Application of satellite communication , Computer Networking

Assignment Help:

Application of Satellite Communication started with the installation and commissioning of STD- “B” Earth Station having 11m diameter antenna in 1982, Initially with to only three carriers. Gradually circuits in this Earth Station started growing. This was the first gateway for international traffic at that time. Later on V-Sat hub also added to provide rural connectivity where establishing micro-wave or optical-fibre network is not possible. . Nepal is a mountainous country where 75% of the areas are geographically isolated and inaccessible, making it very difficult to provide communication systems. Government of Nepal has the policy to connect each and every village development committees (VDC) and provide reliable communication. It has raised very enthusiastic and ambitious national slogan “Every hand should have mobile and every home should have internet”. To achieve this goal, across the geographically inaccessible areas, Sagarmatha Earth station has played a vital role by enabling Satellite based Communication Systems. Sagarmatha Earth station is also working as a gateway for international traffic which has 37 carriers of 2 Mbps link, directly connected with 18 countries and 12 operators with about 4587 international voice circuits. Total 5 different systems from this Earth Station are operating for various types of services on 24*7 basis. So reliability of this earth station is very important. A short description of all the systems is given below:

S.No

Band

Antenna

Size

Installed Date

Services

1

C

11 m

 

 

 

16.4 m

 

 

 

9 m

1982

 

 

 

1996

 

 

 

2001

International IDR carrier

International IDR carrier,

 

Occasional TV, Internet down link

 

STM    V-Sat,    R-Sat,    CDMA GSM back haul

2

Ku

6.4 m

2004

Back haul for CDMA & GSM

for  rural  communication,  F1

Station      for      rural      voice communication, R-SAT

3

Ku

6.4

2009

Back haul for CDMA, GSM, Voice     &     Data     for     rural

telephony

4

Ku

1.2

2009

Test terminal for remote site

for voice

5

Ku

1.8

2009

Test terminal for CDMA back

haul link

6

Ku

1.8

2009

Test  terminal  for  GSM  back haul link

Total No of  antennas=8


Related Discussions:- Application of satellite communication

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Estimate of average delay deviation, Consider the procedure described for e...

Consider the procedure described for estimating average delay di. Suppose that u=0.1. Let r1-t1 be the most recent sample delay, let     r2 -t2 be the next most recent sample delay

What is domain name, Domain Name A domain name is a way to recognize an...

Domain Name A domain name is a way to recognize and locate computers connected to the Internet.  This is a text name of a computer in network or Internet. Domain names are chan

What is data encapsulation, What is data encapsulation? Data encapsulat...

What is data encapsulation? Data encapsulation is the method of breaking down information into smaller manageable chunks before it is transferred across the network. It is also

What is proxy serer and firewall, What is Proxy Sever and Firewall Pro...

What is Proxy Sever and Firewall Proxy Sever Also known as a proxy or application level gateway. It is an application that breaks the connection among sender and receiver.

Data types in distributed enrollment protocol, Data Types Each data typ...

Data Types Each data type of Table 1 must be sent according to the specifications below. [INT] Each value of this type is sent as the string representation of the corre

Configure VTP Pruning on the Switches- CCNA, Configure VTP Pruning on the S...

Configure VTP Pruning on the Switche s VTP pruning allows a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN.

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Distinguish between udp and tcp, Question: (a) Distinguish between UDP ...

Question: (a) Distinguish between UDP and TCP. (b) You have been asked to design and implement a chat application for a university. Which protocol could you used TCP or UDP

What is region, What is region? When hierarchical routing is used, the ...

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd