introduction 7

Upload: manudilipshah

Post on 07-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 Introduction 7

    1/28

    LIST OF FIGURES

    S.NO TITLE PAGE NUMBER

    1 VPN 14

    2 Backbone switch 15

    3 CISCO Router 17

    4 Connection through

    router

    17

    5 Routing using RIP 18

    6 Routing using OSPF 19

    7 Network switch 22

    8 Repeater 25

    9 Bridge 26

    LIST OF ABBREVIATIONS:

    1

  • 8/4/2019 Introduction 7

    2/28

    S. No. Title Full form

    1. SAIL Steel Authority Of India Limited

    2. RO Regional office

    3. SDC Software development center

    4. ISDN Intergrated Service Digital Network

    5. VSAT Very Small Aperture Terminal

    6. VPN Virtual Private Network

    7. LAN Local Area Network

    8. WAN Wide Area Network

    9. MAC Media Access Control

    10. IP Internet Protocol

    11. OSI Open systems Interconnection

    12. RAM Random Access Memory

    13. ROM Read Only Memory

    14. RIP Routing Information Protocol

    15. OSPF Open Shortest Path First

    16. IGRP Interior Gateway Routing Protocol

    17. CMO Central Marketing Organization

    18. ERP Enterprise Resource Planning

    1 Introduction

    Steel Authority of India Limited (SAIL) is the leading steel-making company in

    India and is also listed as one of India's Navratna companies .It is ranked amongst

    the top ten public sector companies in India in terms of turnover.

    SAIL is a fully integrated iron and steel maker, producing both basic and special

    steels for domestic construction, engineering, power, railway, automotive and

    defence industries and for sale in export markets.

    2

  • 8/4/2019 Introduction 7

    3/28

    SAIL manufactures and sells a broad range of steel products, including hot and cold

    rolled sheets and coils, galvanised sheets, electrical sheets, structurals, railway

    products, plates, bars and rods, stainless steel and other alloy steels.

    SAIL produces iron and steel at five integrated plants and three special steel plants,

    located principally in the eastern and central regions of India and situated close to

    domestic sources of raw materials, including the Company's iron ore, limestone and

    dolomite mines. The company has the distinction of being Indias second largest

    producer of iron ore and of having the countrys second largest mines network. This

    gives SAIL a competitive edge in terms of captive availability of iron ore, limestone,

    and dolomite which are inputs for steel making.

    Since its inception, SAIL has been instrumental in laying a sound infrastructure for

    the industrial development of the country. Besides, it has immensely contributed to

    the development of technical and managerial expertise. It has triggered the secondary

    and tertiary waves of economic growth by continuously providing the inputs for the

    consuming industry.

    1.1 DIVISION OF FLAT AND LONG PRODUCT GROUP

    SAIL's wide range of long and flat steel products are much in demand in the

    domestic as well as the international market. This vital responsibility is carried out

    by SAIL's own Central Marketing Organisation (CMO) that transacts business

    through its network of 37 Branch Sales Offices spread across the four regions, 25

    Departmental Warehouses, 42 Consignment Agents and 27 Customer Contact

    Offices. CMOs domestic marketing effort is supplemented by its ever widening

    network of rural dealers who meet the demands of the smallest customers in the

    remotest corners of the country. With the total number of dealers over 2000 , SAIL's

    wide marketing spread ensures availability of quality steel in virtually all the districts

    of the country.

    1.2 MAJOR UNITS OF SAIL:

    Integrated Steel Plants

    BHILAI STEEL PLANT(BSP) IN CHATTISGARH

    3

  • 8/4/2019 Introduction 7

    4/28

    DURGAPUR STEEL PLANT(DSP) IN WEST BENGAL

    ROURKELA STEEL PLANT (RSP) IN ORISSA

    BOKARO STEEL PLANT(BSL) IN JHARKAND

    IISCO STEEL PLANT(ISP) IN WEST BENGAL

    Special Steel Plants

    Alloy Steels Plants (ASP) in West Bengal

    Salem Steel Plant (SSP) in Tam

    Visvesvaraya Iron and Steel Plant (VISL) in Karnataka

    Ferro Alloy Plant

    Chandrapur Ferro Alloy Plant

    Ownership and Management

    The Government of India owns about 86% of SAIL's equity and retains voting

    control of the Company. However, SAIL, by virtue of its Maharatna status, enjoys

    significant operational and financial autonomy.

    1.3 CENTRAL MARKETING ORGANISATION(CMO)

    ISO 9001:2000 certified Central Marketing Organisation ( CMO ) is Indias largest

    industrial marketing set-up. It markets carbon steel produced by the five integrated

    steel plants of SAIL. Headquartered in Kolkata, it transacts business through its

    network of Branch Sales Offices spread across the four regions, departmental

    warehouses equipped with mechanised handling systems, Consignment Agents and

    Customer Contact Offices. CMOs domestic marketing effort is supplemented by its

    network of rural dealers who meet the demands of the smallest customers in the

    remotest corners of the country.

    1.4 ROLE OF THE COMPUTER AND INFORMATION TECHNOLOGY

    DEPARTMENT OF SAIL :

    4

    http://www.sail.co.in/pnu.php?tag=special_visvesvarayahttp://www.sail.co.in/pnu.php?tag=special_visvesvaraya
  • 8/4/2019 Introduction 7

    5/28

    A strong IT support system enables real-time network connectivity within the entire

    CMO network. Extensive customer contact, product and segment specialization,

    close monitoring of order servicing and feedback analysis through a Customer

    Satisfaction index are established norms at CMO. The customer-friendly approach of

    CMO is backed by practical after-sales service. Through the process of Key Account

    management, CMO provides single-window service to key customers across the

    country for every business transaction from enquiry to order booking, order tracking

    to delivery, and even consultancy and after-sales service.

    2 Study of the Existing System in Company

    2.1 SOFTWARE DEVELOPMENT CENTER(SDC) :

    The SDC at Hyderabad is the center of all the IT activities.The centralized server at

    Hyderabad is connected to all the regional offices.All the information regarding

    production capacity of individual units,quantity of raw materials etc of every unit is

    stored in the central server.

    At present each unit has its owns server which in turn is connected to the regional

    office it comes under.However in order to keep up with the latest technology there is

    a push towards a centralized ERP system where every unit is connected to the

    centralized server and the information about each unit is directly processed into the

    centralized server instead of going through the regional office.Another advantage

    with the ERP server would be the easy tracking of the flow of products from its

    manufacturing stage to the delivery of the finished product to the customers.

    2.2 SOUTHERN REGION OF SAIL :

    SAIL has four regional offices namely Northern,Western,Southern and Eastern

    headquartered at New Delhi,Mumbai,Chennai and Kolkata respectively.

    Each of the regional offices(RO) have certain branch offices(BO) under them.The

    regional office coordinates all the activities of the branch offices under it.

    5

  • 8/4/2019 Introduction 7

    6/28

    Further the regional office supervises the activities of the warehouse(WH) attached

    to each regional and branch office.

    The Southern Region has seven offices :

    Chennai

    Trichy

    Coimbatore

    Bangalore

    Cochin

    Vijaywada

    Vishakapatnam

    As mentioned in the introduction , the major operations of SAIL is done through its

    four regions .

    The IT operations are carried out through these four regions at the Regional IT

    offices.

    The southern region is headquartered at Chennai.

    The Regional Office at Chennai co-ordinates the activities of the following branch

    offices and the Warehouse(WH) attached to them

    Trichy

    Coimbatore

    Bangalore

    Cochin

    The branch offices at Vijaywada and Vizag are controlled by the SDC(Software

    Development Center) at Hyderabad.

    The SDC at Hyderabad is the center of all the IT activities.The centralized server at

    Hyderabad is connected to all the regional offices.All the information regarding

    6

  • 8/4/2019 Introduction 7

    7/28

    production capacity of individual units,quantity of raw materials etc of every unit is

    stored in the central server.

    At present each unit has its owns server which in turn is connected to the regional

    office it comes under.However in order to keep up with the latest technology there is

    a push towards a centraized ERP system where every unit is connected to the

    centralized server and the information about each unit is directly processed into the

    centralized server instead of going through the regional office.Another advantage

    with the ERP server would be the easy tracking of the flow of products from its

    manufacturing stage to the delivery of the finished product to the customers.

    Central Marketing Organisation along with the IT departments help handles and

    maintains a record of its single window service to key customers across the country

    for transactions from enquiry to booking , order tracking to delivery and even

    consultancy and after-sales service.

    2.3 ANALYSIS OF THE NETWORKING SYSTEM BASED ON THE STUDY

    OF THE EXISTING SYSTEM :

    To maintain a proper customer relationship it is necessary to have an administered

    network.

    When raw material is processed and ready to be sold, it is necessary a proper

    communication is maintained between the plant and the regions of the company

    which in turn maintain a co ordination with their respective branches.

    It is necessary that a strong network is maintained between all the links .The

    company has various network administrators who handle the networking.

    The steel plants have their respective IT department to place into the database the

    new materials , but this is the current system in which not every employee can

    access it at ease, there is a work going on to move to a system where any of the

    managers can access the details on the internet directly . This enables a customer

    friendly system and makes it simpler.

    2.4 THE WORKING OF THE NETWORKING SYSTEM

    The link is maintained basically from the steel plants to the SDC from which there isa link to the Regional offices. The links are maintained to operate 24*7 ,various back

    7

  • 8/4/2019 Introduction 7

    8/28

    up links are maintained. The basic connection is maintained through leased lines .

    When the leased line fails , the ISDN takes over meanwhile the leased line is

    repaired through the service provider ,(Bharat sanchar nigam limited here) .

    If the ISDN also fails , the link is established through VSAT. The break in link is

    intimated to the administrators and they are responsible to maintain back the link.

    The southern RO has the centralised server for the 6 branches under it. The head of

    IT department ,Deputy general manager (IT) is the key person leading the IT team .

    The servers are maintained at Chennai, they are monitored every couple of hours.

    The training presented me an opportunity to visit the server room , connection of

    routers and switches were shown. A screen displayed the working of the modems

    and any problem is immediately reported. The various cables and bridges were also

    shown , basically which formed the basis of any networking system. As will be

    discussed later in the detailed work done through the training on various networking

    devices , each of these is used in the current system of the company.

    2.5 ROLE OF VARIOUS PEOPLE IN THE COMPANY AND IT

    DEPARTMENT :

    #HEAD OF DEPARTMENT :

    The Regional Manager leads the regional office and is responsible for managing all

    the operations of the Region.

    #HEAD OF IT DEPARTMENT :

    The head of department is the DGM/SR.MANAGER who leads the entire Regional

    Offices IT department. Responsible for managing all the Computer related work.

    #NETWORK ADMINISTRATOR :

    The network administrator is generally appointed from an outside company ,

    Currently Engineers From HCL handle the job of the network administration.

    #CONSULTANT:

    8

  • 8/4/2019 Introduction 7

    9/28

    The constulants currently working are from PATNI Solutions who provide with the

    strategies.

    3 Analysis

    3.1 NEED FOR NETWORKS AT SAIL

    SHARING RESOURCES

    Data in a warehouse should be co-ordinate with the regional offices

    .Any movement of material and its current location must be stored.

    To share hardware devices like printers,plottters

    COMMUNICATION

    It has two nodes

    Between the SDC(Software Development Center) and RO(Regional Offices)

    Between the Regional Offices and Branch Offices.

    ADMINISTRATION

    Manage the networks

    Authorized Access

    Need for extra resources

    Updates in hardware and software

    3.2 MODES USED IN COMMUNICATION

    3.2.1 LEASE LINE

    9

  • 8/4/2019 Introduction 7

    10/28

    A leased line is a service contract between a provider and a customer, whereby the

    provider agrees to deliver a symmetric communication line connecting two or more

    locations in exchange for a monthly rent (hence the term lease). It is sometimes

    known as a 'Private Circuit' or 'Data Line' .

    ADVANTAGE

    Unlike dial-up connections, a leased line is always active.

    The fee for the connection is a fixed monthly rate.

    The primary factors affecting the monthly fee are distance between end points

    and the speed of the circuit. Because the connection doesn't carry anybody

    else's communications, the carrier can assure a given level of quality.

    USAGE

    Typically, leased lines are used by businesses to connect geographically distant

    offices.

    For example, a T-1 channel can be leased, and provides a maximum transmission

    speed of 1.544 Mbit/s. The user can divide the connection into different line formultiplexing data and voice communication, or use the channel for one high speed

    data circuit. Increasingly, leased lines are being used by companies, and even

    individuals, for internet access because they afford faster data transfer rates and are

    cost-effective for heavy users of the Internet.

    3.2.2 ISDN (Integrated Service Digital Network)

    Integrated Services Digital Network(ISDN) is a set of communications standards

    for simultaneousdigitaltransmission of voice, video, data, and other network

    services over the traditional circuits of the public switched telephone network.

    Prior to ISDN, the telephone system was viewed as a way to transport voice, with

    some special services available for data. The key feature of ISDN is that it integrates

    speech and data on the same lines, adding features that were not available in

    the classic telephone system. There are several kinds of access interfaces to ISDN

    defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI) and BroadbandISDN (B-ISDN).

    10

    http://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Digitalhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)
  • 8/4/2019 Introduction 7

    11/28

    FEATURES

    ISDN is a circuit-switchedtelephone networksystem, which also provides

    access topacket switched networks, designed to allow digital transmission of

    voice and data over ordinary telephone copper wires, resulting in potentially

    better voice quality than an analog phone can provide.

    It offers circuit-switched connections (for either voice or data), and packet-

    switched connections (for data), in increments of 64 kilobit/s.

    A major market application for ISDN in some countries is Internet access,

    where ISDN typically provides a maximum of 128 kbit/s in both upstream

    and downstream directions.

    ISDN line can take care of most people's complete communications needs

    (apart from broadband Internet access and entertainment television) at a much

    higher transmission rate, without forcing the purchase of multiple analog

    phone lines. It also refers to Integrated Switching and Transmission[3] in that

    telephone switching and carrier wave transmission are integrated rather than

    separate as in earlier technology.

    ADVANTAGES

    ISDNs ability to deliver at a minimum two simultaneous connections in any

    combination of data, voice, video, fax over a single line.

    Multiple devices can be attached to the line.

    3.2.3 VSAT (VERY SMALL APERTURE TERMINAL)

    A Very Small Aperture Terminal (VSAT), is a two-way satellite ground station or a

    stabilized VSAT antenna with a dish antenna that is smaller than 3 meters.

    Data rates typically range from 56 kbps up to 4 Mbps. VSATs access satellites

    in geosynchronous orbit to relay data from small remote earth stations (terminals) to

    other terminals (in mesh configurations) or master earth station "hubs" (in star

    configurations).

    USAGE

    11

    http://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Packet_switched_networkhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Internet_accesshttp://en.wikipedia.org/wiki/Broadband_Internet_accesshttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/ISDN#cite_note-2http://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Ground_stationhttp://en.wikipedia.org/wiki/Satellite_dishhttp://en.wikipedia.org/wiki/Geosynchronous_orbithttp://en.wikipedia.org/wiki/Mesh_networkinghttp://en.wikipedia.org/wiki/Circuit_switchinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Packet_switched_networkhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Internet_accesshttp://en.wikipedia.org/wiki/Broadband_Internet_accesshttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/ISDN#cite_note-2http://en.wikipedia.org/wiki/Telephone_switchhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Ground_stationhttp://en.wikipedia.org/wiki/Satellite_dishhttp://en.wikipedia.org/wiki/Geosynchronous_orbithttp://en.wikipedia.org/wiki/Mesh_networking
  • 8/4/2019 Introduction 7

    12/28

    VSATs are most commonly used to transmit data orbroadband data (for the

    provision ofSatellite Internet access to remote locations, VoIP or video). VSATs are

    also used for transportable, on-the-move (utilizing phased array antennas) or

    mobile maritime communications.

    DIFFERENT CONFIGURATIONS

    Most VSAT networks are configured in one of these topologies

    A star topology, using a central uplink site, such as a network operations

    center (NOC), to transport data back and forth to each VSAT terminal via

    satellite.

    A mesh topology, where each VSAT terminal relays data via satellite to

    another terminal by acting as a hub, minimizing the need for a centralized

    uplink site,

    A combination of both star and mesh topologies.

    APPLICATIONS

    New online VSAT systems that use Ka band technology provide higher

    bandwidth.

    High speed communication interfaces.

    Telephony

    Satellite news gathering(SNG)

    Digital Audio Broadcasting(DAB)

    3.3VIRTUAL PRIVATE NETWORK

    Virtual private network (VPN) is a technology that is gaining popularity among large

    .Organizations that use the global Internet for both intra- and inter organization

    communication, but require privacy in their internal communications.

    12

    http://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Phased_arrayhttp://en.wikipedia.org/wiki/Oceanhttp://en.wikipedia.org/wiki/Star_topologyhttp://en.wikipedia.org/wiki/Mesh_topologyhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Satellite_Internet_accesshttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Phased_arrayhttp://en.wikipedia.org/wiki/Oceanhttp://en.wikipedia.org/wiki/Star_topologyhttp://en.wikipedia.org/wiki/Mesh_topology
  • 8/4/2019 Introduction 7

    13/28

    ADVANTAGE OVER HYBRID NETWORK

    Both private and hybrid networks have a major drawback cost. Private wide-area

    networks (WANs) are expensive.

    To connect several sites, an organization needs several leased lines, which means a

    high monthly fee.

    Figure 1-VPN

    WORKING OF VPN

    VPN creates a network that is private but virtual. It is private because it guarantees

    privacy inside the organization. It is virtual because it does not use real private

    WANs; the network is physically public but virtually private.

    VPN uses IPSec protocol in the tunnel mode to guarantee authentication, integrity

    and privacy.

    TUNNELING-To guarantee privacy and other security measures for an

    organization, VPN can use the IPSec in the tunnel mode. In this mode, each IP

    datagram destined for private use in the organization is encapsulated in another

    datagram.

    The public network (Internet) is responsible for carrying the packet from R1 to R2.

    Outsiders cannot decipher the contents of the packet or the source and destination

    addresses. Deciphering takes place at R2, which finds the destination address of the

    packet and delivers it.

    13

  • 8/4/2019 Introduction 7

    14/28

    3.4 VLAN(VIRTUAL LAN)

    The VLAN software when installed on a router facilitates a mechnasim to provideterminals a mechanism where they can virtually belong to the same LAN but

    geographically they maybe in a different geographical position.

    The criterion for membership into a VLAN is geographical and each terminal on a

    VLAN is identified by its port number and MAC address.

    Figure 2:The backbone switch(L3 switch) connected to the VLANs

    Thus we can roughly define a virtual LAN network as a local area network

    configured by software not physical wiring.

    EXAMPLE

    14

  • 8/4/2019 Introduction 7

    15/28

    Say a company has two buildings. Each building can have its own switched LAN

    connected by a backbone. People in the first building and second building can be in

    the same work group though they are connected to different physical LANs. Such an

    offican can use the VLAN to reduce costs.

    VLAN CONFIGURATION

    The different stations can be grouped into different VLANs in three ways

    MANUAL CONFIGURATION

    In this method the administration assigns a identifier to each station.The term

    manually here means that the administrator types the port numbers, the IP addresses,

    or other characteristics, using the VLAN software.

    AUTOMATIC CONFIGURATION

    Automatic Configuration In an automatic configuration, the stations are

    automatically connected or disconnected from a VLAN using criteria defined by the

    administrator. For example, the administrator can define the project number as the

    criterion for being a member of a group. When a user changes the project, he or she

    automatically migrates to a new VLAN.

    SEMIAUTOMATIC CONFIGURATION

    A semiautomatic configuration is somewhere between a manual configuration and an

    automatic configuration. Usually, the initializing is done manually, with migrations

    done automatically.

    ADVANTAGES USING VLAN

    Cost and Time reduction

    VLANs can reduce the migration cost of stations going from one group to

    another. Physical reconfiguration takes time and is costly.

    Creating Virtual Work Groups

    For example, in a campus environment, professors working on the same

    project can send broadcast messages to one another without the necessity of

    15

  • 8/4/2019 Introduction 7

    16/28

    belonging to the same department. This can reduce traffic if the multicasting

    capability of IP was previously used.

    Security

    VLANs provide an extra measure of security. People belonging to the same

    group can send broadcast messages with the guaranteed assurance that users

    in other groups will not receive these messages.

    3.5 STUDY ON ROUTERS:

    3.5.1 WHAT IS A ROUTER?

    A router is a three-layer device that routes packets based on their logical addresses

    (host-to-host addressing). A router normally connects LANs and WANs in the

    Internet and has a routing table that is used for making decisions about the route. The

    routing tables are normally dynamic and are updated using routing protocols.

    A three-layer switch is a router, but a faster and more sophisticated. The switching

    fabric in a three-layer switch allows faster table lookup and forwarding.

    Figure 3:A cisco router

    16

  • 8/4/2019 Introduction 7

    17/28

    Figure 4: Connection though a router

    Routing protocols are used to continuously update the routing tables that are

    consulted for forwarding and routing.

    3.5.2 ROUTING PROTOCOLS:

    ROUTING INFORMATION PROTOCOL(RIP) :

    The Routing Information Protocol (RIP) is an intradomain routing protocol used

    inside an autonomous system. It is a very simple protocol based on distance vector

    routing.

    RIP employs the hop count as a routing metric. The hold down time is 180 seconds.

    RIP prevents routing loops by implementing a limit on the number of hops allowed

    in a path from the source to a destination. The maximum number of hops allowed for

    RIP is 15. This hop limit, however, also limits the size of networks that RIP can

    support. A hop count of 16 is considered an infinite distance and used to deprecate

    inaccessible, inoperable, or otherwise undesirable routes in the selection process.

    17

  • 8/4/2019 Introduction 7

    18/28

    Figure 5: Routing using RIP

    OPEN SHORTEST PATH FIRST PROTOCOL (OSPF) :

    The Open Shortest Path First or OSPF protocol is an intradomain routing protocol

    based on link state routing. Its domain is also an autonomous system.

    OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely

    within a single routing domain (autonomous system). It gathers link state information

    from available routers and constructs a topology map of the network. The topologydetermines the routing table presented to the Internet Layer which makes routing

    decisions based solely on the destination IP address found in IP packets.

    18

  • 8/4/2019 Introduction 7

    19/28

    Figure 6: Routing using OSPF

    INTERIOR GATEWAY ROUTING PROTOCOL (IGRP):

    Interior Gateway Routing Protocol (IGRP) is a distance vectorinterior routing

    protocol (IGP) invented by Cisco. It is used by routers to exchange routing datawithin an autonomous system.

    IGRP is aproprietary protocol. IGRP was created in part to overcome the limitations

    ofRIP (maximum hop count of only 15, and a single routing metric) when used

    within large networks. IGRP supports multiple metrics for each route,

    including bandwidth,delay,load, MTU, and reliability; to compare two routes these

    metrics are combined together into a single metric, using a formula which can be

    adjusted through the use of pre-set constants. The maximum hop count of IGRP-routed packets is 255 (default 100), and routing updates are broadcast every 90

    seconds (by default).

    19

    http://en.wikipedia.org/wiki/Distance-vector_routing_protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Cisco_Systems,_Inc.http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Autonomous_system_(Internet)http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Routing_Information_Protocolhttp://en.wikipedia.org/wiki/Bandwidth_(computing)http://en.wikipedia.org/wiki/Network_delayhttp://en.wikipedia.org/wiki/Load_(computing)http://en.wikipedia.org/wiki/Maximum_transmission_unithttp://en.wikipedia.org/wiki/Reliability_(computer_networking)http://en.wikipedia.org/wiki/Broadcasting_(computing)http://en.wikipedia.org/wiki/Distance-vector_routing_protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Interior_Gateway_Protocolhttp://en.wikipedia.org/wiki/Cisco_Systems,_Inc.http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Autonomous_system_(Internet)http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Routing_Information_Protocolhttp://en.wikipedia.org/wiki/Bandwidth_(computing)http://en.wikipedia.org/wiki/Network_delayhttp://en.wikipedia.org/wiki/Load_(computing)http://en.wikipedia.org/wiki/Maximum_transmission_unithttp://en.wikipedia.org/wiki/Reliability_(computer_networking)http://en.wikipedia.org/wiki/Broadcasting_(computing)
  • 8/4/2019 Introduction 7

    20/28

    3.5.3 Router Components (internal) :

    ROM

    ROM is used to store the router's bootstrap startup program, operating system

    software, and power-on diagnostic tests programs. In order to perform ROM

    upgrades you remove and replace pluggable chips on the motherboard.

    Flash Memory

    It holds operating system image(s). Flash memory is erasable, reprogrammable

    ROM. You can perform Cisco IOS software upgrades without having to remove

    and replace chips. Flash content is retained when you switch off or restart the router.

    RAM

    RAM is used to store operational information such as routing tables, router's running

    configuration file. RAM also provides caching and packet buffering capabilities. Its

    contents are lost when you switch off or restart the router.

    NVRAM

    NVRAM (nonvolatile RAM), is used to store the router's startup configuration file. It

    does not lose data when power is switched off. So the contents of the startup

    configuration file are maintained even when you switch off or restart the router.

    Network Interfaces

    The router's network interfaces are located on the motherboard or on separate

    interface modules. You configure Ethernet or Token Ring interfaces to allow

    connection to a LAN. The synchronous serial interfaces are configured to allowconnection to WANs. You can also configure ISDN BRI interfaces to allow

    connection to an ISDN WAN..

    3.5.4 Router Components (External) :

    A router can be configured over any of its network interfaces. You can supply

    configuration information to a router using:-

    20

  • 8/4/2019 Introduction 7

    21/28

    TFTP servers : Trivial File Transfer Protocol; A simplified version of FTP that

    allows files to be transferred from one computer to another over a network.

    -Virtual terminals

    -Network management stations

    3.5.5 MODES OF A ROUTER:

    User mode

    Privileged mode

    If you want to access privileged mode you have to enter a password. The commands

    available in Privileged mode also include all those available in User mode. You can

    use Privileged commands to:-

    set operating parameters

    perform a detailed examination of the router's status

    test and debug router operation

    access global and other included configuration modes

    From Privileged mode you can enterglobal configuration mode. This gives you

    access to configuration commands that affect the system as a whole, and to other

    configuration modes.

    You can specify the source of the configuration commands as being from :-

    a terminal

    memory

    the network

    You can access many other specific configuration modes from Global Configuration

    mode that allow complex configurations to be performed.

    Setup Mode: If the router does not have a configuration file it will automatically

    enter Setup mode when you switch it on. Setup mode presents you with a prompted

    21

  • 8/4/2019 Introduction 7

    22/28

    dialog, called the system configuration dialog, in which you establish an initial

    configuration.

    Rom Monitor Mode: If the router does not find a valid operating system image, or if

    you interrupt the boot sequence, the system may enter ROM monitor mode. From

    ROM monitor mode you can boot the device or perform diagnostic tests.

    3.6 SWITCHES

    A network switch or switching hub is a computer networking device that

    connects network segments. The term commonly refers to a multi-port network

    bridge that processes and routes data at the data link layer(layer 2) of the OSI model.

    Switches that additionally process data at the network layer(Layer 3) and above are

    often referred to as Layer 3 switches ormultilayer switches.

    The network switch plays an integral part in most modern Ethernet local area

    networks (LANs). Mid-to-large sized LANs contain a number of

    linked managed switches. Small office/home office (SOHO) applications typically

    use a single switch, or an all-purpose converged device such as a gateway to access

    small office/homebroadband services such as DSL orcable internet. In most of these

    cases, the end-user device contains a routerand components that interface to the

    particular physical broadband technology. User devices may also include a telephone

    interface forVoIP.

    Figure 7: Network switch

    22

    http://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIP
  • 8/4/2019 Introduction 7

    23/28

    An Ethernet switch operates at the data link layer of the OSI model to create a

    separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and

    D) on 4 switch ports, A and B can transfer data back and forth, while C and D also

    do so simultaneously, and the two conversations will not interfere with one another.

    In the case of a hub, they would all share the bandwidth and run in half duplex,

    resulting in collisions, which would then necessitate retransmissions. Using a switch

    is called microsegmentation. This allows computers to have dedicated bandwidth on

    a point to point connections to the network and to therefore run in full duplex without

    collisions.

    3.6.1 MULTILAYER SWITCH AND ROLE OF SWITCHES IN NETWORKS

    Switches may operate at one or more layers of the OSI model, including data

    link, network, ortransport (i.e., end-to-end). A device that operates simultaneously at

    more than one of these layers is known as a multilayer switch.

    While Layer 2 functionality is adequate for bandwidth-shifting within one

    technology, interconnecting technologies such as Ethernet and token ring are

    easier at Layer 3.

    Interconnection of different Layer 3 networks is done by routers. If there are

    any features that characterize "Layer-3 switches" as opposed to general-

    purpose routers, it tends to be that they are optimized, in larger switches, for

    high-density Ethernet connectivity.

    In some service provider and other environments where there is a need for a

    great deal of analysis of network performance and security,some vendors

    provide firewall,network intrusion security and performance modules.

    The switch can also be used to create a mirror image of data that can go to an

    external device

    23

    http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/Half_duplexhttp://en.wikipedia.org/wiki/Microsegmentationhttp://en.wikipedia.org/wiki/Full_duplexhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/Half_duplexhttp://en.wikipedia.org/wiki/Microsegmentationhttp://en.wikipedia.org/wiki/Full_duplexhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Router_(computing)
  • 8/4/2019 Introduction 7

    24/28

    3.6.2 SWITCH CONFIGURATIONS

    UNMANAGED SWITCH

    These switches have no configuration interface or options. They areplug and

    play. They are typically the least expensive switches, found in home, SOHO,

    or small businesses. They can be desktop or rack mounted.

    MANAGED SWITCH

    These switches have one or more methods to modify the operation of the

    switch. Common management methods include: a command-line

    interface (CLI) accessed via serial console. Examples of configuration

    changes that one can do from a managed switch include: enable features such

    as Spanning Tree Protocol, setport bandwidth, create or modify Virtual

    LANs (VLANs), etc.

    SMART

    These are managed switches with a limited set of management features. For

    a price much lower than a fully managed switch they provide a web interface

    (and usually no CLI access) and allow configuration of basic settings, such as

    VLANs, port-bandwidth and duplex.

    ENTERPRISE

    These have a full set of management features, including CLI, SNMP agent,

    and web interface. They may have additional features to manipulate

    configurations, such as the ability to display, modify, backup and restore

    configurations.

    3.7 HUBS

    An Ethernet hub, active hub, network hub, repeater hub or hub is a device for

    connecting multiple twisted pairorfiber opticEthernet devices together and making

    them act as a single network segment. Hubs work at thephysical layer(layer 1) of

    the OSI model.

    24

    http://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/SOHO_networkhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Serial_consolehttp://en.wikipedia.org/wiki/Spanning_Tree_Protocolhttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/Plug_and_playhttp://en.wikipedia.org/wiki/SOHO_networkhttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Command-line_interfacehttp://en.wikipedia.org/wiki/Serial_consolehttp://en.wikipedia.org/wiki/Spanning_Tree_Protocolhttp://en.wikipedia.org/wiki/Transmission_ratehttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Virtual_LANhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_model
  • 8/4/2019 Introduction 7

    25/28

    PASSIVE HUBS

    A passive hub is just a connector. It connects the wires coming from different

    branches. In a star-topology Ethernet LAN, a passive hub is just a point where the

    signals coming from different stations collide; the hub is the collision point. This

    type of a hub is part of the media; its location in the Internet model is below the

    physical layer.

    REPEATERS

    A repeater receives a signal and, before it becomes too weak or corrupted,

    regenerates the original bit pattern. The repeater then sends the refreshed signal.

    Figure 8:Repeater

    A repeater does not actually connect two LANs; it connects two segments of the

    same LAN. The segments connected are still part of one single LAN. A repeater is

    not a device that can connect two LANs of different protocols.

    A repeater has only forwarding capacity and no filtering capacity and is a generator.

    ACTIVE HUBS

    An active hub is actually a multiport repeater. It is normally used to create

    connections between stations in a physical star topology.

    25

  • 8/4/2019 Introduction 7

    26/28

    BRIDGES

    A bridge operates in both the physical and the data link layer. As a physical layer

    device, it regenerates the signal it receives. As a data link layer device, the bridge can

    check the physical (MAC) addresses (source and destination) contained in the frame.

    A bridge has filtering capability. It can check the destination address of a frame and

    decide if the frame should be forwarded or dropped. If the frame is to be forwarded,

    the decision must specify the port. A bridge has a table that maps addresses to ports.

    Figure 9: Bridge

    A transparent bridge is a bridge in which the stations are completely unaware of the

    bridge's existence. If a bridge is added or deleted from the system, reconfiguration of

    the stations is unnecessary.

    A system equipped with transparent bridges must meet three criteria:

    1. Frames must be forwarded from one station to another.

    2. The forwarding table is automatically made by learning frame movements in the

    Network.

    3. Loops in the system must be prevented.

    3.8 OSI LAYERS:

    OSI stands for Open Systems Interconnection Reference Model. In short it is termed

    as OSI model or OSI reference model or 7-layer model orLayered Model or OSI

    seven layer models.

    26

  • 8/4/2019 Introduction 7

    27/28

    3.8.1 Functionality of Application Layer

    Application layer is the 7th layer of OSI model and sometimes referred as Layer

    Seven of OSI model. The functionality of application layer is described below:

    Network processes to applications.

    Provides network services to application processes, such as e-mail, file

    transfer & terminal emulation.

    3.8.2 Functionality of Presentation Layer

    Presentation layer is the 6th layer of OSI model and sometimes referred as Layer Six

    of OSI model. The functionality of presentation layer is described below:

    Data representation and encryption

    Ensure data is readable by receiving system.

    Format of data

    Data structures

    Negotiates data transfer syntax for application layer.

    3.8.3 Functionality of Session Layer

    Session Layer is the 5th layer of OSI model and sometimes referred as Layer Five of

    OSI model. The functionality of session layer is described below:

    Interhost communication

    Establish, manages & terminates session between appications.

    3.8.4 Functionality of Transport Layer

    Transport Layer is the 4th layer of OSI model and sometimes referred as Layer Four

    of OSI model. The functionality of transport layer is described below:

    End-to-end connections and reliability (TCP)

    Concerned with transportation issues between hosts.

    Data transport reliability.

    Establish, maintain, terminate virtual circuits. Fault detection & recovery information flow control.

    Controls the reliability of a given link through flow control,

    segmentation/desegmentation, and error control.

    3.8.5 Functionality of Network Layer

    Network Layer is the 3rd layer of OSI model and sometimes referred as Layer Three

    of OSI model. The functionality of Network layer is described below:

    Path determination and logical addressing (IP) Logical addressing

    27

  • 8/4/2019 Introduction 7

    28/28

    Best effort delivery

    3.8.6 Functionality of Data link Layer

    Data link layer is the 2nd layer of OSI model and sometimes referred as Layer Two

    of OSI model. The functionality of Data link layer is described below:

    Physical addressing (MAC & LLC)

    Provides reliable transfer of data across media

    Physical addressing, network topology, line descipline, error notification,

    ordered delivery to frames, flow control

    3.8.7 Functionality of Physical Layer

    Physical Layer is the 1st layer of OSI model and sometimes referred as Layer One of

    OSI model. The functionality of physical layer is described below:

    Media, signal and binary transmission

    4 Conclusion

    During the Industrial Training period , I learnt how a company functions as a whole ,

    Role of various employees specially in the IT sector and their necessity in the

    smoothe functioning of the company.

    Meanwhile , I learnt abt how the networking system of a company works and the

    various networking devices used, got a good understanding of networking terms,

    their applications and day to day usage.

    Thus , the training was very helpul and helped me understand networking concepts,

    devices such as routers , switches , different technologies used and how network

    management is done in the company.