You are on page 1of 28

LIST OF FIGURES

S.NO 1 2 3 4 VPN

TITLE 14 15 17 17

PAGE NUMBER

Backbone switch CISCO Router Connection through router

5 6 7 8 9

Routing using RIP Routing using OSPF Network switch Repeater Bridge

18 19 22 25 26

LIST OF ABBREVIATIONS:

S. No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.

Title SAIL RO SDC ISDN VSAT VPN LAN WAN MAC IP OSI RAM ROM RIP OSPF IGRP CMO ERP

Full form Steel Authority Of India Limited Regional office Software development center Intergrated Service Digital Network Very Small Aperture Terminal Virtual Private Network Local Area Network Wide Area Network Media Access Control Internet Protocol Open systems Interconnection Random Access Memory Read Only Memory Routing Information Protocol Open Shortest Path First Interior Gateway Routing Protocol Central Marketing Organization Enterprise Resource Planning

1 Introduction

Steel Authority of India Limited (SAIL) is the leading steel-making company in India and is also listed as one of India's Navratna companies .It is ranked amongst the top ten public sector companies in India in terms of turnover. SAIL is a fully integrated iron and steel maker, producing both basic and special steels for domestic construction, engineering, power, railway, automotive and defence industries and for sale in export markets.
2

SAIL manufactures and sells a broad range of steel products, including hot and cold rolled sheets and coils, galvanised sheets, electrical sheets, structurals, railway products, plates, bars and rods, stainless steel and other alloy steels. SAIL produces iron and steel at five integrated plants and three special steel plants, located principally in the eastern and central regions of India and situated close to domestic sources of raw materials, including the Company's iron ore, limestone and dolomite mines. The company has the distinction of being Indias second largest producer of iron ore and of having the countrys second largest mines network. This gives SAIL a competitive edge in terms of captive availability of iron ore, limestone, and dolomite which are inputs for steel making. Since its inception, SAIL has been instrumental in laying a sound infrastructure for the industrial development of the country. Besides, it has immensely contributed to the development of technical and managerial expertise. It has triggered the secondary and tertiary waves of economic growth by continuously providing the inputs for the consuming industry. 1.1 DIVISION OF FLAT AND LONG PRODUCT GROUP SAIL's wide range of long and flat steel products are much in demand in the domestic as well as the international market. This vital responsibility is carried out by SAIL's own Central Marketing Organisation (CMO) that transacts business through its network of 37 Branch Sales Offices spread across the four regions, 25 Departmental Warehouses, 42 Consignment Agents and 27 Customer Contact Offices. CMOs domestic marketing effort is supplemented by its ever widening network of rural dealers who meet the demands of the smallest customers in the remotest corners of the country. With the total number of dealers over 2000 , SAIL's wide marketing spread ensures availability of quality steel in virtually all the districts of the country. 1.2 MAJOR UNITS OF SAIL: Integrated Steel Plants BHILAI STEEL PLANT(BSP) IN CHATTISGARH
3

DURGAPUR STEEL PLANT(DSP) IN WEST BENGAL ROURKELA STEEL PLANT (RSP) IN ORISSA BOKARO STEEL PLANT(BSL) IN JHARKAND IISCO STEEL PLANT(ISP) IN WEST BENGAL

Special Steel Plants


Alloy Steels Plants (ASP) in West Bengal Salem Steel Plant (SSP) in Tam Visvesvaraya Iron and Steel Plant (VISL) in Karnataka

Ferro Alloy Plant

Chandrapur Ferro Alloy Plant

Ownership and Management The Government of India owns about 86% of SAIL's equity and retains voting control of the Company. However, SAIL, by virtue of its Maharatna status, enjoys significant operational and financial autonomy. 1.3 CENTRAL MARKETING ORGANISATION(CMO) ISO 9001:2000 certified Central Marketing Organisation ( CMO ) is Indias largest industrial marketing set-up. It markets carbon steel produced by the five integrated steel plants of SAIL. Headquartered in Kolkata, it transacts business through its network of Branch Sales Offices spread across the four regions, departmental warehouses equipped with mechanised handling systems, Consignment Agents and Customer Contact Offices. CMOs domestic marketing effort is supplemented by its network of rural dealers who meet the demands of the smallest customers in the remotest corners of the country. 1.4 ROLE OF THE COMPUTER AND INFORMATION TECHNOLOGY DEPARTMENT OF SAIL :
4

A strong IT support system enables real-time network connectivity within the entire CMO network. Extensive customer contact, product and segment specialization, close monitoring of order servicing and feedback analysis through a Customer Satisfaction index are established norms at CMO. The customer-friendly approach of CMO is backed by practical after-sales service. Through the process of Key Account management, CMO provides single-window service to key customers across the country for every business transaction from enquiry to order booking, order tracking to delivery, and even consultancy and after-sales service.

2 Study of the Existing System in Company


2.1 SOFTWARE DEVELOPMENT CENTER(SDC) : The SDC at Hyderabad is the center of all the IT activities.The centralized server at Hyderabad is connected to all the regional offices.All the information regarding production capacity of individual units,quantity of raw materials etc of every unit is stored in the central server. At present each unit has its owns server which in turn is connected to the regional office it comes under.However in order to keep up with the latest technology there is a push towards a centralized ERP system where every unit is connected to the centralized server and the information about each unit is directly processed into the centralized server instead of going through the regional office.Another advantage with the ERP server would be the easy tracking of the flow of products from its manufacturing stage to the delivery of the finished product to the customers.

2.2 SOUTHERN REGION OF SAIL : SAIL has four regional offices namely Northern,Western,Southern and Eastern headquartered at New Delhi,Mumbai,Chennai and Kolkata respectively. Each of the regional offices(RO) have certain branch offices(BO) under them.The regional office coordinates all the activities of the branch offices under it.

Further the regional office supervises the activities of the warehouse(WH) attached to each regional and branch office. The Southern Region has seven offices : Chennai Trichy Coimbatore Bangalore Cochin Vijaywada Vishakapatnam

As mentioned in the introduction , the major operations of SAIL is done through its four regions . The IT operations are carried out through these four regions at the Regional IT offices. The southern region is headquartered at Chennai. The Regional Office at Chennai co-ordinates the activities of the following branch offices and the Warehouse(WH) attached to them Trichy Coimbatore Bangalore Cochin The branch offices at Vijaywada and Vizag are controlled by the SDC(Software Development Center) at Hyderabad. The SDC at Hyderabad is the center of all the IT activities.The centralized server at Hyderabad is connected to all the regional offices.All the information regarding

production capacity of individual units,quantity of raw materials etc of every unit is stored in the central server. At present each unit has its owns server which in turn is connected to the regional office it comes under.However in order to keep up with the latest technology there is a push towards a centraized ERP system where every unit is connected to the centralized server and the information about each unit is directly processed into the centralized server instead of going through the regional office.Another advantage with the ERP server would be the easy tracking of the flow of products from its manufacturing stage to the delivery of the finished product to the customers. Central Marketing Organisation along with the IT departments help handles and maintains a record of its single window service to key customers across the country for transactions from enquiry to booking , order tracking to delivery and even consultancy and after-sales service. 2.3 ANALYSIS OF THE NETWORKING SYSTEM BASED ON THE STUDY OF THE EXISTING SYSTEM : To maintain a proper customer relationship it is necessary to have an administered network. When raw material is processed and ready to be sold, it is necessary a proper communication is maintained between the plant and the regions of the company which in turn maintain a co ordination with their respective branches. It is necessary that a strong network is maintained between all the links .The company has various network administrators who handle the networking. The steel plants have their respective IT department to place into the database the new materials , but this is the current system in which not every employee can access it at ease, there is a work going on to move to a system where any of the managers can access the details on the internet directly . This enables a customer friendly system and makes it simpler. 2.4 THE WORKING OF THE NETWORKING SYSTEM The link is maintained basically from the steel plants to the SDC from which there is a link to the Regional offices. The links are maintained to operate 24*7 ,various back
7

up links are maintained. The basic connection is maintained through leased lines . When the leased line fails , the ISDN takes over meanwhile the leased line is repaired through the service provider ,(Bharat sanchar nigam limited here) . If the ISDN also fails , the link is established through VSAT. The break in link is intimated to the administrators and they are responsible to maintain back the link. The southern RO has the centralised server for the 6 branches under it. The head of IT department ,Deputy general manager (IT) is the key person leading the IT team . The servers are maintained at Chennai, they are monitored every couple of hours. The training presented me an opportunity to visit the server room , connection of routers and switches were shown. A screen displayed the working of the modems and any problem is immediately reported. The various cables and bridges were also shown , basically which formed the basis of any networking system. As will be discussed later in the detailed work done through the training on various networking devices , each of these is used in the current system of the company. 2.5 ROLE OF VARIOUS PEOPLE IN THE COMPANY AND IT DEPARTMENT : #HEAD OF DEPARTMENT : The Regional Manager leads the regional office and is responsible for managing all the operations of the Region. #HEAD OF IT DEPARTMENT : The head of department is the DGM/SR.MANAGER who leads the entire Regional Offices IT department. Responsible for managing all the Computer related work.

#NETWORK ADMINISTRATOR : The network administrator is generally appointed from an outside company , Currently Engineers From HCL handle the job of the network administration. #CONSULTANT:

The constulants currently working are from PATNI Solutions who provide with the strategies.

3 Analysis 3.1 NEED FOR NETWORKS AT SAIL

SHARING RESOURCES
Data in a warehouse should be co-ordinate with the regional offices

.Any movement of

material and its current location must be stored.

To share hardware devices like printers,plottters

COMMUNICATION It has two nodes

Between the SDC(Software Development Center) and RO(Regional Offices) Between the Regional Offices and Branch Offices.

ADMINISTRATION
Manage the networks Authorized Access Need for extra resources Updates in hardware and software

3.2 MODES USED IN COMMUNICATION


3.2.1 LEASE LINE

A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric communication line connecting two or more locations in exchange for a monthly rent (hence the term lease). It is sometimes known as a 'Private Circuit' or 'Data Line' . ADVANTAGE

Unlike dial-up connections, a leased line is always active. The fee for the connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance between end points and the speed of the circuit. Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality.

USAGE Typically, leased lines are used by businesses to connect geographically distant offices. For example, a T-1 channel can be leased, and provides a maximum transmission speed of 1.544 Mbit/s. The user can divide the connection into different line for multiplexing data and voice communication, or use the channel for one high speed data circuit. Increasingly, leased lines are being used by companies, and even individuals, for internet access because they afford faster data transfer rates and are cost-effective for heavy users of the Internet. 3.2.2 ISDN (Integrated Service Digital Network) Integrated Services Digital Network (ISDN) is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. Prior to ISDN, the telephone system was viewed as a way to transport voice, with some special services available for data. The key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. There are several kinds of access interfaces to ISDN defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI) and Broadband ISDN (B-ISDN).
10

FEATURES

ISDN is a circuit-switched telephone network system, which also provides access to packet switched networks, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in potentially better voice quality than an analog phone can provide.

It offers circuit-switched connections (for either voice or data), and packetswitched connections (for data), in increments of 64 kilobit/s.

A major market application for ISDN in some countries is Internet access, where ISDN typically provides a maximum of 128 kbit/s in both upstream and downstream directions.

ISDN line can take care of most people's complete communications needs (apart from broadband Internet access and entertainment television) at a much higher transmission rate, without forcing the purchase of multiple analog phone lines. It also refers to Integrated Switching and Transmission[3] in that telephone switching and carrier wave transmission are integrated rather than separate as in earlier technology.

ADVANTAGES

ISDNs ability to deliver at a minimum two simultaneous connections in any combination of data, voice, video, fax over a single line.

Multiple devices can be attached to the line.

3.2.3 VSAT (VERY SMALL APERTURE TERMINAL) A Very Small Aperture Terminal (VSAT), is a two-way satellite ground station or a stabilized VSAT antenna with a dish antenna that is smaller than 3 meters. Data rates typically range from 56 kbps up to 4 Mbps. VSATs access satellites in geosynchronous orbit to relay data from small remote earth stations (terminals) to other terminals (in mesh configurations) or master earth station "hubs" (in star configurations). USAGE
11

VSATs are most commonly used to transmit data or broadband data (for the provision of Satellite Internet access to remote locations, VoIP or video). VSATs are also used for transportable, on-the-move (utilizing phased array antennas) or mobile maritime communications. DIFFERENT CONFIGURATIONS Most VSAT networks are configured in one of these topologies

A star topology, using a central uplink site, such as a network operations center (NOC), to transport data back and forth to each VSAT terminal via satellite.

A mesh topology, where each VSAT terminal relays data via satellite to another terminal by acting as a hub, minimizing the need for a centralized uplink site,

A combination of both star and mesh topologies.

APPLICATIONS

New online VSAT systems that use Ka band technology provide higher bandwidth. High speed communication interfaces. Telephony Satellite news gathering(SNG) Digital Audio Broadcasting(DAB)

3.3 VIRTUAL PRIVATE NETWORK


Virtual private network (VPN) is a technology that is gaining popularity among large .Organizations that use the global Internet for both intra- and inter organization communication, but require privacy in their internal communications.
12

ADVANTAGE OVER HYBRID NETWORK Both private and hybrid networks have a major drawback cost. Private wide-area networks (WANs) are expensive. To connect several sites, an organization needs several leased lines, which means a high monthly fee.

Figure 1-VPN

WORKING OF VPN VPN creates a network that is private but virtual. It is private because it guarantees privacy inside the organization. It is virtual because it does not use real private WANs; the network is physically public but virtually private. VPN uses IPSec protocol in the tunnel mode to guarantee authentication, integrity and privacy. TUNNELING- To guarantee privacy and other security measures for an organization, VPN can use the IPSec in the tunnel mode. In this mode, each IP datagram destined for private use in the organization is encapsulated in another datagram. The public network (Internet) is responsible for carrying the packet from R1 to R2. Outsiders cannot decipher the contents of the packet or the source and destination addresses. Deciphering takes place at R2, which finds the destination address of the packet and delivers it.
13

3.4 VLAN(VIRTUAL LAN)


The VLAN software when installed on a router facilitates a mechnasim to provide terminals a mechanism where they can virtually belong to the same LAN but geographically they maybe in a different geographical position. The criterion for membership into a VLAN is geographical and each terminal on a VLAN is identified by its port number and MAC address.

Figure 2:The backbone switch(L3 switch) connected to the VLANs

Thus we can roughly define a virtual LAN network as a local area network configured by software not physical wiring.

EXAMPLE

14

Say a company has two buildings. Each building can have its own switched LAN connected by a backbone. People in the first building and second building can be in the same work group though they are connected to different physical LANs. Such an offican can use the VLAN to reduce costs. VLAN CONFIGURATION The different stations can be grouped into different VLANs in three ways MANUAL CONFIGURATION In this method the administration assigns a identifier to each station. The term manually here means that the administrator types the port numbers, the IP addresses, or other characteristics, using the VLAN software. AUTOMATIC CONFIGURATION Automatic Configuration In an automatic configuration, the stations are automatically connected or disconnected from a VLAN using criteria defined by the administrator. For example, the administrator can define the project number as the criterion for being a member of a group. When a user changes the project, he or she automatically migrates to a new VLAN. SEMIAUTOMATIC CONFIGURATION A semiautomatic configuration is somewhere between a manual configuration and an automatic configuration. Usually, the initializing is done manually, with migrations done automatically. ADVANTAGES USING VLAN Cost and Time reduction VLANs can reduce the migration cost of stations going from one group to another. Physical reconfiguration takes time and is costly. Creating Virtual Work Groups For example, in a campus environment, professors working on the same project can send broadcast messages to one another without the necessity of
15

belonging to the same department. This can reduce traffic if the multicasting capability of IP was previously used. Security VLANs provide an extra measure of security. People belonging to the same group can send broadcast messages with the guaranteed assurance that users in other groups will not receive these messages.

3.5 STUDY ON ROUTERS:


3.5.1 WHAT IS A ROUTER? A router is a three-layer device that routes packets based on their logical addresses (host-to-host addressing). A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decisions about the route. The routing tables are normally dynamic and are updated using routing protocols. A three-layer switch is a router, but a faster and more sophisticated. The switching fabric in a three-layer switch allows faster table lookup and forwarding.

Figure 3:A cisco router

16

Figure 4: Connection though a router

Routing protocols are used to continuously update the routing tables that are consulted for forwarding and routing.

3.5.2 ROUTING PROTOCOLS: ROUTING INFORMATION PROTOCOL(RIP) : The Routing Information Protocol (RIP) is an intradomain routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing. RIP employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.

17

Figure 5: Routing using RIP

OPEN SHORTEST PATH FIRST PROTOCOL (OSPF) : The Open Shortest Path First or OSPF protocol is an intradomain routing protocol based on link state routing. Its domain is also an autonomous system. OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within a single routing domain (autonomous system). It gathers link state information from available routers and constructs a topology map of the network. The topology determines the routing table presented to the Internet Layer which makes routing decisions based solely on the destination IP address found in IP packets.

18

Figure 6: Routing using OSPF

INTERIOR GATEWAY ROUTING PROTOCOL (IGRP): Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing data within an autonomous system. IGRP is a proprietary protocol. IGRP was created in part to overcome the limitations of RIP (maximum hop count of only 15, and a single routing metric) when used within large networks. IGRP supports multiple metrics for each route, including bandwidth, delay, load, MTU, and reliability; to compare two routes these metrics are combined together into a single metric, using a formula which can be adjusted through the use of pre-set constants. The maximum hop count of IGRProuted packets is 255 (default 100), and routing updates are broadcast every 90 seconds (by default).

19

3.5.3 Router Components (internal) : ROM ROM is used to store the router's bootstrap startup program, operating system software, and power-on diagnostic tests programs. In order to perform ROM upgrades you remove and replace pluggable chips on the motherboard. Flash Memory It holds operating system image(s). Flash memory is erasable, reprogrammable ROM. You can perform Cisco IOS software upgrades without having to remove and replace chips. Flash content is retained when you switch off or restart the router. RAM RAM is used to store operational information such as routing tables, router's running configuration file. RAM also provides caching and packet buffering capabilities. Its contents are lost when you switch off or restart the router. NVRAM NVRAM (nonvolatile RAM), is used to store the router's startup configuration file. It does not lose data when power is switched off. So the contents of the startup configuration file are maintained even when you switch off or restart the router. Network Interfaces The router's network interfaces are located on the motherboard or on separate interface modules. You configure Ethernet or Token Ring interfaces to allow connection to a LAN. The synchronous serial interfaces are configured to allow connection to WANs. You can also configure ISDN BRI interfaces to allow connection to an ISDN WAN.. 3.5.4 Router Components (External) : A router can be configured over any of its network interfaces. You can supply configuration information to a router using:-

20

TFTP servers : Trivial File Transfer Protocol; A simplified version of FTP that allows files to be transferred from one computer to another over a network. -Virtual terminals -Network management stations 3.5.5 MODES OF A ROUTER: User mode Privileged mode If you want to access privileged mode you have to enter a password. The commands available in Privileged mode also include all those available in User mode. You can use Privileged commands to: set operating parameters perform a detailed examination of the router's status test and debug router operation access global and other included configuration modes From Privileged mode you can enter global configuration mode. This gives you access to configuration commands that affect the system as a whole, and to other configuration modes. You can specify the source of the configuration commands as being from : a terminal memory the network You can access many other specific configuration modes from Global Configuration mode that allow complex configurations to be performed. Setup Mode: If the router does not have a configuration file it will automatically enter Setup mode when you switch it on. Setup mode presents you with a prompted
21

dialog, called the system configuration dialog, in which you establish an initial configuration. Rom Monitor Mode: If the router does not find a valid operating system image, or if you interrupt the boot sequence, the system may enter ROM monitor mode. From ROM monitor mode you can boot the device or perform diagnostic tests.

3.6 SWITCHES
A network switch or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer 3) and above are often referred to as Layer 3 switches or multilayer switches. The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a gateway to access small office/home broadband services such as DSL or cable internet. In most of these cases, the end-user device contains a router and components that interface to the particular physical broadband technology. User devices may also include a telephone interface for VoIP.

Figure 7: Network switch

22

An Ethernet switch operates at the data link layer of the OSI model to create a separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4 switch ports, A and B can transfer data back and forth, while C and D also do so simultaneously, and the two conversations will not interfere with one another. In the case of a hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which would then necessitate retransmissions. Using a switch is called microsegmentation. This allows computers to have dedicated bandwidth on a point to point connections to the network and to therefore run in full duplex without collisions. 3.6.1 MULTILAYER SWITCH AND ROLE OF SWITCHES IN NETWORKS Switches may operate at one or more layers of the OSI model, including data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is known as a multilayer switch.

While Layer 2 functionality is adequate for bandwidth-shifting within one technology, interconnecting technologies such as Ethernet and token ring are easier at Layer 3.

Interconnection of different Layer 3 networks is done by routers. If there are

any features that characterize "Layer-3 switches" as opposed to generalpurpose routers, it tends to be that they are optimized, in larger switches, for high-density Ethernet connectivity.
In some service provider and other environments where there is a need for a

great deal of analysis of network performance and security,some vendors provide firewall,network intrusion security and performance modules.

The switch can also be used to create a mirror image of data that can go to an external device

23

3.6.2 SWITCH CONFIGURATIONS


UNMANAGED SWITCH These switches have no configuration interface or options. They are plug and play. They are typically the least expensive switches, found in home, SOHO, or small businesses. They can be desktop or rack mounted.

MANAGED SWITCH These switches have one or more methods to modify the operation of the switch. Common management methods include: a command-line interface (CLI) accessed via serial console. Examples of configuration changes that one can do from a managed switch include: enable features such as Spanning Tree Protocol, set port bandwidth, create or modify Virtual LANs (VLANs), etc.

SMART These are managed switches with a limited set of management features. For a price much lower than a fully managed switch they provide a web interface (and usually no CLI access) and allow configuration of basic settings, such as VLANs, port-bandwidth and duplex.

ENTERPRISE These have a full set of management features, including CLI, SNMP agent, and web interface. They may have additional features to manipulate configurations, such as the ability to display, modify, backup and restore configurations.

3.7 HUBS An Ethernet hub, active hub, network hub, repeater hub or hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model.

24

PASSIVE HUBS A passive hub is just a connector. It connects the wires coming from different branches. In a star-topology Ethernet LAN, a passive hub is just a point where the signals coming from different stations collide; the hub is the collision point. This type of a hub is part of the media; its location in the Internet model is below the physical layer. REPEATERS A repeater receives a signal and, before it becomes too weak or corrupted, regenerates the original bit pattern. The repeater then sends the refreshed signal.

Figure 8:Repeater

A repeater does not actually connect two LANs; it connects two segments of the same LAN. The segments connected are still part of one single LAN. A repeater is not a device that can connect two LANs of different protocols. A repeater has only forwarding capacity and no filtering capacity and is a generator. ACTIVE HUBS An active hub is actually a multiport repeater. It is normally used to create connections between stations in a physical star topology.

25

BRIDGES A bridge operates in both the physical and the data link layer. As a physical layer device, it regenerates the signal it receives. As a data link layer device, the bridge can check the physical (MAC) addresses (source and destination) contained in the frame. A bridge has filtering capability. It can check the destination address of a frame and decide if the frame should be forwarded or dropped. If the frame is to be forwarded, the decision must specify the port. A bridge has a table that maps addresses to ports.

Figure 9: Bridge

A transparent bridge is a bridge in which the stations are completely unaware of the bridge's existence. If a bridge is added or deleted from the system, reconfiguration of the stations is unnecessary. A system equipped with transparent bridges must meet three criteria: 1. Frames must be forwarded from one station to another. 2. The forwarding table is automatically made by learning frame movements in the Network. 3. Loops in the system must be prevented. 3.8 OSI LAYERS: OSI stands for Open Systems Interconnection Reference Model. In short it is termed as OSI model or OSI reference model or 7-layer model or Layered Model or OSI seven layer models.

26

3.8.1 Functionality of Application Layer Application layer is the 7th layer of OSI model and sometimes referred as Layer Seven of OSI model. The functionality of application layer is described below: Network processes to applications. Provides network services to application processes, such as e-mail, file transfer & terminal emulation. 3.8.2 Functionality of Presentation Layer Presentation layer is the 6th layer of OSI model and sometimes referred as Layer Six of OSI model. The functionality of presentation layer is described below: Data representation and encryption Ensure data is readable by receiving system.

Format of data Data structures Negotiates data transfer syntax for application layer.

3.8.3 Functionality of Session Layer Session Layer is the 5th layer of OSI model and sometimes referred as Layer Five of OSI model. The functionality of session layer is described below:

Interhost communication Establish, manages & terminates session between appications.

3.8.4 Functionality of Transport Layer Transport Layer is the 4th layer of OSI model and sometimes referred as Layer Four of OSI model. The functionality of transport layer is described below:

End-to-end connections and reliability (TCP) Concerned with transportation issues between hosts. Data transport reliability. Establish, maintain, terminate virtual circuits. Fault detection & recovery information flow control.

Controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. 3.8.5 Functionality of Network Layer Network Layer is the 3rd layer of OSI model and sometimes referred as Layer Three of OSI model. The functionality of Network layer is described below:

Path determination and logical addressing (IP) Logical addressing


27

Best effort delivery

3.8.6 Functionality of Data link Layer Data link layer is the 2nd layer of OSI model and sometimes referred as Layer Two of OSI model. The functionality of Data link layer is described below:

Physical addressing (MAC & LLC) Provides reliable transfer of data across media

Physical addressing, network topology, line descipline, error notification, ordered delivery to frames, flow control 3.8.7 Functionality of Physical Layer Physical Layer is the 1st layer of OSI model and sometimes referred as Layer One of OSI model. The functionality of physical layer is described below:

Media, signal and binary transmission

4 Conclusion
During the Industrial Training period , I learnt how a company functions as a whole , Role of various employees specially in the IT sector and their necessity in the smoothe functioning of the company. Meanwhile , I learnt abt how the networking system of a company works and the various networking devices used, got a good understanding of networking terms, their applications and day to day usage. Thus , the training was very helpul and helped me understand networking concepts, devices such as routers , switches , different technologies used and how network management is done in the company.

28

You might also like