Sie sind auf Seite 1von 21

TECHNOLOGIES AND SERVICES PROVIDED AND UTILISED BY AIRTEL ES- CORPORATE

SUMIT JHA B.TECH CS&E A2305208219

ABSTRACT

Bharti airtel is a telecom company which provides the networking needs of enterprise level customers as well as general home based users. Project Technologies and services utilised and provided by airtel es corporate is collection of all the methods, latest technologies, ,networking principals which are used and utilised by airtel enterprise.

This project deals with the project management team of airtel es- corporate and includes the models of networking , internet technologies, mpls and vpn technologies.Also the hardware types like connectors and modems used in establishment of connections are understood and implied.

The project enables us to understand how networking of computers in enterprise is done and what are the core principals behind it.

TABLE OF CONTENTS 1.Networks and Networking 2.Internet And Vpn 3.Last Mile Technologies For Internet Access 4.Hardware Used in Last Mile Technologies 5.OSI MODEL 6.TCP/IP Model 7.Connectors & Co- Axial cables

1.NETWORK AND NETWORKING iscipli e concerne it communication Computer et or i is t e e i eeri et een computer systems. Suc communicating computer systems constitute a computer net or and t ese net or s generally involve at least t o devices capa le of eing net or ed it at least one usually eing a computer.

computer net or is any set of computers or devices connected to eac ot er. Examples of net or s are t e Internet, a ide area net or t at is t e largest to ever exist, or a small ome local area net or (L N) it t o computers connected it standard net or ing ca les connecting to a net or interface card in eac computer

Networking methods e t ree main net or ing met ods are (i) Local area net or (L N) (ii) Metropolitan area net or (M N) (iii) Wide area net or (W N)

Local area network(LAN) A local area net or is a computer net or covering a small geographic area, li e a home, office, or group of uildings. . Each node or computer in the LAN has its own computing power ut it can also access other devices on the LAN subject to the permissions it has been allowed. hese could include data, processing power, and the ability to communicate or chat with other users in the networ . Metropolitan area network(MAN) Metropolitan area networ s, or MANS, are large computer networ s usually spanning a city. hey typically use wireless infrastructure or optical fiber connections to link their sites. Wide area network (WAN) Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links.

2.INTERNET AND VPN The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet rotocol (I ). It is a network of networks that consists of millions of smaller domestic, academic, business and government networks which all together carry various information and services, such as email, online chat, file transfer and interlinked web pages and other d ocuments of the World Wide Web Internet protocols: there are three layers of protocols: at the lowest level is I (Internet rotocol), which defines the datagrams or packets that can carry blocks of data from one node to another Next came TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and ICMP (Internet Control Message Protocol) - the protocols by which data is transmitted On top comes the Application Protocols. This defines the specific messages and data formats sent and understood by the applications running at each end of the communication

MPLS BASED VPN SERVICE

A virtual private network (VPN) is a private communication network often used by companies or organizations, to communicate confidentially over a public network.. A VPN can send data (e.g. voice, data or video, or a combination of these media) across secured and encrypted private channels between the two points. MPLS VPN is a family of methods for harnessing the power of Multiprotocol Label Switching (MPLS) to create Virtual Private Networks (VPNs). MPLS is well suited to the task as it provides traffic isolation and differentiation without substantial overhead. Layer 3 MPLS VPN: A layer 3 MPLS VPN, also known as L3VPN, combines enhanced GP signaling, MPLS traffic isolation and router support for VRFs (Virtual Routing/Forwarding) to create a virtual network. This solution is more scalable and less costly than classic provider-based frame relay or ATM-based networks, or IPsec-based VPNs. Layer 3 MPLS VPNs also support Quality of Service. Layer 2 MPLS VPN: A layer 2 MPLS VPN, also known as L2VPN, is a point-to-point pseudowire service. It can be used to replace existing physical links. The specification is based on the Martini drafts, which define methods to transport layer 2 packets across MPLS networks, and methods to encapsulate transport protocols such as ATM, Ethernet, and SONET.

The primary advantage of this MPLS VPN type is that it can transparently replace an existing dedicated facility without reconfiguration, and that it is completely agnostic to upper-layer protocols. y contrast, in a layer 3 VPN the hosts must speak IP. Multipoint Layer 2 MPLS VPN: A multipoint layer 2 VPN for Ethernet, can be implemented using Virtual Private LAN Service (VPLS) and MPLS pseudo wires (ATOM). It builds on the foundation of point-to-point layer 2 MPLS VPNs to extend an ethernet broadcast domain across multiple sites. The VPLS network appears as a private ethernet switch to the attached MPLS end site. IP VPN Safety and Security in One Connection. For a fast and secure connection, Wanadoo is providing the Internet Protocol Virtual Private Network (IPVPN), This is a wide area network service that provides a high-speed, secure and economic connection between entity sites that are geographically dispersed, via a dedicated virtual private network based on IP technology Benefits: - Any to any private and simple connectivity - Centralized Management system - Security through privacy - Local and national coverage

Users: Customers with three sites or more, such as: - Government institutions, - Large corporations with multiple offices within the area - anks. - Small and Medium Enterprises

3.LAST MILE TECHNOLOGIES USED FOR INTERNERT ACCESS The last mile is the final leg of delivering connectivity from a communications provider to a customer. Usually referred to by the telecommunications and cable television industries, it is typically seen as an expensive challenge. Last Mile Technologies for internet access: Dial up: Dial-up accessis a form of Internet access through which the client uses a modem connected to a computer and a telephone line to dial into an Internet service provider s (ISP) node to establish a modem-to-modem link, which is then routed to the Internet. Dial-up requires no additional infrastructure on top of the telephone network.

Leased line A leased line is a symmetric telecommunications line connecting two locations together. Unlike traditional PSTN lines they do not have a telephone number, each side of the line being permanently connected to the other. They can be used for telephone, data or Internet services. Dedicated line In computer networks and telecommunications, a dedicated line is a communications cable dedicated to a specific application, in contrast with a shared resource such as the telephone network or the Internet. In practice, such services may not be provided by a single, discrete, end-to-end cable, but they do provide guarantees of constant bandwidth availability and near- constant latency, properties that cannot be guaranteed for more public systems. Such properties add a considerable premium to the price charged Applications of Leased Lines: Point-to-point(for data only) One of the widely used applications of leased lines is having a secure dedicated data circuit between two locations via a private line, used to transmit data at a constant speed equal to the bandwidth of the circuit. Point-to-point(for voice and data) This kind of application allows transmission of voice and data over the same connection. Here also two separate locations are joined together. This type of configuration is commonly provided on a higher bandwidth circuit.

MERITS OF LEASED LINES It provides permanent, reliable, high-speed connectivity as compared to the temporary connectivity of dial up access. The quality of the connection is far superior to what is normally available through dialup, because of the digital signaling, less noise, fewer exchanges etc Demerit of Leased Line: Leased bandwidth prices are quite high, compared to dialup bandwidth of comparable size. Entry level annual port prices are also high at present, so that this access method is only feasible beyond a fairly high threshold level. Permanent connectivity to the Net exposes the organization to a variety of threats including hacking, malicious code including active vandals, viruses, Trojan Horses, macros, denial of service attacks etc. ISDN (Integrated Services Digital Network) ISDN is comprised of digital transmission and data-transport services offered by telephone carriers. It involves the digitization of the telephone network, which permits voice, data, text, graphics, music, video, and other source material to be transmitted over existing telephone wires. Various features of ISDN: 1. Connectivity on Demand . 2. Ltd. Speed options: 64 Kbps and 128Kbps 3. Dynamic IP allocated, Static IP can also be provided

Merits of ISDN: Reduction of cost. Terminal universality and portability. Standard socket to connect 2 +D link. Improved reliability. Flexibility to add new services. Flexibility of introducing new features to existing services.

Demerits of ISDN: Not available in all countries Not suited to mobile users (users dialing in via remote access)

DSL: DSL or xDSL,is a family of technologies that provide digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop, although in recent years, many have adopted digital subscriber line as a more marketing- friendly term for the most popular version of consumer-ready DSL, ADSL

4.HARDWARE USED IN LAST MILE Routers: Routers are used to connect networks together and route packets of data from one network to another. Routers ,by default, break up a broadcast domain, which the set of all devices on a network segment that hear all broadcast sent on that segment. Functions of routers: Packet switching Packet filtering Internetwork communications Path selection MODEMS: A modem (from modulate and demodulate) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Various model of modem ASMi52: (i) ASMi52 V.35 (ii) ASMi52 E1 (G.703) (iii) ASMi52 IR-IP

Switches: Switches are a special type of hub that offers an additional layer of intelligence to basic, physical layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This information allow switches to repeat incoming data frames only to the computer or computers to which a frame is addressed, This speeds up the network and reduces congestion. Switches operate at both the physical layer and the data link layer of the OSI model 5.OSI MODEL The Open Systems Interconnection asic Reference Model (OSI Reference Model or OSI Model for short) is a layered, abstract description for communications and computer network protocol design. 7. Application layer 6. Presentation layer 5. Session layer 4. Transport layer 3. Network layer 2. Data link layer LLC sublayer MAC sublayer 1. Physical layer

Layer 1: Physical layer The Physical layer defines all the electrical and physical specifications for devices.In particular, it defines the relationship between a device and a physical medium Layer 2: Data Link layer The Data Link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer. The best known example of this is Ethernet.

Layer 3: Network layer The Network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery error.

Layer 4: Transport layer The Transport layer provides transparent transfer of data between end users, providing reliable data transfer while relieving the upper layers of it. The transport layer controls the reliability of a given link through flow control, segmentation/de-segmentation, and error control

Layer 5: Session layer The Session layer controls the dialogues/connections (sessions) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for either full-duplex or half-duplex operation, and establishes check pointing, adjournment, termination, and restart procedures Layer 6 :Presentation layer The Presentation layer transforms the data to provide a standard interface for the Application layer. MIME encoding, data encryption and similar manipulation of the presentation are done at this layer to present the data as a service or protocol developer sees fit. Layer 7:Application layer The application layer is the seventh level of the seven-layer OSI model. It interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer.

6.TCP/IP MODEL The TCP/IP model or Internet reference model, sometimes called the DoD model (DOD, Department of Defense), ARPANET reference model, is a layered abstract description for communications and computer network protocol design
The five-layer TCP/IP 5. Application layer

4. Transport layer 3. Internet layer 2. Data link layer 1. Physical layer

Layer 4- Process Layer or Application Layer This is where the higher level protocols such as SMTP, FTP, SSH, HTTP, etc. operate.

Layer 3 - Host-To-Host (Transport) Layer This is where flow-control and connection protocols exist, such as TCP. This layer deals with opening and maintaining connections, ensuring that packets are in fact received.

Layer 2 - Internet or Internetworking Layer This layer defines IP addresses, with many routing schemes for navigating packets from one IP address to another.

Layer 1 - Network Access Layer This layer describes the physical equipment necessary for communications, such as twisted pair cables, the signaling used on that equipment, and the low-level protocols using that signaling 7.CONNECTORS AND CO-AXIAL CABLES UTP Unshielded Twisted Pair (UTP) is a cable that has four pairs of wires twisted inside it to eliminate electrical Interference UTP cables are used in many configurations and for different purposes, to form an Internetwork including: Straight-through Crossover Rollover

Applications of UTP include: Serial transmission Integrated Service Digital Network (ISDN) connections Modular and fixed interfaces Straight-Through Cable: A straight-through cable is the standard network cable connection and is used to connect the source and destination computers through an internetworking device. Specifically, you can use it to connect a host to a hub or switch Crossover Cable: In a crossover cable, the standard RJ-45 cable between the source and destination computers is cross-connected. A crossover cable can be used to connect: Two computers Two hubs A hub to a switch A cable modem to a router Two router interfaces

UTP Unshielded twisted pair (UTP) cabling is the most common cable used in computer networking. It is a variant of twisted pair cabling. UTP cables are often called Ethernet cables after Ethernet, the most common data networking standard that utilizes UTP cables, although not the most reliable STP: STP cabling includes metal shielding over each individual pair of copper wires, This type of shielding protects cable from external EMI (electromagnetic interferences) Advantages: It is a thin, flexible cable that is easy to string between walls. Most modern buildings come with CAT 5 UTP already wired into the wall outlets or at least run between the floors. ecause UTP is small, it does not quickly fill up wiring ducts. UTP costs less per foot than any other type of LAN cable.

K Y

Das könnte Ihnen auch gefallen