 in MPLS network. As the IPv6

has been deployed in the Internet core networks and many content providers provide

service using the new protocol, various Internet Service Providers (ISPs) are lifted behind

due to the high cost of migration especially for MPLS core. Therefore, the Internet

Engineering Task force provides a solution to be utilized during the transition period, which

is 6PE. This method treats IPv6 as a label in MPLS routing and can achieve rapid

deployment without any change in the core network.

Proposed system: 6PE offers the following benefits to service providers:

1. Minimal operational cost and risk:

� No impact on existing IPv4 and MPLS services

� Only provider edge routers require upgrade

� A 6PE router can be an existing PE router or a new one dedicated to IPv6

traffic.

2. No impact on IPv6 customer edge (CE) routers. The ISP can connect to any

CE router running Static, IGP or EGP.

3. Production services ready. An ISP can delegate IPv6 prefixes.

Problem definition IPv6 introduction into existing MPLS service—6PE routers can be added at any

time. This feature relies heavily on multiprotocol Border Gateway Protocol (BGP)

extensions in the IPv4 network configuration on the provider edge (PE) router to

exchange IPv6 reachability information (in addition to an MPLS label) for each IPv6

address prefix. Edge routers are configured as dual-stack, running both IPv4 and IPv6,

and use the IPv4 mapped IPv6 address for IPv6 prefix reachability exchange.

Solution:

The objective of this project is how ISPs implement 6PE services to customers by

designing a small ISP network using a GNS3 software tool.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 3 of 32 continued…

ABSTRACT of Project No. 3

Implementation of MPLS L2 VPN

Importance of Network. MPLS technology is being widely adopted by service providers worldwide to implement

VPNs to connect geographically separated customer sites. VPNs were originally introduced to

enable service providers to use common physical infrastructure to implement emulated point-to-

point links between customer sites. A customer network implemented with any VPN technology

would contain distinct regions under the customer's control called the customer sites connected

to each other via the service provider network.

Limitation. In traditional router based networks, different sites belonging to the same customer were

connected to each other using dedicated point-to-point links. The cost of implementation

depended on the number of customer sites to be connected with these dedicated links. A full

mesh of connected sites would consequently imply an exponential increase in the cost

associated. Frame Relay and ATM were the first technologies widely adopted to implement

VPNs. These networks consisted of various devices, belonging to either the customer or the

service provider, that were components of the VPN solution.

Proposed system: Depending on the service provider's participation in customer routing, the VPN

implementations can be classified broadly into one of the following Overlay model, Peer-to-peer

model.

The Service Provider initially implemented overlay VPNs by providing either Layer 1

(physical layer) connectivity or a Layer 2 transport circuit between customer sites. In the

Layer 1 implementation, the Service Provider would provide physical layer connectivity between

customer sites, and the customer was responsible for all other layers. In the Layer 2

implementation the Service Provider was responsible for transportation of Layer 2 frames (or

cells) between customer sites, which was traditionally implemented using either Frame Relay or

ATM switches as Provider Edge devices.

Layer2 VPNs implemented on MPLS backbone of service providers are referred as

“MPLS L2 VPNs” or AToM (Any Transport over MPLS). The implementation of MPLS L2

VPNs can be done in point to point (Virtual Private Wire Service) and point to multi point

configuration (Virtual Private LAN Service). Implementation of AToM can be like to like circuits

or any to any circuits. Customers when sending traffic can use any of the technologies like

Ethernet, Frame Relay, ATM, PPP, HDLC etc layer-2 switching technologies and service

providers create different virtual circuits accordingly with the technology implemented for the sites

connectivity of the customers in the service provider routers for optimal paths.

Practical / Hands-on: In this project trainee will do the following:

1. A small ISP network and customer network with few number of routers.

2. Configure the Routing protocols, MPLS in that ISP network routers.

3. Configure VPN customer branch routing at different locations towards service

provider domain.

4. Configure VPN customer in ISP routers and check for end-to-end connectivity of

the branches.

Trainee can simulate the network with software tool: GNS3

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 4 of 32 continued…

ABSTRACT of Project No. 4

MPLS Traffic Engineering

Importance of Network. Multiprotocol Label Switching (MPLS) has evolved from being a buzzword in the

networking industry to a widely deployed technology in service provider (SP) networks.

MPLS is a contemporary solution to address a multitude of problems faced by present-day

networks: speed, scalability, quality of service (QoS) management, and traffic engineering.

Traffic Engineering is the process of steering traffic across to the backbone to

facilitate efficient use of available bandwidth between a pair of routers. Prior to MPLS TE,

traffic engineering was performed either by IP or by ATM, depending on the protocol in

use between two edge routers in a network. Though the term "traffic engineering" has

attained popularity and is used more in the context of MPLS TE today, traditional TE in IP

networks was performed either by IP or by ATM.TE with IP was mostly implemented by

manipulation of interface cost when multiple paths existed between two endpoints in the

network.

MPLS uses extensions to a link-state based Interior Gateway Protocol (IGP), such

as Intermediate System-to-Intermediate System (IS-IS) or Open Shortest Path First

(OSPF). MPLS calculates TE tunnels at the LSP head based on required and available

resources (constraint-based routing). If configured, the IGP automatically routes the traffic

onto these LSPs. Typically, a packet that crosses the MPLS TE backbone travels on a

single LSP that connects the ingress point to the egress point. MPLS TE automatically

establishes and maintains the LSPs across the MPLS network by using the

Resource Reservation Protocol (RSVP).

Proposed system: MPLS TE does the following-

� Source-based routing is applied to the traffic from the headend router (source of

MPLS TE tunnel). An explicitly defined path can be configured on the headend

router through which the traffic for a particular LSP must follow.

� MPLS TE provides efficient way of forwarding traffic throughout the network,

avoiding over-utilized and under-utilized links.

� MPLS TE adapts to changing bandwidth.

� MPLS TE takes into account configured bandwidth of the links.

Practical / Hands-on: In this project the trainee will be doing the following tasks with GNS3 software:

1. Design an ISP network with few Routers.

2. Configuring the IP addresses on the LAN / WAN interfaces.

3. Configuring and verification of Routing Protocol.

4. Configuring & verification of MPLS in ISP Routers.

5. Establishing and verifying the connectivity from Customer to ISP network.

6. Configuring a customer in MPLS domain of the ISP.

7. Creating the Traffic Engineering Tunnels in the ISP Routers with RSVP Protocol.

8. Verification of the Tunnels formation & load balancing etc.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 5 of 32 continued…

ABSTRACT of Project No. 5

Inter provider VPN

Importance of Network. MPLS technology is being widely adopted by service providers worldwide to implement VPNs

to connect geographically separated customer sites. VPNs were originally introduced to enable

service providers to use common physical infrastructure to implement emulated point-to-point links

between customer sites. A customer network implemented with any VPN technology would contain

distinct regions under the customer's control called the customer sites connected to each other via

the service provider network.

Limitation. In traditional router based networks, different sites belonging to the same customer were

connected to each other using dedicated point-to-point links. The cost of implementation depended

on the number of customer sites to be connected with these dedicated links. A full mesh of

connected sites would consequently imply an exponential increase in the cost associated. Frame

Relay and ATM were the first technologies widely adopted to implement VPNs. These networks

consisted of various devices, belonging to either the customer or the service provider, that were

components of the VPN solution. Depending on the service provider's participation in customer

routing, the VPN implementations can be classified broadly into one of the following Overlay model,

Peer-to-peer model.

Overlay VPNs were initially implemented by the Service Provider by providing either Layer 1

(physical layer) connectivity or a Layer 2 transport circuit between customer sites. In the Layer 1

implementation, the Service Provider would provide physical layer connectivity between customer

sites, and the customer was responsible for all other layers. In the Layer 2 implementation the

Service Provider was responsible for transportation of Layer 2 frames (or cells) between customer

sites, which was traditionally implemented using either Frame Relay or ATM switches as Provider

Edge devices.

Proposed system: The peer-to-peer model was developed to overcome the drawbacks of the Overlay model

and provide customers with optimal data transport via the Service Provider backbone. Hence, the

service provider would actively participate in customer routing. In the peer-to-peer model, routing

information is exchanged between the customer routers and the service provider routers, and

customer data is transported across the service provider's core, optimally. Customer routing

information is carried between routers in the provider network and customer network The peer-to-

peer model, consequently, does not require the creation of virtual circuits.

Practical / Hands-on: Inter-Provider VPN using BACK TO BACK VRF METHOD with GNS3 software:

The VRF-to-VRF approach is the simplest method for allowing MPLS VPN providers to

exchange VPN routing information for CE sites in different MPLS domains. In this approach, the

border provider edge (PE) routers residing in different autonomous systems function as ASBRs.

These ASBRs are interconnected either via a single link consisting of logical sub-interfaces or via

multiple physical links. VRFs are configured on the ASBRs to collect VPN client routes. Each sub-

interface or interface connected between the ASBRs is dedicated to a single client VRF. The single

client VRF can run eBGP, RIPv2, EIGRP, OSPF, or static routing to distribute the VPN routes to

its adjacent peer. The use of eBGP is, however, the most common in back-to-back VRF method

because eBGP scales best to this type of application, retaining the type of the route and offering

better policy, scalability, and security mechanisms. In this method, the LSP paths in adjacent MPLS

VPN autonomous systems are interconnected using the IP forwarding mechanism between the AS

border routers.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 6 of 32 continued…

ABSTRACT of Project No. 6

Implementation IPv6 VPN Services (6VPE) over MPLS

Importance of Network. This project work is about implementation of IPV6 in MPLS network. As the IPv6

has been deployed in the Internet core networks and many content providers provide

service using the new protocol, various Internet Service Providers (ISPs) are lifted behind

due to the high cost of migration especially for MPLS core. Therefore, the Internet

Engineering Task force provides a solution to be utilized during the transition period, which

is 6PE. This method treats IPv6 as a label in MPLS routing and can achieve rapid

deployment without any change in the core network.

Proposed system: 6VPE offers the following benefits to service providers:

1. Minimal operational cost and risk:

� No impact on existing IPv4 and MPLS services

� Only provider edge routers require upgrade

� A 6PE and 6VPE router can be an existing PE router or a new one

dedicated to IPv6 traffic.

2. No impact on IPv6 customer edge (CE) routers. The ISP can connect to any

CE router running Static, IGP or EGP.

3. Production services ready. An ISP can delegate IPv6 prefixes.

Problem definition

IPv6 introduction into an existing MPLS service?? 6PE routers can be added at

any time. This feature relies heavily on multiprotocol Border Gateway Protocol (BGP)

extensions in the IPv4 network configuration on the provider edge (PE) router to

exchange IPv6 reachability information (in addition to an MPLS label) for each IPv6

address prefix. Edge routers are configured as dual-stack, running both IPv4 and IPv6,

and use the IPv4 mapped IPv6 address for IPv6 prefix reachability exchange. 6PE offers

Internet services to the customers, then is VPN services can be offered to customers on

Ipv6??

Solution:

6VPE is the Virtual Private Netowrk (VPN) service offered by ISP using 6PE

network. ISP will l assign Unique local addresses to the different branches of Customers

and route between their branches using the dual stack routers placed at their edge

network. The objective of this project is how ISPs implement 6VPE services to customers

by designing a small ISP network using a GNS3 software tool.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 7 of 32 continued…

ABSTRACT of Project No. 7

Implementation of VPLS over MPLS

Importance of Network. Virtual Private LAN Services (VPLS) enables enterprises to link together their

Ethernet-based LANs from multiple sites via the infrastructure provided by their service

provider. From the enterprise perspective, the service provider’s public network looks like

one giant Ethernet LAN. For the service provider, VPLS provides an opportunity to deploy

another revenue-generating service on top of the existing network without major capital

expenditures. Operators can extend the operational life of equipment in their network. VPLS

uses the provider core to join multiple attachment circuits together to simulate a virtual

bridge that connects the multiple attachment circuits together. From a customer point of

view, there is no topology for VPLS. All customer edge (CE) devices appear to connect

to a logical bridge emulated by the provider core.

Proposed system: In this project trainee will do the following:

1. A small ISP network and customer network with few number of routers.

2. Configure the Routing protocols, MPLS in that ISP network routers.

3. Configure VPN customer branch routing at different locations towards service

provider domain.

4. Using Oracle Virtual Box Software creates a VM of CSR-1000V Router and

configure the VPLS.

5. Check the outputs & Results

Practical / Hands-on: � Trainee can simulate the network with software tool: GNS3, Oracle Vbox,

CSR-1000V

� Requirement: PC with 8 GB RAM Compulsory

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 8 of 32 continued…

ABSTRACT of Project No. 8

Implementing Layer 3 VPNs over Layer 2 VPN Topologies and

Providing L2 VPN Redundancy

Importance of Network. MPLS technology is being widely adopted by service providers worldwide to

implement VPNs to connect geographically separated customer sites. VPNs were originally

introduced to enable service providers to use common physical infrastructure to implement

emulated point-to-point links between customer sites. A customer network implemented with

any VPN technology would contain distinct regions under the customer's control called the

customer sites connected to each other via the service provider network.

Limitation. In traditional router based networks, different sites belonging to the same customer

were connected to each other using dedicated point-to-point links. The cost of

implementation depended on the number of customer sites to be connected with these

dedicated links. A full mesh of connected sites would consequently imply an exponential

increase in the cost associated. Frame Relay and ATM were the first technologies widely

adopted to implement VPNs. These networks consisted of various devices, belonging to

either the customer or the service provider, that were components of the VPN solution.

Proposed system: Depending on the service provider's participation in customer routing, the VPN

implementations can be classified broadly into one of the following Overlay model, Peer-to-

peer model.

Overlay VPNs were initially implemented by the Service Provider by providing either

Layer 1 (physical layer) connectivity or a Layer 2 transport circuit between customer sites.

In the Layer 1 implementation, the Service Provider would provide physical layer connectivity

between customer sites, and the customer was responsible for all other layers. In the

Layer 2 implementation the Service Provider was responsible for transportation of Layer 2

frames (or cells) between customer sites, which was traditionally implemented using either

Frame Relay or ATM switches as Provider Edge devices. Layer2 VPNs implemented on

MPLS backbone of service providers are referred as “ MPLS L2 VPNs”.

The peer-to-peer model was developed to overcome the drawbacks of the Overlay

model and provide customers with optimal data transport via the Service Provider backbone.

Hence, the service provider would actively participate in customer Layer 3 routing. In the

peer-to-peer model, routing information is exchanged between the customer routers and the

service provider routers, and customer data is transported across the service provider's

core, and routed optimally between the different sites as per the requirements of the

customer.

Customer Layer 3 routing information is carried between routers in the provider

network and customer network. The peer-to-peer model, consequently, does not require the

creation of virtual circuits. Layer 3 VPNs implemented on MPLS backbone of service

providers are referred as “MPLS L3 VPNs”.

This project deals with configuration of MPLS L3 VPN over MPLS Layer 2 VPN

Topologies and Providing MPLS L2 VPN Redundancy as shown in the figure below.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 9 of 32 continued…

Practical / Hands-on: In this project trainee will do the following:

1. Design of a small ISP network and customer network with few numbers of routers

and IP address assignment for LAN and WAN networks.

2. Configure the Routing protocols, Multi Protocol Label switching in ISP routers.

3. Configuring customer branch routing at different sites, towards service provider

domain with static routing.

4. Configure MPLS L3 VPN customer in ISP routers with VRF creations.

5. Configure MPLS L2 VPN customer in ISP routers with pseudo wire logic in two

paths for redundancy

6. Verification of Routing Protocol, MPLS, MPLS VPN in ISP Routers.

7. Verification of customer sites for end-to-end connectivity of their branch locations.

8. Verification the MPLS L2 backp path (bottom path) if the first path (upper path

fails) fails

Trainee can simulate the network with software tool: GNS3

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 10 of 32 continued…

ABSTRACT of Project No. 9

Implementing Layer 2 VPNs over Inter-AS Topologies

Using Layer 2 VPN Pseudo-Wire Switching with Ethernet

Importance of Network.

MPLS technology is being widely adopted by service providers worldwide to

implement VPNs to connect geographically separated customer sites. VPNs were originally

introduced to enable service providers to use common physical infrastructure to implement

emulated point-to-point links between customer sites. A customer network implemented with

any VPN technology would contain distinct regions under the customer's control called the

customer sites connected to each other via the service provider network.

In traditional router based networks, different sites belonging to the same customer

were connected to each other using dedicated point-to-point links. The cost of

implementation depended on the number of customer sites to be connected with these

dedicated links. A full mesh of connected sites would consequently imply an exponential

increase in the cost associated. Frame Relay and ATM were the first technologies widely

adopted to implement VPNs. These networks consisted of various devices, belonging to

either the customer or the service provider, that were components of the VPN solution.

Depending on the service provider's participation in customer routing, the VPN

implementations can be classified broadly into one of the following Overlay model, Peer-to-

peer model.

Overlay VPNs were initially implemented by the Service Provider by providing either

Layer 1 (physical layer) connectivity or a Layer 2 transport circuit between customer sites.

In the Layer 1 implementation, the Service Provider would provide physical layer connectivity

between customer sites, and the customer was responsible for all other layers. In the

Layer 2 implementation the Service Provider was responsible for transportation of Layer 2

frames (or cells) between customer sites, which was traditionally implemented using either

Frame Relay or ATM switches as Provider Edge devices.

The peer-to-peer model was developed to overcome the drawbacks of the Overlay

model and provide customers with optimal data transport via the Service Provider backbone.

Hence, the service provider would actively participate in customer routing. In the peer-to-

peer model, routing information is exchanged between the customer routers and the service

provider routers, and customer data is transported across the service provider's core,

optimally. Customer routing information is carried between routers in the provider network

and customer network

Project salient points Several requirements have resulted from the sudden growth in VPN deployments.

One such requirement is that VPNs need to reside on different service provider networks in

different geographic areas or extend across multiple service providers. To enable continuity

of VPN services across multiple service providers, the VPN information has to be mutually

redistributed. The Inter-AS or Inter-Provider VPN feature allows the VPN information to be

redistributed between adjacent MPLS VPN entities so that client sites dispersed across

multiple service provider backbones can communicate with each other.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 11 of 32 continued…

The diagram shows the connectivity of MPLS L2 VPNs, where AS1 and AS2 are

two ISP providers inter connected with each other to Provider MPLS L2 VPN connectivity’s

of customer branches

Practical / Hands-on: The trainee will do the following

1. Simulation of the ISP1 and ISP2 customer networks & configuring the IP

addresses.

2. Protocols configurations on Routers of ISP1 and ISP2

3. Configuring the customer Network (CE1-A, CE2-A) as MPLS L2 VPN of ISP1 &

ISP2 sites

4. Configuration of link between ISP1 and ISP2 to share the customer information.

5. Configuration of Pseudo wires.

6. Verification and results

All this simulations will be done using the software tool GNS3

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 12 of 32 continued…

ABSTRACT of Project No. 10 Implementation and analysis of Fraud Management and Control Centre (FMCC)

in Real time Mobile network

Fraud in Telecom is an act committed to deprive the rightful revenue to the telecom service

provider, which affects the profit margin of the service provider. Besides revenue loss, it spoils the

reputation of a service provider and creates slack of confidence in the genuine subscribers. The

objective of Fraud Management and Control Centre (FMCC) is to detect, analyse and control

various frauds in a telecommunication network.

The FMCC system collects the CDRs from the various network elements like MSCs, IN,

SGSN, SMSC, GGSN etc. and collects the subscriber profile from the various Billing Systems. It

also collects live ISUP(BICC-ISUP,SIP) data from the various tapped SS7 signaling links and

constructs CDRs for cross checking with the Billing data. Frauds are manipulation of databases

(billing, charging, routing, etc.) through man-machine commands by authorised /unauthorised

persons.

Fraud detection techniques based on the analysis of messages on the CCS7 signaling links.

These links are monitored in a non-intrusive manner by connecting probes with high-impedance in

parallel to the CCS7 signalling links. FMCC builds Call Detail Records (CDR) in real time by

analysis of various call related parameters like calling number, called number etc. in CCS7

messages. Fraud detection is possible by analysis of usage profile, call patterns, calling trends

derived from CDRs and correlation of certain user defined parameters using software models. The

detection is achieved through various techniques: FMCC contains mainly three parts Remote site

equipment, central site equipment and Wide area network(WAN). On detection of a suspected

fraud, FMCC generates alerts to the manager. Based on the criteria defined by the manager,

alerts are converted into detailed cases, which include all relevant information needed to facilitate

investigation by manager, who can initiate manually initiated actions. Automatic actions by the

system are also possible

The FMCC can detect crossing of certain thresholds, which are user programmable.

Subscribers can be divided into groups like Home Group, Office Group, Business Group etc.

Thresholds can be set separately for any subscriber group. Subscription Frauds: Fraudster registers

for off-peak period) phone service, makes large number of calls (callselling) and runs away,

Large number of STD/ISD, calls will be made to the PRS and bills will not be paid but service

provider collects revenue share from network operator.

Handson / Practical: � Complete understanding of GSM/UMTS/LTE core networks working nature

� Different methods of network interrogation / Control Plane (Signalling) data analysis

� Different methods of Replication of sensitive data

� Offline/online data collection procedure

� Collection, conversion and loading various CDRs, profiles into database.

� Investigation and analysis of abnormal data

� Reports generation Through FMCC GUI.

� Reports creation and querying using sqlplus

Report: Final report preparation

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 13 of 32 continued…

ABSTRACT of Project No. 11

Implementation of various Voice call features (CSFB, VoLTE, SRVCC, eSRVCC)

and Security features in 4G-LTE Packet core Network

Regardless of the pace of LTE networks deployment around the world the number

of users with 4G devices is intensively growing with lower costs - due to the gain of

production scale, and also by encouraging migration to 4G plans - offered by operators

who already have an available network, more and more people have access to new

services and benefits that this technology offers. However, as much as the current data

services are improved, and that progress in the area lead to the adoption of new

services, a basic necessity should still continue to exist at least for a while voice calls!

While making a voice call may seem simple, largely depends on the scenario where the

user is, and alternatives available for its completion. So it is necessary to understand well

what are the possibilities and the most important concepts of these key scenarios.

In the first generation of cellular networks, the communication through voice calls

was the main goal, and was based on a circuit switched topology or 'channels'.Over time,

the need for other services (data!) has emerged. Voice calls have come into existence

with these new services. As demand increasead, these new services were supported by a

new domain, the IP-based packet-switched (PS Packet Switched).

And in LTE (4G) system has another great change that CS domain has been

extinguished! LTE networks are based exclusively on the PS domain, and voice services

should be carried out in other ways. But regardless of network topologies, voice services

are still needed. With the continue growth of LTE networks, need to more the concepts,

alternatives and solutions for any user to make a voice call on an LTE network with

mobility support among legacy networks 2G/3G.

Circuit Switch Fall Back (CSFB): This is applicable to Operators where LTE is launched but VoLTE is still not

supported. Since LTE itself doesn’t support voice & its all IP to IP Network, It uses

legacy 3G / 2G network for providing voice services to user.

Voice over Long-Term Evolution (VoLTE) is a standard for high-speed wireless

communication for mobile phones and data terminals—including IoT devices and wearables.

It is based on the IP Multimedia Subsystem (IMS) network, with specific profiles for

control and media planes of voice service on LTE.This approach results in the voice

service (control and media planes) being delivered as data flows within the LTE data

bearer. This means that there is no dependency onthe legacy circuit-switched voice

network to be maintained. VoLTE has up to three times more voice and data capacity

than 3G UMTS and up to six times more than 2G GSM. Furthermore, it frees up

bandwidth because VoLTE’s packets headers are smaller than those of unoptimized

VoIP/LTE.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 14 of 32 continued…

Single Radio Voice Call Continuity (SRVCC): Basically, SRVCC is a call transfer method or handover, which is implemented in a

simplified and reliable manner used. When an LTE user has an active voice session in

IMS and is moving to areas, which have legacy 2G/3G coverage, and does not have

LTE coverage. For Example, The user moving to this Area will loose LTE coverage and

uses SRVCC for continuing voice VoLTE Call initiated earlier in LTE Coverage area.

eSRVCC is introduced to shorten the speech gap caused by SRVCC handovers.

LTE introduced a new set of cryptographic algorithms and a significantly different key

structure than that of GSM and UMTS. There are 3 sets of cryptographic algorithms for

both confidentiality and integrity termed EPS Encryption Algorithms (EEA) and EPS

Integrity Algorithms (EIA). While these new algorithms have been introduced in LTE,

network implementations commonly include older algorithms for backward compatibility for

legacy devices and cellular deployments. Many keys in LTE are 256-bits long, but in

some current implementations only the 128 least significant bits are used. The specification

has allowed for a system-wide upgrade from 128-bit to 256-bit keys.2 In LTE, the

control and user planes may use different algorithms and key sizes.

Practical/ Handson:

� Glance on the available GSM/UMTS/LTE core networks

� Observations on real time network.

� Analysys of Configutaion LTE network for voice calls using real time network

� Analysys of new security features LTE network using traces from real time

network

Report:

Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 15 of 32 continued…

ABSTRACT of Project No. 12 Design of Voice over WiFi system in VOIP network using CISCO 2811 Routers

with SIM less app based calling features

Existing system uses SIM card for utilising services by providing Authentication and

Authorisation of concerned subscriber. Based on the User profile the provider will provide different

services. Problem with existing system is user has to get the signal concerned service provider

and user unable make or receive call when he is out of coverage area .It requires physical SIM

slot is required in the mobile handset to utilize the mobile services. Disadvantage of Existing

System is Not suitable for IP environment, No convergence features, High CAPEX & OPEX and

Large Power, Cooling requirements.

Proposed system: PDSN Data Network: This network was basically designed for accessing remote files and

servers for defense people and universities but now a days nobody can think of living with data

network services. The basic and most popular application of data networks is Internet. VOIP is an

acronym for Voice Over Internet Protocol, or in more common terms phone service over the

Internet. Other terms commonly associated with VoIP are IP telephony, telephony Internet

telephony, telephony broadband telephony, elephony and broadband phone service. A VoIP phone

is necessary to connect to a VoIP service provider. As the term says VoIP tries to let go voice

(mainly human) through IP packets and, in definitive through Internet.

VoIP can use accelerating hardware to achieve this purpose and can also be used in a

Mobile and PC environment. The app can also be configured to be used on a computer by

downloading the SIP Client (App) that it will make use of any Internet Connection like

broadband, Wi-Fi, 3G/4G data network of any operator for placing calls. This means that one

can expect robust network connectivity in areas where cellular network is patchy but there is a

good Wi-Fi connection available. The service will enable consumers to make calls even in areas

with erratic network supply. Authentication is provided by using user id and password and

authorization provided based on the user id.

Cisco 2801, Cisco 2811, Cisco 2821, and Cisco 2851. The 2800 Series provides increased

security, voice, and overall performance, embedded service options, and dramatically increased slot

performance and density, as compared to older 2600 Series models Cisco Systems ®, Inc.

redefined best-in-class enterprise and small- to- midsize business routing with a new line of

integrated services routers that are optimized for the secure, wire-speed delivery of concurrent

data, voice, video, and wireless services. intelligently embed data, security, voice, and wireless

services into a single, resilient system for fast, scalable delivery of mission-critical business

applications. The unique integrated systems architecture of the Cisco 2800 Series delivers

maximum business agility and investment protection.

Practical/ Handson: � Preparation Project Design

� Configuration of VoIP server,

� Creation of nodes, Routing the calls, preparation of Call detailed records

Project requirements: � Front end: Smart phones, IPods, Laptops any WIFI enabled user devices.

Report: Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 16 of 32 continued…

ABSTRACT of Project No. 13

Design and implementation of ‘Connected Smart Campus’ on IoT platform

using Raspberry Pi by using Python & MySql technologies

A Smart campus intended connecting the worldwide educational resources to faculty

and students contributing in intellectual development. A smart campus should provide various

services to students, which makes the students campus life easier, comfortable and

attractive. These services are not just for academic life but also for socializing, moving

around, sharing events. Student’s thinking is impacted atleast in three directions: academic,

practical and social ways. Existing campuses could think of alternatives for positively

impacting the student in these three ways for a better socio-economic society tomorrow.

Campus to be provided with the facilities with broader scope to the student by

providing facility to listen, access and interact with the eminent faculty with broader

backgrounds .As student enters into the campus he has connected campus network using

wireless network using his smart phone with limited facilities. First he has to register

himself so that it is used show presence in the campus as also it used as attendance.

Concerned authority may check presence of users at any time in the campus. Users can

makes the audio and video calls to the to other users who are registered in the network

without any cost by using pre assigned numbers and they may have group discussion

using conference and chatting.

Campus requires IVRS system to update the day-to-day academic activities instead

of displaying in the notice board such as classes schedule, exam results and any important

events and announcements. Registered user should dial the pre-defined number to access

latest updates of campus related activities. Suitable menu based activity system required to

navigate it. Some times we require to inform important information like circulars like exam

schedule, social gathering and campus interviews. This can be implemented by making

outbound calls by dialing to the registered users by playing informative announcement by

using text to speech converters. Lecturers required to know their load such as classes on

that date and other works assigned to him.

As laptops, iPads and Smartphones have become more prevalent, there are

dramatic increases in WIFI usage. These features implemented by enabling the entire

campus with wifi access to get the services by installing access points at suitable locations

with wired back bone network. Backbone network connected to the VoIP server .All features

are initiated by using SIP protocol. One of the main advantage of WIFI having limited

coverage suitable for near field communication, unlicensed spectrum no need to purchase

the spectrum and we can have own frequency planning and greater bandwidth.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 17 of 32 continued…

In this project you are going use Raspberry Pi as server. The Raspberry Pi is a

series of small single-board computers developed in the United Kingdom by the Raspberry

Pi Foundation. This model became far more popular than anticipated, selling outside its

target market for uses such as robotics. Here we are using Raspberry PI as VoIP server,

which is economical and consumes less power compared to the traditional Desktop/Servers.

This project in also useful to make Private branch exchange PBX network for Small

Scale Industries, Apartments and College Campus

Project requirements:

� Front end: Smart phones, IPods, Laptops any WIFI enabled user devices

� Back end: WIFI hotspots, Raspberry Pi VoIP Server, SIP Protocol, My SQL

database, PHP.

� Services: IVRS, Outbound dialing, Push services, Conference, Voice and video

calls without the ISP

Practical/ Handson:

� Preparation Project Design

� Configuration of Raspberry Pi as VoIP server

� Creation of nodes • Routing the calls, preparation of Call detailed records

Observations:

In this is project student can able to develop monitoring and alerting system and

tests on Real time Network elements Router/Switches and its analysis.

Report:

Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 18 of 32 continued…

ABSTRACT of Project No. 14

Automated Monitoring of Physical environment in Telecom Networks using light

weight MQTT protocol implemented in Raspberry Pi with IoT approach

A recent huge interest in Machine-to-Machine communication is known as the

Internet of Things (IoT), to allow the possibility for autonomous devices to use Internet for

exchanging the data. Internet of Things (IoT) involves connecting physical objects to the

Internet to provide opportunities to build smart systems or applications. IoT paradigm

assumes many devices connected over conventional intent network. These devices usually

have restricted resources, so moving part of the service implementation to a cloud

infrastructure is a prominent solution.

This work presents design and execution of real time monitoring temperatures and

humidity in Telecom network Electronic soft switch rooms. The sensors used to

detect/identify unauthorized movement and any person/object being within a certain range

to critical network elements and to give an alert when ever any one approaching near by

hazardous elements like Battery and Power supply.

Maintenance staff have to manually look at it 24X7 and take the necessary steps

but by using this project we can minimize working efforts and improve accuracy, stability,

efficiency in unmanned timings also. In this project, sensors are used to sense the main

parameters of equipment such temperatures, humidity and motion. This sensed Raspberry Pi

reads data and this controller checks parameter limits which further send to the IoT web

server using IoT module. The information is in the hand to the Maintenance

personal/operator and they can make useful decisions before any catastrophic failure on

basis of that data/parameters. The humidity and temperature measurements are stored in a

Mysql database, which is installed on the web server. Over a dynamic web page the data

can be retrieved from almost every place in the world.

MQTT is a machine-to-machine (M2M)/"Internet of Things" connectivity protocol.

It was designed as an extremely lightweight publish/subscribe messaging transport. It is

useful for connections with remote locations where a small code footprint is required and/or

network bandwidth is at a premium

The Raspberry Pi is a series of small single-board computers developed in the

United Kingdom by the Raspberry Pi Foundation. This model became far more popular than

anticipated, selling outside its target market for uses such as robotics

Practical/ Handson:

� Preparation Project Design

� Configuration of Raspberry Pi, MySql,and Web server using MQTT protocol

� Interfacing with sensors

� Integration of IoT elements

Report:

Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 19 of 32 continued…

ABSTRACT of Project No. 15

Automated Monitoring of Physical environment in Telecom Networks

using Arduino Uno with IoT approach

A recent huge interest in Machine-to-Machine communication is known as the

Internet of Things (IoT), to allow the possibility for autonomous devices to use Internet for

exchanging the data. Internet of Things (IoT) involves connecting physical objects to the

internet to provide opportunities to build smart systems or applications. IoT paradigm

assumes many devices connected over conventional intent network. These devices usually

have restricted resources, so moving part of the service implementation to a cloud

infrastructure is a prominent solution.

This work presents design and execution of real time monitoring temperatures and

humidity in Telecom network Electronic soft switch rooms. The sensors used to

detect/identify unauthorized movement and any person/object being within a certain range

to critical network elements and to give an alert when ever any one approaching near by

hazardous elements like Battery and Power supply.

Maintenance staff have to manually look at it 24x7 and take the necessary steps

but by using this project we can minimize working efforts and improve accuracy, stability,

efficiency in unmanned timings also. In this project, sensors are used to sense the main

parameters of equipment such temperatures, humidity and motion. This sensed data is read

by Arduino Uno and this controller checks parameter limits which further send to the IoT

web server using IoT module. The information is in the hand to the Maintenance

personal/operator and they can make useful decisions before any catastrophic failure on

basis of that data/parameters. The humidity and temperature measurements are stored in a

MySql database, which is installed on the web server. Over a dynamic web page the data

can be retrieved from almost every place in the world.

Arduino UNO is a widely used open-source micro controller board based on the

Microchip ATmega328P micro controller and developed by Arduino.cc. The board is

equipped with sets of digital and analog input/output (I/O) pins that may be interfaced to

various expansion boards (shields) and other circuits.It can be powered by a USB cable

or by an external 9 volt battery, though it accepts voltages between 7 and 20 volts. It is

also similar to the Arduino Nano and Leonardo. The hardware reference design is

distributed under a Creative Commons Attribution Share-Alike 2.5 license and is available

on the Arduino website

Practical/ Handson:

� Preparation Project Design

� Interfacing with sensors &Actuators

� Integration of Arduino, ESP01 and sensors and actuators

Report:

Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 20 of 32 continued…

ABSTRACT of Project No. 16

Automated Monitoring of Physical environment in Telecom Networks using

NodeMCU with IoT approach by light weight MQTT protocol

using Micro Python programing A recent huge interest in Machine-to-Machine communication is known as the

Internet of Things (IoT), to allow the possibility for autonomous devices to use Internet for

exchanging the data. Internet of Things (IoT) involves connecting physical objects to the

Internet to provide opportunities to build smart systems or applications. IoT paradigm

assumes many devices connected over conventional intent network. These devices usually

have restricted resources, so moving part of the service implementation to a cloud

infrastructure is a prominent solution.

This work presents design and execution of real time monitoring temperatures and

humidity in Telecom network Electronic soft switch rooms. The sensors used to

detect/identify unauthorized movement and any person/object being within a certain range

to critical network elements and to give an alert when ever any one approaching near by

hazardous elements like Battery and Power supply.

Maintenance staff have to manually look at it 24X7 and take the necessary steps

but by using this project we can minimize working efforts and improve accuracy, stability,

efficiency in unmanned timings also. In this project, sensors are used to sense the main

parameters of equipment such temperatures, humidity and motion. This sensed data is read

by NodeMCU and this controller checks parameter limits which further send to the IoT web

server using IoT module. The information is in the hand to the Maintenance

personal/operator and they can make useful decisions before any catastrophic failure on

basis of that data/parameters. The humidity and temperature measurements are stored in a

Mysql database, which is installed on the web server. Over a dynamic web page the data

can be retrieved from almost every place in the world.

NodeMCU is an open source IoT platform It includes firmware which runs on the

ESP8266 Wi-Fi SoC from Espressif Systems, and hardware which is based on the ESP-

12 module.[ The term "NodeMCU" by default refers to the firmware rather than the

development kits. The firmware uses the Lua scripting language. It is based on the eLua

project, and built on the Espress if Non-OS SDK for ESP8266. It supports other

Programming languages/scripts such as Micro Python and Arduino(C++)

MicroPython is a lean and efficient implementation of the Python 3 programming

language that includes a small subset of the Python standard library and is optimised to

run on micro controllers and in constrained environments

Practical/ Handson: � Configuration of Raspberry Pi, MySql,and Web server

� Programming with Micro Python and Arduino(C++)

� Interfacing with sensors

� Integration of IoT elements

Report: Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 21 of 32 continued…

ABSTRACT of Project No. 17

Mobile Cellular Network based Smart Home with Google Assistant by

usingNode MCU with IOT approach Home automation evolution starts with some basic ideas. It minimizes the human

efforts and it can be deployed in a lot of fields like military, surveillance application is

developed in the modern world. Now a day’s Home automation is developed by using

Wireless technology. Wireless technology in Home automation starts with Bluetooth, WI-FI,

and Zigbee Communication. Blynk is a Popular App used in this Project it has a lot of

Features like buttons, gauges, Sliders and Plotting Features also. By using Wi-Fi

technology we can connect a greater number of Home automation to control it very useful

for surveillance application.

The main objective of this project is to develop a home automation system using

an Node MCU board with Internet being remotely controlled by any Android OS smart

phone. As technology is advancing so houses are also getting smarter. Modern houses are

gradually shifting from conventional switches to centralized control system, involving remote

controlled switches. Presently, conventional wall switches located in different parts of the

house makes it difficult for the user to go near them to operate. Even more it becomes

more difficult for the elderly or physically handicapped people to do so. Remote controlled

home automation system provides a most modern solution with smart phones.

In order to achieve this, a relay module is interfaced to the Node MCU board at

the receiver end while on the transmitter end, a GUI application on the cell phone sends

ON/OFF commands to the receiver where loads are connected. By touching the specified

location on the GUI, the loads can be turned ON/OFF remotely through this technology.

The loads are operated by IoT board through Relay Module

GSM module is used to send / receive messages and make / receive calls as

a mobile phone a SIM card from network source. The module uses the SIMComm function.

It is be able to communicate easily with the module through AT commands. GSM library

contains several methods of communication with the module. The GSM modem can work

with any GSM network operator SIM card like a mobile phone with its own unique

telephone number. The advantage of this modem is the RS232 interface can be used to

communicate and develop integrated applications. Control applications such as SMS, data

transmission, remote monitoring and recording can be easily developed with this. GPRS

mode can also connect to an FTP server and files for data download this GSM modem

registration is a GSM Modem SIM900A Quad-band GSM modem and run very flexible for

easy integration with direct applications. It supports functions like voice, SMS, data / FAX,

GPRS and integrated TCP / IP stack. Up to a mobile network can be connected; the

module requires a SIM card provided by a network provider.

Practical/ Handson: � Preparation Project Design

� Configuration of Node MCU

� Interfacing with GSM SIM 900 module

� Interfacing with sensors

Report: Final report preparation.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 22 of 32 continued…

Introduction for Optical Fiber Communication /Transmission Projects.

(Common for projects No. 3 to No.6)

In telecommunications Optical fibers plays an important role because it carries the

data from transmitter to the receiver very effectively than other wired networks.

Optical fibers can be used to transmit light and thus information over long distances at

higher bandwidths. In most of the optical networks, silica fibers are used. The capacity of

fibers for data transmission is huge: a single silica fiber can carry lacks of telephone

channels. The cost per transported channel can be extremely low. The losses for light

propagating in fibers are amazingly small: ≈0.25 dB/km for modern single-mode silica

fibers, so that many tens of kilometers can be bridged without regenerating /amplifying the

signals.

Today, optical fibers are not only used in telecommunication links but also used

Local area networks (LAN), Gigabit Ethernet, SDH/SONET, ATM, ESCON, Fiber Channel

and CATV. Currently the optical fiber used in to access networks. The “last mile” to

business and home subscribers through FTTH services like IPTV/RF Video, VOIP, High

Speed Internet and future advanced services with High quality of service, high reliability,

flexibility, all in IP, future proof and using the network resources effectively.

To develop multimedia telecommunication networks as an infrastructure, it is

necessary to install the highly reliable optical fiber cable network architecture along with

traditional SDH, Next Generation SDH, and Dense Wave Length Division Multiplexing

(DWDM) Systems. Wavelength Division Multiplexing (WDM) is an effective technique for

utilizing the large bandwidth of an optical fiber.

The thrust of this project is on OFC/SDH/DWDM technology and it will create

awareness to the service provider network architecture, principles of OFC, different SDH

systems namely STM-4/16 of vendor name Tejas. In this project the real time environment

with hands on exposure to readily install and working OFC/STM-4/STM-16 systems along

with necessary Testing Instruments is covered. This project gives the complete details about

the theoretical and practical background to various OFC/SDH systems.

If desired to build awareness in telecom and enhance career prospects in the

Telecom industry especially in transmission specialization, this is the best-suited project.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 23 of 32 continued…

ABSTRACT of Project No. 18

Overview on Fibre Network and FTTH

Objective: This project involves the study of Optical Fiber characteristics, Splicing of OF cable,

Termination of OF Cable in TJB and Installation of FDF and extending of Fibers to

Systems and installation of 1:8 Spliiet for extending the Fiber to the Home connectivity for

the Splitter to the ONT and Various OF Measurements

Hardware:

1. 24 F Cable 2. Joint closure 3. 1:8 Splitter 4. Splicing Machine 5. Optical Power meter 6. OTDR 7. TJB 8. FDF 9. Various Patch cards and Pigtails.

Short Glance Of Project 1. Awarenes of OF cable structure 2. Types of OF cables and their applications in the field 3. Splicing of OF cable 4. Extending the connectivity to Splitter from OLT 5. Extending the connectivity to ONT/ ONU 6. Measurement of Optical Power 7. OF cable characteristics verification through OTDR

Final Review

Participant will be able to build a Fiber Optic network and get good acquaintance

with Fiber to the Home technologies.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 24 of 32 continued…

ABSTRACT of Project No. 19

Overview of Optical Fiber Cable Network maintenance with the help of

Instruments like Power Meter and OTDR

Objective:

This project involves the study of Optical Fiber History, Optical Fiber cable

characteristics, Different types of Splicing techniques, Splicing of OF cable, Termination of

OF Cable in TJB and Installation of FDF, extending of Fibers to Systems, study cable

diagrams, study of OTDR and power meter

Hardware:

1. 24 F Cable

2. Joint closure kit

3. Tools required for Splicing preperation

4. Splicing Machine

5. Optical Power meter

6. OTDR

7. TJB

8. FDF

9. Various Patch cards and Pigtails.

10. Various connectors.

Short Glance Of Project 1. Awareness of OF cable structure 2. Types of OF cables and their applications in the field 3. Splicing of OF cable 4. Termination of OF cable at TJB and FDF 5. Measurement of Optical Power 6. OF cable characteristics verification through OTDR

Final Review

Participant will be able to build a Fiber Optic network and get good acquaintance

with power meter and OTDR

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 25 of 32 continued…

ABSTRACT of Project No. 20

Design and Implementation of High Bandwidth to Corporate Network between

Two Next Generation SDH (STM-4) Nodes

Objective: Synchronous Digital Hierarchy (SDH) is a standard for telecommunications transport

formulated by the International Telecommunication Union (ITU). It is deployed at all levels

of the network infrastructure including the access network and the long-distance trunk

network. It is based on synchronous multiplexed signal onto a light stream transmitted over

Optical fiber. SDH improves the configuration flexibility and bandwidth availability over the

conventional Telecom transmission system.

In this project the student have the exposure to the real time environment with

hands on practice to readily installed working STM-4 SDH system, configuration of 155

Mbps bandwidth between two stations

Hardware:

1. Next Generation SDH Equipments

2. FX / GE connectors

3. Basic idea on Ethernet technology

4. Lap Top – 2 Nos

5. Illustration of MS Spring and MS Shared protections

6. Remote login and Importance of OSPF functionality

Software: 1. TJ100MC-4L NMS

Short Glance Of Project � Hardware Architecture of NG SDH Equipment

� Physical connectivity PC and SDH (Wire/Wireless/Mobile Configuration)

� Login Procedure

� Configuration of required bandwidth.

� Configuration of Protection Schemes

� MS spring and MS Shared protections

Final Review

Participant will be able to build a network connecting it through Next Generation

SDH Technology with different network

STM - 4 SDH System

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 26 of 32 continued…

ABSTRACT of Project No. 21

Design & implementation of 2 Mbps bandwidth to Corporate Sector by using SDH

Technology in with Protection

Objective: Synchronous Digital Hierarchy (SDH) is a standard for telecommunications transport

formulated by the International Telecommunication Union (ITU). It is deployed at all levels

of the network infrastructure including the access network and the long-distance trunk

network. It is based on synchronous multiplexed signal onto a light stream transmitted over

Optical fiber. SDH improves the configuration flexibility and bandwidth availability over the

conventional Telecom transmission system.

In this project the student have the exposure to the real time environment with

hands on practice to readily installed working STM-4 SDH system, configuration of

2 Mbps, 10 Mbps between two stations along with protection and Testing with Digital

Transmission Analyze.

Hardware:

1. Next Generation SDH Equipments

2. PC

3. PCM Cable

4. DDF

5. CAT-5/6 RJ 45 Cable

6. Laptops- 2 Nos for pinging

Software: 1. TJ100MC-4L NMS

Short Glance Of Project

� PCM Basic prinicples, Introduction of SDH , NGSDH

� Hardware Architecture of SDH & NG SDH Equipment

� Physical Wiring of PCM Cable

� Physical connectivity PC and SDH (Wire/Wireless/Mobile Configuration)

� Login Procedure

� Configuration of 2Mbps bandwidth

� Configuration of 10Mbps bandwidth

� Configuration of Protection Schemes

� Significance of Virtual concatenation and Link capacity adjustment scheme

Final Review

Participant will be able to build a network with Optical fibre cable, connecting nodes

within Ring and able to create different bandwidths between 2 NG SDH Transmission

systems

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 27 of 32 continued…

ABSTRACT of Project No. 22

Integrated Network platform for Next Generation Telecom network (NGN)

Introduction: India's telecommunication network is the second largest in the world based on the

total number of telephone users (both fixed and mobile phone). The concept of Next

Generation Network (NGN) was conceived since 2005 onwards as an integrated solution

to combine the quality and features of the PSTN with the low cost and routing flexibility of

the Internet to provide a single infrastructure for the future public network. This carrier

grade Internet solution calls for the creation of a consolidated, packet transport and

switching infrastructure and the development of a flexible, open, software switch

(softswitch) to handle voice telephony as well as multimedia services. Almost all the

telecom equipment manufacturers as well as some Internet equipment vendors immediately

subscribed to this vision and joined the race to create convergent products for the NGN

market. NGN project is being implemented by many service providers in INDIA and also in

western countries. It is being implementing in a phased manner.

Existing System: Presently telecommunications system employs one of the three types of the following

networks based on the end-user requirements. Those are

1. PSTN: Public Switch Telephone Network was basically developed and engineered for giving

voice connectivity to the wire line subscribers. The network consists of Local

exchange/RSU as a part of Access Network and TAXs as a part of core Network.

Already huge amount of money has been invested in PSTN setup. Because of tough

competition from Mobile & Voice over IP, it is becoming white elephant day by day for

the operators. Another fact about PSTN is that most of its equipments are going to

exhaust their lives in coming years.

2. PLMN:(Public Land Mobile Network): PLMN has been developed to provide voice services

for wireless subscribers. PLMN includes BTS/BSC as access network and MSC as a core

Network.

3. Data Network: This network was basically designed for accessing remote files and servers

for defense people and universities but now a days nobody can think of living with data

network services. The basic and most popular application of data networks

is Internet. Other applications include E-commerce, online banking, online gaming,

E-shopping, IPTV Video on demand and many more. Data network is an assembly of

routers, which are responsible for forwarding information from one end to other.

Disadvantage of Existing System: 1. Slow to develop new technologies

2. Not compatible for IP platform

3. No convergence features

4. High CAPEX & OPEX due to maintenance of different networks for different services.

5. Large Power, Cooling requirements.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 28 of 32 continued…

Proposed System: Proposed system is a single converged network that supports all telecom

requirements like voice, data, mobility, video etc. and works on packet switching technology

and IP compatible. This emerging network for Telecommunications is called as Next

Generation Network (NGN), which is the future telecom network

NGN Definition: A Next Generation Network (NGN) is a packet-based network able to provide

Telecommunication Services to users and able to make use of multiple broadband, QoS-

enabled transport technologies and in which service-related functions are independent of the

underlying transport-related technologies. It enables unfettered access for users to networks

and to competing service providers and services of their choice. It supports generalized

mobility, which will allow consistent and ubiquitous provision of services to users.

[ITU-T Recommendation Y.2001-General overview of NGN] NGN Architecture:

NGN is a layered architecture consisting of transport, access, control and application

layer. It is important to note that all the layers are independent from each other. Change

in one layer should not affect other layers. NGN Layered Architecture is shown below.

Objective:

This project involves design and implementation of Next Generation Networks over

IP platform for providing communication set up and also involves migration issues of

existing TDM (Time Division Multiplexing) network to NGN network also in this project we

propose simulations of NGN softwares and configurations on java plat form.

Protocols: 1. SIP 2. MEGACO/H.248

3. H.343 4. RTP

Simulation Software Requirements for the project: Front End Simulation: JAVA 2.0, JDK 1.7 and above (Open source)

Back End: MySQL Server (Database)

Conclusion: It is very much clear that NGN is a network, which can help operators for their

needs and also very use full for end users since they are getting any device scenario.

So NGN is a win-win salutation. NGN treated as an approach towards complete

IP communication and so it is called as future telecom network.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 29 of 32 continued…

ABSTRACT of Project No. 23

Implementation of Mobile Number Portability in PSTN switch

Introduction “Mobile Number Portability"(MNP) means the facility which allows a subscriber of

a mobile telephone service to retain his mobile telephone number when he moves from one

mobile telephone service provider to another, irrespective of the mobile technology or from

one mobile technology to another of the same mobile telephone service provider, within

such limits as may be permitted by the licensor”

� Portability of Mobile Numbers between all GSM and CDMA operators within the same

Service Area.

� A Mobile subscriber can change his/her operator within the same Service Area without

changing his/her number.

� No Portability beyond Service Area.

� Portability between GSM and CDMA network of same operator in same service area

possible.

CCS-7 signaling is the main application to implement Mobile Number Portability in

PSTN switches. All the TDM exchanges in the network are made compatible to implement

MNP irrespective of the vendor type.

In PSTN network, presently we have layered architecture like local exchange, level-

II TAX, level-I TAX (TAX-Trunk Automatic Exchange). All these PSTN exchanges in the

network are connected to the Standalone Signaling Transfer Point (SSTP) for

implementation of MNP with CCS-7 signaling concept.

Objective: This project involves analysis of MNP concept, its implementation in PSTN switches

with CCS7/SIGTRAN application and the connectivity of database required to the network.

RN for each Mobile Number will be stored in one central Database (NPDB).

Associated RN of each Mobile Number will determine the present operator of the number.

This RN changes when a mobile number is ported to other Mobile Operator.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 30 of 32 continued…

“IAM Relay” method is used for implementing MNP in BSNL. In IAM Relay

method SSTP must intercept all IAMs for fixed to mobile calls originating from local

exchanges and prefix the RN number with B party number in the IAM before sending the

same to Level-I/II Taxs/Tandems. This RN+B number information used by Level I/II

Taxs/Tandems to route the call to correct service provider. Necessary creation of routing

and charging information is required to be done at Level I/II Taxs. This method requires

connecting all the local exchanges with SSTP.

Conclusion: In this project we analyze the concept of IAM Relay method in SSTP, and concept

of CCS7 signaling implementation in all the TDM local/Tax exchanges in the network by

connecting it to SSTP and we will establish MNP on CCS-7 platform is useful to both

end-users as well as network provides.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 31 of 32 continued…

ABSTRACT of Project No. 24

Implementation of efficient signaling scheme i.e Session Initiation Protocol

than traditional TDM based SS7 for Telecom networks

Introduction Telecom Signaling refers to exchange of information between call components

required to provide and maintain service. Efficiency of Telecom networks i.e voice or data

depends of proper signaling schemes used and ultimately should meet the emergent

customer requirements. Signaling System No. 7(SS7) is a set of telephony signaling

protocols, which are being used to set up most of the world's public switched telephone

network (PSTN) telephone calls. The main purpose is to set up and tear down legacy

voice calls. Other uses include number translation, local number portability, prepaid billing

mechanisms, short message service(SMS), and a variety of other mass-market services.

Session Initiation protocol (SIP) is an efficient signalling protocol works on packet

based environment to deliver the emergent customer needs I.e initiating, maintaining and

terminating real-time sessions that include voice, video VOIP applications.

It is usually referenced as Signalling System No. 7 or Signalling System #7, or

simply abbreviated to SS7. In North America it is often referred to as CCSS7, an

abbreviation for Common Channel Signalling System 7. In some European countries,

specifically the United Kingdom, it is sometimes called C7 (CCITT number 7) and is also

known as number 7 and CCIS7 (Common Channel Interoffice Signaling 7). In Germany it

is often called N7 (Signalisierungssystem Number 7).

Existing System: Existing TDM based digital signalling is on SS7 (Signalling system No7), it works

like a normal PCM. i.e, Signalling and speech are associated with each other and both

are going in the different paths to enable effective utilization of signalling channel.

SS7 architecture is as shown below.

Disadvantage of existing system: � Not meeting the emergent customer needs I.e voip, multimedia sessions etc.

� Not IP based signalling system

� Not suitable for packet based services like video conferencing, VOIP etc.

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech Project Abstracts 2019-20

Page 32 of 32 continued…

SS7 Vs SIP

SS7 SIP

Mainly used for signaling call setup, tear down

information for circuit switched services

IP based signalling which does not use a

separate signalling path

Used to set up vast majority of the PSTN calls Used in IP network used from maintain sessions

Used Traditional legacy networks Used for next generation networks

Not meeting emergent customer requirements Meeting all emergent customer needs

Objective: In this project we establish SIP signalling is more efficient signaling system than

previous signalling schemes and anlyze its detailed layer architecture compared to SS7 layer

format and understand the different terminology used is SS7 network like SP, SPC, LS,

LSB etc., and we will implement SS7 configuration in CDOT telecom switch using

simulation software on JAVA platform and establish SIP sessions on CISCO routers.

Software Requirements: � Front End Simulation: JAVA 2.0, JDK 1.7 and above (Open Source).

� Back End: MySQL Server (Database)

Conclusion: Practically configuration of SS7 network in CDOT MAX-XL switching system with

various routes and Trunk groups to provide communication between different exchanges and

finally implement real time SIP sessions using SIP phones