Вы находитесь на странице: 1из 66

INTERNSHIP AT POWERGRID

CORPORATION OF INDIA LIMITED


(POWERTEL)

Ashish Pant
B.Tech 4th semester
JIMS Engineering Management technical Campus
Aff. To Guru Gobind Singh Indraprastha University
New Delhi

Mr. Parijat S.M. Tripathi


Chief Manager (Telecom)
ACKNOWLEDGEMENT
I take immense pleasure in thanking Mr. A.K.Arora (COO, Telecom Deptt.
New Delhi) for having permitted me to carry out this project work.

I wish to express my deep sense of gratitude to my project in-charge Mr.


Parijat S.M. Tripathi (Ch.Manager (telecom)) for his encouragement and
cooperation in carrying out the project work.

I would also like to thank Mr. Ashu Kr Mishra for their guidance and help
through the course of training.
Telecommunication is the transmission of signs, signals, messages, words,
writings, images and sounds or information of any nature by wire, radio ,
optical or electromagnetic systems .Telecommunication occurs when the
exchange of information between communication participants includes the
use of Technology. It is transmitted either electrically over physical media,
such as cable, or via electromagnetic radiation.
Optical communication is a form of telecommunication that uses optical
fibers, by use fiber we can send lots of information at very high speed and
eventually will change our society and make our lives more comfortable.

POWERGRID, the Central Transmission Utility (CTU) of the country, is


engaged in power transmission business. With the vision to bridge the digital
divide in the country, POWERGRID has diversified into telecom to utilize
spare telecommunication capacity of its Unified Load Dispatch Centre (ULDC)
schemes, with its brand name as POWERTEL. Among the telecom players,
POWERGRID is the only utility in the country having overhead optic fibre
network using OPGW (Optical Ground Wire) on power transmission lines,
OPGW is a dual functioning cube performing the duties of a ground wire and
also providing a patch for the transmission of voice, video or data signals.

 Owns and operates ≍ 43,450 km of Telecom Network


 Points of Presence in 662 locations
 Intra City network in 105 cities across India
 Backbone Telecom Network Availability > 99.5%
CONTENTS

1. Introduction
2. Optical Fibres
3. Types of optical fibres
4. Multiplexing
5. Synchronous Digital Hierarchy(SDH)
6. PDH vs SDH
7. Dense Wavelength Digital Multiplexing
8. Transceivers Vs Transponders
9. Network management system
10. IPv4
11. TCP/IP
12. MPLS Network
13. Powergrid’s MPLS network
14. Traffic Engineering
15. Technical specifications for shelters
16. Type testing
17. Installation of underground fibre optic cable system
INTRODUCTION
POWER GRID CORPORATION OF INDIA LIMITED

POWER GRID CORPORATION OF INDIA LIMITED (POWERGRID), the Centre


Transmission Utility (CTU) of the country under Ministry of Power, is
engaged in power transmission business with the responsibility for planning,
coordination, supervision and control over inter-State transmission system
and operation of National & Regional Power Grids. As on March 31, 2012, the
Company owns and operates about 92,950 circuit km’s of transmission lines
at 800/765kV, 400kV, 220kV & 132kV EHVAC & +500kV HVDC levels and
150 sub-stations with transformation capacity of about 1, 24,525 MVA. This
gigantic transmission network, spread over length and breadth of the
country, is consistently maintained at an availability of over 99%. The
mission of the corporation is establishment and operation of regional and
national power grids to facilitate transfer of electric power within and across
the regions with reliability, security and economy, on sound commercial
principles.

POWERGRID is committed to:

a) Establish and maintain an efficient and effective "national grid" with due
regard to time, cost, technology, and value additions.

b) Sustainable development through conservation of natural resources and


adopting environment friendly technology on principle of avoidance,
minimization and mitigation.

c) Ensure safe, occupational hazard free and healthy work environment, to


the satisfaction of stake holders in all areas of its activities and shall
endeavor to continually improve its management systems and practices in
conformity to legal and regulatory provisions.

POWERGRID is in the business of Bulk power transmission, Telecom and


providing consultancy services to Power Utilities (both domestic and
International)
Telecom Business of POWERGRID
With the vision to bridge the digital divide in the country and ensure that
benefits of information revolution reach the entire length and breadth of the
country, POWERGRID has diversified into Telecom utilizing right of way on
its Extra High Voltage Power Transmission Network infrastructure in the
country with its brand name as POWERTEL. Among the telecom players,
POWERGRID is the only utility in the country having overhead fibre optics
network using OPGW (Optical Ground Wire) on power transmission lines.
POWERGRID has an all India Broad Band Telecom Network of about
25000Kms which is likely to be doubled in 2-3 years with multiple self-
resilient rings for backbone as well as intra city access networks connecting
more than 200 cities and town across the country and ensuring a reliability
of more than 99.9%.

Salient features
Most of the POWERGRID’s optic fibre backbone network is laid overhead on
the extra high voltage Power transmission lines .The Telecom network on the
Transmission lines has proved to be sturdy and secure, rodent menace free,
vandalism proof which offers it distinct advantage over the underground
optic fiber. The other advantages of leasing bandwidth capacity on
POWERGRID’s Telecom route are:

•Instant bandwidth allocation on POWERGRID’s Telecom route

•End to end connectivity

•Instant upgradation to higher capacity

•Better Service Level

•Services catering to the specific needs of the customers

•High reliability, high quality service in a cost effective manner.


Something about POWERTEL:
Services offered:

• End to End bandwidth


• Ethernet private leased line
• Internet services
• MPLS-VPN services
• Telecom Tower Infrastructure

To provide total solution to customers through state-of-the-art Broadband


Telecom Network and contribute in bridging the digital divide by accelerating
the process of Convergence in urban and rural areas and enable the
common man living in remotest and uneconomical areas become a part of
the global village.

The inherent Communication infrastructure coupled with right of way along


its extensive Power Transmission network have made it possible to leverage
these characteristics in creating convergence of technologies. POWERGRID’s
telecom network of 50,000kms, connecting about 60 major cities/ Metros is
nearing completion. POWERGRID’s telecom network provides a robust
telecom highway at affordable cost with ultra-modern and eco-friendly
implementation techniques. POWERGRID is one of the few telecom players
with a marked presence in remote areas viz. North Eastern Region, Jammu
and Kashmir, Himachal Pradesh, etc.

POWERGRID has a 24X7 Real time monitoring of the telecom network


through
National Level Control Centre (NTCC): Delhi
Regional Level Control Centres (RTCC): Kolkata, Banglore, Mumbai, Delhi.
POWERGRID’S Network Spreading in all over India
OPTICAL FIBERS
An optical fibre is a flexible, transparent fiber made by drawing
glass (silica) or plastic to a diameter slightly thicker than that of a human
hair. Optical fibers are used most often as a means to transmit light between
the two ends of the fiber and find wide usage in fibre-optic communication,
where they permit transmission over longer distances and at higher
bandwidths (data rates) than electrical cables. The field of applied
science and engineering concerned with the design and application of optical
fibers is known as fiber optics.

Fibers are also used for illumination and are wrapped in bundles so that they
may be used to carry images, thus allowing viewing in confined spaces.
Specially designed fibers are used for a variety of other applications,
including sensors and fiber lasers.

Optical fibers typically include a transparent core surrounded by a


transparent cladding material with a lower index of refraction. Light is kept
in the core by total internal reflection. This causes the fiber to act as
a waveguide. Fibers that support many propagation paths or transverse
modes are called multi-mode fibers (MMF), while those that only support a
single mode are called single-mode fibers (SMF). Multi-mode fibers generally
have a wider core diameter, and are used for short-distance communication
links and for applications where high power must be transmitted. Single-
mode fibers are used for most communication links longer than 1,050
meters.

Joining lengths of optical fiber is more complex than joining electrical wire or
cable. The ends of the fibers must be carefully cleaved, and then spliced
together, either mechanically or by fusing them with heat. Special optical
fiber connectors for removal connections are also available.
FUNCTIONING AND CONSTRUCTION
A main purpose of a fibre optic cable is to protect the fibre core inside the
cable that carries the light signal transmission. The following diagram shows
the construction of a fibre optic cable.

Core
The fibre core is made of silica glass and is the central part of the fibre optic
cable that carries the light signal. They are hair-thin in size and the diameter
of the fibre core is typically 8 µm for single mode fibre, and 50 µm or 62.5
µm for multi-mode fibre.

Cladding
The cladding is also made of glass, and is the layer that surrounds the fibre
core. Together, they form a single solid fibre of glass that is used for the
light transmission. The diameter of the cladding is typically 125 µm.

Primary Coating
After the cladding, there is the primary coating that is also known as the
primary buffer. This layer provides protection to the fibre core and cladding.
They are made of plastic and only provide mechanical protection. They do
not interfere with the light transmission of the core and the cladding.

Strength Members
The next layer is strength members. They are strands of agamid yarn, or
better known as Kevlar. They are added to the fibre optic cable to prevent
the breakage of the fibre glass during installation. When fibre is pulled
through a duct, the outer cover would stretch and the pulling load would be
rested on the fibre. The strength members prevent this as their material is
designed to take the strain.
Cable Jacket
The last layer is the cable jacket, which are comprised of different materials
depending on the choice of the end user and the application in use. Like the
primary coating, they serve only as a mechanical protection to the fibre core
and cladding inside
Types of Optical fiber
Fiber with a core diameter less than about ten times the wavelength of the
propagating light cannot be modeled using geometric optics. Instead, it must
be analyzed as an electromagnetic structure, by solution of Maxwell's
equations as reduced to the electromagnetic. The electromagnetic analysis
may also be required to understand behaviors such as speckle that occur
when coherent light propagates in multi-mode fiber. As an optical waveguide,
the fiber supports one or more confined transverse modes by which light can
propagate along the fiber.

Single Mode Fibre:


Fiber supporting only one mode is called single-mode or mono-mode fiber
In this type of fibres the dimension of core are so reduced as to support one
ray of transmission or one mode of propagation. In terms of electromagnetic
theory, only one mode of transmission is supported. The main advantage of
single mode fibre turns out to be the larger bandwidth of information that
can be transmitted by it with low loss of transmission.
The most common type of single-mode fiber has a core diameter of 8–10
micrometers and is designed for use in the near infrared. The mode
structure depends on the wavelength of the light used, so that this fiber
actually supports a small number of additional modes at visible wavelengths.
The structure of a typical single-mode fiber.
1. Core: 8 µm diameter
2. Cladding: 125 µm dia.
3. Buffer: 250 µm dia.
4. Jacket: 400 µm dia

The waveguide analysis shows that the light energy in the fiber is not
completely confined in the core. Instead, especially in single-mode fibers, a
significant fraction of the energy in the bound mode travels in the cladding
as an evanescent wave.

Multi Mode Fibre:


It has a definite core/cladding dimension and refractive index profile, which
allows a number of rays to be transmitted through the core. In terms of
optical wave guiding, the refractive indices permit number of modes to be
supported by the fibre as the name indicates. Modes can be “seen” when
ultra-thin beams (Laser) enter multimode fibres at different angles.
multi-mode fiber can also be modeled using the wave equation, which
shows that such fiber supports more than one mode of propagation (hence
the name).

Multi-mode fiber is manufactured with core diameters as small as 50


micrometers and as large as hundreds of micrometers. The normalized
frequency V for this fiber should be less than the first zero of the Bessel
function J0 (approximately 2.405).
MULTIPLEXING

When two devices are connected by a point-to-point link they usually do not
use the full capacity of the transmission medium. For efficiency, it should be
possible to share that capacity. A generic term for such sharing is
multiplexing. The network element that accomplishes this function is called a
multiplexer (MUX).

Different technologies are used for multiplexing signals. They are frequency
division multiplexing (FDM), time division multiplexing (TDM) and (dense)
wavelength division multiplexing (WDM). Radio and television broadcasts use
FDM. WDM is related to the transport of different signals through an optical
fiber by using different wavelengths. TDM is commonly used for multiplexing
digitized voice streams and data streams.

There are basically two types of multiplexing

Multiplexer Naming Conventions

aggregate ADM aggregate


tributaries

TM aggregate

m/n m/n

tributaries

• Terminal Multiplexer (TM) • Add-Drop Multiplexer (ADM)


• All traffic is terminated here. • Part of the traffic is terminated.
• m: aggregate level • Part of the traffic goes transparently
• n: lowest tributary level through.
The terminal multiplexer (TM) combines (multiplexes) data from n input
lines and transmits over a higher-capacity data link. The inputs are called
tributaries. The TM combines many tributaries into one aggregate signal.

The second alternative is an Add-Drop Multiplexer (ADM) which has


tributaries, but has two, instead of one, aggregate. In an ADM we can drop
traffic or we can add traffic or traffic can simply go through it - that is called
transparency. This configuration is often used in ADM rings. In an ADM ring we
can in each node terminate traffic (TP, termination point) or it can go through
transparently or traffic can be added (TP). If we compare ADM to TM, we
notice that in TM we always have to terminate all traffic, but in ADM we can let
some of the traffic through it transparently.

DIGITAL CROSS CONNECT

A digital cross-connect is a piece of equipment that is a combination of a


cross-connection matrix and a multiplexer. The mux takes the aggregate
signals and de multiplexes those into tributary signals. These signals go into
the cross-connector. The cross-connection matrix is just a matrix in which any
incoming signal can be connected /switched to any outgoing signal, if the
cross-connection matrix is fully non-blocking. If the cross-connection matrix is
blocking, some connections are impossible.

The cross-connection matrix can consist of two different types of matrices.


A matrix can be either time division or space division or, as it usually is, a
combination of those.
SYNCHRONOUS DIGITAL HIERARCHY
(SDH)
SDH is an international standard for high speed telecommunication over
optical/electrical networks which can transport digital signals to variable
capacities. It is a synchronous system which tends to provide a more flexible,
yet simple network infrastructure.
Synchronous digital hierarchy(SDH) are standardized multiplexing protocol
that transfer multiple digital bit streams over optical fiber using lasers or
LED’s. The method was developed to replace Plesiochronou Digital
Hierarchy(PDH) system for transporting larger amounts of telephone calls
and data traffic over the same phone call without the problem of
synchronization. It originated from Synchronous Optical Network(SONET) in
the US.
SDH is based on direct synchronous multiplexing (done at byte level). This
means that tributary signals may be multiplexed directly into a higher rate
SDH signal without intermediate stages of multiplexing, and, as a result, NEs
can be interconnected directly with cost and equipment savings.
SDH provides numerous facilities built into the signal overhead for
embedded operations, administration and maintenance (OAM) purposes. The
whole becomes an integrated network management and maintenance
system.

SDH provides flexible signal transportation capabilities. The SDH signal


easily integrates new services, such as Asynchronous Transfer Mode (ATM),
Fiber Distributed Data Interface (FDDI) and Distributed Queue Dual Bus
(DQDB), along with existing European 2, 34, and 140 Mbps PDH signals, and
North American 1.5, 6.3 and 45 Mbps signals, all the common tributary
signals found in telecommunication networks.
Other advantages are that SDH takes advantage of the bandwidth provided
by optical technology (an optical fiber is a medium capable of conducting an
optical ray, which is using wavelength in the order of micrometers, so the
bandwidth is immense). It is also standardized which means that equipment
from different manufacturers are able to work together. This also applies to
protection, which is standardized in SDH. Reduced networking cost due to
the transversal compatibility. Synchronous structure is flexible.
IMPORTANCE OF SDH
To cope with the demand for ever-higher bit rates, a multiplex hierarchy or
plesiosynchronous digital hierarchy (PDH) evolved. The bit rates start with
the basic multiplex rate of 2 Mbps with further stages of 8, 34, and 140
Mbps. In North America and Japan, however the primary rate is 1.5 Mbps
with additional stages of 6 and 44 Mbps. This fundamental difference in
developments made the set up of gateways between the networks both
difficult and expensive.

ADVANTAGE OF SDH
In response to the demand for increased bandwidth, reliability, and high
quality service, SDH developed steadily during the 1980s eliminating many
of the disadvantages inherent in PDH. In turn, network providers began to
benefit from the many technological and economic advantages this new
technology introduced including:

 HIGH TRANSMISSION RATES


Transmission rates of up to 10 gbps can be achieved in modern SDH
systems making it the most suitable technology in today's
telecommunications networks.

 SIMPLIFIED ADD AND DROP FUNCTION


Compared to the older PDH system, low bit rate channels can be easily extracted from
and inserted into the high-speed bit streams in SDH. It is now no longer necessary to
apply the complex and costly procedure of de multiplexing then re multiplexing the
plesiosynchronous structure.

 RELIABILITY
Modern SDH networks include various automatic back-up circuit and repair
mechanisms which are designed to cope with system faults and are monitored by
management. As a result, failure of a link or an NE does not lead to failure of the entire
network.

 FUTURE PROFF PLATFORM FOR NEW SERVICESA


SDH is the ideal platform for a wide range of services including POTS, ISDN, mobile
radio, and data communications (LAN, WAN, etc.). It is also able to handle more recent
services such as video on demand and digital video broadcasting via ATM.
THE SYNCHRONOUS DIGITAL HIERARCHY IN TERMS OF LAYERS
Telecommunications technologies are generally explained using so called
layer models. SDH can also be depicted in the same way.

SDH networks are subdivided into various layers directly related to the
network topology.
I. The lowest layer is the physical layer, which represents the
transmission medium. This is usually a glass fiber or possibly radio or
satellite link.
II. The regenerator section is the path between regenerators. Part of the
regenerator section overhead (RSOH) is available for the signalling
required within this layer. The remainder of the overhead, the
multiplex section overhead (MSOH) is used for multiplex section
needs. The multiplex section covers the part of the SDH link between
multiplexers.
III. The carriers or virtual containers (VC) are available as payload at the
two ends of this section. The two VC layers represent a part of the
mapping process.
IV. Mapping is the procedure whereby the tributary signals, such as PDH
and ATM are packed into SDH transport modules. VC-4 mapping is
used for 140-Mbps or ATM signals and VC-12 mapping is used for 2-
Mbps signals.

REGENRATORS
A digital signal can be transmitted only a limited distance before attenuation
endangers the integrity of the data. To achieve greater distances, repeaters
are used. The term used in SDH is regenerator. The repeater takes the
signal, interprets and reproduces it. So if the distance between two
repeaters is optimal, we will have a close-to-original signal after the
repeater.
Plesiochronous Digital Hierarchy(PDH)
PDH is a popular technology that is widely used in network of
communication in order to transport huge amounts of data over digital
equipment for transportation like optic system. PDH works in a state
when the various different parts of a network are clearly synchronized.
But with the change in technology, the PDH is now being replaced by
the SDH. The SDH is useful equipment that is used in most of the
telecommunication networks.

PDH Vs SDH
As the technology has improved with the passing of time, now the
telecommunication companies have replaced the PDH equipment with
that of SDH equipment, which has the capability of transmitting the
data at much higher rates as compared to the PDH system.
The SDH is an international standard that is highly popular and used
for its high speed data transfer of telecommunication and digital
signals. The SDH is designed in order to design simple and flexible
network infrastructure. This system has bought a considerable amount
of change in the telecommunication networks that were based on the
optical fibres as far as performance and cost were concerned.

The main weaknesses of PDH were:


I. Had asynchronous structure.
II. Restricted management capacity
III. No optical interface

And SDH system has a large number of advantages over PDH:


I. Optical interface
II. Capability of powerful management
III. Synchronous structure was flexible
IV. Cost effective
V. World standard digital format
DWDM (Dense wavelength
division multiplexing)

Brief
With today’s seemingly limitless demand for transmission capacity, service
providers often cope with extreme fiber usage and exhaust across significant
portions of their networks. An enormous amount of bandwidth capacity is
therefore needed to provide the services required by customers. The
expansion of existing links calls for simple, cost effective solutions that cause
minimum disruption to working systems.

The telecommunications industry has so far met these needs by using dense
wavelength division multiplexing (DWDM) systems. In allowing both new and
existing fiber optic links to carry several channels simultaneously, DWDM
can optimize the use of current facilities whilst offering greater capacities for
the future.

Some examples of DWDM includes voice transmission, e-mail, video and


multimedia which can be simultaneously transmitted in DWDM systems,
regardless of their transmission formats which include synchronous optical
network(SONET), synchronous digital hierarchy (SDH), asynchronous
transfer mode (ATM), internet protocol (IP), packet over SONET/SDH (PoS)
or gigabit ethernet (GigE). Unlike previous systems however, the planning,
installation, and maintenance of DWDM networks demands that much closer
attention be paid to a number of performance limiting parameters.

WHI IS IT NEEDED?

A DWDM system can be described as a parallel set of optical channels, each


using a slightly different wavelength, but all sharing a single transmission
medium or fiber. The figure illustrates the functionality of a multichannel
DWDM transmission system when various 10 gbps signals are fed to optical
transmission modules. The optical output signals are converted to defined
wavelengths in the 1550 nm window via wavelength transponders. An
optical DWDM coupler (multiplexer) then ‘bunches’ these optical signals
together on one fiber and forwards them as a multiplexed signal to an
optical fiber amplifier (OFA).

Depending on path length and type of fiber used, one or more OFAs can be
used to boost the optical signal for long fiber spans.
At termination on the receiving end, the optical signals are pre-amplified,
then separated using optical filters (de-multiplexer) before being converted
into electrical signals in the receiver modules.
Recent innovations in DWDM transport systems include pluggable and
software-tunable transceiver modules capable of operating on 40 or 80
channels. This dramatically reduces the need for discrete spare pluggable
modules, when a handful of pluggable devices can handle the full range of
wavelengths.

Some characteristics of DWDM:

 Increase Network Capacity


 Working on Existing Fibre Infrastructure
 Low Initial Cost
 Quick Capacity Upgrade Later

HISTORY
The laying of new fiber was once the only way to cope with fiber exhaust in
telecommunication networks. A cost and labor intensive process, the main
drawback of this solution was its inability to enable network operators to
provide new services. At the beginning of the 1980s, time domain
multiplexing (TDM) made it possible to increase the bit-rate. With TDM, the
capacity of a single fiber could be increased by slicing time into smaller
intervals and thereby multiplexing the different signals. In TDM systems,
each telecommunication fiber is able to transport an optical signal from a
single laser (figure 1). This optical signal is converted into an electrical signal,
regenerated (electrically reshaped, retimed and reamplified) and finally
transformed back into an optical signal again encountering losses. High bit-
rate transmissions via TDM however proved to be challenging.
Wavelength division multiplexing (WDM), the simultaneous transmission
of multiple signals at different wavelengths over a single fiber proved to be
a more reliable alternative.
The first networks deploying WDM technology at the end of the 1980s,
multiplexed signals from the lasers of two very different wavelength
(a technology now referred to as Coarse WDM). The disadvantage of this
technique was that the multiplexed signal had to be separated each time
before being electrically regenerated .Today’s modern CWDM system (such
as those with over 20 nanometers (nm) channel spacing), are used for short
range transmissions where no regeneration is required. They transmit up to
16 channels between 1310 and 1610 nm, thus making CWDM a cost
effective solution.

During the 1990s, networks were designed to send up to four different


signals over one fiber at different wavelengths within the same optical
window (Broadband WDM). This is an application however necessitating the
use of narrow lasers. In order to increase the number of services
(bandwidth), the channel spaces can be moved closer together (for example
with a space of just 0.8 nm between two channels), creating Dense WDM or
DWDM as it is commonly known. This technology economically increases
transport capacity through the utilization of existing fiber routes and
terminal equipment.

While debate continues as to whether WDM or TDM is best suited for the
expansion of existing fiber networks, it has become clear that only solutions
incorporating both technologies will give service providers the flexibility and
capacity for future requirements.

A DWDM system can be described as a parallel set of optical channels, each


using a slightly different wavelength, but all sharing a single transmission
medium or fiber. The figure illustrates the functionality of a multichannel
DWDM transmission system when various 10 gbps signals are fed to optical
transmission modules. The optical output signals are converted to defined
wavelengths in the 1550 nm window via wavelength transponders. An
optical DWDM coupler (multiplexer) then ‘bunches’ these optical signals
together on one fiber and forwards them as a multiplexed signal to an
optical fiber amplifier (OFA).
COMPONENTS OF DWDM:

1. Terminal multiplexer-> The terminal multiplexer contains a


'wavelength converting transponder' for each data signal, an optical
multiplexer and where necessary an optical amplifier (EDFA). Each
'wavelength converting transponder' receives an optical data signal
from the client-layer, such as Synchronous optical networking [SONET
/SDH] or another type of data signal, converts this signal into the
electrical domain and re-transmits the signal at a specific wavelength
using a 1550 nm band laser. These data signals are then combined
together into a 'multi-wavelength optical signal' using an optical
multiplexer, for transmission over a single fiber (e.g. SMF-28 fiber).
The terminal multiplexer may or may not also include a local transmit
EDFA for power amplification of the 'multi-wavelength optical signal'.
(Early DWDM systems contained 4 or 8 'wavelength converting
transponders' in the mid 1990s. By 2000 or so, commercial systems
capable of carrying 128 signals were available

2. Intermediate line repeater -> It is placed approximately every 80 –


100 km to compensate for the loss of optical power as the signal travels
along the fiber. The 'multi-wavelength optical signal' is amplified by an
EDFA, which usually consists of several amplifier stages

3. Intermediate optical terminal/ optical add-drop multiplexer>


This is a remote amplification site that amplifies the multi-wavelength
signal that may have traversed up to 140 km or more before reaching
the remote site. Optical diagnostics and telemetry are often extracted
or inserted at such a site, to allow for localization of any fiber breaks
or signal impairments. In more sophisticated systems (which are no
longer point-to-point), several signals out of the 'multi-wavelength
optical signal' may be removed and dropped locally.

4. Terminal de-multiplexer-> At the remote site, the terminal de-


multiplexer consisting of an optical de-multiplexer and one or more
'wavelength converting transponders' separates the 'multi-wavelength
optical signal' back into individual data signals and outputs them on
separate fibers for client-layer systems (such as SONET/SDH). Originally,
this de-multiplexing was performed entirely passively, except for some
telemetry, as most SONET systems can receive 1550nm signals.

5. Optical Supervisory Channel (OSC)-> This is data channel which


uses an additional wavelength usually outside the EDFA amplification
band (at 1510 nm, 1620 nm, 1310 nm or another proprietary
wavelength). The OSC carries information about the multi-wavelength
optical signal as well as remote conditions at the optical terminal or EDFA
site. It is also normally used for remote software upgrades and user (i.e.,
network operator) Network Management information.

DWDM systems have to maintain more stable wavelength or frequency than


those needed for CWDM because of the closer spacing of the wavelengths.
Precision temperature control of laser transmitter is required in DWDM
systems to prevent "drift" off a very narrow frequency window of the order
of a few GHz. In addition, since DWDM provides greater maximum capacity
it tends to be used at a higher level in the communications hierarchy than
CWDM, for example on the Internet backbone and is therefore associated
with higher modulation rates, thus creating a smaller market for DWDM
devices with very high performance levels. These factors of smaller volume
and higher performance result in DWDM systems typically being more
expensive than CWDM.

Wavelength converting transponders

wavelength converting transponders served originally to translate the


transmit wavelength of a client-layer signal into one of the DWDM system's
internal wavelengths in the 1550 nm band.

In the mid-1990s, wavelength converting transponders rapidly took on the


additional function of signal regeneration. Signal regeneration in
transponders quickly evolved through 1R to 2R to 3R and into overhead-

1R- Retransmission. Basically, early transponders were "garbage in garbage


out" in that their output was nearly an analogue 'copy' of the received
optical signal, with little signal cleanup occurring. This limited the reach of
early DWDM systems because the signal had to be handed off to a client-
layer receiver (likely from a different vendor) before the signal deteriorated
too far. Signal monitoring was basically confined to optical domain
parameters such as received power.

2R- Re-time and re-transmit. Transponders of this type were not very
common and utilized a quasi-digital Schmitt triggering method for signal
clean-up. Some rudimentary signal quality monitoring was done by such
transmitters that basically looked at analogue parameters.

3R-Re-time, re-transmit, re-shape. 3R Transponders were fully digital and


normally able to view SONET/SDH section layer overhead bytes such as A1
and A2 to determine signal quality health. Many systems will offer 2.5 Gbit/s
transponders, which will normally mean the transponder is able to perform
3R regeneration on OC-3/12/48 signals, and possibly gigabit Ethernet, and
reporting on signal health by monitoring SONET/SDH section layer overhead
bytes. Many transponders will be able to perform full multi-rate 3R in both
directions. Some vendors offer 10 Gbit/s transponders, which will perform
Section layer overhead monitoring to all rates up to and including OC-192.

Muxponder
The muxponder (from multiplexed transponder) has different names
depending on vendor. It essentially performs some relatively simple time
division multiplexing of lower rate signals into a higher rate carrier within
the system. More recent muxponder designs have absorbed more and more
TDM functionality.
Transceivers versus Transponders

Transceivers –

Since communication over a single wavelength is one-way and most


practical communication systems require two-way communication, two
wavelengths will be required (which might or might not be on the
same fiber, but typically they will be each on a separate fiber in a so-
called fiber pair). As a result, at each end both a transmitter (to send
a signal over a first wavelength) and a receiver (to receive a signal
over a second wavelength) will be required. A combination of a
transmitter and a receiver is called a transceiver; it converts an
electrical signal to and from an optical signal. There is usually types
transceiver based on WDM technology

Transponders –

In practice, the signal inputs and outputs will not be electrical but
optical instead (typically at 1550 nm). This means that in effect we
need wavelength converters instead, which is exactly what a
transponder is. A transponder can be made up of two transceivers
placed after each other: the first transceiver converting the 1550 nm
optical signal to/from an electrical signal, and the second transceiver
converting the electrical signal to/from an optical signal at the
required wavelength. Transponders that don't use an intermediate
electrical signal (all-optical transponders) are in development.
Network Management System (NMS)
A Network Management System (NMS) is a combination of hardware and
software used to monitor and administer a network.
Individual network elements (NEs) in a network are managed by an element
management system.

Planning for a Network Management System


Effective planning for a network management system requires that a number of
network management tasks be folded in a single software solution. The network
management system should discover the network inventory, monitor the health
and status of devices and provide alerts to conditions that impact system
performance.
NMS systems make use of various protocols for the purpose they serve. For
example, SNMP protocol allows them to simply gather the information from the
various devices down the network hierarchy. NMS software is responsible for
identification of the problem, the exact source of the problem and solving them.
The NMS systems not only are responsible for the detection of faults but also for
collecting the statistics of the devices over a period of time. They may include a
library where the previous network statistical data over a period of time is stored
along with the problems and the solutions that worked in the past. This library
can come useful in case a fault is found. NMS software can consult the library and
search for the best possible method to resolve the problem.

Network management
Network management refers to the activities, methods, procedures, and tools
that pertain to the operation, administration, maintenance, and provisioning of
networked systems.
 Operation deals with keeping the network (and the services that the
network provides) up and running smoothly. It includes monitoring the
network to spot problems as soon as possible, ideally before users are
affected.
 Administration deals with keeping track of resources in the network and
how they are assigned. It includes all the "housekeeping" that is
necessary to keep the network under control.
 Maintenance is concerned with performing repairs and upgrades—for
example, when equipment must be replaced, when a router needs a
patch for an operating system image, when a new switch is added to a
network. Maintenance also involves corrective and preventive measures
to make the managed network run "better", such as adjusting device
configuration parameters.
 Provisioning is concerned with configuring resources in the network to
support a given service. For example, this might include setting up the
network so that a new customer can receive voice service.

A common way of characterizing network management functions is FCAPS—Fault,
Configuration, Accounting, Performance and Security.
Functions that are performed as part of network management accordingly include
controlling, planning, allocating, deploying, coordinating, and monitoring the
resources of a network, network planning, frequency allocation, predetermined
traffic routing to support load balancing, cryptographic key distribution
authorization, configuration management, fault management, security
management, performance management, bandwidth management, Route
analytics and accounting management.
Data for network management is collected through several mechanisms, including
agents installed on infrastructure, synthetic monitoring that simulates
transactions, logs of activity, sniffers and real user monitoring. In the past
network management mainly consisted of monitoring whether devices were up or
down; today performance management has become a crucial part of the IT team's
role which brings about a host of challenges—especially for global organizations.

Network Architecture
Network architecture is the design of a communications network. It is a
framework for the specification of a network's physical components and their
functional organization and configuration, its operational principles and
procedures, as well as data formats used in its operation.
In computing, the network architecture is a characteristics of a computer
network. The most prominent architecture today is evident in the framework of
the Internet, which is based on the Internet Protocol Suite.
In telecommunication, the specification of a network architecture may also
include a detailed description of products and services delivered via a
communications network, as well as detailed rate and billing structures under
which services are compensated.
In distinct usage in distributed computing, network architecture is also sometimes
used as a synonym for the structure and classification of distributed application
architecture, as the participating nodes in a distributed application are often
referred to as a network. For example, the applications architecture of the public
switched telephone network (PSTN) has been termed the Advanced Intelligent
Network. There are any number of specific classifications but all lie on a
continuum between the dumb network (e.g., Internet) and the intelligent
computer network (e.g., the telephone network). Other networks contain various
elements of these two classical types to make them suitable for various types of
applications. Recently the context aware network, which is a synthesis of the two,
has gained much interest with its ability to combine the best elements of both.

Network Monitoring
The term network monitoring describes the use of a system that constantly
monitors a computer network for slow or failing components and that notifies the
network administrator in case of outages via email, pager or other alarms. It is a
subset of the functions involved in network management.
While an intrusion detection system monitors a network for threats from the
outside, a network monitoring system monitors the network for problems caused
by overloaded and/or crashed servers, network connections or other devices.
For example, to determine the status of a web server, monitoring software may
periodically send an HTTP request to fetch a page; for email servers, a test
message might be sent through SMTP and retrieved by IMAP or POP3.
Commonly measured metrics are response time and availability (or uptime),
although both consistency and reliability metrics are starting to gain popularity.
The widespread addition of WAN optimization devices is having an adverse effect
on most network monitoring tools -- especially when it comes to measuring
accurate end to end response time because they limit round trip visibility.
Status request failures, such as when a connection cannot be established, it
times-out, or the document or message cannot be retrieved, usually produce an
action from the monitoring system. These actions vary: an alarm may be sent out
to the resident (SMS, email...) sysadmin, automatic failover systems may be
activated to remove the troubled server from duty until it can be repaired,
etcetera.
Monitoring the performance of a network uplink is also known as network traffic
measurement, and more software is listed there.

Network Tomography
Network tomography is an important area of network measurement, which deals
with monitoring the health of various links in a network using end-to-end probes
sent by agents located at vantage points in the network/Internet.

Route Analytics
Route analytics is another important area of network measurement. It includes
the methods, systems, algorithms and tools to monitor the routing posture of
networks. Incorrect routing or routing issues cause undesirable performance
degradation or downtime.

IPv4(internet protocol version 4 )


Internet protocol version 4 is the fourth version of the internet protocol(IP).
It is one of the core protocols of standards-based internetworking methods
in the internet. It still routes most internet traffic today.
IPv4 is a connectionless protocol for use on pocket-switched networks. It
operates on a best effort delivery model, in that it does not gurantee
delivery, nor does it assure proper sequencing or avoidance of duplicate
delivery.
These aspects, including data integrity, are addressed by an upper layer
transport protocol, such as the transmission control protocol(TCP).
It defines an IP address as 2 bit numbers. IP addresses are usually written
and displayed in human readable notations.

Classless Inter Domain Routing(CIDR)


It is a method for allocating IP addresses And IP routing.

Routing
It is a process of selecting a path for trafficin a network, or between or
across multiple networks.
OSI Model

Open System interconnection model is a conceptual model that characterizes


and standardizes the communication function of a telecommunication or
computing system without regard to its underlying internal structure and
technology. The model partitions a communication system into abstraction
layers. The original version of the model defined seven layers.
OSI has two major components, an abstract model of networking, called the
Basic reference Model or seven layer model, and a set of specific protocols.

ABSTRACTION LAYER:
In computing, a layer is a way of hiding the implementation details of a
particular set of functionality. A layer is considered to be on top of another if
it depends on it.
A layer serves the layer above it and is served by the layer below it. For
Example, a layer that provides error free communication across a network
provides the path needed by applications above it, while it calls the next
lower layer to send and receive packets that comprise the contents of the
path. Every layer can exist without the layers above it, and requires the
layer below it to function. Frequently abstraction layers can be composed
into a hierarchy of abstraction levels. The OSI model comprises seven
abstraction layers. Each layer of the model encapsulates and addresses a
different part of the needs of digital communications, thereby reducing the
complexity of the associated engineering solutions.

The concept of a seven-layer model was provided by the work of Charles


Bachman at Honeywell information services. Various aspects of OSI design
evolved from experiences with the APARNET, NPLNET, EIN, CYCLADES
network and the work in IFIP WG6.1. The new Design was documented in
ISO 7498 and its various addenda. In this model, a networking system was
divided into layers. Within each layer, one or more entities implement its
functionality. Each entity interacted directly only with the layer immediately
beneath it, and provided facilities for use by the layer above it.
OSI layers

Layer PDU Function


1. Transmission and
Physical Symbol reception of raw bit
streams over a physical
medium.
2. Reliable transmission of
Data link Frame data frames between two
nodes connected by a
physical layer.

3. Structuring and managing


Network packet a multimode network
including addressing,
routing, traffic control.
4. Reliable transmission of
Transport segment data segments between
points on a network
including segmentation
and multiplexing.
6. Continuous exchange of
Session data info in the form of
multiple back and forth
transmission between
nodes.
7. Translation of data
presentation Data between a network
services and an
application
8. High level API
Application data
Layer 1: Physical Layer
The physical layer is responsible for the transmission and reception of
unstructured raw data between a device and a physical transmission
medium. It converts the digital bits into electrical, radio, or optical
signals. The components of a physical layer can be described in terms of a network
topology. Examples of protocols using the physical layer include bluetooth, ethernet and
USB

Layer 2: Data Link Layer


The data link layer provides node-to-node data transfer—a link between two
directly connected nodes. It detects and possibly corrects errors that may
occur in the physical layer. It defines the protocol to establish and terminate
a connection between two physically connected devices. It also defines the
protocol for flow control between them.

Layer 3: Network Layer


The network layer provides the functional and procedural means of
transferring variable length data sequences (called packets) from one node
to another connected in "different networks". A network is a medium to
which many nodes can be connected, on which every node has
an address and which permits nodes connected to it to transfer messages to
other nodes connected to it by merely providing the content of a message
and the address of the destination node and letting the network find the way
to deliver the message to the destination node. Message delivery at the
network layer is not necessarily guaranteed to be reliable; a network layer
protocol may provide reliable message delivery, but it need not do so.

Layer 4: Transport Layer


The transport layer provides the functional and procedural means of
transferring variable-length data sequences from a source to a destination
host, while maintaining the quality of service functions.
The transport layer controls the reliability of a given link through flow
control, segmentation/de-segmentation, and error control. This means that
the transport layer can keep track of the segments and re-transmit those
that fail delivery. The transport layer also provides the acknowledgement of
the successful data transmission and sends the next data if no errors
occurred. The transport layer creates segments out of the message received
from the application layer. Segmentation is the process of dividing a long
message into smaller messages.
Layer 6: Presentation Layer
The presentation layer establishes context between application-layer
entities, in which the application-layer entities may use different syntax and
semantics if the presentation service provides a mapping between them. If a
mapping is available, presentation protocol data units are encapsulated into
session protocol data units and passed down the protocol stack.
This layer provides independence from data representation by translating
between application and network formats. The presentation layer transforms
data into the form that the application accepts. This layer formats data to be
sent across a network. It is sometimes called the syntax layer. The
presentation layer can include compression functions. The Presentation
Layer negotiates the Transfer Syntax.

Layer 7: Application Layer


The application layer is the OSI layer closest to the end user, which means
both the OSI application layer and the user interact directly with the
software application. This layer interacts with software applications that
implement a communicating component. Such application programs fall
outside the scope of the OSI model. Application-layer functions typically
include identifying communication partners, determining resource
availability, and synchronizing communication. When identifying
communication partners, the application layer determines the identity and
availability of communication partners for an application with data to
transmit. The most important distinction in the application layer is the
distinction between the application-entity and the application.

PDU(Protocol Data Unit)->


It is the information that is transmitted as asingle unit among peer entities
of a computer network. A PDU may contain user data or networking address.
TCP/IP
The Internet protocol suite is the conceptual model and set of
communication protocols used on the Internet and similar computer
networks. It is commonly known as TCP/IP because the foundational
protocols in the suite are the Transmission control protocol (TCP) and the
Internet Protocol (IP).

The Internet protocol suite provides end-to-end data


communication specifying how data should be packetized, addressed,
transmitted, routed, and received. This functionality is organized into four
abstraction layers, which classify all related protocols according to the scope
of networking involved. From lowest to highest, the layers are:
The link layer containing communication methods for data that remains
within a single network segment (link).
The internet layer, providing internetworking between independent
networks.
The transport layer, providing end-to-end communication services for
applications.
The application layer, providing services to users and system functions.

In March 1982, the US Department of Defense declared TCP/IP as the


standard for all military computer networking. IBM, AT&T and DEC were the
first major corporations to adopt TCP/IP
The two main protocols in the internet protocol suite serve specific functions.
TCP defines how applications can create channels of communication across a
network. It also manages how a message is assembled into smaller ackets
before they are then transmitted over the internet and reassembled in the
right order at the destination address.
IP defines how to address and route each packet to make sure it reaches the
right destination. Each gateway computer on the network checks this IP
address to determine where to forward the message.
1) LINK LAYER:
It is the lowest layer in internet protocol suite. The link layer defines the
networking methods within the scope of the local network link on which
hosts communicate without intervening routers. This layer includes the
protocols used to describe the local network topology and the interfaces
needed to effect transmission of Internet layer datagrams to next-neighbor
hosts.
The link layer is used to move packets between the Internet layer interfaces
of two different hosts on the same link. The processes of transmitting and
receiving packets on a given link can be controlled both in the software
device driver. This is also the layer where packets may be selected to be
sent over a virtual private network or other networking tunnel.

2) INTERNET LAYER:
The internet layer exchanges datagrams across network boundaries. It
provides a uniform networking interface that hides the actual topology
(layout) of the underlying network connections. It is therefore also referred
to as the layer that establishes internetworking. Indeed, it defines and
establishes the Internet.
It provides internetworking between two networks. It is used to transport
network packets from the host to the destination specified by the IP address.
The most notable example of internetworking is the Internet, a network of
networks based on many underlying hardware technologies. For the Internet,
the Internet Protocol defines a unified, global address format and provides
rules for format and handling of packets, and routers are the components
interconnecting networks.
The Internet Protocol performs two basic functions:

 Host addressing and identification: This is accomplished with a


hierarchical IP addressing system.
 Packet routing: This is the basic task of sending packets of data
(datagrams) from source to destination by forwarding them to the next
network router closer to the final destination.
3) TRANSPORT LAYER:
The transport layer establishes basic data channels that applications use for
task-specific data exchange. The layer establishes host-to-host connectivity,
meaning it provides end-to-end message transfer services that are
independent of the structure of user data.
The protocols in this layer may provide error control, segmentation, flow
control, congestion control, multiplexing and application addressing.
It provides a channel for the communication needs of applications. UDP is
the basic transport layer protocol.

4) APPLICATION LAYER:
The application layer is the top layer of the Internet protocol suite."[21] The
application layer includes the protocols used by most applications for
providing user services or exchanging application data over the network
connections established by the lower level protocols. This may include some
basic network support services such as protocols for routing and host
configuration. Examples of application layer protocols include the Hypertext
transfer Protocol (HTTP), the File Transfer Protocol (FTP), the Simple Mail
Transfer Protocol (SMTP)It is the scope within which applications create user
data and communicate this data to other applications on another or the
same host.
The TCP/IP model does not consider the specifics of formatting and
presenting data, and does not define additional layers between the
application and transport layers as in the OSI model (presentation and
session layers). Such functions are the realm of libraries and application
programming interfaces.
MPLS NETWORK:
MPLS stands for Multi Protocol Label Switching; ‘multi protocol’ because
its techniques are applicable to ANY network layer protocol, of which IP is
the most popular. MPLS (multi-protocol label switching) is a relatively new
technology that can improve network performance for select traffic. In the
typical network without MPLS, packet paths are determined in real time as
routers decide each packet’s appropriate next hop. However, conventional IP
routing requires time and eliminates opportunity to influence packets’ paths.
With MPLS, you predefine explicit paths for specific types of traffic, identified
by path labels put in each packet.

MPLS is a scalable, protocol-independent transport. In an MPLS network,


data packets are assigned labels. Packet-forwarding decisions are made
solely on the contents of this label, without the need to examine the packet
itself. This allows one to create end-to-end circuits across any type of
transport medium, using any protocol. The primary benefit is to eliminate
dependence on a particular OSI Model data link layer (layer 2) technology,
such as Asynchronous transfer mode(ATM), Frame Relay, Synchronous
Optical networking (SONET) or Ethernet, and eliminate the need for multiple
layer-2 networks to satisfy different types of traffic.

Important advantages:
 Classification of packets based on the source of the packets (FEC
assignment).
 Packets can be assigned a priority label, making quality-of-service
guarantees possible.
 Packet payloads are not examined by the forwarding routers, allowing
for different levels of traffic encryption and the transport of multiple
protocols.
 A packet can be forced to follow an explicit route rather than the route
chosen by normal dynamic algorithm as the packet travels through the
network. This may be done to support traffic engineering, as a matter
of policy or to support a given QoS
 MPLS is independent of the layer 2 and layer 3 technologies and hence
allows integration of networks with different layer 2 and layer 3
protocols and hence different services.
MPLS network
The MPLS cloud:

MPLS network built by a service provider is generally termed as MPLS cloud


of that service provider. The term cloud represents a network which is
capable of taking customer traffic from one location to another without
dedicated hard wire connections or it is a shared network, in other terms.
Difference between Edge location and Core location in MPLS
network:
Generally MPLS routers are categorized as CORE routers and EDGE routers.
Major difference between these two routers is the way they are used in the
network. CORE routers form backbone of MPLS cloud and perform traffic
switching in the network, whereas EDGE routers have access ports and
interface with customer’s network. Therefore Core and Edge locations in an
MPLS cloud have typically the following equipment/components.

Routers that perform routing based only on the label are called label switch
routers (LSRs). The entry and exit points of an MPLS network are called label
edge routers (LERs), which, respectively, push an MPLS label onto an
incoming packet and pop it off the outgoing packet. Alternatively,
under penultimate hop popping this function may instead be performed by
the LSR directly connected to the LER.

Labels are distributed between LERs and LSRs using the Label Distribution
Protocol (LDP). LSRs in an MPLS network regularly exchange label and
reachability information with each other using standardized procedures in
order to build a complete picture of the network they can then use to
forward packets. Label-switched paths (LSPs) are established by the network
operator for a variety of purposes, such as to create network-based IP
virtual private networks or to route traffic along specified paths through the
network. In many respects, LSPs are not different from permanent virtual
circuits (PVCs) in ATM or Frame Relay networks, except that they are not
dependent on a particular layer-2 technology.

In the specific context of an MPLS-based virtual private network (VPN), LERs


that function as ingress and/or egress routers to the VPN are often called PE
(Provider Edge) routers. Devices that function only as transit routers are
similarly called P (Provider) routers. See RFC 4364. The job of a P router is
significantly easier than that of a PE router, so they can be less complex and
may be more dependable because of this.
When an unlabeled packet enters the ingress router and needs to be passed
on to an MPLS tunnel, the router first determines the forwarding equivalence
class (FEC) the packet should be in, and then inserts one or more labels in
the packet's newly created MPLS header. The packet is then passed on to
the next hop router for this tunnel.

When a labeled packet is received by an MPLS router, the topmost label is


examined. Based on the contents of the label a swap, push (impose)
or pop (dispose) operation can be performed on the packet's label stack.
Routers can have prebuilt lookup tables that tell them which kind of
operation to do based on the topmost label of the incoming packet so they
can process the packet very quickly.

In a swap operation the label is swapped with a new label, and the packet is
forwarded along the path associated with the new label.

In a push operation a new label is pushed on top of the existing label,


effectively "encapsulating" the packet in another layer of MPLS. This
allows hierarchical routing of MPLS packets. Notably, this is used by MPLS
VPNs.
In a pop operation the label is removed from the packet, which may reveal
an inner label below. This process is called "de-capsulation". If the popped
label was the last on the label stack, the packet "leaves" the MPLS tunnel.
During these operations, the contents of the packet below the MPLS Label
stack are not examined. Indeed transit routers typically need only to
examine the topmost label on the stack. The forwarding of the packet is
done based on the contents of the labels, which allows "protocol-
independent packet forwarding" that does not need to look at a protocol-
dependent routing table and avoids the expensive IP longest prefix match at
each hop.
HOW MPLS NETWORK WORKS
 An Ethernet frame (IP packet) enters the PE router.

 Layer-2 header is stripped off and IP packet is taken out.

 MPLS label is placed over IP packet and the packet is forwarded using
Layer-2 (Ethernet) frame.

 Layer-2 (Ethernet) header is stripped off, MPLS packet is taken out


and MPLS label is replaced as per Label Information Base.

 The packet is forwarded using Layer-2 (Ethernet) frame.

 Layer-2 (Ethernet) header as well as MPLS label is stripped off and IP


packet is taken out.

 Data in Ethernet frame exits the PE router and handed over to CPE
device.
POWERGRID’S MPLS NETWORK

 8 core locations, 26 edge locations and 74 Access locations covering


108 location with all major cities on the network with highest
redundancy.

 State-of-the-art NOC design with fully redundant servers at DR site.

 Core layer at 10 gbps and Edge layer at 2.5 gbps makes highest of
capacities possible at any instant and at any location.

 Layer 3/layer 2 VPN technologies to serve all type of connectivity


requirements and different Class of Services, QoS and any-to-any
connectivity
Salient Features of Powergrid’s MPLS network:

 Highly reliable.

 Sturdy and secure.

 Free from cuts, rodent menace and vandalism

 All India Broadband Telecom network of


 25,000 kms.

 Expansion in progress for another 33,000Kms

 Coverage over 200 cities & towns

 Reliability of 99.99%

 Multiple self resilient rings of complete redundancy in backbone as well


as intra-city access networks.
Advantages of MPLS:

Data Security and Performance :

 Port based VPNs:


o The VPN is configured on logical interface for each port. The
corresponding VRF (Virtual Routing and Forwarding Table) is not
shared other ports/VPNs and the data is forwarded in dedicated
tunnels.

 Label based Forwarding:


o Packets are forwarded switched based on Labels and Label
Information Base in all MPLS routers except PE routers. This is in
contrast with general routing based on IP address .

 Fast Switching:
o The Switching is done at Layer 2.5, thereby taking less time as
compared to IP based routing which involves Layer-3 processing
and corresponding routing Tables.
Quality Of Service

MPLS SERVICE CLASSES OFFERED


Recommended
Service Class Purpose
for

Critical
This class for Low Delay, Low Jitter, Low Packet loss
CRITICAL Application
applications e.g. Tele-protection Signaling etc
traffic

Voice, This class is intended for delay and Jitter sensitive


REAL TIME
Signaling applications like VOIP, Video conferencing etc

Network This class is for Customer /Business Enterprise Data and


MANAGEMENT Management, application access. This class is intended for low delay
Critical Data network management and OAM protocols etc

Business Data, This class is intended for network non-real time traffic
BUSINESS Enterprise which is not delay and Jitter sensitive e.g. Video
Applications recordings etc
The Bulk Data class is intended for background, non-
Bulk Data/
interactive traffic flows, such as large file transfers,
STANDARD Transactional
content distribution, database synchronization, backup
Data
operations, and email.

Default The Best Effort class is also the default class. Generally
BEST EFFORT
Data/Internet used for non critical internet traffic
Traffic Engineering :

Multiprotocol Label Switching (MPLS) traffic engineering software enables an


MPLS backbone to replicate and expand upon the traffic engineering
capabilities of Layer 2 ATM and Frame Relay networks.

Traffic engineering is essential for service provider and Internet service


provider (ISP) backbones. Such backbones must support a high use of
transmission capacity, and the networks must be very resilient, so that they
can withstand link or node failures.

MPLS traffic engineering provides an integrated approach to traffic


engineering. With MPLS, traffic engineering capabilities are integrated into
Layer 3, which optimizes the routing of IP traffic, given the constraints
imposed by backbone capacity and topology.

MPLS traffic engineering routes traffic flows across a network based on the
resources the traffic flow requires and the resources available in the network.

MPLS traffic engineering employs "constraint-based routing," in which the


path for a traffic flow is the shortest path that meets the resource
requirements (constraints) of the traffic flow. In MPLS traffic engineering,
the flow has bandwidth requirements, media requirements, a priority versus
otherflows, and so on.

MPLS traffic engineering gracefully recovers to link or node failures that


change the topology of the backbone by adapting to the new set of
constraints.
How MPLS Traffic Engineering Works :

MPLS is an integration of Layer 2 and Layer 3 technologies. By making


traditional Layer 2 features available to Layer 3, MPLS enables traffic
engineering. Thus, you can offer in a one-tier network what now can be
achieved only by overlaying a Layer 3 network on a Layer 2 network.

MPLS traffic engineering automatically establishes and maintains the tunnel


across the backbone, using RSVP. The path used by a given tunnel at any
point in time is determined based on the tunnel resource requirements and
network resources, such as bandwidth.

Available resources are flooded via extensions to a link-state based Interior


Protocol Gateway (IPG).

Tunnel paths are calculated at the tunnel head based on a fit between


required and available resources (constraint-based routing). The IGP
automatically routes the traffic into these tunnels. Typically, a packet
crossing the MPLS traffic engineering backbone travels on a single tunnel
that connects the ingress point to the egress point.

MPLS traffic engineering is built on the following IOS mechanisms:

• Label-switched path (LSP) tunnels, which are signalled through RSVP, with
traffic engineering extensions. LSP tunnels are represented as IOS tunnel
interfaces, have a configured destination, and are unidirectional.

• A link-state IGP (such as IS-IS) with extensions for the global flooding of
resource information, and extensions for the automatic routing of traffic onto
LSP tunnels as appropriate.

• An MPLS traffic engineering path calculation module that determines paths


to use for LSP tunnels.
• An MPLS traffic engineering link management module that does link
admission and Book keeping of the resource information to be flooded.

• Label switching forwarding, which provides routers with a Layer 2-like


ability to direct traffic across multiple hops as directed by the resource-
based routing algorithm.

One approach to engineer a backbone is to define a mesh of tunnels from


every ingress device to every egress device. The IGP, operating at an
ingress device, determines which traffic should go to which egress device,
and steers that traffic into the tunnel from ingress to egress. The MPLS
traffic engineering path calculation and signalling modules determine the
path taken by the LSP tunnel, subject to resource availability and the
dynamic state of the network. For each tunnel, counts of packets and bytes
sent are kept.

Sometimes, a flow is so large that it cannot fit over a single link, so it cannot


be carried by a single tunnel. In this case multiple tunnels between a given
ingress and egress can be configured, and the flow is load shared among
them.
MPLS SERVICES:

The Major Services, as per present market trend, are classified as under:

 VPWS (Virtual Private Wired Service e.g. CPIPE) :


o VPWS is a Point-to-Point link between to PE routers generally
required for critical applications. A VPWS for TDM requirement is
termed as CPIPE.

 Layer-2 VPN (VPLS) :


o In Layer-2 VPN, the whole MPLS network acts as a Layer-2
Switch a switches the traffic based on the MAC address of CPE
devices. The MPLS network in this case remains unaware of
customer side IP addresses and customer network, therefore.

 Layer-3 VPN (VPRN) :


o In Layer-3 VPN, the customers IP addresses are advertised to
the MPLS network PE does the routing based on the IP addresses.
The VPRN (Virtual Private Routed Network) is the most
commonly used VPN in the MPLS networks.
Technical Specifications for Shelters

Introduction
This section describes the functional requirement, major technical
parameters and all the testing requirements for telecom shelter system
including its sub-systems.
shelters are used to amplify data , stabilize electricity and to give back up to
optical fibre cable and to distribute or underground cable wires

Shelter Dimensions
The minimum internal and external dimensions of the shelters shall be as
per Table 2.1 as specified below:

Table 2.1 All dimensions are in mm


SNo. External/Intern Length (L) Width (W) Height (H)
al
External 4500 2700 3160
1
Internal 4340 2540 3000
External 2360 2700 3160
2
Internal 2200 2540 3000
External 2360 2160 3160
3
Internal 2200 2000 3000

The Bill of Quantity has been defined in the appendices.

Requirements

General
The shelters shall be protected and insulated to achieve sound proof,
thermal resistance and impact withstand capabilities. The shelters shall be
100% leak and water proof with IP 55 protection. The shelters shall be
maintenance free having minimum life of 15 years. These shelters shall be
suitable for outdoor and may be mounted at any location including ground
and rooftop and in any climatic conditions throughout India. The shelters
shall be easily assembled and installed at site. The shelters shall be re-
locatable as and when required. The steel shelter shall be installed at most
of the locations, however, at costal areas or high pollution area, aluminium
shelters shall be installed.

Shelter Panels
The shelter shall be made of “sandwich insulated panels” 80 mm thick with
Poly Urethane Foam (PUF) as filler material between polyester pre-coated
cold rolled steel or aluminium sheets.

Floor
The floor shall consist of standard PUF sandwich panels suitably reinforced to
support the minimum load capacity of 2000 kg/m2 and having at least 19
mm Marine plywood covered with anti static PVC flooring. In case of floor
panel, 19 mm Marine plywood shall be provided on top of the panel and no
steel or aluminium sheet shall be provided inside the panel. The anti static
flooring shall be provided with pacific blue anti static vinyl robust rolls of at
least 2 mm thickness. The floor shall be even surfaced, scratch proof having
long life The installation of various proposed equipment shall be possible
either by direct placement on the floor or by grouting to the floor or through
C rails. The Contractor shall submit the reinforcement and other details
calculations in support of the meeting the load capacity.

Roof
Roofs shall be made of the panels same as specified for walls. A secondary
slanting roof of suitable material shall be provided to protect the primary
roof from direct sunlight and rainwater. A minimum down slant of 1:50 shall
be maintained from front to back. The secondary roof shall have minimum
projections and shall be hidden by angular profiles on the rooftop to
decrease the aerodynamic effect and improve on aesthetics. The secondary
roof shall be suitably clamped/ bolted to the shelter panels to withstand the
specified wind load. The details of the secondary roof and its attachment
arrangement shall be enclosed with the Bid. The cable tray shall be attached
suitably from the roof and the roof shall have sufficient strength to support
the load of cable trays and the cables installed on the cable tray. The
detailed load calculation shall be submitted for Employer’s approval during
detail engineering.
Door

The Shelters shall have one door for main entrance. The door dimensions
shall be 1000 mm (W) X 2200 mm (H). Main door opening outwards shall be
provided with external and internal handles/knobs respectively. A reputed
make lock shall be provided in door handle. The make of the lock shall be
got approved during detail engineering. The door can be opened from inside
when locked. Door, when locked cannot be removed even if the hinges are
removed. The door shall generally be hinged at right, however, other option
may be also required at some sites to meet the actual site condition. The
door shall have aluminium biddings extrusions in door/jamb profile,
replaceable and suitable neoprene rubber gaskets around its border for
proper weather proofing. The door shall also be equipped with a hydraulic
auto closure and the door latch / stopper shall be provided to keep the door
in open position. The door shall have a limit switch to indicate intrusion and
switch on one light provided inside the shelter. A canopy of minimum size
1200 mm X 500 mm shall also be fixed up above the external light / door for
protection from direct sun/rain. The canopy shall suitable slope and shall be
covered from both sides.

Jointing
All panel to panel connections shall be made with eccentric cam locks. The
wall to floor and wall to roof jointing shall be made with angular frames of
suitable size. The panel to panel jointing at the corners shall either be
suitably angular frames of suitable size or a single corner panel may be
provided. All internal corners shall be jointed suitable angles. All the joints
shall be suitable sealed with PU or silicon sealant to provide 100 % leakage
and water proofing. The Contractor shall submit the drawing indicating
details of all joints in support of meeting the specified requirement.

Opening

The shelter shall have provision for openings for required air-conditioners,
piping and all electrical and optical cablings on the wall panels. The details
of openings required for different applications and the locations of the
openings shall be decided during detail engineering. All openings shall be
custom built based upon the actual application required at each site. The
Contractor shall provide the required cut outs for above purpose. Any sealed
cut outs required for future use may also be provided and the size of this cut
out shall be finalised during detail engineering. All the openings shall be
sealed for water and leak proof with suitable flexible sealing arrangement for
the proposed cable connections and also for addition and deletion of
cables/pipes in future. The sealing arrangement shall be fire retardant and
type/make/details shall be got approved by the Employer.

The Contractor shall submit the earlier carried out type tests reports for PUF
material. In case the contractor does not submit the reports or the
submitted reports are not meeting the requirements, the contractor shall
carry out the type tests on PUF material for the following:

Thickness, Density, Compressive strength, Tensile Strength, Dimensional


Stability, Thermal Conductivity and Fire resistance.

Colour

The shelter panels shall be factory coated with good quality and long life
paints. The thickness, quality, make and the process of colouring of panels
shall be got approved by the Employer before manufacturing. The finished
panels shall be provided with suitably protection to avoid scratches during
transportation, handling and installation.

The colour shall be stabilised grey on all external sides and off white on all
internal sides. The colour of the slanting roof shall also be stabilised grey.
However, the actual colouring scheme shall be finalised during detail
engineering.
Fire and Smoke Detection System

Suitable fire & smoke detection system shall be provided in each of the
shelters. The offered fire & smoke detection system shall work on DC supply
(-48V) being provided by the Contractor under this contract. In case, the
smoke detector and fire alarm system requires other voltage than the above
stipulated voltage (-48V DC) for operations, suitable converter & hardware
shall also be provided by the Contractor. The Contractor shall provide all
required cabling & accessories for full functioning of the offered system with
both power supplies. At least two ionisation type smoke detectors along with
fire detection panel shall be provided below the roof panel in strategic
locations inside the shelter. The alarm should activate only if both fire
detectors are actuated to avoid any false alarm.

Lighting system

Normal and emergency lighting shall be provided inside the shelters. The
normal lights shall consist of two nos. (36 Watts) of reputed make
fluorescent lights along with requisite fittings and shall be powered with ac
supply from ACDB. Two nos. emergency light with requisite fittings shall also
be provided which shall be powered with dc supply available (-48 V DC) for
telecom equipment from DCDB. Additionally, at least one of the normal
lights inside the shelter shall be lit up with the opening of the shelter door.

Energy Meter Box


A weatherproof box of size 600 mm X 600 mm X 250 mm of IP 55 compliant
shall be provided for housing the energy meter along with MCBs and fuse
units. The energy meter box shall have two different doors and
compartments, one for accessing/housing energy meter and another for
accessing/housing MCBs and fuses. The energy meter box shall have glass
for view of meter reading from outside. The energy meter box shall be of
Fibreglass Reinforced Polymer (FRP) material. The alternate material, if
required, shall be with specific approval of the Employer. The box shall be
provided with pad lock arrangement and shall be installed on external
shelter panels with suitable fittings. Proper sealing shall also be done to
avoid any water leakage into the panel. The locations of meter installation
shall be finalised during detail engineering.

Loading Capacity

Minimum roof loading capacity : 250 kg/m2


Minimum floor load capacity : 2000 kg/m2
Minimum wall load capacity : 300 kg/m2
The above load capacities have been identified as minimum requirement.

Structural Stability

 Resistant to various volumes of rain, dust & sand impinging from


various directions over different durations and different speeds.
 Resistant to corrosion against water, industrial air and saline air.
 Resistant to decomposing vegetation, rodents, termites and micro-
organisms.

Survival wind speed

The shelter shall be designed to withstand a wind load of 200 kmph.

Earthing
For satisfactory operation of the equipment inside the shelter, good and
proper earthing is required at each site. The earthing resistance generally
varies depending on soil resistivity. The earthing system at each site shall be
provided by the Contractor with earthing resistance not exceeding the five
(5) ohms. The Contractor shall provide the chemical earthing along with the
necessary hardware and accessories required. The chemical earthing shall be
free from periodic rejuvenation requirements. In case of pipe type earthing,
two earth pits shall be made at each location.
Installation
The shelter shall be installed on the foundation system as specified above
and to meet the actual requirement as per actual site/soil conditions. The
installation of shelters shall be carried out in such a way that it shall meet all
specified requirement. The installed shelters shall be suitable for both
transporting in assembled condition to another location and dismantling,
transporting to another site and reassembling there.

Environmental Conditions

As indicated in the appendices, the shelters shall be installed all over India.
The environmental conditions required are as under:

Normal Internal Temperature : +24 ± 1 oC


Maximum Outside Temperature : +50 oC
Minimum Outside Temperature : 0 oC
Maximum Inside Temperature : +55 oC
Humidity : Up to 100 %.
Type testing

Factory Acceptance Testing (FAT)

The following tests shall be carried out during Factory Acceptance testing
(FAT):
a. Dimensional and checks as per approved DRS/drawings
b.Quality checks as per approved MQP
c. BOQ verification as per approved drawings/documents
a. Test certificates from the Original Equipment Manufacturer.
b.Density test, Compression test and Thermal Conductivity test on the
PUF material.

FAT on other items shall be carried out as specified in this specifications and
relevant standards.

Site Acceptance Testing (SAT)

The site acceptance testing shall be carried out for each site. The installed
system shall be powered up and all the equipment shall be tested and
commissioned. The various installed system shall be tested for the specified
functional requirements and shall be as per approved drawings. The SAT
shall be carried in an integrated way and not individual equipment basis to
demonstrate the integrated functioning of the installed system. The tests
shall be carried out on following minimum items during SAT:

i. Site preparedness, PCC and RCC.


ii. Civil Pedestals and Steel structure for Base of Shelter System
iii. Shelter (including water proof test)
iv. Air-Conditioning System
v. Cable Tray
vi. Lighting System
vii. Fire and Smoke Detector System
viii. C-Rails
ix. Earthing System
x. Wire Mess Fencing

The detailed SAT procedure shall be submitted for Employer’s approval.


INSTALLATION OF UNDERGROUND FIBRE OPTIC CABLE SYSTEM

This section describes the installation procedures and methods including


survey, clearances, excavation of trenches and pits, trench less digging,
installation of PLB HDPE pipes, installation of RCC hume pipes and GI Pipes,
marking, backfilling, installation of underground cable, construction of
manholes, splicing, termination and site acceptance testing requirements of
the underground fibre optic cabling system.

This specification is applicable for underground optical fibre installation work


and some miscellaneous works to be executed inside city/town. The
quantities indicated in the BoQ are indicative only and the final quantities
against individual items will be approved by the Owner after detailed survey
and depending upon the site conditions.

Identification of underground fibre cable route

The Contractor shall propose preferably most suitable route for each link

keeping in views the following broad criteria:

a. The route shall be as straight and as short as possible.


b. The route shall have minimum obstacles in order to minimise
reinstatement cost.
c. Clearances required from other authorities/bodies are minimum and
that the clearances can be obtained expeditiously.
d. Wet or unstable ground shall be avoided to the extent possible.
e. The route for the pipes shall be away from the carriage-way of the
road to the extent possible.
f. The route shall be suitable for placing manholes wherever required.
g. Future expansion of roads shall be taken into consideration.
h. Road, rail, river, nallah crossings, horizontal direction drilling shall
be minimum.
i. As far as possible underground fibre optic cable route shall be
on the opposite side of the existing cables laid by DOT/BSNL or
other utilities. Wherever both routes fall on the same side of the
road, a spacing of about 2.0 m be maintained, to the extent
possible subjected to ROW clearance.
Underground Fibre Optic Cable Installation

The cable shall be installed inside one of the 40mm diameter PLB HDPE
pipes along the route(s). Generally the cable shall be installed by
compressed air blowing technique. However, for short spans, the Contractor
can use pulling method for installation of OFC in HDPE pipe. If any
temporary manhole or hand hole is required for installation of OFC, the same
will be done by the Contractor without any additional cost implication,
subject to approval of the Engineer-in-charge/Project. Contractor shall take
into consideration the following guidelines, for installation of OFC.

a. The Optical Fibre Cable Drums shall be handled with utmost care. The
drum shall not be subjected to shocks by dropping etc. They shall not
be normally rolled along the ground for long distance and when rolled,
shall in the direction indicated by the arrow. The battens shall be
removed only at the time of actual laying.
b. A blowing machine in association with an appropriate compressor shall
be used for blowing.
c. Temporary blowing chambers (if required) shall be constructed and
then backfilled after blowing operation is completed.
d. Locations along the route, which provide easy access points for
blowing machine and compressor, shall be determined.
e. Before starting the cable blowing, both PLB HDPE pipes shall be
checked for obstacles or damage.
f. Always blow downhill wherever possible.

While installing the cable, excess length of min 10 meters shall be stored at
each joint location for each side.

Underground Fibre Optic Cable

SAT for optical fibre cable shall be carried out link by link from
FODPs/FMS/FDMS to FODPs/FMS/FDMS for fibers spliced in the FMS/FODPs
as per Table – A, B & C.
All the issuance of OFC by POWERGRID, the contractor shall carry out OTDR
testing of the cable to ensure its healthiness. Subsequently, any damage
during handling/laying or otherwise shall be to the contractors account.

Table –A
Fibre Optic Cable Pre-Installation Testing

Item Description: Acceptance Criteria


1. Physical Inspection of the cable
No Damage
for damage
2. Optical fiber Continuity and fiber
attenuation with OTDR at 1310 Attenuation ≤ 0.35 db per
nm (applicable for cable length > KM
1 Km)

Table – B
Fibre Optic Cable Splice Testing

Item Description: Acceptance Criteria


1. Physical inspection of Joint Box As per para 11.2
for proper fibre routing
techniques
2. Physical inspection of sealing As per para 11.2
techniques, weatherproofing, etc
Table – C
Fibre Optic Cable Splice Testing

Item Description: Acceptance Criteria


1. Fibre continuity and link
attenuation (bi-directional)
Attenuation ≤ 0.35 db per
between FODP connectors at two
KM
ends for each fibre at 1310 nm by
OTDR where ever feasible.
2. Fibre continuity and link
attenuation (bi-directional)
between FODP connectors at two Attenuation ≤ 0.35 db per
ends for each fibre at 1310 nm by KM
Power Meter & Laser Source
where ever feasible.

No testing of fibre under SAT shall be required in case total route length for
the specific connectivity is less than 500 meters.

Allowable Wastage

The Owners will provide the underground optical fibre cable to the
Contractor for installation. The Contractor is expected to make no wastage
of the same provided by the Owner, however in order to take care of
exigencies, wastage upto 2% of the material provided may be allowed
during installation. However for re-conciliation, OFC lengths of less than 50
meters shall be treated in the allowable wastage and shall not be taken over
by the owner.

Вам также может понравиться