introduction 7
TRANSCRIPT
-
8/4/2019 Introduction 7
1/28
LIST OF FIGURES
S.NO TITLE PAGE NUMBER
1 VPN 14
2 Backbone switch 15
3 CISCO Router 17
4 Connection through
router
17
5 Routing using RIP 18
6 Routing using OSPF 19
7 Network switch 22
8 Repeater 25
9 Bridge 26
LIST OF ABBREVIATIONS:
1
-
8/4/2019 Introduction 7
2/28
S. No. Title Full form
1. SAIL Steel Authority Of India Limited
2. RO Regional office
3. SDC Software development center
4. ISDN Intergrated Service Digital Network
5. VSAT Very Small Aperture Terminal
6. VPN Virtual Private Network
7. LAN Local Area Network
8. WAN Wide Area Network
9. MAC Media Access Control
10. IP Internet Protocol
11. OSI Open systems Interconnection
12. RAM Random Access Memory
13. ROM Read Only Memory
14. RIP Routing Information Protocol
15. OSPF Open Shortest Path First
16. IGRP Interior Gateway Routing Protocol
17. CMO Central Marketing Organization
18. ERP Enterprise Resource Planning
1 Introduction
Steel Authority of India Limited (SAIL) is the leading steel-making company in
India and is also listed as one of India's Navratna companies .It is ranked amongst
the top ten public sector companies in India in terms of turnover.
SAIL is a fully integrated iron and steel maker, producing both basic and special
steels for domestic construction, engineering, power, railway, automotive and
defence industries and for sale in export markets.
2
-
8/4/2019 Introduction 7
3/28
SAIL manufactures and sells a broad range of steel products, including hot and cold
rolled sheets and coils, galvanised sheets, electrical sheets, structurals, railway
products, plates, bars and rods, stainless steel and other alloy steels.
SAIL produces iron and steel at five integrated plants and three special steel plants,
located principally in the eastern and central regions of India and situated close to
domestic sources of raw materials, including the Company's iron ore, limestone and
dolomite mines. The company has the distinction of being Indias second largest
producer of iron ore and of having the countrys second largest mines network. This
gives SAIL a competitive edge in terms of captive availability of iron ore, limestone,
and dolomite which are inputs for steel making.
Since its inception, SAIL has been instrumental in laying a sound infrastructure for
the industrial development of the country. Besides, it has immensely contributed to
the development of technical and managerial expertise. It has triggered the secondary
and tertiary waves of economic growth by continuously providing the inputs for the
consuming industry.
1.1 DIVISION OF FLAT AND LONG PRODUCT GROUP
SAIL's wide range of long and flat steel products are much in demand in the
domestic as well as the international market. This vital responsibility is carried out
by SAIL's own Central Marketing Organisation (CMO) that transacts business
through its network of 37 Branch Sales Offices spread across the four regions, 25
Departmental Warehouses, 42 Consignment Agents and 27 Customer Contact
Offices. CMOs domestic marketing effort is supplemented by its ever widening
network of rural dealers who meet the demands of the smallest customers in the
remotest corners of the country. With the total number of dealers over 2000 , SAIL's
wide marketing spread ensures availability of quality steel in virtually all the districts
of the country.
1.2 MAJOR UNITS OF SAIL:
Integrated Steel Plants
BHILAI STEEL PLANT(BSP) IN CHATTISGARH
3
-
8/4/2019 Introduction 7
4/28
DURGAPUR STEEL PLANT(DSP) IN WEST BENGAL
ROURKELA STEEL PLANT (RSP) IN ORISSA
BOKARO STEEL PLANT(BSL) IN JHARKAND
IISCO STEEL PLANT(ISP) IN WEST BENGAL
Special Steel Plants
Alloy Steels Plants (ASP) in West Bengal
Salem Steel Plant (SSP) in Tam
Visvesvaraya Iron and Steel Plant (VISL) in Karnataka
Ferro Alloy Plant
Chandrapur Ferro Alloy Plant
Ownership and Management
The Government of India owns about 86% of SAIL's equity and retains voting
control of the Company. However, SAIL, by virtue of its Maharatna status, enjoys
significant operational and financial autonomy.
1.3 CENTRAL MARKETING ORGANISATION(CMO)
ISO 9001:2000 certified Central Marketing Organisation ( CMO ) is Indias largest
industrial marketing set-up. It markets carbon steel produced by the five integrated
steel plants of SAIL. Headquartered in Kolkata, it transacts business through its
network of Branch Sales Offices spread across the four regions, departmental
warehouses equipped with mechanised handling systems, Consignment Agents and
Customer Contact Offices. CMOs domestic marketing effort is supplemented by its
network of rural dealers who meet the demands of the smallest customers in the
remotest corners of the country.
1.4 ROLE OF THE COMPUTER AND INFORMATION TECHNOLOGY
DEPARTMENT OF SAIL :
4
http://www.sail.co.in/pnu.php?tag=special_visvesvarayahttp://www.sail.co.in/pnu.php?tag=special_visvesvaraya -
8/4/2019 Introduction 7
5/28
A strong IT support system enables real-time network connectivity within the entire
CMO network. Extensive customer contact, product and segment specialization,
close monitoring of order servicing and feedback analysis through a Customer
Satisfaction index are established norms at CMO. The customer-friendly approach of
CMO is backed by practical after-sales service. Through the process of Key Account
management, CMO provides single-window service to key customers across the
country for every business transaction from enquiry to order booking, order tracking
to delivery, and even consultancy and after-sales service.
2 Study of the Existing System in Company
2.1 SOFTWARE DEVELOPMENT CENTER(SDC) :
The SDC at Hyderabad is the center of all the IT activities.The centralized server at
Hyderabad is connected to all the regional offices.All the information regarding
production capacity of individual units,quantity of raw materials etc of every unit is
stored in the central server.
At present each unit has its owns server which in turn is connected to the regional
office it comes under.However in order to keep up with the latest technology there is
a push towards a centralized ERP system where every unit is connected to the
centralized server and the information about each unit is directly processed into the
centralized server instead of going through the regional office.Another advantage
with the ERP server would be the easy tracking of the flow of products from its
manufacturing stage to the delivery of the finished product to the customers.
2.2 SOUTHERN REGION OF SAIL :
SAIL has four regional offices namely Northern,Western,Southern and Eastern
headquartered at New Delhi,Mumbai,Chennai and Kolkata respectively.
Each of the regional offices(RO) have certain branch offices(BO) under them.The
regional office coordinates all the activities of the branch offices under it.
5
-
8/4/2019 Introduction 7
6/28
Further the regional office supervises the activities of the warehouse(WH) attached
to each regional and branch office.
The Southern Region has seven offices :
Chennai
Trichy
Coimbatore
Bangalore
Cochin
Vijaywada
Vishakapatnam
As mentioned in the introduction , the major operations of SAIL is done through its
four regions .
The IT operations are carried out through these four regions at the Regional IT
offices.
The southern region is headquartered at Chennai.
The Regional Office at Chennai co-ordinates the activities of the following branch
offices and the Warehouse(WH) attached to them
Trichy
Coimbatore
Bangalore
Cochin
The branch offices at Vijaywada and Vizag are controlled by the SDC(Software
Development Center) at Hyderabad.
The SDC at Hyderabad is the center of all the IT activities.The centralized server at
Hyderabad is connected to all the regional offices.All the information regarding
6
-
8/4/2019 Introduction 7
7/28
production capacity of individual units,quantity of raw materials etc of every unit is
stored in the central server.
At present each unit has its owns server which in turn is connected to the regional
office it comes under.However in order to keep up with the latest technology there is
a push towards a centraized ERP system where every unit is connected to the
centralized server and the information about each unit is directly processed into the
centralized server instead of going through the regional office.Another advantage
with the ERP server would be the easy tracking of the flow of products from its
manufacturing stage to the delivery of the finished product to the customers.
Central Marketing Organisation along with the IT departments help handles and
maintains a record of its single window service to key customers across the country
for transactions from enquiry to booking , order tracking to delivery and even
consultancy and after-sales service.
2.3 ANALYSIS OF THE NETWORKING SYSTEM BASED ON THE STUDY
OF THE EXISTING SYSTEM :
To maintain a proper customer relationship it is necessary to have an administered
network.
When raw material is processed and ready to be sold, it is necessary a proper
communication is maintained between the plant and the regions of the company
which in turn maintain a co ordination with their respective branches.
It is necessary that a strong network is maintained between all the links .The
company has various network administrators who handle the networking.
The steel plants have their respective IT department to place into the database the
new materials , but this is the current system in which not every employee can
access it at ease, there is a work going on to move to a system where any of the
managers can access the details on the internet directly . This enables a customer
friendly system and makes it simpler.
2.4 THE WORKING OF THE NETWORKING SYSTEM
The link is maintained basically from the steel plants to the SDC from which there isa link to the Regional offices. The links are maintained to operate 24*7 ,various back
7
-
8/4/2019 Introduction 7
8/28
up links are maintained. The basic connection is maintained through leased lines .
When the leased line fails , the ISDN takes over meanwhile the leased line is
repaired through the service provider ,(Bharat sanchar nigam limited here) .
If the ISDN also fails , the link is established through VSAT. The break in link is
intimated to the administrators and they are responsible to maintain back the link.
The southern RO has the centralised server for the 6 branches under it. The head of
IT department ,Deputy general manager (IT) is the key person leading the IT team .
The servers are maintained at Chennai, they are monitored every couple of hours.
The training presented me an opportunity to visit the server room , connection of
routers and switches were shown. A screen displayed the working of the modems
and any problem is immediately reported. The various cables and bridges were also
shown , basically which formed the basis of any networking system. As will be
discussed later in the detailed work done through the training on various networking
devices , each of these is used in the current system of the company.
2.5 ROLE OF VARIOUS PEOPLE IN THE COMPANY AND IT
DEPARTMENT :
#HEAD OF DEPARTMENT :
The Regional Manager leads the regional office and is responsible for managing all
the operations of the Region.
#HEAD OF IT DEPARTMENT :
The head of department is the DGM/SR.MANAGER who leads the entire Regional
Offices IT department. Responsible for managing all the Computer related work.
#NETWORK ADMINISTRATOR :
The network administrator is generally appointed from an outside company ,
Currently Engineers From HCL handle the job of the network administration.
#CONSULTANT:
8
-
8/4/2019 Introduction 7
9/28
The constulants currently working are from PATNI Solutions who provide with the
strategies.
3 Analysis
3.1 NEED FOR NETWORKS AT SAIL
SHARING RESOURCES
Data in a warehouse should be co-ordinate with the regional offices
.Any movement of material and its current location must be stored.
To share hardware devices like printers,plottters
COMMUNICATION
It has two nodes
Between the SDC(Software Development Center) and RO(Regional Offices)
Between the Regional Offices and Branch Offices.
ADMINISTRATION
Manage the networks
Authorized Access
Need for extra resources
Updates in hardware and software
3.2 MODES USED IN COMMUNICATION
3.2.1 LEASE LINE
9
-
8/4/2019 Introduction 7
10/28
A leased line is a service contract between a provider and a customer, whereby the
provider agrees to deliver a symmetric communication line connecting two or more
locations in exchange for a monthly rent (hence the term lease). It is sometimes
known as a 'Private Circuit' or 'Data Line' .
ADVANTAGE
Unlike dial-up connections, a leased line is always active.
The fee for the connection is a fixed monthly rate.
The primary factors affecting the monthly fee are distance between end points
and the speed of the circuit. Because the connection doesn't carry anybody
else's communications, the carrier can assure a given level of quality.
USAGE
Typically, leased lines are used by businesses to connect geographically distant
offices.
For example, a T-1 channel can be leased, and provides a maximum transmission
speed of 1.544 Mbit/s. The user can divide the connection into different line formultiplexing data and voice communication, or use the channel for one high speed
data circuit. Increasingly, leased lines are being used by companies, and even
individuals, for internet access because they afford faster data transfer rates and are
cost-effective for heavy users of the Internet.
3.2.2 ISDN (Integrated Service Digital Network)
Integrated Services Digital Network(ISDN) is a set of communications standards
for simultaneousdigitaltransmission of voice, video, data, and other network
services over the traditional circuits of the public switched telephone network.
Prior to ISDN, the telephone system was viewed as a way to transport voice, with
some special services available for data. The key feature of ISDN is that it integrates
speech and data on the same lines, adding features that were not available in
the classic telephone system. There are several kinds of access interfaces to ISDN
defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI) and BroadbandISDN (B-ISDN).
10
http://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Transmission_(telecommunications) -
8/4/2019 Introduction 7
11/28
FEATURES
ISDN is a circuit-switchedtelephone networksystem, which also provides
access topacket switched networks, designed to allow digital transmission of
voice and data over ordinary telephone copper wires, resulting in potentially
better voice quality than an analog phone can provide.
It offers circuit-switched connections (for either voice or data), and packet-
switched connections (for data), in increments of 64 kilobit/s.
A major market application for ISDN in some countries is Internet access,
where ISDN typically provides a maximum of 128 kbit/s in both upstream
and downstream directions.
ISDN line can take care of most people's complete communications needs
(apart from broadband Internet access and entertainment television) at a much
higher transmission rate, without forcing the purchase of multiple analog
phone lines. It also refers to Integrated Switching and Transmission[3] in that
telephone switching and carrier wave transmission are integrated rather than
separate as in earlier technology.
ADVANTAGES
ISDNs ability to deliver at a minimum two simultaneous connections in any
combination of data, voice, video, fax over a single line.
Multiple devices can be attached to the line.
3.2.3 VSAT (VERY SMALL APERTURE TERMINAL)
A Very Small Aperture Terminal (VSAT), is a two-way satellite ground station or a
stabilized VSAT antenna with a dish antenna that is smaller than 3 meters.
Data rates typically range from 56 kbps up to 4 Mbps. VSATs access satellites
in geosynchronous orbit to relay data from small remote earth stations (terminals) to
other terminals (in mesh configurations) or master earth station "hubs" (in star
configurations).
USAGE
11
http://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Packet_switched_networkhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Internet_accesshttp://en.wikipedia.org/wiki/Broadband_Internet_accesshttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/ISDN#cite_note-2http://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Ground_stationhttp://en.wikipedia.org/wiki/Satellite_dishhttp://en.wikipedia.org/wiki/Geosynchronous_orbithttp://en.wikipedia.org/wiki/Mesh_networkinghttp://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Packet_switched_networkhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Internet_accesshttp://en.wikipedia.org/wiki/Broadband_Internet_accesshttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/ISDN#cite_note-2http://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Ground_stationhttp://en.wikipedia.org/wiki/Satellite_dishhttp://en.wikipedia.org/wiki/Geosynchronous_orbithttp://en.wikipedia.org/wiki/Mesh_networking -
8/4/2019 Introduction 7
12/28
VSATs are most commonly used to transmit data orbroadband data (for the
provision ofSatellite Internet access to remote locations, VoIP or video). VSATs are
also used for transportable, on-the-move (utilizing phased array antennas) or
mobile maritime communications.
DIFFERENT CONFIGURATIONS
Most VSAT networks are configured in one of these topologies
A star topology, using a central uplink site, such as a network operations
center (NOC), to transport data back and forth to each VSAT terminal via
satellite.
A mesh topology, where each VSAT terminal relays data via satellite to
another terminal by acting as a hub, minimizing the need for a centralized
uplink site,
A combination of both star and mesh topologies.
APPLICATIONS
New online VSAT systems that use Ka band technology provide higher
bandwidth.
High speed communication interfaces.
Telephony
Satellite news gathering(SNG)
Digital Audio Broadcasting(DAB)
3.3VIRTUAL PRIVATE NETWORK
Virtual private network (VPN) is a technology that is gaining popularity among large
.Organizations that use the global Internet for both intra- and inter organization
communication, but require privacy in their internal communications.
12
http://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Phased_arrayhttp://en.wikipedia.org/wiki/Oceanhttp://en.wikipedia.org/wiki/Star_topologyhttp://en.wikipedia.org/wiki/Mesh_topologyhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Phased_arrayhttp://en.wikipedia.org/wiki/Oceanhttp://en.wikipedia.org/wiki/Star_topologyhttp://en.wikipedia.org/wiki/Mesh_topology -
8/4/2019 Introduction 7
13/28
ADVANTAGE OVER HYBRID NETWORK
Both private and hybrid networks have a major drawback cost. Private wide-area
networks (WANs) are expensive.
To connect several sites, an organization needs several leased lines, which means a
high monthly fee.
Figure 1-VPN
WORKING OF VPN
VPN creates a network that is private but virtual. It is private because it guarantees
privacy inside the organization. It is virtual because it does not use real private
WANs; the network is physically public but virtually private.
VPN uses IPSec protocol in the tunnel mode to guarantee authentication, integrity
and privacy.
TUNNELING-To guarantee privacy and other security measures for an
organization, VPN can use the IPSec in the tunnel mode. In this mode, each IP
datagram destined for private use in the organization is encapsulated in another
datagram.
The public network (Internet) is responsible for carrying the packet from R1 to R2.
Outsiders cannot decipher the contents of the packet or the source and destination
addresses. Deciphering takes place at R2, which finds the destination address of the
packet and delivers it.
13
-
8/4/2019 Introduction 7
14/28
3.4 VLAN(VIRTUAL LAN)
The VLAN software when installed on a router facilitates a mechnasim to provideterminals a mechanism where they can virtually belong to the same LAN but
geographically they maybe in a different geographical position.
The criterion for membership into a VLAN is geographical and each terminal on a
VLAN is identified by its port number and MAC address.
Figure 2:The backbone switch(L3 switch) connected to the VLANs
Thus we can roughly define a virtual LAN network as a local area network
configured by software not physical wiring.
EXAMPLE
14
-
8/4/2019 Introduction 7
15/28
Say a company has two buildings. Each building can have its own switched LAN
connected by a backbone. People in the first building and second building can be in
the same work group though they are connected to different physical LANs. Such an
offican can use the VLAN to reduce costs.
VLAN CONFIGURATION
The different stations can be grouped into different VLANs in three ways
MANUAL CONFIGURATION
In this method the administration assigns a identifier to each station.The term
manually here means that the administrator types the port numbers, the IP addresses,
or other characteristics, using the VLAN software.
AUTOMATIC CONFIGURATION
Automatic Configuration In an automatic configuration, the stations are
automatically connected or disconnected from a VLAN using criteria defined by the
administrator. For example, the administrator can define the project number as the
criterion for being a member of a group. When a user changes the project, he or she
automatically migrates to a new VLAN.
SEMIAUTOMATIC CONFIGURATION
A semiautomatic configuration is somewhere between a manual configuration and an
automatic configuration. Usually, the initializing is done manually, with migrations
done automatically.
ADVANTAGES USING VLAN
Cost and Time reduction
VLANs can reduce the migration cost of stations going from one group to
another. Physical reconfiguration takes time and is costly.
Creating Virtual Work Groups
For example, in a campus environment, professors working on the same
project can send broadcast messages to one another without the necessity of
15
-
8/4/2019 Introduction 7
16/28
belonging to the same department. This can reduce traffic if the multicasting
capability of IP was previously used.
Security
VLANs provide an extra measure of security. People belonging to the same
group can send broadcast messages with the guaranteed assurance that users
in other groups will not receive these messages.
3.5 STUDY ON ROUTERS:
3.5.1 WHAT IS A ROUTER?
A router is a three-layer device that routes packets based on their logical addresses
(host-to-host addressing). A router normally connects LANs and WANs in the
Internet and has a routing table that is used for making decisions about the route. The
routing tables are normally dynamic and are updated using routing protocols.
A three-layer switch is a router, but a faster and more sophisticated. The switching
fabric in a three-layer switch allows faster table lookup and forwarding.
Figure 3:A cisco router
16
-
8/4/2019 Introduction 7
17/28
Figure 4: Connection though a router
Routing protocols are used to continuously update the routing tables that are
consulted for forwarding and routing.
3.5.2 ROUTING PROTOCOLS:
ROUTING INFORMATION PROTOCOL(RIP) :
The Routing Information Protocol (RIP) is an intradomain routing protocol used
inside an autonomous system. It is a very simple protocol based on distance vector
routing.
RIP employs the hop count as a routing metric. The hold down time is 180 seconds.
RIP prevents routing loops by implementing a limit on the number of hops allowed
in a path from the source to a destination. The maximum number of hops allowed for
RIP is 15. This hop limit, however, also limits the size of networks that RIP can
support. A hop count of 16 is considered an infinite distance and used to deprecate
inaccessible, inoperable, or otherwise undesirable routes in the selection process.
17
-
8/4/2019 Introduction 7
18/28
Figure 5: Routing using RIP
OPEN SHORTEST PATH FIRST PROTOCOL (OSPF) :
The Open Shortest Path First or OSPF protocol is an intradomain routing protocol
based on link state routing. Its domain is also an autonomous system.
OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely
within a single routing domain (autonomous system). It gathers link state information
from available routers and constructs a topology map of the network. The topologydetermines the routing table presented to the Internet Layer which makes routing
decisions based solely on the destination IP address found in IP packets.
18
-
8/4/2019 Introduction 7
19/28
Figure 6: Routing using OSPF
INTERIOR GATEWAY ROUTING PROTOCOL (IGRP):
Interior Gateway Routing Protocol (IGRP) is a distance vectorinterior routing
protocol (IGP) invented by Cisco. It is used by routers to exchange routing datawithin an autonomous system.
IGRP is aproprietary protocol. IGRP was created in part to overcome the limitations
ofRIP (maximum hop count of only 15, and a single routing metric) when used
within large networks. IGRP supports multiple metrics for each route,
including bandwidth,delay,load, MTU, and reliability; to compare two routes these
metrics are combined together into a single metric, using a formula which can be
adjusted through the use of pre-set constants. The maximum hop count of IGRP-routed packets is 255 (default 100), and routing updates are broadcast every 90
seconds (by default).
19
http://en.wikipedia.org/wiki/Distance-vector_routing_protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Cisco_Systems,_Inc.http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Autonomous_system_(Internet)http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Routing_Information_Protocolhttp://en.wikipedia.org/wiki/Bandwidth_(computing)http://en.wikipedia.org/wiki/Network_delayhttp://en.wikipedia.org/wiki/Load_(computing)http://en.wikipedia.org/wiki/Maximum_transmission_unithttp://en.wikipedia.org/wiki/Reliability_(computer_networking)http://en.wikipedia.org/wiki/Broadcasting_(computing)http://en.wikipedia.org/wiki/Distance-vector_routing_protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Cisco_Systems,_Inc.http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Autonomous_system_(Internet)http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Routing_Information_Protocolhttp://en.wikipedia.org/wiki/Bandwidth_(computing)http://en.wikipedia.org/wiki/Network_delayhttp://en.wikipedia.org/wiki/Load_(computing)http://en.wikipedia.org/wiki/Maximum_transmission_unithttp://en.wikipedia.org/wiki/Reliability_(computer_networking)http://en.wikipedia.org/wiki/Broadcasting_(computing) -
8/4/2019 Introduction 7
20/28
3.5.3 Router Components (internal) :
ROM
ROM is used to store the router's bootstrap startup program, operating system
software, and power-on diagnostic tests programs. In order to perform ROM
upgrades you remove and replace pluggable chips on the motherboard.
Flash Memory
It holds operating system image(s). Flash memory is erasable, reprogrammable
ROM. You can perform Cisco IOS software upgrades without having to remove
and replace chips. Flash content is retained when you switch off or restart the router.
RAM
RAM is used to store operational information such as routing tables, router's running
configuration file. RAM also provides caching and packet buffering capabilities. Its
contents are lost when you switch off or restart the router.
NVRAM
NVRAM (nonvolatile RAM), is used to store the router's startup configuration file. It
does not lose data when power is switched off. So the contents of the startup
configuration file are maintained even when you switch off or restart the router.
Network Interfaces
The router's network interfaces are located on the motherboard or on separate
interface modules. You configure Ethernet or Token Ring interfaces to allow
connection to a LAN. The synchronous serial interfaces are configured to allowconnection to WANs. You can also configure ISDN BRI interfaces to allow
connection to an ISDN WAN..
3.5.4 Router Components (External) :
A router can be configured over any of its network interfaces. You can supply
configuration information to a router using:-
20
-
8/4/2019 Introduction 7
21/28
TFTP servers : Trivial File Transfer Protocol; A simplified version of FTP that
allows files to be transferred from one computer to another over a network.
-Virtual terminals
-Network management stations
3.5.5 MODES OF A ROUTER:
User mode
Privileged mode
If you want to access privileged mode you have to enter a password. The commands
available in Privileged mode also include all those available in User mode. You can
use Privileged commands to:-
set operating parameters
perform a detailed examination of the router's status
test and debug router operation
access global and other included configuration modes
From Privileged mode you can enterglobal configuration mode. This gives you
access to configuration commands that affect the system as a whole, and to other
configuration modes.
You can specify the source of the configuration commands as being from :-
a terminal
memory
the network
You can access many other specific configuration modes from Global Configuration
mode that allow complex configurations to be performed.
Setup Mode: If the router does not have a configuration file it will automatically
enter Setup mode when you switch it on. Setup mode presents you with a prompted
21
-
8/4/2019 Introduction 7
22/28
dialog, called the system configuration dialog, in which you establish an initial
configuration.
Rom Monitor Mode: If the router does not find a valid operating system image, or if
you interrupt the boot sequence, the system may enter ROM monitor mode. From
ROM monitor mode you can boot the device or perform diagnostic tests.
3.6 SWITCHES
A network switch or switching hub is a computer networking device that
connects network segments. The term commonly refers to a multi-port network
bridge that processes and routes data at the data link layer(layer 2) of the OSI model.
Switches that additionally process data at the network layer(Layer 3) and above are
often referred to as Layer 3 switches ormultilayer switches.
The network switch plays an integral part in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of
linked managed switches. Small office/home office (SOHO) applications typically
use a single switch, or an all-purpose converged device such as a gateway to access
small office/homebroadband services such as DSL orcable internet. In most of these
cases, the end-user device contains a routerand components that interface to the
particular physical broadband technology. User devices may also include a telephone
interface forVoIP.
Figure 7: Network switch
22
http://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIP -
8/4/2019 Introduction 7
23/28
An Ethernet switch operates at the data link layer of the OSI model to create a
separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and
D) on 4 switch ports, A and B can transfer data back and forth, while C and D also
do so simultaneously, and the two conversations will not interfere with one another.
In the case of a hub, they would all share the bandwidth and run in half duplex,
resulting in collisions, which would then necessitate retransmissions. Using a switch
is called microsegmentation. This allows computers to have dedicated bandwidth on
a point to point connections to the network and to therefore run in full duplex without
collisions.
3.6.1 MULTILAYER SWITCH AND ROLE OF SWITCHES IN NETWORKS
Switches may operate at one or more layers of the OSI model, including data
link, network, ortransport (i.e., end-to-end). A device that operates simultaneously at
more than one of these layers is known as a multilayer switch.
While Layer 2 functionality is adequate for bandwidth-shifting within one
technology, interconnecting technologies such as Ethernet and token ring are
easier at Layer 3.
Interconnection of different Layer 3 networks is done by routers. If there are
any features that characterize "Layer-3 switches" as opposed to general-
purpose routers, it tends to be that they are optimized, in larger switches, for
high-density Ethernet connectivity.
In some service provider and other environments where there is a need for a
great deal of analysis of network performance and security,some vendors
provide firewall,network intrusion security and performance modules.
The switch can also be used to create a mirror image of data that can go to an
external device
23
http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/Half_duplexhttp://en.wikipedia.org/wiki/Microsegmentationhttp://en.wikipedia.org/wiki/Full_duplexhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/Half_duplexhttp://en.wikipedia.org/wiki/Microsegmentationhttp://en.wikipedia.org/wiki/Full_duplexhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Router_(computing) -
8/4/2019 Introduction 7
24/28
3.6.2 SWITCH CONFIGURATIONS
UNMANAGED SWITCH
These switches have no configuration interface or options. They areplug and
play. They are typically the least expensive switches, found in home, SOHO,
or small businesses. They can be desktop or rack mounted.
MANAGED SWITCH
These switches have one or more methods to modify the operation of the
switch. Common management methods include: a command-line
interface (CLI) accessed via serial console. Examples of configuration
changes that one can do from a managed switch include: enable features such
as Spanning Tree Protocol, setport bandwidth, create or modify Virtual
LANs (VLANs), etc.
SMART
These are managed switches with a limited set of management features. For
a price much lower than a fully managed switch they provide a web interface
(and usually no CLI access) and allow configuration of basic settings, such as
VLANs, port-bandwidth and duplex.
ENTERPRISE
These have a full set of management features, including CLI, SNMP agent,
and web interface. They may have additional features to manipulate
configurations, such as the ability to display, modify, backup and restore
configurations.
3.7 HUBS
An Ethernet hub, active hub, network hub, repeater hub or hub is a device for
connecting multiple twisted pairorfiber opticEthernet devices together and making
them act as a single network segment. Hubs work at thephysical layer(layer 1) of
the OSI model.
24
http://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/SOHO_networkhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Serial_consolehttp://en.wikipedia.org/wiki/Spanning_Tree_Protocolhttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/SOHO_networkhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Serial_consolehttp://en.wikipedia.org/wiki/Spanning_Tree_Protocolhttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_model -
8/4/2019 Introduction 7
25/28
PASSIVE HUBS
A passive hub is just a connector. It connects the wires coming from different
branches. In a star-topology Ethernet LAN, a passive hub is just a point where the
signals coming from different stations collide; the hub is the collision point. This
type of a hub is part of the media; its location in the Internet model is below the
physical layer.
REPEATERS
A repeater receives a signal and, before it becomes too weak or corrupted,
regenerates the original bit pattern. The repeater then sends the refreshed signal.
Figure 8:Repeater
A repeater does not actually connect two LANs; it connects two segments of the
same LAN. The segments connected are still part of one single LAN. A repeater is
not a device that can connect two LANs of different protocols.
A repeater has only forwarding capacity and no filtering capacity and is a generator.
ACTIVE HUBS
An active hub is actually a multiport repeater. It is normally used to create
connections between stations in a physical star topology.
25
-
8/4/2019 Introduction 7
26/28
BRIDGES
A bridge operates in both the physical and the data link layer. As a physical layer
device, it regenerates the signal it receives. As a data link layer device, the bridge can
check the physical (MAC) addresses (source and destination) contained in the frame.
A bridge has filtering capability. It can check the destination address of a frame and
decide if the frame should be forwarded or dropped. If the frame is to be forwarded,
the decision must specify the port. A bridge has a table that maps addresses to ports.
Figure 9: Bridge
A transparent bridge is a bridge in which the stations are completely unaware of the
bridge's existence. If a bridge is added or deleted from the system, reconfiguration of
the stations is unnecessary.
A system equipped with transparent bridges must meet three criteria:
1. Frames must be forwarded from one station to another.
2. The forwarding table is automatically made by learning frame movements in the
Network.
3. Loops in the system must be prevented.
3.8 OSI LAYERS:
OSI stands for Open Systems Interconnection Reference Model. In short it is termed
as OSI model or OSI reference model or 7-layer model orLayered Model or OSI
seven layer models.
26
-
8/4/2019 Introduction 7
27/28
3.8.1 Functionality of Application Layer
Application layer is the 7th layer of OSI model and sometimes referred as Layer
Seven of OSI model. The functionality of application layer is described below:
Network processes to applications.
Provides network services to application processes, such as e-mail, file
transfer & terminal emulation.
3.8.2 Functionality of Presentation Layer
Presentation layer is the 6th layer of OSI model and sometimes referred as Layer Six
of OSI model. The functionality of presentation layer is described below:
Data representation and encryption
Ensure data is readable by receiving system.
Format of data
Data structures
Negotiates data transfer syntax for application layer.
3.8.3 Functionality of Session Layer
Session Layer is the 5th layer of OSI model and sometimes referred as Layer Five of
OSI model. The functionality of session layer is described below:
Interhost communication
Establish, manages & terminates session between appications.
3.8.4 Functionality of Transport Layer
Transport Layer is the 4th layer of OSI model and sometimes referred as Layer Four
of OSI model. The functionality of transport layer is described below:
End-to-end connections and reliability (TCP)
Concerned with transportation issues between hosts.
Data transport reliability.
Establish, maintain, terminate virtual circuits. Fault detection & recovery information flow control.
Controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control.
3.8.5 Functionality of Network Layer
Network Layer is the 3rd layer of OSI model and sometimes referred as Layer Three
of OSI model. The functionality of Network layer is described below:
Path determination and logical addressing (IP) Logical addressing
27
-
8/4/2019 Introduction 7
28/28
Best effort delivery
3.8.6 Functionality of Data link Layer
Data link layer is the 2nd layer of OSI model and sometimes referred as Layer Two
of OSI model. The functionality of Data link layer is described below:
Physical addressing (MAC & LLC)
Provides reliable transfer of data across media
Physical addressing, network topology, line descipline, error notification,
ordered delivery to frames, flow control
3.8.7 Functionality of Physical Layer
Physical Layer is the 1st layer of OSI model and sometimes referred as Layer One of
OSI model. The functionality of physical layer is described below:
Media, signal and binary transmission
4 Conclusion
During the Industrial Training period , I learnt how a company functions as a whole ,
Role of various employees specially in the IT sector and their necessity in the
smoothe functioning of the company.
Meanwhile , I learnt abt how the networking system of a company works and the
various networking devices used, got a good understanding of networking terms,
their applications and day to day usage.
Thus , the training was very helpul and helped me understand networking concepts,
devices such as routers , switches , different technologies used and how network
management is done in the company.