Tuesday, December 14, 2010

OSS -BSS

This is a very interesting link to understand the OSS and BSS in Telecom.

http://whitelassiblog.wordpress.com/2010/09/05/telecommunications-for-dummies-telecom-basics-and-introduction-to-bss/
                                                                            
                                                                                                                                                            By- Vikram Singh Mains

Monday, December 13, 2010

Femtocell


A femtocell is a small cellular base station designed for use in residential or small business environments. It connects to the service provider’s network via broadband (such as DSL or cable) and typically supports 2 to 5 mobile phones in a residential setting. A femtocell allows service providers to extend service coverage inside of your home - especially where access would otherwise be limited or unavailable - without the need for expensive cellular towers.
These are low powered wireless access point that operate in licensed spectrum to connect standard mobile devices to a mobile operator’s network using residential DSL or cable broadband connections.


Femtocell Working -

A femtocell is typically the size of a residential gateway or smaller, and connects to the user's broadband line. Once plugged in, the femtocell connects to the MNO's mobile network, and provides extra coverage in a range of typically 30 to 50 meters. Then user declare which mobile phone numbers are allowed to connect the femtocell, usually via a web interface provided by the MNO.Once the mobile phone come under the coverage of the femtocell ,they switch over from the macrocell to the femtocell automatically .All communications will then automatically go through the femtocell. When the user leaves the femtocell coverage area, his phone hands over seamlessly to the macro network.

Benefit to users -

• Excellent network coverage when there is no existing coverage or low coverage.
• For enterprise users having femtos instead of DECT or WiFi dual mode phones enable them to have a single phone, so a single contact list etc.
• Provide higher capacity if user uses data services through his mobile phone.
• A Femtocell can also give lower call charges while the caller calling from home, using the Femtocell as it directly connects to the core network through the internet.
• Femtocell units can handle up to three or four simultaneous calls, from the same operator, depending on the model. They can operate with normal cell phones, without any enhancements.
• Femtocell units can help related cellular services like 3G by offering a better speed and data rate when inside buildings, where the coverage and data rate is generally lesser than outside.

Friday, November 19, 2010

OFDM,SC-FDMA

OFDM:-Orthogonal Frequency division multiplexing
Theory:- In OFDM, the sub-carrier frequencies are chosen so that the sub-carriers are orthogonal to each other, meaning that  between the sub-channels is eliminated and inter-carrier guard bands are not required. This greatly simplifies the design of both the transmitter and the receiver; unlike conventional FDM, a separate filter for each sub-channel is not required.




Advantages:-
  • Can easily adapt to severe channel conditions without complex equalization.
  • Robust against narrow-band co-channel interference.
  • Robust against intersymbol interference (ISI) and fading caused by multipath propagation.
  • High spectral efficiency as compared to conventional modulation schemes, spread spectrum, etc.
Disadvantages:-
Application of OFDM:-
􀁁 DAB:- Digital Audio Broadcasting
􀁁 HDTV
􀁁Wireless LAN Networks
􀁁ADSL:- The modulation technique DMT is OFDM based
􀁁8.4 IEEE 802.16 Broadband Wireless Access System and Wimax, wireless MAN OFDM

Single carrier FDMA

In SC-FDMA, multiple access among users is made possible by assigning different users, different sets of non-overlapping fourier-coefficients (sub-carriers). This is achieved at the transmitter by inserting (prior to IFFT) silent fourier-coefficients (at positions assigned to other users), and removing them on the receiver side after the FFT.

Transmitter and Receiver Structure of LP-OFDMA/SC-FDMA



 
Applications of SC FDMA
Single Carrier Frequency Division Multiple Access (SC-FDMA) is a novel method of radio transmission under consideration for deployment in future cellular systems; specifically, in 3rd Generation Partnership Project Long Term Evolution (3GPP LTE) systems. SC-FDMA has drawn great attention from the communications industry as an attractive alternative to Orthogonal Frequency Division Multiple Access (OFDMA).

Saturday, November 13, 2010

NEED FOR GREEN TELECOM IN INDIA

A telecom wireless network consists of Access Network and Core network. Access mainly consists of BTS/Node B (another component is BSC/RNC) which is called telecom tower in business language whereas Core network mainly consists of MSC, SMSC, HLR, SGSN and GGSN. Concentration of network elements decreases as we go away from telecom towers.
India had 2,38,000 Telecom towers at the end of 2009 and assuming that we are adding 10m subscribers per month then this number should be somewhere 250,000-275,000. If we look at power consumption of telecom network then we find more then 70% of energy is consumed by the telecom towers itself and apart from this half of the towers are in rural areas which are running on diesel fired gensets. Many of these gensets are as old as 10 yrs and are not efficient in terms of usage of diesel and consumes more diesels then required. Each tower requires energy from 1000W to 3000W (older installation consumes more power as compare to new one because of technological advancement). Each 1000 W results in the .22 tonnes/hr of emission of CO2 if running on the state electricity, in case of the private gensets this number is many times more. Assuming average power consumption of each tower is 1200W then total CO2 emission is 44000 tonne per hour by all these towers or 550408320 tonne per year if we assume that all are running on state electricity. Each tower requires 50-60k $ for electronic hardware and half of this is required for installation and other stuff. Apart from this additional capital is required for the genset, battery back up (gensets are required in urban areas also for emergency backup) which requires close to 5000$, so total cost of ownership of a telecom tower is close to 100K $ (for 2G). These towers have an Opex of 8-10k $ per year which is mostly the cost of the energy (rural has higher energy bill because of diesel and urban areas have higher rental costs). But it is really surprising that not even 5% of these towers are running on solar power. Probably operators are already struggling with capital availability so they opted for more costly approach.
Network components are not as huge as towers but consume substantial amount of energy. As compare to tower an additional energy is required for a small or big office which is adjacent to the component for the supervision or maintenance. It is difficult to estimate the carbon footprint as well as the cost of these components as not much information is public but most of these components are as efficient as components in developed world in terms of power usage. So carbon footprint of 100000000 tonne per year would be a fair estimation as far as network is concerned.
So from above analysis is that the telecom industry can claim close to 80m carbon credits (1 carbon credit = 1 tonne of CO2) if it moves to complete green methods of power usage for its tower operations which results into 1.15B $ or 4800 $ per year per tower.Apart from this each tower will save close to 40 % energy bill i.e. 3-4K so total saving per tower would be close to 6000$ after subtracting additional maintenance cost of solar panel. Which is really a big number as far as saving is concerned but requires a huge capital and effort for rollout of green measures. However this year is really a good year for the environment lover as cost of the solar panel has gone down from 170 Rs/W to 70 Rs/w. So capital investment on each tower has gone down to as low as 15K (including the cost of installation) which can be claimed in just three years which indicates that it is not only a positive NPV investment but also a small step towards the reduction of greenhouse gases to save mother earth.


Company
Approximate number of towers
Indus (joint venture of Vodafone, Bharti Airtel and IDEA)
100000
Reliance Infratel
48000
Bharti Infratel
30000
Quippo Telecom Infrastructure (QTIL)
25000
GTL
10000
Aircel Tower
12000
IDEA Tower
11000
American Tower
2500




Number of towers
238000
Average Power Req per hr per tower (W)
1200
Carbon Emission per hr (1.2 * .22)
0.264
Carbon Emission Tonnes Per Year (C3*24*365)
2312.64
Total CO2 Emission in tonnes (C4*C1)
550408320


Carbon Credit Details

Total CO2 Emission (from towers)
550408320
Average Power Req per hr per tower (W)
1200
Base Watt for the Tower
450
Load Factor
40%
Carbon Credits (which can be monetized)
82561248
Current cost of the carbon credit ($)
14
Total Claim($)
1155857472
Claim per tower ($)
4846.36257

Thursday, November 11, 2010

2G SCAM IN INDIA

Telecom minister A Raja is facing the wrath of CAG, PIL filing institutions and court for awarding the 2G licence to new entrants in 2008 at price much below the market price causing a huge loss to the exchequer. The new entrants were awarded 2G pan India licence at cost of Rs 1,651 crore, a price fixed in 2001 when the subscriber base was only 45 million and the evaluation of telecom industry was low. Nine companies were issued licences in the process that was controversial from the very beginning. According to A Raja, the reason for such a step was to promote competition in Indian telecom sector, thereby benefiting the customer through low tariffs and better quality of services. A Raja insists there was no wrong doing.
After the allocation of spectrum, some months later, Swan Telecom and Unitech, two of the winners, sold large stakes in their operations to overseas companies at stupendous valuations. This triggered a huge furore. Opposition parties said Raja, by favouring a few, was involved in a scam worth Rs 50,000 crore, the loss to the government exchequer for selling the licences cheap. Petitions were also filed regarding the wrong doings in the allocation of spectrum. Currently, Supreme Court is hearing two petitions in this matter. One of them being filed by a NGO, Centre for Public Interest Litigation (CPIL). Even CBI has filed a case against unknown officials of the DoT and some private persons to investigate the irregularities in the 2G licences allocation.
Comptroller and Auditor General of India (CAG), the auditor of India’s state run institutions, in its queries to Department of Telecom (DoT) has alleged that Mr Raja’s failure to auction telecom licences in 2008 had led to losses of Rs 26,000 crore to the exchequer. DoT responded to the CAG by declining to reply to the queries of CAG claiming that it was a policy decision. DoT had also sought advice from Law ministry which said the Auditor had no right to challenge the policy decisions.
CAG has also alleged that new entrants were granted licence without proper verification of their credentials. CAG also asked the communications ministry to amend licence conditions of telecom operators and add a new clause enabling it to audit the accounts of private operators that recently bagged 3G and broadband wireless access spectrum. But DoT has refused to give into this demand and has decided to seek the law ministry’s opinion. In the latest development, CAG has issued drafts reports saying that 2G spectrum allocation has caused the exchequer a loss between Rs 26,000 crore to Rs 140,000 crore, depending on the formula used for the calculation of loss.
                                             
                                                                                                                                  By -  Sudhir Tripathi

Tuesday, November 9, 2010

BUSINESS IMPLICATION OF NGN

It is certainly true that we are moving from Time Division Multiplex (TDM)-based, circuit switched networks to packet-, cell-, and frame-based networks. The major benefits of NGN can be listed as follows:-
1.       Heterogeneity of the Telecommunications Infrastructure. 
The growing number of services with different has increased the complexity of the overall infrastructure. The problems of interoperability between the various systems are becoming more serious. Maintaining these platforms involves high  OPEX for the network operators. NGN provides an obvious solution to this problem.
2.       Falling Call Sales.
Increasing losses on the domestic fixed-network market are therefore forcing the operators to develop new strategies to secure their future and to boost their profitability. No further growth can be expected through the revenue obtained from call sales alone.
3.       Cost reduction:With NGN, the established network operators plan to develop a sustainable infrastructure that will remain competitive in a convergent environment. The primary focus will be on the potential for cost savings
4.       New Sources of Income:Established network operators see the possibility of new income as another motivation for promoting NGN. More and more innovations with new sales opportunities are expected in the field of value-added services with enhanced QoS.
5.       Ease of Maintainence: IP-based networks are likely to be simpler and easier to operate and maintain as compared to the existing legacy networks and provide  operators with sufficient flexibility  to reduce both OPEX and CAPEX.
  1. Converged IP Core transport: Integration of their disparate networks towards IP/MPLS based transport core for superior control and OPEX reduction. Migration from TDM to IP and Fixed Mobile Convergence are also motivating factors for the carriers to reduce OPEX.

Future applications

Most traditional services relate to basic access/transport/routing/switching services, basic connectivity/resource and session control services, and various value-added services
  • Voice Telephony – NGNs will likely need to support various existing voice telephony services (e.g., Call Waiting, Call Forwarding, 3-Way Calling, various AIN features and various Centrex features).
  Data (Connectivity) Services – Allows for the real-time establishment of connectivity between endpoints, along with various value-added features (e.g., bandwidth-on-demand, resilient Switched Virtual Connections [SVCs], and call admission control).
  Multimedia Services – Allows multiple parties to interact using voice, video, and/or data. This allows customers to converse with each other while displaying visual information.  It also allows for collaborative computing and groupware.
Public Network Computing (PNC) – Provides public network-based computing servicesfor businesses and consumers (e.g., to host a web page, store/maintain/backup data files, or run a computing application). 
• Unified Messaging – Supports the delivery of voice mail, email, fax mail, and pages through common interfaces ,independent of the means of access .
  virtual  call centres – A subscriber could place a call to a call centre agent by clicking on a Web page.  The call could be routed to an appropriate agent, who could be located anywhere, even at home .

Wednesday, October 13, 2010

Next Generation Networks

Introduction:

With the Internet now deeply rooted across modern life and broadband penetration continuing its steady ascent, the information and communications technology (ICT) industry continues its transformation and evolution to converged next-generation networks (NGN)). The term “convergence” is being used to refer to the advanced integration of communications and computing functionalities, in particular the ability to offer voice, data, video(triple play) seamlessly over single or multiple infrastructures and platforms -- as well as the capability to access such services at any time and with an ever-expanding array of network agnostic and “aware” devices Next generation networks have finally identified as network collection emerging the following common characteristics:

• Convergence of various data communication types over the IP, i.e. data, multimedia, voice.
• Fixed, wireless and mobile network convergence
• Access to a common set of services that can be provided over multiple access network types (ADSL, UTRAN, WiFi, WiMAX, etc) with features like user handover and roaming.
• IP-based core transport networks,
• Possibility for using any terminal type (PC, PDA, mobile telephone, set-top boxes, etc),
• User-driven service creation environments,
• Common set of services, admission policies, authentication type regardless of the user connection type to the network.

NGN Architecture

The basic premise for NGN is an architecture on several independent levels. The connection of subscribers and terminals to the NGN can be achieved with various access technologies with compatible information and transmission which calls for Gateways. The core network of the NGN is an IP network which is a standardized transport platform consisting of various IP routers and switches. Standard and value-added services can then be provided via the service management level.



The convergence allows a transition from a vertical to a horizontal service integration. In vertical network structures, services (e.g. phone services, TV services) can only be received with suitable networks and the relevant end devices. With a horizontal approach, users in future will be given the possibility of using the desired services – regardless of the platform and the technology – with an end device.



In NGN networks, real-time conversational (e.g. video-telephony/conferencing) and non-conversational (e.g. video-on demand, instant messaging) multimedia services will play a prominent role in their success on the market. Therefore it is important that the security, customer experience and QoS perceived by paying users is much greater than that of free Internet services. To satisfy those requirements NGN funding members have devised two main mechanisms, one for providing control over the user sessions and a second one for enforcing the QoS settings of the user across the end-to-end communication path using the SIP protocol, through which the user can be identified, authenticated and charged by the network on the basis of a single user identity (IMS Personal Identity-IMPI).

Business Implications of NGN

It is certainly true that we are moving from Time Division Multiplex (TDM)-based, circuit switched networks to packet-, cell-, and frame-based networks. The major benefits of NGN can be listed as follows:-
1. Heterogeneity of the Telecommunications Infrastructure.
The growing number of services with different has increased the complexity of the overall infrastructure. The problems of interoperability between the various systems are becoming more serious. Maintaining these platforms involves high OPEX for the network operators. NGN provides an obvious solution to this problem.
2. Falling Call Sales.
Increasing losses on the domestic fixed-network market are therefore forcing the operators to develop new strategies to secure their future and to boost their profitability. No further growth can be expected through the revenue obtained from call sales alone.
3. Cost reduction:With NGN, the established network operators plan to develop a sustainable infrastructure that will remain competitive in a convergent environment. The primary focus will be on the potential for cost savings
4. New Sources of Income:Established network operators see the possibility of new income as another motivation for promoting NGN. More and more innovations with new sales opportunities are expected in the field of value-added services with enhanced QoS.
5. Ease of Maintainence: IP-based networks are likely to be simpler and easier to operate and maintain as compared to the existing legacy networks and provide operators with sufficient flexibility to reduce both OPEX and CAPEX.
6. Converged IP Core transport: Integration of their disparate networks towards IP/MPLS based transport core for superior control and OPEX reduction. Migration from TDM to IP and Fixed Mobile Convergence are also motivating factors for the carriers to reduce OPEX.

Sunday, October 10, 2010

Multi Protocol Label Switching (MPLS)


Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunication layer which directs and carries data from one network node to the next. MPLS operates at an OSI Model layer that is generally considered to lie between traditional definitions of Layer 2 (Data Link Layer ) and Layer 3 (Network Layer), and thus is often referred to as a "Layer 2.5" protocol.

WORKING :
Labeling packets are the main concept behind MPLS. These short, fixed-length labels carry the information that tells each switching node (router) how to process and forward the packets, from source to destination. As each node forwards the packet, it swaps the current label for the appropriate label to route the packet to the next node. This mechanism enables very-high-speed switching of the packets through the core MPLS network. MPLS predetermines the path data takes across a network and encodes that information into a label that the network’s routers understand.

MPLS routing

MPLS networks establish Label-Switched Paths (LSPs) for data crossing the network. An LSP is defined by a sequence of labels assigned to nodes on the packet’s path from source to destination.
As the network is established and signaled, each MPLS router builds a Label Information Base (LIB)—a table that specifies how to forward a packet. This table associates each label with its corresponding FEC and the outbound port to forward the packet to. This LIB is typically established in addition to the routing table and Forwarding Information Base (FIB) that traditional routers maintain.

Signaling and label distribution
Connections are signaled and labels are distributed among nodes in an MPLS network using one of several signaling protocols, including Label Distribution Protocol (LDP) and Resource reservation Protocol with Tunneling Extensions (RSVPTE). Alternatively, label assignment can be piggybacked onto existing IP routing protocols such as BGP. The most commonly used MPLS signaling protocol is LDP. LDP defines a set of procedures used by MPLS routers to exchange label and stream mapping information. It is used to establish LSPs, mapping routing information directly to Layer 2 switched paths. It is also commonly used to signal at the edge of the MPLS network — the critical point where non-MPLS traffic enters. Such signaling is required when establishing MPLS VPNs, for example.


Data Flow in MPLS Network


Figure shows a typical MPLS network and its associated elements. The central cloud represents the MPLS network itself. All data traffic within this cloud is MPLS labeled. All traffic between the cloud and the customer networks is not MPLS labeled (IP for example). The customer owned Customer Edge (CE) routers interface with the Provider Edge (PE) routers (also called Label Edge Routers, or LERs) owned by the service provider. At the ingress (incoming) side of the MPLS network, PE routers add MPLS labels to packets. At the egress (outgoing) side of the MPLS network, the PE routers remove the labels. Within the MPLS cloud, P (Provider) routers (also called Label Switching Routers , or LSRs), switch traffic hop-by-hop based on the MPLS labels. To demonstrate an MPLS network in operation, we will follow the flow of data through the network in Figure 2:

1. Before traffic is forwarded on the MPLS network, the PE routers first establish LSPs through the MPLS network to remote PE routers.
2. Non-MPLS traffic (Frame Relay, ATM, Ethernet, etc.) is sent from a customer network, through its CE router, to the ingress PE router operating at the edge of the provider’s MPLS network.
3. The PE router performs a lookup on information in the packet to associate it with a FEC, then adds the appropriate MPLS label(s) to the packet.
4. The packet proceeds along its LSP, with each intermediary P router swapping labels as specified by the information in its LIB to direct the packet to the next hop.
5. At the egress PE, the last MPLS label is removed and the packet is forwarded by traditional routing mechanisms.
6. The packet proceeds to the destination CE and into the customer’s network.