Sie sind auf Seite 1von 54

A PROJECT REPORT

ON

SecLAN with special Reference to VoIP

TOPIC:

Study of Network Architecture and Service Level


of Secretariat Local Area Network with special
reference to VoIP.

INSTRUCTOR: SUBMITTED BY:


Mr. Vinay Kumar Aditi (14-CS-05)
(Project Leader) Khushboo Kumari (14-CS-04)
Happy Kumari (14-CS-55)
Sapna Kumari (14-CS-36)

In partial fulfilment for the award of the degree of

B.TECH DEGREE
COMPUTER SCIENCE & ENGINEERING
NALANDA COLLEGE OF ENGINEERING , CHANDI
(NALANDA)

ARYABHATTA KNOWLEDGE UNIVERSITY ,PATNA


Department of Computer Science & Engineering

NALANDA COLLEGE OF ENGINEERING CHANDI


2017

© NALANDA COLLEGE OF ENGINEERING CHANDI , 2017


ALL RIGHTS RESERVED
CERTIFICATE

It is certified that the work contained in this report entitled ‘secLAN


with special refrence to VoIP’ submitted by GROUP 4, for the award of
B.tech is absolutely based on work done by them carried out under our
supervision and that this work/report has not been submitted
elsewhere for any degree/diploma.

Signature of instructor

Name of instructor: Mr. Vinay Kumar


Manager (P.M.U)

Date:

Signature of HoD

Department of Computer Science & Engineering


NCE Chandi

Date:
DECLARATION

Report Title: SecLAN with special reference to VoIP

Degree for which the Report is submitted: Bachelor of Technology

I declare that the presented report represents largely my own ideas


and work in my own words.Where others ideas or word have been
included, I have adequately cited and listed in the reference
materials. The report has been prepared without resorting to
plagiarism. I have adhered to all principles of academic honesty
and integrity. No falsified or fabricated data have been presented
in the report. I understand that any violation of the above will cause
for disciplinary action by the Institute, including revoking the
conferred degree, if conferred, and can also evoke penal action
from the sources which have not been properly cited or from
whom proper permission has not been taken.

(Signature)

Aditi (14-CS-05) ……………………………………………

Khushboo Kumari (14-CS-04) .…………………………………………..

Happy Kumari (14-cs-55) ...………………………………………...

Sapna Kumari (14-cs-36) ..………………………………………….

Date: …………………………………….
ACKNOWLEDGEMENT

The above project has been a great working experience for me. I
learnt about the various aspects of e-governance of Bihar. Topic of
project “Secretariat Local Area Network With special reference
to VoIP” helped me to know the steps involved by the Government
of Bihar (GoB) in providing technologically updated facilities and
render a wider range of services to the Citizens of Bihar.
The SecLAN project has setup Local Area network for all its Government
offices in and around Secretariat and for providing the connectivity to
State Data Centre at Technology Bhawan. The SecLAN is being utilizing
for accessing all intranet applications that are being developed for
computerizing the operations of various departments of Government of
Bihar (GoB) in order to render a wider range of services to the Citizens
of Bihar.

I am grateful to Mr. Anil kumar for providing us with such a wonderful


topic to work on.

I am also grateful to Mr. Vinay Kumar for helping me in understanding


this project.

I am also thankful to all the employees of ‘Bihar State Electronic


Development Corporation Ltd’ without whose support in providing the
necessary materials this project report would not have been possible.

At last i am thankful to our Training and Placement Cell Mr. Neeraj


Kumar who gave me the opportunity to pursue summer internship at
‘Bihar State Electronic Development Corporation Ltd.’
CONTENT:
Sec-LAN
1. Introduction

2. Objective

3. Key Challenges

4. Scope of work

5. Solution offered

6. Name of Govt. Buildings

7. Logical Structure of SecLAN Network

8. Fiber Route Diagram among Government Buildings

9. Semantic network layout of fiber for Bihar SecLAN

10. Description of products integrated in project

i) Active switches:
a. Layer 2 switches
b. Layer 3 switches

ii) Category 6 cable

iii) UTP cabling system


a. UTP cable
b. UTP jack
c. UTP jack panel
d. Faceplate
e. Workstation/Equipment cord

iv) Fiber Optic Cabling System


a. Fiber optic cable
b. Fiber optic connector
c. Fiber optic patch panel
d. Fiber optic patch cord

11. SecLAN ARCHITECTURE


a. Protocol Architecture
b. Sec-LAN Topology
- Star Topology

11. IP Phones
a. How VoIP Works

b. VoIP: Packet Switching

c. Soft Switches and Protocols

d. Power over Ethernet (PoE)

e. Advantages of Using VoIP

f. Disadvantages of Using VoIP

g. Nortel IP Phone 1120E

i) Key features and benefits

ii) Telephone controls

h. Nortel IP Phone 1140E


i) Basic features
ii) Telephone display

12. DATA CENTER IN BIHAR: DESCRIPTION


a. Introduction
b. Design Considerations
c. Environmental Control
d. Fire Protection
e. Security
f. Energy Efficiency
g. Applications

13. CONCLUSION
Introduction:
In the direction of e-governance for use of IT to providing information speedily to
all citizens by Improving Public services & improving administrative efficiency,
Government of Bihar has adopted to rollout the major Information Technology
Infrastructure project namely State Wide Area Network for providing last mile
connectivity up to the Block level, State Data Center for hosting the applications
and for storing data and Secretariat Local Area Network for interconnecting
important Government offices to each other for sharing messages, data,
information etc. in general administration.
Nine imperative Government buildings our identified by Bihar Government and
each department in the above buildings has been provided with Data Port, IP
Telephony Port, digital generator and UPS power points. The SecLAN project has
setup Local Area network for all its Government offices in and around Secretariat
and for providing the connectivity to State Data Centre at Technology Bhawan.
The SecLAN is being utilizing for accessing all intranet applications that are being
developed for computerizing the operations of various departments of
Government of Bihar (GoB) in order to render a wider range of services to the
Citizens of Bihar.
Bihar State Electronics Development Corporation Limited (BELTRON) is a Govt. of
Bihar undertaking, primarily responsible for growth and development of
electronics and information technology industries within Bihar. BSEDC also
provides information and expert services to government departments and public
in general in all domains of electronics and IT.

Objective:
Bihar Government is contemplating uninterrupted access to the authorized
users for information access, infrastructure resources and departmental
applications, by establishing Secretariat Local Area Network (SecLAN). SecLAN is
intended to help position information and communication technology to drive
improved efficiency and responsiveness in day to day administration of the
Government.
For creating a single, converged network that could provide voice, data and
communications for Government Officers and employees engaged with Bihar

Government, A scheme was envisioned by IT department which is known as


Secretariat Local Area Network (SecLAN).
• Providing a reliable, integrated and robust telecommunications infrastructure
catering to high speed, high capacity and secured delivery of voice, and data
transmissions.

• Improving the service delivery and response time to the employees of Bihar
State Secretariat enabling quick access to information and data.

• Streamlining the information flow within the Secretariat Campus.

• Leveraging IT for greater transparency, accountability and easier access to


information among various departments and agencies.

Key challenges:
• BELTRON required an integrated telecommunications infrastructure catering to
high speed, high capacity and secured delivery of voice and data transmissions.

• Setup and manage a Local Area Network for all government offices in and
around secretariat (SecLAN) and connect to State Data Centre at Technology
Bhawan.

• SecLAN was to be used to access all intranet applications being developed for
computerizing operations of various departments of the Government of Bihar to
render a wide range of services to citizens of Bihar.
• Improving service delivery and response time to employees of Bihar State
Secretariat.

•Streamlining information flow within the Secretariat, greater transparency,


accountability and easier access to information across various departments and
agencies.

Scope of work:
The Scope of work involves planning, design & deployment of network
components, IP Telephony, Installation of necessary UPS systems at all the
proposed buildings, Installation of Generators to support UPS with proper rating
and fuel @ 400 hours per annum, Fibre optic cable laying from Technology
Bhawan to all the 6 buildings and Passive Cabling at all the 7 locations.
Electrical wiring is also part of the scope of work for all the 2000 + Data Points
with 3 sockets of 5/15A from UPS with standard ISI mark 3/20 wire.

Solution offered:
SecLAN has been implemented at many important places including the Old
Secretariat, Technology Bhawan, CM's Residence, and BPSC. The network has now
facilitated the government to provide IP telephony solution to its various officers
as well as provide a Video Conferencing solution to its heads of various units and
senior government officials.

Each department is provided with Data Port, IP Telephone Port, EPABX Port and
UPS Ports. The scope also covered supply and installation of UPS, Generators
and passive components. Spanco will support the SecLAN for five years.
Products/Services integrated in the project include:

 Active Switches - L3 and L2 managed switches.

 Passive - UTP Cat 6e, OFC 6 Core SM


 DG Sets

 UPS

 Nortel EMS for monitoring network

 IP Phones

 Manpower - engineers, DG operators, Helpdesk coordinators

Name of govt. Buildings:

S.No Building Name

1. Old Secretariat
2. Vikas Bhawan
3. C.M. Secretariat
4. Technology
Bhawan
5. Vishveshwaraiya
Bhawan
6. Sinchai Bhawan
7. Soochna Bhawan
8. Beltron Bhawan
9. Lalit Bhawan
10. C M Residence
Fiber Route Diagram among Government Buildings
Logical Structure of SecLAN Network
All the buildings have building switches. These are connected to other with
optical fiber cables. Each building is connected with two fibers, one providing
alternative path in case of failure. The network is in star topology.

Vish. Bhawan VIKAS bhawan Sinchai bhawan Old secretariat


Floor switches floor switch floor switches floor switches

Schematic Diagram of SecLAN


Semantic network layout of fiber for Bihar SecLAN

Description of Products Integrated in Project

Active switches:

Layer 2 Switches

Layer 2 switching is hardware based, which means it uses the media access control
address (MAC address) from the host's network interface cards (NICs) to decide
where to forward frames. Switches use application-specific integrated circuits
(ASICs) to build and maintain filter tables (also known as MAC address tables). One
way to think of a layer 2 switch is as a multiport bridge.
Layer 2 switching provides the following
• Hardware-based bridging (MAC)

• Wire speed
• High speed

• Low latency

• Low cost

Layer 2 switching is highly efficient because there is no modification to the data


packet, only to the frame encapsulation of the packet, and only when the data
packet is passing through dissimilar media (such as from Ethernet to FDDI). Layer 2
switching is used for workgroup connectivity and network segmentation (breaking
up collision domains). This allows a flatter network design with more network
segments than traditional 10BaseT shared networks. Layer 2 switching has helped
develop new components in the network infrastructure

• Server farms — Servers are no longer distributed to physical locations because


virtual LANs can be created to create broadcast domains in a switched
internetwork. This means that all servers can be placed in a central location, yet a
certain server can still be part of a workgroup in a remote branch, for example.

• Intranets
— Allows organization-wide client/server communications based on a
Web technology.

Figure: Layer 2 switch with External Router for Inter-VLAN traffic


Layer 3 Switches
The only difference between a layer 3 switch and router is the way the
administrator creates the physical implementation. Also, traditional routers use
microprocessors to make forwarding decisions, and the switch performs only
hardware-based packet switching. However, some traditional routers can have
other hardware functions as well in some of the higher-end models. Layer 3
switches can be placed anywhere in the network because they handle high-
performance LAN traffic and can cost-effectively replace routers. Layer 3 switching
is all hardware-based packet forwarding, and all packet forwarding is handled by
hardware ASICs. Layer 3 switches really are no different functionally than a
traditional router and perform the same functions, which are listed here

• Determine paths based on logical addressing

• Run layer 3 checksums (on header only)

• Use Time to Live (TTL)

• Process and respond to any option information

•Update Simple Network Management Protocol (SNMP) managers with


Management Information Base (MIB) information

• Provide Security

The benefits of layer 3 switching include the following

• Hardware-based packet forwarding

• High-performance packet switching

• High-speed scalability

• Low latency

• Lower per-port cost

• Flow accounting

• Security
• Quality of service (QoS)
Category 6 Cable
Category 6 cable, commonly referred to as Cat-6, is a cable standard for Gigabit
Ethernet and other network protocols that are backward compatible with the

Category 5/5e and Category 3 cable standards. Compared with Cat-5 and Cat-5e,
Cat-6 features more stringent specifications for crosstalk and system noise. The
cable standard provides performance of up to 250 MHz and is suitable for 10BASE-
T, 100BASE-TX (Fast Ethernet), 1000BASE-T / 1000BASE-TX (Gigabit Ethernet) and
10GBASE-T (10-Gigabit Ethernet). Category 6 cable has a reduced maximum length
when used for 10GBASE-T; Category 6a cable, or Augmented Category 6, is
characterized to 500 MHz and has improved alien crosstalk characteristics,
allowing 10GBASE-T to be run for the same distance as previous protocols.
 DG sets and UPS are used for power backup.

 Nortel EMS for monitoring network

UTP cabling system

Cabling system and UTP specifications are as follows:

UTP cable
UTP
Jack

UTP Jack Panel

Faceplate
Workstation/Equipment Cords

Fiber Optic Cabling System:


Fiber Optic Cable
Fiber optic connector

Fiber optic patch panel

Fiber optic patch cord


RJ45 connectors
RJ45 is a type of registered jack. Here 45 stands for 4 pair and category 5. As a
registered jack, telephone RJ45 specifies the physical male and female connectors
as well as the pin assignments of the wires in a telephone cable. The original RJ45
uses a special keyed 8P2C modular connector, with Pins 5 and 4 wired for tip and
ring of a single telephone line and Pins 7 and 8 connected to a programming
resistor. It is used with a high speed modem.
Before the name RJ45 was used to refer to computer networking connectors, RJ45
was originally a Telephone-only standard. Telephone installers who wired
telephone RJ45 jacks were familiar with the pin assignment which was part of the

RJ45 standard. However, near-identical physical connectors for computer


networking became ubiquitous, and informally inherited the name RJ45 due to
the overwhelming similarity.

DG set:
The operation of the network may be interrupted due to power failure. Hence for
uninterrupted operation of the network a DG set (Diesel Generator set) is used.

DG set as a system
A diesel generating set should be considered as a system since its successful
operation depends
on the well-matched performance of the components, namely:
a) The diesel engine and its accessories.
b) The AC Generator.
c) The control systems and switchgear.
d) The foundation and power house civil works.
e) The connected load with its own components like heating, motor drives,
lighting etc.
It is necessary to select the components with highest efficiency and operate them
at their optimum efficiency levels to conserve energy in this system.
Sec-LAN architecture:
The architecture of a LAN is best described in terms of a layering of protocols that
organise the basic functions of a LAN. This section opens with a description of the
standardized protocol architecture for LANs, which encompasses physical,
medium access control, and logical link control layers. Each of these layers is then
examined in turn.

Protocol Architecture
Protocols defined specifically for LAN and MAN transmission address issues
relating to the transmission of blocks of data over the network. In OSI terms,
higher layer protocols (layer 3 or 4 and above) are independent of network
architecture and are applicable to LANs, MANs, and WANs. Thus, a discussion of
LAN protocols is concerned principally with lower layers of the OSI model.

Following figure relates the LAN protocols to the OSI architecture-

FIGURE: IEEE 802 protocol layers compared to OSI model.


Sec-LAN Topology
The basic topology of the Sec-LAN architecture is the ‘STAR TOPOLOGY’.

Star Topology
In the star LAN topology, each station is directly connected to a common central
node. Typically, each station attaches to a central node, referred to as the star
coupler, via two point-to-point links, one for transmission and one for reception.
In general, there are two alternatives for the operation of the central node.
One approach is for the central node to operate in a broadcast fashion. A
transmission of a frame from one station to the node is retransmitted on all of the
outgoing links. In this case, although the arrangement is physically a star, it is
logically a bus; a transmission from any station is received by all other stations,
and only one station at a time may successfully transmit.
Another approach is for the central node to act as a frame switching device.
An incoming frame is buffered in the node and then retransmitted on an outgoing
link to the destination station.

Fig: Systems Connected in Star Topology


IP PHONES:
An IP phone uses Voice over IP(VoIP) technologies allowing telephone calls to be
made over an IP network such as the internet instead of the ordinary PSTN system.
Calls can traverse the Internet, or a private IP Network such as that of a company.
The phones use control protocols such as Session Initiation Protocol, Skinny Client
Control Protocol or one of various proprietary protocols such as that used by
Skype. IP phones can be simple software-based Softphones or purpose-built
hardware devices that appear much like an ordinary telephone or a cordless
phone. Ordinary PSTN phones are used as IP phones with analog telephony
adapters (ATA).It may have many features an analog phone doesn't support, such
as e-mail-like IDs for contacts that may be easier to remember than names or
phone numbers.

VoIP Phones
How VoIP Works
VoIP, or Voice over Internet Protocol, is a method for taking analog audio signals,
like the kind you hear when you talk on the phone, and turning them into digital
data that can be transmitted over the Internet.
VoIP can turn a standard Internet connection into a way to place free phone calls.
The practical upshot of this is that by using some of the free VoIP software that is
available to make Internet phone calls, one can bypass the phone company (and
its charges) entirely.
VoIP is a revolutionary technology that has the potential to completely rework the
world's phone systems. VoIP providers like Vonage have already been around for a
while and are growing steadily. Major carriers like AT&T are already setting up
VoIP calling plans in several markets around the United States, and the FCC is
looking seriously at the potential ramifications of VoIP service.
Above all else, VoIP is basically a clever "reinvention of the wheel." In this article,
we'll explore the principles behind VoIP, its applications and the potential of this
emerging technology, which will more than likely one day replace the traditional
phone system entirely.
The interesting thing about VoIP is that there is not just one way to place a call.
There are three different "flavors" of VoIP service in common use today:

• ATA -- The simplest and most common way is through the use of a device called
an ATA (analog telephone adaptor). The ATA allows you to connect a standard
phone to our computer or our Internet connection for use with VoIP. The ATA is an
analog-to-digital converter. It takes the analog signal from our traditional phone
and converts it into digital data for transmission over the Internet. Providers like
Vonage and AT&T CallVantage are bundling ATAs free with their service. We simply
crack the ATA out of the box, plug the cable from our phone that would normally
go in the wall socket into the ATA, and we are ready to make VoIP calls. Some ATAs
may ship with additional software that is loaded onto the host computer to
configure it; but in any case, it's a very straightforward setup.

• IP Phones -- These specialized phones look just like normal phones with a
handset, cradle and buttons. But instead of having the standard RJ-11 phone
connectors, IP phones have an RJ-45 Ethernet connector. IP phones connect
directly to our router and have all the hardware and software necessary right
onboard to handle the IP call. Wi-Fi phones allow subscribing callers to make VoIP
calls from any Wi-Fi hot spot.
• Computer-to-computer -- This is certainly the easiest way to use VoIP. We
don't even have to pay for long-distance calls. There are several companies
offering free or very low-cost software that we can use for this type of VoIP. All we
need is the software, a microphone, speakers, a sound card and an Internet
connection, preferably a fast one like we would get through a cable or DSL modem.
Except for our normal monthly ISP fee, there is usually no charge for computer-to-
computer calls, no matter the distance.

VoIP: Packet Switching


A packet-switched phone network is the alternative to circuit switching. It works
like this: While we're talking, the other party is listening, which means that only
half of the connection is in use at any given time. Based on that, we can surmise
that we could cut the file in half, down to about 4.7 MB, for efficiency. Plus, a
significant amount of the time in most conversations is dead air -- for seconds at a
time, neither party is talking. If we could remove these silent intervals, the file
would be even smaller. Then, instead of sending a continuous stream of bytes
(both silent and noisy), what if we sent just the packets of noisy bytes when we
created them?
Data networks do not use circuit switching. Our Internet connection would be a
lot slower if it maintained a constant connection to the Web page we our viewing
at any given time. Instead, data networks simply send and retrieve data as we
need it. And, instead of routing the data over a dedicated line, the data packets
flow through a chaotic network along thousands of possible paths. This is called
packet switching.
While circuit switching keeps the connection open and constant, packet switching
opens a brief connection -- just long enough to send a small chunk of data, called
a packet, from one system to another. It works like this:

• The sending computer chops data into small packets, with an address on each
one telling the network devices where to send them.

• Inside of each packet is a payload. The payload is a piece of the e-mail, a music
file or whatever type of file is being transmitted inside the packet.
• Thesending computer sends the packet to a nearby router and forgets about it.
The nearby router send the packet to another router that is closer to the recipient
computer. That router sends the packet along to another, even closer router, and
so on.

• When the receiving computer finally gets the packets (which may have all taken
completely different paths to get there), it uses instructions contained within the
packets to reassemble the data into its original state.

Packet switching is very efficient. It lets the network route the packets along the
least congested and cheapest lines. It also frees up the two computers
communicating with each other so that they can accept information from other
computers, as well.

Soft Switches and Protocols


The soft switch contains a database of users and phone numbers. If it doesn't have
the information it needs, it hands off the request downstream to other soft
switches until it finds one that can answer the request. Once it finds the user, it
locates the current IP address of the device associated with that user in a similar
series of requests. It sends back all the relevant information to the softphone or IP
phone, allowing the exchange of data between the two endpoints.
Soft switches work in tandem with network devices to make VoIP possible. For all
these devices to work together, they must communicate in the same way. This
communication is one of the most important aspects that will have to be refined
for VoIP to take off.
Protocols
As we've seen, on each end of a VoIP call we can have any combination of an
analog, soft or IP phone as acting as a user interface, ATAs or client software
working with a codec to handle the digital-to-analog conversion, and soft switches
mapping the calls. How do we get all of these completely different pieces of
hardware and software to communicate efficiently to pull all of this off? The
answer is protocols.
There are several protocols currently used for VoIP. These protocols define ways in
which devices like codecs connect to each other and to the network using VoIP.
They also include specifications for audio codecs. The most widely used protocol is
H.323, a standard created by the International Telecommunication Union (ITU).
H.323 is a comprehensive and very complex protocol that was originally designed
for video conferencing. It provides specifications for real-time, interactive
videoconferencing, data sharing and audio applications such as VoIP. Actually a
suite of protocols, H.323 incorporates many individual protocols that have been
developed for specific applications.

An alternative to H.323 emerged with the development of Session Initiation


Protocol (SIP). SIP is a more streamlined protocol, developed specifically for VoIP
applications. Smaller and more efficient than H.323, SIP takes advantage of
existing protocols to handle certain parts of the process. Media Gateway Control
Protocol (MGCP) is a third commonly used VoIP protocol that focuses on endpoint
control. MGCP is geared toward features like call waiting.

Power over Ethernet (PoE):


IP Phones work on power over ethernet i.e. we do need an extra cord for power
supply in IP phones.

Advantages of PoE-

 A single cable between switch and powered device.

 No separate power installation/connection needed for PD’s.

 Simplified installation and space saving.

 Device placement is not limited to nearby power sources.

 PD’s can be easily moved to wherever there is LAN cabling.

 Safety- no mains voltage anywhere.


 A UPS can guarantee power to devices even during mains failure.

 Devices can be shut down or reset remotely.

 Little configuration and management required.

Advantages of Using VoIP


VoIP technology uses the Internet's packet-switching capabilities to provide phone
service. VoIP has several advantages over circuit switching. For example, packet
switching allows several telephone calls to occupy the amount of space occupied
by only one in a circuit-switched network. Using PSTN, that 10-minute phone call
we talked about earlier consumed 10 full minutes of transmission time at a cost of
128 Kbps. With VoIP, that same call may have occupied only 3.5 minutes of
transmission time at a cost of 64 Kbps, leaving another 64 Kbps free for that 3.5
minutes, plus an additional 128 Kbps for the remaining 6.5 minutes. Based on this
simple estimate, another three or four calls could easily fit into the space used by
a single call under the conventional system. And this example doesn't even factor
in the use of data compression, which further reduces the size of each call.
Let's say that we and our friend both have service through a VoIP provider. We
both have our analog phones hooked up to the service-provided ATAs. Let's take
another look at that typical telephone call, but this time using VoIP over a packet-
switched network:

1. We pick up the receiver, which sends a signal to the ATA.

2. The ATA receives the signal and sends a dial tone. This lets we know that we
have a connection to the Internet.

3. We dial the phone number of the party we wish to talk to. The tones are
converted by the ATA into digital data and temporarily stored.

4. The phone number data is sent in the form of a request to our VoIP company's
call processor. The call processor checks it to ensure that it's in a valid format.
5. The call processor determines to whom to map the phone number. In mapping,
the phone number is translated to an IP address (more on this later). The soft
switch connects the two devices on either end of the call. On the other end, a
signal is sent to our friend's ATA, telling it to ask the connected phone to ring.

6. Once our friend picks up the phone, a session is established between our
computer and our friend's computer. This means that each system knows to
expect packets of data from the other system. In the middle, the normal Internet
infrastructure handles the call as if it our e-mail or a Web page. Each system must
use the same protocol to communicate. The systems implement two channels,
one for each direction, as part of the session.

7. We talk for a period of time. During the conversation, our system and our
friend's system transmit packets back and forth when there is data to be sent. The
ATAs at each end translate these packets as they are received and convert them to
the analog audio signal that we hear. Our ATA also keeps the circuit open between
itself and our analog phone while it forwards packets to and from the IP host at
the other end.

8. We finish talking and hang up the receiver.

9. When we hang up, the circuit is closed between our phone and the ATA.

10. The ATA sends a signal to the soft switch connecting the call, terminating the
session.
Probably one of the most compelling advantages of packet switching is that data
networks already understand the technology. By migrating to this technology,
telephone networks immediately gain the ability to communicate the way
computers do. It will still be at least a decade before communications companies
can make the full switch over to VoIP. As with all emerging technologies, there are
certain hurdles that have to be overcome.

Disadvantages of Using VoIP


The current Public Switched Telephone Network is a robust and fairly bulletproof
system for delivering phone calls. Phones just work, and we've all come to depend
on that. On the other hand, computers, e-mail and other related devices are still
kind of flaky. Let's face it -- few people really panic when their e-mail goes down
for 30 minutes. It's expected from time to time. On the other hand, a half hour of
no dial tone can easily send people into a panic. So what the PSTN may lack in
efficiency it more than makes up for in reliability. But the network that makes up
the Internet is far more complex and therefore functions within a far greater
margin of error. What this all adds up to is one of the major flaws in VoIP:
reliability.
•First of all, VoIP is dependent on wall power. Our current phone runs on
phantom power that is provided over the line from the central office. Even if our
power goes out, our phone (unless it is a cordless) still works. With VoIP, no power
means no phone. A stable power source must be created for VoIP.

• Another consideration is that many other systems in our home may be


integrated into the phone line. Digital video recorders, digital subscription TV
services and home security systems all use a standard phone line to do their thing.
There's currently no way to integrate these products with VoIP. The related
industries are going to have to get together to make this work.

• Emergency 911 calls also become a challenge with VoIP. As stated before, VoIP
uses IP-addressed phone numbers, not NANP phone numbers. There's no way to
associate a geographic location with an IP address. So if the caller can't tell the
911 operator where he is located, then there's no way to know which call center
to route the emergency call to and which EMS should respond. To fix this, perhaps
geographical information could somehow be integrated into the packets.

•Because VoIP uses an Internet connection, it's susceptible to all the hiccups
normally associated with home broadband services. All of these factors affect call
quality

Nortel Passport 8010


The Nortel Passport 8010 supports eight queues. Queues are serviced using
guaranteed Weighted Round Robin. The highest priority queue is reserved for
network control and cannot be used for applications.
Nortel BPS 2000 and Passport 8010 allow users to change 802.1p/Q priority to
queue mapping. By default, all the ports on Nortel Passport 8010 are configured
to be “core” ports and trustingress 802.1p/Q priority. Therefore, there is no
configuration needed on the Nortel Passport8010 to support QoS.
Nortel IP Phone 1120E
Nortel IP Phone 1120E with Gigabit Ethernet unveils an exciting array of
innovative communication features and capabilities with the intermediate-level
desktop IP Phone. Ideally suited for office workers and administrative personnel,
the four-line Nortel IP Phone 1120E supports standards- based Session Initiation
Protocol (SIP), delivering choice to customers in deployment options with support
on either Nortel or third-party Communication Servers. The IP Phone 1120E also
enables the presentation of converged voice and data applications, leveraging its
integrated high-resolution graphical, eight-level gray scale display. Navigation
of applications is very flexible, with support of standard USB mice and keyboards
powered from the phone’s integrated USB port. With robust and tightly linked
communications features from Nortel Communication Servers, the Nortel IP
Phone 1120E positions customers to meet both today’s and tomorrow’s
communications needs.
The Nortel IP Phone 1120E brings voice and data to the desktop by connecting
directly to a Local Area Network (LAN) through an Ethernet connection.
Here self-labelled line/programmable feature key labels appear beside the keys,
and context-sensitive soft key labels appear directly above the keys. Figure 1
shows the key labels.

Figure: Self- labelled feature keys and context-sensitive soft keys


Key features and benefits include:
>Multi-line IP Phone supports four line/programmable feature keys, 14 fixed keys,
four context-sensitive soft-label keys, six specialized feature keys and six call-
processing fixed keys:

. Six specialized feature keys:


— Quit
— Directory
— Message/Inbox
— Shift/Outbox
— Services
— Copy

• Six call-processing fixed keys:


— Mute
— Hands free
— Goodbye
— Expand
— Headset
— Hold

>High-resolution, backlit, graphical, eight-level gray scale, pixel-based display,


combined with a flexible five position adjustable foot stand placement, Gigabit
Ethernet ports, USB port to support a keyboard or mouse, optimizes viewing in
varied lighting conditions .

>Advanced collaborative communications support with graphical presence


notification and secure instant messaging (SIP firmware only)
Four-way navigation cluster with “Enter” key maximizes user choice and flexibility
in navigation
>Integrated USB port powers standard USB mice and keyboards, providing input
and navigation options for application interaction and simpler menu selection

>Integrated 10/100/1000 Base-T Ethernet switch with LAN and PC ports reduces
costs, enabling a single cable drop to support both the phone and a collocated PC
>Supports Gigabit Ethernet, positioning the phone’s internal switch to
accommodate growing multimedia intensive, PC-based applications, thus aligning
with investment made at the wiring closet

>802.3af standard-based PoE and local AC power via power adapter

>Secured communications with standards- based signalling encryption, media


encryption and user-based authentication for network access control

>Supports Unicode expanded language and complex font presentation on the IP


Phone display2

>Supports Proactive Voice Quality Management (PVQM) for enhanced


administration and diagnostics3

>Lockable Tools Menu offers local access to configuration, diagnostic and user
preference options

>Supports converged (voice and data) applications via the Nortel Application
Gateway 1000/2000, enriching users’ experience with advanced multimedia
interaction

>Supports both Nortel Communication Server protocol (UNIStim) and RFC 3261
compliant Session Initiation Protocol (SIP) firmware for business telephony
feature integration4

>Added convenience and time savings with field upgradeable firmware using
Trivial File Transfer Protocol (TFTP) or for sites requiring enhanced secure
firmware upgrades: UNIStim File Transfer Protocol (UFTP)5
Figure : IP Phone 1120E

Telephone display
IP Phone 1120E has three display areas:

• The upper display area provides labels for the four self-labelled line/
programmable feature key labels.

• The middle display area contains single-line information for items


such as caller number, caller name, Call Timer, feature prompt string,
user- entered digits, date and time information, and phone information.

• The lower display area provides labels for the four context-sensitive
soft keys.
Nortel IP Phone 1140E:
Nortel IP Phone 1140E brings voice and data to the desktop by
connecting directly to a Local Area Network (LAN) through an Ethernet
connection.
In this phone, self-labelled line/programmable feature key labels appear
beside the keys, and context-sensitive soft key labels appear directly
above the keys. Figure 1 shows self-labelled line/programmable feature
keys and context-sensitive soft keys.

Figure: Self-labelled line/programmable feature keys and


context-sensitive soft keys
Basic features
IP Phone 1140E supports the following features:

• six self-labeled line/programmable feature keys with labels and


indicators

• four context-sensitive soft keys

• graphical, high-resolution LCD display, backlit, with adjustable


contrast

• high-quality speaker phone

• volume control keys for adjusting ringer, speaker, handset, and


headset volume

• six specialized feature keys:


— Quit
— Directory
— Message/Inbox
— Shift/Outbox
— Services
— Copy

• six call-processing fixed keys:


— Mute
— Handsfree
— Goodbye
— Expand
— Headset
— Hold

• gigabit Ethernet ports

• built-in gigabit Ethernet switch for shared PC access

• headset jack with an On/Off key


• USB port to support a keyboard or mouse. Powered downstream 1.1-
compliant USB hubs are supported, including USB 2.0 hubs, if they
offer USB 1.1 backwards compliancy.

• automatic network configuration

• Graphical XAS

• hearing aid compatibility


About the Nortel IP Phone 1140E
• Wireless headset support using a Bluetooth® 1.2
wireless technology compliant Audio Gateway
(Headset Profile, Bluetooth Power Class 2).

• Accessory Expansion Module port to connect the Expansion Module


for IP Phone 1100 Series (Expansion Module)

Figure: IP Phone 1140E


Telephone display
IP Phone 1140E has three display areas:

• The upper display area provides labels for the six self-labeled line/
programmable feature key labels.

• The middle display area contains single-line information for items


such as caller number, caller name, Call Timer, feature prompt
strings, user-entered digits, date and time information, and IP Phone
information.

• The lower display area provides labels for the four context-sensitive
soft keys.
DATA CENTRE IN BIHAR
A data center (or data centre or datacentre or datacenter) is a facility
used to house computer systems and associated components, such as
telecommunications and storage systems. It generally includes
redundant or backup power supplies, redundant data communications
connections, environmental controls (e.g., air conditioning, fire
suppression) and security devices.

IT operations are a crucial aspect of most organizational operations.


One of the main concerns is business continuity; companies rely on
their information systems to run their operations. If a system becomes
unavailable, company operations may be impaired or stopped
completely. It is necessary to provide a reliable infrastructure for IT
operations, in order to minimize any chance of disruption. Information
security is also a concern, and for this reason a data center has to offer
a secure environment which minimizes the chances of a security breach.
A data center must therefore keep high standards for assuring the
integrity and functionality of its hosted computer environment. This is
accomplished through redundancy of both fiber optic cables and power,
which includes emergency backup power generation.

They may be applied to data center spaces housing data processing or


Information Technology (IT) equipment. The equipment may be used to:

• Operate and manage a carrier’s telecommunication network


• Provide data center based applications directly to the carrier’s
customers
• Provide hosted applications for a third party to provide services to
their customers
• Provide a combination of these and similar data center
applications.
Effective data center operation requires a balanced investment in both
the facility and the housed equipment. The first step is to establish a
baseline facility environment suitable for equipment installation.
Standardization and modularity can yield savings and efficiencies in the
design and construction of telecommunications data centers.
Standardization means integrated building and equipment engineering.
Modularity has the benefits of scalability and easier growth, even when
planning forecasts are less than optimal. For these reasons,
telecommunications data centers should be planned in repetitive
building blocks of equipment, and associated power and support
(conditioning) equipment when practical. The use of dedicated
centralized systems requires more accurate forecasts of future needs to
prevent expensive over construction, or perhaps worse — under
construction that fails to meet future needs.

Bihar Revenue Administration Intra Net (BRAIN):

BRAIN (Bihar Revenue Administration Intra Net) is a state of the art data
centre established at Technology Bhawan Patna. The aim of this project
is to provide a centralized secured data warehouse enabling the
Government of Bihar to store, share and retrieve information pertaining
to the Finance and Revenue Dept on a real time basis. The Project is
funded by Department of Revenue, Government of Bihar. The project
aims to create a World Class Tier II secured Data Centre in respect to
Ashrae Specifications. This setup has a built-up with the 3 tier
architecture and high scalability. Presently, the storage capacity of this
data centre is 20TB and it is expandable up-to 50TB. Security (both
perimeter and data) is maintained with latest state of the art Firewall,
VPN, Intrusion Prevention System (IPS) and Department wise VLAN
have been created for privacy of data security and ease of accessibility.
Fig: Data Center at Technology Bhawan , Patna

Design considerations
A data center can occupy one room of a building, one or more floors, or
an entire building. Most of the equipment is often in the form of servers
mounted in 19 inch rack cabinets, which are usually placed in single
rows forming corridors (so-called aisles) between them. This allows
people access to the front and rear of each cabinet. Servers differ
greatly in size from 1U servers to large freestanding storage silos which
occupy many tiles on the floor. Some equipment such as mainframe
computers and storage devices are often as big as the racks themselves,
and are placed alongside them. Very large data centers may use
shipping containers packed with 1,000 or more servers each;when
repairs or upgrades are needed, whole containers are replaced (rather
than repairing individual servers).Local building codes may govern the
minimum ceiling heights.
Fig: Schematic View of a Data Center

Environmental control
The physical environment of a data center is rigorously controlled. Air
conditioning is used to control the temperature and humidity in the
data center. ASHRAE's "Thermal Guidelines for Data Processing
Environments" recommends a temperature range of 16–24 °C (61–75 °F)
and humidity range of 40–55% with a maximum dew point of 15°C as
optimal for data center conditions. The temperature in a data center
will naturally rise because the electrical power used heats the air. Unless
the heat is removed, the ambient temperature will rise, resulting in
electronic equipment malfunction. By controlling the air temperature,
the server components at the board level are kept within the
manufacturer's specified temperature/humidity range. Air conditioning
systems help control humidity by cooling the return space air below the
dew point. Too much humidity, and water may begin to condense on
internal components. In case of a dry atmosphere, ancillary
humidification systems may add water vapour if the humidity is too low,
which can result in static discharge problems which may damage
components. Subterranean data centers may keep computer equipment
cool while expending less energy than conventional designs.
Modern data centers try to use economizer cooling, where they use
outside air to keep the data center cool. Washington State now has a
few data centers that cool all of the servers using outside air 11 months
out of the year. They do not use chillers/air conditioners, which creates
potential energy savings in the millions.

There are many types of commercially available floors that offer a wide
range of structural strength and loading capabilities, depending on
component construction and the materials used. The general types of
raised floors include stringerless, stringered, and structural platforms,
all of which are discussed in detail in GR-2930 and summarized below.
• Stringerless Raised Floors - One non-earthquake type of raised
floor generally consists of an array of pedestals that provide the
necessary height for routing cables and also serve to support each
corner of the floor panels. With this type of floor, there may or
may not be provisioning to mechanically fasten the floor panels to
the pedestals. This stringerless type of system (having no
mechanical attachments between the pedestal heads) provides
maximum accessibility to the space under the floor. However,
stringerless floors are significantly weaker than stringered raised
floors in supporting lateral loads and are not recommended.
• Stringered Raised Floors - This type of raised floor generally
consists of a vertical array of steel pedestal assemblies (each
assembly is made up of a steel base plate, tubular upright, and a
head) uniformly spaced on two-foot centers and mechanically
fastened to the concrete floor. The steel pedestal head has a stud
that is inserted into the pedestal upright and the overall height is
adjustable with a leveling nut on the welded stud of the pedestal
head.
• Structural Platforms - One type of structural platform consists of
members constructed of steel angles or channels that are welded
or bolted together to form an integrated platform for supporting
equipment. This design permits equipment to be fastened directly
to the platform without the need for toggle bars or supplemental
bracing. Structural platforms may or may not contain panels or
stringers.

Electrical power:
Backup power consists of one or more uninterruptible power supplies
and/or diesel generators.
To prevent single points of failure, all elements of the electrical systems,
including backup systems, are typically fully duplicated, and critical
servers are connected to both the "A-side" and "B-side" power feeds.
This arrangement is often made to achieve N+1 redundancy in the
systems. Static switches are sometimes used to ensure instantaneous
switchover from one supply to the other in the event of a power failure.
Data centers typically have raised flooring made up of 60 cm (2 ft)
removable square tiles. The trend is towards 80–100 cm (31–39 in) void
to cater for better and uniform air distribution. These provide a plenum
for air to circulate below the floor, as part of the air conditioning system,
as well as providing space for power cabling.
Low-voltage cable routing
Data cabling is typically routed through overhead cable trays in modern
data centers. But some are still recommending under raised floor
cabling for security reasons and to consider the addition of cooling
systems above the racks in case this enhancement is necessary.
Smaller/less expensive data centers without raised flooring may use
anti-static tiles for a flooring surface. Computer cabinets are often
organized into a hot aisle arrangement to maximize airflow efficiency.

Fire protection
Data centers feature fire protection systems, including passive and
active design elements, as well as implementation of fire prevention
programs in operations. Smoke detectors are usually installed to
provide early warning of a developing fire by detecting particles
generated by smoldering components prior to the development of
flame. This allows investigation, interruption of power, and manual fire
suppression using hand held fire extinguishers before the fire grows to a
large size. A fire sprinkler sytem is often provided to control a full scale
fire if it develops. Fire sprinklers require 18 in (46 cm) of clearance (free
of cable trays, etc.) below the sprinklers. Clean agent fire suppression
gaseous systems are sometimes installed to suppress a fire earlier than
the fire sprinkler system. Passive fire protection elements include the
installation of firewalls around the data center, so a fire can be
restricted to a portion of the facility for a limited time in the event of
the failure of the active fire protection systems, or if they are not
installed. For critical facilities these firewalls are often insufficient to
protect heat-sensitive electronic equipment, however, because
conventional firewall construction is only rated for flame penetration
time, not heat penetration. There are also deficiencies in the protection
of vulnerable entry points into the server room, such as cable
penetrations, coolant line penetrations and air ducts.

Security
Physical security also plays a large role with data centers. Physical
access to the site is usually restricted to selected personnel, with
controls including bollards and mantraps. Video camera surveillance
and permanent security guards are almost always present if the data
center is large or contains sensitive information on any of the systems
within. The use of finger print recognition man traps is starting to be
commonplace.

Energy use
Energy use is a central issue for data centers. Power draw for data
centers ranges from a few kW for a rack of servers in a closet to several
tens of MW for large facilities. Some facilities have power densities
more than 100 times that of a typical office building. For higher power
density facilities, electricity costs are a dominant operating expense and
account for over 10% of the total cost of ownership (TCO) of a data
center. By 2012 the cost of power for the data center is expected to
exceed the cost of the original capital investment.

Greenhouse gas emissions


In 2007 the entire information and communication technologies or ICT
sector was estimated to be responsible for roughly 2% of global carbon
emissions with data centers accounting for 14% of the ICT footprint.
Siting is one of the factors that affect the energy consumption and
environmental effects of a datacenter. In areas where climate favors
cooling and lots of renewable electricity is available the environmental
effects will be more moderate. Thus countries with favorable conditions,
such as Finland, Sweden and Switzerland, are trying to attract cloud
computing data centers.
Energy efficiency
The most commonly used metric to determine the energy efficiency of
a data center is power usage effectiveness, or PUE. This simple ratio is
the total power entering the data center divided by the power used by
the IT equipment.

Fig: Bank of Batteries to provide power in case of electrical cut-offs

Power used by support equipment, often referred to as overhead load,


mainly consists of cooling systems, power delivery, and other facility
infrastructure like lighting. The average data center in the US has a PUE
of 2.0, meaning that the facility uses one Watt of overhead power for
every Watt delivered to IT equipment. State-of-the-art data center
energy efficiency is estimated to be roughly 1.2. Some large data center
operators like Microsoft and Yahoo! have published projections of PUE
for facilities in development; Google publishes quarterly actual
efficiency performance from data centers in operation.
Applications

The main purpose of a data center is running the applications that


handle the core business and operational data of the organization. Such
systems may be proprietary and developed internally by the
organization, or bought from enterprise software vendors. Such
common applications are ERP and CRM systems.

A data center may be concerned with just operation architecture or it


may provide other services as well.
Often these applications will be composed of multiple hosts, each
running a single component. Common components of such applications
are databases, file servers, application servers, middleware, and various
others.

Fig: Multiple racks of servers, and how a data center commonly looks.
Data centers are also used for off site backups. Companies may
subscribe to backup services provided by a data center. This is often
used in conjunction with backup tapes. Backups can be taken of servers
locally on to tapes. However, tapes stored on site pose a security threat
and are also susceptible to fire and flooding. Larger companies may also
send their backups off site for added security. This can be done by
backing up to a data center. Encrypted backups can be sent over the
Internet to another data center where they can be stored securely.
For disaster recovery, several large hardware vendors have developed
mobile solutions that can be installed and made operational in very
short time.

 Data Center present at Technology Bhawan, Patna (Bihar), has


been set up with the view to accomplish following applications:
 Comprehensive Treasury Management Information System
(CTMIS) for Bihar Revenue Administration Intranet (BRAIN) that
will provide a long-term solution for carrying out treasury func-
tions of Government of Bihar (GoB) and provide consolidated
and consistent information about the expenditure and reve-
nues across all the treasuries in the state. The system is also de-
signed to include the non-treasury transactions of GoB to cover
its overall income and expenses. An integrated approach for
management of government income and expenses. It encom-
passes budgeting, allotment of budget to the administrative
departments and its DDOs, treasury transactions and budget
compliance / Income / Expense analysis.

 Value Added Tax Management Information System (VATMIS):


Government of Bihar has implemented Value Added Tax (VAT)
across Bihar with effect from April 1, 2005. Towards this, Fi-
nance (Commercial Taxes) Department, Government of Bihar
(referred to as Commercial Taxes Department / Department in
rest of the document) has improved the existing state of com-
puterization. This VATMIS application is delivering the following
objectives:
 Conversion to an online transaction processing system
from a batch data entry mode of operation.
 Improved and Increased Tax Revenue Base and Collec-
tions.
 Improved Services to Citizens by making services availa-
ble through internet.
 Transparency, Accountability and Efficiency.
 Improved Internal Functioning of Finance (Commercial
Taxes) Department.
 MIS and Reports for Efficient & Transparent Tax Admin-
istration.

 BiharOnline is the state government portal and proposed digi-


tal gateway to offer multiple services, through a single window,
to its citizens. Bihar Online is intended to offer a variety of in-
formative, interactive and payment services to the citizens and
businesses across the state. It will be easily accessible through
multiple delivery channels (SDPs, cyber cafes, government
counters), homes and offices, anytime, anywhere, to deliver
services at citizens' homes.

 Integrated Workflow and Document Management System


(IWDMS). This is for automating the functions at all levels of
the administrative hierarchy of any government department.
IWDMS provides Document Management, Workflow Manage-
ment, Collaborative Environment and Knowledge Management
in an integrated fashion and delivers an electronic workplace to
the end-user in the department.
Conclusion:
The electronic governance in the secretariat aims at IT driven system of
governance that works better, costs less and is capable of servicing the
decision making machinery and citigen’s needs in a better and efficient
way.

As we know, for this purpose secLAN has been set up that aims at
providing a reliable, integrated and robust telecommunications
infrastructure and improving the service delivery and response time to
the employees of Bihar State Secretariat enabling quick access to
information and data. It is used to extend the success of
computerization for Government of Bihar (GoB). Sec LAN is providing
the information and communication technology to drive improved
efficiency and responsiveness in day to day administration of the
Government.

The SecLAN is an edge to accommodate increased collaborative


applications. The SecLAN has connected from Technology Bhawan
where the State Data Center and State WAN is located, to all the nine
buildings (Old Secretariat, Vikas Bhawan, C.M. Secretariat, Technology
Bhawan, Vishveswarya Bhawan, Sinchai Bhawan, Sochana Bhawan,
Beltron Bhawan and Lalit Bhawan).

The present connectivity is limited to 9 buildings and Bihar government


will increase the number of locations in future. The present secLAN will
then be extended for the new offices. The department is planning to
open 4 new offices in coming financial year as a part of expansion plan.
The present secLAN will then be extended accordingly.

SecLAN is creating a single, converged network that provides voice, data


and communications to the employees, citizens and businesses, spread
all over the State of Bihar through BSWAN and BRAIN DC Projects. In
Sec LAN project optical fibre has been laid to provide interconnectivity
between the departments. Data Nodes have been provided at the
locations of officers. Sec LAN has a dedicated helpdesk to resolve the
queries of the government officers. The Sec LAN network is used to
provide VoIP (Voice over Internet Protocol) calls and the VoIP
telephones have been provided to the senior officers.

The secLAN uses technologies such as mailing, messaging, IP telephony,


video conferencing, workspace document sharing, web based
applications and extensible markup language (XML) based applications.

The components of secLAN include switches, IP Phones, UTP Cabling,


Fiber Optic Cabling, UPS And DG Sets. IP Phone is a very important part
of secLAN which uses Voice over IP(VoIP) technologies allowing
telephone calls to be made over an IP network such as the internet
instead of the ordinary PSTN system. Calls can traverse the Internet, or
a private IP Network such as that of a company.

Das könnte Ihnen auch gefallen