You are on page 1of 112

NIRWW RELIANCE WEB WORLD

COMPANY OBJECTIVE

Mainly there are six objectives for preparing project on reliance communication,
they are as follows:-

1. Practical experience on today’s corporate world.

2. Comparison between Theorical knowledge obtains BBA and Experience of Business life.

3. To observation and understand Four Management functions of reliance communication.

4. To understand various things demanded by customer and various ways to solve it

5. To learn how to behave with

- Superior

- Subordinate

- Collogues

- Worker

- Customer

To learn How to take various decision in dynamic world with changing situation

PPI,LIMDA Page 1
NIRWW RELIANCE WEB WORLD

PPI,LIMDA Page 2
NIRWW RELIANCE WEB WORLD

2) PROJECT DEFINITION & OBJECTIVES

2.1 Project profile

 Here we are prepared a project under the title:

“NETWORK INFRASTRUCTUR RELIANCE WEB WORLD”

 Due to deep interest in the field of networking, we have chosen the project of
networking.

 Another reason for this project is that the entire networking of the reliance web
world based on the fiber optic connectivity and grounding structure cable connectivity of
the pc in the reliance web world.

 As far as we concern with the aim of our project, the main goal of our project is
to introduce the basic Networking of the reliance web world.

 In reliance web world how pc is connected to each other, which topologies are
used and why as well how Local Area Network (LAN) to Wide Area Network (WAN)
connectivity is provide.

 Basically in reliance web world all the pc is connected in one LAN that is
divided into five Virtual LAN s that is equal to the number of Zones of the reliance web
world.

 So, we also go through the basic study of virtual LAN. How VLAN is created
and how pc of the two different VLAN can communicate with each other.

 We also go introduce the basic logical and physical connectivity of the all the
Media Access node (MCN) and all the MCN of the entire city to the central MCN.

PPI,LIMDA Page 3
NIRWW RELIANCE WEB WORLD

2.2 Project Definitions

 This project is to introduce the basic Networking of the reliance web world.

 In reliance web world how pc is connected to each other, which topologies are
used and why as well how Local Area Network (LAN) to Wide Area Network (WAN)
connectivity is provide.

PPI,LIMDA Page 4
NIRWW RELIANCE WEB WORLD

2.3 GOALS & OBJECTIVE

 Basically in reliance web world all the pc is connected in one LAN that is
divided into five Virtual LAN s that is equal to the number of Zones of the reliance web
world.

 So, we also go through the basic study of virtual LAN. How VLAN is created
and how pc of the two different VLAN can communicate with each other.

 We also go introduce the basic logical and physical connectivity of the all the
Media Access node (MCN) and all the MCN of the entire city to the central MCN.

PPI,LIMDA Page 5
NIRWW RELIANCE WEB WORLD

2.4 SCOPE

 The scope of the study refers to the job that to know about the activities of the
organization. The study means that the analysis of the products of the company on which
she has to focus.

 During the summer training the volunteer need to find out the corporate strategies
of the running company and the mile stone which the company has covered during its
journey. In the summer training, it is necessary for the student that she involves with the
experience guys to get the knowledge about the company. That is how the company has got
the success, Or if it is going in the loss, why.

 In my training period I have found that the reliance group is the biggest group in
Indian companies. I felt that I can learn the more in the Reliance web world. Reliance web
world is the part of the Reliance Capital Limited which is a growing company in the
broadband financial services.

 Reliance Anil Dhirubhai Ambani group is also deals in communication, energy,


natural resources, media, and entertainment, healthcare and infrastructure.

PPI,LIMDA Page 6
NIRWW RELIANCE WEB WORLD

3. Reliance Infocomm
Introduction
Reliance Infocomm is the outcome of the late visionary Dhirubhai Ambani’s (1932-2010)
dream to herald a digital revolution in India by bringing affordable means of information
and communication to the doorsteps of India’s vast population.

 “Make the tools of Infocomm available to people at an affordable cost, they will
overcome the handicaps of illiteracy and lack of mobility”, Dhirubhai Ambani charted
out the mission for Reliance Infocomm in late 1999.

 He saw in the potential of information and communication technology a once-in


–a lifetime opportunity for India to leapfrog over its historical legacy of backwardness
and underdevelopment.

 Working at breakneck speed, from late 1999 to 2009 Reliance Infocomm built
the backbone for a digital India -60,000 kilometres of fiber optic backbone, crisscrossing
the entire country.

 The Reliance Infocomm pan-India network was commissioned on December


28,2002, the 70th birth anniversary after his demise July -6 , 2002

 Reliance Infocomm network is a pan India, high capacity, integrated (wireless


and wire line) and convergent (voice, data and video) digital network, designed to offer
services that span the entire Infocomm value chain–infrastructure, services for enterprises
and individuals applications and consulting.

PPI,LIMDA Page 7
NIRWW RELIANCE WEB WORLD

4. Introduction to Basic Networking


4.1 Introduction

 A network is simply a group of two or more personal Computer linked together


Exits, but the most common types of networks are Local-Area Networks (LANs), and
Wide-Area Networks (WANs).

 In a LAN, computers are connected together within a “local” area (for an office
or home).

 In a WAN, computers are further apart and are connected via telephone/
communication lines, radio waves or other means of connection.

How are the networks categorized?

 Networks are usually classified using three properties: Topology, Protocol and
Architecture.

 Topology specifies the geometric arrangement of the network. Common


topologies are a bus, ring and star. You can check out a figure showing the three common
types of network topologies here.

 Protocol specific a common set of rules and signals the computers on the
network use to communicate. Most networks use Ethernet, but some networks may use
IBM’s Token Ring protocol. We recommend Ethernet for both home and office
networking.

 Architecture: Peer-to-Peer or client/server. In a Peer-to-Peer networking


configuration, there is no server, and computers simply connect with each other in a
workgroup to share files, printers etc…..

 And in client server architecture one centralize server handle the request from
multiple clients and provide authentication for accessing each and every element of the
network. So, in client server architecture we have high level of security compare to peer-
to-peer network.

PPI,LIMDA Page 8
NIRWW RELIANCE WEB WORLD

4.2 Network Topologies

Introduction

 Network Topology is the way in which computers are connected


in network. There are two types of topology.

1. Physical
2. Logical

 The Physical topology of a network refers to the layout of cables,


computers and other peripherals.

 Try to imaging yourself in a room with a small network, you can


see network cables coming out of every computer that is part of the network, then those
cables plug in to a hub or switch. What you are looking at is the physical topology of
that network!

 Logical topology is the method used to pass the information


between the computers.

 In other words, looking at that same room, If u were to try to see


how the networks works with all the computers talking you would be looking at the
logical part of the network.

 The way the computers will be talking to each other and the
direction of the traffic is controlled by the various protocols (like Ethernet) or, if you
like, rules.

 Most common topologies are going to analyse, are:

1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

PPI,LIMDA Page 9
NIRWW RELIANCE WEB WORLD

The Physical Bus Topology

 Bus topology is fairly old news and you probably won’t be seeing much of
these around in any modern office or campus.

 With the Bus topology, all workstation are connecting directly to the main
backbone that carries the data. Traffic generated by any computer will travel across the
backbone and available bandwidth of your network.

 This works well in a small network of 2-5 computers, but as the number of
computers increases so wills the network traffic and this can greatly decrease the
performance and available bandwidth of your network.

 As you can see in the above example, all computers are attached to a continuous
cable, connects them in a straight line.

PPI,LIMDA Page 10
NIRWW RELIANCE WEB WORLD

 The arrows clearly indicate that the packet generated by Node 1 is transmitted to
all computers on the network, regardless the destination of this packet.

 Also, because of the way the electrical signals are transmitted over this cable, its
ends must be terminated by special terminators that work as “shock absorbers”, absorbing
the signal so it won’t reflect back to where it came from the value of 50 ohms has been
selected after carefully talking in consideration all the electrical characteristics of the cable
used, the maximum and minimum length of the bus and a few more.

 If the bus (the long yellow cable) is damaged anywhere in its path, then it will
most certainly cause the network to stop working or, at the very least, cause big
communication problems between the workstations.

 Thinnest -10Base2, also known as coaxial cable and Thicket -10 Base 5 is used
in these types of topologies.

Star topology

 The star or Hub topology is one of the most common network topologies found
in most offices and home networks. It has become very popular in contrast to the bus type
because of the ease of troubleshooting.

PPI,LIMDA Page 11
NIRWW RELIANCE WEB WORLD

 The advantage of the star topology is that if one computer on the star topology
fails, then only the failed computer is unable to send or receive data. The reminder of the
network functions normally.

 The disadvantage of using this topology is that because each computer is


connected to a central hub or switch, if this device fails, the entire network fails!

 A classic example of this type of topology is the UTP (10 base T), which
normally has a blue colour.

PPI,LIMDA Page 12
NIRWW RELIANCE WEB WORLD

Ring topology

 In the ring Topology, computers are connected on a single circle of cable. Unlike the
bus topology, there are no terminated ends.

 The signals travel around the loop in one direction and pass through each computer,
which acts as a repeater to boost the signal and send it the next computer.

 On a larger scale, multiple LANs can be connected to each other in a ring topology by
using Thicket coaxial or fiber-optic cable.

 The method by which the data is transmitted around the ring is called token passing.

 IBM’s token ring uses this method. A token is a special series of bits that contains
control information. Possession of the token is allows a network device to transmit data to
the network.

 Each network has only one token.

PPI,LIMDA Page 13
NIRWW RELIANCE WEB WORLD

Mesh Topology

 In a mesh topology, each computer is connected to every other computer by a separate


cable. This configuration provides redundant paths through the new work, so if one
computer blows up, you don’t lose the network.

 On a large scale, you can connect multiple LANs using mesh topology with leased
telephone lines, Thick net coaxial cable or fiber optic cable.

 Again, the big advantage of this topology is its backup capabilities by providing
multiple paths through the network. Main disadvantage of the Mesh Topology is that when
the network is large, it is very costly.

PPI,LIMDA Page 14
NIRWW RELIANCE WEB WORLD

Hybrid Topology

 With the hybrid topology, two or more topologies are combined to from a
complete network.

 For example, a hybrid topology could be the combination of a star and


bus topology. These are also the most common in use.

Star-bus

 In a star-bus topology, several star topology networks are linked to a bus connection. In
a computer fails, it will not affect the rest of the network.

 However, if the central component, or hub that attaches all computers in a star, fails,
then you have big problems since no computer will be able to communicate.

PPI,LIMDA Page 15
NIRWW RELIANCE WEB WORLD

Star-ring

 In a star-ring topology, the computers are connected to a central component as in a star


network. These components, however, are wired to form a ring network.

 Like the star-bus topology, if a single computer fails, it will not affect the rest of the
network. By using token passing, each computer in a star-ring topology has an equal
chance of communicating.

 This allows for greater network traffic between segments than in a star-bus topology. In
all these topologies we can use three different methods of data-transmission. They are
categories as below:-

I. Broadcast

II. Multicast

III. Unicast

 In broadcasting all the host of the network receive the massage send by the
sender while in Multicasting all the host of the particular group receive the massage and in
uni-casting only one sender and only one receive.
PPI,LIMDA Page 16
NIRWW RELIANCE WEB WORLD

4.3 Network Architecture

 Network architecture is configuration by two types:-

I. Peer to peer architecture

II. Client-server architecture

I Peer to Peer architecture

 A Peer to Peer Network involves direct communication between workstation


on a network. Peer to Peer also commonly refers to internet-based file sharing, which
allows computers to exchange files with other computers using the same software
application.

 Peer to Peer network operating systems allow users to share resources and
files located on their computers and to access shared resources found on other computers.
However, they do not have a file server or a centralized management source (See fig. 1).

 In a Peer to Peer network, all computers are considered equal; they all have
the same abilities to use the resources available on the network. Peer to Peer network are
designed primarily for small to medium local area networks.

 AppleShare and Windows for Workgroups are examples of programs that


can function as Peer to Peer network operating systems.

PPI,LIMDA Page 17
NIRWW RELIANCE WEB WORLD

Advantages of a Peer to Peer network:

 Less initial expense – No Need for a dedicated server.

 Setup – An operating system (such as windows XP) already in place may


only need to be reconfigured for Peer to Peer operations.

 Disadvantages of a Peer to Peer network:

 Decentralized – No central repository for files and applications.

 Security – Does not provide the security available on a client/server


network.

II Client-server architecture

 A network architecture in which each computer or process on the network is


either a client or a server.

 Clients are PCs or workstation on which users run application. Clients rely on
servers for resources such as file, devices, and even processing power.

PPI,LIMDA Page 18
NIRWW RELIANCE WEB WORLD

Advantages of a client/server network:

 Centralized – Resources and data security are controlled through the server.

 Scalability – Any or all elements can be replaced individually as needs


increase.

 Flexibility – New technology can be easily integrated into system.

 Interoperability – All components (client/network/server) work together.

 Accessibility – Server can be accessed remotely and across multiple platforms.

Disadvantages of a client/server network:

 Expense – Requires initial investment in dedicated server.

 Maintenance – Large networks will require a staff to ensure efficient operation.

PPI,LIMDA Page 19
NIRWW RELIANCE WEB WORLD

PPI,LIMDA Page 20
NIRWW RELIANCE WEB WORLD

4.4 Transmission Media

Introduction

 Anything such as wire, coaxial cable, fiber optics, air or vacuum, that is used to
carry a signal. Different environments for different purposes.

 There are many different media that can transmit data across.

Wire line Transmission Media

I. Twisted pair cable

II. Coaxial cable

III. Fiber-optic cable

i. Twisted pair cable

 Twisted pair cable uses one or more pairs of two twisted copper wires to
transmit signals. It is commonly used as telecommunication cable. One wire interfering
with another is called crosstalk.

 The purpose of twisting the wires to reduce electrical interference.

PPI,LIMDA Page 21
NIRWW RELIANCE WEB WORLD

There are two different types of twisted-pair cables:-

A) Shielded twisted pair


B) Unshielded twisted pair

PPI,LIMDA Page 22
NIRWW RELIANCE WEB WORLD

A). shielded twisted pair:-

 Unshielded Twisted pair cable is most certainly by far the most popular cable
around the world.

 Twisted-pair technology refers to copper cabling. Generally, each cable consists


of four twisted pair of copper wire, displayed in the below.

 One pair contains two wires that are twisted together in a unique fashion as
compared to the other three pairs.

 UTP cable is used not only for networkbut also for the traditional telephone
(UTP-cat 1).

 There are 6 different types of UTP categories and, depending on what you want
to achieve, you would need the appropriate type of cable.

 UTP-CAT5 is the most popular UTP cable; it came to replace the good old
coaxial cable which what not able to keep up with the constant growing need for faster
and more reliable networks.

PPI,LIMDA Page 23
NIRWW RELIANCE WEB WORLD

Characteristics

 Cost: - Cost is very low then other transmission media and widely used for
computer and telecommunication.

 Installation: - Easy to install, maintain and reconfigured.

 Bandwidth capacity: -Bandwidth capacity varies from 1to 155 mbps. Most
common rate is 10 mbps.

 Attenuation: - Transmission across copper wire tends to attenuate rapidly.


Because of this, UTP is normally restricted to distances of 100m.

 EMI (electromagnetic interference): - UTP is varying susceptible to EMI.


Twisting reduces the crosstalk.

PPI,LIMDA Page 24
NIRWW RELIANCE WEB WORLD

B). Shielded twisted-pair cable.

 Often abbreviated STP, a type of copper telephone wiring in which each of the
two copper wires that are twisted together are coated with an insulating coating that
functions as a ground for the wires.

 The extra covering in shielded twisted pair wiring protects the transmission line
from electromagnetic interference leaking into or out of the cable.

 STB cabling often is used in Ethernet networks, especially fast data rate
Ethernets.

Characteristics

 Cost: - Cost is higher then UTP but then co-axial or fiber optic cable.

 Installation: - Installation is much more difficult compare to UTP due to


the requirement of connectors. To simplify installation, use standardized and rewired
cables.

 Bandwidth capacity: - bandwidth capacity is 500 Mbps for 100m.

 Attenuation: -STP does not out perform UTP by much terms of


Attenuation. The most common limit is 100 m.

 EMI (electromagnetic interfacing): - The biggest different of STP and


UTP is the reduction of EMI. However it is a copper wire, it is still suffering from EMI.

PPI,LIMDA Page 25
NIRWW RELIANCE WEB WORLD

ii. Coaxial cable

 A cable consisting of a centre conductor surrounded by an


insulating material and a concentric outer conductor and optional protective covering, all
the circular cross-section.

Characteristics

 Cost: - coax is relatively inexpensive. Thin coaxial cable is


cheap while thick coaxial cable is expensive.

 Installation: - installation is relatively simple.

 Bandwidth capacity: - bandwidth capacity is 10 mbps.


Coaxial cable’s bandwidth capacity increases as diameter of inner conductor increases.

 Attenuation: - coaxial cable suffers from attenuation, but


much less then twisted pair cable.

 EMI (electromagnetic interference): - shielding of the coaxial


cable provides better resistance to EMI’s effect.

PPI,LIMDA Page 26
NIRWW RELIANCE WEB WORLD

iii. Fiber optic cable

 In Fiber optics technology, Lights are used to transmit signals instead of


electronics. At a fixed rate, the presence of the light means 1, the absence 0, for example.

 Three components are required.

 Light source: Typically a light Emitting Diode (LED), or laser diode.

 Fiber medium: Current technology carries light pulses for tremendous


distance (e.g. 100s of kilometres) with virtually no signal loss (i.e. no amplifiers or
repeaters are needed).

 Detector which detects the light and converts it to electric signals.

PPI,LIMDA Page 27
NIRWW RELIANCE WEB WORLD

Advantages

 High data rate, G bps. Low error rate, less than 10 difficult to tap on to
the network, so better security.

 In wire connection, it is difficult to know if somebody has a tap on it


.
 Not susceptible to electrical interference or corrosion.

Disadvantages

 Difficult to tap (to add new computer to network, or to connect to a


different network).

 One way signals only. Two fibers needed to get full duplex
communication.

 Applications of fiber optics.

 Long-haul trunks-backbone network, telephone network.

 Metropolitan trunks-without repeaters ( have 8 miles in length )

 Rural exchanges trunks – link towns and villages.

 Local looks- direct from central exchange to a subscriber.

 Local area network – 100 Mbps ring networks.

PPI,LIMDA Page 28
NIRWW RELIANCE WEB WORLD

Wireless transmission media

A term describing a computer network where there is no physical connection (either copper
cable or fiber optic cable) between sender and receiver, but instead they are connected by
radio.

Radio transmission
Microwave Transmission
Infrared and Millimetre Waves
Light wave Transmission

1. Radio transmission

 Radio waves are easy to generate and can travel long distances. That
can easily generate buildings so they widely used for indoor and outdoor
communication.

 Radio waves are Omni directional that means they travel in all
direction from the source so that transmitter and receiver don’t have to be carefully
aligned physically.

 Sometimes Omni directional radio creates problems.

2. Microwave Transmission

 Microwave always travels in straight direction they widely used for


telephone communication, cellular telephones and television distribution.

 Unlike radio waves at lower frequencies microwave don’t pass through


buildings well.

 In addition, even through the beam may be focused well at the transmitter;
there is still some divergence in space.

PPI,LIMDA Page 29
NIRWW RELIANCE WEB WORLD

3. Infrared and Millimetre waves

 Unguided infrared and millimetre waves are widely used for short-
range communication. Remote control used on television, VCR all used infrared range.
They are relatively directional, cheap and easy to build.

 The major drawback of the infrared waves is they can’t travel long
distance and can’t penetrate building or walls.

 They are used for indoor wireless LAN.

4. Light wave Transmission

 In light wave transmission we used laser beam. Optical signing using


laser is unidirectional so it source have its owl laser and photo detector. it is relatively
easy to install.

 The laser strength is also weakness here. The disadvantage that laser
beam can’t pass through rain and fog.

PPI,LIMDA Page 30
NIRWW RELIANCE WEB WORLD

4.5 Types of network

 A network is simply a group of two or more personal computer linked


together. Many types of network exist, but the most common types of networks are:

Local Area networks (LANs)


Metropolitan Area network (MANs)
Wide Area Networks (LANs)

1. Local area network (LANs):-

 In a LAN, computers are connected together within a “local” 10 area (for example
an office or home).

 LANs are distinguished from other kinds of networks by three characteristics: 1.


their size. 2. Their transmission technology. 3. Their topology.

 LANs are restricted in size. LAN often uses transmission technology consisting of a
single cable to which all machines are attached. LAN use ring topology and bus topology.
Transmission rate varies from to 100 mbps.

PPI,LIMDA Page 31
NIRWW RELIANCE WEB WORLD

 A local area network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link and typically share the resources of
a single processor or server within a small geographic area (for example, within an office
building).

 A local area network may serve as few as two or three users (for example, in a
home network) or as thousands of users (for example, in an FDDI (fiber distributed data
interface) network).

2. Metropolitan Area Network (MANs):-

 A metropolitan area network (MAN) is a network that interconnects users with


computer resources in a geographic area or region larger than that covered by even a
large local area network (LAN) but smaller than the area covered by a wide area network
(WAN).

 The term is applied to the interconnection of networks in a city into a single


larger network (which may then also offer efficient connection to a wide area network).

 It is also used to mean the interconnection of several local area networks by


bridging them with backbone lines. The latter usage is also sometimes referred to as a
campus network.

 Examples of metropolitan area networks of various sizes can be found in the


metropolitan areas of London, Lords, Poland and Geneva, Switzerland.

 Large universities also sometimes use the term to describe their networks. A
recent trend is the installation of wireless MANs.

 Metropolitan area networks connect businesses to businesses, and businesses to


WANs and the Internet.

 A MAN is typically a backbone optical network that spans a metropolitan area,


usually in a ring configuration.

PPI,LIMDA Page 32
NIRWW RELIANCE WEB WORLD

3. Wide Area Network (WANs):-

 In a WAN, computers are further apart and connected via


telephone/communication lines, radio waves or other means of connection.

 A computer network that spans a relatively large geographical area.

 A wide area network (WAN) is a voice, data or video network that provides
connection from one or more computers networks. WAN is a collection of subnet and
host.

 A machine intended to run user’s programs is referred to host. Host is connected


by subnet is to carry host to host.

 Typically, a WAN consists of two or more LAN’s. The best example of a WAN
is the internet. WANs are used to connect local area networks together, so that users and
computers in one location can communicate with users and computers in other locations.

PPI,LIMDA Page 33
NIRWW RELIANCE WEB WORLD

 Many WANs are built for one particular organization an d are private, others,
built by Internet service provider provide connection from an organization’s LAN to the
Internet.

 Subnet is collection of transmission lines and switching elements. The


switching elements are specialized computers are use to connect two or more
transmission lines.

PPI,LIMDA Page 34
NIRWW RELIANCE WEB WORLD

4.6 Reference Model

 A reference model is a framework for understanding significant relationships


among the development of consistent standards or some environment, and for the
development of consistent standards or specifications supporting that environment.

OSI reference model


TCP/IP reference model

OSI reference model

 OSI is a standard description or “reference model” for how message should be


transmitted between any two point in a telecommunicate network.

 This model is called OSI reference model because it deals with connecting open
system-that are open for communication with the another system.

 OSI model consists of seven layers.

 Each layer has been designed to do a specific task. Starting from the top layer(7)
we will see how the data which you type gets converted into segments, the segments
into datagram and the datagram into packets, the packets into frames and then the
frames are sent down the wire, usually twisted pair, to the receiving computer.

PPI,LIMDA Page 35
NIRWW RELIANCE WEB WORLD

Layer-7 Application Layer

 The application layer of the OSI model is where users communication with
the computer. The application layer is responsible for identifying and establishing the
availability of the computer at the application exits.

 The user interfaces with the computer at the application layer.

 Although computer application sometimes require only desktop resources,


application may unite communicating components from more then one network
application; for example, file transfer, e-mail, remote access, and network management
activities, client/server processes.

Layer-6 presentation Layer

 The presentation Layer gets its name from its purpose: It presents data to
the Application layer. It’s basically a translator and provides coding and conversion
functions.

 A successful data transfer technique is to adapt the data into a standard


format before transmission.

 Computers are configured to receive this generically formatted from the


application layer of the one system.

 The OSI has protocol standards that defined how standard data should be
formatted. Tasks like data compression, decompression, encryption and decryption are
associated with this layer.

 Some presentation layer standards are involved in multi media


operation.

Layer-5 Session Layer

 The Session layer is responsible for setting up, managing and then tearing down
session between presentation layer entities. The session layer also provides dialog control
between devices, or nodes.

 It coordinates communication between systems and serves to organize their


communication by offering three different modes: simplex, half-duplex and full duplex.

PPI,LIMDA Page 36
NIRWW RELIANCE WEB WORLD

PPI,LIMDA Page 37
NIRWW RELIANCE WEB WORLD

Layer-4 Transport Layer

 The Transport layer is responsible for providing mechanisms for multiplexing


upper-layer application, session establishment; data transfer and tear down of virtual
circuits.

 It also hides details of any network-dependent information from the higher


layers by providing transparent data transfer.

 Services located in the Transport layer both segment and reassemble data from
upper-layer application and unite it onto the same data stream. Transport layer perform
the multiplexing of several massages and flow control between the hosts.

 Transport layer performs multiplexing by adding header to every massage that


defines the receiver of the massage. Flow control by regulating flow of information.

Layer-3 Network Layer

 The network layer is responsible for routing through an Internet work and for
networking addressing.

 This means that Network layer is responsible for transporting traffic between
devices that are not locally attached. Routers or other layer-3 device, are specified at the
network layer and provide routing services in an Internet work.

 In the open system inter connection (OSI) communication model, the Network layer
knows the address of the neighbouring nodes in the network, packages output with the
correct network address information, selects routes and quality of service and recognizes
and forward to the Transport layer incoming massages for local host domains.

PPI,LIMDA Page 38
NIRWW RELIANCE WEB WORLD

Layer-2 Data link Layer

 The data link ensures that messages are delivered to the proper device and
translates messages from the network layer in to bits for the physical layer transmits.

 It formats the message in to data frames and adds a customized header


containing the hardware destination and source address.

 This added information forms a sort of capsule that surrounds the original
message (or data); think of it like grabbing a latter that has information and putting it into
an envelope.

 So when it arrives at the addresses, the envelope is opened and discarded, but
the latter isn’t because it has the information the addresses needs.

Layer-1 Physical Layer

 Physical layer is concerned with transmitting bits over a communication channel. The
design issue has to do with making sure that when one side sends a 1 bit, it is receive by
the other side as a 1 bit, not a 0 bit.

 Typical questions here are how many volts should be use to represent a 1, how many
for 0, how many micro seconds a bit lasts, whether transmission may proceed
simultaneously in both direction.

 The design issue deals with mechanical, electrical and procedural interfaces.

PPI,LIMDA Page 39
NIRWW RELIANCE WEB WORLD

TCP/IP Reference Model:-

 When satellite and radio networks where added, the existing protocol had trouble
internetworking them, so a new network architecture needed.

 Thus the ability to connect multiple networks together in a seamless way was one of
the major design issue goal from very beginning. This architecture later becomes known
as TCP/IP Reference model.

Layer-4 Internet Layer

 This layer provides functionality for communications between networks through


gateways. To achieve this Internet layer depends on the Internet protocol (IP).

 The Internet protocol is defined as? The heart of the TCP/IP and the most important
protocol in the Internet layer? The Internet protocol will be discussed more extensively later
on.

Application
Presentation
Session
Transport
Network
Data link Application
Physical

Transport
Network
Host-to-Network

The OSI model The TCP/IP model

Layer-3 Transport Layer

PPI,LIMDA Page 40
NIRWW RELIANCE WEB WORLD

 This layer is responsible for end-to-end communications of the network. This layer uses
two protocols to achieve its goal: Transmission control protocol (TCP) and User Datagram
Protocol (USP).

 The transmission control protocol and the user Datagram Protocol will be discussed more
extensively later on.

PPI,LIMDA Page 41
NIRWW RELIANCE WEB WORLD

Layer-2 Application Layer

 This layer includes all the applications that make use of the transport layer
protocols in order to deliver or receive data. Most of these applications provide user
services in a system.

Layer-1 Host to Network Layer

 This layer is centralizes in details of a system in order to deliver data to other


devices. It must know the physicality of the network system in order to format data
correctly by meeting constraints and requirements. The network Access layer is often
ignoring by users.

 TCP/IP makes it transparent to the user for it would be almost impossible to


known all physical network standards.

PPI,LIMDA Page 42
NIRWW RELIANCE WEB WORLD

Different between TCP/IP and OSI reference model

Similarities

 They share similar architecture. - Both of the models share a similar architecture. This can
be illustrated by the fact that both of them are constructed with layers.

 They share a common application layer.- Both of the models share a common “application
layer”. However in practice this layer includes different services depending upon each model.

 Both models have comparable transport and network layers. - This can be illustrated by the
fact that whatever functions are performed between the presentation and network layer of the
OSI model similar functions are performed at the Transport layer of the TCP/IP model.

 Knowledge of both models is required by networking professionals. - According to article


obtained from the internet networking professionals “need to know both models”.

 Both models assume that packets are switched. - Basically this means that individual
packets may take differing path in order to reach the same destination.

PPI,LIMDA Page 43
NIRWW RELIANCE WEB WORLD

Differences

The main differences between the two models are as follows:

 TCP/IP protocols are considered to be standards around which the internet has
developed. The OSI model however is a “generic, protocol-independent standard”.

 TCP/IP combines the presentation and session layer issues into its application
layer.

 TCP/IP combines the OSI data link and physical layer into the network access
layer.

 TCP/IP appears to be a simpler model and this is mainly due to the fact that it
has fewer layers.

 TCP/IP is considered to be a more credible model- This is mainly due to the fact
because TCP/IP protocols are the standards around which the internet was developed
therefore it mainly gains creditability due to this reason. Where as in contrast
networks are not usually built around the OSI model as it is merely used as a
guidance tool.

 The OSI model consists of 7 architectural layers whereas the TCP/IP only has 4
layers.

PPI,LIMDA Page 44
NIRWW RELIANCE WEB WORLD

4.7. Networking Connectivity

To expand a single network without breaking it into new parts or connecting it to the
other network you can use one of the following devices.

1. Hub
2. Repeater
3. Bridge

Hub: -

 A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one
port, it is copied to the other ports so that all segments of the LAN can see all packets.

Three types of Hubs are:

 Passive hub
 Active hub
 Intelligent hub

PPI,LIMDA Page 45
NIRWW RELIANCE WEB WORLD

Passive hub: -

 Passive hub simply combines the signals of the network segments. There is no signal
processing or regeneration.

 Because it does not boost the signal, in fact absorbs some of the signal, passive hub
reduces by half the maximum cabling distance is permitted.

 In passive hub, each computer receives the signals send from all the other computers
connected to the hubs.

Active hub: -

 Active hub likes passive hubs except that they have electronic components that
regenerate or amplify the signals.

 Because of this, the distance is between the devices can be increases the main
drawback is that they amplify noise as well as signal they are much more expensive than
passive hubs.

Intelligent hub: -

 In addition to signal regeneration, intelligent hubs perform some network management


and intelligent path select.

 A switching hub chooses only the port of the device where the signal need to go rather
then sending the signal along all paths.

 One advantage to this is that you can permanently connect all transmission media
segment because each segment will be used only when signal is sent to that segment.

PPI,LIMDA Page 46
NIRWW RELIANCE WEB WORLD

Repeater: -

 All transmission media weaken the electromagnetic signals that travel through them.
Attenuation therefore limits the distances any medium can carry data.

 Adding devices that amplifies the signal can allow it to travel long distance, increasing
size of the network. Devices that amplify signals in this way repeaters.

 Repeater fall into two categories: amplifiers and the signal regenerating repeaters.
Amplifier simply amplify entire incoming signal. Unfortunately, they amplify both signal
and noise.

 Signal regenerating repeaters create an exact duplicate of the incoming data. This
reduces the noise.

Bridge: -

 Bridge connects network segments. Use of the bridge increases maximum size of your
network.

 Unlike the repeater, which simply passes on all signals it receives; the bridge
selectively determines the appropriate segment to which it should pass a signal. It does
this by reading address receive.

PPI,LIMDA Page 47
NIRWW RELIANCE WEB WORLD

 Like repeaters bridge can regenerate signals in order to extend network length.
However, because bridge actually read packet address they are consider operating at data
link layer.

PPI,LIMDA Page 48
NIRWW RELIANCE WEB WORLD

4.8 Inter-network connectivity

 An inter-networking consists of two or more independent networks that are


connected and maintained independent.

 An inter-network may include same or different types of network. To connect


independent networks, you use inter- network connectivity devices.

1. Router
2. Gateway

Router: -

 A device that forwards data packets along networks. A router is connected to at least
two networks, commonly two LANs or WANs or a LAN and its IPS’s network.

 Routers are located at gateways, the place where two or more networks connect. Very
little filtering of data is done through routers.

 Router use headers and forwarding tables to determine the best path for forwarding the
packets and they use the protocols such as ICMP (Internet Control Message Protocol) / to
communicate with each other and configure the best route between any two hosts.

 In packet-switched network such as the Internet, a router is a device or, in some cases,
software in a computer, that determines the next network point to which a packet should
be forwarded toward its destination.

 The router is connected to at least two networks and decides which way to send each
information packet based on its current understanding of the state of the networks it is
connected to.

PPI,LIMDA Page 49
NIRWW RELIANCE WEB WORLD

 A router may create or maintain a table of the available routes and their conditions and
use this information along with distance and cost algorithms to determine the best route
for a given packet.

 Typically, a packet may travel through a number of network points with routers before
arriving at its destination.

 Routing is a function associated with routers before arriving at its destination.

 A layer-3 switch is a switch that can perform routing functions.

Gateway: -

 Routers can successfully connect networks with the protocols that function in
similar ways. When the networks that must be connected are using completely different
protocols from each other, a more powerful and intelligent devices is required.

 A gateway is a device that can interpret and translate the different protocols that
are use on to different network.

 Gateway can be comprised of software, dedicated hardware or combination of


both. Although gateway can function at network layer it can also work above the network
layer.

 A gateway can actually convert data so that it works with an application on a


computer on the other side of the gateway. ADSL (asymmetric digital subscriber line)

PPI,LIMDA Page 50
NIRWW RELIANCE WEB WORLD

5. Reliance Web World Setup

5.1 In general introduction reliance WW (web world)


& what all activities one being carried out from WW.

WEBWORLD

 Reliance Web World is a countrywide network of retail outlets offering a host


of state-of-the art communication and information services along with food and
beverages in a modern ambience.

 It probably is also the world’s largest network of public access broadband


centres. A total of 240 Web Worlds in this network will further increase to cover
nearly 700 towns and cities.

 Reliance Web World is the retail interface initiative of the Infocomm juggernaut
and a part of strategy of vertical integration.

 Reliance would be standing its centre operations in Hyderabad, Chennai,


Kolkatta, and New Delhi.

 To service and support customers of Reliance India Mobile is the genesis of


Reliance Web World, the largest retail chain in the history of India and Indian
retailing. Reliance Web World will soon provide an array of broadband applications
spanning on-line and off-line gamming (another first!!), video chat, videoconference,
digital Movies, digital Music & drives to boot.

 All Web World outlets three component: Customer Convenience Centre,


Broadband Centre and Gourmet Café.

 Customer Convenience Centre is a one-stop sales and customer service point for
Reliance Infocomm’s retail products and services.

 Broadband Centre brings real broadband experience to Indians for the first time
through a host of unique applications and services. This includes Video Chat, Multi-
Virtual Office, Digital Storage, Digital Movie, Digital Customized Music, Digital
Electronic News Gathering Service and E-Learning.

 Java green, a gourmet café with exciting range of food and beverage products, is
designed to provide you a relaxed and refreshing atmosphere in Reliance Web
Worlds.

PPI,LIMDA Page 51
NIRWW RELIANCE WEB WORLD

5.2 Explanation of varies ZONES. Naming convention


& purpose Zones: -

Various zones of reliance web world are: -

1. Digital Electronic News gathering (DENG room)


2. Virtual office (VO room)
3. Video conference room (VC room)
4. Broad band centre (BBC)
5. Java green
6. Customer care centre (C3)

Digital Electronic News Gathering (DENG ROOM)

 Deng is a one simple live configuration of the cable data. Any reporter can plug
on to the dang machine and make the live reports through by cable on television.
 The pc is not required into the deng process. Actually three evens are used to
join and connectivity to the DLC through the router and all the division of the web
word.

Virtual office (VO ROOM)

 It is one type of private room. If any customer wont any kind of privacy than he or
she can use VO room. It is paid extra charges.

Video conference (VC ROOM)

 There is various limitation of the video chat to overcome all this difficulties we can
use VC room.
 The main advantage of VC room is security because when ever we use VC we are
directly connected to the destination through IP address or an ISDN number (if
required).
 So there is not intermediate connection comes in to they existence so less security
achieve.

PPI,LIMDA Page 52
NIRWW RELIANCE WEB WORLD

Connectivity of video conference room: -

 In the videoconference, the various hardware used to connectivity.

 Like wise polycom camera, audio interface, audio, plasma display or screen, power
supply.

 The main hardware is polycom that is used in videoconference to make it.

 Polycom camera is connected to the plasma display screen by video interface cable
and to the audio by interface cable.

 Power supply is directly provided to the polycom camera.

PPI,LIMDA Page 53
NIRWW RELIANCE WEB WORLD

Broad band centre (BBC)

 Internet is fast changing the life of consumers and is increasingly becoming a


crucial part of businesses. Reliance Broadband brings ‘Broadband Internet Access’ for
business and consumers.

 Reliance Broadband Internet Access provides carrier class Internet bandwidth


through a dedicated connection over the IP backbone.

 With “Fiber to building” approach of Reliance and international capacity


operated by a Group company, Reliance delivers an unmatched service quality level to an
enterprise customer.

 Launch pad: - launch pad is own created software by reliance which is used by
customer for gaming, surfing, basic micro-soft windows, movie maker, and internet.

Java green

Java green, a gourmet café with exciting range of food and beverage products, is
designed to provide you a relaxed and refreshing atmosphere in Reliance Web Worlds.

Customer care centre

 Customer care centre has special software for provide different activities for example
clarify software use for billing and enquiry.

PPI,LIMDA Page 54
NIRWW RELIANCE WEB WORLD

5.3 Brief about IT infrastructure

 In the IT infrastructure, reliance infocom is maintained on the server electric room is


main zone of the reliance web world. The server electric room is providing the main
connectivity of the LAN line of the different Zones of the reliance WW.

 In server electric room the main devices are as below: -

IT RACK (Information Technology RACK)


Switches
Routers
DLC (Data Loop Control)
UPS (Uninterruptible Power Supply)
Main panel (cables)

IT RACK: -

 In the IT RACK easy way to Rack mount Patch Panel, Router, Switch or Hub.

 Main function of the IT RACK is to arrange the cable of RJ-45 in stack. Patch
Panel is the main cable of the LAN line, which is going on the router through switches.

PPI,LIMDA Page 55
NIRWW RELIANCE WEB WORLD

IT RACK connectivity diagram

 The cable that are called the patch panel patched by the crone tools. Crone tool
is also used to patching telephone cables.

PPI,LIMDA Page 56
NIRWW RELIANCE WEB WORLD

Switches: -

 The two types of switches are used to connectivity of VLAN in reliance WW.
They are 420 & 1424. The 420 switches is main switch of the VLAN and 1424 switch is
extra switch.

 420 switch is provides connectivity to the part of the zones of reliance WW.
Extra switch is uses when port is less provided, then the necessity.

 A switch is another internetworking devices used to manage bandwidth on a


large network. Switches are rapidly becoming one of the most used internetworking
devices from connecting even smaller networks because they allow you to have some
control over the use of the bandwidth on the network.

 A switch, which is referred to as a “bridge on steroids” controls how data flow


by using the MAC addresses that are placed on each data packet.

 Remember that this MAC address on the data packet is the same MAC address
on the network card of that particular computer.

PPI,LIMDA Page 57
NIRWW RELIANCE WEB WORLD

Virtual LAN: -

 Switches divide networks into what is known as a Virtual LAN or VLAN.

 The best thing about a VLAN, which is also a logical grouping of computer on a
network into what is described as some sort of communication group, is that the
computers really do not have to be in close proximity or even on the same floor.

 This is because it allows the computers to be grouped by the similarities in the


types of users in the switches use a combination of software and hardware to switch
packet between computers and other devices on the network.

 This software is the switches operating system.

 And, because switches offer a higher density of connection ports, they can
easily replace hubs on the network.

 This means that each computer on the network can be connected to its own port
on the switch.

 When the computers are directly connected to the switch, the switch can supply
each of the computers with a dedicated amount of bandwidth.

 For example, say users are on a 100mbps Ethernet network via a switch. Each
user can realize a bandwidth of 100mbps and don’t have to complete for the bandwidth
the way computers do on a network via a hub because each port on the switch has a
dedicated 100Mbps. This is why switches are rapidly placing hubs.

 Inexpensive switches are even available to accommodate small networks and


home network markets.

PPI,LIMDA Page 58
NIRWW RELIANCE WEB WORLD

Router: -

 Routers are even smaller than bridges and switches. But routers operate on the Network
layer, which is a higher level in the OSI conceptual model.

 While bridges and switches operate on the data link layer. Like switches routers use a
combination of software and hardware, but it is use to route data from its source to its
destination.

 Routers actually have a sophisticated OS that allows them to configure various


connection ports.

 Routers are used to segment LANs that have become so large that data traffic has
become congested.

 Routers are also used to connect remote LANs together using different WAN
technologies. But, when a router has become large, the large network is divided into logical
segments called subnets.

PPI,LIMDA Page 59
NIRWW RELIANCE WEB WORLD

 You can setup a router to route data packets from different network protocol
stacks, which include TCP/IP.

PPI,LIMDA Page 60
NIRWW RELIANCE WEB WORLD

DLC (Data Loop Control): -

 Main function of the DLC is make the loop of the fiber cables and gives the
security from the attenuation.

UPS (Uninterruptible Power Supply): -

 An uninterruptible power supply (UPS) is a device that allows your computer to


keep running for at least a short time when the primary power source is lost.

 It also provides protection from power surges. A UPS contains a battery that
“kicks in” when the device senses a loss of power from the primary source.

 If you are using the computer when the UPS notifies you of the power loss, you
have time to save any data you are working on and exit gracefully before the secondary
power source (the battery) runs out.

 When all power runs out, any data in your computers random access memory
(RAM), is erased. When power surges occur, a UPS intercepts the surge so that it doesn’t
damage your computer.

 UPS devices come in two forms: online and standby. A standby devices kick in
only when the power goes down. It must, therefore, contain special circuitry that can
switch to backup power in less than five milliseconds.

 An online device constantly provides the source of power to the computer.


Because of this, it doesn’t need to kick in. if the outside source of power dies, the
batteries within the unit continue to supply the computer with power.

PPI,LIMDA Page 61
NIRWW RELIANCE WEB WORLD

 Although online units are the best choice, they are more expensive than standby
units. But because online units supply all the power to a computer, that power is always
clean and smooth.

Some wiring problems are: -

1. Small, overloaded and poorly designed main panels.


2. Sub panels wired improperly.
3. Accidentally using the wrong quake of cable.
4. Using 14-ga. Wire on a 20-amp circuit.
5. Improperly stapled cable.
6. Not trimming conductor insulation and cable sheathing to the right length.
7. Using outlet boxes that are too small.
8. Forgetting to bring in the power supply cable.
9. Back-wiring receptacles and switches.
10. Receptacles wired in series.

PPI,LIMDA Page 62
NIRWW RELIANCE WEB WORLD

5.4. Explanation of various hardware of WW, function utilization


& Trouble shooting tips.

In reliance WW, the various hardware use as below: -

 Pantium-4 processor, monitor, scanner, printer, multimedia keyboard, and


optical mouse.

 The pantium-4 processors offer great performance to let experience the web and
share photos, movies, and music in powerful new ways.

 Use your powerful Pentium-4 processor-based PC to burn CDs and create


custom play lists.

 Create home movies and add cool special effects to your entire favourite clips-
then share them with friends faster than ever with a Pentium 4 processor-based PC
and a broadband connection.

 CPU- it is the memory storage device of the computer.

 UPS is a hardware device that provides a backup power source in case of a


power outage (black out), brownout, or a surge in power.

 A UPS provides enough power for the computer or computers to properly shut
down or to remain up during a temporary power outage.

PPI,LIMDA Page 63
NIRWW RELIANCE WEB WORLD

Main panel (cables): -

 Patch panels and patch cables are used in communication applications. While
thousands of patch panels are used on relay racks in large telecom applications, thousand
more patch panels are used in small communication closets on wall mount racks.

 ISC offers standard patch panel sizes. Cat 5e and cat 6 patch panels are now the
most used standards. Cat 5 patch panels are slow for many of today’s applications.

 Cat 5e patch panel and cat 6 patch panels are an abbreviated nomenclature for
category 5e patch panel and category 6 patch panels.

 It has become easier to refer to the shortened version patch panel as cat 5e panel
and cat 6 patch panels for users who have large applications our professional impact
punch down tool is recommended.

 Patch panel are purchased as to the amount of ports they have. For example,
ISC offers a 12-port patch panel, 24-port patch panel, 48-port patch panel, and 96-port
patch panel.

 These port numbers are available in cat 5e and cat 6 patch panels.

PPI,LIMDA Page 64
NIRWW RELIANCE WEB WORLD

5.5. Logical & Physical Network Diagram of WW.

PPI,LIMDA Page 65
NIRWW RELIANCE WEB WORLD

The main architecture of reliance web world is given above.

 It is shown that the main connectivity of the web world is oriented from
Mumbai. From the Mumbai this connectivity maintained on the MCN (media control
node) which is held on particular city in which the web worlds are.

 The MCN is the main terminal point of the reliance web world situated in one
particular city.

PPI,LIMDA Page 66
NIRWW RELIANCE WEB WORLD

 For example: - in Surat we have four reliance web worlds. So, all this four web
worlds are connected to the one MCN.

 Similarly all the nine web world of the Ahmadabad is connected to the one
MCN. And all these MCN of particular cities are connected to one central MCN that is
located at Mumbai.

 In this hierarchy after the MCN all transmission lines comes to the BAN
(building access node).

 In any private firm wants the connectivity, then that connectivity is directly
provided from the BAN.

 For example: - if any co-operative bank wants the connectivity, then it is


directly connected to the BAN.

 Now, it is going to MAN (metropolitan area network), which have a CT DLC


(centralize terminal data loop control).

 CT DLC is the centralize DLC. So it is the central DLC, by it all the RT DLC
(remote terminal data loop control) is connected to it.

 So from this description it can say that RT DLC is maintained in the entire web
world in one particular city.

 Now the main checks with the router and switch are, for ex. one web world set
up.

 That is the LAN of the reliance web-world.

 At the reliance web-world LAN is divided in the five VLAN

 One VLAN belong to one zone of reliance web-world.

 Router is connected to the switch by the ISDN or LL (lease line) for the
connectivity of the VLAN of the reliance Infocomm.

 In between router and switch lease line or ISDN network is used in cabling &
network connectivity.

 And then switch is connected to the all the particular pc by their ports of switch.

 And such as the above diagram all the network of the reliance web world is
working as above architecture of the reliance web world.

PPI,LIMDA Page 67
NIRWW RELIANCE WEB WORLD

Logical diagram of reliance Web World network: -

 How can we communicate from one web world of the one city to another web
world of another city?

 Here we discuss the logical diagram of the reliance web world network setup.

 In this diagram we will describe how one pc of one web world can
communicate with another pc of another web world.

 Suppose pc1 of VLAN1 of Surat web world wants to send to the pc1 of same
VLAN of the Ahmadabad web world.

PPI,LIMDA Page 68
NIRWW RELIANCE WEB WORLD

Than massage will follow the following path: -

1. From the pc massage will go to the switch.

2. Switch will compare the MAC address of the destination port with its own
MAC table.

3. In this case, it will not find the desired MAC address in its MAC table.

4. So, it will pas massage to the router of the local web world.

5. It will compare the IP address of the destination in its routing table.

6. It will not find the required IP address. So, it will forward massage to the MCN
of the Surat.

7. At the Surat MCN we are not able to find the destination address. So, massage
will forward to the Mumbai MCN.

8. At Mumbai MCN we find the IP address of the destination pc.

9. So, from the Mumbai MCN message will transfer to the Ahmadabad MCN.

10. From Ahmadabad MCN massage will transfer to the router of the Ahmadabad
web world according to the destination IP address.

11. Router will forward massage to the switch.

12. Switch is forward massage to the pc of particular VLAN for which massage is
intended.

13. Now the MAC address of the pc will be store in MAC table of both the switch.

PPI,LIMDA Page 69
NIRWW RELIANCE WEB WORLD

5.6. Detail Explanation On Switching (like VLAN, ZONE).

Why we are creating VLANS?

 We are getting for this one example.

As shown in figure, layer 2 switched networks are typically designed as flat networks.
Every broadcast packets transmitted is seen by every device on the network,
regardless of weather device to receiver that data.

 Router allows broadcast only within the originating network, but switches forward
broadcast to all segments. The reason’s it’s called flat network is because its one
broadcast domain, not because its design is physically flat.

 In figure-1 we see Host A sending a broadcast and all ports on all switches
forwarding this broadcast, except the port that originally received it. Now shown in
figure-2 switched network.

 Its show Host A sending a frame with Host D as it’s destination, and as you can
see, that frame is only forwarded out the port when Host D is located.

 This is huge improvement over the HUB networks, unless having one collision
domain default is what you really want.

PPI,LIMDA Page 70
NIRWW RELIANCE WEB WORLD

 The largest benefits gained by having layered 2-switched networks are that create
us individual collision domain segment for each device plugged into each port of the
switch. And here large network is created.

 The large the numbers of user and devices, the more broadcast and packets each
switch to handle and author is security. In layer 2 switches inter network, all users can
see all devices by default.

PPI,LIMDA Page 71
NIRWW RELIANCE WEB WORLD

There are several ways that VLANs simply network management:

 Network add, move and changes are achieved by configured a port in to the
appropriate VLAN.

 A group of users needing high security can be put into VLAN so that no user
outsides the VLAN can communicate with them.

 As a logical grouping of users by function, VLAN can be considerate in depend


from there physical location.

 VLANs can enhance network security.

 VLANs increase the number of broadcast domain while decreeing there size.

VLANs memberships

 An administrator, who then assigns switch port to each VLAN, usually creates
LANs. Such a VLAN called is static VLAN if the administrator wants to do a little more
front a assign all the host device hardware address in to a data base, the switches can be
configured to assign VLANs dynamically when ever a host is plugged in to a switch. This
is called dynamic VLAN.

Statics VANs

 Static VLAN are the usual way of creating VLANs, they are also the most
secure. VLANs maintain that associate until a administrator manually changes that
port assignment.

 This type of VLAN configuration is comparative easy to set up and monitor the
movement user with in the network is controlling. It can be helpful to use network
management software to configure the ports.

 The broadcast domain the host will become a member of is an administrator


base on with choice. Remember that each host must also have the current IP address
information.

PPI,LIMDA Page 72
NIRWW RELIANCE WEB WORLD

Dynamic VLANs

 A dynamic VLAN determine a node VLAN assignment automatically. Using


intelligent management software, you can see base VLAN assignment on hardware
(Mac) address protocols or even application to create dynamic VLANs.

 For example, suppose MAC address is have been entered in to a centralize


VLAN management application.

 If a node is then attach to an assigned switch port, the VLAN management data
base can look up hardware address an assign and configured the switch port to the
current VLAN.

Configuration of VLANs

 To configure VLANs on a 1900 switch, use the VLAN vlan# name name
[vlan#] command. In the following example, I am going to demonstrate how to
configure vlan on the 1900 switch by creating 3 vlans for three different
departments.

>en
#config t

Enter configuration commands ands, one per line. End with CNTL/Z.

(config)#hostname 1900

1900(config)#vlan2 name sale

1900(config)#vlan3 name marketing

1900(config)#vlan4 name mis

1900(config)#exit

 After you create the vlan that you want, you can use the show vlan command to
see them. But notice that by default, all port on the switch in vlan 1. To change the
vlan associated with a port, you need to go to each interface and tell it which vlan to
be part of.

PPI,LIMDA Page 73
NIRWW RELIANCE WEB WORLD

Various commands are below: -

>?
Enable Turn on privileged commands
exit Exit from the EXEC
help Description on the interactive help system
ping Send echo massages
show Show running system information
traceroute Trace route to destination

Create vlans, verify configuration with the show vlan command


(sh vlan)
1900#sh vlan

Creating vlans for the 2950 switch is different. We configure them in what is called a
VLAN database. It is:
switch#vlan database
switch(vlan)#?

VLAN database editing buffer manipulation commands:


abort Exit mode without applying the changes.
apply Apply current changes and bump revision number.
exit Apply changes, bump revision number and exit mode.
no Negate a command or set its default.
reset Abandon current changes and reread current database.
show Show database information.

How to connect pc to the switch?

 Switch is the most widely used interconnection device. To overcome the limitation
of Hub net Bridge, we use the switches to inter connect the networks. The main
advantage of switch over the bridge is that, it is provides greater bandwidth compare to
bridge.

PPI,LIMDA Page 74
NIRWW RELIANCE WEB WORLD

Different between Switch and Hub: -

1. In switch all the computers belongs to the different collision domain so


when ever one pc comes down pc of the other domain continuously to working in
Hub.
2. Connectivity capacity of the switch in much more compare to Hub.
3. Hub always works in half-duplex mode while switch can works in full-
duplex mode.
4. Hub divides their speed among the ports while switch provide
individual speed to each port to which it is connected.

For example: -

If we have Hub of 100 kbps caring capacity & four computers are connected to
the Hub then it provides 25 kbps to each of the computer while for the similar case
switch provides 100 kbps to each of the computer. So switch has more traffic caring
capacity compare to Hub.

Since switch are becoming very popular on both the small and large networks,
they have all but replaced bridges as the internetworking devices for conserving
network bandwidth and expanding LANs into larger corporate internet works.

PPI,LIMDA Page 75
NIRWW RELIANCE WEB WORLD

Switches in Reliance Web World: -

 In reliance Web World two type of switches are used to connectivity of the VLAN
to the pc.

1. Nortel switch (420)


2. Passport switch (1424)

 The main difference of this two switches is : - the Nortel switch (420) is work in layer-2
(data link layer) and the passport switch (1424) is work in the layer-3 (network layer).

 These switches are mounted in the IT RACK and it is arranged in stack in it.

 Numbers are as ports of the Reliance Web World.

PPI,LIMDA Page 76
NIRWW RELIANCE WEB WORLD

Step for connectivity: -

Step 1: - Requirement for connectivity

For make the connectivity of the pc to the switch the following requirements are
required: -

o Hardware requirement: - Pc, switch, cables, LAN card etc.


o Software requirement: - operating system of the pc.

Step 2: - check out if the LAN card is installed in pc or not

 At first check that LAN card is installed in pc or not.

 Because LAN card is the basic requirement for the network connectivity. So, it
is necessary that pc must contain LAN card. So, if LAN card is not installed than
first install the LAN card and after config it.

Step 3: - provide grounding connectivity of pc to the switch

 In reliance Web World we provide the grounding the connectivity between switch
and pc. The cat-6 cable is unshielded twisted pair cable that is used to connect pc and switch.
This cable provides the grounding connectivity.

 By the cat-6 cable the pc and switch are connect together.

PPI,LIMDA Page 77
NIRWW RELIANCE WEB WORLD

 Cat-6 cable is connecting in LAN card of pc and consol port in switch.

 In reliance Web World all the pc are connected by VLAN through cables in ground.
It means it is a ground connectivity of the fiber optics cables.

 All the pc are connected through the duckt (duckt is the main point of the
connectivity of 2 or more pc in reliance WW) for connectivity of pc in VLAN. Duckt makes
the ground connectivity of the group of pc and from the duckt cables are connected to the
switch in server electric room.

PPI,LIMDA Page 78
NIRWW RELIANCE WEB WORLD

Step 4: -Configure the switch using consol port

 For connectivity of the switch to pc, it is necessary to configure the switch.


 For the configuration of the switches, the operating system software base is used
to configure it.

Step: -5 Configuring the VLANs

 For making the connectivity of the switch to the pc, it is necessary to configure
the switch after complete the processing of connecting switch to pc.

 For configuration of the switch the operating system software is used in reliance
Web World.

 Figuring out which user you want in each VLAN not.

 Once you have decide on the number of VLANs you want to create, and
established the user you want to belong to each one, its time to bring you are first
VLAN into existence.

 At the time of configuration goes to create VLAN option.

 Give the number, which we want to create.

 To configure VLAN on 1202 switch, use the vlan# name name [vlan#]
command.

For example: - we are going to demonstrate how to config VLAN on the 1202
switch by creating two VLANs for two different departments.

PPI,LIMDA Page 79
NIRWW RELIANCE WEB WORLD

 Uplink: - whenever we want to increase the number of pc in particular VLAN


than we will apply the uplink.

o In uplink operation a one port of the VLAN in which we want to


increase the number of PCs, is directly connected to one individual switch.

o So, after uplink operation all the port of the new switch will work as that
VLAN.

PPI,LIMDA Page 80
NIRWW RELIANCE WEB WORLD

420 SWITCHES

 As shown in the figure we want to increase the number pc in SG VLAN. So, one port
of the SG VLAN from one switch (420) is directly connected to one port of another switch
(1424).

 Now after uplink operation all the ports (24) of 1424 switch will act as par SG VLAN.

 Cascading: - Cascading is the operation though which we can combine or merge the
backplane speed of the switch.

For example: - as shown in figure we have two switches with the back plane speed of
1.2 & 2.4 gbps respectively. So, and both of the switches are cascade with each other
by their cascade port.

 420 switches is the main switch, which is connected to the various zones, and 1424
switch is extra switch.

 As the 420 is the main switch of WW than only it maintain all the ports of the WW and
then it is used much more then 1424 switch.

 Ports are same in both of switches.

PPI,LIMDA Page 81
NIRWW RELIANCE WEB WORLD

 When one of the ports of 420 switches is disable to connectivity then the port of the
1424 switch can used in place of.

Difference between switch cascading & switch uplink: -

Switch cascade Switch uplink


1. Each switch has individual cascade port. So no 1. One port of the switch is must required for
extra port is requiring for switch cascade. the uplink.

2. Speed of the backplane is increase.


2. Speed of the backplane will not change.

3. Speed of individual port will not change. 3. Speed of individual port is increases.

PPI,LIMDA Page 82
NIRWW RELIANCE WEB WORLD

Virtual LAN configuration commands: -

>En
>#Config t
Enter configuration command, one per line. End with CNTL/Z.

>1201(config)#hostname 1201
Give & assign the g1202 host name to the switch.

>1202(vlan)# vlan database


We will enter the VLAN mode for VLAN configuration.

>1202(VLAN) #vlan 1 name sales


VLAN one with the name sales is created after the command execution.

>1202(vlan) #vlan 2 name marketing


VLAN two with the name sales is created after the command execution.

>1202(vlan) # vlan 2 name marketing


Vlans are created in created in the switch after the command execution.

>1202(vlan) # apply
Two VLANs are created in the switch after the command execution.

>1202(config) # exit
Exit from the VLAN mode after the command execution.

 After we created the VLAN that we want, we can use the show vlan command to
see them.

 To change the VLAN associated with a port, we need to go to each interface and
tell it which VLAN to be a part of.

PPI,LIMDA Page 83
NIRWW RELIANCE WEB WORLD

5.7. Detail understanding on router level configuration ( NAT, security)

What is a routing table?

 A routing table contain entire with the IP address of router interfaces for other
networks. It dose not contain address for the hosts on each network. It only stores the
address of the router that provides an interface to that network.

 Typically a routing table consists of four pieces of information: a network


address (the destination net ID); a net mask (to identify sub netting); the address of
the router for that network ID (Near-side address); and a metric (number of hops to
that router).

 For example, the following command adds a static entry in the routing table that
allows packets to be forward to network 192.168.222.0 from network 192.168.211.0.

 This entry would be added to the router interfacing with network 192.168.211.0.
Note the no subletting is used and the near-side address to 192.168.222.0 is
192.168.211.100.

ROUTE ADD 192.168.222.0


MASK ADD 255.255.255.0

 How dose a router work? A router uses the routing table stored in its memory to
make decisions about where and how to send packets.

 The number looks at the information in the packets it receives to examine the
network ID of the IP address. It checks the network ID against the routing table to
determine the destination.

PPI,LIMDA Page 84
NIRWW RELIANCE WEB WORLD

 If the router can forward the packet directly to the destination, it dose so. If it
can not, it finds the address of the router than serves as an interface for that network. It
then sends the packet to that router for forwarding.

 If no entry exists in the routing table, the router sends the packet to its default
gateway.

PPI,LIMDA Page 85
NIRWW RELIANCE WEB WORLD

 A hope is a passenger though a router table. If a packet must travel though three
routers to get to its final destination, it is said to go thought 3 hope.

 When passing packets though a router, the original source and destination MAC
addresses are removed and recreated. (But the original source and destination IP
addresses and not altered).

 The source MAC address of the sending host is required with that of the router
and new destination MAC address is that the next router or, if the packets can be
forwarded directly, that of the host.

 The process of removing and recreating MAC address requires processing


resources.

User vs. Privileged Mode

 User mode is indicated with the ‘>’ next to the router name. You can look at
setting but can not make changes from user mode. In privilege mode (indicated by the
‘#’, you can do anything). To get into privilege mode the keyword is ‘ENABLE’.

Router >
Router>enable
Password:
Router#
For example if you want to use a show command but you do not remember which
one it uses ‘show?’ will output all commands that you can use with the show
command.

Router # show?
Access-expression List access expression
Access-lists List access lists
Backup Backup status
cdp CDP information
clock display the system clock
cls DLC user information
compress show compression statistics
configuration Contents of Non-Volatile memory
--More—

Configuration Mode

Router#config t
Router(config) # end

PPI,LIMDA Page 86
NIRWW RELIANCE WEB WORLD

Flash Memory

 Flash memory is a special kind of memory on the router that contains the
operating system image file(s). unlike regular router memory, flash memory
continues to maintain the image even after power is host

Router > show flash


System flash directory:
File length Name/Status
1 3015588 c2500.bin

[3015652 bytes used, 1178652 available, 4194304 total]


4096K bytes of processor board System flash (Read/write)

Show command
Router>show history
Show version
Show protocols
Enable
Show running-config
Disable
Show history

Clock

The router keeps its own clock that you can use to synchronize devices to. To view the
clock use the show clock command

1900#show clock

Configuration Mode
From privilege mode you can enter configuration mode by typing config term you
can exit configuration mode type end or pressing <CTL> +z

Routing #config t
Routing (config) #end
Routing #

PPI,LIMDA Page 87
NIRWW RELIANCE WEB WORLD

The host name

 The router’s Host Name is used for local identification. When you log into the
router you see the Host Name. This is also visible via LAT and CDP. However this
is used for TCP/IP address resolution.

Router(config) # hostname Krang


Krang(config)#

The Enable Password

The enable password controls access to privilege mode. This is VERY


important password because in privilege mode you can make configuration
changes.

Krang(config)# enable password project

You can securely encrypt the enable password, by using the enable secret
command.

Krang(config)#enable secret project1

If you have both passwords, the enable secret is the password used.

Configuration your router

 To configure the router, we have to first log into the router, you can access the
router by typing the router’s IP address into a browser from an internal computer (in
our example, a officer computer). The router’s IP address usually defaults to
“19.168.1.1” or “192.168.0.1”. However, if this is not the case, follow the directions
below to determine the internal IP address.

PPI,LIMDA Page 88
NIRWW RELIANCE WEB WORLD

Determining the Router’s Internal IP Address

To determine the internal IP address of your router:

1. Click STSRT- RUN. A Run dialog box appears.


2. Type COMMAND or CMD in the Open Field.

3. Press ENTER. A “dos” or command prompt windows appears

4. At the prompt, type “IPCONFIG”.


5. Press ENTERS. A bunch of information appears.

6. Record the IP address displayed on the Default Gateway line. This address is
your router’s IP address as seen from inside your network. In the above screenshot,
the router’s IP address is “192.168.123.254”. Please note that this address is only an
example.

PPI,LIMDA Page 89
NIRWW RELIANCE WEB WORLD

5.8 Introduction to IP address

What is IP (Internal Protocol)?

 IP is the number of the TCP/IP protocol suite.

 It always works at the network layer (layer 3) of the OSI reference model.

 It decides the path from source to destination means how many intermediate
networks the massage has to travels in order to reach the destination.

 The internet protocol (IP) is a network-layer (layer 3) protocol that contains


addressing information and some control information that enables packets to be
routed.

 IP is documented in RFC 791 and is the primary network-layer protocol in the


internet protocol suite.

 Along with the transmission Control Protocol (TCP), IP represents the heart of
the internet protocols.

 It can also work in conjunction with the primary network-layer protocol in the
internet protocol suite.

 IP has two primary responsibilities: providing connectionless, best-effort


delivery of data grams thought an internet work; and providing fragmentation and
reassembly of data grams to support data links with different maximum-
transmission unit (MTU) sizes.

PPI,LIMDA Page 90
NIRWW RELIANCE WEB WORLD

IP Packets Format

An IP packet contains several types of information, as illustrated in.

The following discussion describes the IP packet fields illustrated in:

 Version—indicates the version of IP currently used.

 IP Header Length (IHL)—indicates the datagram header length in 32-bit words.

PPI,LIMDA Page 91
NIRWW RELIANCE WEB WORLD

 Type-of-Service—Specifies how an upper-layer protocol would like a current


datagram to be handled, and assigns data grams various levels of importance.

 Total Length—specifies the length, in bytes, of the entire IP packets, including


the data and header.

 Identification—contains an integer that identifies the current datagram. This


field is used to help piece together datagram fragments.

 Flags—consist of 3-bit field of which the low-order (least-significant) bits


control fragmentation. The low-order bit specifies whether the packets can be
fragmented.

 The middle bit specifies whether the packet is the last fragment in a series of
fragmented packets. The third or high-order bit is not used.

PPI,LIMDA Page 92
NIRWW RELIANCE WEB WORLD

 Fragment offset—indicates the position of the fragment’s data relative to the


beginning of the data in the original datagram, which allows the destination IP
process to properly reconstruct the original datagram.

 Time-to-live— maintains a counter that gradually decrements down to zero, at


which point the datagram is discarded. This keeps packets from looping endlessly.

 Protocol—indicates which upper-layer protocol receives incoming packets after


IP processing is completed.

 Header checksum—helps ensure IP header integrity.

 Source address—specifies the sending node.

 Destination address—specifies the receiving node.

 Option—Allows IP to support various options, such as security.

 Data—Contains upper-layer information.

What is IP address?

 IP address is the 32 bit (4-bytes) unique number that uniquely identifies the
particular hosts on the particular network.

 An IP address is the logical address of the network adapter. The IP address


unlikely identifies computers on network.

 An IP address can be private for use on LAN and public for the use on the
WAN.

IP address classes:

 There are several classes of the IP address depending on the number of hosts of
the network.

 The most widely used IP address classes are: -

1. CLASS A IP address

2. CLASS B IP address

PPI,LIMDA Page 93
NIRWW RELIANCE WEB WORLD

3. CLASS C IP address

PPI,LIMDA Page 94
NIRWW RELIANCE WEB WORLD

1. CLASS A IP Address:
 Class A IP address is used for the network having approximately 65,535 or
more users.

 Last 7 bit of the first byte represents the net ID and remaining 24 bits of the 3
bytes represent the host ID.

 Net ID of the class A IP address ranges from 0 to 127.

For example: - 10.192.0.0 represent the class A IP address in which first byte
represent the net ID last represent the host ID.

2. CLASS B IP address:
 Class B addresses is used for the network having more then 256 users but less
then 65,535 users.

 So, it is used for the medium size network.

 In class B 14 bits of the first 2 bytes represents the net ID and remaining 2 bytes
represent the host ID.

 Net ID of class B ranges from 128 to 191.

 For example: - 10.190.14.0 represents the class B IP address in which 14 bits of


the first 2 bytes represents the net ID (10.190) and last 2 bytes represents the host ID
(14.0).

PPI,LIMDA Page 95
NIRWW RELIANCE WEB WORLD

3. CLASS C IP address:
 Class C IP address is used for the network having less then 256 users.

 So, it is used for the small size network.

 Class C IP address 21 bits of the first 3 bytes are used for the net ID and 8 bits
of the last byte is used for the host ID.

 Net ID for the class C IP address ranges from 192 to 233.

For example: - 10.192.1416 represents the class C IP address in which 21 bits


of the first 3 bytes (10.192.14) represents the net ID and last byte (16)
represents the host ID.

4. CLASS D and CLASS E IP address:


 Class D and class E IP address are also available but they are not widely used.

 They are used use for broadcasting.

PPI,LIMDA Page 96
NIRWW RELIANCE WEB WORLD

PPI,LIMDA Page 97
NIRWW RELIANCE WEB WORLD

IP sub netting and variable length subnet mask (VLSM)

Subnet calculation: -

 Host calculation from right to left.

 Subnet masks calculation from left to right.

PPI,LIMDA Page 98
NIRWW RELIANCE WEB WORLD

How to create sub net?

 To create sub networks, you take bits from the host portion of the IP address
and reserve them to define the subnet address.

 This means fewer bits for host, so the more sub net and the fewer bits available
for defining host.

 If you actually implement sub netting, you need to determine you current
requirement well as plan for future condition follow this step:

1. Determine the number of required network IDs

 One for each subnet

 One for each wide area network connection

2. Determine the number of required host

 One for each TCP/IP host

 One for each a router interface

3. Base on above requirement, create the following

 One subnet mask your entire network

 A unique subnet ID for each physical segment

 A range of host ID for each subnet

PPI,LIMDA Page 99
NIRWW RELIANCE WEB WORLD

Subnet masks

 For the subnet address scheme to work every machine on the network must
know each part of the host address will be used has the subnet address.

 This accomplished by assigning a subnet mask to each machine. A subnet mask


is a 32-bit value that allows the received and IP packets to distinguee the network ID
portion of the IP address from the host ID portion of the IP address.

 The network administrator create a 32-bit sub net mask composed 1s and 0s.
The 1s I the subnet mask represent the portion there refer to subnet address.

 Not all networks need subnet, meaning that used to default subnet mask.

 This is basically the same has saying that a network doesn’t have subnet
address. Table shows the default subnet mask for classes A, B & C. this default mask can
not change.

 In other word, you can’t change the first byte in subnet mask, it must read to
255.255.0.0.0 at minimum, similarly, you can not assign 255.255.255.255, as this or
one’s a broad cast address.

 A class B address must start with 255.255.0.0, and a class C has a two start with
255.255.255.0.

PPI,LIMDA Page 100


NIRWW RELIANCE WEB WORLD

Classless inter domain routing (CIDR)

 Another term you need to fertilize your self with each class less inters domain
routing. When you received a blocked of addresses from ISP (Internet service provider),
what you get will look something like this: 192.168.10.32/28.

 What this is telling you is what your subnet mask is. The slash notion (/) means
how many bits are turned on (1s). Obliviously, the maximum could only be /32 because a
byte is 8-bits are there are four bytes in an IP address.

For example: A class B default mask would be 255.255.0.0. Which is /16 because
16 bits are 1s: 11111111.11111111.00000000.00000000.

PPI,LIMDA Page 101


NIRWW RELIANCE WEB WORLD

Sub netting Practice Example:

Class C Address
192.168.0.0 / 24 (14 host)
0 0 0 0 0 0 0 0
27 2 6
25 24 23 22 21 20
128 64 32 16 8 4 2 1
128 192 224 240 248 252 255 256-1=225

 From the table we can say that is we required subnet mask for the 14 host then,

24- 2 = 14

 So here we used the last 3 bits from the left are add to the net ID. So, we will
get 8 new subnet ID

 Because, 23 = 8

 Subnet mask will be of the form 255.255.255.224 And new subnet IDs are of
the form 192.168.0.0 to 192.168.0.256

 All the subnet IDs are given as below: -

192.168.0.0
192.168.0.32
192.168.0.64
192.168.0.96
192.168.0.128
192.168.0.160
192.168.0.192
192.168.0.224

255.255.255.224/27

Let’s use the Class C network address 192.168.10.0 and subnet mask
255.255.255.224.

192.168.10.0= network address


255.255.255.224= sub net mask

How many subnets?

224 is 11100000, so our equation would be 23 – 2 = 30

PPI,LIMDA Page 102


NIRWW RELIANCE WEB WORLD

What are the valid hosts?


 To answer above question, first just write out the subnet, and then write out the
broadcast address the number right before the next subnet.

 Lastly, fill in the host address the following table gives you all the subnet for the
255.255.255.224 class C subnet mask.

The subnet address 32 64 96 128 160 192

The first valid host 33 65 97 160 161 192

The last valid host 62 94 126 158 190 222

The broad cast address 63 95 127 159 191 223

PPI,LIMDA Page 103


NIRWW RELIANCE WEB WORLD

5.9 DLC connectivity, important etc. in terms of WW.


 Digital loop carrier on SIM – 1 Ring or DLC-on- STM – 1 is a distributed
narrow band access network product that works with a local exchange on V5.2 Access
protocols and caters to PSTN and basic rate ISDN subscribers.

 The primary objective of subscriber connections and facilities centralized billing


and administrative activities at the local exchange.

 DLC-on-STM-1 comprises two basic modules: a Central Office Terminal


(COT) and an access Terminal (AT).

 The COT takes V5.2 links from a local exchange and process the V5 protocol
(ITU-T G.965) and transfers the call processing information to the ATs through a
proprietary protocol over an STM-1 ring and drops the E1 tributaries assigned for it self
and caters to 480 PSTN subscriber (maximum) or a mix of both.

 The system is typically dimensioned for four ATs, hence, supporting 1920
PSTN subscribers. However, the dimensioning can be configured for more ATs also.
The system has a centralize Management Console that takes care of complete
Operation, Administration and Management (OAM) activities of the system.

PPI,LIMDA Page 104


NIRWW RELIANCE WEB WORLD

Salient Feature

 Typically configuration: one central of five Terminal (COT) and four access
terminals (AT).

 Dimensioning can be modified depending on the traffic distributions.

 Compact system packaging calls for minimal real estate area for distributions.

 No forces cooling or air-conditioning required.

 Subscriber line and fiber distribution frames incorporate in the AT cabinet,


hence no external pillar box is required.

 Local exchange interface: 16 E1 Links (G.703/G.704)c carrying V5.2 protocol


messages at COT.

 2 Mbps leased line interface (G.703) to permanent Leased line network to


transport the same across the ring.

 Subscriber Interface at each AT

• POSR (480 lines maximum)

• ISDN Basic Rate and Primary Rate access

• Nx64 Kbps (V.35)

• 64 Kbps Co-directional (G.703)

• 2 Mbps Leased Line (G.703)

 All possible call featured are available in each PSTN and ISDN port.

 COT and the ATs are connected to an STM-1 ring carrying 32 E1 payloads.

 Each Add-drop Multiplexer in AT can add, Drop or pass pre-assigned E1


payloads.

 The call control protocol between COT and ATs is proprietary

 STM-1 Ring: Dual optical fiber (self-heating)

 Centralized management console (operation, Administration and Maintenance-


OAM) of the system (at COT) catering to the following functionalities:

PPI,LIMDA Page 105


NIRWW RELIANCE WEB WORLD

 System configuration management

 System status and alarms display.

 Subscriber and port management and testing.

 V5 interface and link management

 Transmission network (SMT-1 ring) configuration and management

 Fault management

 Performance monitoring

 Dual DLC on the same optical fiber (32 E1 for each DLC) can also be
configured

 One OAM system can manage up to 8 such dual DLCs.

 Powering at COT: -48V DC at exchange

 Powering at AT: commercial 220V AC (with 8 hours battery back up


provisioned)

 Complaint to TEC GR G/ANE-03/01.MAR 97 (Type 1/STM-1 hierarchy)

PPI,LIMDA Page 106


NIRWW RELIANCE WEB WORLD

Technical specification:

System definition

 Narrowband Distributed access network system on STM-1 optical ring.

 One Central Office Terminal (COT)

 Four Access Terminal(AT)

 All the modules on STM-1 optical ring

 Management console on a PC at COT, facilitating complete OAM functionality.

Local Exchange Interface

 Interface Module: COT

 16 numbers of E1 links

 Standard: ITU-T G.704

 Bit rate: 2048 Kbps (+/- 50 ppm)

 Line code: HDB3

 Framing: as per ITU-T rec. G.704

 line impedance: 120 ohms balanced

 synchronization: Either line clock or external NSE clock

 signalling protocol: V5.2 (ITU-T rec.G.965)

 Physical Termination: MDF Tag Block on COT cabinet.

PPI,LIMDA Page 107


NIRWW RELIANCE WEB WORLD

Subscriber Interface

 Interface Module: AT

 4 Peripheral Unit card-frames with 8 line card slots in each

 PSTN line card capacity=15 ports

 ISDN line card capacity=8 ports

 Total capacity:480 PSTN subscribers or 256 ISDN basic Rate (2B+D)


subscribers or a mix of both

 PSTN and ISDN line cards are interchangeable in any slot

 All feature supported on all PSTN ports: battery reversal, metering pulse feed,
CLIP, distinctive cadenced ringing, etc.

 Centralized testing and diagnostics facility is available for all ports at the
management console

 Leased line card (can be equipped with any card slot): 8 co-directional 64 kbps
ports (G.703) & 2 Nx64 Kbps (V.35) ports

 Physical Termination: MFD Tag Block on COT cabinet for subscriber


terminations

SDH Specification

 Dual optical fiber ring

 Wavelength: 1310 nm

 STM-1 payload

 Nominal bit rate: 155.220 Mbps

 Standards: ITU-T Rec.G.707, G.708, G709, G.781, G.782, G.783, G. 957,


G.958, G.825 and G.652

 Only VC12 payload are mapped to 32 E1 channels

 VC 12 level path protection

 Cross-connection is supported

PPI,LIMDA Page 108


NIRWW RELIANCE WEB WORLD

 Omnibus order wire channel

 Synchronization: line clock or external NSE clock

Management Interface

 Central management for the complete system (COT, ATs and the SDH
network): PC (Linux)

 Interface with COT: Ethernet (10 Base-T)

 Functionalities:

o Operation

o Administration

o Management

o Configuration

o Alarm/Status display

o Maintenance

o Testing/Diagnostics

Fault Management

 Alarm indications for COT and AT at the respective location (audio and visual)

 Potential free contacts for extension of alarms from COT/ATs

 Comprehensive alarm display, and logging available at OAM (Operation,


Administration and management) console

 Both module alarms and SDH network alarms and displayed

 History of past alarms and faults are stored

 Performance monitoring

 Power Requirements

PPI,LIMDA Page 109


NIRWW RELIANCE WEB WORLD

 The Central Office Terminal is powered from the exchange -48V power supply

PPI,LIMDA Page 110


NIRWW RELIANCE WEB WORLD

 The access terminal is powered by commercial 230V AC, with in-built Float
Charger and rectifier, and 8 hours battery back-up

 Chassis and Enclosures

 19 inch card-frame access COT & AT

 Central office terminal

o Central unit card frame

o Main Distribution Frame

 Access terminal

o 4 peripheral Units card frames

o 1 ADM card frame

o Main Distribution Frame & fiber Distribution Frames

o Battery pack integrated

PPI,LIMDA Page 111


NIRWW RELIANCE WEB WORLD

6. Bibliography
Books referred

1. Computer Network (3rd edition) by Tenon Baum

2. CCNA (Cisco certify Network Associate) by Todd Lemmale

Material referred

Material provided by the project guide

Website referred

1. www.relienceinfo.com

2. www.firewall.cx

3. www.google.com

Resources

1. Microsoft Visio 2000

2. Microsoft word

PPI,LIMDA Page 112

You might also like