90
COMPUTER NETWORK DESIGN IN RDCIS, SAIL A PROJECT REPORT ON “COMPUTER NETWORK DESIGN IN RDCIS, SAIL” Submitted in partial fulfillment of the requirement for the Post Graduate Diploma In Information Management By DEVESH KUMAR UPADHYAY Under the Supervision of Mr. SANJAY KUMAR (RDCIS, RANCHI) By: Devesh Kumar Upadhyay 1

I.T. Project

Embed Size (px)

Citation preview

Page 1: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

A PROJECT REPORT

ON

“COMPUTER NETWORK DESIGN IN RDCIS, SAIL”

Submitted in partial fulfillment of the requirement for the

Post Graduate Diploma

In

Information Management

By

DEVESH KUMAR UPADHYAY

Under the Supervision of

Mr. SANJAY KUMAR(RDCIS, RANCHI)

St. Xavier Institute Social Service, Ranchi

2010-2012

By: Devesh Kumar Upadhyay 1

Page 2: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

This is to certify that the project report entitled “CMPUTER NETWORK DESIGN IN RDCIS, SAIL” has been prepared by Mr. SHIV BARAN GUPTA, DEVESH KUMAR UPADHYAY, RANJAN KUMAR, DEVESH KUMAR JHA, LOKESH KUMAR UPADHYAY in partial fulfillment of Post Graduate Diploma in Information Management at “Xavier’s Institute of Social Service, Ranchi”.

This project is completed under the guidance of Mr. Sanjay Kumar, Assistant General Manager, R & D Centre for Iron and Steel (RDCIS), Ranchi and hereby approved as indicating the proficiency of the candidate.

Date: Name of the Guide: Sanjay Kumar

Designation: Assistant General Manager, (RDCIS), Ranchi

By: Devesh Kumar Upadhyay 2

Certificate

Page 3: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Completion of any work depends upon the co-operation, co-ordination and efforts of many. We wish to place on record our gratitude and sincere thanks to Prof. Dr. Viplava Thakur professor information department (XISS), Mr. Sanjay Kumar Assistant General manager for his commitments (SAIL), he was a great source of inspiration and extremely valued guidance and helping me to overcome all hurdles in the preparation of our project on CMPUTER NETWOR DESIGN IN RDCIS, SAIL. We feel confident that the knowledge, which we gained during this short span, shall work as guide to me in growth of my career and future endeavors.

DEVESH KUMAR UPADHYAYA (XISS)

By: Devesh Kumar Upadhyay 3

Acknowledgement

Page 4: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

CONTENTS : SL. NO. TOPIC PAGE NO.1 ABOUT SAIL

Company Profile Sail Vision C&IT Dept

5

2 Computer Network 103 Properties of Computer Network 124 Communication Media

Wired Wireless

14

5 Basic Hardware Components 186 Network Topology 247 OSI Model 368 Local Area Network 469 About RDCIS LAN 4810 Existing LAN 5011 Proposed LAN 5112 Scope of Work 5213 List of Equipments 6314 Network Layout Diagrams 6915 Experimental Study 7216 Final Acceptance Test

Result and Discussion Technological benefits Learning Points

74

17 Conclusion 7718 References 78

COMPANY PROFILE

By: Devesh Kumar Upadhyay 4

Page 5: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

STEEL AYTHORITY OF INDIA LIMITED

With a production capacity of 13 million tonnes (MT) of crude steel, Steel Authority Of India Limited (SAIL) is India’s largest steel maker and ranks among the leading steel producers in the world. In 2005 -2006, it recovered a net profit of Rs. 4013 crores on a turnover of Rs.32280 crores.

Sail owns and operates 8 manufacturing plants ,5 integrated steel plant at Bhilai ,Durgapur, Rourkela, Bokaro and Burnpur producing carbon steels and three specially steel plants at Salen, Durgapur and Bhadravati. SAIL’s subsidiary at Chandrapur is a bulk producer of Ferro alloys.

SAIL VISION:

To be respected world-class corporation and the leader in Indian steel business in quality, productivity, profitability and customer satisfaction.

CREDO:

We build lasting relation with customers based on trust and mutual benefit.

We uphold highest ethical standards in contract of our business.

We create and nurture a culture that supports flexibility ,learning and is proactive to change

We chart a challenging career for employees with opportunities for advancement and rewards

We value the opportunity and responsibility to make a meaningful difference in people`s lives.

CORE VALUES:-

By: Devesh Kumar Upadhyay 5

Page 6: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Customer Satisfaction : Customer comes first every time. Concern for people : Talent of employee is company`s

greatest asset Consistent of profitability : Consistent profitability is essential

for growth. Commitment to excellence : SAIL does it better.

SAFETY POLICY:

SAIL is committed to:

Safety of its employees and the people associated with it including those living in the neighborhood of its plants, mines and units.

Pursue safety efforts in a sustained and consistent way by establishing safety goals, demanding accountability for safety performance and providing resources to make safety programmers work.

GUIDING PRINCIPLES:-

They firmly believe that all accidents are preventable All employees are responsible and accountable for maintain safety

standards. Safety standards can be incorporated in all our work procedures. Imparting training to create safety consciousness & to work safely

to be a key element of safety programmes. Safety to be enhanced through participative committees and other. Comprehensive and regular audit of the safety performance to be

conducted.

By: Devesh Kumar Upadhyay 6

Page 7: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

QUALITY POLICY:-

Company shall build and sustain a world class organization, where quality is the hallmark of every process and activity.

With the involvement and declaration of their human resources, they are committed to achieve satisfaction of all stakeholders, through innovation and continual improvement.

UNIQUE FEATURES:

The company has the distinction of being India’s largest producer of iron ore .Owing India’s second largest mines network provides SAIL a competitive edge in terms of captive availability of iron ore and flux. SAIL’S R&D centre for iron &steel at Ranchi, equipped with the latest diagnostic facilities, is considered as being the best of its kind in Asia.

SERVING SEGMENT:

SAIL manufactures critical items such as rails & wheels/axles for Indian Railways and wide plates to service niche markets. The company is also among the select few manufactures of API grade steel in the country meeting the stringent demand of the oils and gas transportation sector.

Among the other key sectors where SAIL steel has a strong presence are construction, automobile, defence, heavy engineering, fabrication, pipes and tubes, cold reducing cycle, drum &barrel, containers , white goods ,

By: Devesh Kumar Upadhyay 7

Page 8: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

coated sheets, wire drawing, agricultural equipment and electrical equipment.

CORPORATE SOCIAL RESPONSIBILITY:Apart from providing primary medical, health and educational facilities to the

people living in and around its townships, SAIL has been undertaking several

initiative to promote art and culture of the Country. With four sports

academies under its fold, SAIL continues to promote sports as an integral

part of the company’s corporate philosophy.

C & IT Department, (RDCIS), SAIL:The software development division of RDCIS has over two decades of experience in executing large software and networking project encompassing design, development testing, implementation and maintenance. Backed by a team of experienced software professionals and a sophisticated software development lab, it is suitably placed to take up challenging software projects.

“The team of computer professionals at RDCIS deserves all appreciation for developing software system to our greatest satisfaction.”

By: Devesh Kumar Upadhyay 8

Page 9: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

“The Computerization and Software development division of RDCIS has always provided us with high-quality services and we have immensely benefited by our association with them.”

Computer NetworkA computer network is a group of two or more computers connected to each electronically. This means that the computers can "talk" to each other and that every computer in the network can send information to the others. Usually, this means that the speed of the connection is fast - faster than a normal connection to the Internet.

Some basic types of computer networks include:

By: Devesh Kumar Upadhyay 9

Page 10: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

A local area network (often called a LAN) connects two or more computers, and may be called a corporate network in an office or business setting.

An "internetwork", sometimes called a Wide Area Network (because of the wide distance between networks) connects two or more smaller networks together. The largest internetwork is called the Internet.

Computers can be part of several different networks. Networks can also be parts of bigger networks. The local area network in a small business is usually connected to the corporate network of the larger company. Any connected machine at any level of the organization may be able to access the Internet, for example to demonstrate computers in the store, display its catalogue through a web server, or convert received orders into shipping instructions.

Types of Network

By: Devesh Kumar Upadhyay 10

Page 11: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

LAN - Local Area Network

WLAN - Wireless Local Area Network

WAN - Wide Area Network

MAN - Metropolitan Area Network

SAN - Storage Area Network, System Area Network, Server Area Network,

or sometimes Small Area Network

VPN - virtual private network

Properties

Computer networks:

Facilitate Communications

Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.

Permit sharing of files, data, and other types of information

By: Devesh Kumar Upadhyay 11

Page 12: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

In a network environment, authorized users may access data and information stored on other computers on the network. The capability of providing access to data & information on shared storage devices is an important feature of many networks.

Share network and computing resources

In a networked environment, each computer on a network may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks.

May be insecure

A computer network may be used by computer hackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from normally accessing the network (denial of service).

May interfere with other technologies

Power line communication strongly disturbs certain forms of radio communication, e.g., amateur radio. It may also interfere with last mile access technologies such as ADSL and VDSL.

May be difficult to set up

A complex computer network may be difficult to set up. It may also be very costly to set up an effective computer network in a large organization or company.

By: Devesh Kumar Upadhyay 12

Page 13: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Communication Media

Computer networks can be classified according to the hardware and associated software technology that is used to interconnect the individual devices in the network, such as electrical cable (HomePNA, power line communication, G.hn), optical fiber, and radio waves (wireless LAN).

A well-known family of communication media is collectively known as Ethernet. It is defined by IEEE 802 and utilizes various standards and media that enable communication between devices. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.

By: Devesh Kumar Upadhyay 13

Page 14: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Wired Technologies

Twisted pair wire is the most widely used medium for telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer networking cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are rated in categories which are manufactured in different increments for various scenarios.

Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second.ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.

Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers that carries data by means of pulses of light. It transmits light which can travel over extended distances. Fiber-optic cables are not affected by electromagnetic radiation. Transmission

By: Devesh Kumar Upadhyay 14

Page 15: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

speed may reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than a twisted-pair wire. This capacity may be further increased by the use of colored light, i.e., light of multiple wavelengths. Instead of carrying one message in a stream of monochromatic light impulses, this technology can carry multiple signals in a single fiber.

Wireless Technologies

Terrestrial microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx, 48 km (30 miles) apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.

Communications satellites – The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 35,400 km (22,200 miles) (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.

Cellular and PCS systems – Use several radio communications technologies. The systems are divided to different geographic areas.

By: Devesh Kumar Upadhyay 15

Page 16: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.

Wireless LANs – Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. An example of open-standards wireless radio-wave technology is IEEE.

Infrared communication can - transmit signals between devices within small distances of typically no more than 10 meters. In most cases, line-of-sight propagation is used, which limits the physical positioning of communicating devices.

A global area network - (GAN) is a network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless LANs.

By: Devesh Kumar Upadhyay 16

Page 17: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Basic Hardware ComponentsApart from the physical communications media themselves as described above, networks comprise additional basic hardware building blocks interconnecting their terminals, such as network interface cards (NICs), hubs, bridges, switches, and routers.

Network Interface CardsA network card, network adapter, or NIC (network interface card) is a piece of computer hardware designed to allow computers to physically access a networking medium. It provides a low-level addressing system through the use of MAC addresses.

Each Ethernet network interface has a unique MAC address which is usually stored in a small memory device on the card, allowing any device to connect to the network without creating an address conflict. Ethernet MAC addresses are composed of six octets. Uniqueness is maintained by the IEEE, which manages the Ethernet address space by assigning 3-octet prefixes to equipment manufacturers. The list of prefixes is publicly available. Each

By: Devesh Kumar Upadhyay 17

Page 18: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

manufacturer is then obliged to both use only their assigned prefix (es) and to uniquely set the 3-octet suffix of every Ethernet interface they produce.

Repeaters And Hubs

A repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the Physical Layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule).

By: Devesh Kumar Upadhyay 18

Page 19: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address to that port only.

Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

By: Devesh Kumar Upadhyay 19

Page 20: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Local bridges: Directly connect local area networks (LANs) Remote bridges: Can be used to create a wide area network (WAN) link

between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers.

Wireless bridges: Can be used to join LANs or connect remote stations to LANs.

Switches

A network switch is a device that forwards and filters OSI layer 2 datagrams (chunks of data communication) between ports (connected cables) based on the MAC addresses in the packets.[15] A switch is distinct from a hub in that it only forwards the frames to the ports involved in the communication rather than all ports connected. A switch breaks the collision domain but represents itself as a broadcast domain. Switches make forwarding decisions of frames on the basis of MAC addresses. A switch normally has numerous ports, facilitating a star topology for devices, and cascading additional switches.

By: Devesh Kumar Upadhyay 20

Page 21: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

[16] Some switches are capable of routing based on Layer 3 addressing or additional logical levels; these are called multi-layer switches. The term switch is used loosely in marketing to encompass devices including routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier).

Routers

A router is an internetworking device that forwards packets between networks by processing information found in the datagram or packet (Internet protocol information from Layer 3 of the OSI Model). In many situations, this information is processed in conjunction with the routing table (also known as forwarding table). Routers use routing tables to determine what interface to forward packets (this can include the "null" also known as the "black hole" interface because data can go into it, however, no further processing is done for said data).

By: Devesh Kumar Upadhyay 21

Page 22: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Firewalls

A firewall is an important aspect of a network with respect to security. It typically rejects access requests from unsafe sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc.

By: Devesh Kumar Upadhyay 22

Page 23: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Network Topology

Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer[1][2] or biological network.[3] Network topologies may be physical or logical. Physical topology refers to the the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. In general physical topology relates to a core network whereas logical topology relates to basic network.

Topology Classification

There are two basic categories of network topologies:

Physical topologies Logical topologies

The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits.

The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair Ethernet using repeater hubs was a logical bus topology with a physical star topology layout. Token Ring is a logical ring topology, but is wired a physical star from the Media Access Unit.

The study of network topology recognizes six basic topologies:

By: Devesh Kumar Upadhyay 23

Page 24: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Point-to-point Bus Star Ring Mesh Tree

Point-To-Point

The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is unimpeded communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed asMetcalfe's Law.

Permanent (dedicated)

Easiest to understand, of the variations of point-to-point topology, is a point-to-point communications channel that appears, to the user, to be permanently associated with the two endpoints. A children's tin can telephone is one example of a physical dedicated channel.

Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, for example, a television circuit from a parade route back to the studio.

Switched:

By: Devesh Kumar Upadhyay 24

Page 25: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony

BusBus Network

Bus Network TopologyIn local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the

By: Devesh Kumar Upadhyay 25

Page 26: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

single point of failure. If the network cable breaks, the entire network will be down.

Linear Bus

The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) – all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network simultaneously.

Note: The two endpoints of the common transmission medium are normally terminated with a device called a terminator that exhibits the characteristic impedance of the transmission medium and which dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or propagated back onto the transmission medium in the opposite direction, which would cause interference with and degradation of the signals on the transmission medium.

Distributed bus

The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium – the physical distributed bus topology functions in exactly the same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium).

Notes :

By: Devesh Kumar Upadhyay 26

Page 27: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

1. All of the endpoints of the common transmission medium are normally terminated.

2. The linear bus topology is sometimes considered to be a special case of the distributed bus topology – i.e., a distributed bus with no branching segments.

3. The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology – however, although the physical distributed bus topology resembles the physical tree topology, it differs from the physical tree topology in that there is no central node to which any other nodes are connected, since this hierarchical functionality is replaced by the common bus.

Star Star network

Star Network Topology

By: Devesh Kumar Upadhyay 27

Page 28: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.

Notes

1. A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology – therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary.

2. After the special case of the point-to-point link, as in note (1) above, the next simplest type of network that is based upon the physical star topology would consist of one central node – the 'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.

3. Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node.

4. Star networks may also be described as either broadcast multi-access or no broadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication.

By: Devesh Kumar Upadhyay 28

Page 29: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Extended Star:

A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based.

If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies.

Distributed Star

A type of network topology that is composed of individual networks that are based upon the physical star topology connected together in a linear fashion – i.e., 'daisy-chained' – with no central or top level connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or 'spokes').

RingRing network

By: Devesh Kumar Upadhyay 29

Page 30: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Ring Network TopologyA network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.

MeshMesh Networking

By: Devesh Kumar Upadhyay 30

Page 31: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law.

Fully Connected

Fully connected mesh topology

The number of connections in a full mesh = n(n - 1) / 2.

Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.

Partially Connected

By: Devesh Kumar Upadhyay 31

Page 32: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Partially connected mesh topologyThe type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.

Note: In most practical networks that are based upon the partially connected mesh topology, all of the data that is transmitted between nodes in the network takes the shortest path between nodes, except in the case of a failure or break in one of the links, in which case the data takes an alternative path to the destination. This requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the correct path to use at any particular time.

Tree

Tree Network

By: Devesh Kumar Upadhyay 32

Page 33: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Tree Network Topology:

The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral nodes.

1. A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star.

2. A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology.

By: Devesh Kumar Upadhyay 33

Page 34: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

3. The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes in the network require ports for connection to other nodes the total number of ports per node may be kept low even though the total number of nodes is large – this makes the effect of the cost of adding ports to each node totally dependent upon the branching factor and may therefore be kept as low as required without any effect upon the total number of nodes that are possible.

4. The total number of point-to-point links in a network that is based upon the physical hierarchical topology will be one less than the total number of nodes in the network.

5. If the nodes in a network that is based upon the physical hierarchical topology are required to perform any processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes that are lower in the hierarchy. Such a type of network topology is very useful and highly recommended.

OSI modelThe Open Systems Interconnection model (OSI model) was a product of the Open Systems Interconnection effort at the International Organization for

By: Devesh Kumar Upadhyay 34

Page 35: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. Similar communication functions are grouped into logical layers. A layer provides services to its upper layer while receiving services from the layer below. On each layer, an instance provides service to the instances at the layer above and requests service from the layer below.

Layer 1: Physical LayerThe Physical Layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or optical cable. This includes the layout ofpins,

By: Devesh Kumar Upadhyay 35

Page 36: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

voltages, cable specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more.

To understand the function of the Physical Layer, contrast it with the functions of the Data Link Layer. Think of the Physical Layer as concerned primarily with the interaction of a single device with a medium, whereas the Data Link Layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. Standards such as RS-232 do use physical wires to control access to the medium.

The major functions and services performed by the Physical Layer are:

Establishment and termination of a connection to a communications medium.

Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.

Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the Data Link Layer. The same applies to other local-area networks, such as token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.

Layer 2: Data Link LayerThe Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of

By: Devesh Kumar Upadhyay 36

Page 37: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.

The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete Data Link Layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

Both WAN and LAN service arranges bits, from the Physical Layer, into logical sequences called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit stream is not used by the Layer.

WAN Protocol architectureConnection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They are also capable of controlling the rate of transmission. A WAN Data Link Layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for SDLC and HDLC, and derivatives of HDLC such as LAPB and LAPD.

By: Devesh Kumar Upadhyay 37

Page 38: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

IEEE 802 LAN architecturePractical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared medium, which is the function of a Media Access Control (MAC) sub layer. Above this MAC sub layer is the media-independent IEEE 802.2 Logical Link Control (LLC) sub layer, which deals with addressing and multiplexing on multi-access media.

While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sub layer detects but does not correct errors.

Layer 3: Network LayerThe Network Layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network, while maintaining the quality of service requested by the Transport Layer (in contrast to the data link layer which connects hosts within the same network). The Network Layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is not hierarchical.

Careful analysis of the Network Layer indicated that the Network Layer could have at least three sub layers:

1. Sub network Access – that considers protocols that deal with the interface to networks, such as X.25;

By: Devesh Kumar Upadhyay 38

Page 39: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

2. Sub network Dependent Convergence – when it is necessary to bring the level of a transit network up to the level of networks on either side;

3. Sub network Independent Convergence – which handles transfer across multiple networks.

The best example of this latter case is CLNP, or IPv7 ISO 8473. It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of erroneous packets so they may be discarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet access protocols because they carry interface addresses rather than node addresses.

A number of layer management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the Network Layer. These include routing protocols, multicast group management, Network Layer information and error, and Network Layer address assignment. It is the function of the payload that makes these belong to the Network Layer, not the protocol that carries them.

Layer 4: Transport LayerThe Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state- and connection -oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail. The Transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred.

By: Devesh Kumar Upadhyay 39

Page 40: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

Of the actual OSI protocols, there are five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least features) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries, both of which TCP is incapable.

Detailed characteristics of TP0-4 classes are shown in the following table :

Feature Name TP0 TP1 TP2 TP3 TP4

Connection oriented network Yes Yes Yes Yes Yes

Connectionless network No No No No Yes

Concatenation and separation No Yes Yes Yes Yes

By: Devesh Kumar Upadhyay 40

Page 41: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Segmentation and reassembly Yes Yes Yes Yes Yes

Error Recovery No Yes Yes Yes Yes

Reinitiate connection (if an excessive number of PDUs are unacknowledged) No Yes No Yes No

Multiplexing and demultiplexing over a single virtual circuit No No Yes Yes Yes

Explicit flow control No No Yes Yes Yes

Retransmission on timeout No No No No Yes

Reliable Transport Service No Yes No Yes Yes

Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the Transport Layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec. WhileGeneric Routing Encapsulation (GRE) might seem to be a Network Layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers

By: Devesh Kumar Upadhyay 41

Page 42: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packet.

Layer 5: Session LayerThe Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes check pointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session check pointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.

Layer 6: Presentation Layer

The Presentation Layer establishes context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack.

This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer.

By: Devesh Kumar Upadhyay 42

Page 43: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

The original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, orserialization of objects and other data structures from and to XML.

Layer 7: Application Layer

The Application Layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network or the requested communications exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application layer implementations also include:

On OSI stack:

FTAM File Transfer and Access Management Protocol X.400 Mail Common management information protocol (CMIP) On TCP/IP stack: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),

By: Devesh Kumar Upadhyay 43

Page 44: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Simple Mail Transfer Protocol (SMTP) Simple Network Management Protocol (SNMP).

Local Area Network

A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN).

Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.

By: Devesh Kumar Upadhyay 44

Page 45: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

There are many different types of LANs Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers.

The following characteristics differentiate one LAN from another:

Topology: The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line.

Protocols: The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture.

Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves.

LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited, and there is also a limit on the number of computers that can be attached to a single LAN.

By: Devesh Kumar Upadhyay 45

Page 46: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

INTRODUCTION ABOUT RDCIS LANResearch and development Centre for iron and Steel (RDCIS), Steel Authority of India Limited (SAIL) has Local Area Network (LAN) that was set up in nineties. This LAN is based on small Multi Mode (MM 62.5 micron) Fiber Optic (FO) backbone segment that supports 100 mbps speed. The FO run from computer centre in Administrative (ADM) building to Laboratory (LAB) building second Floor via Information & Documentation Centre (IDC). Approximate length of this FO segment is 300 meters. Down the Line LAN connectivity is based on Ethernet wire (mixure of CAT3, CAT5 & CAT6 cable)

By: Devesh Kumar Upadhyay 46

Page 47: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

supporting 10 mbps only. Initially the LAN was designed to support 100 nodes. However with span of time the LAN has been extended to 250+ nodes. This has been achieved by multiple cascading of network active devices used are unmanaged ones causing bottleneck for maintenance.

Presently there are several running LAN based application viz. finance, PF, Payroll, HRIS, EPMS, RDCIS Portal, Anti-Virus server, email and Internet etc. As a result there are more than 300 concurrent sessions sharing the LAN bandwidth. The end users experience slow transaction and connectivity failure at times. In the years to come the LAN needs to support application like ERP, Video Conferencing, and IP based surveillance system and IP telephony that will need higher bandwidth.

A network is required to be set up in RDCIS campus at Ranchi. It is imperative to set up the RDCIS LAN based on current technology that is robust, redundant, centrally manageable, secured and having higher bandwidth. This will provide redundant gigabit LAN backbone and 100 mbps speed at the leaf nodes. It should be possible to carry out the LAN administration centrally through Network Management Software (NMS). It shall be on a suitable platform for current as well as future upcoming applications and services.

The entire work is to be executed in existing condition. The party must visit the site before submitting the offer. Computer & Information Technology Group, RDCIS, SAIL will extend any support required during the visit. Party may carry out the necessary study and must quote for the items and services required in this regard on turnkey basis as per Technical Specifications (TS) including the supply of active and passive network devices, laying of cables-Fiber Optic as well as Ethernet cable, configuration of network devices, installation, configuration of NMS software and all other associated activities including on-site maintenance of the system for one year.

By: Devesh Kumar Upadhyay 47

Page 48: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

RDCIS LAN DAIGRAM

By: Devesh Kumar Upadhyay 48

Page 49: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

PROPOSED LAN

By: Devesh Kumar Upadhyay 49

Page 50: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Scope of Work

A network is set up in RDCIS campus at Ranchi. It is imperative to set up the RDCIS LAN based on current technology that is robust, redundant, centrally manageable, secured and having higher bandwidth. It is required to carry out the LAN administration centrally through Network Management Software (NMS). The entire is to be executed in existing condition.

All the items and services required in this regard has been on turnkey basis including the supply of active and passive network devices, laying of cables-Fibre Optic as well as Ethernet cable, configuration of network devices, installation, configuration of NMS software and all other associated activities including on-site maintenance of the system for one year.

The objective of the project was to set up gigabit fibre optic LAN backbone and providing minimum 100 mbps bandwidth at leaf node with provision for

By: Devesh Kumar Upadhyay 50

Page 51: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

gigabit bandwidth. The design has been done with a view to provide secure robustness, central manageability and homogeneity of network devices and overall redundancy of system for consistent 24x7 performances.

This new LAN infrastructure will be a communication platform for on-line applications and services that includes many concurrent LAN applications viz. IFA, PF, Payroll, HRIS, HRD, EPMS, Portal, e-mail & Internet and futuristic applications such as ERP, Video Conferencing & IP Telephony.

The scope was consisting of following broad categories:

Network Equipment: Supply, Installation, configuration, testing and commissioning of network equipment as per bill of materials, Commissioning and integration of active components, passive components and other accessories as per the requirement and three years warranty of all active network components and-comprehensive warranty of integrated LAN system for a period of one year from the date of Final Acceptance.

Network Equipments:-

The network equipments have been installed in different floors of ADM & LAB Building as indicated in Fig. - 1 at RDCIS, SAIL, RANCHI. The core switches (2 nos.) along with one Gbit fast switch and edge switch has been installed in computer centre (2nd, Floor ADM building) server room. Core switch have been back to back connected and edge switch have connectivity from both the core switch. In ADM building in 1st, 2nd, 3rd, 4th, and 5th floor two numbers of network edge switches per floor have been installed with direct MM FO connectivity to both the core switches located in Computer Centre. One of these switches has been on the site of the corridor while the other one have been on the other site. This is required to avoid crossing of the cable across the corridor affecting beautification, as there is no false ceiling in ADM Building. Location of Edge Switches is indicated in Fig-2. The

By: Devesh Kumar Upadhyay 51

Page 52: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

nomenclature used in the diagram is explained in Table-1. However there may be minor change in location of Edge Switch at the time of installation. The stacked switches have been configured to have one IP sharing the same FO port.

Approach:

Following approach has been adopted for smooth execution of the project:

Assessment of existing RDCIS LAN with futuristic requirement. Exploration of current technology and standards. Classical symmetric LAN design. Identification of components. Procurement. Training. Configuration & Implementation. Performance guarantee and evaluation of integration LAN. Drawing and documentation.

RDCIS has internet connection through proxy server that is connected through BSNL leased line. There are two leased lines from BSNL 256 kbps and 2 mbps line terminating at 2nd floor computer centre. RDCIS LAN has also one connection from SAILNET (Corporate Wide Network Provided by Reliance through MPLS Technology located at 5th floor ADM Building) for different on-line applications. This line is also used for inter unit video conferencing

By: Devesh Kumar Upadhyay 52

Page 53: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

system. In view of the security it has been decided to place hardware security device/hardware firewall [Unified Threat Management (UTM)] for connectivity of RDCIS LAN to outside world. The schematic diagram of the same is given below:

By: Devesh Kumar Upadhyay 53

Page 54: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Equipment & Design

Supply and laying of Fiber Optic Cable through secured routes, accessories for installation of network equipments has been done. LIU, patch panel, required type of FO patch cord, pig tails, FO splicing, connectors, adapters, rack & enclosures etc for the installation of supplied switch has been set up. Structured cabling standard has been followed in setting up the patch panels.

LAN Nodes:

Approximate number of leaf nodes room wise at each floor of ADM and number of leaf nodes floor wise summary in LAB Building is indicated in Table -3 and Table -4 respectively. The network connection has been routed through the plastic channels.

Required of LAN Nodes in Administrative Building

(False Ceiling exists only in 5 th floor)

Sl. No. Floor East side of the Corridor Number of LAN Nodes

West side of the Corridor Number of LAN Nodes

1. Ground Floor 12* 3**

By: Devesh Kumar Upadhyay 54

Page 55: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

2. First Floor 37** 12**

3. Second Floor 45 45

4. Third Floor 36 30

5. Fourth Floor 28 34

6. Fifth Floor 19 14

* Nodes on southern side of the Foyer

** Nodes on Northern side of the Foyer

Requirement of LAN Nodes in Laboratory Building

(False Ceiling exists in all floors)

Sl. No. Floor East part of the Corridor Number of LAN Nodes

West part of the Corridor Number of LAN Nodes

1. Ground Floor

24 24

2. First Floor 20 20

3. Second Floor 22 22

4. Third Floor 20 20

Fiber Optic Cable Termination & Patch Panel

The purpose of fiber termination is to provide easy ways for fiber cross connection and light wave signal distribution.  There are two types of fiber terminations: connector and splicing.

Fiber optic cable termination types:

Connector

Over the last two decades fiber industry manufacturers have developed at least a dozen types of fiber optics connectors.  The typical ones are FC, SC, ST, LC, MU, SMA and MTRJ.

By: Devesh Kumar Upadhyay 55

Page 56: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Splicing

Splicing is the process of connecting two bare fibers directly without any connectors. There are two methods of fiber optic splicing: mechanical splicing and fusion splicing.

Splicing Types Introduction

Mechanical Splicing

Mechanical splicing is an optical junction where two fibers are precisely aligned and held in place by a mechanical assembly. Mechanical splicing aligns two fiber ends to a common centerline so the light can pass from one fiber to another.

Mechanical splices are best suited for multimode fiber applications. Some mechanical splices have been introduced for single mode fibers, but they usually have a higher insertion loss (typically 0.1dB).

By: Devesh Kumar Upadhyay 56

Page 57: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Fusion Splicing

Fusion splicing is an optical junction of two optical fibers by permanently welding them together with heat generated by an electronic arc (called arc fusion).

The fusion splicing process begins by preparing each fiber end for fusion. Fusion splicing requires that all protective coatings be removed from the ends of each fiber. The fiber is then cleaved with high precision fiber cleavers. In fusion splicing, splice loss is a direct function of the angles and quality of the two fiber-end faces.

Connector termination type introduction

Quick termination fiber optic connectors

A quick termination fiber connector is actually a mini-pigtail housed in a connector body. There is a fiber stub already bonded into the ferrule in the factory, where the endface of the ferrule is polished to a PC finish. The other end of the fiber is cleaved and resides inside the connector body.

By: Devesh Kumar Upadhyay 57

Page 58: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

The field fiber is cleaved and inserted into the connector until it “butts up” against the fiber stub. A mechanical clamping process keeps the fiber in place and completes the connector with no epoxy or polishing required.

After strain relieving the fiber to the connector, it is ready to be mated to another connector inside an adapter.

Applications for quick termination fiber connectors:

Where a smaller number of connectors are necessary Where moves, adds, changes or testing are frequently performed LAN environments where the installer is required to move from

termination point to termination point (work areas, telecommunications outlets)

Where maintenance or restoration is required on an active network or system

Applications for traditional epoxy and polish fiber connectors:

Where a large number of connectors will be used Where added fiber retention is beneficial Where gel-filled cable is present Where unique buffer coatings or cable types are used Environmental conditions that are not aligned with TIA 568-B.3

(Outside Plant, Industrial, etc).

Patch Cord

A patch cable or patch cord is an electrical or optical cable used to connect ("patch-in") one electronic or optical device to another for signal routing. Devices of different types (i.e., a switch connected to a computer, or a switch to a router) are connected with patch cords. Patch cords are usually produced in many different colors so as to be easily

By: Devesh Kumar Upadhyay 58

Page 59: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

distinguishable, and are relatively short, perhaps no longer than two metres. Types of patch cords include microphone cables, headphone extension cables, XLR connector, Tiny Telephone (TT) connector, RCA connector and ¼" TRS connector cables (as well as modular Ethernet cables), and thicker, hose-like cords (snake cable) used to carry video or amplified signals. However, patch cords typically refer only to short cords used with patch panels.Patch cords can be as short as 3 inches (ca. 8 cm), to connect stacked components or route signals through a patch bay, or as long as twenty feet (ca. 6 m) or more in length for snake cables. As length increases, the cables are usually thicker and/or made with more shielding, to prevent signal loss (attenuation) and the introduction of unwanted radio frequencies and hum (electromagnetic interference).Patch cords are often made of coaxial cables, with a positive or "hot" signal carried through a shielded core, and a negative electrical ground or earthed return connection carried through a wire mesh surrounding the core. Each end of the cable is attached to a connector so that the cord may be plugged in. Connector types may vary widely, particularly with adapting cables.Patch cords may be:

single-conductor wires using, for example, banana connectors coaxial cables using, for example, BNC connectors Twisted pair Cat5, Cat5e, or Cat6 cables using 8P8C (RJ-45) modular

connectors with T568A or T568B wiring Optical fiber cablesA very short patch cable may be called a pigtail. These may be used, for example, to connect a wall-mounted telephone to the wall plate. The name may also be synonymous with a dongle if it is also an adapter.

By: Devesh Kumar Upadhyay 59

Page 60: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Detailed Network Drawing:

Full documentation of entire LAN with test report has been submitted on completion of the job. The hard document as well as soft copy of the document has been submitted. Bidder has provided the network topology drawing along with the offer at the time of submission of tender. In addition, Comprehensive document of networking jobs including test reports has been handed over.

Removal of earlier Network Cable

After installation and configuration of the proposed network at RDCIS as per its all applications running on existing LAN has been switched over to the new one. Party has extended all support to RDCIS for this activity. Subsequently party has removed all earlier network cables, conduits, patch panels, Luis and network devices etc. Without disturbing the operation or degradation in performance of new network.

By: Devesh Kumar Upadhyay 60

Page 61: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

LIST OF EQUIPMENTS

Sl. No.

Items Names & Description in Brief

Quantity Make & Model

1. Layer 3 Core Switch

QTY 2 (Two) 16155 extreme summit X450a-24X (24 1000Base-X SFP ports, 410/100/1000 Base-T Ports, Option Slot for 10 Gigabit Option Card XGM2-2xn/xf, 1 AC PSU, Extreme XOS Advanced Edge License, Connector for EPS-500 External Redundant PSU); 16156 Extreme Summit X450a-24x Core License (Extreme XOS Core license, Summit X450a-24x)

2. Layer 3 QTY 2 (Two) 16155 extreme summit X450a-

By: Devesh Kumar Upadhyay 61

Page 62: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Distribution Switch

24X (24 1000Base-X SFP ports, 4 10/100/1000 Base-T Ports, Option Slot for 10 Gigabit Option Card XGM2-2xn/xf, 1 AC PSU, Extreme XOS Advanced Edge License, Connector for EPS-500 External Redundant PSU); 16156 Extreme Summit X450a-24t Core License (Extreme XOS Core license, Summit X450a-24t)

3. Layer 2 Edge Switch (24 Port)

QTY 1 (One) 16202 Extreme Summit X350-48t (48 10/100/1000 BASE-T, unpopulated mini-GBIC ports, Option Slot for 10 Gigabit Option Card XGM2-2xn/xf, 1 AC PSU, Extreme XOS L2 Edge License, Connector for EPS-500 External Redundant PSU)

4. Layer 2 Edge Switch (48 Port+2 Combo Port)

QTY 6 (Six) 15203 extreme summit X150-48t (48 10/100 Base-TX, 2 Gigabit combo ports(2 unpopulated gigabit SFP and 10/100/1000BASE-T),1 AC PSU, Extreme XOS L2 Edge License, Connector for EPS-160 External Redundant PSU)

5. Layer 2 Edge QTY 4 15107 extreme summit X250e-

By: Devesh Kumar Upadhyay 62

Page 63: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Switch (48 Port +2 Combo Port)

(Four) 48p (48 10/100 Base-TX, with PoE, 2 Gigabit combo ports(2 unpopulated gigabit SFP and 10/100/1000BASE-T), 2 Summit Stack Stacking ports, 1AC PSU, Extreme XOS L2 Edge License, Connector for EPS-C External Redundant power system chassis (requires EPS-600LS)

6. Layer 2 Edge Switch (24 Port + 2 Combo Port)

QTY 8 (Eight)

15201 extreme summit X150-24t (24 10/100 Base-TX, 2 Gigabit combo ports (2 unpopulated gigabit SFP and 10/100/1000 BASE-T), 1AC PSU, Extreme XOS L2 Edge License, Connector for EPS-160 External Redundant PSU)

7. Layer 2 Edge Switch (24 Port + 2 Combo Port)

QTY 2 (Two) 15205 extreme summit X150-24p (24 10/100Base-TX with PoE, 2 Gigabit combo ports (2 unpopulated gigabit SFP and 10/100/1000 BASE-T), 1AC PSU, Extreme XOS L2 Edge License, Connector for EPS-500 External Redundant PSU)

8. NMS Software QTY 1 (One)-Unlimited

81631 Extreme EPI Centre 7.1 Silver-250 Base (Extreme EPI Centre 7.1 Silver-250 Base is a

By: Devesh Kumar Upadhyay 63

Page 64: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Tags comprehensive network management suit for status monitoring, configuration and trouble shooting of Extreme Network wired, wireless and security product lines. EPI Centre allows centralized management using an intuitive and easy-to-use user interface Manages up to 250 network devices. CD, Key+ documentation )

9. Unified Threat Management System

QTY 1 (One) Juniper SSG-550M-SH (SSG 550M System, 1GB DRAM, 1AC Power Supply); NS-DI-SSG550 (First year subscription for Deep Inspection Signature updates on SSG550 or SSG550M)

10. WLAN Controller QTY 2 (Two) 15717 extreme summit WM3400 WLAN Controller (Extreme Summit WM3400 WLAN Controller with 5xGE PoE +LAN ports, 1xGE WAN port and serial console port, Includes 1x Express Cardy Slot and 1x USB port)

11. Access Point QTY 6 (Six) 15721 Extreme Altitude 3510-

By: Devesh Kumar Upadhyay 64

Page 65: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

ROW 11a/b/g Indoor Access Point for Rest of the World Regulatory Domain

12. Wall mounted rack min 15 U

QTY 17 (Seventeen)

VALRACK

13. Floor mounted rack min 42 U

QTY 1 (One) VALARACK

14. Fiber Optic Cable 3 kms 3kmsVALARACK

15. Cat 6 Cable 15 kms 15 kmsSYSTIMAX

16. CAT6 Cabling Yes

17. Cat6 Casing/Conduit

7 kms 7 kms

18. FO Cabling (Indoor/Outdoor)

Yes

19. Fibre Optic Conduit (Indoor)

200 m 200 m, SYSTIMAX

20. Fibre Optic Conduit (Outdoor)

800 m SYSTIMAX

21. Passive Components

SYSTIMAX

Passive Components Details

By: Devesh Kumar Upadhyay 65

Page 66: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

25. Pigtail SYSTIMAX

26. LIU SYSTIMAX

27. Splicing SYSTIMAX

28. FO Patch Cord SYSTIMAX

29. UTP Patch Panel SYSTIMAX

30. UTP Patch Panel SYSTIMAX

31. I/O Boxes SYSTIMAX

By: Devesh Kumar Upadhyay 66

Page 67: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

By: Devesh Kumar Upadhyay 67

Page 68: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

By: Devesh Kumar Upadhyay 68

Page 69: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

EXPERIMENTAL:

By: Devesh Kumar Upadhyay 69

Page 70: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

The network equipment has been installed in different floors of ADM & LAB Building at RDCIS, SAIL, Rachi. The core switches (2 nos.) along with one Gbit fast switch and edge switch has been installed in computer centre (2nd Floor ADM Building) server room. Core switch have been back to back connected and edge switch has have connectivity from both the core switches.

All servers at computer centre have been connected through this switch which is having 1 GB node speed. This is named as Server Farm Switch. In ADM building in 1st, 2nd, 3rd, 4th and 5th floor two numbers of network edge switches per floor have been installed with direct MM FO connectivity to both the core switches located in Computer Centre. Two Distribution Switches has been installed in 2nd floor of LAB building. Both the Distribution Switches have been back-to-back connected having MM FO Connectivity with Core Switches at computer centre. All edge Switches in LAB building has been connected through these Distribution Switches. Edge Switches has been located in 1st, 2nd and 3rd floor of LAB building. Each floor has two number of edge switches having direct MM FO connectivity of both the Distribution Switches. One of these edge switches has been in centre of eastern wing of corridor while the other one is centre of western wing of corridor. Ground floor switches were shifted to 1st floor as the rooms in ground floor were damp and it was not suitable for 24x7 operations of network switches. The LAN connectivity to central stores has been provided through one of the FO port of Distribution Switch in LAB building. WI-FI connectivity has been extended in 3 (Three) halls at 5th floor (Committee Room, Seminar Hall & Conference Hall) and in Auditorium and Auditorium Foyer at 1st floor. It has been through Managed Access Point and the WLAN Controller has been located in the rack at C & IT.

By: Devesh Kumar Upadhyay 70

Page 71: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

In view of the security it was decided to place hardware security device/hardware firewall [Unified Threat Management (UTM)] for connectivity of RDCIS LAN to outside world.

FINAL ACCEPTANCE TEST:

Results and Discussion

By: Devesh Kumar Upadhyay 71

Page 72: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Selection of LAN media should be compatible for up scalability of network bandwidth, For example, in our case care was taken so that the LAN media is 10 Gbps ready. It can support bandwidth up to 10 Gbps without any modification in media and only network switch interfaces needs to be changed. This is important as lying of media is tedious and requires change in civil layout as well.

In LAN design, throughput of network switch is an important parameter. Throughput, at every switch viz. core, distribution or edge switch, can be calculated based on the connectivity and the port speed. The throughput must be equal or higher than the calculate figure. If it is not so the switch will act as constraint for the network performance.

Redundancy has been obtained using star topology for connectivity and RRp feature of network switches. IP address is located in static manner and the allocation is based on VLAN configuration requirement with a view to provide proper network security. The switch connecting various servers on the LAN should have higher bandwidth. Due to more traffic from server to client machines, a low bandwidth switch could become a bottleneck for the entire communication with servers. This will lead to congestion problem for the LAN based applications. Keeping this is mind the bandwidth at server farm switch is 1 Gbps.

TECHNOLOGICAL BENEFITS:

Following technological benefits have derived from the project:

By: Devesh Kumar Upadhyay 72

Page 73: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

Increased bandwidth of LAN. Platform for online applications and services. Expansion provision for 500+ nodes. Redundant, robust, centrally manageable gigabit LAN infrastructure.

LEARNING POINTS:

The learning points from the project are following:

1) The technical specification should have flexibility to accommodate a number of options without affecting the quality of work.

By: Devesh Kumar Upadhyay 73

Page 74: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

2) Power line cabling and uninterrupted power supply (UPS) should be a part of turnkey job.

3) 10% additional nodes for LAN connections should be kept in mind.

4) Cable and I/O box for additional networking should be a part of turnkey job.

CONCLUSION

Local area network (LAN) is a communication network spread across an organization that connects all the computers and IP-based devices. The objective of this project i.e. Implementation of Gigabit LAN at RDCIS, was to set up gigabit fiber optic LAN backbone and providing minimum 100 mbps bandwidth. The LAN design has been done with a view to provide security,

By: Devesh Kumar Upadhyay 74

Page 75: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

robustness, central manageability and homogeneity of network devices and overall redundancy of system for consistent 24x7 performances. LAN bandwidth 10 Gbps.

This new LAN infrastructure is a communication platform for on-line applications and services that includes many concurrent LAN applications viz. IFA, PF, Payroll, HRIS, HRD, EPMS, Portal, e-mail & Internet and futuristic applications such as ERP, Video Conferencing and IP Telephony.

REFERENCES:

1. Radia Perlman: Interconnections* Bridges, Routers, Switches, and Internetworking Protocols.

2. Douglas E. Comer: Internetworking with TCP/IP, Volume I Principles, Prorocols and Architecture.

By: Devesh Kumar Upadhyay 75

Page 76: I.T. Project

COMPUTER NETWORK DESIGN IN RDCIS, SAIL

3. Data Communications and Networking by Behrouz A Forouzon, TMH publication.

4. The Virtually LAN Technology Report – David Passmore and John Freeman.

5. http://www.wikipedia.com/ 6. http://www.cisco.com/ 7. http://www.commscope.com/systmax/eng/index.html 8. http://www.juniper.net/us/en/

By: Devesh Kumar Upadhyay 76