You are on page 1of 58

COMPANY PROFILE

MTNL was set up on 1st April, 1986 by the Government of India to upgrade the quality of telecom services, expand the telecom network, and introduce new services and to raise revenue for telecom development needs of Indias key metros Delhi, the political capital and Mumbai, the business capital of India. In the past 17 years, the company has taken rapid strides to emerge as Indias leading and one of Asias largest telecom operating companies. Besides having a strong financial base, MTNL has achieved a market share of approximately 13% of the Indian telecommunication network with a customer base of over 4.74 million lines. The company has also been in the forefront of technology induction by converting 100% of its telephone exchange network into the state-of-the-art digital mode. The Govt. of India currently holds 56.25% stake in the company. In the year 2002-03, the company has not only consolidated the gains but also focused on new areas of enterprise viz. Joint Ventures for projects outside India, widened the cellular and CDMA-based WLL customer base, set up internet and allied services on all India basis. MTNL was a monopoly until 2000, when the telecom sector was thrown open to other service providers. Maha = big or great, Nagar = city or town, Mahanagar =metropolis or mega city, Nigam= venture or enterprise.

HISTORY
2

Developments in the year 1986 On 28th February Mahanagar Telephone Nigam Ltd. was incorporated as a Public Limited Company under the Companies Act, 1956. The company has been set up to take over the management, control and operation of Delhi Telephone District (Excluding public telegraph service) and Mumbai Telephone District of the Department of Telecommunications and to plan, establish, develop, provide, operate and maintain all types of telecommunication services including Telephone, telex, wireless, data communication, telemetric and other like forms of communication. One of the important objectives of the company is to raise the necessary finance to meet its own developmental needs and also that of the telecommunications board of the Department of Telecommunication. The Main objectives and aims of Nigam are as follows: (1) To upgrade the quality of telecom services (2) To expand telecom (3) To raise necessary financial resources (4) To provide new telecommunication services, particularly needed by the business community and public administration such as Cellular Mobile Radio Telephone, Radio Paging, Facsimile Videotext, Teletex, Electronic Mail etc. (5) To invest in Human Resource Development (6) To organize and dovetail the training programmes. Development in the year 1995 The entire junction network in the system was fiber based on a step to provide self healing mechanisms to be built in the System through induction of SDH technology.

Development in the year 1996


3

The Company floated on private placement basis 11th `A` part and 12th Series of bonds aggregating Rs 359.26 crores for the developmental programmes of the department of telecommunications. Development in the year 1997 The Company took various steps to provide a host of value added services like datacom, inet, DIDPABX, Voice Mail, Radio Paging and ISDN. In addition to phone plus facilities like dynamic locking, call waiting/call transfer, hot lines etc. were extended to valued customers. Apart from this IVRS (Interactive Voice Response System) like local assistance changed number information, and fault booking system ensuring round the clock service, a CD-ROM version of the telephone directory and an on-line directory enquiry through PC was introduced during the year. The Company undertook to provide, wireless in the local loop in Mumbai and Delhi, GSM Mobile Telephone in Delhi and Mumbai, B.CDMA pilot project, Induction of Smart Payphone and introduction of DLC optical fiber borne system. Developments in the year 1998 As on 31st March, the waiting list of the MTNL has 1047 in Delhi and Nil in Mumbai due to its sustained efforts and timely implementation of various projects. Mahanagar Telephone Nigam Ltd is considering a proposal to reduce the security; a Wireless in Local Loop (WiLL) subscriber has to pay to Rs 15,000 from Rs 25,000. MTNL has proposed that a WiLL subscribers bank can stand guarantee for this security, effectively ensuring that there is no real outflow from the subscribers pockets.
4

The Mahanagar Telephone Nigam Ltd (MTNL) board has approved a proposal for setting up a joint venture company with the Telecom Consultants India Ltd (TCIL) for operating basic and cellular services. Developments in the year 2001 MTNL is to develop a dedicated division to spearhead its cellular operations in Delhi and Mumbai. Mahanagar Telephone Nigam Limited (MTNL) will introduce a cash card for its cellular subscribers within two months of starting its cellular Operations on Jan. 31. The Company Chairman Narinder Sharma has bagged the international `Millennium Man of the Year` award, instituted by the international award committee of Wisitex Foundation. Dolphin, the much-awaited cellular service of MTNL, was launched in Delhi on 6th Feb. The Company proposes to provide additional net switching capacity of 3.30 lakh lines and to deploy 50,000 lines of CDMA-based WLL technology during the year 2001-02. Developments in the year 2006

In December 2006, MTNL has deployed state-of-the-art MPLS infrastructure to provide the latest and varied IP based value added services like IP VPN services to its customers. MPLS is an acronym for Multi Protocol Label Switching. MPLS is fast emerging as the best approach for simplified enterprise connectivity. It will be possible for MTNL to offer assured growth to its customers without having to make significant investments because of inherent features MPLS offers to build secure Virtual Private Network and its further scalability. MTNL would now be able to provide Bandwidth on demand, Video Conferencing, IPTV-though only in Mumbai and Navi Mumbai, Voice over IP (VOIP) and a host of other value added services. MPLS based VPNs reduce customer networking complexity as customers need only one
5

connection instead of individual point-to-pint circuits between each office using pair of leased lines, thereby cutting networking costs and technical work force. In July 2006, MTNL has launched its new Garuda mobile service with a range of attractive features from its state-ofthe-art CDMA 2000 1x network. Developments in the year 2008 In Feb. 2008 Mahanagar Telephone Nigam Ltd. (MTNL) Mumbai & Delhis leading cellular service provider is on the track for rapid growth following completion of major network expansion and technology up-gradation activity carried out by the company. MTNL had recently planned to invest Rs. 1500 crore for this purpose. As per announcement most of the funds that had committed to capacity expansion will be utilized right through this year 2008. All long-standing technology has been phased out and a new state-of-the-art IN network system will be installed soon. Similarly on our customer services front, we have revamped our call center operations and have significantly added to our on ground customer touch points. These technological advancements have paved the way for seamless execution of a number of value added initiatives that MTNL is set to offer subscribers. The company is all set to roll-out Mobile TV which will bring real time television content to mobile hones in April 2008.

VISION, MISSION & OBJECTIVES VISION Become a total solution provider company and to provide world class telecom services at affordable prices. Become a global telecom company and to find a place in the Fortune 500 companies. Become the largest provider of private networks and leased lines. Venture into other areas in India and abroad on the strength of our core competency. OUR MISSION

To provide in its area of operation, in a leading way, world class telecom services which are demanded, keeping always the customers delight as its aim, so that it continues to be the premier Indian Telecom Company.

OBJECTIVES To expand customer base and services. To provide latest technology and services to the customers at affordable prices. To achieve the highest level of customer satisfaction and delight. To diversify in other areas for providing telecom services at national and international levels.

FINANCIAL OPERATIONS

MTNL has a strong financial base and has shown consistent improvement in performance over the years. It has a customer base of 5.92 million. MTNL possesses an impressive financial profile comprising Reserves and Surplus amounting to Rs.105698.8 million* and Fixed Assets worth Rs.146918.8 million* as on 31.03.2006 corresponding figures for 31.03.2005 were 103138.2 million and 142522.5 million respectively.

Financial Operations
Disinvestment/GDR/ADR Telephone Bonds Capital Expenditure

NETWORK STRUCTURE
19 Years of Growth
MTNL as a company, over last nineteen years, grew rapidly by modernizing the network, incorporating the State-of-the-art technologies and a customer friendly approach.

MTNL as a company, over the last twenty three years, grew rapidly by modernizing the network through induction of State-of-the-art technologies and adopting a customer friendly approach.

JOINT VENTURE(s) OF MTNL


Mahanagar Telephone Mauritius Limited (MTML)
MTNL has set up its 100% subsidiary, Mahanagar Telephone Mauritius Limited (MTML) in Mauritius, for providing basic, mobile and international long distance services as second operator in Mauritius. Necessary licenses were obtained in January 2004, MTML has already started its ILD & CDMA based basic services in Mauritius. In Mauritius, 44,312 telephone connections are actually operational from a total switching capacity of 50,000. Moreover, through joint ventures with local telecommunications providers, MTML plans to offer internet access through its wireless network to its users in February 2007.

MTML-STPI IT Services Limited MTML-SPTI IT Services Ltd. is a 50:50 joint venture between Software Technology Parks of India and MTNL. The JV formed in 2006 combines the SPTIs rich experience as an ISP and MTNLs track record of being Indias leading telecom operating company to offer niche portal services to the Indian community. The JV was formed to realize one of the 10 point agenda of MoC&IT, which are of extreme importance to India for bringing about an all-round economic development. The JV aims to provide exclusive data center services, messaging services, business application services to the identified sectors of the .in domain in the networked community across the world. Millennium Telecom Limited (MTL) MTNL has restructured MTL as a joint venture company of MTNL and BSNL with 51% and 49% equity participation respectively. The company will now be entering new business stream of international long distance operations and will be executing a project of submarine cable system, both east and west from India.

10

PRODUCTS
MTNL provides fixed lines telephones, cellular connections of both GSM Dolphin (Postpaid) and TRUMP (Prepaid) and WLL (CDMA) Garuda-FW and Garuda mobile and internet Tri band. MTNL has also started Games on demand, video on demand and IPTV services in India through its Broadband Internet Service called Tri band. MTNL has been actively providing connections in both Mumbai and new Delhi areas and the efficiency of the company has drastically improved from the days when one had to wait years to get a phone connection to now when one can get a connection in even hours. Pre-activated mobile connections are available at many places across both metros. MTNL has also unveiled very cost effective Broadband Internet access plans (Tri Band) targeted at homes and small businesses. At present MTNL enjoys the largest of the market share of ISP services in Mumbai and Delhi. Former Indian Comm. Minister Thiru Dayanidhi Maran had declared year 2007 as Year of Broadband in India and MTNL is gearing up to provide five million Broadband connectivity by the end of 2007. MTNL has upgraded existing Tri Band connections for a speed of up to 2 Mbps without any extra cost. This 2 Mbps broadband service is being provided by MTNL at a cost of just Rs. 250 per month.

Indias First 3G Mobile Service by MTNL

India leaps into 3G mobile arena with the soft launch of 3G enabled Mobile services by MTNL for its Delhis network. MTNL is the first mobile operator in India to launch 3G mobile services named MTNL 3G JADOO.

11

3G Mobile services would enable MTNL Dolphin/Trump subscribers to enjoy: Video Telephony- Customers can watch and talk simultaneously through video call. High speed internet for smart phones and laptop from 256 Kbps to 2 Mbps. A multitude of data related VAS services like Mobile TV. Location Surveillance. Streaming Video on Demand. Gaming etcetera.

MTNL started 3G services in India under the name of MTNL 3G JADOO Services offered include video calling, Mobile TV, Mobile Broadband with high speed data connectivity up to 2 Mbps from December 11th, 2008, getting India onto the 3G map of the world. MTNL plans to offer 3G services across India by mid-2009. After that MTNL Mobile users would be able to surf the internet with speeds up to 2 Mbps on their smart phones. MTNL will be installing 15 lakh 3G lines the first phase of its 3G roll-out in Mumbai and Delhi (which currently have 40 lakh existing mobile lines).

12

GLOBAL SYSTEMS FOR MOBILES


GSM (Global System for Mobile Communications: originally from Group Specials Mobile) is the most popular standard for mobile telephony systems in the world. The GSM Association, its promoting industry trade organization of mobile phone carriers and manufacturers, estimates that 80% of the global mobile market uses the standard. GSM is used by over 4.3 billion people across more than 212 countries and territories. Its ubiquity enables international roaming arrangements between mobile phone operators, providing subscribers the use of their phones in many parts of the world. GSM differs from its predecessor technologies in that both signaling and speech channels are digital, and thus GSM is considered a second generation (2G) mobile phone system. This also facilitates the wide-spread implementation of data communication applications into the system. The ubiquity of implementation of the GSM standard has been an advantage to both consumers, who may benefit from the ability to roam and switch carriers without replacing phones, and also to network operators, who can choose equipment from many GSM equipment vendors.GSM also pioneered low-cost implementation of the short message service (SMS), also called text messaging, which has since been supported on other mobile phone standards as well. The standard includes a worldwide emergency telephone number feature (112). GSM is a cellular network, which means that mobile phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network macro, micro, pico, femto and umbrella cells. GSM carrier frequencies GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated, the 850 MHz and 1900 MHz bands were used instead (for example in Canada and the United States). In rare
13

cases the 400 and 450 MHz frequency bands are assigned in some countries because they were previously used for firstgeneration systems. Most 3G networks in Europe operate in the 2100 MHz frequency band. Regardless of the frequency selected by an operator, it is divided into timeslots for individual phones to use. This allows eight fullrate or sixteen half-rate speech channels per radio frequency. These eight radio timeslots (or eight burst periods) are grouped into a TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is 270.833 kbit/s, and the frame duration is 4.615 ms. The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900. There are five different cell sizes in a GSM network:
A macro cell is a cell in a mobile phone network that provides

radio coverage served by a power cellular base station (tower). The antennas for macro cells are mounted on ground-based masts, rooftops and other existing structures. Micro cells are cells whose antenna height is under average roof top level; they are typically used in urban areas. Pico cells are small cells whose coverage diameter is a few dozen meters; they are mainly indoors. Pico cells are the cells designed for use in residential or small business environments and connect to the service providers network via a broadband internet connections. Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells.

Cell horizontal radius varies depending on antenna height, antenna gain and propagation conditions from a couple of hundred meters to several tens of kilometers. The longest distance the GSM specification supports in practical use is 35 kilometers (22 mi). The modulation used in GSM is Gaussian minimum shift keying (GMSK), a kind of continuous-phase frequency shift keying.
14

In GMSK, the signal to be modulated onto the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a frequency modulator, which greatly reduces the interference to neighboring channels (adjacent-channel interference). HLR (Home location register): The HLR is a database used for storage and management of subscriptions. The HLR is considered the most important database, as it stores permanent data about subscribers, including a subscriber's service profile, location information, and activity status. When an individual buys a subscription from one of the PCS operators, he or she is registered in the HLR of that operator. MSC (Mobile services switching center): The MSC performs the telephony switching functions of the system. It controls calls to and from other telephone and data systems. It also performs such functions as toll ticketing, network interfacing, common channel signaling, and others. VLR (Visitor location register): The VLR is a database that contains temporary information about subscribers that is needed by the MSC in order to service visiting subscribers. The VLR is always integrated with the MSC. When a mobile station roams into a new MSC area, the VLR connected to that MSC will request data about the mobile station from the HLR. Later, if the mobile station makes a call, the VLR will have the information needed for call setup without having to interrogate the HLR each time. AUC (Authentication center): A unit called the AUC provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call. The AUC protects network operators from different types of fraud found in today's cellular world. BSC (Base station controllers): The BSC provides all the control functions and physical links between the MSC and BTS. It is a highcapacity switch that provides functions such as handover, cell configuration data, and control of radio frequency (RF) power levels in base transceiver stations. A number of BSCs are served by an MSC. BTS (Base transceiver stations): The BTS handles the radio interface to the mobile station. The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the network. A group of BTSs are controlled by a BSC.

15

CALL FLOW IN GSM MOBILE


GSM (Global System for Mobile Communications: originally from Group Special Mobile) is the most popular standard for mobile telephony systems in the world.

STRUCTURE OF GSM NETWORK

Network structure
The network is structured into a number of discrete sections: The Base Station Subsystem (the base stations and their controllers). The Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network. The GPRS Core Network (the optional part which allows packet based Internet connections).
16

The Operations support system (OSS) for maintenance of the network.

INTRODUCTION
A value-added service (VAS) is popular as a telecommunications industry term for non-core services or, in short, all services beyond standard voice calls and fax transmissions but, it can be used in any service industry for the services providers provide for no cost to promote their main service business. In telecommunication industry on a conceptual level, value-added services add value to the offering, spurring the subscriber to use their phone more and allowing the operator to drive up their ARPU. For mobile phones, while technologies like SMS, MMS and GPRS are usually considered value-added services, a distinction may also be made between standard (peerto-peer) content and premium-charged content. Value-added services are supplied either in-house by the mobile network operator themselves or by a third-party value-added service provider (VASP), also known as a content provider (CP). VASPs typically connect to the operator using protocols like Short message peer-to-peer protocol (SMPP), connecting either directly to the short message service centre (SMSC) or, increasingly, to a messaging gateway that allows the operator to control and charge of the content better. There are two types of VAS. The first service types are those value-added services that stand alone from an operational perspective. These types of services need not be coupled with other services, but they can be. Many non-voice services fall into this category. They are often provided as an optional service along with voice service, but they could be offered and used by themselves without the voice service. For example, SMS could be offered and used as a service without voice calling. The second, and arguably more numerous and important types of VAS, are those services that do not stand-alone. Instead, this category adds value to existing services. While it seems implicit in the definition of value-added, this is an important principle that makes value-added services stand apart from other services.

17

The Non-voice value added services


SMS MMS Email Advanced video features Peer to peer video sharing Voice based SMS for blind people Cricket and games etc.

Pure voice based value added services


In a landline-voice based ring tone download facility Three party conference Tele-horoscope/tele-Astrology Music-on-demand News-on-demand Opinion polls Quiz/contest City infoline, etc

Theses services are majorly divided into four categories: SMS-BASED IVRS-BASED GPRS-BASED USSD-BASED 1. Short Message Service (SMS) is the text communication
service component of phone or mobile communication systems, using standardized protocols that allow the exchange of short text messages between fixed line or mobile phone devices. SMS text messaging is the most widely used data application in the world.

18

SMS FLOW: SMS MO Call Flow:1. The mobile station transfers the short message to the MSC. 2. The MSC queries the VLR to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed on the subscriber. 3. The MSC sends the short message to the SMSIWMSC (Inter-Working MSC for SMS) using the forward Short Message operation. 4. The SMS-IWMSC delivers the short message to the SMSC (Short Message Service Centre). 5. The SMSC acknowledges the successful outcome of the forward Short Message operation to the MSC. 6. The MSC returns the outcome of the short message operation to the mobile station.

SMS MT Call Flow:1. The Short Message is transferred from SMSC to SMSGMSC. 2. SMS-GMSC queries the HLR (SRI) & receives the routing information for the mobile subscriber (SRI-ACK). 3. The SMS-GMSC sends the short message to the MSC using "Forward Short Message" (FSM) operation. 4. The MSC retrieves the subscriber information from the VLR. This operation may include the Authentication Procedure. 5. The MSC transfers short message to the Mobile Station (MS). 6. The MSC returns the outcome of the "Forward Short Message" operation to the SMS-GMSC (FSM-ACK).
19

7. If requested by the SMSC, it returns a status report indicating Delivery of the Short Message.

LIST OF SMS BASED SERVICES IN MTNL:

SMS 1

SHORT CODE

SERVICE PROVIDER

SERVICES

KEYWORDS

52001

MTNL

News,Billing,STD/ISD codes, enquiries etc. News,sports etc Write 1st 3 letters of news, business, stocks, weather,sports,cricket,etc NEWS for latest news, CRI for latest score, ASTRO for predictions, JOKE for jokes, GH for good housekeeping VDAY for valentein, NEWS for latest news, PM for Picture Msg, SPO for sports, RT for Ringtones JOKE for jokes, HLUV for shayaris, CRI for cricket updates, NEWS for latest news NEWS for current news, RT for Mono Ringtone, LOGO for Operator logo, PIC for picture message, JOKE for jokes NEWS for current news, LOVE for love & friendship, SPICY for joke NEWS for latest news, JOKE for jokes, CRI for cricket updates

56388

NDTV

52424

India Today (Living Media) Creative Moble Technology/ Active Media Mobile 2 win

Aaj Tak, News, Business, sports etc.

53636

Contest etc.

58558

Contest, Polls, games etc.

57575

Zee TV (Cornershop India Ltd)

Interactive prog.SMS+VMS for on line trading etc. News, Sports, Business etc, mono ringtones, B/W picture message, Instant Messaging Contents, Various V.A.S. 0 contest,Polls,Games on Sony TV

58888

Times Internat Ltd ACL Wireless Ltd Bharat BPO Mobile 2 win

8 9 10

56767 139 52525

As per instructions on Channels

20

11

55888

Oversease Marketing Corp.Ltd.

News,sports, RT, Logos, Wallpaper.

IQUOTE for inspirational quotes, KISS for sweet kiss picture, JOKE for jokes, RDAY for republic day pics,FUN for funsection,NEWS for news CRI for cricket, NEWS for news, CNT for contests, LV for love zone, JOKE for jokes, CRI for cricket, NEWS for news,Top Tune for ringtone SHER for shayaris,FUNSHER for funny shayari, JOKES for jokes,CRI for cricket news CRI for cricket, BC for birthday reminders, NEWS for news NEWS for latest news, CRI for latest score, JOKE for jokes, SHAYARI for shayari, HORO LEO for horroscope

12

57333

Rediff.com

News, Jokes, Astrology, Messenger -Mono RT, Picture msg, logo News,sports,ringtones etc.

13

57007

Mauj

14

57272

Dainik Jagran

News,Sports.Rly Enq. Etc News,Sports.RT.Logo Etc

15

54545

Sify Ltd

16

56300

Cellebrum

News,Sports.RT. Logo Etc

17

56677

Cellnext

News,Sports.RT. Logo Etc News,Sports.RT. Logo Etc sign in ID: Password,sign out: out,view friends: get,Add friend: add ID,Delete friend: del ID

18

58243

Yahoo

19

58242

Yahoo

Messenger service

2. Interactive Voice Response (IVR) is a technology that allows a computer to detect voice and dual-tone multi-frequency signaling (DTMF) keypad inputs. IVR technology is used extensively in telecommunication, but is also being introduced into automobile systems for hands-free operation. Current deployment in automobiles revolves around satellite navigation, audio and mobile phone systems. In telecommunications, IVR allows customers to access a companys database via a telephone keypad or by speech recognition, after which they can service their own inquiries by following the instructions. IVR systems can respond with pre-recorded or dynamically generated audio to
21

further direct users on how to proceed. IVR systems can be used to control almost any function where the interface can be broken down into a series of simple menu choices. In telecommunications applications, such as customer support lines, IVR systems generally scale well to handle large call volumes.

LIST OF IVRS SERVICES IN MTNL:


Short code
37 38 39 40 41 42 43 44 45 46 47 48 626 126300 58888 12555 125000 1* 567855 57777 55000 56694 139 125588
Service provider services

ORG Cellebrum Times internet Ltd. OnMobile OnMobile Kirusa Mi VAS Mi VAS Cellebrum Altruist Bharat BPO Oversease Marketing Corp.Ltd.

CRBT
News,Sports RT. Etc

News,sports, RT stocks, music messaging. Multimodal voice portal and Rly. Reservation Voice SMS Voice SMS

Mitti Ke rang
Mobile Radio Mobile Radio Jobs on Phone / Chatting

PNR Alert / Rly Enq


News,sports, RT stocks, music messaging.

3.General packet radio service (GPRS) is a packet oriented mobile data service available to all users system of for the 2G cellular mobile communication systems global

communications (GSM), as well as in the3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/second [1] GPRS data transfer is typically charged per megabyte of traffic transferred, while data communication via traditional circuit switching is billed per minute of connection time, independent of whether the user
22

actually is using the capacity or is in an idle state. GPRS is a besteffort packet switched service, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users.

LIST OF GPRS SERVICES IN MTNL:


GPRS/MMS content PolyRT Games etc Dolphin Vault Maps & Directions GPRS/MMS based content PolyRT Logo Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc GPRS/MMS content PolyRT Games etc based Logo based Logo based Logo based Logo based Logo based Logo based Logo based Logo

49 50 51 52

56263 52585 56688 58888

IMI Mobile Net Edge Map My India Times internet Ltd. Mobile 2 win Adlabs Handygo Mauj IMCL
Hungama Mob.

53 54 55 56 57 58 59

58558 55454 55678 57007 54567 54646 56767

ACL Wireless Ltd

60 61 62 63 64

53388 51290 54626 53588 55513

Mobile TV
Mantec Ryatech NOMAD Mingle

Streaming of TV CHLs

Remote Acess of mail Remote Acess of mail Location Based Service

23

4. Unstructured Supplementary Service Data is a capability of all GSM phones. It is generally associated with real-time or instant messaging type phone services. There is no store-andforward capability, such as is typical of other short-message protocols (in other words, an SMSC is not present in the processing path). Response times for interactive USSD-based services are generally quicker than those used for SMS. USSD is a standard for transmitting information over GSM signaling channels. It is mostly used as a method to query the available balance and other similar information in pre-paidGSM services. The function that is triggered when sending USSD is networkdependent and depends on the specific services the operator is offering.

LIST OF USSD SERVICES IN MTNL:


32 *56300# Cellebrum

News,Sports.RT. Logo Etc News,Sports.Cricket, Gita Updesh Etc

33 *123# 34 *56262# M/s ORG Contakt

News,Sports.Cricket, Gita Updesh Etc

24

35 *501# 36 *502# IOCL BPCL LPG Booking LPG Booking

LIST OF SERVERS IN MTNL

WAP GW1 (Wireless Access Protocol Gateway) WAP GW2 LOAD BALANCER 1 LOAD BALANCER 2 MMSC1 (Multimedia Messaging Service Centre) MMSC2 DATABASE1 DATABASE2 PPG1 (Push Proxy Gateway) PPG2 PGS (Prepaid GPRS Service) OTA (Over The Air) CRBT (Caller Ring Back Tone) MRBT (Multimedia Ring Back Tone) SMS GATEWAY

25

SCOPE OF THE REPORT

This report explains the current Scenario of Telecom Industry in India and tracks the Value added Services Market. It describes the Global overview of VAS market and its evolution. Profiles of key VAS providers Content creation and enterprise messaging - their revenue models, challenges and future potential. Role of technology and potential of IT application in VAS market
Mobile and media & entertainment in VAS market Their

revenue models and alliances of media companies with VAS providers Future Potential and challenges ahead of VAS market in India Entertainment products for mobile phone users Interactive telecommunication services Transmission of data packets Voice based services
26

Offering of payment methods

SKILL SET REQUIRED


1. Experience on VAS products: Techno men, RBT, VMS, UMS, VGW, MTA, Send Mail [personalized ring back tone, next generation voice mail services etc...] 2. Experience in IT and Telecom products and their behavior in a real customer network is a must.
3. TCP/IP networking, knowledge of routers and switches

4. communication technologies such as WLAN,UMTS, GPRS, GSM 5. knowledge of IP Sec, VPN, VLAN, Ethernet 6. SNMP

1. VMS, UMS, MTA


Voicemail (or voice mail, voice-mail, vmail or VMS, sometimes called message bank) is a centralized system of managing telephone messages for a large group of people. The term is also used more broadly, to denote any system of conveying voice message, including the answering machine.

Features

27

In its simplest form it has only the functions of an answering machine, using a standard telephone handset for the user interface, but it can use a centralized, computerized system rather than equipment at the individual telephone. Voicemail systems can be much more sophisticated than answering machines in that they can: answer many phones at the same time store incoming voice messages in personalized mailboxes associated with the users phone number enable users to forward received messages to another voice mailbox send messages to one or more other user voice mailboxes add a voice introduction to a forwarded message store voice messages for future delivery
make calls to a telephone or paging service to notify the user

a message has arrived in his/her mailbox


Provide message notification by SMS, a special dial tone, or

using Caller ID signaling. transfer callers to another phone number for personal assistance Play different message greetings to different callers.

How voicemail systems work


This section describes how the original style, standalone, voicemail system worked with a corporate PBX. The principle is the same with Central Office Switches (CO Switches) or Mobile Telephone Switching Office (MTSOs). More modern voicemail systems work on the same principle, but some of the components may be shared with other systems, such as email systems.

28

Voicemail systems contain several elements shown in the figure below: A central processor (CPU) which runs the operating system and a program (software) that gives the system the look-andfeel of a voicemail system. This software includes thousands of pre-recorded prompts that speak to the users as they interact with the system; Disk controller and multiple disk drives for message storage; System disks which not only include the software above, but also contain a complete directory of all users with pertinent data about each (name, extension number, voicemail preferences, and pointers to each of the messages stored on the message disk that belong to them); Telephone interface system that enables many phone lines to be connected to it.

29

The drawing below shows how the voicemail system interacts with the PBX. Suppose an outside caller is calling Freds extension 2345. The incoming call comes in from the public network (A) and comes into the PBX. The call is routed to Freds extension (B), but Fred doesnt answer. After a certain number of rings, the PBX stops ringing Freds extension and forwards the call to an extension connected to the voicemail system (C). It does this because PBXs are generally programmed to forward busy or unanswered calls to another extension. Simultaneously the PBX tells the voicemail system (through signaling link D) that the call it is forwarding to voicemail is for Fred at extension 2345. In this way, the voicemail system can answer the call with Freds greeting. There are many microprocessors throughout the system since the system must handle large amounts of data and its unacceptable to have any wait times (for example, when the system is recording or playing your message, its unacceptable if the system stops
30

recording momentarily like computers often do while accessing large files). When Freds extension forwards to the voicemail system, the Telephone Interface detects ringing. It signals to the Central Processor (CPU) that a call is coming in. The CPU simultaneously receives a signal on the PBX-Voicemail Data Link (D) telling it that extension 2345 is being forwarded on ring-no-answer to the specific extension that is now ringing. The CPU directs the Telephone Interface (which controls the line interface cards) to answer the call. The CPUs program realizes that its a call for Fred so it looks up Freds greeting immediately and directs the Disk Controller to start playing it to the caller. It also plays some system prompts instructing the caller what comes next (for example, When you have finished recording, you may hang up or press # for more options). All talking to the caller is done through prompts that are selected by the CPU according to the program stored in the voicemail system. The CPU selects the prompts in response to the keys the caller presses. The callers message is digitized by the Telephone Interface system and transmitted to the Disk Controller for storage onto the Message Disks. Some voicemail systems will scramble the message for further security. The CPU then stores the location of that message in the System Disk inside Freds mailbox directory entry. After the caller hangs up and the message has been stored, the CPU sends a signal to the PBX through the link (D) instructing the PBX to turn on the message waiting light on Freds phone. When Fred comes back to his desk and sees the light on his phone, he calls a designated extension number for the voicemail system (an actual extension number assigned to the lines in C in the figure above). Again the Telephone Interface alerts the CPU that a call is coming in on a particular line, but this time the signaling from the PBXVoicemail Data Link (D) indicates that Fred is calling directly, not being forwarded. The CPU directs the Telephone Interface to answer the call.

31

Since the CPU knows it is Fred (from the signaling on the Data Link D), it looks up Freds information on the System Disk, specifically his password. The CPU then directs Disk Controller to play a log-on prompt to the user: Please enter your password. Once the password is entered (via Touch-tones), the CPU compares it to the correct one and, if entered correctly, allows Fred to continue. The CPU then determines (from Freds directory entry) that Fred has a new message. The CPU then presents Fred his options (e.g., You have a new message. To listen to your new message, press 1; to record a message, press 2 etc.) The options are presented by the CPU directing the Disk Controller to play prompts, and the CPU listens for Touch-tones from Fred. This interaction of playing prompts and responding with Touch-tones enables Fred to interact with the voicemail system easily. If Fred presses 1 to listen to his message, the CPU looks up the location of Freds new message in his mailbox directory (on the System Disk), and directs the Disk Controller to play that message. The Disk Controller finds the message on the Message Disks, and sends the data stream directly to the Telephone Interface. The Telephone Interface then converts the data stream to sound and plays it to Fred through the Line Interface Card which Fred is connected to.

Playback controls (like rewind, pause, fast forward, changing volume, etc) are all input via Touch-tones, are read by the CPU, and the appropriate actions are taken based on the stored program in the system. For example, if Fred wants to pause message playback, he might press 2. Since the CPU is constantly listening for Touch-tones from Fred, his command causes the CPU to direct the Disk Controller to stop playing the message. A variety of playback controls and options are available on most sophisticated voicemail systems so that users can control message playback, store messages in archives, send messages to groups, change their preferences, etc.

32

The better designed voicemail systems have a user-friendly interface with clear and meaningful prompts so the interaction with the voicemail system is quick and easy.

A mail transfer agent (MTA) (also called a mail transport agent, message transfer agent, or smtpd) (short for SMTP daemon), is a computer program or software agent that transfers electronic mail messages from one computer to another. The term mail server is also used to mean a computer acting as an MTA by running the appropriate software. The term mail exchanger (MX), in the context of the Domain Name System formally refers to an IP address assigned to a device hosting a mail server, and by extension also indicates the server itself. using services from the lower layers. Upper layers are logically closer to the user OVERVIEW A MTA receives mail from either another MTA, a mail submission agent (MSA), or a mail user agent (MUA). The MTA works behind the scenes, while the user usually interacts directly with the MUA. Every time an MTA receives an email message, it adds a Received trace header field to the top of the headers of the message. In this way, there is a record of which
33

MTAs handled the e-mail and in which order. Upon final delivery, the Return-Path: header will also be added to record the return path. The delivery of e-mail to a users mailbox typically takes place via a mail delivery agent (MDA); many MTAs have basic MDA functionality built in, but a dedicated MDA like procmail can provide more sophisticated functionality. According to a one survey, send mail, Microsoft Exchange Server, Postfix, and Exim together control over 85% of market share for SMTP services. [Citation needed] The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Modern IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and local area networks, which emerged during the 1980s, together with the advent of the World Wide Web in the early 1990s. The Internet Protocol Suite, like many protocol suites, is constructed as a set of layers. Each layer solves a set of problems involving the transmission of data. In particular, the layers define the operational scope of the protocols within. Often a component of a layer provides well-defined services to the upper layer protocols and may be and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. CONCEPT OF LAYERS
34

The TCP/IP suite uses encapsulation to provide abstraction of protocols and services. Such encapsulation usually is aligned with the division of the protocol suite into layers of general functionality. In general, an application (the highest level of the model) uses a set of protocols to send its data down the layers, being further encapsulated at each level. This may be illustrated by an example network scenario, in which two Internet host computers communicate across local network boundaries constituted by their internetworking gateways (routers).

Encapsulation of application data descending through the protocol stack. TCP/IP stack operating on two hosts connected via two routers and the corresponding layers used at each hop

2. ROUTERS
35

A router is a device that interconnects two or more computer networks, and selectively interchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network to another. Where multiple routers are used in a large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks. A router is a networking device whose software and hardware are customized to the tasks of routing and forwarding information. A router has two or more network interfaces, which may be to different physical types of network (such as copper cables, fiber, or wireless) or different network standards. Each network interface is a small computer specialized to convert electric signals from one form to another. Routers connect two or more logical subnets, which do not share a common network address. The subnets in the router do not necessarily map one-to-one to the physical interfaces of the router. [1] The term "layer 3 switching" is used often interchangeably with the term "routing". The term switching is generally used to refer to data forwarding between two network devices that share a common network address. This is also called layer 2 switching or LAN switching. Conceptually, a router operates in two operational planes (or subsystems):
36

Control plane: where a router builds a table (called routing

table) as how a packet should be forwarded through which interface, by using either statically configured statements (called static routes) or by exchanging information with other routers in the network through a dynamical routing protocol; Forwarding plane: where the router actually forwards traffic (called packets in IP) from ingress (incoming) interfaces to an egress (outgoing) interface that is appropriate for the destination address that the packet carries with it, by following rules derived from the routing table that has been built in the control plane.

Types of routers
Routers may provide connectivity inside enterprises, between enterprises and the Internet, and inside internet service providers (ISPs). The largest routers (for example the Cisco CRS-1 or Juniper T1600) interconnect ISPs, are used inside ISPs, or may be used in very large enterprise networks. The smallest routers provide connectivity for small and home offices. Routers for Internet connectivity and internal use Routers intended for ISP and major enterprise connectivity almost invariably exchange routing information using the Border Gateway Protocol (BGP). RFC 4098[3]defines several types of BGP-speaking routers according to the routers' functions:
Edge Router: An ER is placed at the edge of an ISP network. The

router speaks external BGP (EBGP) to a BGP speaker in another provider or large enterprise Autonomous (AS). This type of routers is also called PE (Provider Edge) routers. Subscriber Edge Router: An SER is located at the edge of the subscriber's network; it speaks EBGP to its provider's AS(s). It belongs to an end user (enterprise) organization. This type of routers is also called CE (Customer Edge) routers.

37

Inter-provider Border Router: Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions with other BGP speaking routers in other providers' ASes. Core router: A Core router is one that resides within an AS as back bone to carry traffic between edge routers. Within an ISP: Internal to the provider's AS, such a router speaks internal BGP (IBGP) to that provider's edge routers, other intra-provider core routers, or the provider's interprovider border routers. "Internet backbone:" The Internet does not have a clearly identifiable backbone, as did its predecessors. See defaultfree zone (DFZ). Nevertheless, it is the major ISPs' routers that make up what many would consider the core. These ISPs operate all four types of the BGP-speaking routers described here. In ISP usage, a "core" router is internal to an ISP, and used to interconnect its edge and border routers. Core routers may also have specialized functions in virtual private networks based on a combination of BGP and MultiProtocol Label Switching (MPLS).[4] Routers are also used for port forwarding for private servers.

Enterprise routers
All sizes of routers may be found inside enterprises. The most powerful routers tend to be found in ISPs and academic & research facilities. Large businesses may also need powerful routers. A three-layer model is in common use, not all of which need be present in smaller networks.[13]

Access
Access routers, including SOHO, are located at customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost.
38

Distribution
Distribution routers aggregate traffic from multiple access routers, either at the same site, or to collect the data streams from multiple sites to a major enterprise location. Distribution routers often are responsible for enforcing quality of service across a WAN, so they may have considerable memory, multiple WAN interfaces, and substantial processing intelligence. They may also provide connectivity to groups of servers or to external networks. In the latter application, the router's functionality must be carefully considered as part of the overall security architecture. Separate from the router may be a firewall or VPN concentrator, or the router may include these and other security functions. When an enterprise is primarily on one campus, there may not be a distinct distribution tier, other than perhaps off-campus access. In such cases, the access routers, connected to LANs, interconnect via core routers.

Core
In enterprises, a core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth. When an enterprise is widely distributed with no central location(s), the function of core routing may be subsumed by the WAN service to which the enterprise subscribes, and the distribution routers become the highest tier.

3. ROLE OF SWITCHES IN NETWORKS


Network switch is a marketing term rather than a technical one. Switches may operate at one or more OSI layers, including physical, data
39

link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is known as multilayer. In switches intended for commercial use, built-in or modular interfaces make it possible to connect different types of networks, including Ethernet, Fibre Channel, ATM, ITU-T G.hn and 802.11. This connectivity can be at any of the layers mentioned. While Layer 2 functionality is adequate for speed-shifting within one technology, interconnecting technologies such as Ethernet and token ring are easier at Layer 3. Interconnection of different Layer 3 networks is done by routers. If there are any features that characterize "Layer-3 switches" as opposed to general-purpose routers, it tends to be that they are optimized, in larger switches, for high-density Ethernet connectivity. In some service provider and other environments where there is a need for a great deal of analysis of network performance and security, switches may be connected between WAN routers as places for analytic modules. Some vendors provide firewall, network intrusion detection, and performance analysis modules that can plug into switch ports. Some of these functions may be on combined modules.[5] In other cases, the switch is used to create a mirror image of data that can go to an external device. Since most switch port mirroring provides only one mirrored stream, network hubs can be useful for fanning out data to several read-only analyzers, such as intrusion detection systems and packet sniffers.

4. WLAN, UMTS, GPRS, GSM


Wireless local area network (WLAN) links devices via a wireless distribution method and usually provides a connection through an access point to the wider Internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Wireless LANs have become popular in the home due to ease of installation and the increasing popularity of laptop computers. Public businesses such as coffee shops and malls have begun to offer wireless
40

access to their customers, sometimes for free. Large wireless network projects are being put up in many major cities: New York City, for instance, has begun a pilot program to cover all five boroughs of the city with wireless Internet access. Universal Mobile Telecommunications System (UMTS) is one of the third-generation (3G) mobile telecommunications technologies, which is also being developed into a 4G technology. Currently, the most common form of UMTS uses W-CDMA as the under lying air interface. UMTS and its use of W-CDMA is standardized by the 3GPP, and is the European answer to the ITU IMT-2000 requirement for 3Gcellula radio systems. To differentiate UMTS from competing network technologies, UMTS is sometimes marketed as 3GSM, emphasizing the combination of the 3G nature of the technology and the GSM standard which it was designed to succeed. General packet radio service (GPRS) is a packet oriented mobile data service available to all users of the 2G cellular communication systems global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/second GPRS data transfer is typically charged per megabyte of traffic transferred, while data communication via traditional circuit switching is billed per minute of connection time, independent of whether the user actually is using the capacity or is in an idle state. GPRS is a best-effort packet switched service, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection for nonmobile users. 2G cellular systems combined with GPRS are often described as 2.5G, that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused time division multiple access (TDMA) channels in, for example, the GSM system. Originally there was some thought to extend GPRS to cover other standards, but instead those networks are being converted to use the GSM standard, so that GSM is the only kind of network where GPRS is in use. GPRS is integrated into GSM Release 97 and newer releases. It was originally standardized by European Telecommunications Standards Institute (ETSI), but now by the 3rd Generation Partnership Project (3GPP).
41

GPRS was developed as a GSM response to the earlier CDPD and i-mode packet switched cellular technologies.

SERVICES

GPRS upgrades data services providing: "Always on" internet access


Multimedia messaging service (MMS) Push to talk over cellular (PoC/PTT) Instant messaging and presencewireless village Internet applications for smart devices through wireless application

protocol (WAP)
Point-to-point (P2P) service: inter-networking with the Internet

(IP) If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS transmission speed is about 6 to 10 SMS messages per minute.

5. IP sec, VPN, VLAN, ETHERNET


Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls), or between a security gateway and a host.
42

IPsec is a dual mode, end-to-end, security scheme operating at the Internet Layer of the Internet Protocol Suite or OSI model Layer 3. Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of these models. Hence, IPsec can be used for protecting any application traffic across the Internet. Applications don't need to be specifically designed to use IPsec. The use of TLS/SSL, on the other hand, must typically be incorporated into the design of applications. IPsec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA). IPsec is officially specified by the Internet Engineering Task Force

(IETF). A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network. It aims to avoid an expensive system of owned or leased lines that can only be used by one organisation. The goal of a VPN is to provide the organisation with the same, secure capabilities, but at a much lower cost. It encapsulates data transfers between two or more networked devices not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. There are many different classifications, implementations, and uses for VPNs.

A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network
43

switch. Network reconfiguration can be done through software instead of physically relocating devices.

USES VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. This is also useful if someone wants to create multiple Layer 3 networks on the same Layer 2 switch. For example, if a DHCP server (which will broadcast its presence) is plugged into a switch it will serve any host on that switch that is configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain link-local addresses, or obtain an address from a different DHCP server. Virtual LANs are essentially Layer 2 constructs, compared with IP subnets which are Layer 3 constructs. In an environment employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN or have one subnet spread across multiple VLANs. Virtual LANs and IP subnets provide independent Layer 2 and Layer 3 constructs that map to one another and this correspondence is useful during the network design process. By using VLANs, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to
44

changes in network requirements and allow for simplified administration.

Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer. Ethernet is standardized as IEEE 802.3. The combination of the twisted pair versions of Ethernet for connecting end systems to the network, along with the fiber optic versions for site backbones, is the most widespread wired LAN technology. It has been used from around 1980 to the present, largely replacing competing LAN standards such as token ring, FDDI, and ARCNET.

7. SNMP
Simple Network Management Protocol (SNMP) is a UDPbased network protocol. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects. SNMP exposes management data in the form of variables on the managed systems, which describe the system configuration. These variables can then be queried (and sometimes set) by managing applications.
45

SMNP basic components Managed device Agent software which runs on managed devices Network management system (NMS) software which runs on the manager

A managed device is a network node that implements an SNMP interface that allows unidirectional (read-only) or bidirectional access to node-specific information. Managed devices exchange node-specific information with the NMSs. Sometimes called network elements, the managed devices can be any type of device, including, but not limited to, routers, access servers, switches, bridges, hubs, IP telephones, IP video cameras, computer hosts, and printers. An agent is a network-management software module that resides on a managed device. An agent has local knowledge of management information and translates that information to or from an SNMP specific form. A network management system (NMS) executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management. One or more NMSs may exist on any managed network.

46

SYSTEMS REQUIREMENTS

PROCESSER: P-IV (Pentium 4), Dual Core, Core-2. OPERATATING SYSTEM: Window XP, 2000 Server, Linux. RAM: min 512 MB.
47

ADDITIONAL HARDWARES: ROUTER: Cisco, Dell, HP. SWITCHES. E1S (EVENS). FIREWALLS SWITCH.

48

FEASIBILITY STUDY

The result of the feasibility study is a formal proposal. This is simply report formal document detailing the nature and the scope of the proposed solution. The proposals summarize what is known and what is going to be done. Three key considerations are involved in the feasibility analysis: economic, technical and operational behavior. Economic Feasibility: Economic analysis is the most frequently used method for evaluating the effectiveness of a candidate system. More determine the benefits and the saving that are expressed from a candidate system and compare those costs. If benefits outweigh costs. Otherwise, further justification or alterations in the proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. Technical Feasibility: Technical feasibility center on the existing computer system hardware etc. and to what extent it can support the proposed addition. For example, if the current computer is operating at 80% capacity - an arbitrary ceiling - then running another application could over load the system or require additional hardware. This involves financial consideration to accommodate technical enhancements. If the budget is a serious constraint then the project is judged not feasible. Operational Feasibility: It is common knowledge that computer installations have some thing to do with turnover, transfers, retraining and changes in employee job status. Therefore, it is understandable that the introduction of a candidate system requites special efforts to educate, sell, and train the staff on new ways of conducting business.

49

IMPLEMENTATION OF VAS SERVICES

1. INTELLIGENT NETWORK

Tele-voting Call screening Telephone number portability Toll free calls / Free phone Prepaid calling Account card calling
50

Virtual private networks (e.g. : Family group calling) Private-number plans (with numbers remaining unpublished in directories) Universal Personal Telecommunication service (a universal personal telephone number) Mass-calling service Seamless MMS message access from abroad. Home Area Discount Premium Rate calls Call distribution based on various criteria associated with the call o Location Based Routing o Time based routing o Proportional call distribution (eg between two or more call centres or offices). Call transfer

2. MPLS
Multiprotocol Label Switching (MPLS) is a mechanism in highperformance telecommunications networks which directs and carries data from one network node to the next. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits
51

across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular Data Link Layer technology, such as ATM, frame relay, SONET or Ethernet, and eliminate the need for multiple Layer 2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks. MPLS operates at an OSI Model layer that is generally considered to lie between traditional definitions of Layer 2 (Data Link Layer) and Layer 3 (Network Layer), and thus is often referred to as a "Layer 2.5" protocol. It was designed to provide a unified data-carrying service for both circuitbased clients and packet-switching clients which provide a datagram service model. It can be used to carry many different kinds of traffic, including IP packets, as well as native ATM, SONET, and Ethernet frames. A number of different technologies were previously deployed with essentially identical goals, such as frame relay and ATM. MPLS technologies have evolved with the strengths and weaknesses of ATM in mind. Many network engineers agree that ATM should be replaced with a protocol that requires less overhead, while providing connection-oriented services for variable-length frames. MPLS is currently replacing some of these technologies in the marketplace. It is highly possible that MPLS will completely replace these technologies in the future, thus aligning these technologies with current and future technology needs. In particular, MPLS dispenses with the cell-switching and signalingprotocol baggage of ATM. MPLS recognizes that small ATM cells are not needed in the core of modern networks, since modern optical networks (as of 2008) are so fast (at 40 Gbit/s and beyond) that even fulllength 1500 byte packets do not incur significant real-time queuing delays (the need to reduce such delays e.g., to support voice traffic was the motivation for the cell nature of ATM). At the same time, MPLS attempts to preserve the traffic engineering and out-of-band control that made frame relay and ATM attractive for deploying large-scale networks. While the traffic management benefits of migrating to MPLS are quite valuable (better reliability, increased performance), there is a significant loss of visibility and access into the MPLS cloud for IT departments.
52

HOW MPLS WORKS ? MPLS works by prefixing packets with an MPLS header, containing one or more "labels". This is called a label stack. Each label stack entry contains four fields: A 20-bit label value. a 3-bit Traffic Class field for QoS (Quality of Service) priority (experimental) and ECN (Explicit Congestion Notification). a 1-bit bottom of stack flag. If this is set, it signifies that the current label is the last in the stack. an 8-bit TTL (time to live) field. These MPLS-labeled packets are switched after a label lookup/switch instead of a lookup into the IP table. As mentioned above, when MPLS was conceived, label lookup and label switching were faster than a RIB(routing table, or Routing Information Base) lookup because they could take place directly within the switched fabric and not the CPU.

The entry and exit points of an MPLS network are called Label Edge Routers (LER), which, respectively, push an MPLS label onto an incoming packet and pop it off the outgoing packet. Routers that perform routing based only on the label are called Label Switch Routers (LSR). In some applications, the packet presented to the LER already may have a label, so that the new LER pushes a second label onto the packet. For more information see penultimate hop popping. Labels are distributed between LERs and LSRs using the Label Distribution Protocol (LDP).[4] Label Switch Routers in an MPLS network regularly exchange label and reachability information with each other using standardized procedures in order to build a complete picture of the network they can then use to forward packets. Label Switch Paths (LSPs) are established by the network operator for a variety of purposes, such as to create
53

network-based IP Virtual Private Networks or to route traffic along specified paths through the network. In many respects, LSPs are not different from PVCs in ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology. In the specific context of an MPLS-based Virtual Private Network (VPN), LSRs that function as ingress and/or egress routers to the VPN are often called PE (Provider Edge) routers. Devices that function only as transit routers are similarly called P (Provider) routers. See RFC 2547.[5] The job of a P router is significantly easier than that of a PE router, so they can be less complex and may be more dependable because of this. When an unlabeled packet enters the ingress router and needs to be passed on to an MPLS tunnel, the router first determines the forwarding equivalence class (FEC) the packet should be in, and then inserts one or more labels in the packet's newly-created MPLS header. The packet is then passed on to the next hop router for this tunnel. When a labeled packet is received by an MPLS router, the topmost label is examined. Based on the contents of the label a swap, push (impose) or pop (dispose) operation can be performed on the packet's label stack. Routers can have prebuilt lookup tables that tell them which kind of operation to do based on the topmost label of the incoming packet so they can process the packet very quickly. In a swap operation the label is swapped with a new label, and the packet is forwarded along the path associated with the new label. In a push operation a new label is pushed on top of the existing label, effectively "encapsulating" the packet in another layer of MPLS. This allows hierarchical routing of MPLS packets. Notably, this is used byMPLS VPNs. In a pop operation the label is removed from the packet, which may reveal an inner label below. This process is called "decapsulation". If the popped label was the last on the label stack, the packet "leaves" the MPLS tunnel. This is usually done by the egress router, but see Penultimate Hop Popping (PHP) below.
54

During these operations, the contents of the packet below the MPLS Label stack are not examined. Indeed transit routers typically need only to examine the topmost label on the stack. The forwarding of the packet is done based on the contents of the labels, which allows "protocolindependent packet forwarding" that does not need to look at a protocoldependent routing table and avoids the expensive IP longest prefix matchat each hop. At the egress router, when the last label has been popped, only the payload remains. This can be an IP packet, or any of a number of other kinds of payload packet. The egress router must therefore have routing information for the packet's payload, since it must forward it without the help of label lookup tables. An MPLS transit router has no such requirement. In some special cases, the last label can also be popped off at the penultimate hop (the hop before the egress router). This is called Penultimate Hop Popping (PHP). This may be interesting in cases where the egress router has lots of packets leaving MPLS tunnels, and thus spends inordinate amounts of CPU time on this. By using PHP, transit routers connected directly to this egress router effectively offload it, by popping the last label themselves. MPLS can make use of existing ATM network infrastructure, as its labeled flows can be mapped to ATM virtual circuit identifiers, and vice versa.

55

BARRIERS TO GROWTH OF MVAS IN INDIA


The challenges emanate from the fact that this segment of the Indian telecom industry is still in a nascent stage and the rules of the game are still evolving. Further, apart from the operators, there is a large number of small players operating across the value chain. The challenges. posed to the industry that are likely to hinder projected growth are as follows: Authentication standards: Presently, there is no authentication Standards set out for operators and aggregators that apply to the download of content. This needs to be addressed by the Institution of standards by an industry governing body such as the Telecom Regulatory Authority of India (TRAI) to authenticate the flow of information. This will help create trust among different stakeholders across the MVAS value chain. Copyright protection: As stated earlier, the regulatory framework for copyright protection continues to remain weak despite the extension of existing copyright laws to content, with several instances of violations. In the wake of inadequate remedial action on this front, the MVAS segment is likely to be disadvantaged. The industry requires a stringent regulatory framework in place, to encourage the flow of branded content to consumers. This will instill trust and confidence among various stakeholders across the value chain, leading to increased revenues from data services in the long run. Low feature handsets: Despite considerable growth in mobile subscriber base, low feature handsets continue to remain the order driven by basic utility for voice. According to the India Mobile Handset Usage Satisfaction Study 2006, an integrated digital camera, FM Radio, and speaker phone features remain the most likely upgrade drivers. Features such as Tri-band, Bluetooth, Infrared Port, etc., are growing, but are far from developing mass appeal. The lack of widespread adoption of feature-rich mobile handsets is a barrier to the growth of MVAS in India. However, in the recent past, prices of feature-rich handsets have declined sharply owing to increasing competition among manufacturers and technological advances. There will be a move towards advanced feature handsets in the future
56

even if need and lifestyle do not justify it.

Low "General Packet Radio Services" (GPRS) connectivity: GPRS connectivity in India continues to be low given limited handset capability and operator constraints. There is a large population of users who are not familiar with accessing GPRS. Despite its limitation in terms of number of characters (160 characters) and being more cumbersome, SMS continues to be the most popular delivery channel. In comparison, GRPS will provide a rich as well as user-friendly online experience. This can only pick up once the penetration of feature rich handsets grows, and operators provide free GPRS connection. Transparency in revenue sharing arrangements: The current revenue sharing arrangements favor the operators, and are in stark contrast to the business models in established markets such as China, Japan, and Europe. The market is highly unregulated and the absence of an apex body has led operators to pursue obfuscation strategies. The Indian MVAS industry needs to take a close look at best practices in developed markets to design a fair revenue distribution system, whereby creators/owners are adequately rewarded for creating higher quality content. There is a need to create a transparent framework that clearly sets out balanced revenue sharing arrangements, with a fair system of payouts to different stakeholders across the value chain. Excessive focus on entertainment-related VAS: The MVAS market in India continues to be focused on entertainment (movies, music and sports) catering to the needs of the younger consumer segment. Going forward, there is a need to focus on information VAS and transactional VAS (M-commerce), ensuring even growth among all consumer segments.

57

CONCLUSION
"Value Added Services are enhanced services which add value to the basic tele-services and bearer services for which separate license are issued" Value Added Service (VAS) in telecommunication core services, the core or basic services being standard voice calls and fax transmission including bearer services. The value added services are characterized as under: Not a form of core or basic service but adds value in total service offering. Stands alone in terms of profitability and also stimulates incremental demand for core or basic services Can sometimes be provided as stand alone. Do not cannibalize core or basic service. Can be add-on to core or basic service and as such can be sold at premium price. May provide operational synergy with core or basic services. A value added services may demonstrate one or more of these characteristics and not necessarily all of them. In some cases, the value added service becomes so in closely integrated with the basic offering that neither the user nor the provider acknowledge or realize the difference. A classic example is of P2P SMS. Some of the operators do not consider P2P SMS as part of their VAS revenue.

58

You might also like