Block Diagram Of A Communication System Computer Science Essay

Table of contents

The room access to the presents wireless communicating systems was opened by Guglielmo Marconi when he transmitted the three-dot Morse codification for alphabet ‘ S ‘ by the usage of electromagnetic moving ridges over a 3-KM nexus in 1895. This laid the foundation of modern communicating systems runing from broadcast medium, satellite transmittal and wireless finally come oning to presents cell phones. It would n’t be incorrect to state that wireless communicating has so revolutionized our present society

A sudden addition has been observed in the enlargement of wireless systems during the last two decennaries. We have seen great development in Wireless communicating systems from 1G narrowband parallel systems in the 1980s to the 2G narrowband digital systems in the 1990s. Now the bing 3G broadband multimedia systems are being deployed. In the interim, research and advancement in the future-generation wideband multimedia wireless systems is smartly being pursued worldwide.

To link nomadic users to the populace switched web the United States introduced foremost radiotelephone service by the terminal of the fortiess. Improved Mobile Telephone Service was launched by Bell Systems in 1960s due to which tonss of betterments like direct dialing and addition in bandwidth took topographic point. IMTS formed the bases of the first parallel cellular systems. The term cellular was used due to the fact that coverage countries were disconnected cells, they had a low power sender and receiving system.

BLOCK DIAGRAM OF A COMMUNICATION SYSTEM

Figure 1. Block diagram of a general communicating system.

ANALOG vs. DIGITAL COMMUNICATION SYSTEMS

Definition of Digital

A method of hive awaying, processing and conveying information through the usage of distinguishable electronic or optical pulsations that represent the binary figures 0 and 1.

Advantages of Digital

low-cost

dependable

Easy to pull strings

Flexible

Compatible with other digital systems

The information in digital signifier can merely be transmitted without any debasement through a noisy channel

Incorporated webs

Disadvantages of Digital

Sampling Mistake

As compared to analogue, larger bandwidth is required in digital communications for the transmittal of the same information.

Synchronism in the communications system is required to acknowledge the digital signals, but this is non the instance with linear systems.

Definition of Analogue

Analogue is a transmittal criterion that uses electrical urges to emulate the audio wave form of sound. When you use a phone, the fluctuations in your voice are transformed by a mike into similar fluctuations in an electrical signal and carried down the line to the exchange.

Advantages of Analogue

less bandwidth is required

More Accurate

Disadvantages of Analogue

Signal loss and deformation can be seen due to the effects of random noise which is impossible to retrieve

GENERATIONS OF CELLULAR SYSTEMS

The construct of cellular telephone was introduced in AMPS, abruptly for Advanced Mobile Phone Systems. AMPS divided the entire country into little parts called cells and this was from where the construct of cellular telephone started. Cellular Systems had many advantages such as they increased quality, capacity, dependability and handiness of nomadic telephone web. The coevalss of cellular systems are described below.

FIRST GENERATION CELLULAR SYSTEMS

First coevals cellular telephone systems were introduced in 1980 ‘s. They were based on Analog Frequency Modulation technique. Each channel was assigned a exclusive frequence.

First coevals cellular systems offered merely wireless voice services based on parallel engineering. Digital signals were merely used for control information such as dialing a figure etc. These systems were no able to get by with the increasing demands of users besides they had really less capacity and provided hapless voice quality.

Some first coevalss systems are

Advanced Mobile Telephone System, AMPS

NAMPS, AMPS

Entire Access Cellular System ( TACS )

Nordic Mobile Telephone System ( NMT-900 )

Second GENERATION CELLULAR SYSTEMS

Second Generation Cellular Systems provided larger capacity and provided much better services to users compared to first coevals systems. They were based upon Digital Modulation technique which led to great sweetening in web ‘s capacity.

Second Generation Systems used multiple entree techniques such as TDMA and FDMA.

The biggest draw back of Second Generation Systems was that its different systems were non compatible with each other. Therefore rolling between different systems was non possible.

Some of Second Generation Systems are

North American Digital Cellular, NADC

Global System for Mobile Communication, GSM

Pacific Digital Cellular, PDC

CDMAONE, IS-95 CDMA

In order to get the better of Second Generation compatibility job with increased information rates of modern cyberspace applications, 2.5 Coevals criterions were developed. The best thing about them was that they allowed already bing Second Generation systems to be upgraded so that they can be used for higher information rate transmittal.

2.5 Generation brought a new revolution in cellular telephone by back uping services like high velocity cyberspace and location based nomadic services.

Some of 2.5 Generation Mobile Systems are

General Packet Radio Service, GPRS

Enhanced Data Rate for GSM Evolution, EDGE

Third GENERTAION CELLULAR SYSTEMS

Designed to supply high quality and high capacity in informations communicating, Third Generation Systems require sophisticated spreading and transition techniques.

Third Generation Systems are aimed to supply voice quality comparable to set down line telephone and besides to back up high informations rate.

These systems are compatible with circuit switched every bit good as package switched informations services. They are besides compatible with the bing webs and usage wireless spectrum much more expeditiously than earlier.

Some Third Generation Systems are

Wideband CDMA, WCDMA

Universal Mobile Telephone System, UMTS

CDMA 2000

BEYOND 3G

The extremely developed version of the 3G nomadic communicating are the 4G nomadic communicating services. It is estimated that 4G nomadic communicating services will give addition in capacity, informations transmittal with high velocity, broadband, HQ colour picture images for users, in writing life games in 3D, sound services in 5.1 channels. For the system and architecture of 4G nomadic communicating many researches are done. Developments are made in the terminal protocol engineering for high velocity package services, larger capacity, enabling downloading application plans by public package platform engineering, multimode wireless entree platform engineering, and high quality media coding engineering over nomadic webs.

Why 4G?

Servicess like wireless cyberspace and teleconference can be carried by 4G.

Global mobility and service portability.

Wider bandwidths.

Increased spot rates.

Less expensive.

Mobile webs can easy be scaled.

Chapter # 02

Multiplexing is a procedure in which a individual bearer is used to convey several different signals. These several signals are transmitted all together by uniting them and organizing one signal that will efficaciously travel through the bearer bandwidth. When one transmittal is done and the signal reaches the finish point, the incorporate signal re-assembles into its existent signifier and is so received.

Multiplexing is one of the most used techniques today in about every communicating system. Because of the technological progress multiplexing, we have seen major addition in efficiency of a broad scope of telephone services and on-line applications.

Multiplexing has become an effectual technique that assists in everything from video conferences and web conferences up to bulk informations transmittals and even doing a simple Point-to-Point phone call.

FDMA:

FDMA is the most usual technique used for multiple accessing. FDMA stands for frequence division multiple entree. It is clear from its name that in this technique the frequence is divided among the users as the available spectrum is shared among them in the frequence sphere. The message signals are transmitted onto bearers for different users utilizing peculiar RF frequences. Within FDMA structural design the Single Channel Per Carrier ( SPSC ) is the simplest method where each channel is provided with a separate bearer. This scheme finds its kernel in the fact that the channels are assigned on the footing of demand. Within a cell all the channels are available to all users all the clip, and the channels are assigned as soons as a message signal is received or a petition is made.

Guard sets are used to cut down the opportunities of intervention from next channels. These guard sets are present between the sets allocated for assorted channels.

In the execution of the first parallel cellular systems, FDMA is the multiplexing technique that was used.

TDMA:

Time division multiple entree techniques allots different clip intervals to different users for the transmittal of signals and storage of the information is carried out in one frequence channel non like FDMA which uses one frequence per channel.

Users are allowed to utilize the same frequence but the clip slots are divided.

In TDMA techniques the available spectrum is divided into little frequence sets as in FDMA, which are farther sub-divided into assorted clip slots. The user can entree the frequence channel merely for clip slot allotted to him. User can utilize sporadically the peculiar continuance of clip.

In TDMA systems, guard sets are required between both frequence channels and clip slots.

SDMA:

SDMA stands for Space-Division Multiple Access. It is a MIMO ( Multiple-Input, Multiple-Output, a multiple aerial conventional architecture ) based radio communicating web architecture. It enables entree to a communicating channel by the procedure of placing the user location and set uping a one-on-one function between the web bandwidth allocation and the acknowledged spacial location that is why it ‘s largely suited for nomadic ad-hoc webs.

For bulk of the well known nomadic communicating architectures such as CDMA, TDMA and FDMA, SDMA architecture can be configured and implemented

CDMA:

CDMA stands for Code division multiple entree. CDMA systems are based on the spread spectrum technique. In which transmittals by all the users are carried out at the same time while operating at the same frequence and utilizing the full spectrum bandwidth.

For the designation and extraction of needed transmittal, each user is allotted with a alone codification which can non fit with any other user. This issue of designation is due to the fact that all the users transmit at the same time. To guarantee this privateness, pseudo-random noise codifications or PN codifications are used.

These codifications are really the extraneous codifications and its advantage is that it reduces the opportunities of transverse correlativity among themselves. By utilizing this PN codification assigned to the specific user, transition of the message signal from an single user is done. Then we have the CDMA frequence channel through which all the modulated signals from different users are transmitted. At the receiving system ‘s terminal, the coveted signal is so recovered by de-spreading the signal with a reproduction of the PN codification for the specific user. The signals whose PN codifications are non matched with the coveted signal and are assigned to different users are non de-spread and as a consequence are regarded as noise by the receiving system.

CDMA differs from both TDMA and FDMA in a manner that it allows users to convey the signal at the same clip and operate at the same nominal frequence so it requires less synchronization whereas in TDMA and FDMA frequence and clip direction is really critical so more dynamic synchronism is required. One more advantage of CDMA is that complete system ‘s spectrum is used by signals and hence no guard sets are required to protect against next channel intervention.

Intro to Spread Spectrum Communications

Following are the major elements that can clearly depict the Spread Spectrum communications:

By spread spectrum, bandwidth far in surplus is available than that is necessary to direct the information. Due to this characteristic the transmittal can be protected against intervention and jamming at the same clip supplying multiple entree capableness.

An independent codification known as the Pseudo random codification is used for signal spreading across the bandwidth. The distinguishable nature of this codification separates dispersed spectrum communications from typical transition techniques in which transition ever spread ‘s the spectrum slightly.

For the recovery of the original signal the receiving system is synchronized to the deterministic imposter random codification. Users can convey the signal at the same clip and operate at the same nominal frequence by utilizing independent codification and synchronal response.

In order to protect the signal from intervention a pseudo-random codification is used. It appears to be random to anyone who does non hold its pre-defined cognition but in world is deterministic, it is because of this fact that receiving system is able to retrace the codification needed for the recovery of the needed informations signal. This codification used for synchronal sensing is besides called Pseudo noise sequence.

Types of Spread Spectrum Communications

Spreading of bandwidth of the signal can be achieved by three ways:

Frequency skiping

The signal is shuffled between different Centre frequences within the full bandwidth available to the hopper pseudo-randomly, and the receiving system used already knows where to look for the signal at a given clip.

Time skiping

The signal is transmitted in short explosions pseudo-randomly, and the receiving system knows when a explosion is expected.

Direct sequence

Very high frequence is used to code the digital information. The codification is pseudo-randomly generated. The same codification is generated at the receiver terminal, and in order to pull out the original information this codification is multiplied to the received information watercourse.

Beginning Cryptography AND DIGITAL MODULATION

3.0 Introduction

Digital Modulation is performed in order to stand for digital informations in a format that is compatible with our communicating channel.

Why Digital Modulation? Digital transition strategies have greater capacity to convey big sums of information than parallel transition strategies.

3.1 DIGITAL DATA, DIGIITAL SIGNAL

Digital signal is binary informations encoded into signal elements. Different encoding strategies for encoding digital informations into digital signal are:

3.1.1 Non Return to Zero ( NRZ )

In NRZ there are two different electromotive force degrees for 0 and 1. There is no passage in the center of the spot. The absence of signal denotes 0 and a positive electromotive force degree denotes 1.

The major drawback of NRZ strategy is that it adds a dc constituent to the signal.

3.1.2 Multilevel Binary ( AMI )

In this encoding strategy there are more than two degrees. No signal represents 0 and 1 is represented by some positive and negative

There is no dc constituent in this strategy and besides there is no loss of synchronism for back-to-back 1 ‘s.

3.1.3 Manchester Coding

There is passage in center of each spot, which acts as a clock every bit good as informations. The low to high passage represents 1 and high to low represents 0.

3.1.4 Differential Manchester

In this scheme passage at the center of the spot represents merely timing while passage at start represents 0 and no passage at start represents 1.

3.2 ANALOG DATA, DIGITAL SIGNAL

Analog informations is foremost converted into digital informations by utilizing parallel to digital convertors. These convertors use different techniques to finish their undertaking, some of them are:

3.2.1 Pulse Code Modulation

If a signal is sampled at regular intervals at a rate higher than twice the highest signal frequence, the samples contain all the information of the original signal. Each sample is assigned a digital value. Although its quality is comparable to that of parallel transmittal but still in this procedure some information is lost and the original signal can ne’er be recovered.

Delta Modulation

Analog input is approximated by a stairway map. Function moves up or down at each sample interval by one degree ( vitamin D ) .

Delta transition is easier than PCM in execution, but it exhibits worse signal to resound ratio for the same information rate. But it is good for informations compaction.

DIGITAL DATA, ANALOG SIGNAL

Different digital transition techniques are:

Amplitude Shift Keying ( ASK )

A transition technique in which digital information is represented as fluctuations in the amplitude of a bearer moving ridge is called Amplitude-shift keying ( ASK ) . One binary figure is represented by presence of bearer, at changeless amplitude and the other binary figure represented by absence of bearer.

3.3.2 Frequency Shift Keying ( FSK )

In frequence displacement identifying different frequences are used to stand for incoming digital information. Say in instance of Binary Frequency Shift Keying f1 is used to stand for 0 while f2 is used to stand for 1.

In MFSK more than two frequences are used and therefore bandwidth is more expeditiously utilised.

3.3.3 Phase Shift Keying ( PSK )

A digital transition technique in which information is transmitted by modulating and altering the stage of the mention signal is called Phase-shift keying ( PSK ) . In instance of PSK, a finite figure of stages are used. A alone form of binary spots is assigned to each of these stages. By and large, each stage encodes an equal figure of spots. The symbol is formed by each form of spots that is represented by the peculiar stage.

The bandwidth of ASK and PSK are specified as:

Whereas the bandwidth of FSK is given as:

Where,

Roentgen is the spot rate

DF = f2 – fc = fc – f1

Chapter # 04

CHANNEL Cryptography

4.0 Introduction

Why Channel Cryptography? In modern digital communicating systems information is represented in spot watercourses, which are so modulated to analog wave forms before being transmitted onto a channel. At receiving system this parallel information is demodulated into spot streams, but because of the presence of intervention and noise in the communicating channel this spot watercourse may be corrupted. So to minimise happening of spots in mistake and protect digital information from channel noise and intervention channel cryptography is used.

How Channel Coding is performed? Additional redundant spots are added to the message informations watercourse to execute channel cryptography, these excess spots assist in mistake sensing and rectification at the receiving system ‘s terminal.

Channel Coding at the cost of? Channel Coding is performed at the cost of bandwidth enlargement and information rate decrease.

4.1 TYPES OF CHANNEL CODING TECHNIQUES

There are two chief types of channel coding techniques,

Block Codes

Convolutional Codes.

Block Codes accepts thousand figure of information spots and bring forth a block of n figure of encoded spots, and therefore are normally known as ( n.k ) block codifications. Some common illustrations of block codifications are Overacting Codes and Reed Solomon Codes.

Convolutional Coding is frontward error rectification technique that is presently most widely used in modern communicating systems, this peculiar technique is used for real-time mistake rectification. Unlike block codifications which append excess spots at the terminal of original message signal, Convolutional coding organize a new codeword utilizing original informations watercourse. The encoded spots are non entirely dependent on K current input spots but at the same clip on case in point input spots.

4.2 CONVOLUTIONAL CODES

In this undertaking Convolutional Coding is implemented. Convolutional Codes are farther classified as 1. Trellis Coded Modulation ( TCM ) 2.Turbo Codes.

Trellis Coded Modulation ( TCM ) is non recursive, non systematic and does non necessitate an interleaver.

Turbo Codes on the other manus are recursive, systematic, parallel structured and they besides require interleaver.

In Wideband CDMA systems TCM is used for all channels while Turbo Codes may be used for DCH and FACH channels. Turbo Codes are sometimes classified as separate subdivision of Channel Codes so from here onwards word Convolutional Code will merely be used for TCM.

Types of Transmission Channels

Convolutional Cryptography

1/2

BCH

PCH

DCH, FACH

1/2, 1/3

Turbo Coding

1/3

4.3 CONVOLUTIONAL CODE REPRESENTATIONS

4.3.1 Polynomial Representation

No. of input information spots = K

No. of encoded spots = Ns

No. of phases ( Constraint Length ) = K

Code Rate = k/n

Encoded CodeWord = U

The undermentioned illustration shows how Convolutional Codes are represented.

Let g1 ( x ) and g2 ( ten ) be encoder multinomials, where

g1 ( x ) = 1 + x + x2

g2 ( x ) = 1 + x2

Let input message spot stream be 101, hence input message spot stream multinomial will be,

m ( x ) = 1 + x2

The encoded codeword ‘U ‘ will be combination of merchandise of g1 ( x ) with m ( x ) and g2 ( x ) with m ( x ) ,

m ( x ) x g1 ( x ) = 1 + 1.x + 0.x2 + 1.x3 + 1.x4

m ( x ) x g2 ( x ) = 1 + 0.x + 0.x2 + 0.x3 + 1.x4

Therefore the codeword ‘U ‘ , becomes

U = ( 1,1 ) + ( 1,0 ) .x + ( 0,0 ) .x2 + ( 1,0 ) .x3 + ( 1,1 ) .x4

U = 1 1 1 0 0 0 1 0 1 1

4.3.2 State Transition Diagram

Convolutional Coding can be represented utilizing State Transition Diagram. Following are State Transition Diagram and State Transition

Again for the same input spot stream 10100, the codeword U = 11 10 00 10 11. In the input message last two ’00 ‘ spots are tail spots.

4.3.2 Block Diagram Representation

The undermentioned diagram shows block diagram representation of Convolutional Coding with

Code Rate = 1/2

Constraint Length ( No. of Stages ) = 3

The undermentioned illustration illustrates the procedure of Convolutional Coding utilizing block diagram representation for input spot stream 101.

So the concluding codeword becomes, U = 11 10 00 10 11

4.3.2 Trellis Diagram Representation

For input spot stream 101, the following diagram shows how Convolutional Coding is performed utilizing Trellis Diagram

Chapter # 05

PULSE SHAPING TECHNIQUES

3.0 Introduction

Why Pulse Determining? It is done in order to cut down Inter Symbol Interference normally known as ISI.

How Pulse Shaping is performed? In order to accomplish zero-ISI the overall system response must be equal to Nyquist frequence response.

5.1 RAISED COSINE FILTER

Inter Symbol Interference significantly degrades the informations sensor ability to distinguish between a current symbol from diffused energy of next symbol. This leads to the sensing of mistake and increases BER. So in order to provide ISI, a real-time realisation of Nyquist filter is applied in modern communicating systems. Raised cosine filter is one of the realisation of Nyquist filter.

where R = ‘roll-off factor ‘ = 1 ? R ? 0

and T = ‘symbol period ‘ = 1/R

Roll-off factor determines the filter bandwidth and represents a tradeoff between the acuteness of the passage set of the filter and impulse response pealing magnitude of the filter.

A Nyquist filter has following belongingss:

Time response finally goes to zero in a clip period precisely equal to the symbol spacing.

By trying the symbol sequence at a given symbol clip point, present symbol is non affected by the energy distributing from the next symbols.

The impulse response and the frequence response of the RC filter is

Time response of the RC filter goes to zero with a period that precisely equal to the symbol spacing. As the response equals zero at all symbol times except for the coveted one none of the next symbols interfere with each other.

5.2 ROOT RAISED COSINE FILTER

RC filter is divided into a root raised cosine ( RRC ) filter brace, with one at the transmitter terminal, which performs the pulsation defining in order to restrain the modulated signal bandwidth, and the other at the receiver terminal, that performs matched sensing for optimising the SNR of a known signal in AWGN presence.

The Root Raised Cosine filter is so named because its transportation map precisely is the square root of the transportation map of the Raised Cosine filter.

Where R = roll off factor and T is symbol period. The RRC filter bandwidth is equal to the root mean square ( RMS ) amplitude 2R.

The impulse response and the frequence response of the RRC filter is

Both RC and RRC have similar pulsation forms, but the RRC pulsation makes somewhat faster passages, therefore the spectrum of RRC pulsation decays more quickly every bit compared to the RC pulsation. Another of import difference between both pulsations is that the RRC pulsation does non hold zero Inter Symbol Interference. Because of the fact that RRC filter is used at sender and receiver both, the merchandise of these transportation maps is a raised cosine, which will ensue in zero ISI end product.

5.3 ROLL OFF FACTOR

The roll-off factor, R, is a step of the extra bandwidth of the filter, i.e. the bandwidth occupied beyond the Nyquist bandwidth of 1/2T.

Where a?†f is extra bandwidth and Rs is symbol rate.

Chapter # 06

SPREAD SPECTRUM

Spread spectrum is a type of transition where the information is spread across the full frequence spectrum. This procedure of distributing the information across the full spectrum helps signal against noise and intervention. These techniques are largely employed in cell phones and besides with wireless LAN ‘s.

To measure up as a spread spectrum signal, two standards must be met

The familial signal bandwidth must be in surplus of the information bandwidth.

Some map other than the informations being transmitted is used to set up the bandwidth of the attendant transmittal.

Why Spread Spectrum?

Due to its sole and curious belongingss spread spectrum is preferred over other transition strategies. Some of these belongingss are characterized as advantages and disadvantages of a basic spread spectrum system below.

Advantages

• It reduces the effects of multipath intervention and at times removes them wholly.

• Frequency set is shared at the same time with other users.

• Pseudo random codifications guarantee protection of transmittal and privateness.

• As the signal is spread over an full spectrum it has a low power spectral denseness.

Disadvantages

• Due to distributing operation it consumes more bandwidth.

• It is at times hard to implement.

Types of Spread Spectrum Techniques

Most normally used techniques in a spread spectrum systems are

Direct Sequence Spread Spectrum

Frequency Hoping Spread Spectrum

Frequency Hoping Spread Spectrum

A frequence skiping dispersed spectrum hops from one narrow set to another all within a wider set. In general the frequence hopper sender sends informations packages at one bearer frequence and so leaps to another bearer frequence before directing ore packages and continues the same modus operandi throughout the period of transmittal. The form that emerges seems to be random but is in fact periodic and easy traceable by pre configured sender and receiving system. These systems can be vulnerable to resound at a peculiar hop but normally are able to direct packages during the following hop.

Direct Sequence Spread Spectrum

Most widely used technique of spread spectrum is the Direct Sequence Spread Spectrum. A Direct Sequence Transmitter receives the entrance informations watercourse which is to be transmitted and so change over it into a symbol watercourse where the size of a symbol can be one or more spots. Using any of the transition strategies for digital systems such as Quadrature Amplitude Modulation ( QAM ) or Quadrature Phase Shift Keying ( QPSK ) this symbol watercourse is multiplied to a noise like sequence known as imposter random sequence. It is besides know as a bit sequence. As a consequence of this generation the bandwidth of the transmittal is significantly increased.

Figure 3. Direct Sequence Spread Spectrum System

Figure 3. shows the working of a basic Direct Sequence Spread Spectrum system. For lucidity intents, one channel is shown working in one way merely.

Transmission

For each channel a distinguishable and different Pseudo random codification is generated.

In order to distribute the informations the information watercourse is multiplied with the antecedently generated Pseudo random codification.

The signal obtained as a consequence of this generation is so modulated onto a bearer.

This modulated bearer wave form is so amplified before broadcast medium.

Reception

The bearer moving ridge is amplified every bit shortly as it is received by the receiving system.

The signal received is so multiplied with a locally generated bearer which gives the spreaded signal.

Again a Pseudo random codification is generated on the footing of the signal expected.

The procedure of correlativity is carried out on the standard signal and the generated codification which gives the original message signal.

Pseudo-Random Noise

The spread spectrum systems are constructed really similar to other conventional systems. The difference being the add-on of pseudo random generators both at the sender and the receiving system which generate the Pseudo noise sequences required for the functionality of Direct Sequence spread spectrum. These pseudo random noise sequences are used for distributing the signal at the transmitter side and dispreading at the receiver side. A pseudo noise sequence is made up of a figure of symbols which are called french friess. It is imperative that a good codification is selected for its type and length straight affects the system capableness.

A alone codification is generated for each channel. All the transmittals for a peculiar user are so added together. At the receiving system each user generates its ain matching codification in order to retrieve the original signals.

In order to measure up as a imposter random codification and proper functionality a codification must hold the undermentioned belongingss.

The imposter random codification must be deterministic so that the receiving system can bring forth the exact codification as used by the sender

It should be random for any hearer who does non hold the cognition of the codification being used so that it appears as noise to any interferer or eavesdropper.

Two codifications must be indistinguishable and have no or really little relevancy to each other.

The codification should non reiterate shortly there must be a long clip before that happens.

Maximal length sequences

Maximal Length sequences can be generated by the aid of displacement registries with feedback applied on them. These sequences meet all the conditions for distributing sequences really purely. The cross correlativity between this sequence and noise is really low, which helps in observing signal out of noise in the receiving system. These sequences are really utile for encoding as they besides have a really low cross correlativity with each other.

The entropy belongingss of maximum length sequences can be seen here.

Gold Sequence

In order to make two gold sequences, two maximal length sequences are to be combined. They have a really low auto-correlation which enables CDMA systems to convey asynchronously. Gold sequences are constructed by modulo-2 add-on of two maximum length sequences of same length chosen from braces of preferable m-sequences.

Walsh Codes

Walsh codifications have to be created from hadamard matrices. All generated Walsh codifications would be extraneous to each other. The basic hadamard matrix is shown below. These sequences provide low cross-correlation between each other. Second, the figure of 1 ‘s is same as the figure of 1 ‘s in each codeword.

By looking at the matrix above, Walsh codes with different lengths can be generated with the aid of recursion. For a clear apprehension Walsh codes with length equal to 4 are illustrated below.

=

Spreading the Signal

Signal spreading is achieved when the signal is multiplied bitwise with the imposter random sequence. Figure 4. Below gives an penetration into how two spots are multipliied to a pseudo random sequence holding a length of 8 and the its corresponding consequence on the frequence spectrum. Spreading procedure of two spots with the aid of an 8-chip PN sequence is shown on the left side and the consequence of this distributing on the signal ‘s frequence spectrum is shown on the right side of figure. 4

Figure 4. The rule of signal spreading

De-spreading the Signal

De-spreading of the signal is carried out by multiplying each spot of the signal to its correspond imposter random codification and the consequence is summed bitwise. Figure 5. describes the procedure of de-spreading when a imposter random signal of length 8 is used for transmittal and the de-spreaded signal is equal to the dispersed signal. De-spreading procedure of two spots with a PN sequence of 8-bit is shown on left side and the consequence of the de-spreading on the signal ‘s frequence spectrum is shown on the right.

Figure 5. The rule of signal de-spreading

Consequence of Spreading on Bandwidth

Figure 1. As a consequence of distributing operation the signal ‘s frequence is spread over a wider bandwidth

Spread spectrum transition is applied in tandem with some other digitial transition strategies such as QAM or QPSK.

Consequence of Despreading on Bandwidth

Figure 2. The despreading operation recovers the original signal.

A spread spectrum transition is applied in coherency with a conventional demodulation process in order to retrieve the original signal.

Multiple Access Capability

The standard signal s1 is detected by the receiving system summed with the other signal s2. The signal s1 which is for user 1 is merely extracted at the receiving system for user 1 whereas the signal s2 appears to be as noise in comparing to the user 1 signal s1. This is shown in Figure 6. below

For efficient recovery of the informations from user 1 it is must that the signal appearance as noise has adequately low energy in the information bandwidth of signal s1.

Spreaded informations multi-users

De-spreaded informations multi-users

Spreaded informations multi-users

De-spreaded informations multi-usersFigure 6. Multiple Access Capibility when user 1 recovers signal s1

Chapter # 07

DESIGN OF A CDMA BASED COMMUNICATION SYSTEM

7.1 THE Sender

7.1.1 Source Encoding

In order to do incoming message compatible with the communicating system beginning cryptography is used. In this undertaking NRZ encoding strategy is used so that the incoming message signal becomes compatible with the walsh codifications which are besides in NRZ signifier. NRZ encoding provides a better use of the bandwidth, besides if we compare it with AMI strategy it is more efficient because in that receiving system has to separate between three different degrees and it requires more signal power. While the Manchester and differential Manchester strategies have transition rate twice or more than that of NRZ so therefore they require greater bandwidth.

7.1.2 Channel Encoding

Channel encryption is performed so that spot mistakes can be reduced at the receiving system ; besides it protects the information from channel noise and intervention. In this undertaking we have used Convolutional Encoding technique and so hold tried to upgrade our system utilizing Low Density Parity Check ( LDPC ) . LDPC improves channel capacity as it approaches to Shannon capacity bound. Both Convolutional encoder and LDPC encoder organize a codeword based on the incoming message signal. We have used ? rate encoders that means that we have two input spots and the end product is traveling to be four spots. For Convolutional encoder inbuilt matlab treillage construction along with convenc bid has been used while in instance of LDPC fecldpc.enc bid is used to do LDPC object utilizing thin H matrix and so message is encoded utilizing LDPC object by encode bid.

7.1.3 Spreading

The cardinal standard of spreading is transverse correlativity and car correlativity of message symbols. In instance of a CDMA based communicating system as there are many users that at the same time transmit informations so the system must hold good cross correlativity belongingss. This generates the demand of extraneous codifications so Walsh codifications are used. Walsh codifications have good cross correlativity belongingss. In this undertaking direct sequence spread spectrum ( DSSS ) technique has been employed to distribute the signal across the full bandwidth.

7.1.4 Digital Transition

Transition is a technique that facilitates the message signal to be transmitted over the medium. In instance of digital transition, digital signal is modulated utilizing amplitude displacement keying, frequence displacement keying and stage displacement identifying etc. We have implemented Binary PSK, BPSK uses two symbols that have opposite stage to each other to modulate 0 and 1.Sampling frequence of 44 kilohertzs and a information rate of 2 kilohertz has been used in this system. In instance of LDPC modulate bid has been used to modulate the signal.

7.1.5 Pulse Determining

The consequence of inter symbol intervention ( ISI ) is minimized by the aid of pulse determining procedure. In this undertaking Root Raised Cosine Filter has been used at the transmitter side to determine the pulsation so as to restrict the bandwidth of the modulated signal. By utilizing this technique bandwidth is limited but the signal spreads in so there must be a threshold in order to counter this job, this threshold is known as Nyquist bound. It is fundamentally a low base on balls filter with a axial rotation off factor 0.5 which has been used in this undertaking.

7.1.6 Symbol Packing

In symbol wadding, a preparation sequence is appended at the start and terminal of the signal. Besides in add-on to this about 1000 nothings are inserted at the terminal and start of the signal. These are added so that even if the receiving system fails to have initial spots these spots are extra nothings and non the message signal.

7.2 THE CHANNEL

In a communicating system channel could be wired or wireless. Different channels have different features. When of all time we talk about a channel we talk about noise, it is fundamentally the unwanted electrical signal that confines the receiving system ability to take right determinations. Channel noise degrades the end product really rapidly. Small channel does n’t do much difference to the end product signal but big channel noise well degrades the signal. In instance of little channel noise the lone noise that is present in the system is quantization noise. Another of import factor in a communicating system is Inter symbol intervention ( ISI ) . When the channel bandwidth is non much greater than signal bandwidth the spreading of the signal causes ISI.

Normally, the radio channel is modeled with AWGN channel. A thermic noise beginning is used to distribute an equal sum of noise power per unit bandwidth over all frequences that is the ground why a simple theoretical account for thermic noise presumes that its power spectral denseness Gn ( degree Fahrenheit ) is level for all frequences, as is denoted as:

Gn ( degree Fahrenheit ) = N0/2 watts/hertz

7.3 THE Receiver

7.3.1 Synchronism

In this system, it is assumed that the receiving system is on all the clip. Therefore whenever the sender will direct the message signal, there should be some manner through which the receiving system can find where its signal of involvement is. This can be done by correlating the preparation sequence with the standard signal. The portion where the maximal correlativity occurs would be the start of the signal and the 2nd upper limit in the correlativity would give the terminal of the message signal.

7.3.2 Matched Filtering

The standard signal is passed through root raised cosine filter in order to execute matched filtering and down trying at the receiver terminal. Normally RC filter is divided into a root raised cosine ( RRC ) filter brace, with one at the transmitter terminal, which performs the pulsation defining in order to restrain the modulated signal bandwidth, and the other at the receiver terminal, that performs matched sensing for optimising SNR of a known signal in AWGN presence.

7.3.3 Demodulation

The signal is demodulated by multiplying it by the bearer signal. The end product would be demodulated signal, but this demodulated signal would be sum of all the spreaded signals.

7.3.4 Despreading

In order to pull out the single message signal of each user, the spreaded signal is so once more multiplied by the Walsh codification and is so integrated over a symbol clip.

7.3.5 Channel Decoding

If the channel cryptography was non employed by the sender, so the despreaded messages would be the standard signals. In the channel coding instance, the signal will hold to be decoded by utilizing the viterbi decrypting map in matlab.

7.3.6 Source Decoding

While executing beginning cryptography we had used NRZ encoding strategy, so now at the receiving system this encoded message is once more decoded back to its original signifier.

Read more

Lan Switching And Wireless

LAN Switching and Wireless CCNA Exploration Labs and Study Guide LAN Switching and Wireless, CCNA Exploration Companion Guide LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. ISBN-10: 1-58713-207-9 ISBN-13: 978-158713-207-0 Study Guide

The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you ¦ Review vocabulary ¦ Strengthen troubleshooting skills ¦ Boost configuration skills ¦ Reinforce concepts ¦ Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco.

Packet Tracer Activity Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep understanding of CCNA knowledge and skills to ultimately succeed on the CCNA Certification Exam. Packet Tracer Companion—This icon identifies the companion activities that correspond to each hands-on lab.

You use Packet Tracer to complete a simulation of the hands-on lab. Packet Tracer Companion Companion CD-ROM The CD-ROM provides all the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge files that are referenced throughout the book as indicated by the icons. These files work with Packet Tracer v4. 1 software, which is available through the Academy Connection website. Ask your instructor for access to the Packet Tracer software. This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the

Cisco Networking Academy curriculum. ciscopress. com Packet Tracer Skills Integration Challenge—Each chapter concludes with a culminating activity called the Packet Tracer Skills Integration Challenge. These challenging activities require you to pull together several skills learned from the chapter— as well as previous chapters and courses—to successfully complete one comprehensive exercise. Packet Tracer Challenge Allan Johnson works full time developing curriculum for Cisco Networking Academy. Allan also is a part-time instructor at Del Mar College in Corpus Christi, Texas.

LAN Switching and Wireless CCNA Exploration Labs and Study Guide Use this book with: ISBN-13: 978-1-58713-202-5 ISBN-10: 1-58713-202-8 90000 9 781587 132025 Cisco Press L AN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson 00_2028_fm. qxp ii 4/3/08 5:08 PM Page ii LAN Switching and Wireless, CCNA Exploration Labs and Study Guide LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson Copyright© 2008 Cisco Systems, Inc. Publisher Paul Boger Associate Publisher Dave Dusthimer Cisco Representative Anthony Wolfenden Published by: Cisco Press 00 East 96th Street Indianapolis, IN 46240 USA Cisco Press Program Manager Jeff Brady All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Production Manager Patrick Kanouse Printed in the United States of America Senior Project Editor Tonya Simpson First Printing April 2008 Library of Congress Cataloging-in-Publication Data:

Johnson, Allan, 1962LAN switching and wireless : CCNA exploration labs and study guide / Allan Johnson. p. cm. ISBN-13: 978-1-58713-202-5 (pbk. ) ISBN-10: 1-58713-202-8 (pbk. ) 1. Wireless LANs—Examinations—Study guides. 2. Packet switching—Examinations—Study guides. 3. Telecommunications engineers—Certification—Examinations—Study guides. 4. Routing (Computer network management)—Examinations—Study guides. 5. Telecommunication—Switching systems Examinations—Study guides. I. Title. TK5105. 78. J64 2008 004. 6’8—dc22 2008014858 ISBN-13: 978-1-58713-202-5 ISBN-10: 1-58713-202-8 Executive Editor Mary Beth Ray

Development Editor Andrew Cupp Copy Editor Bill McManus Technical Editors Bruce R. Gottwig Khalid Rubayi Tara Skibar Linda C. Watson Editorial Assistant Vanessa Evans Book and Cover Designer Louisa Adair Composition Mark Shirar Proofreader Leslie Joseph 00_2028_fm. qxp 4/3/08 5:08 PM Page xvii xvii Introduction The Cisco Networking Academy is a comprehensive e-learning program that provides students with Internet technology skills. A Networking Academy delivers web-based content, online assessment, student performance tracking, and hands-on labs to prepare students for industry-standard certifications.

The CCNA curriculum includes four courses oriented around the topics on the Cisco Certified Network Associate (CCNA) certification. LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is a supplement to your classroom and laboratory experience with the Cisco Networking Academy. In order to be successful on the exam and achieve your CCNA certification, you should do everything in your power to arm yourself with a variety of tools and training materials to support your learning efforts. This Labs and Study Guide is just such a collection of tools.

Used to its fullest extent, it will help you gain the knowledge and practice the skills associated with the content area of the CCNA Exploration LAN Switching and Wireless course. Specifically, this book will help you work on these main areas: ¦ LAN design principles and concepts ¦ Ethernet operation with switches ¦ Basic switch configuration and security ¦ VLAN concepts and configuration ¦ VTP concepts and configuration ¦ STP, RSTP, and rapid PVST+ concepts and configuration ¦ Inter-VLAN routing concepts and configuration ¦ LAN wireless concepts and security issues LAN wireless configuration using Linksys WRT300N routers ¦ Troubleshooting LAN switching and wireless configurations Labs and Study Guides similar to this one are also available for the other three courses: Network Fundamentals, CCNA Exploration Labs and Study Guide, Routing Protocols and Concepts, CCNA Exploration Labs and Study Guide, and Accessing the WAN, CCNA Exploration Labs and Study Guide. Audience for This Book This book’s main audience is anyone taking the CCNA Exploration LAN Switching and Wireless course of the Cisco Networking Academy curriculum.

Many Academies use this book as a required tool in the course, while other Academies recommend the Labs and Study Guides as an additional source of study and practice materials. The secondary audiences for this book include people taking CCNA-related classes from professional training organizations. This book can also be used for college- and university-level networking courses, as well as anyone wanting to gain a detailed understanding of basic switching and wireless technologies. 00_2028_fm. qxp xviii 4/3/08 5:08 PM Page xviii LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Goals and Methods

The most important goal of this book is to help you pass the CCNA exam (640-802). Passing this foundation exam means that you not only have the required knowledge of the technologies covered by the exam, but that you can plan, design, implement, operate, and troubleshoot these technologies. In other words, these exams are rigorously application based. You can view the exam topics any time at http://www. cisco. com/go/certifications. The topics are divided into eight categories: ¦ Describe how a network works ¦ Configure, verify, and troubleshoot a switch with VLANs and inter-switch communications ¦

Implement an IP addressing scheme and IP services to meet network requirements in a medium-sized enterprise branch office network ¦ Configure, verify, and troubleshoot basic router operation and routing on Cisco devices ¦ Explain and select the appropriate administrative tasks required for a WLAN ¦ Identify security threats to a network and describe general methods to mitigate those threats ¦ Implement, verify, and troubleshoot NAT and ACLs in a medium-sized enterprise branch office network ¦ Implement and verify WAN links The LAN Switching and Wireless course focuses on the second, fifth, and sixth bullets.

The Study Guide portion of each chapter offers exercises that help you learn the LAN switching and wireless concepts as well as the configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all of the following types of exercises: ¦ ¦ Skill-building activities and scenarios ¦ Configuration scenarios ¦ Concept questions ¦ Packet Tracer Activity Vocabulary matching and completion Internet research In the configuration chapters, you’ll find many Packet Tracer Activities that work with the Cisco Packet Tracer tool.

Packet Tracer allows you to create networks, visualize how packets flow in the network, and use basic testing tools to determine whether the network would work. When you see this icon, you can use Packet Tracer with the listed file to perform a task suggested in this book. The activity files are available in this book’s CD-ROM; Packet Tracer software, however, is available through the Academy Connection website. Ask your instructor for access to Packet Tracer. The Labs and Activities portion of each chapter includes a Command Reference table, all the online Curriculum Labs, and a Packet Tracer Skills Integration Challenge Activity.

The Curriculum Labs are divided into three categories: ¦ Basic: The Basic Labs are procedural in nature and assume you have no experience configuring the technologies that are the topic of the lab. ¦ Challenge: The Challenge Labs are implementation in nature and assume you have a firm enough grasp on the technologies to “go it alone. ” These labs often only give you a general requirement that you must implement fully without the details of each small step. In other words, you must use the knowledge and skills you gained in the chapter text, activities, and Basic Lab to successfully complete the Challenge Labs.

Avoid the temptation to work through 00_2028_fm. qxp 4/3/08 5:08 PM Page xix xix the Challenge Lab by flipping back through the Basic Lab when you are not sure of a command. Do not try to short-circuit your CCNA training. You need a deep understanding CCNA knowledge and skills to ultimately be successful on the CCNA exam. ¦ Troubleshooting: The Troubleshooting Labs will ask you to fix a broken network. These labs include corrupted scripts you purposefully load onto the routers. Then you use troubleshooting techniques to isolate problems and implement a solution.

By the end of the lab, you should have a functional network with full end-to-end connectivity. Packet Tracer Companion Most of the hands-on labs include Packet Tracer Companion Activities where you can use Packet Tracer to complete a simulation of the lab. Packet Tracer Challenge Each chapter also includes a culminating activity called the Packet Tracer Skills Integration Challenge. These activities require you to pull together several skills learned from the chapter— and from previous chapters and courses—to successfully complete one comprehensive exercise. A Word About Packet Tracer

Packet Tracer is a self-paced, visual, interactive teaching and learning tool developed by Cisco. Lab activities are an important part of networking education. However, lab equipment can be a scarce resource. Packet Tracer provides a visual simulation of equipment and network processes to offset the challenge of limited equipment. Students can spend as much time as they like completing standard lab exercises through Packet Tracer, and have the option to work from home. Although Packet Tracer is not a substitute for real equipment, it allows students to practice using a command-line interface.

This “e-doing” capability is a fundamental component of learning how to configure routers and switches from the command line. Packet Tracer v4. x is available only to Cisco Networking Academies through the Academy Connection website. How This Book Is Organized Because the content of LAN Switching and Wireless, CCNA Exploration Companion Guide and the online curriculum is sequential, you should work through this Labs and Study Guide in order beginning with Chapter 1. The book covers the major topic headings in the same sequence as the online curriculum for the CCNA Exploration LAN Switching and Wireless course.

This book has seven chapters, with the same numbers and names as the online course chapters. If necessary, a chapter uses a single topology for the exercises in the Study Guide portion. The single topology per chapter allows for better continuity and easier understanding of switching commands, operations, and outputs. However, the topology is different from the one used in the online curriculum and the Companion Guide. A different topology affords you the opportunity to practice your knowledge and skills without just simply recording the information you find in the text. ¦

Chapter 1, “LAN Design”: The exercises in the Study Guide portion focus on LAN design concepts, including vocabulary and the three-layer hierarchical model. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. ¦ Chapter 2, “Basic Switch Concepts and Configuration”: The exercises in the Study Guide portion help you understand basic Ethernet and switching concepts, including building the MAC address table and collision and broadcast domains. Then, the Packet Tracer exercises 00_2028_fm. qxp xx 4/3/08 5:08 PM

Page xx LAN Switching and Wireless, CCNA Exploration Labs and Study Guide cover, in detail, how to configure a switch, including basic switch management and configuring switch security. The Labs and Activities portion includes two Basic Labs, a Challenge Lab, and a Packet Tracer Skills Integration Challenge activity. ¦ Chapter 3, “VLANs”: The exercises in the Study Guide portion focus on the concepts of VLANs, including benefits of VLANs and types of VLANs. The exercises then cover VLAN trunking concepts before moving into a section devoted to a VLAN and trunk configuration Packet Tracer exercise.

The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. ¦ Chapter 4, “VTP”: The exercises in the Study Guide portion are devoted to VTP concepts and configuration, including vocabulary, VTP modes, an Internet research exercise, and a VTP Packet Tracer exercise. The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. ¦

Chapter 5, “STP”: The exercises in the Study Guide portion focus on the concept of redundant LAN topologies, using STP and its variants to stop loops, and the commands to manipulate root bridge elections. The Labs and Activities portion of the chapter includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. ¦ Chapter 6, “Inter-VLAN Routing”: This short chapter focuses on how to configure interVLAN routing, including two Packet Tracer exercises.

The Labs and Activities portion includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity. ¦ Chapter 7, “Basic Wireless Concepts and Configuration”: The exercises in the Study Guide portion begin with wireless LAN concepts, including standards, operation, and security. The exercises then cover wireless configuration for LAN access using a Linksys WRT300N, including a Packet Tracer exercise. The Labs and Activities portion of the chapter includes a Basic Lab, a Challenge Lab, a Troubleshooting Lab, and a Packet Tracer Skills Integration Challenge activity.

About the CD-ROM Packet Tracer Activity The CD-ROM included with this book has all the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge files that are referenced throughout the book, indicated by the Packet Tracer Activity, Packet Tracer Companion, and Packet Tracer Challenge icons. Packet Tracer Companion Updates to these files can be obtained from the website for this book at http://www. ciscopress. com/title/1587132028. The files will be updated to cover any subsequent releases of Packet Tracer. Packet Tracer Challenge About the Cisco Press Website for This Book

Cisco Press may provide additional content that can be accessed by registering your individual book at the Ciscopress. com website. Becoming a member and registering is free, and you then gain access to exclusive deals on other resources from Cisco Press. To register this book, go to www. ciscopress. com/bookstore/register. asp and log into your account or create a free account if you do not have one already. Then enter the ISBN located on the back cover of this book. After you register the book, it will appear on your Account page under Registered Products and you can access any online material from there. 6_2028_ch06. qxp 4/3/08 5:10 PM Page 239 CHAPTER 6 Inter-VL AN Routing Now that you have a network with many different VLANs, the next question is, “How do you permit devices on separate VLANs to communicate? ” The exercises in this chapter review the concepts of inter-VLAN routing and how it is used to permit devices on separate VLANs to communicate. The Study Guide portion of this chapter uses a combination of fill-in-the-blank, open-ended question, and Packet Tracer exercises to test your knowledge of inter-VLAN routing concepts and configurations.

The Labs and Activities portion of this chapter includes all the online curriculum labs to ensure that you have mastered the hands-on skills needed to understand inter-VLAN routing concepts and configuration. As you work through this chapter, use Chapter 6 in LAN Switching and Wireless, CCNA Exploration Companion Guide or use the corresponding Chapter 6 in the Exploration LAN Switching and Wireless online curriculum for assistance. 06_2028_ch06. qxp 240 4/3/08 5:10 PM Page 240 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Study Guide Inter-VLAN Routing

The exercise in this section covers what inter-VLAN routing is and some of the different ways to accomplish inter-VLAN routing on a network. Inter-VLAN Routing Concepts Exercise Introducing Inter-VLAN Routing Define inter-VLAN routing: Briefly explain traditional inter-VLAN routing: Briefly explain “router-on-a-stick” inter-VLAN routing: What are subinterfaces? Interfaces and Subinterfaces In Figure 6-1, PC1 and PC3 need connectivity between each other. However, each is on a different VLAN. Assume S1 is already configured for traditional inter-VLAN routing. In Figure 6-1, connect S1 and R1 and label the interfaces.

Then record the commands to configure R1 with traditional interVLAN routing. Use the first available IP addresses in each VLAN for the router interfaces. Figure 6-1 Traditional Inter-VLAN Routing Configuration R1 S1 10. 10. 10. 10 VLAN 10 PC1 VLAN 10: 10. 10. 10. 0/24 VLAN 30: 10. 10. 30. 0/24 PC3 10. 10. 30. 10 VLAN 30 06_2028_ch06. qxp 4/3/08 5:10 PM Page 241 Chapter 6: Inter-VLAN Routing 241 In the following lines, record the commands to configure R1 with traditional inter-VLAN routing: In Figure 6-2, PC1 and PC3 need connectivity between each other. However, each is on a different VLAN.

Assume S1 is already configured for router-on-a-stick inter-VLAN routing. In Figure 6-2, connect S1 and R1 and label the interfaces. Then record the commands to configure R1 with router-on-astick inter-VLAN routing. Use the first available IP addresses in each VLAN for the router interfaces. Figure 6-2 Router-on-a-Stick Inter-VLAN Routing Configuration R1 S1 10. 10. 10. 10 VLAN 10 PC1 VLAN 10: 10. 10. 10. 0/24 VLAN 30: 10. 10. 30. 0/24 PC3 10. 10. 30. 10 VLAN 30 In the following lines, record the commands to configure R1 with router-on-a-stick inter-VLAN routing:

Complete Table 6-1, which compares the characteristics of configuring traditional inter-VLAN routing with router-on-a-stick inter-VLAN routing. Table 6-1 Comparing Traditional and Router-on-a-Stick Inter-VLAN Routing Characteristics Characteristic Traditional Router-on-a-Stick Physical interfaces Bandwidth Switch port configuration continues 06_2028_ch06. qxp 242 4/3/08 5:10 PM Page 242 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Table 6-1 Comparing Traditional and Router-on-a-Stick Inter-VLAN Routing Characteristics continued Characteristic Traditional Router-on-a-Stick Expense

Physical complexity Configuring Inter-VLAN Routing The exercises in this section cover how to configure inter-VLAN routing and review the commands to configure a switch to support inter-VLAN routing. Inter-VLAN Routing Configuration Exercise Figure 6-3 shows two topologies. One topology is using traditional inter-VLAN routing and the other topology is using router-on-a-stick inter-VLAN routing. The addressing for both topologies is shown in Table 6-2. For this exercise, you will not configure a separate management or native VLAN. Figure 6-3 Inter-VLAN Routing Configuration Topology Traditional Inter-VLAN Routing Router-on-a-Stick” Inter-VLAN Routing R1 R2 Fa0/0 Fa0/1 Fa0/0 Fa0/1 Fa0/2 Fa0/1 S1 Fa0/6 PC1 Fa0/6 VLAN 10: 192. 168. 10. 0/24 VLAN 20: 192. 168. 20. 0/24 192. 168. 10. 10 VLAN 10 Table 6-2 S2 Fa0/11 PC2 192. 168. 20. 10 VLAN 20 PC3 Fa0/11 VLAN 30: 192. 168. 30. 0/24 VLAN 40: 192. 168. 40. 0/24 192. 168. 30. 10 VLAN 30 PC4 192. 168. 40. 10 VLAN 40 Addressing Table for Inter-VLAN Routing Configuration Exercise Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 192. 168. 10. 1 255. 255. 255. 0 — Fa0/1 192. 168. 20. 1 255. 255. 255. 0 — PC1 NIC 192. 168. 10. 10 255. 255. 255. 0 192. 168. 10. 1 PC2 NIC 192. 168. 0. 10 255. 255. 255. 0 192. 168. 20. 10 R2 Fa0/0. 30 192. 168. 30. 1 255. 255. 255. 0 — Fa0/0. 40 192. 168. 40. 1 255. 255. 255. 0 — PC3 NIC 192. 168. 30. 10 255. 255. 255. 0 192. 168. 30. 1 PC4 NIC 192. 168. 40. 10 255. 255. 255. 0 192. 168. 40. 1 06_2028_ch06. qxp 4/3/08 5:10 PM Page 243 Chapter 6: Inter-VLAN Routing 243 Enter the commands, including the router prompt, to configure R1 for traditional inter-VLAN routing: Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. Assume the VLANs are already created in the VLAN database. However, VLANs have not yet been assigned to any ports.

Enter the commands, including the router prompt, to configure R2 for router-on-a-stick inter-VLAN routing: Enter the commands, including the switch prompt, to configure S2 to forward VLAN traffic. Assume the VLANs are already created in the VLAN database. However, VLANs have not yet been assigned to any ports. 06_2028_ch06. qxp 244 4/3/08 5:10 PM Page 244 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Packet Tracer Activity Packet Tracer Exercise 6-1: Inter-VLAN Configuration Now you are ready to use Packet Tracer to apply your answers to the “Inter-VLAN Routing Configuration Exercise. Open file LSG03-0601. pka on the CD-ROM that accompanies this book to perform this exercise using Packet Tracer. Note: The following instructions are also contained within the Packet Tracer Exercise. Learning Objectives Upon completion of this Packet Tracer Exercise, you will be able to ¦ Configure traditional inter-VLAN routing ¦ Configure router-on-a-stick inter-VLAN routing ¦ Verify connectivity ¦ Save the Packet Tracer file Scenario In this exercise, you will practice configuring both traditional and router-on-a-stick inter-VLAN routing. The routers and switches have a basic configuration.

The passwords are cisco for user EXEC mode and class for privileged EXEC mode. Use your answers from the “Inter-VLAN Routing Configuration Exercise” to complete the tasks. Task 1: Configure Traditional Inter-VLAN Routing Step 1. Configure R1 for traditional inter-VLAN routing. Step 2. Configure S1 to forward VLAN traffic. Step 3. Your completion percentage should be 53 percent. If not, click Check Results to see which required components are not yet completed. Task 2: Configure Router-on-a-Stick Inter-VLAN Routing Step 1. Configure R2 for router-on-a-stick inter-VLAN routing. Step 2.

Configure S2 to forward VLAN traffic. Step 3. Your completion percentage should be 100 percent. If not, click Check Results to see which required components are not yet completed. Task 3: Verify Connectivity PC1 should be able to ping PC2. PC3 should be able to ping PC4. Alternatively, you can click Check Results and then the Connectivity Tests tab. The status of both connectivity tests should be listed as “Correct. ” Task 4: Save the Packet Tracer File Save your Packet Tracer file as LSG03-0601-end. pka. 06_2028_ch06. qxp 4/3/08 5:10 PM Page 245 Chapter 6: Inter-VLAN Routing 245 Troubleshooting Inter-VLAN Routing

The exercises in this section explore common issues and troubleshooting methods to identify and correct problems in inter-VLAN routing implementations. Common Errors and Troubleshooting Tools Exercise Using the examples shown in the chapter, list at least six common errors in the inter-VLAN routing implementations. Switch Configuration Issues: ¦ ¦ ¦ Router Configuration Issues: ¦ ¦ IP Addressing Issues: ¦ ¦ ¦ What are some useful commands you can use to isolate problems in an inter-VLAN routing network? Switch IOS Commands: ¦ ¦ Router IOS Commands: ¦ ¦ PC Commands: ¦ Packet Tracer Activity

Packet Tracer Exercise 6-2: Troubleshooting Inter-VLAN Routing Now you are ready to use Packet Tracer to apply your knowledge of troubleshooting techniques. Open file LSG03-0602. pka on the CD-ROM that accompanies this book to perform this exercise using Packet Tracer. Note: The following instructions are also contained within the Packet Tracer Exercise. 06_2028_ch06. qxp 246 4/3/08 5:10 PM Page 246 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Learning Objectives Upon completion of this Packet Tracer Exercise, you will be able to ¦ Test connectivity between the PCs and the router Gather data on the problems ¦ Implement solutions and test connectivity Scenario In this exercise, you will practice troubleshooting both traditional and router-on-a-stick inter-VLAN routing. The routers, switches, and PCs are already configured and are using the IP addresses listed in Table 6-2. You cannot access the routers or switches directly. Instead, you must use the available console connections through the PCs. The passwords are cisco for user EXEC mode and class for privileged EXEC mode. Use connectivity tests and show commands to discover problems and troubleshoot the networks.

The exercise is complete when you achieve 100 percent and the two PCs on each network can ping each other. Task 1: Configure Traditional Inter-VLAN Routing The following tests should be successful at the conclusion of this activity: ¦ PC1 can ping R1. ¦ PC2 can ping R1. ¦ PC1 can ping PC2. ¦ PC3 can ping R2. ¦ PC4 can ping R2. ¦ PC3 can ping PC4. Each of these tests should fail on the first attempt. Task 2: Gather Data on the Problems Step 1. Verify the configuration on the PCs. Are the following configurations for each PC correct? ¦ ¦ Subnet mask ¦ Step 2. IP address Default gateway

Verify the configuration on the switches. Are the configurations on the switches correct? Be sure to verify the following: ¦ Ports assigned to the correct VLANs ¦ Ports configured for the correct mode ¦ Ports connected to the correct device 06_2028_ch06. qxp 4/3/08 5:10 PM Page 247 Chapter 6: Inter-VLAN Routing Step 3. 247 Verify the configuration on the routers. Are the configurations on the routers correct? Be sure to verify the following: ¦ ¦ Interface status ¦ Step 4. IP addresses Encapsulation and VLAN assignment Document the problems and suggest solutions. What are the reasons connectivity failed between the PCs?

What are the solutions? There could be more than one problem and more than one solution. All solutions must conform to the topology diagram in Figure 6-3 and the addressing in Table 6-2. List the problems, if any, and the solutions for the PCs: List the problems, if any, and the solutions for the switches: List the problems, if any, and the solutions for routers: Task 3: Implement the Solution and Test Connectivity Step 1. Make changes according to the suggested solutions in Task 2. Note: If you make changes to the switch configuration, you should make the changes in Realtime mode rather than Simulation mode.

This is necessary so that the switch port will proceed to the forwarding state. Step 2. Test connectivity between PCs and R1. If you change any IP configurations, you should create new pings because the prior pings use the old IP address: ¦ PC1 should be able to ping R1. ¦ PC2 should be able to ping R1. 06_2028_ch06. qxp 248 4/3/08 5:10 PM Page 248 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide ¦ PC1 should be able to ping PC2. ¦ PC3 should be able to ping R2. ¦ PC4 should be able to ping R2. ¦ PC3 should be able to ping PC4. If any pings fail, return to Task 2 to continue troubleshooting.

Step 3. Check results. Your completion percentage should be 100 percent. If not, return to Step 1 and continue to implement your suggested solutions. You will not be able to click Check Results and see which required components are not yet completed. However, you can click Check Results and then the Connectivity Tests tab. The status of all six connectivity tests should be listed as “Correct. ” Task 4: Save the Packet Tracer File Save your Packet Tracer file as LSG03-0602-end. pka. 06_2028_ch06. qxp 4/3/08 5:10 PM Page 249 Chapter 6: Inter-VLAN Routing 249 Labs and Activities Command Reference

In Table 6-3, record the command, including the correct prompt, that fits the description. Fill in any blanks with the appropriate missing information. Table 6-3 Commands for Inter-VLAN Routing Configuration Command Description Creates a subinterface numbered 10 on the router for Fa0/0 Specifies IEEE 801. 1Q as the VLAN tagging method for VLAN 10 on this subinterface Lab 6-1: Basic Inter-VLAN Routing (6. 4. 1) Learning Objectives Upon completion of this lab, you will be able to ¦ Cable a network according to the topology diagram in Figure 6-4 ¦ Clear configurations and reload a switch and a router to the default state Perform basic configuration tasks on a switched LAN and router ¦ Configure VLANs and VLAN Trunking Protocol (VTP) on all switches ¦ Demonstrate and explain the impact of Layer 3 boundaries imposed by creating VLANs ¦ Configure a router to support 802. 1Q trunking on a Fast Ethernet interface ¦ Configure a router with subinterfaces corresponding to the configured VLANs ¦ Demonstrate and explain inter-VLAN routing 06_2028_ch06. qxp 250 4/3/08 5:10 PM Page 250 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Figure 6-4 shows the topology diagram for this lab. Figure 6-4 Topology Diagram for Lab 6-1

F0/0 R1 WEB/TFTP Server 172. 17. 50. 254 F0/1 F0/1 F0/2 S3 F0/4 F0/5 F0/1 F0/2 F0/3 S1 F0/3 F0/1 F0/2 F0/3 F0/4 F0/4 S2 F0/11 F0/6 F0/18 PC1 172. 17. 10. 21 VLAN 10 PC2 172. 17. 20. 22 VLAN 20 PC3 172. 17. 30. 23 VLAN 30 Table 6-4 shows the addressing scheme used in this lab. Table 6-4 Addressing Table for Lab 6-1 Device Interface IP Address Subnet Mask Default Gateway R1 Fa0/0 172. 17. 50. 1 255. 255. 255. 0 — Fa0/1. 1 172. 17. 1. 1 255. 255. 255. 0 — Fa0/1. 10 172. 17. 10. 1 255. 255. 255. 0 — Fa0/1. 20 172. 17. 20. 1 255. 255. 255. 0 — Fa0/1. 30 172. 17. 30. 1 255. 255. 255. 0 — Fa0/1. 99 172. 17. 9. 1 255. 255. 255. 0 — S1 VLAN 99 172. 17. 99. 11 255. 255. 255. 0 172. 17. 99. 1 S2 VLAN 99 172. 17. 99. 12 255. 255. 255. 0 172. 17. 99. 1 S3 VLAN 99 172. 17. 99. 13 255. 255. 255. 0 172. 17. 99. 1 PC1 NIC 172. 17. 10. 21 255. 255. 255. 0 172. 17. 10. 1 PC2 NIC 172. 17. 20. 22 255. 255. 255. 0 172. 17. 20. 1 PC3 NIC 172. 17. 30. 23 255. 255. 255. 0 172. 17. 30. 1 Web server NIC 172. 17. 50. 254 255. 255. 255. 0 172. 17. 50. 1 06_2028_ch06. qxp 4/3/08 5:10 PM Page 251 Chapter 6: Inter-VLAN Routing 251 Table 6-5 shows the port assignments used in this lab. Table 6-5 Port Assignments for S2 Ports

Assignment Network Fa0/1–0/4 802. 1Q Trunks (Native VLAN 99) 172. 17. 99. 0 /24 Fa0/5–0/10 VLAN 30—Guest (Default) 172. 17. 30. 0 /24 Fa0/11–0/17 VLAN 10—Faculty/Staff 172. 17. 10. 0 /24 Fa0/18–0/24 VLAN 20—Students 172. 17. 20. 0 /24 Task 1: Prepare the Network Step 1. Cable a network that is similar to the one shown in Figure 6-4. You can use any current switch in your lab as long as it has the required interfaces shown in Figure 6-4 and supports 802. 1Q encapsulation. The router you choose must support inter-VLAN routing. The output shown in this lab is based on Cisco 2960 switches and an 1841 router.

Other switch or router models may produce different output. Set up console connections to all three switches. Step 2. Clear any existing configurations on the switches. Clear NVRAM, delete the vlan. dat file, and reload the switches. Refer to “Lab 2-1: Basic Switch Configuration (2. 5. 1)” if necessary for the procedure. After the reload is complete, use the show vlan command to confirm that only default VLANs exist and that all ports are assigned to VLAN 1. S1#show vlan VLAN Name Status Ports —— ——————————————— ————- ——————————————1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8

Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15,Fa0/16 Fa0/17, Fa0/18, Fa0/19,Fa0/20 Fa0/21, Fa0/22, Fa0/23,Fa0/24 Gig1/1, Gig1/2 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active 06_2028_ch06. qxp 252 4/3/08 5:10 PM Page 252 LAN Switching and Wireless, CCNA Exploration Labs and Study Guide Step 3. Disable all ports on the switches using the shutdown command. Ensure that the initial switch port states are inactive by disabling all ports. Use the interface range command to simplify this task. Commands for S1 are shown here: S1(config)#interface range fa0/1-24

S1(config-if-range)#shutdown S1(config-if-range)#interface range gi0/1-2 S1(config-if-range)#shutdown Step 4. Reenable the active user ports on S2 in access mode: S2(config)#interface fa0/6 S2(config-if)#switchport mode access S2(config-if)#no shutdown S2(config-if)#interface fa0/11 S2(config-if)#switchport mode access S2(config-if)#no shutdown S2(config-if)#interface fa0/18 S2(config-if)#switchport mode access S2(config-if)#no shutdown Task 2: Perform Basic Switch Configurations Configure the S1, S2, and S3 switches according to the addressing table and the following guidelines: ¦

Configure the switch hostname. ¦ Disable DNS lookup. ¦ Configure an enable secret password of class. ¦ Configure a password of cisco for the console connections. ¦ Configure a password of cisco for vty connections. ¦ Configure the default gateway on each switch. Only the commands for S1 are shown here: Switch;gt;enable Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname S1 S1(config)#enable secret class S1(config)#no ip domain-lookup S1(config)#ip default-gateway 172. 17. 99. 1 S1(config)#line console 0 S1(config-line)#password cisco

S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#end %SYS-5-CONFIG_I: Configured from console by console 06_2028_ch06. qxp 4/3/08 5:10 PM Page 253 Chapter 6: Inter-VLAN Routing 253 S1#copy running-config startup-config Destination filename [startup-config]? Building configuration… [OK] Task 3: Configure Host PCs Configure the Ethernet interfaces of PC1, PC2, PC3, and the remote web/TFTP server with the IP addresses in Table 6-4. Task 4: Configure VTP on the Switches Step 1. Configure VTP.

Read more

Implementation of ATMS at SBI

By deploying Symstream II(tm)- wireless modem for GSM (Global System for Mobile communications) connectivity, banks in India will now be able to deploy ATMs to the most remote sites in India, thereby enabling them to offer banking services to the unbanked rural population. The solution uses voice channel, unlike traditional GPRS (General Packet Radio Service) connectivity using data, making it more reliable and fast. Banks will be able to increase their ATM penetration with reduced overhead costs, faster deployments, better security, improved efficiency and functionality compared to other legacy technology being used.

Customers opting for biometric authentication can visit the nearby kiosk or ATMs or bank, where his fingerprint data would be scanned into a special PC (Personal Computer) with a fingerprint scanner, and the scanned fingerprint is then stored in an encrypted form in a central server. When a customer inserts (or swipes) his card in a biometric-enabled ATM, he is prompted to set his finger in the fingerprint scanner. The transaction along with customer’s biometric information is passed on to the switch. The switch verifies the fingerprint with the server, and if successful, requests the banking application to authorise the transaction. Based on the result, the switch instructs the ATM to complete the transaction.

ATMs in India

Hongkong and Shanghai Banking Corporation installed the first ATM in India in 1987 at Kolkata. Indian Bank was the first public sector bank to install an ATM in India. These were all standalone ATMs. In 1997, the Indian Banks Association promoted a network of ATMs in Mumbai called ‘SWADHAN’ providing facility of cash withdrawal at ATMs of any of the member banks. This network provided only offline services and consequently, did not become popular. On the other hand, the services provided by the networked ATMs of foreign banks were immensely popular amongst their customers.

The advent of new generation private sector banks in India gave a fillip to the creation of ATM networks as these banks relied more on ATMs as the delivery channel instead of branch banking, which was the forte of the traditional Indian Banks – both in the public sector and the private sector. In response to the aggressive use of technology by the new generation banks and to meet the expectations of customers, the traditional Indian banks also resorted to the creation of technology driven delivery channels, including the ATM channel.

ATMs in State Bank

The first ATM of State Bank of India – a standalone ATM was installed in the year 1993, at Jamshedpur. The installation of ATMs in State Bank was at a slow pace up to the year 2000 due to the restrictions placed on the number of ATMs as per the agreements with the Unions.

Read more

Sop for Informationsecurity

STATEMENT OF PURPOSE Name: Degree sought: Information Security and Computer Forensics (ISCF) My decision to pursue Post Graduate study in the United Kingdom is underscored by my desire to be a part of the post graduate program at your institution. This university offers the flexibility needed for such a vast rapidly changing field. The facilities and the faculty at the university are par excellent. Information Technology is an industry that has changed our lives.

In a very short period it has changed the way we have looked at the things since centuries. It is one industry that is going to shape our future for centuries to come. So doing a masters degree in Information Security and Computer Forensics (ISCF) is next logical step in my career. My interest in Information Security blossomed during my Graduation where Computer Science was my major subject. Right since the beginning of my undergraduate study Information Systems and Security is a subject that has fascinated me a lot.

The subjects I have studied at my graduation level include Computer Science, Statistics and Mathematics. This laid strong foundation for my course in Computer Science. My undergraduate studies already focus on the Information processing and security and also statistical analysis of data which are extensively used in Information processing. After this I have joined level 1 course of M. I. T (Master of Information Technology) which was a joint program organized by B. M.

Birla Science Centre (India) and University of Udine (Italy). During Level 1 of Masters degree, my interest for Information Security got even more boost with subjects like Advanced Computer Networks, Computer Security and Management Information Systems and I was awestruck by the vastness of Information Security and how far we can use this features to secure our data and also safeguarding our networks. All this gave me a strong desire to do a full fledge masters degree in Information Security and

Computer Networks and the course offered by your university in Information Security and Computer Forensics (ISCF) will be an ideal course for me to become master in the area which I have been fascinated since long years. For the past months I have done a certification in Computer Networks from Zoom Technologies. This short sting has given me invaluable practical experience in various Computer Networks. During this time I have come across several professionals. Most of them working in different areas of communications and information technology.

Interactions with them have made me realize how rewardful it will be doing a masters and later PhD in this area. My discussion with them convinced me that specializing in Information Systems and Security will suit me very well. It has given me the confidence to pursue a Masters degree and also kindled a desire to do research in this area. After proper examining contents of the course in Information Security and Computer Forensics (ISCF) provided by the University I am very much convinced that this course would give me a cutting edge in the area of Information Security and Computer Forensics and a lifetime opportunity of doing a research.

It is strong belief in my family that the UK education system has the best to offer in the whole world. If I can get an opportunity to be a part of that intellectual stimulating environment, I am sure my talents will be put to optimal use. With all the educational background and qualifications I have, I hope University will consider me for pursuing Masters Degree. Yours sincerely,

Read more

The Difference Between Manual and Automatic Typing Machines

Today many people use a computer to do work for their business, home, and school. I am writing a report outlining the differences between using a typewriter and a computer to do work. I will also explain why one machine is better than the other. Hopefully this report will help you discover the advantages your employees will gain from the use of computers.

Computers are machines of the future. People use computers more than the typewriters in the office, at school and at home. One of the main reasons is a computer has more features than a typewriter. A typewriter is very limited in it”s use, for example, you have to use correction fluid every time you make a mistake.

There is the advantage of Manual typewriters being more mobile (since they don’t depend on electricity), but are often bulkier and heavier than electric or electronic typewriters Computers process work faster than typewriters on mass of products. Software such as Microsoft Office 2000 can practically run the office for you. The most common word processing program is Microsoft Word 2000″s Word 2000 program. Word 2000 can bold, underline, copy, paste, and highlight the letters on computers. It can also change fonts and sizes for the letters. Word 2000 has all these special features for the computer, which typewriters don”t have.

Computers can save the word processing on hard disk or floppy disk, which means it can be accessed and edited over, and over again, and printed out when needed. Typewriters can”t save or change once typing done.

There are some special features of Word 2000 such as the ability of inserting clipart and WordArt. Clipart is a feature that provides arts, pictures, video, and sound. WordArt is also a feature provide styles and colours for words. Computers can make word processing outcome ten times better than typewriter. Typewriters only had spaces, capital letters and other simple features.

Computer Word Processors are very convenient for writing. You can correct mistakes, check your spelling, format your paper, and often do other fancy things quite easily. However, you are tied to a power supply, and you will usually need some unusual sort of adapter in another country. Ribbons for many word processor machines are unique to the company that makes them, and are often hard to find outside of large cities in post-industrial countries.

Laptop computers are the ultimate in convenience. You can do almost anything with a modern word-processing/design application that you could in the best of print shops. However, you are again tied to an electrical outlet (limiting your choice of location and project) and most portable computers do not have their own printer. It is not too difficult to put your material on a floppy disk and print it out at the Center with a computer printer compatible with your computer.

Be aware of typing and writing health. Use posture that won’t break your back in ten years. Hold your wrists right so you don’t get carpal tunnel syndrome (especially for electronic keyboards). Remember to rest your eyes regularly if your have to stare at a computer screen for long periods of time.

As technology continues to expand in offices across the Nation, the role of the secretary has greatly evolved. Office automation and organizational restructuring have led secretaries to assume a wide range of new responsibilities once reserved for managerial and professional staff. Many secretaries now provide training and orientation to new staff, conduct research on the Internet, and learn to operate new office technologies. In the midst of these changes, however, their core responsibilities have remained much the same-performing and coordinating an office”s administrative activities and ensuring that information is disseminated to staff and clients.

Secretaries are responsible for a variety of administrative and clerical duties necessary to run an organization efficiently. They serve as an information clearinghouse for an office, schedule appointments, provide information to callers, organize and maintain paper and electronic files, manage projects, and produce correspondence. They may also prepare correspondence, handle travel arrangements, and contact clients.

Secretaries are aided in these tasks by a variety of office equipment, such as filing systems, photocopiers, and telephone systems. In addition, secretaries increasingly use personal computers to run spreadsheet, word processing, database management, desktop publishing, and graphics programs-tasks previously handled by managers and other professionals. At the same time, these other workers have assumed many tasks traditionally assigned to secretaries, such as word processing and answering the telephone. Because secretaries are often relieved from dictation and typing, they can support several members of the professional staff. In a number of organizations, secretaries work in teams in order to work flexibly and share their expertise.

Read more

Digital Comm Tutorial

The process of quantisation introduces an error or noise component into the quantised signal. Derive an equation for the mean-squared quantisation error in terms of the quantization interval ‘a’. ii) Hence show that the peak signal-to-quantisation noise ratio (SQNR) is SQNR = ( 6n + 4. 8 ) dB Where 2 n is the number of quantisation levels. b)i) Linear quantisation is used prior to binary PCM encoding of an analogue baseband signal which has a uniform probability density function. The signal-to-quantisation noise ratio must be no less than 35 dB.

How many binary bits are required to code each quansation level? ii) If the bit rate is 104 bits per second, what should be the maximum bandwidth of the analogue signal prior to sampling? Q2. a)i) Explain how nonlinear quantisation can be used to reduce the number of levels required to quantise a signal. ii) Explain why logarithmic quantisation is preferred. iii) What types of signal is most suitable to be processed by non-linear quantisation? b) Sketch the A-law companding curved. Explain why companding is used in voice transmission systems. c) Show that the dynamic range of the logarithmic portion of the A-law compander is 38. dB and that the improvement in signal to quantisation noise ratio realized for small signals, compared with linear quantisation , is 24 dB.

d) For an 8-bit A-law companded PCM system, calculate the SQNR obtainable and the PCM bit rate. Assume the sampling frequency is 8 KHz. Q3. a) Explain (qualitatively) how Differential Pulse Code Modulation (DPCM) can reduce the transmission bandwidth required. b) Explain what is delta modulation. Why it is particularly suited to speech signals? c) For an input sinusoid of frequency 1 kHz, estimate and compare the signal-to-error ratios of a linear PCM coder using a sampling rate of 2. kHz and 7 bits per sample quantisation with a single-integration delta modulator producing the same gross bit rate. BASEBAND REGERATOR / ERROR PROBABILITY / LINE CODE Q4. a) Digital transmission systems provide better received signal quality compare to analogue transmission systems when implementing a long distance communication link. Explain briefly why this is so. b) A PCM transmission link employed 8 bit coding and uses baseband regenerator as repeater. Determine the Signal-to-Noise ratio obtainable at the receiver assuming no bit error occurred. c) An analogue transmission system required amplifiers to be spaced every 2 km apart.

Assume the Signal-to-Noise ratio of the amplifier is 65 dB, determine the maximum distance of the link before the quality of the received signal is lower than the PCM link above. d) A RF binary PSK system operates with phase states separated by 180o. The bit rate is 2. 0 Mbit/s and the noise power spectral density at the input to an ideal matched filter detector is 1. 0 pW/Hz. If the transmission loss between transmitter and detector is 40 dB, what power must be transmitted to achieve a probability of bit error of 1( 10-6 ? For binary PSK , Pe = ? [1- erf(Eb/No)1/2] Error function tables are provided. Q5. ) Draw a simplified block diagram of a PCM regenerative repeater. b) An ideal 18 – section, copper cable, PCM link employs unipolar , NRZ, rectangular pulses on each section and a center point detection process at each repeater. The probability of error versus SNR for this transmission and detection scheme is given by [pic] If all sections were identical, and operated with a section SNR of precisely 18 dB, what would be the overall probability of error for the entire link? Q6.

(a) Sketch the typical, long term, spectrum of a speech waveform. Show on your sketch the bandwidth normally considered sufficient for telephone quality transmission. b) i) If the voice signal in part (a) is to be transmitted using 8-bit PCM and use the bandwidth upper frequency limit shown on your sketch to find the required PCM bit rate. ii) What channel bandwidth, in principle, would be required if the PCM bits were to be transmitted as perfectly rectangular pulses without distortions? iii) What is the minimum theoretical bandwidth which would allow the PCM bits to be transmitted independently (i. e. without inter-symbol interference (ISI) at the receiver sampling instants)? Explain your answer. (c) i) What is the main functions of line codes? i) The bit stream shown in Fig. Q7 is to be line-coded using the high-density substitutiontechnique HDB3. Sketch a version of the resulting coded signal.

What are the features of HDB3 which makes it an attractive line code? [pic] Fig. Q6 TDM / PDH / SDH Q7. a)i) Describe, with the aid of a diagram, the way in which analogue telephone channels plus signalling and service information are combined in a plesiochronous time-division multiplexed system to form the primary multiplex group. ii) What sampling rate would be appropriate for each telephone channel and what would be the gross bit rate of the multiplex group? )i) Show how primary multiplex groups may be combined to form higher level multiplexes and to provide access for wideband signals. ii) Explain why it is necessary in a high order Plesiochronous digital hierarchy (PDH ) to de-multiplex down to the lowest order whenever a single channel is to be extracted or inserted.

c) Calculate the number of telephone channels which can be accommodated at level 4 of a PDH. d) In the PDH, explain why the bit rate at a given level is not exactly an integer multiple of the bit rate at the level below. Q8. a) Explain why bit justification is required in a PDH network, and describe how it may be performed. ) i) Determine the minimum and maximum input channel rates accommodated by an CEPT2 multiplexer. ii) Determine the rate of CEPT1 misframes caused by erroneous interpretation of a stuffed bit. Assume channel bit error rate Pe is 10-6. CEPT2 parameters: Bit rate8. 448 Mbit/s Master frame length848 bits Message length/channel205 bits Framing bits12 bits Stuffing control bits12 bits Stuff bits4 bits c)i) Explain what is frame slip. ii) In a PDH network, the primary multiplex clock generators have frequency stability of 1 part in 107. Calculate the average number of frames slips per hours in a connection of 5 inter-exchange links.

Q9. a) Describe the essential features of the Plesiochronous Digital Hierarchy (PDH). b) Plesiochronous networks have a number of disadvantages by comparisons with the Synchronous Digital Hierarchy. State and explain two of them. c) Draw a block diagram illustrating the SDH. Show on your diagram the nominal STMbit rates associated with each SDH level. d)i) Describe the SDH primary-rate frame structure with particular reference to the location within the frame of the section overheads, the (administrative unit) pointers and the STM-1 payload. ii) What are the main functions of pointer? SIGNALLING

Q10. a)i) Explain the need for signaling in a telecommunication system. ii) List the minimum basic signaling requirements, and show how they may be obtained in the subscriber loop of a typical telephone network. b) Draw a simple block diagram illustrating the essential difference between channel-associated signaling (CAS) and common channel signaling (CCS). c) List the advantages of CCS over CAS. d) Modern digital switching systems using Stored Program Control (SPC) employ CCS. Draw a block diagram showing how CCS may be implemented. e) What is the disadvantage of CCS and how are they overcome? Q11. ) Show how the ITU-T (formerly CCITT ) signaling systems No. 7 conform to theInternational Standard Organisation, Open Systems Interconnection (ISO-OSI ) model. b) What are the three types of signal units employ by the ITU-T SS No. 7? What is the function of each? c)i) How is the channel associated signaling handled by the 30+2 PCM primary multiplex frame? ii) Calculate the bit rate of the signaling channel with one voice channel. TELETRAFFIC THEORY Q12. a) In a switching system for which blocked calls are lost, the average number of calls per hour is 200 with an average holding time of 3 minutes.

Estimate the number of trunks required to achieve a grade of service of 0. 1 %. b) On the average during the busy hour, traffic generated in exchange A and exchange B is shown in table Q13. Assume no tandem traffic, estimate the number of trunk channels (two way connections) required for a grade service of 1 %: i) if the same lines are used for incoming and outgoing calls, ii) if separate lines are used for incoming and outgoing calls. Evaluate the above options and propose a cost effective solution. What is the minimum number of trunk lines required to serve the two exchanges? |Exchange A |Exchange B | |Exchange A |- |36 Erlang | |Exchange B |43 Erlang |- | Table Q13 c) Calculate the number of channels needed in a seven-cell re-use pattern cellular systems to achieve a blocking probability of 1 % if there are 2800 calls per cell per hour, each of average duration of 1. 8 minutes. (use traffic table). Q13.

a) Define traffic intensity and congestion. ) Explain why it is necessary to determine the traffic variations as a function of time for a telephone exchange. c)For a telephone exchange designed based on blocked call lost assumption, the probability of there being k calls in progress with N trunks carrying traffic A Erlang is given by: [pic][pic] i) Explain what is meant by blocked call lost. Give an evaluation the effect of this assumption. ii) Derive an equation for the probability all servers are busy and the subscriber encountered call blocking. State the assumptions made for the above equation to be valid. ) A PBX with 250 internal lines has 10 trunks to the public network. i) What is the probability of call blocking if each internal line is involved in four external calls with an average duration of 2. 5 minutes per call, per eight-hour working day? ii) How many additional trunk connections would be required to improve the grade-of service to better than 0. 5 %? Q14. a) In a queueing system, the average rate of packet transmission is ( frames per second, and the average arrival rate of data is ( packets per second. The probability that therewill be n packets in the queue is

Pn = (1 – ( )( ( ) nwhere ( = ( / ( b) Derive an equation for the average number of packets in the queue and show how this varies with the parameter ( . c) How would you use this equation to design the node in a packet-switched system? d) If the switching node has a transmission capacity of 800 packets per second and the packet arrival rate is 500 packets per second. i) Calculate the average number of packets in the queue and hence ii) Calculate the average waiting time per packet. iii) What is the mean delay introduced by the switching node on a packet? ) A common –channel signalling system uses a 64 kbits/s data link to serve a group of 1500 speech circuits on a route between two exchanges. The busy-hour traffic is 1000 E and the average call duration is two minutes.

On average each call requires transmission of ten messages (five signals plus five responses) and the average message length is 20 octets. Calculate the percentage of messages which encounter delay and the mean delay for these messages. DATA COMMUNICATION NETWORK Q15. a)i) Describe the principle of data communication by packet switching. ii) Evaluate the advantages of this strategy by comparison with circuit switching. )Show how the format of a packet can allow inclusion of routing, error correction, synchronisation and data. c)A packet switch has a single outgoing link at 2. 048 Mbit/s. The average length of each packet is 960 bytes. If the average packet delay through the switch must be less than 20 ms, assuming an M/M/1 queue, determine the i) maximum total packet arrival rate ii) average length of the queue. Q16a) Outline the ISO-OSI data communication network model. b) i) At which layer of the ISO-OSI model does the routing information provided? ii) Name and describe briefly two common routing protocols for the Wide Area Network (WAN).

ii) Compare the relative performance of the protocols. iv) give an example of the connection standard applicable to each. c) Describe the format of a High-level Data Link Control (HDLC) packet and describe how this could be employed to implement call set-up, data transfer and call clearing in a virtual circuit. ISDN / B-ISDN Q17. a) Most national tele-traffic networks have evolved from systems using analogue telephonyand signaling and electromechanical switching. Show, using diagrams, how it has been possible to develop Integrated Digital Networks (IDN) whilst retaining much of the transmission network. ) An IDN is required to provide communication of information in addition to digital telephony signals. Describe the others signals necessary to operate an IDN and show how these can be integrated within a single network. c) Outline the potential benefits of an ISDN. d) Describe the data handling capabilities of Basic Rate Access and Primary Rate Access ISDN services. What are the gross bit rates in each case? Q18. a) Describe the process which takes place in a packet speech transmission system and outline the transmission delay which might be expected. ) In a packet communication network packets arrive at a switch according to a Poisson distribution with a mean arrival rate of 4 packet/s.

The service time is exponentially distributed with a mean value of 100 ms. Assuming that each packet contains 70 bytes and the output transmission rate is 5. 6 kbit/s. How long, on average, does a packet have to wait in the queue? If the switch in part (c) is limited in length to 10 packets, what is the probability of losing packets? c) What extensions to these access processes will be required to handle multi-media terminals and what data transfer method will be most appropriate? ) What are the numerical values of the following: i) ATM cell size. ii) ATM information field size. iii) SDH STM-1 bit rate. iv) PCM voice channel bit rate. e) Use your answer in part (d) to find the expected total network delay (including packetisation delay) experienced by a voice signal transmitted over an ATM network connection operating at the SDH STM-1 bit rate. The connection traverse 8 switching centers, each of which introduces a mean delay equal to 98 ATM cells. The transmission path length is 350 km in total, and the specific delay of the transmission medium is 5 (s/km.

Read more

Report on Banglalion Wimax Ltd.

Prospects of Wimax Industry Development in Savar Area (Banglalion) [pic] September 20, 2011 To, Lecturer, Golam Mohammad Forkan Faculty of Business Administration, Eastern University Subject: Submission of Report on “Prospects of Wimax Industry Development in Savar Area” Sir, With due respect, we want to state that, we are the students of Eastern University, of B. B. A. program. We are supposed to do a report on “Prospects of Wimax Industry Development in Savar Area”

In this report we have discussed about the prospects and possibilities of Wimax industry and Banglalion. Here we mainly discussed customer acceptability of these two. Our Marketing Research course teacher gives us an overall idea about how to write the report, which help us a lot to conclude this report. Without his gracious contributions we may not be able to complete this report successfully. Sincerely yours, ______________ Md, Fazle Rabbi Jico ID#082200068 On Behalf of my group members.

Prospects of Wimax Industry Development in Savar Area (Banglalion) Prepared for: Golam Mohamad Forkan Assistant Professor Faculty of Business Administration Eastern University Prepared by: MD. Fazle Rabbi Jico ID: 082200068 MD Afzal Hossain ID: 082200026 Shakir Mafsur ID: 082200121 Basir Uddin Amit ID: 082200127 Section: 02 Eastern University 20th September, 2011 Table of content |Particulars |Page No. |Letter of transmittal |2 | |Executive Summary | 5-6 | |Introduction | 7-18 | |Background | 19-21 | |Objective of the report | 22 | |Methodology |22 | |Scope and Limitation of the report |22 | |Company Overview | 23-25 | |Results And Discussions | 26-29 | |Findings | 30 | |Recommendation and Conclusion | 31 |Reference | | |Appendix | 32-43 | |Bibliography | | Executive Summary Success of business depends on several factors and wise decisions; so far Banglalion wimax a wireless internet connectivity provider has been conducting its business quite successfully having great response in Bangladesh. As a company it has got enough fund and sponsors to invest more to capture market share of internet user.

According to demand it has given its response towards it gradually and knowing the demand doing continuous research and promotion. Internet service providers association Bangladesh, Sirius broadband, Access telecom ltd, Bangladesh online ltd, Bijoy ISP in Bangladesh, Agni system ltd, Dhakacom ltd, Neksus, Isn, are broadband service providers. Broadband connection provides mainly post paid service and due to weather hazard it get disconnected and during rainy season its quality go down for all the subscribers, and as its not portable. Emergence of modem got very high acceptance and Banglalion wimax filled the space very smartly being sincere about its investment, very high demand is existing in some small city and other regions all over the country.

This research will verify how worthy would be the investment of network expansion in Savar. A company should never take decision in ambiguity, Savar, one of the important upazila contains potential market though it could be said by assumption, because first company should know are they ready to accept the service. Earlier some areas have showed potential market but didn’t give positive response because of competitors, local broadband providers was in a strong position. Before investing it should be found that how the competitors are operating, is the market ready to switch? if they, then how long will it take? do education and demographic information seem positive or ot ,occupation and computer users number and all other information and their willingness to accept the service is subject to verify. Savar seem to be a potential field as its demography and environment is positive. Some information’s about Savar – The main occupations are Agriculture 24. 34%, agricultural labourer 12. 84%, wage labourer 4. 44%, cattle breeding, forestry and fishing 1. 90%, industry 1. 37%, commerce 17. 35%, service 20. 68%, construction 1. 66%, transport 3. 96% and others 11. 46%. There are many other important institutions in Savar. The 9th Division Army Cantonment is located here. There is a Military Firm and Govt Dairy Firm beside Jahangirnagar University.

BPATC training center (Public Administration Training Centre), the only training centre for the public service commissioned officers in Bangladesh, is situated in Savar. Radio Bangladesh (Bangladesh Betar) employers Residence and The Transmission Zone with huge Transmission Setup. (HPT-1; high power transmission, HPT-2 etc. ). Two Largest entertainment theme parks of Bangladesh namely “Fantasy Kingdom” and “Nondon Park” are also located here. Fantasy is situated in Jamgora Bazar and Nondon Park is situated in Jirani. BKSP, Bangladesh Krira Shiksha Pratisthan, the only national sports institute of Bangladesh is also situated in Jirani Bazar, Savar. Dhaka Export processing Zone, DEPZ is also situated in this upazila.

There are 2 universities, 5 colleges, 5 school and colleges, 38 high schools, 3 junior high schools, 16 madrasas, 88 government primary schools, 13 non-government primary schools, 12 community schools, 8 satellite schools, and 1 sports institution. Some of the noteworthy institutions are Adhar Chandra High School (established in 1913), Jahangirnagar University (along with its School and College), Gana Bishwabiddalay, Bangladesh Public Administration Training Centre, Bangladesh Krira Shikha Institution, Atomic Energy Research Establishment, Satellite Ground Receiving Station (Talibabad), National Institute of Biotechnology, Bangladesh Livestock Research Institute, Savar Youth Training Centre, Brac Training Centre.

All the macro environmental factors satisfy that there is a positive environment in savar and these institutions and industries can give thousands of users, now it is needed to find out that demand among possible market is high or low, their willingness to purchase and brand loyalty of them, how much they are influenced by promotional activities of Banglalion so far, competitors position by conducting research thus the research is must to get to know that. The study proved that Banglalion and wimax industry has potentials in Savar and network expansion should be taken into account to grab the large market. Introduction WiMAX refers to interoperable implementations of the IEEE 802. 16 family of wireless-networks standards ratified by the WiMAX Forum. Similarly, Wi-Fi, refers to interoperable implementations of the IEEE 802. 11 Wireless LAN standards certified by the Wi-Fi Alliance.

WiMAX Forum certification allows vendors to sell fixed or mobile products as WiMAX certified, thus ensuring a level of interoperability with other certified products, as long as they fit the same profile. The original IEEE 802. 16 standard (now called “Fixed WiMAX”) was published in 2001. WiMAX adopted some of its technology from WiBro, a service marketed in Korea. [4] Mobile WiMAX (originally based on 802. 16e-2005) is the revision that was deployed in many countries, and basis of future revisions such as 802. 16m-2011. WiMAX is sometimes referred to as “Wi-Fi on steroids”[5] and can be used for a number of applications including broadband connections, cellular backhaul, hotspots, etc. It is similar to Wi-Fi but it can also permit usage at much greater distances. [6] Uses

The bandwidth and range of WiMAX make it suitable for the following potential applications: • Providing portable mobile broadband connectivity across cities and countries through a variety of devices. • Providing a wireless alternative to cable and digital subscriber line (DSL) for “last mile” broadband access. • Providing data, telecommunications (VoIP) and IPTV services (triple play). • Providing a source of Internet connectivity as part of a business continuity plan. Internet access WiMAX can provide at-home or mobile Internet access across whole cities or countries. In many cases this has resulted in competition in markets which typically only had access through an existing incumbent DSL (or similar) operator.

Additionally, given the relatively low costs associated with the deployment of a WiMAX network (in comparison with 3G, HSDPA, xDSL, HFC or FTTx), it is now economically viable to provide last-mile broadband Internet access in remote locations. Backhaul Mobile WiMAX was a replacement candidate for cellular phone technologies such as GSM and CDMA, or can be used as an overlay to increase capacity. Fixed WiMAX is also considered as a wireless backhaul technology for 2G, 3G, and 4G networks in both developed and developing nations. [7][8] In North America, backhaul for urban operations is typically provided via one or more copper wire line connections, whereas remote cellular operations are sometimes backhauled via satellite.

In other regions, urban and rural backhaul is usually provided by microwave links. (The exception to this is where the network is operated by an incumbent with ready access to the copper network. ) WiMAX has more substantial backhaul bandwidth requirements than legacy cellular applications. Consequently the use of wireless microwave backhaul is on the rise in North America and existing microwave backhaul links in all regions are being upgraded. [9] Capacities of between 34 Mbit/s and 1 Gbit/s [10] are routinely being deployed with latencies in the order of 1 M. S. In many cases, operators are aggregating sites using wireless technology and then presenting traffic on to fiber networks where convenient. Triple-play

WiMAX supports the technologies that make triple-play service offerings possible (such as Quality of Service and Multicasting). On May 7, 2008 in the United States, Sprint Nextel, Google, Intel, Comcast, Bright House, and Time Warner announced a pooling of an average of 120 MHz of spectrum and merged with Clear wire to market the service. The new company hopes to benefit from combined services offerings and network resources as a springboard past its competitors. The cable companies will provide media services to other partners while gaining access to the wireless network as a Mobile virtual network operator to provide triple-play services. Some analysts questioned how the deal will work out: Although fixed-mobile onvergence has been a recognized factor in the industry, prior attempts to form partnerships among wireless and cable companies have generally failed to lead to significant benefits to the participants. Other analysts point out that as wireless progresses to higher bandwidth; it inevitably competes more directly with cable and DSL, inspiring competitors into collaboration. Also, as wireless broadband networks grow denser and usage habits shift, the need for increased backhaul and media service will accelerate, therefore the opportunity to leverage cable assets is expected to increase. Deployment • WiMAX access was used to assist with communications in Aceh, Indonesia, after the tsunami in December 2004.

All communication infrastructures in the area, other than amateur radio, was destroyed, making the survivors unable to communicate with people outside the disaster area and vice versa. WiMAX provided broadband access that helped regenerate communication to and from Aceh. • WiMAX hardware was donated by Intel Corporation to assist the Federal Communications Commission (FCC) and FEMA in their communications efforts in the areas affected by Hurricane Katrina. [11] In practice, volunteers used mainly self-healing mesh, Voice over Internet Protocol (VoIP), and a satellite uplink combined with Wi-Fi on the local link. Connecting [pic] A WiMAX USB modem for mobile internet

Devices that provide connectivity to a WiMAX network are known as the “subscriber unit” (SU). Portable units include handsets (similar to cellular smart phones); PC peripherals (PC Cards or USB dongles); and embedded devices in laptops, which are now available for Wi-Fi services. In addition, there is much emphasis by operators on consumer electronics devices such as Gaming consoles, MP3 players and similar devices. WiMAX is more similar to Wi-Fi than to other 3G cellular technologies. The WiMAX Forum website provides a list of certified devices. However, this is not a complete list of devices available as certified modules are embedded into laptops, MIDs (Mobile Internet devices), and other private labeled devices. Gateways

WiMAX gateway devices are available as both indoor and outdoor versions from several manufacturers. Many of the WiMAX gateways that are offered by manufactures such as Alvarion, Airp, ZyXEL, Huawei, Motorola, and Green Packet are stand-alone self-install indoor units. Such devices typically sit near the customer’s window with the best signal, and provide: • An integrated Wi-Fi access point to provide the WiMAX Internet connectivity to multiple devices throughout the home or business. • Ethernet ports to connect directly to a computer or DVR instead. • One or two analog telephone jacks to connect a land-line phone and take advantage of VoIP.

Indoor gateways are convenient, but radio losses mean that the subscriber may need to be significantly closer to the WiMAX base station than with professionally-installed external units. Outdoor units are roughly the size of a laptop PC, and their installation is comparable to the installation of a residential satellite dish. A higher-gain directional outdoor unit will generally result in greatly increased range and throughput but with the obvious loss of practical mobility of the unit. External modems [pic] External USB modem by Yota marketing in Russia, 2010 USB can provide connectivity to a WiMAX network through what is called a dongle. Generally these devices are connected to a notebook or net book computer.

Dongles typically have omni directional antennae which are of lower-gain compared to other devices; as such these devices are best used in areas of good coverage. Mobile phones HTC announced the first WiMAX enabled mobile phone, the Max 4G, on November 12, 2008. The device was only available to certain markets in Russia on the Yota network. HTC and Sprint Nextel released the second WiMAX enabled mobile phone, the EVO 4G, March 23, 2010 at the CTIA conference in Las Vegas. The device, made available on June 4, 2010, is capable of both EV-DO(3G) and WiMAX(4G) as well as simultaneous data & voice sessions. A number of WiMAX Mobiles are expected to hit the US market in 2011. Technical nformation |[pic] |It has been suggested that this article or section be merged into IEEE 802. 16 . (Discuss Proposed since August 2011. | The IEEE 802. 16 Standard WiMAX is based upon IEEE Std 802. 16e-2005, approved in December 2005. It is a supplement to the IEEE STD 802. 16-2004and so the actual standard is 802. 16-2004 as amended by 802. 16e-2005. Thus, these specifications need to be considered together. IEEE 802. 16e-2005 improves upon IEEE 802. 16-2004 by: • Adding support for mobility (soft and hard handover between base stations). This is seen as one of the most important aspects of 802. 16e-2005, and is the very basis of Mobile WiMAX. Scaling of the Fast Fourier transform (FFT) to the channel bandwidth in order to keep the carrier spacing constant across different channel bandwidths (typically 1. 25 MHz, 5 MHz, 10 MHz or 20 MHz). Constant carrier spacing results in higher spectrum efficiency in wide channels, and a cost reduction in narrow channels. Also known as Scalable OFDMA (SOFDMA). Other bands not multiples of 1. 25 MHz are defined in the standard, but because the allowed FFT subcarrier numbers are only 128, 512, 1024 and 2048, other frequency bands will not have exactly the same carrier spacing, which might not be optimal for implementations. Carrier spacing is 10. 94 kHz. • Advanced antenna diversity schemes, and hybrid automatic repeat-request (HARQ) • Adaptive Antenna Systems (AAS) and MIMO technology Denser sub-channelization, thereby improving indoor penetration • Introducing Turbo Coding and Low-Density Parity Check (LDPC) • Introducing downlink sub-channelization, allowing administrators to trade coverage for capacity or vice versa • Adding an extra Quos class for VoIP applications. SOFDMA (used in 802. 16e-2005) and OFDM256 (802. 16d) are not compatible thus equipment will have to be replaced if an operator is to move to the later standard (e. g. , Fixed WiMAX to Mobile WiMAX). Physical layer The original version of the standard on which WiMAX is based (IEEE 802. 16) specified a physical layer operating in the 10 to 66 GHz range. 802. 16a, updated in 2004 to 802. 16-2004, added specifications for the 2 to 11 GHz range. 802. 16-2004 was updated by 802. 6e-2005 in 2005 and uses scalable orthogonal frequency-division multiple access (SOFDMA) as opposed to the fixed orthogonal frequency-division multiplexing (OFDM) version with 256 sub-carriers (of which 200 are used) in 802. 16d. More advanced versions, including 802. 16e, also bring multiple antenna support through MIMO (See WiMAX MIMO). This brings potential benefits in terms of coverage, self installation, power consumption, frequency re-use and bandwidth efficiency. WiMax is the most energy-efficient pre-4G technique among LTE and HSPA+. MEDIA ACCESS CONTROL, MAC (data link) layer The WiMAX MAC uses a scheduling algorithm for which the subscriber station needs to compete only once for initial entry into the network. After network entry is allowed, the subscriber station is allocated an access slot by the base station.

The time slot can enlarge and contract, but remains assigned to the subscriber station, which means that other subscribers cannot use it. In addition to being stable under overload and over-subscription, the scheduling algorithm can also be more bandwidth efficient. The scheduling algorithm also allows the base station to control Quality of service (Quos) parameters by balancing the time-slot assignments among the application needs of the subscriber station. Deployment As a standard intended to satisfy needs of next-generation data networks (4G), WiMAX is distinguished by its dynamic burst algorithm modulation adaptive to the physical environment the RF signal travels through. Modulation is chosen to be more spectrally efficient (more bits per OFDM/SOFDMA symbol).

That is, when the bursts have a high signal strength and a high carrier to noise plus interference ratio (CINR), they can be more easily decoded using digital signal processing (DSP). In contrast, operating in less favorable environments for RF communication, the system automatically steps down to a more robust mode (burst profile) which means fewer bits per OFDM/SOFDMA symbol; with the advantage that power per bit is higher and therefore simpler accurate signal processing can be performed. Burst profiles are used inverse (algorithmically dynamic) to low signal attenuation; meaning throughput between clients and the base station is determined largely by distance.

Maximum distance is achieved by the use of the most robust burst setting; that is, the profile with the largest MAC frame allocation trade-off requiring more symbols (a larger portion of the MAC frame) to be allocated in transmitting a given amount of data than if the client were closer to the base station. The client’s MAC frame and their individual burst profiles are defined as well as the specific time allocation. However, even if this is done automatically then the practical deployment should avoid high interference and multipath environments. The reason for which is obviously that too much interference causes the network to function poorly and can also misrepresent the capability of the network.

The system is complex to deploy as it is necessary to track not only the signal strength and CINR (as in systems like GSM) but also how the available frequencies will be dynamically assigned (resulting in dynamic changes to the available bandwidth. ) This could lead to cluttered frequencies with slow response times or lost frames. As a result the system has to be initially designed in consensus with the base station product team to accurately project frequency use, interference, and general product functionality. The Asia-Pacific region has surpassed the North American region in terms of 4G broadband wireless subscribers. There were around 1. 7 million pre-WIMAX and WIMAX customers in Asia – 29% of the overall market – compared to 1. 4 million in the USA and Canada. [19] Spectrum allocation

There is no uniform global licensed spectrum for WiMAX, however the WiMAX Forum has published three licensed spectrum profiles: 2. 3 GHz, 2. 5 GHz and 3. 5 GHz, in an effort to drive standardization and decrease cost. In the USA, the biggest segment available is around 2. 5 GHz,[21] and is already assigned, primarily to Sprint Nextel and Clear wire. Elsewhere in the world, the most-likely bands used will be the Forum approved ones, with 2. 3 GHz probably being most important in Asia. Some countries in Asia like India and Indonesia will use a mix of 2. 5 GHz, 3. 3 GHz and other frequencies. Pakistan’s Wateen Telecom uses 3. 5 GHz. Analog TV bands (700 MHz) may become available for WiMAX usage, but await the complete roll out of digital TV, nd there will be other uses suggested for that spectrum. In the USA the FCC auction for this spectrum began in January 2008 and, as a result, the biggest share of the spectrum went to Verizon Wireless and the next biggest to AT. [22] Both of these companies have stated their intention of supporting LTE, a technology which competes directly with WiMAX. EU commissioner Viviane Reding has suggested re-allocation of 500–800 MHz spectrum for wireless communication, including WiMAX. [23] WiMAX profiles define channel size, TDD/FDD and other necessary attributes in order to have inter-operating products. The current fixed profiles are defined for both TDD and FDD profiles.

At this point, all of the mobile profiles are TDD only. The fixed profiles have channel sizes of 3. 5 MHz, 5 MHz, 7 MHz and 10 MHz. The mobile profiles are 5 MHz, 8. 75 MHz and 10 MHz. (Note: the 802. 16 standard allows a far wider variety of channels, but only the above subsets are supported as WiMAX profiles. ) Since October 2007, the Radio communication Sector of the International Telecommunication Union (ITU-R) has decided to include WiMAX technology in the IMT-2000 set of standards. This enables spectrum owners (specifically in the 2. 5-2. 69 GHz band at this stage) to use WiMAX equipment in any country that recognizes the IMT-2000. Spectral efficiency

One of the significant advantages of advanced wireless systems such as WiMAX is spectral efficiency. For example, 802. 16-2004 (fixed) has a spectral efficiency of 3. 7 (bit/s)/Hertz, and other 3. 5–4G wireless systems offer spectral efficiencies that are similar to within a few tenths of a percent. The notable advantage of WiMAX comes from combining SOFDMA with smart antenna technologies. This multiplies the effective spectral efficiency through multiple reuse and smart network deployment topologies. The direct use of frequency domain organization simplifies designs using MIMO-AAS compared to CDMA/WCDMA methods, resulting in more effective systems.

Inherent Limitations WiMAX cannot deliver 70 Mbit/s over 50 kilometers (31 miles). Like all wireless technologies, WiMAX can operate at higher bitrates or over longer distances but not both. Operating at the maximum range of 50 km (31 miles) increases bit error rate and thus results in a much lower bitrate. Conversely, reducing the range (to under 1 km) allows a device to operate at higher bitrates. A city-wide deployment of WiMAX in Perth, Australia demonstrated that customers at the cell-edge with an indoor Customer-premises equipment(CPE) typically obtain speeds of around 1–4 Mbit/s, with users closer to the cell tower obtaining speeds of up to 30 Mbit/s.

Like all wireless systems, available bandwidth is shared between users in a given radio sector, so performance could deteriorate in the case of many active users in a single sector. However, with adequate capacity planning and the use of WiMAX’s Quality of Service, a minimum guaranteed throughput for each subscriber can be put in place. In practice, most users will have a range of 4-8 Mbit/s services and additional radio cards will be added to the base station to increase the number of users that may be served as required. Silicon implementations [pic] Picture of a WiMAX MIMO board A number of specialized companies produced baseband ICs and integrated RFICs for WiMAX Subscriber Stations in the 2. 3, 2. 5 and 3.  GHz band (refer to ‘Spectrum allocation’ above). These companies include but not limited to Beceem, Sequans and PicoChip. Intel Corporation is a leader in promoting WiMAX, but has limited its WiMAX chipset development and instead chosen to invest in these specialized companies producing silicon compatible with the various WiMAX deployments throughout the globe. Comparison Comparisons and confusion between WiMAX and Wi-Fi are frequent because both are related to wireless connectivity and Internet access. • WiMAX is a long range system, covering many kilometres, that uses licensed or unlicensed spectrum to deliver connection to a network, in most cases the Internet. Wi-Fi uses unlicensed spectrum to provide access to a local network. • Wi-Fi is more popular in end user devices. • Wi-Fi runs on the Media Access Control’s CSMA/CA protocol, which is connectionless and contention based, whereas WiMAX runs a connection-oriented MAC. • WiMAX and Wi-Fi have quite different quality of service (Quos) mechanisms: o WiMAX uses a Quos mechanism based on connections between the base station and the user device. Each connection is based on specific scheduling algorithms. o Wi-Fi uses contention access – all subscriber stations that wish to pass data through a wireless access point (AP) are competing for the AP’s attention on a random interrupt basis.

This can cause subscriber stations distant from the AP to be repeatedly interrupted by closer stations, greatly reducing their throughput. • Both 802. 11 (which includes Wi-Fi) and 802. 16 (which includes WiMAX) define Peer-to-Peer (P2P) and ad hoc networks, where an end user communicates to users or servers on another Local Area Network (LAN) using its access point or base station. However, 802. 11 supports also direct ad hoc or peer to peer networking between end user devices without an access point while 802. 16 end user devices must be in range of the base station. Although Wi-Fi and WiMAX are designed for different situations, they are complementary.

WiMAX network operators typically provide a WiMAX Subscriber Unit which connects to the metropolitan WiMAX network and provides Wi-Fi within the home or business for local devices (e. g. , Laptops, Wi-Fi Handsets, smart phones) for connectivity. This enables the user to place the WiMAX Subscriber Unit in the best reception area (such as a window), and still be able to use the WiMAX network from any place within their residence. Background Seven major division is under coverage of Banglalion ut not fully,Savar has been believed as one of the major region . now information and possibilities of svar are subject to look at here before taking any major decision by Banglalion.

Savar has 13 Unions/Wards, 350 Mauzas/Mahallas, and 321 villages. The municipal area (Savar Town) consists of 9 wards and 55 mahallas. The area of the town is 24. 1 km?. It has a population of 124885; male 53. 03%, female 46. 97%; population density per km? of 5182. Savar thana was established in 1912 and was turned into an upazila in 1983. Agriculture and manufacturing are the two major economic sectors in Savar. The main crops grown here are Paddy, Jute, peanut, onion, garlic, chilli and other vegetables. The extinct or nearly extinct crops in the region are Aus paddy, Asha Kumari paddy, sesame, linseed, kali mator, randhuni saj, mitha saj, kaun and mas kalai.

The main fruits cultivated here are Jackfruit, mango, olive, papaya, guava, kamranga, berry and banana. There are 181 combined fisheries, dairies and poultries Dairy, 5 hatcheries, 209 poultries, and 1319 fisheries. Manufacturing facilities include Ceramic industry, beverage industry, press and publication, garments industry, foot ware, jute mills, textile mills, printing and dying factory, transformer industry, automobile industry, biscuit and bread factory, pharmaceutical industry, soap factory, brick field, cold storage, welding, plant nursery, etc. Bangladesh Export Processing Zone is located in this upazila. The Cottage industry includes 8 Weaving, 100 goldsmith and 29 others workshops.

The main exports are Jackfruit, papaya, flower, sapling, dairy products, meat, transformer, fabrics, dye, medicine, readymade garments, electronics and electric goods, shoe, brick, sweetmeat etc. There are 62 km of pucca, 56 km of semi pucca, 562 km of mud road; and 50 km of highway. Transports used here include the traditional (and extinct or nearly extinct) Palanquin, bullock cart and horse carriage as well as modern day vehicles. There are 14 regular Hats and bazars here. Noted bazars are Savar, Nabinagar, Amin Bazar, Balibhadra and Bagbari Bazar. Noted hats include Ashulia, Savar, Shimulia, Kathgara, Sadullapur, Nayar hat (with adjoined bazar), and Vhakurar Hat. Prominent fairs include Darogali Bayati Mela (Nayarhat), Bahattar Prahar mela (Savar), Ghora Pirer Mela (Nalam), Muharram Mela (Katlapur) and Pawsh Mela (Dhamsona).

Several Hindu families played a critical role in the development of the township during the British Raj in the 19th and first half of the 20th century. After partition of India in 1947, the Hindu influence in the area waned following the departure of many prominent Hindu families. The 1960s saw the establishment of some important institutions, including a dairy farm and a University in the area. Concurrently, communist politics was on the rise in the area. However, this was replaced with Bengali nationalist zeal, when the Awami League won the 1970 election in this constituency. In 1975, Savar came to the spotlight when the Maoist leader Shiraj Shikdar was secretly tortured and executed at Savar cantonment.

Savar was politically important to the military dictators of the mid-1970s and ’80s, as the cantonment armory here was the closest one outside the capital. From the 1990s to mid-2000s, the Bangladesh Nationalist Party candidate has been routinely elected to parliament from this constituency. However, Awami League and other parties; Communist Party of Bangladesh, Bangladesher Samajtantrik Dal, Worker’s Party(Menon), National Awami Party, Sammobady Dal (including several Islamist ones) continue to have grassroots presence. The general election at the end of 2008 saw an Awami League candidate elected to parliament from this constituency. Jahangirnagar University and a few colleges in the area serve as a hotbed of active student politics and strife.

Foreign dignitaries customarily visit Savar as a part of their trip to Bangladesh to pay respect to the martyrs of 1971 a Savar is the home of Jahangirnagar University, a Public University of Bangladesh and only University for full student residence facilities which is famous for its scenic beauty and as a prime destination for the Siberian migratory birds during winter. There are many other important institutions in Savar. The 9th Division Army Cantonment is located here. There is a Military Firm and Govt Dairy Firm Beside Jahangirnagar University. BPATC training center (Public Administration Training Centre), the only training centre for the public service commissioned officers in Bangladesh, is situated in Savar. Radio Bangladesh (Bangladesh Betar) employers Residence and The Transmission Zone with huge Transmission Setup. HPT-1; high power transmission, HPT-2 etc. ). Two Largest entertainment theme parks of Bangladesh namely “Fantasy Kingdom” and “Nondon Park” are also located here. Fantasy Kingdom is situated in Jamgora Bazar and Nondon Park is situated in Jirani. BKSP, Bangladesh Krira Shiksha Pratisthan, the only national sports institute of Bangladesh is also situated in Jirani Bazar, Savar. Dhaka Export processing Zone, DEPZ is also situated in this upazila. There are 318 Mosques, 8 churches and 68 other religious institutions, most noted of which are Jahangirnagar University and Savar Dairy Farm Mosques, Savar Baptist Church, Savar Daskinpara Harir Akhra Temple and Panchabati Ashram Temple.

There are 2 universities, 5 colleges, 5 school and colleges, 38 high schools, 3 junior high schools, 16 madrasas, 88 government primary schools, 13 non-government primary schools, 12 community schools, 8 satellite schools, and 1 sports institution. Some of the noteworthy institutions are Adhar Chandra High School (established in 1913), Jahangirnagar University (along with its School and College), Gana Bishwabiddalay, Bangladesh Public Administration Training Centre, Bangladesh Krira Shikha Institution, Atomic Energy Research Establishment, Satellite Ground Receiving Station (Talibabad), National Institute of Biotechnology, Bangladesh Livestock Research Institute, Savar Youth Training Centre, Brac Training Centre. The locally published newspapers and periodicals are Jagrata Kantha, Savar Barta, Saf Katha, Savar Kantha and Ganabhasa.

The officially registered cultural and social organizations here include 81 Co-operative societies, 1 children’s organization, 3 film societies, 5 cinema halls, 5 theatre groups, 1 theatre stage, 3 music centre, 5 orphanages, 1 opera party (an indigenous travelling theater troop), 3 women’s club, 1 chapter of Bangladesh Mohila Parishad, 2 Amnesty organizations, 1 golf club, 2 entertainment parks. There are numerous other unofficial organizations as well. The operationally important NGOs are brac, asa, proshika, grameen bank, Ganasastha Kendra, World Vision, Swanirvor Bangladesh, VERC, Palli Mangal Karmasuchi, CDD, Adesh, Mother Vision Society of Bangladesh (AID FOR EYE DISABLE) etc. The health centers in Savar include 1 Upazila health complex, a combined military hospital (Savar Cantonment), the Korea Bangladesh Friendship Hospital, 7 family planning centers, 2 satellite clinics, and 21 private clinics.

Objectives Broad objective • To find out the prospects of wimax industry and Banglalion in Savar. Specific objective • To know about product related prospects of Wimax and Banglalion • To know about price related prospects of Wimax and Banglalion • To know about Distribution related prospects of Wimax and Banglalion • To know about promotion related prospects of Wimax and Banglalion Scope and limitations We could have conduct vast survey if we had enough members and other supports. If we could have a representative of Banglalion communication would be easier with sample as they could have all their answers Limitations we faced are Time constraint • Insufficient Lab facilities • Restrictions when entering several offices • Lack of cooperativeness by the authority Methodology The data is collected from primary and secondary source. To find out the primary data we have done a survey in savar and also made an informal interview with some local people. We also had to use the Secondary source for company profile. We visited their website and some other websites for relevant information. And to analyze we used SPSS 12 for statistical analysis. Company overview Banglalion Communications Ltd is a private limited company incorporated in Bangladesh on 5 Nov 2008 under the Companies Act, 1994.

The company obtained license from Bangladesh Telecommunication Regulatory Commission (BTRC) to operate Broadband Wireless Access (BWA) services nationwide using WiMAX technology in 18 November 2008. Augere Wireless Broadband Bangladesh Ltd yesterday launched the much-waited wireless broadband service through WiMax in some designated areas in Dhaka. Augere, one of the two WiMax licensees, is the first company in Bangladesh to launch such service under the brand name ‘Banglalion’. Augere is initially offering two packages. Customer will have to pay Tk 3,400 a month for the Banglalion 512 kbps package. The monthly charge for the Qubee 1 Mb has been fixed at Tk 6,200, while the modem price for both the packages is Tk 7,000.

Initially, the service was available for businesses and residential customers in Gulshan, Banani, Baridhara, Mirpur and Uttara. Service will be available across Bangladesh soon. WiMax is a technology that provides wireless transmission of data using a variety of transmission modes from point-to-multipoint links to portable and fully mobile internet access. The technology supports peak download rates of up to 46 Mbps and peak uplink rates of up to 14 Mbps. Jerry Mobbs, chief executive officer of Augere Bangladesh, Russell T Ahmed, chief marketing officer, were present at the launching ceremony. Augere also unveiled a Flagship Store at Gulshan to provide 24-hour customer services.

Three bidders — BanglaLion Communication, BRAC BD Mail Network Ltd and Augere Wireless Broadband Bangladesh Ltd — won the WiMax licences through an auction organised by the Bangladesh Telecommunication Regulatory Commission (BTRC) in September last year. However, BRAC later refused to take the licence. UK-based Augere Holdings owns 60 percent of Augere Wireless Broadband Bangladesh Ltd along with two local companies. Teleport Bangladesh owns 30 percent and Aamra Resources Ltd owns the remaining 10 percent. Banglalion provides broadband internet services to residential and commercial users in Bangladesh using WiMAX technology. We understand, that consumer and businesses in Bangladesh need and want faster, accessible, and affordable broadband internet service and we are working hard to ensure that.

We are a new company with Integrity, Dynamism, Commitment and Innovation who continuously developing our infrastructure starting in Dhaka and some major cities, thus bringing the whole country under coverage. Banglalion currently covers 8 divisional cities Dhaka, Narayanganj, Chittagong, Sylhet, Rajshahi, Khulna, Rangpur & Barisal with hopes of covering all the major areas of Dhaka city by the end of 2010, entire Dhaka city by second quarter of 2011, and the entire country by the second quarter of 2013. Banglalion has already made a presence in Chittagong by covering some major areas in the city with about 14 BTS. Meantime, network rollout in other major cities such as: Munshiganj, Gazipur, Mymensingh, Comilla, Noakhali, Laxmipur, Satkhira, Bogra, and Cox’s Bazar are about to begin.

These cities and peripheries are expected to be under the coverage of BanglaLion by the end of 2nd quarter 2012; BanglaLion plans to bring most of the areas of the country under its seamless coverage. As part of the coverage plan, BanglaLion has already installed & commissioned 35 BTSs. With these 35 BTSs, BanglaLion plans to cover the key areas of Dhaka by end of December 2009. By the 1st quarter of 2010, BanglaLion plans to bring the whole Dhaka city and it’s wider periphery under coverage by installing 300 BTSs. Meantime, network rollout in other major cities such as; Chittagong, Sylhet, Khulna, Rajshahi, Barisal are about to begin. These cities and peripheries are xpected to be under the coverage of BanglaLion coverage by the 3rd quarter of 2010 and by the end of 2nd quarter 2011, BanglaLion plans to bring most of the areas of the country under its seamless coverage Right now you can find our partial coverage in the following locations in Dhaka City: Motijheel ,Chankherpul, Nakhal Para, Banani,Uttara,Mohakhali, Shyamoli,Mouchak,Central Road ,Dhanmondi,Gulshan Lalmatia Mohammadpur Badda TikatoliMugda Para/Bashab,Nikunja,Kochukhet,Baridhara (DOHS),Rampura/Banasree Result and Discussion Product related discussion Statistics | |Wimax Industry | |. 031 |4 | Reliability test means how reliable the responses are but here value of alpha should have been around . or more but still it is positive and after deleting two negative value we found that the responses are not that reliable but we can be positive about the responses. Price related statistics Statistics | |Prepaid Charges|Postpaid Charges|Charges of |B. p worth the |Availability | | | | |broadband providers|charges | | |N |Valid |100 |100 |100 |100 | |Median |4. 00 |4. 00 |2. 00 |2. 00 |5. 0 | |Mode |5 |5 |2 |2 |5 | The table indicate that prepaid charges are reasonable and as well as postpaid charges,but charges of broadband providers could not satisfy the subscribers as thir response mostly said they disagree and on avegare they are disagre and median is again disagree. Price related Reliability statistics |Cronbach’s Alpha |N of Items | |. 276 |4 | Here after removing one negative value we can be positive that the answers are reliable although value of alpha is below standard. Distribution related Statistics |Availability |Bill payment |Customer care | |N |Valid |100 |100 |100 | | |Missing |4 |4 |4 | |Mean |4. 48 |4. 21 |3. 70 | |Median |5. 00 |4. 00 |4. 00 | |Mode |5 |4 |3 | Maximum people agreed that they want scratch card of prepaid Banglalion available in mobile and telecommunications shop and they strongly agreed mostly and on average they are agreed or strongly agreed They want to pay bills from local telecommunication shops as rear response was between the ranges of agree and strongly agree.

Along with online customer care service people want customer care centre, but many stayed neutral in this regard perhaps they want the service to get experienced first then they will may think about customer care. Reliability statistics |Cronbach’s Alpha |N of Items | |. 147 |3 | Again we can be positive about the respondents as we got a positive value of cronbachs alpha and it would have been better if it would show . 5 or above but still we will be positive. Promotion related statistics | |word of mouth | |. 111 |4 | Promotion related responses are positive again and though . 5 or above value is still missing but we can be positive about the responses. Findings People of Savar will gladly welcome wimax industry as they have lots of institutes and business and education is rich in number according to census board. • Local broadband providers could not provide good enough service as they do not take prompt action when they get any complaints and that do not give connection during weather hazard and even in case of heavy rainfall • Surprises motivate customers but broadband providers do not provide that and the business is based on dealership so there is no formal strategy is followed • Promotion of banglalion made good impact on them they heard through word of mouth and they and they are pleased with media exposure that indicates no promotional strategy will be needed to follow specially for savar. Social network and online income is the craze among the youth and Banglalion targeted that while promotion their product. • Banglalion gives surprises and free usage and that is not provided by broadband providers and free usage is demanded by the customers that means no other treatment would be needed. • Banglalion distributes scratch cards in local telecommunication shops to make it available again people of Savar want these this way • As all the information’s showed positive responses and all the strategy followed by Banglalion matched there are lots of possibilities in Savar • Demographic information shows positive result too • Failure of broadband providers is creating a chance to grab a huge market. Conclusion and Recommendation

Banglaion has all they need to expand their service and the people of savar and its infrastructure development are favorable too. Banglalion should not change its promotional and distributional strategies as they would need time and fund for that but they should design plans for savar. Savar is such an area where tower for network coverage for wimax service has not been established yet. So Banglalion should be the pioneer is Savar before competitors fill the gap. Banglalion’s marketing strategy has worked well in Savar as they know the brand as a well-known one. Its word of mouth has reached to a large market so it should continue with its service consistently.

Price has been important factor for choosing a brand over competitor as Banglalion provides many packages customer can fine tune their choices and price should not be increased and it should continue its strategy of giving free usage Distribution system and strategy has got positive response and local telecommunication shops have been proved as useful tool. Customer did not emphasize on customer care centre so that indicate establishment of network could be started first. Later on customer care may be established. Appendix Statistics | |Wimax Industry |Preferences |Staying Home |Online Income | |Valid |Agree |47 |45. 2 |47. 0 |47. 0 | | |Strongly agree |53 |51. 0 |53. 0 |100. | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Preferences | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Neutral |17 |16. 3 |17. 0 |17. 0 | | |Agree |40 |38. 5 |40. 0 |57. | | |Strongly agree |43 |41. 3 |43. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Online Income | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Disagree |12 |11. 5 |12. |12. 0 | | |Neutral |20 |19. 2 |20. 0 |32. 0 | | |Agree |34 |32. 7 |34. 0 |66. 0 | | |Strongly agree |34 |32. 7 |34. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. | | | Social Network | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Neutral |14 |13. 5 |14. 0 |14. 0 | | |Agree |46 |44. 2 |46. 0 |60. 0 | | |Strongly agree |40 |38. 5 |40. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. | | | |Total |104 |100. 0 | | | Download | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Neutral |1 |1. 0 |1. 0 |1. 0 | | |Agree |49 |47. 1 |49. 0 |50. 0 | | |Strongly agree |50 |48. 1 |50. 0 |100. 0 | | |Total |100 |96. 2 |100. | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Statistics | |Prepaid Charges|Postpaid Charges|Charges of |B. p worth the |Availability | | | | |broadband providers|charges | | |N |Valid |100 |100 |100 |100 | |Median |4. 00 |4. 00 |2. 00 |2. 00 |5. 0 | |Mode |5 |5 |2 |2 |5 | Prepaid Charges | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Disagree |8 |7. 7 |8. 0 |8. 0 | | |Neutral |20 |19. 2 |20. 0 |28. 0 | | |Agree |29 |27. 9 |29. 0 |57. 0 | | |Strongly agree |43 |41. 3 |43. |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Postpaid Charges | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Disagree |9 |8. 7 |9. 0 |9. 0 | | |Neutral |22 |21. |22. 0 |31. 0 | | |Agree |33 |31. 7 |33. 0 |64. 0 | | |Strongly agree |36 |34. 6 |36. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Charges of broadband providers |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |24 |23. 1 |24. 0 |24. 0 | | |Disagree |42 |40. 4 |42. 0 |66. 0 | | |Neutral |21 |20. 2 |21. 0 |87. 0 | | |Agree |6 |5. 8 |6. 0 |93. 0 | | |Strongly agree |7 |6. 7 |7. 0 |100. 0 | | |Total |100 |96. 2 |100. | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | BP worth the charges | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |26 |25. 0 |26. 0 |26. 0 | | |Disagree |48 |46. 2 |48. 0 |74. 0 | | |Neutral |16 |15. |16. 0 |90. 0 | | |Agree |5 |4. 8 |5. 0 |95. 0 | | |Strongly agree |5 |4. 8 |5. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Availability |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Disagree |1 |1. 0 |1. 0 |1. 0 | | |Neutral |4 |3. 8 |4. 0 |5. 0 | | |Agree |41 |39. 4 |41. 0 |46. 0 | | |Strongly agree |54 |51. 9 |54. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. | | | |Total |104 |100. 0 | | | Statistics | |Availability |Bill payment |Customer care | |N |Valid |100 |100 |100 | | |Missing |4 |4 |4 | |Mean |4. 48 |4. 21 |3. 70 | |Median |5. 00 |4. 00 |4. 0 | |Mode |5 |4 |3 | Bill payment | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |1 |1. 0 |1. 0 |1. 0 | | |Disagree |5 |4. 8 |5. 0 |6. 0 | | |Neutral |8 |7. 7 |8. 0 |14. 0 | | |Agree |44 |42. 3 |44. 0 |58. | | |Strongly agree |42 |40. 4 |42. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Customer care | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Disagree |11 |10. 6 |11. 0 |11. | | |Neutral |37 |35. 6 |37. 0 |48. 0 | | |Agree |23 |22. 1 |23. 0 |71. 0 | | |Strongly agree |29 |27. 9 |29. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Statistics |word of mouth |Media Exposure |Free usage |Weather Hazard | |Valid |Agree |42 |40. 4 |42. 0 |42. 0 | | |Strongly agree |58 |55. 8 |58. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Media Exposure |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |1 |1. 0 |1. 0 |1. 0 | | |Disagree |8 |7. 7 |8. 0 |9. 0 | | |Neutral |12 |11. 5 |12. 0 |21. 0 | | |Agree |34 |32. 7 |34. 0 |55. 0 | | |Strongly agree |45 |43. 3 |45. 0 |100. 0 | | |Total |100 |96. 2 |100. | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Free usage | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |1 |1. 0 |1. 0 |1. 0 | | |Disagree |5 |4. 8 |5. 0 |6. 0 | | |Neutral |7 |6. |7. 0 |13. 0 | | |Agree |35 |33. 7 |35. 0 |48. 0 | | |Strongly agree |52 |50. 0 |52. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Weather Hazard |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |40 |38. 5 |40. 0 |40. 0 | | |Disagree |48 |46. 2 |48. 0 |88. 0 | | |Neutral |10 |9. 6 |10. 0 |98. 0 | | |Agree |1 |1. 0 |1. 0 |99. 0 | | |Strongly agree |1 |1. 0 |1. 0 |100. 0 | | |Total |100 |96. 2 |100. | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Surprises by BP | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |48 |46. 2 |48. 0 |48. 0 | | |Disagree |52 |50. 0 |52. 0 |100. 0 | | |Total |100 |96. 2 |100. | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Action taken by BP | |Frequency |Percent |Valid Percent |Cumulative Percent | |Valid |Strongly disagree |37 |35. 6 |37. 0 |37. 0 | | |Disagree |49 |47. 1 |49. 0 |86. 0 | | |Neutral |9 |8. |9. 0 |95. 0 | | |Agree |4 |3. 8 |4. 0 |99. 0 | | |Strongly agree |1 |1. 0 |1. 0 |100. 0 | | |Total |100 |96. 2 |100. 0 | | |Missing |System |4 |3. 8 | | | |Total |104 |100. 0 | | | Reliability Statistics Cronbach’s Alpha |N of Items | | |-. 038 |6 | | a. The value is negative due t

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp