Anda di halaman 1dari 91

TRAINING WORK On

BHARTI AIRTEL MPLS/IP PROVISIONING

Submitted in partial fulfilment of the requirement for the award of the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING Submitted by:PRATEEK YADAV FET/EC(F)/157 Training undertaken at : BHARTI AIRTEL Under the guidance of

External Guide; MR.SANDEEP MEHTA ( SENIOR ENGINEER)

INTERNAL GUIDE; MS.SHILPA

Submitted To Department of Electronics and communicaion Engineering, Faculty of Engineering and Technology, MRIU Jan 2012 - June 2012

MANAV RACHNA INTERNATIONAL UNIVERSITY FARIDABAD 121001

CERTIFICATE

This is to certify that the Major Project entitled MPLS/IP PROVISIONNG is an academic work done by PRATEEK YADAV (FET/EC(F)/157), for the partial fulfilment of the requirement for the award of Bachelor of Technology in ELECTRONICS AND COMMUNICATION discipline to MANAV RACHNA INTERNATIONAL UNIVERSITY, FARIDABAD during the academic year 201213 is a record of bonafide piece of work, carried out by him under my supervision and guidance in the Department of ELECTRONICS AND OMMUNICATION ,FET, FARIDABAD. He has completed the work with utmost sincerity and diligence.

MRS.GEETA NIJHAWAN H.O.D , ELECTRONICS AND COMMUNICATION

ACKNOWLEDGEMENT

Completing a task is never a one mans effort. It is the result of invaluable contribution of a number of individuals. From the depth of my heart, I wish to express my thanks & indebtness to my guidance to MRS.GEETA NIJAHAWN,HOD,ECE not only for his valuable guidance but also for inspiration, encouragement, patience, interest and pain staking fortitude during the entire period of industrial training. It has been a matter of great pride and satisfaction for me to work under him. Words cannot express my gratitude to Prof. Naresh Grover, Director,FET,MRIU who helped me in this endeavor. I take this opportunity to express my sincere thanks to him. My esteem regards to Dr. M.K.Soni, Executive Director, FET, MRIU for his kind support and fortitude for completing this project. I would like to extend a special note of thanks to my internal guide Ms. SHILPA, Asst. Prof, ECE, MRIU and external guide Mr.SANDEEP MEHTA . Their knowledge and professional management style created friendly environment. They provided whatever help was required at all time to keep the training work on right course and towards the right target. It has been a privilege and pleasure to take guidance from them .

Prateek Yadav

CANDIDATE DECLARATION
I hereby declare that the training work entitled MPLS/IP PROVISIONING is an authentic record of my own work carried out at BHARTI AITEL , IMT MANESAR, as requirements of my summer training for the award of degree of Bachelor of Technology in ELECTRONICS AND COMMUNICATION ENGINEERING from MANAV RACHNA INTERNATIONAL UNIVERSITY under the guidance of Mr.SANDEEP MEHTA (Project Manager) & Mrs,GEETA NIJHAWAN (H.O.D) during 6th Sem (JAN to JUNE, 2012)

PRATEEK YADAV FET/EC(F)/157

Contents
1. 1.1. INTRODUCTION TO ORGANIZATION....................................................................... 9 BACKGROUND ............................................................................................................. 9

FIGURE SHOWING BHARTI AIRTELS ORGANISATION STRUCTURE: ........................... 11 1.2. 2. 2.1. 2.2. HISTORY- BHARTI AIRTEL ...................................................................................... 11 PROJECT INTRODUCTION........................................................................................ 12 PEERING TRAFFIC ANALYSIS ................................................................................. 12 STAGES OF PROJECT ................................................................................................ 15

The project mainly comprises of followings stages:- .................................................................... 15 3. 3.1. 3.2. 3.2.1. HARDWARE AND SOFTWARE REQUIREMENTS .................................................. 16 HARDWARE REQUIREMENTS: ................................................................................ 16 SOFTWARE REQUIREMENTS: ................................................................................. 16 PUTTY.......................................................................................................................... 16

PuTTY SYMBOL ....................................................................................................................... 17 ROUTER LOGGING .................................................................................................................. 17 FIGURE SHOWING LOGGING A MPLS ROUTER 202.123.37.175:Error! Bookmark not defined. FIGURE SHOWING USER ACCESS VERIFICATION: ............. Error! Bookmark not defined.

FIGURE SHOWING COMMAND LINE INTERFACE OF ROUTER 202.123.37.175:Error! Bookma 3.2.2. METASOLV SOLUTIONS ........................................................................................... 21

METASOLV SYMBOL .............................................................................................................. 22 FIGURE SHOWING METASOLV LOGGING:............................ Error! Bookmark not defined. FIGURE SHOWING HOME WINDOW OF METASOLV: .......... Error! Bookmark not defined. Manage their infrastructures networks and services...................................................................... 23 Benefits:............................................................................................................................ 25 3.2.3. IBM TIVOLI NETCOOL .............................................................................................. 26

IBM TIVOLI SYMBOL .............................................................................................................. 26 FIGURE SHOWING MPLS BACKBONE FILTER: ..................... Error! Bookmark not defined. FIGURE SHOWING EVENT MANAGEMENT: .......................... Error! Bookmark not defined. 3.3. 3.4. INTRODUCTION ......................................................................................................... 34 REQUIREMENT AND ANALYSIS PHASE OF NDLC ............................................... 36

The NDLC is of an ongoing nature. The network design must be dynamic to support any............ 36
5

3.5

IDENTIFICATION OF REQUIREMENTS................................................................... 36

Figure showing the various Cisco devices on the network with detailed information.Error! Bookmark n 3.5. NETWORK ANALYSIS ............................................................................................... 39

Main characteristics in the network analyses phase are :- ............................................................. 40 3.6 NETWORK PLANNING AND DESIGN ............................................................................. 41 3.6. IMPLEMENTATION.................................................................................................... 42

Figure showing router log in. ......................................................... Error! Bookmark not defined. 4.6.1 4.6.2 INFOVISTA.................................................................................................................. 52 KIVICAT SERVER ...................................................................................................... 55

Figure showing the various devices on Kivicat Servers interface. . Error! Bookmark not defined. Figure showing remove device command on Kivicat server ........... Error! Bookmark not defined. 4.7.2.1.2 ............................................................................................... ORDER MANAGEMENT Figure 5 : Home Windows ...................................................... Error! Bookmark not defined. Figure 9 : To add componenet to network ............................... Error! Bookmark not defined. Figure 10 : Adding Details Of component ............................... Error! Bookmark not defined. Figure 11 : Set Connection Name ........................................... Error! Bookmark not defined. Figure 12 : Save Network Design ........................................... Error! Bookmark not defined. 5 Objective & Scope......................................................................................................... 84

Table Of Figures
Figure 1-Bharti Airtels Organisation Structure ......................................................................... 11 Figure 2-Logging a MPLS Router 202.123.37.175 .................................................................... 18 Figure 3-User Access Verification ............................................................................................. 19 Figure 4-Command Line Interface Of Router 202.123.37.175.................................................. 20 Figure 5-MetaSolv Logging ...................................................................................................... 22 Figure 6-Home Window Of MetaSolv ....................................................................................... 23 Figure 7-MPLS Backbone Filter ................................................................................................ 28 Figure 8-Event Management ..................................................................................................... 29 Figure 9-MPLS Trunk Window................................................................................................. 30 Figure 10-Hardware Alarm Window ......................................................................................... 30 Figure 11-MPLS Backbone Memory ......................................................................................... 31 Figure 12-MPLS Backbone LDP ............................................................................................... 31 Figure 13-MPLS Backbone Link ............................................................................................... 32 Figure 14-MPLS Backbone BGP............................................................................................... 32 Figure 15-MPLS Backbone CLNS ............................................................................................ 33 Figure 16-MPLS Backbone Env ................................................................................................ 33 Figure 17-MPLS Backbone RSVP ............................................................................................ 34 Figure 18-NDLC Phases ........................................................................................................... 35 Figure 19-Cisco devices on the network with detailed information ............................................ 38 Figure 20-Devices to be added onto the Kivicat server for server updation ................................ 39 Figure 21-Cisco devices on the network with detailed information ............................................ 44 Figure 22-List of NIXI devices to be checked ............................................................................ 45 Figure 23-Router Log In ........................................................................................................... 45 Figure 24-Telnet based Putty software on which various router commands work ....................... 46 Figure 25-Show Version Command .......................................................................................... 47 Figure 26-Show Controller Command ....................................................................................... 48 Figure 27-Flapping Up/Down Through Show Logging Command ............................................. 49 Figure 28-Show Diags Command .............................................................................................. 50 Figure 29-Pinging Process ......................................................................................................... 51 Figure 30-Main page of Infovista portal .................................................................................... 52 Figure 31-Bangalore routers as fetched from validated excel sheets to Infovista portal showing the utilization of links.(ie hourly,weekly,traffic-in, traffic-out etc) ................................................... 54

Figure 32-Utilization of router and also the graphical representation that how the link utilization is changing with time(weekly). ..................................................................................................... 55 Figure 33-Utilization of router and also the graphical representation that how the link utilization is changing with time(hourly). ...................................................................................................... 55 Figure 34-Devices on Kivicat Servers interface ........................................................................ 56 Figure 35-Add device command on Kivicat server. ................................................................... 58 Figure 36-Remove device command on Kivicat server .............................................................. 59 Figure 37-Ping the added device through telnet interface ........................................................... 60 Figure 38-Alarm windows ......................................................................................................... 62 Figure 39-MPLS Backbone Trunk ............................................................................................. 63 Figure 40-MPLS Backbone Hardware ....................................................................................... 63 Figure 41-MPLS Backbone Memory ......................................................................................... 64 Figure 42-MPLS Backbone LDP ............................................................................................... 64 Figure 43-MPLS Backbone Link ............................................................................................... 65 Figure 44-MPLS Backbone BGP............................................................................................... 65 Figure 45-MPLS Backbone CLNS ............................................................................................ 66 Figure 46-MPLS Backbone Temprature .................................................................................... 66 Figure 47-Logging ticket for the link down. .............................................................................. 67 Figure 48-Logging ticket for the link down ............................................................................... 68 Figure 49-Ticket details when it is closed so as to follow ticket until final solution. ................... 69 Figure 50-Login Windows ........................................................................................................ 71 Figure 51-Home Windows ........................................................................................................ 72 Figure 52-Work Queue Manager ............................................................................................... 73 Figure 53-Service Request Wizard ............................................................................................ 74 Figure 54-Customer Configuration ............................................................................................ 75 Figure 55-Services Order Details............................................................................................... 76 Figure 56-Add componenet to network...................................................................................... 77 Figure 57-Adding Details Of component ................................................................................... 78 Figure 58-Set Connection Name................................................................................................ 78 Figure 59-Save Network Design ................................................................................................ 79 Figure 60-Network System Design ............................................................................................ 80 Figure 61-Network System Design Surat ................................................................................... 81 Figure 62-Freedom Circuit Entry............................................................................................... 82 Figure 63-Assigning connection to port ..................................................................................... 82 8

Figure 64-New Add Cards......................................................................................................... 83 Figure 65-Build Connection ...................................................................................................... 83

1. 1.1.

INTRODUCTION TO ORGANIZATION BACKGROUND

Airtel is the fifth largest telecom operator in the world with over 207.8 million subscribers across 19 countries at the end of 2010. It is the largest cellular service provider in India, with over 152.5 million subscribers at the end of 2010. Bharti Airtel Limited usually referre as "airtel", is an

Indian telecommunications company operates in 19 countries across South Asia, Africa and the Channel Islands. It operates a GSM network in all countries, providing 2G or 3G services depending upon the country of operation. Airtel is the largest mobile operator by subscriber base in India ,

Airtel also offers fixed line services and broadband services. It offers its telecom services under the Airtel brand and is headed by Sunil Bharti Mittal. Bharti Airtel is the first Indian telecom service provider to achieve this Cisco Gold Certification. To earn Gold Certification, Bharti Airtel had to meet rigorous standards for networking competency, service, support and customer satisfaction set forth by Cisco. The company also provides land-line telephone services and broadband Internet access (DSL) in over 96 cities in India. It also acts as a carrier for national and international long distance communication services. The company has a submarine cable landing station at Chennai, which connects the submarine cable connecting Chennai and Singapore.

It is known for being the first mobile phone company in the world to outsource everything except marketing and sales and finance. Its network (base stations, microwave links, etc.) is maintained by Ericsson, Nokia Siemens

Network and Huawei.,business support by IBM and transmission towers by another company (Bharti Infratel Ltd. in India). Ericsson agreed for the first time, to be paid by the minute for installation and maintenance of their equipment rather than being paid up front. This enabled the company to provide pan-India phone call rates of Rs. 1/minute (U$0.02/minute). Call rates have come down much further. During the last financial year [2009-10], Bharti has roped in a strategic partner Alcatel-Lucent to manage the network infrastructure for the Telemedia Business. The company is structured into four strategic business units - Mobile, Telemedia, Enterprise and Digital TV. The Telemedia business provides broadband, IPTV and telephone services in 89 Indian cities. The Digital TV business provides Direct-to-Home TV services across India. The Enterprise business provides endto-end telecom solutions to corporate customers and national and international

10

long distance services to telecom.Today, Airtel is the largest cellular service provider in India and fifth largest in the world.

Bharti Airtels Organisation Structure:

Figure 1-Bharti Airtels Organisation Structure

1.2. HISTORY- BHARTI AIRTEL


Sunil Bharti Mittal founded the Bharti Group. In 1983, Sunil Mittal was into an agreement with Germany's Siemens to manufacture the company's push-button telephone models for the Indian market. In 1986, Sunil Bharti Mittal incorporated Bharti Telecom Limited (BTL) and his company became the first in India to offer
11

push-button telephones, establishing the basis of Bharti Enterprises. This firstmover advantage allowed Sunil Mittal to expand his manufacturing capacity elsewhere in the telecommunications market. By the early 1990s, Sunil Mittal had also launched the country's first fax machines and its first cordless telephones. In 1992, Sunil Mittal won a bid to build a cellular phone network in Delhi. In 1995, Sunil Mittal incorporated the cellular operations as Bharti Tele-Ventures and launched service in Delhi. In 1996, cellular service was extended to Himachal Pradesh. In 1999, Bharti Enterprises acquired control of JT Holdings, and extended cellular operations to Karnataka and Andhra Pradesh. In 2000, Bharti acquired control of Sky cell Communications, in Chennai. In 2001, the company acquired control of Spice Cell in Calcutta. Bharti Enterprises went public in 2002, and the company was listed on Mumbai Stock Exchange and National Stock Exchange of India. In 2003, the cellular phone operations were rebranded under the single Airtel brand. In 2004, Bharti acquired control of Hexacom and entered Rajasthan. In 2005, Bharti extended its network to Andaman and Nicobar. In 2009, Airtel launched its first international mobile network in Sri Lanka. In 2010, Airtel began operating in Bangladesh and 16 African countries.

2. 2.1.

PROJECT INTRODUCTION PEERING TRAFFIC ANALYSIS


12

Iam having an opportunity to utilize my skills during six month summer internship in Bharti Airtel UNOC, Manesar, Gurgaon. It is a network operations center, from which control is exercised over telecommunications network, computer, broadcast for multiple locations. I am a part of the companys TAC (Technical Assistance Centre), which provided me a great deal of learning. My sphere of knowledge has expanded both at technical and personal level. I not only got chance to work on a Live Project but also got acquainted with many prevalent technologies. I am working on the live project named Peering Traffic Analysis. This project is focused on creating and maintaining inventory/database of ongoing projects/existing network links and updating the same according to information provided, reporting the faulty details from the database which can lead to degradation of the network facilities or network failure , root cause analysis for degraded performance and propose remedial measures for the same. In this the data inventory has to be updated through infovisa portal and the Kivicat server. Responsibility includes monitoring the telecommunication network for alarms through IBM netcool or certain conditions that may require special attention to avoid impact on the network's performance. For example, in a

telecommunications environment, monitoring for power failures, communication line alarms and other performance issues that may affect the network. Analyze problems, perform troubleshooting, log tickets, communicate with site technicians and other NOCs, and track problems through resolution. If necessary, escalate problems to the appropriate level. After the particular activity is completed it has to be shifted from our bin to the next for its completion and billing. For severe conditions such as a power failure or optical fiber cable cut organization has procedures in place to immediately contact technicians to resolve the problems. Infovista tool used by NOC was not updating required information due to same Infovista tool was useless for NOC as its was not populating correct information. During project analysis identified that over a period of time Airtel network
13

grown alot & required Cisco devices at ( POP ) not configured in Info vista for monitoring during augmentation phase . Database being backbone of network

maintenance projects of UNOC, I initially prepared database inventory for routers and switches, identified missing links, and removed inappropriate information as it was necessary for the proper working of InfoVista portal . These database records which contain the correct valuable information are fetched into the portal called info vista portal which helps in the analyses of link utilization. NOC team was not able manage the disaster when router crashes during any unplanned hardware failure. During comparison with new list routers shared by NOC team found that few of the router IPs were not present on the Kivicat server and some router IPs were extra on Kivicat so, the server was updated according to the newly replaced links, and this particular server called Kivicat server keeps account of backup of routers and switches on which some changes have been made. It automatically takes the backup after each day. Also there are automated softwares like METASOLV and NET COOL which through the GUI interface tell the exact position of a router, switch, link and the traffic. In case the traffic is exceeding the limit (going beyond 70 to 80% ) then the link is considered over utilization and necessary steps are to taken to share the network traffic and if required traffic shifting is done so as to maintain the smooth flow of data. In case a link fails proactive alarm appears on Netcool and it is corrected by the networking analysis and monitoring team. The peering traffic analyses helps Telcos to maintain network efficiency. It is also important to keep network traffic smooth as failure of higher bandwidth links causes high revenue loss in terms of SLAs (Service level agreement) which Telcos signoff with their end customers . Thus it is most vital component of company business and revenues generation. Network setup is primary and most costly phase but after setting up the network the focus is to provide the best services. It is imperative from the above paragraphs that maintenance of networks and providing excellent services to client is the only way to bring back the investment in laying networks. The project becomes more significant in the cases where the Bharti Airtel Ltd customers are crucial e.g. Deptt of Income Tax ( DIT ) , Banks, Call Centres and other
14

commercial organizations (In case network fails, company has to pay for losses w.r.t to SLA ). It also impacts the brand image of organization in competitive world. Thus NOC plays an important role in revenue generation and maintaining the growth of the company and I am proud to be part of the team and the project.

2.2.

STAGES OF PROJECT The project mainly comprises of followings stages:Understanding the Project Requirements and Data Collection. Data analyses and recommendations. Data Validation and Updation.- Implementation Traffic Analyses (International and Domestic Peering)

15

3.

HARDWARE AND SOFTWARE REQUIREMENTS


In this project we used three software mainly. With the help of these software we collected all the information about the customer which are connected or become disconnected from the company database. These are the various hardware and software requirements of this project.

3.1.

HARDWARE REQUIREMENTS:
Processor: 2.8 GHZ processor and onwards. RAM: Minimum 1GB of RAM Disk: NTFS file systemformatted partition with a minimum of 1 GB of free space. Drive: DVD drive or the source copied to a local or network-accessible drive. Display: 1024 768 or higher resolution monitor. Large WAN network and access of PE routers ( POP end equipment ) .

3.2.

SOFTWARE REQUIREMENTS:
a) b) c) d) e) PuTTY V-0.60 METASOLV SOLUTIONS IBM TIVOLI NETCOOL WINDOWS XP BMC REMEDY

3.2.1. PUTTY
16

PuTTY SYMBOL

PuTTY is a client program for the SSH, Telnet and Rlogin network protocols: logging in to a multiuser computer from another, over a network. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.

In really simple terms: you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else. Multi-user operating systems, such as Unix and VMS, usually present a command-line interface to the user, much like the Command Prompt in Windows. The system prints a prompt, and you type commands which the system will obey. Using this type of interface, there is no need for you to be sitting at the same machine you are typing commands to. The commands, and response, can be sent over a network, so you can sit at one computer and give commands to another one, or even to more than one SSH, Telnet and Rlogin are network protocols that allow you to do this. On yhe computer you sit at, you run a client , which make a network connection to the other computer (the server). The network connection carries your keystrokes and commands from the client to server, and carries the servers response back to you.

ROUTER LOGGING
After double click on PuTTY software you will get this window named PuTTY Configuration. In this window the two things are main one is Host Name (or IP
17

address) and second is Connection type, it may be Raw, Telnet, Rlogin, SSH and Serial. When we will select the connection type it automatically select the Port number. After clicking on open button we will get the Command Line Interface window After that it will ask for the Username and Password for the user access verification. If entered username or password goes wrong, it will again ask for right username and password If access verification goes right then you are able to apply the commands for configure/handle the Router/Switch.

Figure 2-Logging a MPLS Router 202.123.37.175

18

Figure 3-User Access Verification

19

Figure 4-Command Line Interface Of Router 202.123.37.175

20

Features of PUTTY
Support for local serial port connections. Self-contained executable requires no installation. Public-key authentication support. Control over the encryption key and protocol version. The storing of hosts and preferences for later use.

Applications Of PUTTY
Main functions are realized by Putty files themselves: Putty - the Telnet and SSH client itself. PSFTP - an SFTP client, i.e. general file transfer sessions much like FTP. Putty tel - a Telnet-only client. Plink - a command-line interface to the Putty back ends. Pageant - an SSH authentication agent for Putty. Pterm - a standalone terminal emulator.

3.2.2. METASOLV SOLUTIONS


21

METASOLV SYMBOL As the communication industry continues its rapid and complex evolution, the core business imperatives are adapting to address these changes. MetaSolv helps us to meet the ongoing challenges of the communications industry, enabling us to deliver effective customer services, reduce operating costs, providing automated end-to-end service provisioning, reduce errors and enhance revenue. MetaSolv's robust portfolio of OSS solutions provides integrated or modular capabilities for Order Management, Inventory Management, Service Activation, and Network Mediation that enables us to achieve effective flow-through provisioning across all network layers, interaction with all network equipment, communication via any network technology, and delivery of any type of service. When we double click the METASOLV software then we get the login window named Logon to Metasolv Solution.Where we enter the User ID, Password and Application Server. Then we get the home window where we select the service and other option according to the use.

Figure 5-MetaSolv Logging

22

Figure 6-Home Window Of MetaSolv

MetaSolv offer robust solutions for

Subscriber and Service provisioning Help automate workflow and business processes Configure network devices Manage subscriber and service profiles Offer customer self-care ordering capabilities

Network Resource Management to help providers Manage their infrastructures networks and services Offer differentiated services

Service Quality Management to help providers


23

Understand, manage, and report on their contractual quality of service obligations.

Network Data Collection to help providers Offer high-value services by transforming raw data collected from the network into rich customer and service information

MetaSolv's robust functionality enables us to

INCREASE REVENUE AND DECREASE TIME TO REVENUE: One must have the ability to more effectively deliver new services while leveraging the existing investment in network equipment and technologies. As new services are brought to market, visibility into existing products and network assets can help us make the right decisions for our business.

OPTIMIZE CAPITAL EXPENDITURES: Its critical that we maintain an accurate record of all your network and service resources. A system that allows us to accurately model all our network equipment, in all the network systems we maintain, enables us to verify the placement of all our assets and how best to take advantage of them, enabling us to reduce CAPEX.

ENHANCE OPERATIONAL EXCELLENCE: One must continue consolidating multiple systems and automating the provisioning processes for faster service delivery. To do this, we need a system with multi-service capabilities, coupled with effective integration to activation. Flow-through, automated provisioning can help reduce OPEX.

24

PROVIDE EFFECTIVE ACCESS TO INFORMATION: A single source of access to comprehensive network and service information enables us to make more informed business decisions. Its important that we empower individuals at every level of the organization to leverage maximum benefit from the inventory.

EMPLOY ONE SYSTEM FOR ALL SERVICES: MetaSolv's capabilities facilitate network and service evolution with a multivendor, multi-technology, multi-domain solution. MetaSolv offers a single network interface for all services.

FACILITATE RAPID SOLUTION ROLLOUT: MetaSolv offers productized domain support and proven implementation methodologies that enable us to offer new services more quickly. MetaSolv integrates rapidly into our business, while our proactive vendor partnerships and standards-based designs enable us to deliver dependable, productized support for your network equipment.

REDUCE COST OF OWNERSHIP: MetaSolv provides a unified network interface for all services, making the operations simpler, more accurate, and more productive. The flexibility and reliability of the solutions enables one to adapt the system with their own staff, saving time and money.

Benefits:
Centralize management of business processes Automate manual tasks for rapid service introduction Streamline operations Increase quality of customer care Optimize use of resources Facilitate flow-through provisioning
25

MetaSolv understands the need to effectively address all these issues, and robust suite of solutions addresses the full spectrum of service fulfillment processes from order management to inventory management to activation. In addition, MetaSolv has extensive experience in helping one meet the challenges of todays complex communications environment. With over 180 customers worldwide, using all types of networks, protocols, and technologies. The extensive experience in actual customer deployments has enabled MetaSolv to develop solutions with domain-rich functionality that can be used alone or can be easily integrated with other best-of-breed systems.

3.2.3.

IBM TIVOLI NETCOOL

IBM TIVOLI SYMBOL

26

IBM Tivoli Netcool software delivers real-time, centralized supervision and event management for complex IT domains and next-generation network environments. With scalability that exceeds many millions of events per day, Tivoli Netcool offers round-the-clock management and high automation to help you deliver continuous uptime of business, IT and network services.

Tivoli Netcool software is available on a variety of platforms, such as Microsoft Windows Vista, Sun Solaris and Linux on IBM System z. The software is designed to scale from the smallest to the largest, most complex environments, across business applications, virtualized servers, network devices and protocols, Internet protocols, and security and storage devices. Breadth of coverage, rapid deployment, ease of use, high resilience, and exceptional scalability and performance are just some of the reasons leading organizations worldwide are leveraging Tivoli Netcool/ OMNIbus to manage the worlds largest, most complex environments.

FEATURES:
Provides a single consolidated operations management solution for a wide range of complex environments across applications, systems, networks and other domains. Automates event deduplication, isolation and resolution, increasing productivity and optimizing service availability. Fast-tracks high-priority events to specific individual operators or to groups, minimizing problem resolution time. Supports current and evolving standards, including IPv4 and IPv6, and uses FIPS 140-2 approved cryptographic providers. In Airtel it is used for Backbone Alarm Monitoring. In blew diagram there is a different alarms option are present which is used to monitor the link if it goes down.
27

Figure 7-MPLS Backbone Filter

28

Figure 8-Event Management

Event management with a customizable, Web-based interface and integrated architecture allows you to achieve end-to-end visualization, navigation, security and reporting (real-time and historical) across Tivoli and third-party management tools for true consolidated operations management in a single pane of glass. DIFFERENT ALARM WINDOWS ARE: There are 10 alarms which are filtered shown in figures.These alarm windows are used to monitor the link/backbone while it goes down. It automatically shows the down link when it goes down with the detail like down since, node, summary, alert key, first occurrence and area etc. TRUNK: This window shows that the link is down at: Node NCR-MEN-A01-S57NOIDA-013 Interface: Port Gi1/0/1 Location: DELHI First Occurrence: 8/27/11 3:14:24 AM

29

Figure 9-MPLS Trunk Window

HARDWARE: This window shows that no link is down.

Figure 10-Hardware Alarm Window

MEMORY: This window shows that no link is down.

30

Figure 11-MPLS Backbone Memory

LDP (Label Distribution Protocol): This window shows that the link is down at: Node: MLY-MPL-PE-RTR-37-144 Location: MALAYSIA First Occurrence: 9/26/11 7:47:57 PM

Figure 12-MPLS Backbone LDP

LINK: This window shows that total 41 links are down at: Node: RKT-MPL-PE-RTR-250
31

Interface: gigabitEthernet0/3 Location: RAJKOT First Occurrence: 8/20/11 12:25:48 PM

Figure 13-MPLS Backbone Link

BGP (Boarder Gateway Protocol): This window shows that the link is down at: Node: LON-ISP-IGW-RTR-35 Location: London First Occurrence: 9/1/11 2:56:44 PM

Figure 14-MPLS Backbone BGP

CLNS (Connectionless Network Service): This window shows that the link is down at:
32

Node: NDL-MPL-PE-RTR-228 Interface: GigabitEthernet1/2.199 Location: DELHI First Occurrence: 7/1/10 1:27:28 PM

Figure 15-MPLS Backbone CLNS

TEMPERATURE: This window shows that the link is down at: Node: ALI-DCN-ACC-RTR-109 Location: ALIGARH First Occurrence: 8/26/11 1:39:52 PM

Figure 16-MPLS Backbone Env

RSVP: This window shows that the link is down at:


33

Node: BHA-MPL-PE-RTR-37-42 Interface: interface so-3/0/0.0 Location: BHAGALPUR First Occurrence: 8/17/11 2:06:34 PM

Figure 17-MPLS Backbone RSVP

NETWORK DEVELOPMENT LIFE CYCLE 3.3. INTRODUCTION


34

The key model behind this process is known as the Network Development Life Cycle (NDLC) .The word cycle is a key descriptive development term of the it network clearly

life cycle as

illustrates the continuous nature of network development. A network designed from scratch clearly has to start somewhere, namely with an analysis phase. Existing networks, however, are constantly
Figure 18-NDLC Phases

progressing from one phase to another within the network development life cycle. For instance, the monitoring of existing networks would produce management and performance statistics perhaps using a network management protocol such as SNMP. Qualified network analysts would then analyze these performance statistics of this existing network. Design changes may or may not be implemented based on the analysis of these performance statistics. As will be described later in the chapter, network designs may be physical or logical in nature. Physical network designs involve the arrangement and interconnection of the physical network circuits and devices, whereas logical network designs involve configuration and definition of services that will run over that physical network such as addressing schemes, routing schemes, traffic prioritization, security, and management. Many times, proposed network design changes are first simulated using sophisticated network simulation software packages or prototyped in a test environment, safely removed from a companys production network, before being deployed or implemented. This cycle of monitoring, management, analysis, design, simulation, and

implementation is ongoing. Just as demands on a network are in a constant state of change due to changes in business, application, or data requirements, so must the network design itself be of a dynamic nature to successfully support these changing requirements. The network development life cycle serves as a logical framework in which this dynamic network design is able to thrive.

35

3.4.

REQUIREMENT AND ANALYSIS PHASE OF NDLC


The NDLC is of an ongoing nature. The network design must be dynamic to support any changing requirements. The Network Development Life Cycle (NDLC),is the process of creating or altering network systems and the models and that

companies use for theirs networking requirements.Emphasis on this NDLC is on man-made technological life-cycle. But there are many other life-cycle models to choose from. There are some very important things in building a network of development that must be considered where the NDLC (Network Development Life Cycle) depends on previously completed development processes such as strategic business planning, applications development life cycle, and data distribution analysis.If an implemented and the network is to effectively deliver the information systems that will fulfill strategic business goals, then a top-down approach must be taken. A Network Development Life Cycle (NDLC) adheres to important phases that are essential for network developers, such as requirement analyses, planning, analysis, design, and implementation, and are explained in the section below. There is a need for significant analysis and design, and associated products or deliverables, prior to the commencement of any network analysis and design activities

3.5

IDENTIFICATION OF REQUIREMENTS
Requirement analysis is sometimes requires individuals/teams from client as well as service provider sides to get detailed and accurate requirements of the project often there has to be a lot of communication to and from to understand these requirements. Requirement gathering is the most crucial aspect as many times communication gaps arise in this phase and this leads to validation errors and bugs in the software program. Infovista tool used by NOC was not updating required information due to same Infovista tool was useless for NOC as its was not
36

populating correct information. During project analysis identified that over a period of time Airtel network grown alot & required Cisco devices at ( POP ) not configured in Info vista for monitoring during augmentation phase.In this particular project of Peering Traffic Analyses this becomes more important because we only need the exact and validated data for the final monitoring So, the list and details of various routers switches and network devices are the basic requirements as we have to do the peering traffic analyses. For that the available information should be correct and valuable.As information was provided to me was obsolete in some cases and it has to be corrected according to various parameters regarding the devices. This was a huge task as there were almost 1500 Cisco devices in the whole network of Bharti Airtel so I decided to categorize the various works. I prepared the sheets showing the various details of devices which are present on the network by particularly logging in into each device using telnet based software called PuTTy.In this phase I just collected information and decided the steps to be taken on that data so as to make it validated and correct. As this information about the various devices regarding their ports, temperature, power, Cisco classification, connectivity was to be checked through Putty by logging in into each device and then fetched into a automated portal called Infovista.With attention to customer needs and cycle network to be developed must be able to adopt the states fast-changing business and can provide much needed services of the customer.

37

Figure 19-Cisco devices on the network with detailed information

Also Bharti Airtel has its own servers one of them is Kivicat server which mainly manages bharti Airtels network backup. When changes are made on the configuration, connectivity of routers and switches each day the server gets updated automatically. It is very helpful in the cases when a particular device gets down and we have to access data of that device so we can access that data from the portal of Kivicat server. NOC team was not able manage the disaster when router crashes during any unplanned hardware failure. With updated data and information regarding the routers it also contained some irrelevant information as some devices got disconnected from the network but they still existed on the Kivicat sever and also there were some cases when new devices were added into the network so they have to be added onto the the server manually otherwise this higly effects the workability as it decreases the level of accuracy .So due to above consistency is not maintained at the Kivicat server so a new list of devices were given to me by the team leader so as to compare the devices with the devices which are currently present on the Kivicat server.

38

Figure 20-Devices to be added onto the Kivicat server for server updation

3.5.

NETWORK ANALYSIS

A network analysis methodology is a practical approach to network analysis. The goal of network is analyst to determine where the problem is, and attempt to fix the problem. This step involves breaking down the system in different pieces analyze the situation, analyzing project goals, breaking down what needs to created and attempting to engage users so that definite requirements can be defined in terms of bandwidth and other quality of service regarding requirements. In this particular project we have to analyze the peering traffic, So, for that with guidance of team members I made a action plan for the particular events that which action is to be taken when different events occur. These events can be choking, traffic overloading, network failure, power failure, mux issues, various alarm indications etc. and for these events we have specified steps which are to be taken when that event occurs. When the network is developed proper analyses must be done in accordance with applicable policies and continue to be in the
39

appropriate working, where the intent of the appropriate path is a path that consider the needs of businesses that can provide benefits for both companies and customers who use the services of these networks. Main characteristics in the network analyses phase are :1. Requirements (business, application, and data) definition is required prior to network Design activities. 2. Expected compliance with requirements in a Request For Proposal (RFP) by both inhouse Personnel and outside consultants. 3. Activities from various stages often take place simultaneously and backtrack to previous activities is sometimes needed. Also after the project is set up network analyses process goes on with operation phase according to different customers as the various conditions are defined here that which step is to be taken so as to overcome the alarming condition . It is of different types written as under:Data traffic analysis: Payload type analysis: e.g., video, voice, and data. Amount of data required to complete each transaction is calculated and documented Result- This influences which type of network to use, e.g., high speed Time studies: Analyze when and how these transactions are executed, i.e., counting how often and what time of the day, week, etc transaction is executed. Traffic volume analysis: Construct a time sensitive traffic volume requirements profile (from transaction analysis and time studies), i.e., average, minimum maximum bandwidth requirement. If the traffic increases the limit of 80% the link will get overloaded.
40

Mission critical analysis: e.g., Electronic funds transfer Requirements: data security, encryption of data transmitted Redundant links may be needed Protocol analysis: The analyses done on the links based on various protocols like BGP, LDP etc. Network configuration alternatives: Local carriers may be limited in their offering of certain data transmission services. Capacity: ensure sufficient bandwidth is allocated to handle sudden increase in demand. Reliability: sufficient redundancy is implemented Security Cost (for senior management to decide). Network hardware analysis:-Depends on the results of the two previous analysis reports. The analyses is done that which steps are to be taken when an hardware device goes down or a link failure occurs. If these are valid, then networking devices chosen to tie the network together should be valid as well.

3.6 NETWORK PLANNING AND DESIGN


Network planning and design is an iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator. When you plan a logical network design, you can start from one of two places. You can design and install a new network from scratch, or you can upgrade an existing network. Network planning process involves three main steps: Topological design: This stage involves determining where to place the components and how to connect them. The (topological) optimization methods that can be used in this stage come from an area of mathematics called Graph
41

Theory. These methods involve determining the costs of transmission and the cost of switching, and thereby determining the optimum connection matrix and location of switches and concentrators. Network realization: This stage involves determining how to meet capacity requirements, and ensure reliability within the network. This involves determining all information relating to demand, costs and reliability, and then using this information to calculate an actual physical circuit plan This is how the network is planned and designed at the starting level of the project, but as now we deal with the peering traffic analyses we will just make some changes in the network where it is confusing and inappropriate so that it should be clear and easy to understand. For example if there are two links between Delhi and Agra. But according to the network design earlier it is showing the links from Delhi to Agra and also from Agra to Delhi so there is problem. So, in order to maintain the consistency of the network connectivity and network design these small changes were made in the network design by me with the help of our team leader. Other details regarding the network design and planning cannot be shown in this report as they are part of companys confidential data. After the design part the next most important phase in a project is to implement the whole planning, design, analyses, so that the exact working of project starts.

3.6.

IMPLEMENTATION
Implementation is the process of having professional checkpoints and put new technology into use. This phase is less creative but mainly work is done a higher
42

level and responsibility. It is mainly concerned with turning the plans analyses into the reality. Infovista tool used by NOC was not updating required information due to same Infovista tool was useless for NOC as its was not populating correct information. During project analysis identified that over a period of time Airtel network grown alot & required Cisco devices at ( POP ) not configured in Info vista for monitoring during augmentation phase and also NOC team was not

able manage the disaster when router crashes during any unplanned hardware failure. During comparison with new list routers shared by NOC team found that few of the router IPs were not present on the Kivicat server and some router IPs were extra on Kivicat So in this part of our project we have two major concerns first one to validate data and router information for info vista portal and secondly to update the Kivicat server so that smooth working of whole system can take place. As information about 1500 Cisco devices was provided, I logged in into each device for checking the power, proper connectivity, temperature, ports etc. This router list consisted of list of routers, back to back connectivity, trunk interface, next generation networks (NGN), NIXI, these all documents consisted of the various routers switches their ports, destination points, descriptions and other information. I reported many routers having critical situation like in some routers only one power cable was attached, in this case if the router failure occurs causing the link down for hundreds of customers and in this case company has to pay back to the customer according to the SLA. One of other special case which I reported to management was related to environment of routers like temperature, fans etc.

43

Figure 21-Cisco devices on the network with detailed information

For this task each time I had to log in into the router then execute the particular commands on the telnet Putty software .This was a huge task as the number of devices on Bhartis network was very large and also I had to check the connectivity and the other properties through Putty interface.

44

Figure 22-List of NIXI devices to be checked

Figure 23-Router Log In

45

Figure 24-Telnet based Putty software on which various router commands work

46

Figure 25-Show Version Command

47

Figure 26-Show Controller Command

48

Figure 27-Flapping Up/Down Through Show Logging Command

49

Figure 28-Show Diags Command

50

Figure 29-Pinging Process

After checking each device thoroughly I submitted my report to higher authorities and made the updations according to the new assigned connections and removed those connections which were replaced by new ones. Now these sheets were fetched into a automated portal called Infovista.This is a huge portal having all the information about routers switches their connectivity and mainly about the utilization of various links.

51

4.6.1 INFOVISTA
InfoVista provides a unified platform for network performance management, application performance management and SLA management that empowers service providers and enterprise IT organizations to holistically and costeffectively monitor and ensure availability and quality of service on the infrastructure, services and applications they deliver. InfoVista enables managed service providers, mobile operators, broadband operators and enterprise IT organizations to successfully make the transformation from infrastructure providers to service providers by helping them launch new and high-performance services, assure service performance, reduce customer churn, manage risks, invest

Figure 30-Main page of Infovista portal

appropriately and control costs.

52

Its interoperable network, service and application performance management products collect, process and correlate large volumes of heterogeneous data in real-time. These products transform quality of experience (QoE), and application, network and system performance data into actionable information. InfoVista

customers using these solutions can manage perception of service quality, report on performance, optimize capacities and resources, and prevent and resolve problems before they impact their own customers and end users.Its patented technology platform encompasses 15 years of addressing service providers most stringent requirements . InfoVista provides unmatched scalability, flexibility, vendor independence, and comprehensive technology coverage. Meanwhile, Its consultancy, training, support and assistance services meet our customers unique environments and needs. These services help our customers to build comprehensive solutions that promote strong knowledge transfer, best practices, and quicker implementation, enabling them to maximize their return on investment.

53

Figure 31-Bangalore routers as fetched from validated excel sheets to Infovista portal showing the utilization of links.(ie hourly,weekly,traffic-in, traffic-out etc)

As the Info vista portal fetches the data from the validated excel sheets, this automated software helps in checking the percentage link utilization for a

particular link in the network. Before I started working their were only 2 routers in Bangalore but as some new routers were connected which were not updated so it was not showing the utilization and the link details of those routers which could have further caused the problem for company revenues but they were updated and checked by me on putty. The Info Vista portal also shows the in traffic, out traffic, hourly traffic, weekly traffic, and also the graphs that how the utilization of the links is changing with time. This task actually updates the inventory of the backbone network so that network can be monitored properly to provide the services to the customers.

54

Figure 32-Utilization of router and also the graphical representation that how the link utilization is changing with time(weekly).

Figure 33-Utilization of router and also the graphical representation that how the link utilization is changing with time(hourly).

4.6.2 KIVICAT SERVER


55

Bharti Airtel has its own servers one of them is Kivicat server, this server mainly manages Bhartis network backup. When changes are made on the configuration, connectivity of routers and switches each day the server gets updated automatically.NOC team was not able manage the disaster when router crashes during any unplanned hardware failure. During comparison with new list routers shared by NOC team found that few of the router IPs were not present on the Kivicat server and some router IPs were extra on Kivicat.The next important task in the implementation is updation of the Kivicat server.

Figure 34-Devices on Kivicat Servers interface

Kivicat Server is very helpful in the cases when a particular device gets down and we have to access data of that device so we can access that data from the portal of Kivicat server. With updated data and information regarding the routers it also contained some irrelevant information as some devices got disconnected from the
56

network but they still existed on the Kivicat server and also there were some cases when new devices were added to the network and they have to be updated on the server manually otherwise this highly effects the workability as it decreases the level of accuracy .So due to this consistency is not maintained at the kivicat server so a new list of devices were given to me by the team leader and I compared that with the existing devices on the server and accordingly I added, removed the devices and also ping those devices to check whether they are working or not with particular connections. So, the benefit to the company by my work is if a device isolates from the network there are lot of customers and protocols running on that device so all the data can crash but with the help of consistent Kivicat server we can restore the data in seconds which can enhance the company services and also get rid of undesirable losses.In order to maintain the consistency and make the server updated we add new devices into the server and remove the devices which are replaced by other devices.

57

Figure 35-Add device command on Kivicat server.

58

Figure 36-Remove device command on Kivicat server

59

Figure 37-Ping the added device through telnet interface

4.7 Operation And Maintainence


60

4.7.1 After implementation phase is complete and working starts then operation and
maintenance starts. Like any other system, this is an aging process that requires periodic maintenance of hardware and software. If the new information is inconsistent with the design specification maintenance to keep it tuned with the design specification. The importance of the maintenance is to continue, to bring the new system to the standards. User priority changes in the organizational programs so the system softwares which are being used should be properly updated and maintained. Maintenance is necessary to eliminate errors in the working system. During its working live and to tune the system to any variations in its working. Often small system is brought to the operation and changes are made to remove them. System planners must always plan them for resources availability to carry out their maintenance function. In this phase the Peering Traffic Analyses takes place . The importance of maintenance is to continue to bring new system to standard. This phase consist of following steps: Post rectification of database in monitoring tool (Infovista) and recovery tool Kivicat Server, proper monitoring enabled in the system and task assigned to monitoring team for monitoring of traffic 24x7. Monitoring team start analyzing daily logs and alarms of all equipments. For managing the alarms other high bandwidth utilization IBM Netcool monitoring system used for alarms like hardware failure , LDP , BGP ,

environment alarms , backbone link status and CLNS . Since all updated equipments properly configured in monitoring tools so monitoring started properly by NOC team Post identification of alarm proactive tickets also start logging by Monitoring team which help to increase uptime of network and achieve end users SLA .

61

Peering traffic analyses is done through IBM Netcool in which alarms which are filtered shown in figures.These alarm windows are used to monitor the link/backbone while it goes down. It automatically shows the down link when it goes down with the detail like down since, node, summary, alert key, first occurrence and area etc.Thesealarm windows with details are shown as under:-

Figure 38-Alarm windows

TRUNK: This window shows that the link is down at: Node NCR-MEN-A01-S57NOIDA-013 Interface: Port Gi1/0/1
62

Location: DELHI First Occurrence: 8/27/11 3:14:24 AM

Figure 39-MPLS Backbone Trunk

HARDWARE: This window shows that no link is down.

Figure 40-MPLS Backbone Hardware

MEMORY: This window shows that no link is down.

63

Figure 41-MPLS Backbone Memory

LDP (Label Distribution Protocol): This window shows that the link is down at: Node: MLY-MPL-PE-RTR-37-144 Location: MALAYSIA First Occurrence: 9/26/11 7:47:57 PM

Figure 42-MPLS Backbone LDP

LINK: This window shows that total 41 links are down at: Node: RKT-MPL-PE-RTR-250 Interface: gigabitEthernet0/3 Location: RAJKOT
64

First Occurrence: 8/20/11 12:25:48 PM

Figure 43-MPLS Backbone Link

BGP (Boarder Gateway Protocol): This window shows that the link is down at: Node: LON-ISP-IGW-RTR-35 Location: London First Occurrence: 9/1/10 2:56:44 AM

Figure 44-MPLS Backbone BGP

CLNS (Connectionless Network Service): This window shows that the link is down at: Node: NDL-MPL-PE-RTR-228 Interface: GigabitEthernet1/2.199 Location: DELHI First Occurrence: 5/1/10 3:27:28 AM
65

Figure 45-MPLS Backbone CLNS

TEMPERATURE: This window shows that the link is down at: Node: ALI-DCN-ACC-RTR-109 Location: ALIGARH First Occurrence: 5/26/11 5:39:52 PM

Figure 46-MPLS Backbone Temprature

Now these alarms are monitored and also the peering traffic analyses is done through this and the links which are down for those links tickets are logged and tranfered to the concerned department for the final solution of that particular link.The best services are provided so as to decrease the downtime of the router as
66

for this company will have to pay less according to the SLA as that particular link is resolved.

Figure 47-Logging ticket for the link down.

67

Figure 48-Logging ticket for the link down

68

Figure 49-Ticket details when it is closed so as to follow ticket until final solution.

4.7.2 Task closing and transferring using MetaSolv:69

4.7.2.1

METASOLV COMPONENTS

Inventory Management Order Management

4.7.2.1.1 INVENTORY MANAGEMENT


MetaSolv Inventory Management helps us accurately manage all the resources required to deliver communications services, allowing us to identify availability, location, and capacity of the network assets. MetaSolv Inventory Management enables us to keep our inventory evergreencontinually refreshed with near-real-time visibility into any discrepancies between the actual network and the inventory database. In addition to helping us serve the customers better, this functionality also facilitates our compliance with financial reporting requirements. MetaSolv Inventory Management enables us to track all resources that relate customer services to logical entities and/or physical assets, regardless of whether these resources are individually or jointly owned or leased. MetaSolv offers an enterprise-wide view of your inventory, with data presented in meaningful ways for everyone from the CEO-level executives to the front-line customer services staff. MetaSolv products can integrate easily with external ordering applications, accessing the required provisioning information. MetaSolv has successfully deployed the systems in over 100 customers worldwide. MetaSolv is the most widely deployed system available that enables inter-carrier ordering, engineering build-out, and completion of complex service orders

4.7.2.1.2 ORDER MANAGEMENT


MetaSolv Order Management is specifically designed to help us manage our end-to-end service delivery process, which often involves managing multiple, complex orders that must be processed both inside and outside of the organization. MetaSolv eliminates the complexity of dealing with a variety of disjointed or interfaced systems by providing a single, comprehensive solution that includes mission critical functionality required for service delivery. MetaSolv Order Management capabilities include comprehensive functionality for product cataloguing, customer management, and workflow management.
70

There are five types of tasks in the MetaSolv on our bin these are :EWO_PEND NET_DESIGN ASN_RSC CUS_PRO

Figure 50-Login Windows

The process includes logging into MetaSolv then closing the each process according to the specific procedure and snapshots of the whole process are shown as under.In this process the subsequent details according to order are cheched with the detals and routers
71

old and new configuration is saved.In the bext step if the router is shifted then the net desiging is done in which the various connection and diconnections are done according to the various orders.these are saved as logical design in the MetaSolv inventory.One of the most important part at our bin is assign resources in which the perticular device and the port is identified by searching then the connection is assigned to that port. After that the tasks are completed and tranffered from our bin to next bin for billing and other formalities.

Figure 51-Home Windows

72

Figure 52-Work Queue Manager

Work Queue Manager:- this part comes after logging into the MetaSolv for the particular department and it shows the various tasks which are pending on our bin which are to be completed within the stipulated time duration. It also shows those tasks which are rejected back due to some defaults and mistakes which are to be corrected.

73

Figure 53-Service Request Wizard

74

Figure 54-Customer Configuration

75

Figure 55-Services Order Details

76

Figure 56-Add componenet to network

77

Figure 57-Adding Details Of component

Figure 58-Set Connection Name

78

Figure 59-Save Network Design

79

Figure 60-Network System Design

80

Figure 61-Network System Design Surat

81

Figure 62-Freedom Circuit Entry

Figure 63-Assigning connection to port

82

Figure 64-New Add Cards

Figure 65-Build Connection

83

Objective & Scope


The main objective is to understand the basic workflow of a typical telecommunication company and also the management of assets i.e the resources required in a network system. Our objective is to know how can we manage the network system, that is our inventory and the equipments in our inventory through the various processes and to understand the various network monitoring and analyses tools. To gain as much as possible from the training technically as well as professionally. To develop a psyche of future engineer so as to meet the requirements of future industry. To gain professional experience in an organization that is top most in the world in the field of telecommunication. To apply the theoratical knowledge gained in actual industrial situations. To ensure working with sound and highly capable professionals. To develop as an Engineer so as to face the upcoming challenges of professional life after B. Tech.

84

Conclusions and Recommendations Conclusions


In this project we have to monitor all Down link of major cities: Delhi, Mumbai, Kolkata, Chennai, Bangalore etc. In this we find the FTN (Fault Ticket Number),circuit id and Customer name for all Disconnect link. This project is implemented only on those links whose description is also available in NSG (Network Service Group). Ideally, the various automated softwares enable the workflow electronically across the organization, providing visibility to the processes and resource utilization. It helps NOC team to reserve resources for future requirements also. It enables the service provider to manage the end-to-end service delivery processes that often involves more than one type of order or transaction across the organization as well as with other service or network providers. Project is also used to measure performance of total bandwidth available and trend of bandwidth usage This project will be very beneficial for the company in respect of cost and maintenance as it helps in maintaining the SLAs signed between Airtel and their end customers and increasing the revenues of company.

Recommendations
During augmentation phase its very important to add new device in Infovista and Kivicat server. Disconnection needs to log by NOC team post disconnection of any device from network. For any IP change NOC team needs to log order for change in relevant monitoring tools as well. Monitoring tool increases CPU utilization and consume extra bandwidth while polling to monitoring equipments.

Process needs to define which should include monitoring tool timely up


gradations during new projects implementation and disconnection phases.

Bibliography
85

www.cisco.com Cisco Study Guide by Todd Lammle www.Airtel.co.in http://www-01.ibm.com/software/tivoli/ www.metasolv.com www.ccnacertificate.com www.wikipedia.com/ndlc www.networkingboards.com http://www.cisco.com/warp/cpropub/45/tutorial.htm http://www.airtel.in/mpls http://www.cisco.com/en/US/products/hw/modules/prod_module_category_home .html http://the.earth.li/~sgtatham/putty/0.60/htmldoc/ www.ccse.kfupm.edu.sa/.../COE-444-042-LectureNotes-Chap3.pdf

86

Appendices ISP

An Internet service provider (ISP) is a company that provides access to the Internet. Access ISPs connect customers to the Internet using copper, wireless or fiber connections. Hosting ISPs lease server space for smaller businesses and host other people servers. Transit ISPs provide large tubes for connecting hosting ISPs to access ISPs.

PuTTY
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols: logging in to a multiuser computer from another, over a network. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session: the end at which the session is displayed, rather than the end at which it runs.

How Link Is Provided


First customer demands for the network connection to the AES (Airtel Enterprise Service) according to their requirements like type of connection or speed. After taking orders from the customers AES forward those details to the TNG (Transport Network Group) then TNG configure those links and then connection will establish from company to customer end.

MPLS
Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next with the help of labels. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol.

87

The Router
A Router is a layer 3 network device that moves data between different network segments and can look into a packet header to determine the best path for the packet to travel. Routers can connect network segments that use different protocols. They also allow all users in a network to share a single connection to the Internet or a WAN.

The Switch
A switch is layer 1 network device used in a wired network to connect Ethernet cables from a number of devices together. The switch allows each device to talk to the others. Switches aren't used in networks with only wireless connections, since network devices such as routers and adapters communicate directly with one another, with nothing in between.

IBM TIvoli netcool


IBM Tivoli Netcool software delivers real-time, centralized supervision and event management for complex IT domains and next-generation network environments. With scalability that exceeds many millions of events per day, Tivoli Netcool offers round-theclock management and high automation to help you deliver continuous uptime of business, IT and network services.

MetaSolv Solutions
As the communication industry continues its rapid and complex evolution, the core business imperatives are adapting to address these changes. MetaSolv helps us to meet the ongoing challenges of the communications industry, enabling us to deliver effective customer services, reduce operating costs, providing automated end-to-end service provisioning, reduce errors and enhance revenue. MetaSolv's robust portfolio of OSS solutions provides integrated or modular capabilities for Order Management, Inventory Management, Service Activation, and Network Mediation that enables us to achieve effective flow-through provisioning across all network layers, interaction with all network equipment, communication via any network technology, and delivery of any type of service.
88

Glossary
CAPEX:-Capital Expenditure 3G:-3rd Generation
89

DSL:-Digital Subscriber Line OPEX:-Operating Expense NOC:-Network Operation Centre SLA:-Service Level Agreement OSS:-Operation Support System SSH:-Secure Shell FTP:-File Transfer Protocol IPv4:-Internet Protocol Version 4 IT:-Information Technology ex:-Example IPv6:-Internet Protocol Version 6 RFP:- Request For Proposal MPLS:-Multiprotocol Label Switching BGP:-Border Gateway Protocol i.e:-That is QOS:-Quality Of Service CLNS:-Connectionless Service POP:-Point Of Presence NTFS:-New Technology File System WAN:-Wide Area Network AES :-Airtel Enterprise Service W.r.t:-With Respect To ISP:- Internet service provider

90

QoE :-Quality Of Experience IP:-Internet Protocol NGN :-Next Generation Networks NIXI:-National Internet Exchange Of India GUI:-Graphical User Interface

91

Anda mungkin juga menyukai