Professional Documents
Culture Documents
COMPANY OBJECTIVE
Mainly there are six objectives for preparing project on reliance communication,
they are as follows:-
2. Comparison between Theorical knowledge obtains BBA and Experience of Business life.
- Superior
- Subordinate
- Collogues
- Worker
- Customer
To learn How to take various decision in dynamic world with changing situation
PPI,LIMDA Page 1
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 2
NIRWW RELIANCE WEB WORLD
Due to deep interest in the field of networking, we have chosen the project of
networking.
Another reason for this project is that the entire networking of the reliance web
world based on the fiber optic connectivity and grounding structure cable connectivity of
the pc in the reliance web world.
As far as we concern with the aim of our project, the main goal of our project is
to introduce the basic Networking of the reliance web world.
In reliance web world how pc is connected to each other, which topologies are
used and why as well how Local Area Network (LAN) to Wide Area Network (WAN)
connectivity is provide.
Basically in reliance web world all the pc is connected in one LAN that is
divided into five Virtual LAN s that is equal to the number of Zones of the reliance web
world.
So, we also go through the basic study of virtual LAN. How VLAN is created
and how pc of the two different VLAN can communicate with each other.
We also go introduce the basic logical and physical connectivity of the all the
Media Access node (MCN) and all the MCN of the entire city to the central MCN.
PPI,LIMDA Page 3
NIRWW RELIANCE WEB WORLD
This project is to introduce the basic Networking of the reliance web world.
In reliance web world how pc is connected to each other, which topologies are
used and why as well how Local Area Network (LAN) to Wide Area Network (WAN)
connectivity is provide.
PPI,LIMDA Page 4
NIRWW RELIANCE WEB WORLD
Basically in reliance web world all the pc is connected in one LAN that is
divided into five Virtual LAN s that is equal to the number of Zones of the reliance web
world.
So, we also go through the basic study of virtual LAN. How VLAN is created
and how pc of the two different VLAN can communicate with each other.
We also go introduce the basic logical and physical connectivity of the all the
Media Access node (MCN) and all the MCN of the entire city to the central MCN.
PPI,LIMDA Page 5
NIRWW RELIANCE WEB WORLD
2.4 SCOPE
The scope of the study refers to the job that to know about the activities of the
organization. The study means that the analysis of the products of the company on which
she has to focus.
During the summer training the volunteer need to find out the corporate strategies
of the running company and the mile stone which the company has covered during its
journey. In the summer training, it is necessary for the student that she involves with the
experience guys to get the knowledge about the company. That is how the company has got
the success, Or if it is going in the loss, why.
In my training period I have found that the reliance group is the biggest group in
Indian companies. I felt that I can learn the more in the Reliance web world. Reliance web
world is the part of the Reliance Capital Limited which is a growing company in the
broadband financial services.
PPI,LIMDA Page 6
NIRWW RELIANCE WEB WORLD
3. Reliance Infocomm
Introduction
Reliance Infocomm is the outcome of the late visionary Dhirubhai Ambani’s (1932-2010)
dream to herald a digital revolution in India by bringing affordable means of information
and communication to the doorsteps of India’s vast population.
“Make the tools of Infocomm available to people at an affordable cost, they will
overcome the handicaps of illiteracy and lack of mobility”, Dhirubhai Ambani charted
out the mission for Reliance Infocomm in late 1999.
Working at breakneck speed, from late 1999 to 2009 Reliance Infocomm built
the backbone for a digital India -60,000 kilometres of fiber optic backbone, crisscrossing
the entire country.
PPI,LIMDA Page 7
NIRWW RELIANCE WEB WORLD
In a LAN, computers are connected together within a “local” area (for an office
or home).
In a WAN, computers are further apart and are connected via telephone/
communication lines, radio waves or other means of connection.
Networks are usually classified using three properties: Topology, Protocol and
Architecture.
Protocol specific a common set of rules and signals the computers on the
network use to communicate. Most networks use Ethernet, but some networks may use
IBM’s Token Ring protocol. We recommend Ethernet for both home and office
networking.
And in client server architecture one centralize server handle the request from
multiple clients and provide authentication for accessing each and every element of the
network. So, in client server architecture we have high level of security compare to peer-
to-peer network.
PPI,LIMDA Page 8
NIRWW RELIANCE WEB WORLD
Introduction
1. Physical
2. Logical
The way the computers will be talking to each other and the
direction of the traffic is controlled by the various protocols (like Ethernet) or, if you
like, rules.
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
PPI,LIMDA Page 9
NIRWW RELIANCE WEB WORLD
Bus topology is fairly old news and you probably won’t be seeing much of
these around in any modern office or campus.
With the Bus topology, all workstation are connecting directly to the main
backbone that carries the data. Traffic generated by any computer will travel across the
backbone and available bandwidth of your network.
This works well in a small network of 2-5 computers, but as the number of
computers increases so wills the network traffic and this can greatly decrease the
performance and available bandwidth of your network.
As you can see in the above example, all computers are attached to a continuous
cable, connects them in a straight line.
PPI,LIMDA Page 10
NIRWW RELIANCE WEB WORLD
The arrows clearly indicate that the packet generated by Node 1 is transmitted to
all computers on the network, regardless the destination of this packet.
Also, because of the way the electrical signals are transmitted over this cable, its
ends must be terminated by special terminators that work as “shock absorbers”, absorbing
the signal so it won’t reflect back to where it came from the value of 50 ohms has been
selected after carefully talking in consideration all the electrical characteristics of the cable
used, the maximum and minimum length of the bus and a few more.
If the bus (the long yellow cable) is damaged anywhere in its path, then it will
most certainly cause the network to stop working or, at the very least, cause big
communication problems between the workstations.
Thinnest -10Base2, also known as coaxial cable and Thicket -10 Base 5 is used
in these types of topologies.
Star topology
The star or Hub topology is one of the most common network topologies found
in most offices and home networks. It has become very popular in contrast to the bus type
because of the ease of troubleshooting.
PPI,LIMDA Page 11
NIRWW RELIANCE WEB WORLD
The advantage of the star topology is that if one computer on the star topology
fails, then only the failed computer is unable to send or receive data. The reminder of the
network functions normally.
A classic example of this type of topology is the UTP (10 base T), which
normally has a blue colour.
PPI,LIMDA Page 12
NIRWW RELIANCE WEB WORLD
Ring topology
In the ring Topology, computers are connected on a single circle of cable. Unlike the
bus topology, there are no terminated ends.
The signals travel around the loop in one direction and pass through each computer,
which acts as a repeater to boost the signal and send it the next computer.
On a larger scale, multiple LANs can be connected to each other in a ring topology by
using Thicket coaxial or fiber-optic cable.
The method by which the data is transmitted around the ring is called token passing.
IBM’s token ring uses this method. A token is a special series of bits that contains
control information. Possession of the token is allows a network device to transmit data to
the network.
PPI,LIMDA Page 13
NIRWW RELIANCE WEB WORLD
Mesh Topology
On a large scale, you can connect multiple LANs using mesh topology with leased
telephone lines, Thick net coaxial cable or fiber optic cable.
Again, the big advantage of this topology is its backup capabilities by providing
multiple paths through the network. Main disadvantage of the Mesh Topology is that when
the network is large, it is very costly.
PPI,LIMDA Page 14
NIRWW RELIANCE WEB WORLD
Hybrid Topology
With the hybrid topology, two or more topologies are combined to from a
complete network.
Star-bus
In a star-bus topology, several star topology networks are linked to a bus connection. In
a computer fails, it will not affect the rest of the network.
However, if the central component, or hub that attaches all computers in a star, fails,
then you have big problems since no computer will be able to communicate.
PPI,LIMDA Page 15
NIRWW RELIANCE WEB WORLD
Star-ring
Like the star-bus topology, if a single computer fails, it will not affect the rest of the
network. By using token passing, each computer in a star-ring topology has an equal
chance of communicating.
This allows for greater network traffic between segments than in a star-bus topology. In
all these topologies we can use three different methods of data-transmission. They are
categories as below:-
I. Broadcast
II. Multicast
III. Unicast
In broadcasting all the host of the network receive the massage send by the
sender while in Multicasting all the host of the particular group receive the massage and in
uni-casting only one sender and only one receive.
PPI,LIMDA Page 16
NIRWW RELIANCE WEB WORLD
Peer to Peer network operating systems allow users to share resources and
files located on their computers and to access shared resources found on other computers.
However, they do not have a file server or a centralized management source (See fig. 1).
In a Peer to Peer network, all computers are considered equal; they all have
the same abilities to use the resources available on the network. Peer to Peer network are
designed primarily for small to medium local area networks.
PPI,LIMDA Page 17
NIRWW RELIANCE WEB WORLD
II Client-server architecture
Clients are PCs or workstation on which users run application. Clients rely on
servers for resources such as file, devices, and even processing power.
PPI,LIMDA Page 18
NIRWW RELIANCE WEB WORLD
Centralized – Resources and data security are controlled through the server.
PPI,LIMDA Page 19
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 20
NIRWW RELIANCE WEB WORLD
Introduction
Anything such as wire, coaxial cable, fiber optics, air or vacuum, that is used to
carry a signal. Different environments for different purposes.
There are many different media that can transmit data across.
Twisted pair cable uses one or more pairs of two twisted copper wires to
transmit signals. It is commonly used as telecommunication cable. One wire interfering
with another is called crosstalk.
PPI,LIMDA Page 21
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 22
NIRWW RELIANCE WEB WORLD
Unshielded Twisted pair cable is most certainly by far the most popular cable
around the world.
One pair contains two wires that are twisted together in a unique fashion as
compared to the other three pairs.
UTP cable is used not only for networkbut also for the traditional telephone
(UTP-cat 1).
There are 6 different types of UTP categories and, depending on what you want
to achieve, you would need the appropriate type of cable.
UTP-CAT5 is the most popular UTP cable; it came to replace the good old
coaxial cable which what not able to keep up with the constant growing need for faster
and more reliable networks.
PPI,LIMDA Page 23
NIRWW RELIANCE WEB WORLD
Characteristics
Cost: - Cost is very low then other transmission media and widely used for
computer and telecommunication.
Bandwidth capacity: -Bandwidth capacity varies from 1to 155 mbps. Most
common rate is 10 mbps.
PPI,LIMDA Page 24
NIRWW RELIANCE WEB WORLD
Often abbreviated STP, a type of copper telephone wiring in which each of the
two copper wires that are twisted together are coated with an insulating coating that
functions as a ground for the wires.
The extra covering in shielded twisted pair wiring protects the transmission line
from electromagnetic interference leaking into or out of the cable.
STB cabling often is used in Ethernet networks, especially fast data rate
Ethernets.
Characteristics
Cost: - Cost is higher then UTP but then co-axial or fiber optic cable.
PPI,LIMDA Page 25
NIRWW RELIANCE WEB WORLD
Characteristics
PPI,LIMDA Page 26
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 27
NIRWW RELIANCE WEB WORLD
Advantages
High data rate, G bps. Low error rate, less than 10 difficult to tap on to
the network, so better security.
Disadvantages
One way signals only. Two fibers needed to get full duplex
communication.
PPI,LIMDA Page 28
NIRWW RELIANCE WEB WORLD
A term describing a computer network where there is no physical connection (either copper
cable or fiber optic cable) between sender and receiver, but instead they are connected by
radio.
Radio transmission
Microwave Transmission
Infrared and Millimetre Waves
Light wave Transmission
1. Radio transmission
Radio waves are easy to generate and can travel long distances. That
can easily generate buildings so they widely used for indoor and outdoor
communication.
Radio waves are Omni directional that means they travel in all
direction from the source so that transmitter and receiver don’t have to be carefully
aligned physically.
2. Microwave Transmission
In addition, even through the beam may be focused well at the transmitter;
there is still some divergence in space.
PPI,LIMDA Page 29
NIRWW RELIANCE WEB WORLD
Unguided infrared and millimetre waves are widely used for short-
range communication. Remote control used on television, VCR all used infrared range.
They are relatively directional, cheap and easy to build.
The major drawback of the infrared waves is they can’t travel long
distance and can’t penetrate building or walls.
The laser strength is also weakness here. The disadvantage that laser
beam can’t pass through rain and fog.
PPI,LIMDA Page 30
NIRWW RELIANCE WEB WORLD
In a LAN, computers are connected together within a “local” 10 area (for example
an office or home).
LANs are restricted in size. LAN often uses transmission technology consisting of a
single cable to which all machines are attached. LAN use ring topology and bus topology.
Transmission rate varies from to 100 mbps.
PPI,LIMDA Page 31
NIRWW RELIANCE WEB WORLD
A local area network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link and typically share the resources of
a single processor or server within a small geographic area (for example, within an office
building).
A local area network may serve as few as two or three users (for example, in a
home network) or as thousands of users (for example, in an FDDI (fiber distributed data
interface) network).
Large universities also sometimes use the term to describe their networks. A
recent trend is the installation of wireless MANs.
PPI,LIMDA Page 32
NIRWW RELIANCE WEB WORLD
A wide area network (WAN) is a voice, data or video network that provides
connection from one or more computers networks. WAN is a collection of subnet and
host.
Typically, a WAN consists of two or more LAN’s. The best example of a WAN
is the internet. WANs are used to connect local area networks together, so that users and
computers in one location can communicate with users and computers in other locations.
PPI,LIMDA Page 33
NIRWW RELIANCE WEB WORLD
Many WANs are built for one particular organization an d are private, others,
built by Internet service provider provide connection from an organization’s LAN to the
Internet.
PPI,LIMDA Page 34
NIRWW RELIANCE WEB WORLD
This model is called OSI reference model because it deals with connecting open
system-that are open for communication with the another system.
Each layer has been designed to do a specific task. Starting from the top layer(7)
we will see how the data which you type gets converted into segments, the segments
into datagram and the datagram into packets, the packets into frames and then the
frames are sent down the wire, usually twisted pair, to the receiving computer.
PPI,LIMDA Page 35
NIRWW RELIANCE WEB WORLD
The application layer of the OSI model is where users communication with
the computer. The application layer is responsible for identifying and establishing the
availability of the computer at the application exits.
The presentation Layer gets its name from its purpose: It presents data to
the Application layer. It’s basically a translator and provides coding and conversion
functions.
The OSI has protocol standards that defined how standard data should be
formatted. Tasks like data compression, decompression, encryption and decryption are
associated with this layer.
The Session layer is responsible for setting up, managing and then tearing down
session between presentation layer entities. The session layer also provides dialog control
between devices, or nodes.
PPI,LIMDA Page 36
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 37
NIRWW RELIANCE WEB WORLD
Services located in the Transport layer both segment and reassemble data from
upper-layer application and unite it onto the same data stream. Transport layer perform
the multiplexing of several massages and flow control between the hosts.
The network layer is responsible for routing through an Internet work and for
networking addressing.
This means that Network layer is responsible for transporting traffic between
devices that are not locally attached. Routers or other layer-3 device, are specified at the
network layer and provide routing services in an Internet work.
In the open system inter connection (OSI) communication model, the Network layer
knows the address of the neighbouring nodes in the network, packages output with the
correct network address information, selects routes and quality of service and recognizes
and forward to the Transport layer incoming massages for local host domains.
PPI,LIMDA Page 38
NIRWW RELIANCE WEB WORLD
The data link ensures that messages are delivered to the proper device and
translates messages from the network layer in to bits for the physical layer transmits.
This added information forms a sort of capsule that surrounds the original
message (or data); think of it like grabbing a latter that has information and putting it into
an envelope.
So when it arrives at the addresses, the envelope is opened and discarded, but
the latter isn’t because it has the information the addresses needs.
Physical layer is concerned with transmitting bits over a communication channel. The
design issue has to do with making sure that when one side sends a 1 bit, it is receive by
the other side as a 1 bit, not a 0 bit.
Typical questions here are how many volts should be use to represent a 1, how many
for 0, how many micro seconds a bit lasts, whether transmission may proceed
simultaneously in both direction.
The design issue deals with mechanical, electrical and procedural interfaces.
PPI,LIMDA Page 39
NIRWW RELIANCE WEB WORLD
When satellite and radio networks where added, the existing protocol had trouble
internetworking them, so a new network architecture needed.
Thus the ability to connect multiple networks together in a seamless way was one of
the major design issue goal from very beginning. This architecture later becomes known
as TCP/IP Reference model.
The Internet protocol is defined as? The heart of the TCP/IP and the most important
protocol in the Internet layer? The Internet protocol will be discussed more extensively later
on.
Application
Presentation
Session
Transport
Network
Data link Application
Physical
Transport
Network
Host-to-Network
PPI,LIMDA Page 40
NIRWW RELIANCE WEB WORLD
This layer is responsible for end-to-end communications of the network. This layer uses
two protocols to achieve its goal: Transmission control protocol (TCP) and User Datagram
Protocol (USP).
The transmission control protocol and the user Datagram Protocol will be discussed more
extensively later on.
PPI,LIMDA Page 41
NIRWW RELIANCE WEB WORLD
This layer includes all the applications that make use of the transport layer
protocols in order to deliver or receive data. Most of these applications provide user
services in a system.
PPI,LIMDA Page 42
NIRWW RELIANCE WEB WORLD
Similarities
They share similar architecture. - Both of the models share a similar architecture. This can
be illustrated by the fact that both of them are constructed with layers.
They share a common application layer.- Both of the models share a common “application
layer”. However in practice this layer includes different services depending upon each model.
Both models have comparable transport and network layers. - This can be illustrated by the
fact that whatever functions are performed between the presentation and network layer of the
OSI model similar functions are performed at the Transport layer of the TCP/IP model.
Both models assume that packets are switched. - Basically this means that individual
packets may take differing path in order to reach the same destination.
PPI,LIMDA Page 43
NIRWW RELIANCE WEB WORLD
Differences
TCP/IP protocols are considered to be standards around which the internet has
developed. The OSI model however is a “generic, protocol-independent standard”.
TCP/IP combines the presentation and session layer issues into its application
layer.
TCP/IP combines the OSI data link and physical layer into the network access
layer.
TCP/IP appears to be a simpler model and this is mainly due to the fact that it
has fewer layers.
TCP/IP is considered to be a more credible model- This is mainly due to the fact
because TCP/IP protocols are the standards around which the internet was developed
therefore it mainly gains creditability due to this reason. Where as in contrast
networks are not usually built around the OSI model as it is merely used as a
guidance tool.
The OSI model consists of 7 architectural layers whereas the TCP/IP only has 4
layers.
PPI,LIMDA Page 44
NIRWW RELIANCE WEB WORLD
To expand a single network without breaking it into new parts or connecting it to the
other network you can use one of the following devices.
1. Hub
2. Repeater
3. Bridge
Hub: -
A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one
port, it is copied to the other ports so that all segments of the LAN can see all packets.
Passive hub
Active hub
Intelligent hub
PPI,LIMDA Page 45
NIRWW RELIANCE WEB WORLD
Passive hub: -
Passive hub simply combines the signals of the network segments. There is no signal
processing or regeneration.
Because it does not boost the signal, in fact absorbs some of the signal, passive hub
reduces by half the maximum cabling distance is permitted.
In passive hub, each computer receives the signals send from all the other computers
connected to the hubs.
Active hub: -
Active hub likes passive hubs except that they have electronic components that
regenerate or amplify the signals.
Because of this, the distance is between the devices can be increases the main
drawback is that they amplify noise as well as signal they are much more expensive than
passive hubs.
Intelligent hub: -
A switching hub chooses only the port of the device where the signal need to go rather
then sending the signal along all paths.
One advantage to this is that you can permanently connect all transmission media
segment because each segment will be used only when signal is sent to that segment.
PPI,LIMDA Page 46
NIRWW RELIANCE WEB WORLD
Repeater: -
All transmission media weaken the electromagnetic signals that travel through them.
Attenuation therefore limits the distances any medium can carry data.
Adding devices that amplifies the signal can allow it to travel long distance, increasing
size of the network. Devices that amplify signals in this way repeaters.
Repeater fall into two categories: amplifiers and the signal regenerating repeaters.
Amplifier simply amplify entire incoming signal. Unfortunately, they amplify both signal
and noise.
Signal regenerating repeaters create an exact duplicate of the incoming data. This
reduces the noise.
Bridge: -
Bridge connects network segments. Use of the bridge increases maximum size of your
network.
Unlike the repeater, which simply passes on all signals it receives; the bridge
selectively determines the appropriate segment to which it should pass a signal. It does
this by reading address receive.
PPI,LIMDA Page 47
NIRWW RELIANCE WEB WORLD
Like repeaters bridge can regenerate signals in order to extend network length.
However, because bridge actually read packet address they are consider operating at data
link layer.
PPI,LIMDA Page 48
NIRWW RELIANCE WEB WORLD
1. Router
2. Gateway
Router: -
A device that forwards data packets along networks. A router is connected to at least
two networks, commonly two LANs or WANs or a LAN and its IPS’s network.
Routers are located at gateways, the place where two or more networks connect. Very
little filtering of data is done through routers.
Router use headers and forwarding tables to determine the best path for forwarding the
packets and they use the protocols such as ICMP (Internet Control Message Protocol) / to
communicate with each other and configure the best route between any two hosts.
In packet-switched network such as the Internet, a router is a device or, in some cases,
software in a computer, that determines the next network point to which a packet should
be forwarded toward its destination.
The router is connected to at least two networks and decides which way to send each
information packet based on its current understanding of the state of the networks it is
connected to.
PPI,LIMDA Page 49
NIRWW RELIANCE WEB WORLD
A router may create or maintain a table of the available routes and their conditions and
use this information along with distance and cost algorithms to determine the best route
for a given packet.
Typically, a packet may travel through a number of network points with routers before
arriving at its destination.
Gateway: -
Routers can successfully connect networks with the protocols that function in
similar ways. When the networks that must be connected are using completely different
protocols from each other, a more powerful and intelligent devices is required.
A gateway is a device that can interpret and translate the different protocols that
are use on to different network.
PPI,LIMDA Page 50
NIRWW RELIANCE WEB WORLD
WEBWORLD
Reliance Web World is the retail interface initiative of the Infocomm juggernaut
and a part of strategy of vertical integration.
Customer Convenience Centre is a one-stop sales and customer service point for
Reliance Infocomm’s retail products and services.
Broadband Centre brings real broadband experience to Indians for the first time
through a host of unique applications and services. This includes Video Chat, Multi-
Virtual Office, Digital Storage, Digital Movie, Digital Customized Music, Digital
Electronic News Gathering Service and E-Learning.
Java green, a gourmet café with exciting range of food and beverage products, is
designed to provide you a relaxed and refreshing atmosphere in Reliance Web
Worlds.
PPI,LIMDA Page 51
NIRWW RELIANCE WEB WORLD
Deng is a one simple live configuration of the cable data. Any reporter can plug
on to the dang machine and make the live reports through by cable on television.
The pc is not required into the deng process. Actually three evens are used to
join and connectivity to the DLC through the router and all the division of the web
word.
It is one type of private room. If any customer wont any kind of privacy than he or
she can use VO room. It is paid extra charges.
There is various limitation of the video chat to overcome all this difficulties we can
use VC room.
The main advantage of VC room is security because when ever we use VC we are
directly connected to the destination through IP address or an ISDN number (if
required).
So there is not intermediate connection comes in to they existence so less security
achieve.
PPI,LIMDA Page 52
NIRWW RELIANCE WEB WORLD
Like wise polycom camera, audio interface, audio, plasma display or screen, power
supply.
Polycom camera is connected to the plasma display screen by video interface cable
and to the audio by interface cable.
PPI,LIMDA Page 53
NIRWW RELIANCE WEB WORLD
Launch pad: - launch pad is own created software by reliance which is used by
customer for gaming, surfing, basic micro-soft windows, movie maker, and internet.
Java green
Java green, a gourmet café with exciting range of food and beverage products, is
designed to provide you a relaxed and refreshing atmosphere in Reliance Web Worlds.
Customer care centre has special software for provide different activities for example
clarify software use for billing and enquiry.
PPI,LIMDA Page 54
NIRWW RELIANCE WEB WORLD
IT RACK: -
In the IT RACK easy way to Rack mount Patch Panel, Router, Switch or Hub.
Main function of the IT RACK is to arrange the cable of RJ-45 in stack. Patch
Panel is the main cable of the LAN line, which is going on the router through switches.
PPI,LIMDA Page 55
NIRWW RELIANCE WEB WORLD
The cable that are called the patch panel patched by the crone tools. Crone tool
is also used to patching telephone cables.
PPI,LIMDA Page 56
NIRWW RELIANCE WEB WORLD
Switches: -
The two types of switches are used to connectivity of VLAN in reliance WW.
They are 420 & 1424. The 420 switches is main switch of the VLAN and 1424 switch is
extra switch.
420 switch is provides connectivity to the part of the zones of reliance WW.
Extra switch is uses when port is less provided, then the necessity.
Remember that this MAC address on the data packet is the same MAC address
on the network card of that particular computer.
PPI,LIMDA Page 57
NIRWW RELIANCE WEB WORLD
Virtual LAN: -
The best thing about a VLAN, which is also a logical grouping of computer on a
network into what is described as some sort of communication group, is that the
computers really do not have to be in close proximity or even on the same floor.
And, because switches offer a higher density of connection ports, they can
easily replace hubs on the network.
This means that each computer on the network can be connected to its own port
on the switch.
When the computers are directly connected to the switch, the switch can supply
each of the computers with a dedicated amount of bandwidth.
For example, say users are on a 100mbps Ethernet network via a switch. Each
user can realize a bandwidth of 100mbps and don’t have to complete for the bandwidth
the way computers do on a network via a hub because each port on the switch has a
dedicated 100Mbps. This is why switches are rapidly placing hubs.
PPI,LIMDA Page 58
NIRWW RELIANCE WEB WORLD
Router: -
Routers are even smaller than bridges and switches. But routers operate on the Network
layer, which is a higher level in the OSI conceptual model.
While bridges and switches operate on the data link layer. Like switches routers use a
combination of software and hardware, but it is use to route data from its source to its
destination.
Routers are used to segment LANs that have become so large that data traffic has
become congested.
Routers are also used to connect remote LANs together using different WAN
technologies. But, when a router has become large, the large network is divided into logical
segments called subnets.
PPI,LIMDA Page 59
NIRWW RELIANCE WEB WORLD
You can setup a router to route data packets from different network protocol
stacks, which include TCP/IP.
PPI,LIMDA Page 60
NIRWW RELIANCE WEB WORLD
Main function of the DLC is make the loop of the fiber cables and gives the
security from the attenuation.
It also provides protection from power surges. A UPS contains a battery that
“kicks in” when the device senses a loss of power from the primary source.
If you are using the computer when the UPS notifies you of the power loss, you
have time to save any data you are working on and exit gracefully before the secondary
power source (the battery) runs out.
When all power runs out, any data in your computers random access memory
(RAM), is erased. When power surges occur, a UPS intercepts the surge so that it doesn’t
damage your computer.
UPS devices come in two forms: online and standby. A standby devices kick in
only when the power goes down. It must, therefore, contain special circuitry that can
switch to backup power in less than five milliseconds.
PPI,LIMDA Page 61
NIRWW RELIANCE WEB WORLD
Although online units are the best choice, they are more expensive than standby
units. But because online units supply all the power to a computer, that power is always
clean and smooth.
PPI,LIMDA Page 62
NIRWW RELIANCE WEB WORLD
The pantium-4 processors offer great performance to let experience the web and
share photos, movies, and music in powerful new ways.
Create home movies and add cool special effects to your entire favourite clips-
then share them with friends faster than ever with a Pentium 4 processor-based PC
and a broadband connection.
A UPS provides enough power for the computer or computers to properly shut
down or to remain up during a temporary power outage.
PPI,LIMDA Page 63
NIRWW RELIANCE WEB WORLD
Patch panels and patch cables are used in communication applications. While
thousands of patch panels are used on relay racks in large telecom applications, thousand
more patch panels are used in small communication closets on wall mount racks.
ISC offers standard patch panel sizes. Cat 5e and cat 6 patch panels are now the
most used standards. Cat 5 patch panels are slow for many of today’s applications.
Cat 5e patch panel and cat 6 patch panels are an abbreviated nomenclature for
category 5e patch panel and category 6 patch panels.
It has become easier to refer to the shortened version patch panel as cat 5e panel
and cat 6 patch panels for users who have large applications our professional impact
punch down tool is recommended.
Patch panel are purchased as to the amount of ports they have. For example,
ISC offers a 12-port patch panel, 24-port patch panel, 48-port patch panel, and 96-port
patch panel.
These port numbers are available in cat 5e and cat 6 patch panels.
PPI,LIMDA Page 64
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 65
NIRWW RELIANCE WEB WORLD
It is shown that the main connectivity of the web world is oriented from
Mumbai. From the Mumbai this connectivity maintained on the MCN (media control
node) which is held on particular city in which the web worlds are.
The MCN is the main terminal point of the reliance web world situated in one
particular city.
PPI,LIMDA Page 66
NIRWW RELIANCE WEB WORLD
For example: - in Surat we have four reliance web worlds. So, all this four web
worlds are connected to the one MCN.
Similarly all the nine web world of the Ahmadabad is connected to the one
MCN. And all these MCN of particular cities are connected to one central MCN that is
located at Mumbai.
In this hierarchy after the MCN all transmission lines comes to the BAN
(building access node).
In any private firm wants the connectivity, then that connectivity is directly
provided from the BAN.
CT DLC is the centralize DLC. So it is the central DLC, by it all the RT DLC
(remote terminal data loop control) is connected to it.
So from this description it can say that RT DLC is maintained in the entire web
world in one particular city.
Now the main checks with the router and switch are, for ex. one web world set
up.
Router is connected to the switch by the ISDN or LL (lease line) for the
connectivity of the VLAN of the reliance Infocomm.
In between router and switch lease line or ISDN network is used in cabling &
network connectivity.
And then switch is connected to the all the particular pc by their ports of switch.
And such as the above diagram all the network of the reliance web world is
working as above architecture of the reliance web world.
PPI,LIMDA Page 67
NIRWW RELIANCE WEB WORLD
How can we communicate from one web world of the one city to another web
world of another city?
Here we discuss the logical diagram of the reliance web world network setup.
In this diagram we will describe how one pc of one web world can
communicate with another pc of another web world.
Suppose pc1 of VLAN1 of Surat web world wants to send to the pc1 of same
VLAN of the Ahmadabad web world.
PPI,LIMDA Page 68
NIRWW RELIANCE WEB WORLD
2. Switch will compare the MAC address of the destination port with its own
MAC table.
3. In this case, it will not find the desired MAC address in its MAC table.
4. So, it will pas massage to the router of the local web world.
6. It will not find the required IP address. So, it will forward massage to the MCN
of the Surat.
7. At the Surat MCN we are not able to find the destination address. So, massage
will forward to the Mumbai MCN.
9. So, from the Mumbai MCN message will transfer to the Ahmadabad MCN.
10. From Ahmadabad MCN massage will transfer to the router of the Ahmadabad
web world according to the destination IP address.
12. Switch is forward massage to the pc of particular VLAN for which massage is
intended.
13. Now the MAC address of the pc will be store in MAC table of both the switch.
PPI,LIMDA Page 69
NIRWW RELIANCE WEB WORLD
As shown in figure, layer 2 switched networks are typically designed as flat networks.
Every broadcast packets transmitted is seen by every device on the network,
regardless of weather device to receiver that data.
Router allows broadcast only within the originating network, but switches forward
broadcast to all segments. The reason’s it’s called flat network is because its one
broadcast domain, not because its design is physically flat.
In figure-1 we see Host A sending a broadcast and all ports on all switches
forwarding this broadcast, except the port that originally received it. Now shown in
figure-2 switched network.
Its show Host A sending a frame with Host D as it’s destination, and as you can
see, that frame is only forwarded out the port when Host D is located.
This is huge improvement over the HUB networks, unless having one collision
domain default is what you really want.
PPI,LIMDA Page 70
NIRWW RELIANCE WEB WORLD
The largest benefits gained by having layered 2-switched networks are that create
us individual collision domain segment for each device plugged into each port of the
switch. And here large network is created.
The large the numbers of user and devices, the more broadcast and packets each
switch to handle and author is security. In layer 2 switches inter network, all users can
see all devices by default.
PPI,LIMDA Page 71
NIRWW RELIANCE WEB WORLD
Network add, move and changes are achieved by configured a port in to the
appropriate VLAN.
A group of users needing high security can be put into VLAN so that no user
outsides the VLAN can communicate with them.
VLANs increase the number of broadcast domain while decreeing there size.
VLANs memberships
An administrator, who then assigns switch port to each VLAN, usually creates
LANs. Such a VLAN called is static VLAN if the administrator wants to do a little more
front a assign all the host device hardware address in to a data base, the switches can be
configured to assign VLANs dynamically when ever a host is plugged in to a switch. This
is called dynamic VLAN.
Statics VANs
Static VLAN are the usual way of creating VLANs, they are also the most
secure. VLANs maintain that associate until a administrator manually changes that
port assignment.
This type of VLAN configuration is comparative easy to set up and monitor the
movement user with in the network is controlling. It can be helpful to use network
management software to configure the ports.
PPI,LIMDA Page 72
NIRWW RELIANCE WEB WORLD
Dynamic VLANs
If a node is then attach to an assigned switch port, the VLAN management data
base can look up hardware address an assign and configured the switch port to the
current VLAN.
Configuration of VLANs
To configure VLANs on a 1900 switch, use the VLAN vlan# name name
[vlan#] command. In the following example, I am going to demonstrate how to
configure vlan on the 1900 switch by creating 3 vlans for three different
departments.
>en
#config t
Enter configuration commands ands, one per line. End with CNTL/Z.
(config)#hostname 1900
1900(config)#exit
After you create the vlan that you want, you can use the show vlan command to
see them. But notice that by default, all port on the switch in vlan 1. To change the
vlan associated with a port, you need to go to each interface and tell it which vlan to
be part of.
PPI,LIMDA Page 73
NIRWW RELIANCE WEB WORLD
>?
Enable Turn on privileged commands
exit Exit from the EXEC
help Description on the interactive help system
ping Send echo massages
show Show running system information
traceroute Trace route to destination
Creating vlans for the 2950 switch is different. We configure them in what is called a
VLAN database. It is:
switch#vlan database
switch(vlan)#?
Switch is the most widely used interconnection device. To overcome the limitation
of Hub net Bridge, we use the switches to inter connect the networks. The main
advantage of switch over the bridge is that, it is provides greater bandwidth compare to
bridge.
PPI,LIMDA Page 74
NIRWW RELIANCE WEB WORLD
For example: -
If we have Hub of 100 kbps caring capacity & four computers are connected to
the Hub then it provides 25 kbps to each of the computer while for the similar case
switch provides 100 kbps to each of the computer. So switch has more traffic caring
capacity compare to Hub.
Since switch are becoming very popular on both the small and large networks,
they have all but replaced bridges as the internetworking devices for conserving
network bandwidth and expanding LANs into larger corporate internet works.
PPI,LIMDA Page 75
NIRWW RELIANCE WEB WORLD
In reliance Web World two type of switches are used to connectivity of the VLAN
to the pc.
The main difference of this two switches is : - the Nortel switch (420) is work in layer-2
(data link layer) and the passport switch (1424) is work in the layer-3 (network layer).
These switches are mounted in the IT RACK and it is arranged in stack in it.
PPI,LIMDA Page 76
NIRWW RELIANCE WEB WORLD
For make the connectivity of the pc to the switch the following requirements are
required: -
Because LAN card is the basic requirement for the network connectivity. So, it
is necessary that pc must contain LAN card. So, if LAN card is not installed than
first install the LAN card and after config it.
In reliance Web World we provide the grounding the connectivity between switch
and pc. The cat-6 cable is unshielded twisted pair cable that is used to connect pc and switch.
This cable provides the grounding connectivity.
PPI,LIMDA Page 77
NIRWW RELIANCE WEB WORLD
In reliance Web World all the pc are connected by VLAN through cables in ground.
It means it is a ground connectivity of the fiber optics cables.
All the pc are connected through the duckt (duckt is the main point of the
connectivity of 2 or more pc in reliance WW) for connectivity of pc in VLAN. Duckt makes
the ground connectivity of the group of pc and from the duckt cables are connected to the
switch in server electric room.
PPI,LIMDA Page 78
NIRWW RELIANCE WEB WORLD
For making the connectivity of the switch to the pc, it is necessary to configure
the switch after complete the processing of connecting switch to pc.
For configuration of the switch the operating system software is used in reliance
Web World.
Once you have decide on the number of VLANs you want to create, and
established the user you want to belong to each one, its time to bring you are first
VLAN into existence.
To configure VLAN on 1202 switch, use the vlan# name name [vlan#]
command.
For example: - we are going to demonstrate how to config VLAN on the 1202
switch by creating two VLANs for two different departments.
PPI,LIMDA Page 79
NIRWW RELIANCE WEB WORLD
o So, after uplink operation all the port of the new switch will work as that
VLAN.
PPI,LIMDA Page 80
NIRWW RELIANCE WEB WORLD
420 SWITCHES
As shown in the figure we want to increase the number pc in SG VLAN. So, one port
of the SG VLAN from one switch (420) is directly connected to one port of another switch
(1424).
Now after uplink operation all the ports (24) of 1424 switch will act as par SG VLAN.
Cascading: - Cascading is the operation though which we can combine or merge the
backplane speed of the switch.
For example: - as shown in figure we have two switches with the back plane speed of
1.2 & 2.4 gbps respectively. So, and both of the switches are cascade with each other
by their cascade port.
420 switches is the main switch, which is connected to the various zones, and 1424
switch is extra switch.
As the 420 is the main switch of WW than only it maintain all the ports of the WW and
then it is used much more then 1424 switch.
PPI,LIMDA Page 81
NIRWW RELIANCE WEB WORLD
When one of the ports of 420 switches is disable to connectivity then the port of the
1424 switch can used in place of.
3. Speed of individual port will not change. 3. Speed of individual port is increases.
PPI,LIMDA Page 82
NIRWW RELIANCE WEB WORLD
>En
>#Config t
Enter configuration command, one per line. End with CNTL/Z.
>1201(config)#hostname 1201
Give & assign the g1202 host name to the switch.
>1202(vlan) # apply
Two VLANs are created in the switch after the command execution.
>1202(config) # exit
Exit from the VLAN mode after the command execution.
After we created the VLAN that we want, we can use the show vlan command to
see them.
To change the VLAN associated with a port, we need to go to each interface and
tell it which VLAN to be a part of.
PPI,LIMDA Page 83
NIRWW RELIANCE WEB WORLD
A routing table contain entire with the IP address of router interfaces for other
networks. It dose not contain address for the hosts on each network. It only stores the
address of the router that provides an interface to that network.
For example, the following command adds a static entry in the routing table that
allows packets to be forward to network 192.168.222.0 from network 192.168.211.0.
This entry would be added to the router interfacing with network 192.168.211.0.
Note the no subletting is used and the near-side address to 192.168.222.0 is
192.168.211.100.
How dose a router work? A router uses the routing table stored in its memory to
make decisions about where and how to send packets.
The number looks at the information in the packets it receives to examine the
network ID of the IP address. It checks the network ID against the routing table to
determine the destination.
PPI,LIMDA Page 84
NIRWW RELIANCE WEB WORLD
If the router can forward the packet directly to the destination, it dose so. If it
can not, it finds the address of the router than serves as an interface for that network. It
then sends the packet to that router for forwarding.
If no entry exists in the routing table, the router sends the packet to its default
gateway.
PPI,LIMDA Page 85
NIRWW RELIANCE WEB WORLD
A hope is a passenger though a router table. If a packet must travel though three
routers to get to its final destination, it is said to go thought 3 hope.
When passing packets though a router, the original source and destination MAC
addresses are removed and recreated. (But the original source and destination IP
addresses and not altered).
The source MAC address of the sending host is required with that of the router
and new destination MAC address is that the next router or, if the packets can be
forwarded directly, that of the host.
User mode is indicated with the ‘>’ next to the router name. You can look at
setting but can not make changes from user mode. In privilege mode (indicated by the
‘#’, you can do anything). To get into privilege mode the keyword is ‘ENABLE’.
Router >
Router>enable
Password:
Router#
For example if you want to use a show command but you do not remember which
one it uses ‘show?’ will output all commands that you can use with the show
command.
Router # show?
Access-expression List access expression
Access-lists List access lists
Backup Backup status
cdp CDP information
clock display the system clock
cls DLC user information
compress show compression statistics
configuration Contents of Non-Volatile memory
--More—
Configuration Mode
Router#config t
Router(config) # end
PPI,LIMDA Page 86
NIRWW RELIANCE WEB WORLD
Flash Memory
Flash memory is a special kind of memory on the router that contains the
operating system image file(s). unlike regular router memory, flash memory
continues to maintain the image even after power is host
Show command
Router>show history
Show version
Show protocols
Enable
Show running-config
Disable
Show history
Clock
The router keeps its own clock that you can use to synchronize devices to. To view the
clock use the show clock command
1900#show clock
Configuration Mode
From privilege mode you can enter configuration mode by typing config term you
can exit configuration mode type end or pressing <CTL> +z
Routing #config t
Routing (config) #end
Routing #
PPI,LIMDA Page 87
NIRWW RELIANCE WEB WORLD
The router’s Host Name is used for local identification. When you log into the
router you see the Host Name. This is also visible via LAT and CDP. However this
is used for TCP/IP address resolution.
You can securely encrypt the enable password, by using the enable secret
command.
If you have both passwords, the enable secret is the password used.
To configure the router, we have to first log into the router, you can access the
router by typing the router’s IP address into a browser from an internal computer (in
our example, a officer computer). The router’s IP address usually defaults to
“19.168.1.1” or “192.168.0.1”. However, if this is not the case, follow the directions
below to determine the internal IP address.
PPI,LIMDA Page 88
NIRWW RELIANCE WEB WORLD
6. Record the IP address displayed on the Default Gateway line. This address is
your router’s IP address as seen from inside your network. In the above screenshot,
the router’s IP address is “192.168.123.254”. Please note that this address is only an
example.
PPI,LIMDA Page 89
NIRWW RELIANCE WEB WORLD
It always works at the network layer (layer 3) of the OSI reference model.
It decides the path from source to destination means how many intermediate
networks the massage has to travels in order to reach the destination.
Along with the transmission Control Protocol (TCP), IP represents the heart of
the internet protocols.
It can also work in conjunction with the primary network-layer protocol in the
internet protocol suite.
PPI,LIMDA Page 90
NIRWW RELIANCE WEB WORLD
IP Packets Format
PPI,LIMDA Page 91
NIRWW RELIANCE WEB WORLD
The middle bit specifies whether the packet is the last fragment in a series of
fragmented packets. The third or high-order bit is not used.
PPI,LIMDA Page 92
NIRWW RELIANCE WEB WORLD
What is IP address?
IP address is the 32 bit (4-bytes) unique number that uniquely identifies the
particular hosts on the particular network.
An IP address can be private for use on LAN and public for the use on the
WAN.
IP address classes:
There are several classes of the IP address depending on the number of hosts of
the network.
1. CLASS A IP address
2. CLASS B IP address
PPI,LIMDA Page 93
NIRWW RELIANCE WEB WORLD
3. CLASS C IP address
PPI,LIMDA Page 94
NIRWW RELIANCE WEB WORLD
1. CLASS A IP Address:
Class A IP address is used for the network having approximately 65,535 or
more users.
Last 7 bit of the first byte represents the net ID and remaining 24 bits of the 3
bytes represent the host ID.
For example: - 10.192.0.0 represent the class A IP address in which first byte
represent the net ID last represent the host ID.
2. CLASS B IP address:
Class B addresses is used for the network having more then 256 users but less
then 65,535 users.
In class B 14 bits of the first 2 bytes represents the net ID and remaining 2 bytes
represent the host ID.
PPI,LIMDA Page 95
NIRWW RELIANCE WEB WORLD
3. CLASS C IP address:
Class C IP address is used for the network having less then 256 users.
Class C IP address 21 bits of the first 3 bytes are used for the net ID and 8 bits
of the last byte is used for the host ID.
PPI,LIMDA Page 96
NIRWW RELIANCE WEB WORLD
PPI,LIMDA Page 97
NIRWW RELIANCE WEB WORLD
Subnet calculation: -
PPI,LIMDA Page 98
NIRWW RELIANCE WEB WORLD
To create sub networks, you take bits from the host portion of the IP address
and reserve them to define the subnet address.
This means fewer bits for host, so the more sub net and the fewer bits available
for defining host.
If you actually implement sub netting, you need to determine you current
requirement well as plan for future condition follow this step:
PPI,LIMDA Page 99
NIRWW RELIANCE WEB WORLD
Subnet masks
For the subnet address scheme to work every machine on the network must
know each part of the host address will be used has the subnet address.
The network administrator create a 32-bit sub net mask composed 1s and 0s.
The 1s I the subnet mask represent the portion there refer to subnet address.
Not all networks need subnet, meaning that used to default subnet mask.
This is basically the same has saying that a network doesn’t have subnet
address. Table shows the default subnet mask for classes A, B & C. this default mask can
not change.
In other word, you can’t change the first byte in subnet mask, it must read to
255.255.0.0.0 at minimum, similarly, you can not assign 255.255.255.255, as this or
one’s a broad cast address.
A class B address must start with 255.255.0.0, and a class C has a two start with
255.255.255.0.
Another term you need to fertilize your self with each class less inters domain
routing. When you received a blocked of addresses from ISP (Internet service provider),
what you get will look something like this: 192.168.10.32/28.
What this is telling you is what your subnet mask is. The slash notion (/) means
how many bits are turned on (1s). Obliviously, the maximum could only be /32 because a
byte is 8-bits are there are four bytes in an IP address.
For example: A class B default mask would be 255.255.0.0. Which is /16 because
16 bits are 1s: 11111111.11111111.00000000.00000000.
Class C Address
192.168.0.0 / 24 (14 host)
0 0 0 0 0 0 0 0
27 2 6
25 24 23 22 21 20
128 64 32 16 8 4 2 1
128 192 224 240 248 252 255 256-1=225
From the table we can say that is we required subnet mask for the 14 host then,
24- 2 = 14
So here we used the last 3 bits from the left are add to the net ID. So, we will
get 8 new subnet ID
Because, 23 = 8
Subnet mask will be of the form 255.255.255.224 And new subnet IDs are of
the form 192.168.0.0 to 192.168.0.256
192.168.0.0
192.168.0.32
192.168.0.64
192.168.0.96
192.168.0.128
192.168.0.160
192.168.0.192
192.168.0.224
255.255.255.224/27
Let’s use the Class C network address 192.168.10.0 and subnet mask
255.255.255.224.
Lastly, fill in the host address the following table gives you all the subnet for the
255.255.255.224 class C subnet mask.
The COT takes V5.2 links from a local exchange and process the V5 protocol
(ITU-T G.965) and transfers the call processing information to the ATs through a
proprietary protocol over an STM-1 ring and drops the E1 tributaries assigned for it self
and caters to 480 PSTN subscriber (maximum) or a mix of both.
The system is typically dimensioned for four ATs, hence, supporting 1920
PSTN subscribers. However, the dimensioning can be configured for more ATs also.
The system has a centralize Management Console that takes care of complete
Operation, Administration and Management (OAM) activities of the system.
Salient Feature
Typically configuration: one central of five Terminal (COT) and four access
terminals (AT).
Compact system packaging calls for minimal real estate area for distributions.
All possible call featured are available in each PSTN and ISDN port.
COT and the ATs are connected to an STM-1 ring carrying 32 E1 payloads.
Fault management
Performance monitoring
Dual DLC on the same optical fiber (32 E1 for each DLC) can also be
configured
Technical specification:
System definition
16 numbers of E1 links
Subscriber Interface
Interface Module: AT
All feature supported on all PSTN ports: battery reversal, metering pulse feed,
CLIP, distinctive cadenced ringing, etc.
Centralized testing and diagnostics facility is available for all ports at the
management console
Leased line card (can be equipped with any card slot): 8 co-directional 64 kbps
ports (G.703) & 2 Nx64 Kbps (V.35) ports
SDH Specification
Wavelength: 1310 nm
STM-1 payload
Cross-connection is supported
Management Interface
Central management for the complete system (COT, ATs and the SDH
network): PC (Linux)
Functionalities:
o Operation
o Administration
o Management
o Configuration
o Alarm/Status display
o Maintenance
o Testing/Diagnostics
Fault Management
Alarm indications for COT and AT at the respective location (audio and visual)
Performance monitoring
Power Requirements
The Central Office Terminal is powered from the exchange -48V power supply
The access terminal is powered by commercial 230V AC, with in-built Float
Charger and rectifier, and 8 hours battery back-up
Access terminal
6. Bibliography
Books referred
Material referred
Website referred
1. www.relienceinfo.com
2. www.firewall.cx
3. www.google.com
Resources
2. Microsoft word