pvdtn presentation
DESCRIPTION
Explains the path-breaking patented PVDTN cvonnectivity systemTRANSCRIPT
PRIVATE VOICE - DATA TELECOM NETWORK
“A BUSINESS TOOL YOU CANNOT AFFORD TO BE WITHOUT”
• 100% secure, fixed operating cost,
private network.
• No usage charge.
• Set-up cost pay back
in 1 to 2 years
• Ideal communications backbone
for ERP
• Cuts present telecom costs
by up to 75%.
• Unlimited inter-locational
communications - speech, fax, data.
• High network up-times.
DELHI
MUMBAI
KOLKATA
• Voice and voice-data conferencing.
• Integrates voice, fax, data over
analogue and digital leased lines.
• Connects any place in the world.
CHENNAI
• Connects any place in the world.
• Group III fax - no time lost in
document scanning.
• Set-up cost - 50 to 60% of conventional
digital leased line solutions; 25% of PAMA
VSAT solution.
• Annual operating cost - 75 to 80% of
conventional digital leased line solution;
20 to 25% of PAMA VSAT solution.
• Normal telephone type
speech - no delay or
distortions.
• Eliminates STD calls between
Company locations.
• Converts MLOs to VSOs
• Break-even duration - 25 minutes of additive communications from both sides of a link, for all types of communications
taken together, speech, fax, data.
• Patent 176287 of 27.12.1991
•Patent 202674 of 23.10.1998
&
New Patent Pending
6/1A, KARTIK BOSE LANE, KOLKATA - 700006.
Phone: 91332543-3684; FAX: 91332543-3684
Mobile phone : +919432228808 / +919831210647
e-mail : [email protected]
From Delhi
From Nagpur
From Mumbai
From Chennai
V
D
Digital n x 64 KBPS
Leased Lines
Analogue
Leased Lines
From locations in same city
or outstation location
Trunk line cards KDI
Voice / fax cards KVF.8
Data cards KHS.2 / KLS.1
Tel
LINE SPLITTER – KM2100
Fig 1
PVDTN NODE ARCHITECTURE
D
P
S
Modem
LCE 2W E&M
Fax
LAN BUS
Server
LAN Nodes
IP RouterCircuit switch router
Residential Connection
NOTE: In Kolkata there are no 4WE&M analogue lines terminating on the VDPS
trunk cards. However, these have been shown so that the analogue
connection at Mumbai from Ahmedabad and at Delhi from the CG Cell
may be understood.
2WE&M lines shown will be present in all locations for residential
connections.
3
3
3 3 33
2 2
2
2
2 11
1
1
11
4
4 44
4
4
TYPICAL STATE WAN CONFIGUSING MULTI-TIER PVDTN
FOR INTEGRATED VOICE, FAX, DATA COMMUNICATIONSUP TO GRAM PANCHAYAT
WITH 100% ALTERNATE ROUTING / REDUNDANCY
768 KBPS
384 KBPS
2 X 128 KBPS
2 X 2WE&M
1
11
62.42 KBPS6.22 KBPS
320.7 KBPS
2 MBPS8
88
8
8
4
4
4
6
3
6 6
6
6
3
3
Fig 2
KOLKATA
4
4
4
4
4 4 4
4
4
4
4
4
4 MBPS
2 MBPS
1958.6 KBPS 4 MBPS
2 MBPS
8
8
8
88 8
8 8
8
8
88
8
4
4
4
44
4
NOTE : Total number of trunks emanating from Kolkata is 144 (8 x 18). Using the Erlang loading
norm this can serve 1152 extensions in Kolkata. Thus 1158 officers may be provided NET
telephones and they may be spread across Writers’ Building, New Secretariat, and the Secretariats
at Salt Lake
7
3
4
6
Chandigarh
Delhi
Gurgaon
IHC
227.2
KBPS
140.64
KBPS
300.40
KBPS
118.48
120.96
KBPS
103.76
KBPS
192 KBPS
256 KBPS
512 KBPS
320 KBPS
Fig 3CII – PVDTN
Single Tier Network
WIDE AREA NETWORK TOPOLOGY
65
9
9 4
6
3
3
3
2
Mumbai
Hyderabad
Kolkata
Bangalore
118.48
KBPS
120.96
KBPS
110.64
KBPS
KBPS256 KBPS
128 KBPS
6
63
33
X
Y
X + YX + Y
A
B
C
MAX (X,Y)
Fig 4Fig 4
TRITRI--NODE FORMATIONNODE FORMATION
IN PVDTNIN PVDTN
USED FOR SINGLE AND MULTIUSED FOR SINGLE AND MULTI--TIER NETWORKSTIER NETWORKS
1. X and Y are the total bandwidth impinged on the WAN at each location at A and B respectively. This includes bandwidth for data, speech, and fax communications.
2. The derivation of X and Y at each location is shown in Table I of our draft proposal presentation.
3. The link bandwidth calculations are shown in Table II of draft proposal presentation. As shown above the main links AC and BC will have a total bandwidth of X + Y. This is to take care of 100% alternate routing in case of failure of either AC or BC links.
4. The cross link AB will have the larger of the two bandwidths X,Y.
5. We hope this will help you to understand the basis of derivation of location and link bandwidths shown in our draft proposal presentation.
Fig 5Schematic Diagram of STS
INTERNET
STS IS
PS
Storage
INTRANET CS
•PS, IS, CS have same fields which are synchronised at each
connection.
•CS collates data from internal data bases to pass on to PS
through IS, and also distributes information received from the
interactive Web pages in the PS to the relevant data base.
•The information stored in the Storage associated with the PS
helps to carry out e-commerce activity like placing orders, internet
banking. Etc. The storage is updated in each STS cycle.
2
0
1
DB2DB1
Public Server
For Company information,
Inter-active Web pages
and
Internet mail Gateway
PS
Company
data bases
Company
information
and
mail server
CS
3-Pos Electro-mechanical
RJ45 switch
Fig 6
Switching arrangement of
STS
Internet LANCompany LAN
Intermediate Server
For transferring information
and mail back and forth
Between CS and PS
(IS)
Switch changes state on
Automated settable commands
from software in IS
1 2
0
Nodes for
Internet browsing
3-Pos EM RJ45
Switch
State changes
With manual command
From Node
IL
I/O
Box
CL
I/O
Box
Fig 7 – Overall datagram
Company
External mail
Company Info
Web Info
IS PSCS
Company Info
Web Info
Fig 8
Step 1 – IS connected to CSIS PSCS
Changes in
Web
Info received
Changes in
Company
Info received
Incoming Outgoing
Company
External mail
Company Info
Web Info
Fig9
Step 2 – IS in Null after connecting to CSIS PSCS
Changes in
Company
Info received
Outgoing
received
Company
External mail
Incoming
received
Outgoing
received
All content
In IS cleansed
For viruses etc
Fig 11
Step 4 – IS in Null after connecting to PS
Company
External mail
Company Info
Web Info
Fig 10
Step 3 – IS connected to PSIS PSCS
Changes in
Web
Info received
Outgoing
received
Incoming
received
Changes in
Company
Info received
Company
External mail
Company Info
Web Info
Step 4 – IS in Null after connecting to PSIS PSCS
Changes in
Web
Info received
Incoming
received
All content
In IS
Cleansed for
Viruses, etc.
Summarising, our patented business tool PVDTN can give your organisation the
following benefits.
� Saves around 75% of your present
telecom costs.
� Saves a substantial portion of your inter-
locational travelling costs and time.
� Speeds up decision making.
� Ensures 100% security of your internal
data bases.
� Converts your MLO (multi-locational
organisation) into a VSO (virtual single
office).
� Facilitates e-Commerce through a Public
server connected to the Internet and the
STS system
To convert your present voice and data communications infrastructure into a PVDTN the
following steps are required.
� The present LANs in each location will be connected to the integrated PVDTN WAN through routers and the channel splitter
� A separate Internet LAN will be provided for connecting the Public server (central location only) and internet browsing nodes (at all locations).
� The present voice / fax LAN through the existing EPABX will continue to be used for communications with organisation outsiders through the PSTN (public switched telephone network)..(public switched telephone network)..
� A separate voice / fax LAN will be set up at each location and connected to the PVDTN WAN through the VDPS (EPAX with E&M trunks) and the channel splitter.
� The present data WAN connectivity will be changed to point-to-point leased lines in tri-node configuration or with redundant links for alternate routing..
� There will be no disturbance to the existing network till the PVDTN WAN / LAN is ready for a smooth and quick cutover
ADDITIONAL INFRASTRUCTURE FOR PVDTNAT CENTRAL LOCATION
EPABX
LAN
VDPS
LAN
PSTN
CSPS
Channel splitter
Existing infrastructure
Additional infrastructure
INTERNET
LANINTRANET
LAN
INTERNET
PVDTN
WAN
IBN
Secure Switch
IS
S
S
S
S
ADDITIONAL INFRASTRUCTURE FOR PVDTNAT OTHER LOCATION
EPABX
LAN
VDPS
LAN
PSTN
IBN
Channel splitter
Existing infrastructure
Additional infrastructure
INTERNET
LANINTRANET
LAN
INTERNET
PVDTN
WAN
S
S
IBN
S
S
NIB – IITOPOLOGY
Kolkata
Guwahati
Lucknow
Chattisgarh
Bhopal
Jaipur
Gandhinagar / Ahmedabad
Chandigarh
Shimla
Srinagar
Kolkata
Delhi
IGWIGW
IGW
Mumbai
BRAS
NoidaNoida
Patna
Fig.12
PuneIGW
IGW
IGW
IGW
IGW
H-bad
BRAS
Pondicherry
Chennai
Thiruvanthapuram
Ernakulam
Mumbai
Chennai
Bangalore
Bangalore
CORE Router
BRAS
STM16
STM1
EDGE Router
Goa
Bhubaneshwar
Back Office facilities – Web hosting,
Customer servers, Messaging, Caching,
Billing, etc.
NIB – IIARCHITECTURE
CORE ROUTER
TIER I
EDGE ROUTERS
EDGE ROUTERS
BRAS BRAS BRAS BRAS
NATIONAL INTERNET
EXCHANGE
TO CONNECT
ALL ISPs AND PROVIDE
COMMON
INTERNATIONAL
GATEWAY
NIEX
EDGE ROUTER
Fig. 13
RAS
PSTN NETWORK
TO OTHER CORE ROUTERSDIAL – UP
CONNECTIONS
DIAL – UPSERVICE
EDGEROUTER
EDGE ROUTERS EDGE ROUTERS
TIER II TIER II
TIER II TIER II
TIER IITIER II TIER II
TIER II TIER II
TIER II
DSLAMs
DSLAMs
EDGE ROUTERS
Leased Lines from VPN Subscriber Premises
MPLS VPN
EDGE ROUTER
EDGE ROUTERS
EDGE ROUTERS
Explanatory Notes on VPN Vulnerability
Slide 1 shows the topology of a typical ISP’s IP network over which both Internet and VPN services are laid out. This is the topology of BSNL’s NIB – ii. Five cities are connected in a full mesh connectivity to form the core IP back-bone across India. Other cities are connected through tri-node rings from the nodes of the core network through the Tier-1 switch at these nodes.
Slide 2 shows the architecture of each of these nodes. The core router at the node sits on the nodes. The core router at the node sits on the Tier 1 switch. From these switches are taken the router connections for all the services –VPN, Internet through Broadband and PSTN. Thus you will note that there is continuous physical connectivity between all the routers in this IP network through the Tier 1 switch at each IP Node (POP). Thus there is continuous public domain access to the VPN routers.
1. In any IP network, public or private, the WAN ports of all routers in the network have continuous physical access to each other. Thus while a router port is engaged in communication with another in the network, a third port can have simultaneous communications with it. If the IP network is in the public domain (Internet) or has access from the public domain (VPN), this third port could be that of a hacker.
2. Thus while the various security protocols like IP Sec,etc., can transport the data from one computer toanother securely, the LAN and the data bases residingon it are exposed to public domain through a VPNwhich has public domain access for reasons explainedin 1 above.
3. For WAN computing it is necessary to have a realprivate network (at least for data communications).Once this is there then inter-locational voice / fax can berun over this network at marginal increase in theoperating cost, using the patented PVDTN system.
4. You should not expose your company data bases to thepublic domain through Internet, ISDN back-up, or VPN(which has public domain access) for reasons explainedearlier in 1 above.
5. The MPLS networks currently in vogue are another formof VPN network and are subject to the comments in 1 to4 above.
� We do hope the above notes will
explain the security vulnerability of
your data bases when these are on
LANs connected to VPN (MPLS or
other wise) of any service provider.
� If you wish to secure your data
bases 100% then use point-to-pointbases 100% then use point-to-pointleased lines for inter- locationalcomputer connectivity.