Beruflich Dokumente
Kultur Dokumente
ON
TOPIC:
B.TECH DEGREE
COMPUTER SCIENCE & ENGINEERING
NALANDA COLLEGE OF ENGINEERING , CHANDI
(NALANDA)
Signature of instructor
Date:
Signature of HoD
Date:
DECLARATION
(Signature)
Date: …………………………………….
ACKNOWLEDGEMENT
The above project has been a great working experience for me. I
learnt about the various aspects of e-governance of Bihar. Topic of
project “Secretariat Local Area Network With special reference
to VoIP” helped me to know the steps involved by the Government
of Bihar (GoB) in providing technologically updated facilities and
render a wider range of services to the Citizens of Bihar.
The SecLAN project has setup Local Area network for all its Government
offices in and around Secretariat and for providing the connectivity to
State Data Centre at Technology Bhawan. The SecLAN is being utilizing
for accessing all intranet applications that are being developed for
computerizing the operations of various departments of Government of
Bihar (GoB) in order to render a wider range of services to the Citizens
of Bihar.
2. Objective
3. Key Challenges
4. Scope of work
5. Solution offered
i) Active switches:
a. Layer 2 switches
b. Layer 3 switches
11. IP Phones
a. How VoIP Works
13. CONCLUSION
Introduction:
In the direction of e-governance for use of IT to providing information speedily to
all citizens by Improving Public services & improving administrative efficiency,
Government of Bihar has adopted to rollout the major Information Technology
Infrastructure project namely State Wide Area Network for providing last mile
connectivity up to the Block level, State Data Center for hosting the applications
and for storing data and Secretariat Local Area Network for interconnecting
important Government offices to each other for sharing messages, data,
information etc. in general administration.
Nine imperative Government buildings our identified by Bihar Government and
each department in the above buildings has been provided with Data Port, IP
Telephony Port, digital generator and UPS power points. The SecLAN project has
setup Local Area network for all its Government offices in and around Secretariat
and for providing the connectivity to State Data Centre at Technology Bhawan.
The SecLAN is being utilizing for accessing all intranet applications that are being
developed for computerizing the operations of various departments of
Government of Bihar (GoB) in order to render a wider range of services to the
Citizens of Bihar.
Bihar State Electronics Development Corporation Limited (BELTRON) is a Govt. of
Bihar undertaking, primarily responsible for growth and development of
electronics and information technology industries within Bihar. BSEDC also
provides information and expert services to government departments and public
in general in all domains of electronics and IT.
Objective:
Bihar Government is contemplating uninterrupted access to the authorized
users for information access, infrastructure resources and departmental
applications, by establishing Secretariat Local Area Network (SecLAN). SecLAN is
intended to help position information and communication technology to drive
improved efficiency and responsiveness in day to day administration of the
Government.
For creating a single, converged network that could provide voice, data and
communications for Government Officers and employees engaged with Bihar
• Improving the service delivery and response time to the employees of Bihar
State Secretariat enabling quick access to information and data.
Key challenges:
• BELTRON required an integrated telecommunications infrastructure catering to
high speed, high capacity and secured delivery of voice and data transmissions.
• Setup and manage a Local Area Network for all government offices in and
around secretariat (SecLAN) and connect to State Data Centre at Technology
Bhawan.
• SecLAN was to be used to access all intranet applications being developed for
computerizing operations of various departments of the Government of Bihar to
render a wide range of services to citizens of Bihar.
• Improving service delivery and response time to employees of Bihar State
Secretariat.
Scope of work:
The Scope of work involves planning, design & deployment of network
components, IP Telephony, Installation of necessary UPS systems at all the
proposed buildings, Installation of Generators to support UPS with proper rating
and fuel @ 400 hours per annum, Fibre optic cable laying from Technology
Bhawan to all the 6 buildings and Passive Cabling at all the 7 locations.
Electrical wiring is also part of the scope of work for all the 2000 + Data Points
with 3 sockets of 5/15A from UPS with standard ISI mark 3/20 wire.
Solution offered:
SecLAN has been implemented at many important places including the Old
Secretariat, Technology Bhawan, CM's Residence, and BPSC. The network has now
facilitated the government to provide IP telephony solution to its various officers
as well as provide a Video Conferencing solution to its heads of various units and
senior government officials.
Each department is provided with Data Port, IP Telephone Port, EPABX Port and
UPS Ports. The scope also covered supply and installation of UPS, Generators
and passive components. Spanco will support the SecLAN for five years.
Products/Services integrated in the project include:
UPS
IP Phones
1. Old Secretariat
2. Vikas Bhawan
3. C.M. Secretariat
4. Technology
Bhawan
5. Vishveshwaraiya
Bhawan
6. Sinchai Bhawan
7. Soochna Bhawan
8. Beltron Bhawan
9. Lalit Bhawan
10. C M Residence
Fiber Route Diagram among Government Buildings
Logical Structure of SecLAN Network
All the buildings have building switches. These are connected to other with
optical fiber cables. Each building is connected with two fibers, one providing
alternative path in case of failure. The network is in star topology.
Active switches:
Layer 2 Switches
Layer 2 switching is hardware based, which means it uses the media access control
address (MAC address) from the host's network interface cards (NICs) to decide
where to forward frames. Switches use application-specific integrated circuits
(ASICs) to build and maintain filter tables (also known as MAC address tables). One
way to think of a layer 2 switch is as a multiport bridge.
Layer 2 switching provides the following
• Hardware-based bridging (MAC)
• Wire speed
• High speed
• Low latency
• Low cost
• Intranets
— Allows organization-wide client/server communications based on a
Web technology.
• Provide Security
• High-speed scalability
• Low latency
• Flow accounting
• Security
• Quality of service (QoS)
Category 6 Cable
Category 6 cable, commonly referred to as Cat-6, is a cable standard for Gigabit
Ethernet and other network protocols that are backward compatible with the
Category 5/5e and Category 3 cable standards. Compared with Cat-5 and Cat-5e,
Cat-6 features more stringent specifications for crosstalk and system noise. The
cable standard provides performance of up to 250 MHz and is suitable for 10BASE-
T, 100BASE-TX (Fast Ethernet), 1000BASE-T / 1000BASE-TX (Gigabit Ethernet) and
10GBASE-T (10-Gigabit Ethernet). Category 6 cable has a reduced maximum length
when used for 10GBASE-T; Category 6a cable, or Augmented Category 6, is
characterized to 500 MHz and has improved alien crosstalk characteristics,
allowing 10GBASE-T to be run for the same distance as previous protocols.
DG sets and UPS are used for power backup.
UTP cable
UTP
Jack
Faceplate
Workstation/Equipment Cords
DG set:
The operation of the network may be interrupted due to power failure. Hence for
uninterrupted operation of the network a DG set (Diesel Generator set) is used.
DG set as a system
A diesel generating set should be considered as a system since its successful
operation depends
on the well-matched performance of the components, namely:
a) The diesel engine and its accessories.
b) The AC Generator.
c) The control systems and switchgear.
d) The foundation and power house civil works.
e) The connected load with its own components like heating, motor drives,
lighting etc.
It is necessary to select the components with highest efficiency and operate them
at their optimum efficiency levels to conserve energy in this system.
Sec-LAN architecture:
The architecture of a LAN is best described in terms of a layering of protocols that
organise the basic functions of a LAN. This section opens with a description of the
standardized protocol architecture for LANs, which encompasses physical,
medium access control, and logical link control layers. Each of these layers is then
examined in turn.
Protocol Architecture
Protocols defined specifically for LAN and MAN transmission address issues
relating to the transmission of blocks of data over the network. In OSI terms,
higher layer protocols (layer 3 or 4 and above) are independent of network
architecture and are applicable to LANs, MANs, and WANs. Thus, a discussion of
LAN protocols is concerned principally with lower layers of the OSI model.
Star Topology
In the star LAN topology, each station is directly connected to a common central
node. Typically, each station attaches to a central node, referred to as the star
coupler, via two point-to-point links, one for transmission and one for reception.
In general, there are two alternatives for the operation of the central node.
One approach is for the central node to operate in a broadcast fashion. A
transmission of a frame from one station to the node is retransmitted on all of the
outgoing links. In this case, although the arrangement is physically a star, it is
logically a bus; a transmission from any station is received by all other stations,
and only one station at a time may successfully transmit.
Another approach is for the central node to act as a frame switching device.
An incoming frame is buffered in the node and then retransmitted on an outgoing
link to the destination station.
VoIP Phones
How VoIP Works
VoIP, or Voice over Internet Protocol, is a method for taking analog audio signals,
like the kind you hear when you talk on the phone, and turning them into digital
data that can be transmitted over the Internet.
VoIP can turn a standard Internet connection into a way to place free phone calls.
The practical upshot of this is that by using some of the free VoIP software that is
available to make Internet phone calls, one can bypass the phone company (and
its charges) entirely.
VoIP is a revolutionary technology that has the potential to completely rework the
world's phone systems. VoIP providers like Vonage have already been around for a
while and are growing steadily. Major carriers like AT&T are already setting up
VoIP calling plans in several markets around the United States, and the FCC is
looking seriously at the potential ramifications of VoIP service.
Above all else, VoIP is basically a clever "reinvention of the wheel." In this article,
we'll explore the principles behind VoIP, its applications and the potential of this
emerging technology, which will more than likely one day replace the traditional
phone system entirely.
The interesting thing about VoIP is that there is not just one way to place a call.
There are three different "flavors" of VoIP service in common use today:
• ATA -- The simplest and most common way is through the use of a device called
an ATA (analog telephone adaptor). The ATA allows you to connect a standard
phone to our computer or our Internet connection for use with VoIP. The ATA is an
analog-to-digital converter. It takes the analog signal from our traditional phone
and converts it into digital data for transmission over the Internet. Providers like
Vonage and AT&T CallVantage are bundling ATAs free with their service. We simply
crack the ATA out of the box, plug the cable from our phone that would normally
go in the wall socket into the ATA, and we are ready to make VoIP calls. Some ATAs
may ship with additional software that is loaded onto the host computer to
configure it; but in any case, it's a very straightforward setup.
• IP Phones -- These specialized phones look just like normal phones with a
handset, cradle and buttons. But instead of having the standard RJ-11 phone
connectors, IP phones have an RJ-45 Ethernet connector. IP phones connect
directly to our router and have all the hardware and software necessary right
onboard to handle the IP call. Wi-Fi phones allow subscribing callers to make VoIP
calls from any Wi-Fi hot spot.
• Computer-to-computer -- This is certainly the easiest way to use VoIP. We
don't even have to pay for long-distance calls. There are several companies
offering free or very low-cost software that we can use for this type of VoIP. All we
need is the software, a microphone, speakers, a sound card and an Internet
connection, preferably a fast one like we would get through a cable or DSL modem.
Except for our normal monthly ISP fee, there is usually no charge for computer-to-
computer calls, no matter the distance.
• The sending computer chops data into small packets, with an address on each
one telling the network devices where to send them.
• Inside of each packet is a payload. The payload is a piece of the e-mail, a music
file or whatever type of file is being transmitted inside the packet.
• Thesending computer sends the packet to a nearby router and forgets about it.
The nearby router send the packet to another router that is closer to the recipient
computer. That router sends the packet along to another, even closer router, and
so on.
• When the receiving computer finally gets the packets (which may have all taken
completely different paths to get there), it uses instructions contained within the
packets to reassemble the data into its original state.
Packet switching is very efficient. It lets the network route the packets along the
least congested and cheapest lines. It also frees up the two computers
communicating with each other so that they can accept information from other
computers, as well.
Advantages of PoE-
2. The ATA receives the signal and sends a dial tone. This lets we know that we
have a connection to the Internet.
3. We dial the phone number of the party we wish to talk to. The tones are
converted by the ATA into digital data and temporarily stored.
4. The phone number data is sent in the form of a request to our VoIP company's
call processor. The call processor checks it to ensure that it's in a valid format.
5. The call processor determines to whom to map the phone number. In mapping,
the phone number is translated to an IP address (more on this later). The soft
switch connects the two devices on either end of the call. On the other end, a
signal is sent to our friend's ATA, telling it to ask the connected phone to ring.
6. Once our friend picks up the phone, a session is established between our
computer and our friend's computer. This means that each system knows to
expect packets of data from the other system. In the middle, the normal Internet
infrastructure handles the call as if it our e-mail or a Web page. Each system must
use the same protocol to communicate. The systems implement two channels,
one for each direction, as part of the session.
7. We talk for a period of time. During the conversation, our system and our
friend's system transmit packets back and forth when there is data to be sent. The
ATAs at each end translate these packets as they are received and convert them to
the analog audio signal that we hear. Our ATA also keeps the circuit open between
itself and our analog phone while it forwards packets to and from the IP host at
the other end.
9. When we hang up, the circuit is closed between our phone and the ATA.
10. The ATA sends a signal to the soft switch connecting the call, terminating the
session.
Probably one of the most compelling advantages of packet switching is that data
networks already understand the technology. By migrating to this technology,
telephone networks immediately gain the ability to communicate the way
computers do. It will still be at least a decade before communications companies
can make the full switch over to VoIP. As with all emerging technologies, there are
certain hurdles that have to be overcome.
• Emergency 911 calls also become a challenge with VoIP. As stated before, VoIP
uses IP-addressed phone numbers, not NANP phone numbers. There's no way to
associate a geographic location with an IP address. So if the caller can't tell the
911 operator where he is located, then there's no way to know which call center
to route the emergency call to and which EMS should respond. To fix this, perhaps
geographical information could somehow be integrated into the packets.
•Because VoIP uses an Internet connection, it's susceptible to all the hiccups
normally associated with home broadband services. All of these factors affect call
quality
>Integrated 10/100/1000 Base-T Ethernet switch with LAN and PC ports reduces
costs, enabling a single cable drop to support both the phone and a collocated PC
>Supports Gigabit Ethernet, positioning the phone’s internal switch to
accommodate growing multimedia intensive, PC-based applications, thus aligning
with investment made at the wiring closet
>Lockable Tools Menu offers local access to configuration, diagnostic and user
preference options
>Supports converged (voice and data) applications via the Nortel Application
Gateway 1000/2000, enriching users’ experience with advanced multimedia
interaction
>Supports both Nortel Communication Server protocol (UNIStim) and RFC 3261
compliant Session Initiation Protocol (SIP) firmware for business telephony
feature integration4
>Added convenience and time savings with field upgradeable firmware using
Trivial File Transfer Protocol (TFTP) or for sites requiring enhanced secure
firmware upgrades: UNIStim File Transfer Protocol (UFTP)5
Figure : IP Phone 1120E
Telephone display
IP Phone 1120E has three display areas:
• The upper display area provides labels for the four self-labelled line/
programmable feature key labels.
• The lower display area provides labels for the four context-sensitive
soft keys.
Nortel IP Phone 1140E:
Nortel IP Phone 1140E brings voice and data to the desktop by
connecting directly to a Local Area Network (LAN) through an Ethernet
connection.
In this phone, self-labelled line/programmable feature key labels appear
beside the keys, and context-sensitive soft key labels appear directly
above the keys. Figure 1 shows self-labelled line/programmable feature
keys and context-sensitive soft keys.
• Graphical XAS
• The upper display area provides labels for the six self-labeled line/
programmable feature key labels.
• The lower display area provides labels for the four context-sensitive
soft keys.
DATA CENTRE IN BIHAR
A data center (or data centre or datacentre or datacenter) is a facility
used to house computer systems and associated components, such as
telecommunications and storage systems. It generally includes
redundant or backup power supplies, redundant data communications
connections, environmental controls (e.g., air conditioning, fire
suppression) and security devices.
BRAIN (Bihar Revenue Administration Intra Net) is a state of the art data
centre established at Technology Bhawan Patna. The aim of this project
is to provide a centralized secured data warehouse enabling the
Government of Bihar to store, share and retrieve information pertaining
to the Finance and Revenue Dept on a real time basis. The Project is
funded by Department of Revenue, Government of Bihar. The project
aims to create a World Class Tier II secured Data Centre in respect to
Ashrae Specifications. This setup has a built-up with the 3 tier
architecture and high scalability. Presently, the storage capacity of this
data centre is 20TB and it is expandable up-to 50TB. Security (both
perimeter and data) is maintained with latest state of the art Firewall,
VPN, Intrusion Prevention System (IPS) and Department wise VLAN
have been created for privacy of data security and ease of accessibility.
Fig: Data Center at Technology Bhawan , Patna
Design considerations
A data center can occupy one room of a building, one or more floors, or
an entire building. Most of the equipment is often in the form of servers
mounted in 19 inch rack cabinets, which are usually placed in single
rows forming corridors (so-called aisles) between them. This allows
people access to the front and rear of each cabinet. Servers differ
greatly in size from 1U servers to large freestanding storage silos which
occupy many tiles on the floor. Some equipment such as mainframe
computers and storage devices are often as big as the racks themselves,
and are placed alongside them. Very large data centers may use
shipping containers packed with 1,000 or more servers each;when
repairs or upgrades are needed, whole containers are replaced (rather
than repairing individual servers).Local building codes may govern the
minimum ceiling heights.
Fig: Schematic View of a Data Center
Environmental control
The physical environment of a data center is rigorously controlled. Air
conditioning is used to control the temperature and humidity in the
data center. ASHRAE's "Thermal Guidelines for Data Processing
Environments" recommends a temperature range of 16–24 °C (61–75 °F)
and humidity range of 40–55% with a maximum dew point of 15°C as
optimal for data center conditions. The temperature in a data center
will naturally rise because the electrical power used heats the air. Unless
the heat is removed, the ambient temperature will rise, resulting in
electronic equipment malfunction. By controlling the air temperature,
the server components at the board level are kept within the
manufacturer's specified temperature/humidity range. Air conditioning
systems help control humidity by cooling the return space air below the
dew point. Too much humidity, and water may begin to condense on
internal components. In case of a dry atmosphere, ancillary
humidification systems may add water vapour if the humidity is too low,
which can result in static discharge problems which may damage
components. Subterranean data centers may keep computer equipment
cool while expending less energy than conventional designs.
Modern data centers try to use economizer cooling, where they use
outside air to keep the data center cool. Washington State now has a
few data centers that cool all of the servers using outside air 11 months
out of the year. They do not use chillers/air conditioners, which creates
potential energy savings in the millions.
There are many types of commercially available floors that offer a wide
range of structural strength and loading capabilities, depending on
component construction and the materials used. The general types of
raised floors include stringerless, stringered, and structural platforms,
all of which are discussed in detail in GR-2930 and summarized below.
• Stringerless Raised Floors - One non-earthquake type of raised
floor generally consists of an array of pedestals that provide the
necessary height for routing cables and also serve to support each
corner of the floor panels. With this type of floor, there may or
may not be provisioning to mechanically fasten the floor panels to
the pedestals. This stringerless type of system (having no
mechanical attachments between the pedestal heads) provides
maximum accessibility to the space under the floor. However,
stringerless floors are significantly weaker than stringered raised
floors in supporting lateral loads and are not recommended.
• Stringered Raised Floors - This type of raised floor generally
consists of a vertical array of steel pedestal assemblies (each
assembly is made up of a steel base plate, tubular upright, and a
head) uniformly spaced on two-foot centers and mechanically
fastened to the concrete floor. The steel pedestal head has a stud
that is inserted into the pedestal upright and the overall height is
adjustable with a leveling nut on the welded stud of the pedestal
head.
• Structural Platforms - One type of structural platform consists of
members constructed of steel angles or channels that are welded
or bolted together to form an integrated platform for supporting
equipment. This design permits equipment to be fastened directly
to the platform without the need for toggle bars or supplemental
bracing. Structural platforms may or may not contain panels or
stringers.
Electrical power:
Backup power consists of one or more uninterruptible power supplies
and/or diesel generators.
To prevent single points of failure, all elements of the electrical systems,
including backup systems, are typically fully duplicated, and critical
servers are connected to both the "A-side" and "B-side" power feeds.
This arrangement is often made to achieve N+1 redundancy in the
systems. Static switches are sometimes used to ensure instantaneous
switchover from one supply to the other in the event of a power failure.
Data centers typically have raised flooring made up of 60 cm (2 ft)
removable square tiles. The trend is towards 80–100 cm (31–39 in) void
to cater for better and uniform air distribution. These provide a plenum
for air to circulate below the floor, as part of the air conditioning system,
as well as providing space for power cabling.
Low-voltage cable routing
Data cabling is typically routed through overhead cable trays in modern
data centers. But some are still recommending under raised floor
cabling for security reasons and to consider the addition of cooling
systems above the racks in case this enhancement is necessary.
Smaller/less expensive data centers without raised flooring may use
anti-static tiles for a flooring surface. Computer cabinets are often
organized into a hot aisle arrangement to maximize airflow efficiency.
Fire protection
Data centers feature fire protection systems, including passive and
active design elements, as well as implementation of fire prevention
programs in operations. Smoke detectors are usually installed to
provide early warning of a developing fire by detecting particles
generated by smoldering components prior to the development of
flame. This allows investigation, interruption of power, and manual fire
suppression using hand held fire extinguishers before the fire grows to a
large size. A fire sprinkler sytem is often provided to control a full scale
fire if it develops. Fire sprinklers require 18 in (46 cm) of clearance (free
of cable trays, etc.) below the sprinklers. Clean agent fire suppression
gaseous systems are sometimes installed to suppress a fire earlier than
the fire sprinkler system. Passive fire protection elements include the
installation of firewalls around the data center, so a fire can be
restricted to a portion of the facility for a limited time in the event of
the failure of the active fire protection systems, or if they are not
installed. For critical facilities these firewalls are often insufficient to
protect heat-sensitive electronic equipment, however, because
conventional firewall construction is only rated for flame penetration
time, not heat penetration. There are also deficiencies in the protection
of vulnerable entry points into the server room, such as cable
penetrations, coolant line penetrations and air ducts.
Security
Physical security also plays a large role with data centers. Physical
access to the site is usually restricted to selected personnel, with
controls including bollards and mantraps. Video camera surveillance
and permanent security guards are almost always present if the data
center is large or contains sensitive information on any of the systems
within. The use of finger print recognition man traps is starting to be
commonplace.
Energy use
Energy use is a central issue for data centers. Power draw for data
centers ranges from a few kW for a rack of servers in a closet to several
tens of MW for large facilities. Some facilities have power densities
more than 100 times that of a typical office building. For higher power
density facilities, electricity costs are a dominant operating expense and
account for over 10% of the total cost of ownership (TCO) of a data
center. By 2012 the cost of power for the data center is expected to
exceed the cost of the original capital investment.
Fig: Multiple racks of servers, and how a data center commonly looks.
Data centers are also used for off site backups. Companies may
subscribe to backup services provided by a data center. This is often
used in conjunction with backup tapes. Backups can be taken of servers
locally on to tapes. However, tapes stored on site pose a security threat
and are also susceptible to fire and flooding. Larger companies may also
send their backups off site for added security. This can be done by
backing up to a data center. Encrypted backups can be sent over the
Internet to another data center where they can be stored securely.
For disaster recovery, several large hardware vendors have developed
mobile solutions that can be installed and made operational in very
short time.
As we know, for this purpose secLAN has been set up that aims at
providing a reliable, integrated and robust telecommunications
infrastructure and improving the service delivery and response time to
the employees of Bihar State Secretariat enabling quick access to
information and data. It is used to extend the success of
computerization for Government of Bihar (GoB). Sec LAN is providing
the information and communication technology to drive improved
efficiency and responsiveness in day to day administration of the
Government.