Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Nagaraja G S, Shrihari , Varsha T
DOI Link: https://doi.org/10.22214/ijraset.2023.51176
Certificate: View Certificate
Nodes are building blocks of telecommunication network which are interconnected by telecommunication links for exchanging messages and data. Broadband Integrated Services Digital Network commonly called as Broadband ISDN or B-ISDN is a high-speed telecommunication network that carry data, voice and video simultaneously over a single channel. It provides interactive services where there is bidirectional flow of information between one or more subscribers and a service provider or distributive services with unidirectional information flow between service provider and subscriber. Speed of B-ISDN normally ranges from 2 Mbps to 1 Gbps and transmission very much relates to Asynchronous Transfer Mode. To design B-ISDN services for small scale organization, resource management and organization requirements play an important role. This paper provides a design of network model and implementation of broadband services for a small-scale organization by considering advance technology requirements, the challenges faced during the implementation and total estimation of budget for entire implementation.
I. INTRODUCTION
Broadband services usually refer to the high-speed internet access which is faster than the traditional dial-up services. In the early days, the telecommunication industry believed that digital services followed same pattern as of voice services in the public switched telephone network. So, they came up with end-to-end circuit switched network that uses high-speed packet switching services called B-ISDN services. The key technology developments for B-ISDN include optical fiber transmission system which provide low cost and high data rate transmission channels for subscribers, microelectric circuits that provide high-speed, low-cost building blocks for switching, transmission and high-quality video monitors and cameras with efficient production quality at minimum cost.
B-ISDN services work on the underlying principle of asynchronous transfer mode (ATM) whose major objective is to transport and route voice, data and video. It supplies the necessary transmission facility using the underlying digital format provided by ATM.
B-ISDN is an extension of ISDN as it pocess both narrowband and broadband capability. The major objective of B-ISDN is to achieve complete integration of services ranging from low-bit-rate burst signals to high-bit-rate continuous real-time signals. Fiber optic cables are used for all the transmission services.
II. LITERATURE SURVEY
In [1], the author discusses about using power line as a local loop in communication for a wide range of customer services in low voltage distribution network. When local loop is integrated in the B-ISDN network, it provides a potential of integrating customer homes into wide area network (WAN) architecture. To evaluate the quality of service provided by B-ISDN, it is very important to formulate a mathematical model which includes parameters like topology, input traffic and routing. [2] presents a mathematical model of routing in B-ISDN with the technology of ATM.
In [3], the author discusses about the routing protocols which play an important in discovering and maintaining the routes in network to provide the services required. If the protocols used are consuming less energy, then the lifetime of the network will be increased which is an added advantage. Secure data transmission is a major challenge in a network. All security mechanisms don’t bind well in all the networks because of limited memory resources and energy constraints. Author in [4] proposes a threshold cryptography based key management mechanism to protect the network from intruders. While designing any network, the major quality of service (QoS) parameters that has to be considered are throughput and fairness. Both these parameters should be maximum for any network or system that is designed. So, in [5] the author discusses scheduling algorithms that can be used in the network to increase the throughput and fairness.
III. RESOURCE MANAGEMENT AND REQUIREMENTS
Resource management is very much essential for setting up an efficient business model for any small-scale organization or an industry. Some of the major resource management considerations while setting up a business model are described here.
Determining bandwidth requirement based on type of data that has to be transmitted and number of users using the network simultaneously. Evaluating the existing network infrastructure, examining the current hardware and software requirements and determining the need for upgrades and new equipment. Using robust security protocols to protect the network and data from cyber threats which includes implementing firewalls, encryption and access control techniques. Backup systems should be kept in place in case of network failure which includes backup servers, power supplies and connectivity options. An organization will have a potential growth of users. So, it is very much important to consider scalability of network model to accommodate additional data traffic and users. Planning a budget to implement and maintain the network which include costs for hardware, software and security measures. Planning the staffing requirements which includes network administrators, security specialists and technical support personnel. The advanced technology requirements to implement broadband services for 100 employees are high-speed broadband internet connection with minimum 100 Mbps download and 50 Mbps upload speed. Robust network infrastructure which includes high-quality routers, switches and cabling to support broadband service. Wireless Access Points to provide wireless connectivity to mobile devices within the organization. Robust firewall and security solutions that are needed to protect the network from cyber- attacks. Network management software which is required to monitor and manage the network. Voice over Internet Protocol telephone system which is required to provide reliable communication channels. Cloud services required for data storage, collaboration and other cloud-based applications.
IV. METHODOLOGY AND ITS IMPLEMENTATION
Enterprise network lays down the foundation for any industry or small-scale organization. It allows effective and profitable communication of business information with the employees and different departments in an organization. Network equipments used to build the network should provide quality of service and consume less energy. Though the same equipments are used to build the network, the performance of network varies from one location to other because of environmental factors.
Consider a secured IT network which is used in an organization for secure communication and sharing of data, files and resources within the organization. This network avoids unauthorized access into the network by blocking unauthorized users. A logical network topology has been implemented where each routers have been safe guarded with passwords to access them by the user. The network topology implemented connects different departments of a small-scale organization in one location to different location into a single network. Routers have been implemented in such a way that each of them should select efficient path for communication so that the data or the information is exchanged in a fast and secure manner. Fig 1 describes the network topology that has been implemented to provide broadband services in a small-scale organization. The network topology has 5 routers. There is one main router in Delhi (Router 1) which is connected to Nirman Vihar router (router 2) and Vaishali router (Router 3). The router 3 is then connected to Ghaziabad router (router 4) and Dwarka router (Router 5). The headquarter of the company is situated in Delhi and its router is password protected. Other offices of the company are situated in Dwarka, Nirman Vihar, Ghaziabad and Vaishali. Cables are used to connect routers with switches and switches with personal computers (PCs). PCs are connected to the network through the wireless routers. Serial data terminal equipment (DTE) is used to connect all the routers together.
The network topology is implemented for secure communication of data and information and to provide broadband services for a small-scale organization. The estimated budget for implementing broadband services in a small-scale organization consisting 100 employees can be around 5 to 8 lakhs for the initial implementation which includes the cost of equipment, installation and configuration. This cost may vary depending on various factors like existing infrastructure, the required upgrades and cost of hardware and software. The maintenance cost can vary somewhere around 1 to 2 lakhs which includes fault identification, repair and replacement. While considering the budget for implementing broadband services in any small-scale organization, the cost of technical expertise, security solutions and cloud services should also be considered. While implementing the network topology, there are many challenges that come across. Some of the major challenges that are faced are limited budget as implementing broadband services can be pretty much expensive and many of the small-scale organization may not have that much budget. Infrastructure upgrades are always required to support the broadband services. When the number of employees or the users of service increases in an organization, there is severe chances of bandwidth congestion which leads to slow network speeds. To safe- guard the network from various cyber attacks and data breaches which are very common in these days, a robust security solution is always required to protect the network. It is very important for an organization to hire technical experts for managing the network and address the technical issues that may arise in the network.
[1] J. Newbury and W. Miller, \"Potential communication services using power line carriers and broadband integrated services digital network,\" in IEEE Transactions on Power Delivery, vol. 14, no. 4, pp. 1197-1201, Oct. 1999, doi: 10.1109/61.796206. [2] S. N. Novikov, \"A mathematical model of routing in B- ISDN with ATM technology,\" Proceedings, 6th International Conference on Actual Problems of Electronic Instrument Engineering, Novosibirsk, Russia, 2002, pp. 173-175, doi: 10.1109/APEIE.2002.1075817. [3] Spandan, Gunti, et al. \"Data aggregation protocols in wireless sensor networks.\" International Journal of Computational Engineering Research 3.5 (2013): 18-24. [4] K. Hamsha and G. S. Nagaraja, \"Analysis of security mechanism using threshold cryptography for hierarchical wireless sensor networks,\" 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2017, pp. 1938-1941, doi: 10.1109/ICCSP.2017.8286737. [5] Praveena T, Nagaraja G S, Shashank C S and N. Reddy, \"A novel Scheduling Algorithm emphasizing fairness for Cross Layer Design in wireless networks,\" 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India, 2016, pp. 210-215, doi: 10.1109/CSITSS.2016.7779424. [6] T. Haru, J. Akiba, T. Kishida and Y. Kondo, \"Study on call model of advanced intelligent network for controlling B-ISDN,\" Proceedings of IN\'96, Melbourne, VIC, Australia, 1996, pp. 0_42-, doi: 10.1109/INW.1996.539692. [7] O. T. W. Yu and V. C. M. Leung, \"B-ISDN architectures and protocols to support wireless personal communications internetworking,\" Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, ON, Canada, 1995, pp. 768-772 vol.2, doi: 10.1109/PIMRC.1995.480973. [8] V. Carmagnola, F. Cuomo and M. Ferretti, \"A layered approach for IN call modelling for the support of multimedia services in a B-ISDN environment,\" Proceedings of ICC/SUPERCOMM \'96 - International Conference on Communications, Dallas, TX, USA, 1996, pp. 952-956 vol.2, doi: 10.1109/ICC.1996.541352. [9] R. Guarneri and C. J. M. Lanting, \"Frame relaying as a common access to N-ISDN and B-ISDN data services,\" in IEEE Communications Magazine, vol. 32, no. 6, pp. 39-43, June 1994, doi: 10.1109/35.286505. [10] N. Blefari-Melazzi, F. Cuomo and M. Listanti, \"IN call modelling for the support of multimedia and multipoint services in a B-ISDN,\" Proceedings of ICUPC - 5th International Conference on Universal Personal Communications, Cambridge, MA, USA, 1996, pp. 418-422 vol.1, doi: 10.1109/ICUPC.1996.557947. [11] Heesuk Park, Deayoung Kim, Seogsoon Ahn, Younguk Cha and Taesoo Chung, \"Network management for B-ISDN access networks,\" Proceedings of ICCS \'94, Singapore, 1994, pp. 784-788 vol.2, doi: 10.1109/ICCS.1994.474137. [12] O. T. W. Yu and V. C. M. Leung, \"Extending B-ISDN to support user terminal mobility over an ATM-based personal communications network,\" Proceedings of GLOBECOM \'95, Singapore, 1995, pp. 2289-2293 vol.3, doi: 10.1109/GLOCOM.1995.502809. [13] A. D. Liveris and E. D. Sykas, \"A DECT based wireless access scheme for B-ISDN,\" Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No.99CH36324), Amsterdam, Netherlands, 1999, pp. 1294- 1298 vol.2, doi: 10.1109/VETECF.1999.798645. [14] Lei Weilu, \"Some strategy of routing in the B-ISDN,\" Proceedings of TENCON \'93. IEEE Region 10 International Conference on Computers, Communications and Automation, Beijing, China, 1993, pp. 224-227 vol.3, doi: 10.1109/TENCON.1993.327963. [15] T. Van Landegem and P. Vankwikelberge, \"The evolution of connectionless service support in B-ISDN,\" Fourth IEE Conference on Telecommunications 1993, Manchester, UK, 1993, pp. 61-66. [16] Seok Cheon Park, Bong Young Lee, Yong Seok Yang and Seong Jea Park, \"Verification of interworking protocol of B-ISDN and PSPDN,\" TENCON \'97 Brisbane - Australia. Proceedings of IEEE TENCON \'97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162), Brisbane, QLD, Australia, 1997, pp. 645-648 vol.2, doi: 10.1109/TENCON.1997.648503. [17] L. Cipriani, G. Fruscio, V. Petrone and M. Pugliese, \"Design of a signalling server for the support of multipoint- to-multipoint calls through standard B-ISDN signalling protocols,\" IEEE GLOBECOM 1998 (Cat. NO. 98CH36250), Sydney, NSW, Australia, 1998, pp. 728-733 vol.2, doi: 10.1109/GLOCOM.1998.776833. [18] Y. Takasaki, \"Upgrading strategies for B-ISDN architectures and services,\" Proceedings of GLOBECOM \'93. IEEE Global Telecommunications Conference, Houston, TX, USA, 1993, pp. 1531-1535 vol.3, doi: 10.1109/GLOCOM.1993.318327. [19] F. Cuomo, M. Listanti and F. Pozzi, \"Provision of the broadband video conference service via the integration of the IN and B-ISDN paradigms,\" GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record, Phoenix, AZ, USA, 1997, pp. 155-159 vol.1, doi: 10.1109/GLOCOM.1997.632530. [20] M. Gagnaire and A. Thelen, \"Comparison of UPC mechanisms in a DQDB/B-ISDN gateway,\" Proceedings of 19th Conference on Local Computer Networks, Minneapolis, MN, USA, 1994, pp. 108-117, doi: 10.1109/LCN.1994.386609. [21] D. Delisle and L. Pelamougues, \"A guide to data communications: B-ISDN and how it works,\" in IEEE Spectrum, vol. 28, no. 8, pp. 39-42, Aug. 1991, doi: 10.1109/6.83489. [22] J. P. Katoen, \"Functional integration of UMTS and B- ISDN,\" 1995 IEEE 45th Vehicular Technology Conference. Countdown to the Wireless Twenty-First Century, Chicago, IL, USA, 1995, pp. 160-164 vol.1, doi: 10.1109/VETEC.1995.504849. [23] P. Verbeeck, D. Deloddere and M. De Prycker, \"Introduction strategies towards B-ISDN for business and residential subscribers based on ATM,\" in IEEE Journal on Selected Areas in Communications, vol. 10, no. 9, pp. 1427- 1433, Dec. 1992, doi: 10.1109/49.184873. [24] M. Burak, \"Intelligent bridges and routers-a proposal for the LAN/MAN/B-ISDN environment,\" [Conference Record] GLOBECOM \'92 - Communications for Global Users: IEEE, Orlando, FL, USA, 1992, pp. 1234-1239 vol.2, doi: 10.1109/GLOCOM.1992.276589. [25] P. Martins, C. Rigault and N. Raguideau, \"Distributed network information systems for intelligent B-ISDN infrastructure,\" IN\'98. 7th IEEE Intelligent Network Workshop Proceedings (Cat. No.98TH8364), Bordeaux, France, 1998, pp. 345-360, doi: 10.1109/INW.1998.713284.
Copyright © 2023 Nagaraja G S, Shrihari , Varsha T. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET51176
Publish Date : 2023-04-28
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here