DATA COMMUNICATION AND
COMPUTER NETWORK
Proof of Concept document
SEPTEMBER 22, 2014
B.SARAVANA PRASANTH
IT 14237300
Lectu...
IT14237300 1
Table of Contents
INTRODUCTION..................................................................................
IT14237300 2
INTRODUCTION
The rise of information technology very helpful to the humans daily to day life.
From that they ...
IT14237300 3
DIAGRAM
HIGHLEVEL DIAGRAM
Figure 01: It Describes About the Connection between DC, DR and Branches
Figure 01
...
IT14237300 4
LARGE
Figure 02: It Describes About How The Large Level Branches Connected With The Data Center And
Data Reco...
IT14237300 5
MEDIUM
Figure 03: It Describes About How the Medium Level Branches Connected With the Data Center And
Data Re...
IT14237300 6
SMALL
Figure 04: It Describes About How the Large Level Branches Connected With The Data Center And
Data Reco...
IT14237300 7
DATA CENTER-SRILANKA
Figure 05: It Describes About How The Data Center Connected With Their Employees.
Figure...
IT14237300 8
DATA RECOVERY-SWITZERLAND
Figure 06: It Describes About How The Data Recovery Center Connected With Their Emp...
IT14237300 9
DMZ (Demilitarized Zone)
In Computer Networking, a DMZ or Demilitarized Zone (Referred To As A Perimeter Netw...
IT14237300 10
A server farm [SF]
A server farm or server cluster is a collection of computer servers usually maintained by...
IT14237300 11
SERVER FARM IN BRANCHES [SFB]
In branches side we connecting the Proxy Server and the Mail Server to the per...
IT14237300 12
PSTN
Figure 10: It describes about the how the PSTN’s working in the organization.
Figure 10
IT14237300 13
PSTN IN THE ORGANIZATION
Figure 11: It describes about how maybe the connection between the DC , DR and Bran...
IT14237300 14
DEVICES
ROUTER
• Usage: Router is a network device. It forwards data packets between
computer networks. Rout...
IT14237300 15
INTERNAL FIREWALL
Usage: The Internal Firewall which establishes a barrier between a trusted, secure externa...
IT14237300 16
SWITCH
Usage: The Switch is a computer networking device. That is used to connect devices together on a
comp...
IT14237300 17
SERVERS
PROXY SERVER
In computer networks, a proxy server is a server (a computer system or an application) ...
IT14237300 18
Figure 16: It Describes About What Kind Web Servers are Using for Construct This Network. And
Reason for Usi...
IT14237300 19
Figure 18
DATA BASE SERVER
Figure 19: It Describes About What Kind of Data Base Server Servers are using for...
IT14237300 20
INTERNET SERVICE PROVIDERS
Figure 20: It describes about the internet service provider’s and PSTN provider’s...
IT14237300 21
COUNTRY INTERNET PSTN
United States of America (USA) Windstream-WIND Skyriver-S/RIVER
Russia City line-CITY ...
IT14237300 22
Nächste SlideShare
Wird geladen in …5
×

DATA COMMUNICATION AND NETWORKING

172 Aufrufe

Veröffentlicht am

This project describes about how global organization connect threw their branches.

Veröffentlicht in: Technologie
0 Kommentare
0 Gefällt mir
Statistik
Notizen
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Keine Downloads
Aufrufe
Aufrufe insgesamt
172
Auf SlideShare
0
Aus Einbettungen
0
Anzahl an Einbettungen
1
Aktionen
Geteilt
0
Downloads
2
Kommentare
0
Gefällt mir
0
Einbettungen 0
Keine Einbettungen

Keine Notizen für die Folie

DATA COMMUNICATION AND NETWORKING

  1. 1. DATA COMMUNICATION AND COMPUTER NETWORK Proof of Concept document SEPTEMBER 22, 2014 B.SARAVANA PRASANTH IT 14237300 Lecturer In-Charge Signature
  2. 2. IT14237300 1 Table of Contents INTRODUCTION.......................................................................................................................................2 DIAGRAM ................................................................................................................................................3 HIGHLEVEL DIAGRAM .............................................................................................................................3 SMALL..................................................................................................................................................6 DATA CENTER-SRILANKA.....................................................................................................................7 DATA RECOVERY-SWITZERLAND.........................................................................................................8 PSTN..................................................................................................................................................12 DEVICES.................................................................................................................................................14 ROUTER.............................................................................................................................................14 PERIMETER FIREWALL.......................................................................................................................14 INTERNAL FIREWALL .........................................................................................................................15 SWITCH..............................................................................................................................................16 SERVERS ............................................................................................................................................17 PROXY SERVER ..............................................................................................................................17 WEB SERVER..................................................................................................................................17 FILE SERVER...................................................................................................................................18 MAIL SERVER.................................................................................................................................18 DATA BASE SERVER.......................................................................................................................19 INTERNET SERVICE PROVIDERS.............................................................................................................20
  3. 3. IT14237300 2 INTRODUCTION The rise of information technology very helpful to the humans daily to day life. From that they can exchange their data’s, views and ideas from one end to another end of the world. The aim of this project was to create a design for a global organization, to communicate with their branches threw the networking systems. This project presents the design for the networking diagram, which includes the following components: The networking diagram, products, products details, protection. A description of the design and an analysis of operational will give the finalized networking diagram. Finally it will be very cost effective and very safety to communicate with their branches.
  4. 4. IT14237300 3 DIAGRAM HIGHLEVEL DIAGRAM Figure 01: It Describes About the Connection between DC, DR and Branches Figure 01 TYPES OF BRANCHES 1. LARGE • It contains which branches having more than 40 Employees. Large= (Branch Employees>40) 2. MEDIUM • It contains which branches having more than 30 Employees. Medium= (Branch Employees>30) 3. SMALL • It contains which branches having less than 40 Employees. Small= (Branch Employees<40)
  5. 5. IT14237300 4 LARGE Figure 02: It Describes About How The Large Level Branches Connected With The Data Center And Data Recovery Center. Figure 02
  6. 6. IT14237300 5 MEDIUM Figure 03: It Describes About How the Medium Level Branches Connected With the Data Center And Data Recovery Center. Figure 03
  7. 7. IT14237300 6 SMALL Figure 04: It Describes About How the Large Level Branches Connected With The Data Center And Data Recovery Center. Figure 04 The reason for having single internet service providers in the branches of small diagram is for redundancy purpose.in these branches they are having small amount of employees and then if we add another internet service provider. We want to spend more money to get service providers and devices. In these kind of small branches they no need to have multiple amount of service providers.
  8. 8. IT14237300 7 DATA CENTER-SRILANKA Figure 05: It Describes About How The Data Center Connected With Their Employees. Figure 05 In this data center there are 200 employees are working in here. From that I divided into four main departments. • DEPARTMENT 01=50 employees • DEPARTMENT 02=50 employees • DEPARTMENT 03=50 employees • DEPARTMENT 04=50 employees
  9. 9. IT14237300 8 DATA RECOVERY-SWITZERLAND Figure 06: It Describes About How The Data Recovery Center Connected With Their Employees. Figure 06 There are 150 employees working in data recovery center. From this I divided into four main departments. • DEPARTMENT 01=50 employees • DEPARTMENT 02=50 employees • DEPARTMENT 03=25 employees • DEPARTMENT 04=25 employees
  10. 10. IT14237300 9 DMZ (Demilitarized Zone) In Computer Networking, a DMZ or Demilitarized Zone (Referred To As A Perimeter Network). Is A Physical or Logical Network That Contains and Exposes an Organization’s External-Facing Services to A Large and Untrusted Network, Usually the Internet. The Purpose of a DMZ Is To Add an Additional Layer of Security to an Organization’s Local Area Network (LAN); an External Attacker Only Has Direct Access to Equipment in the DMZ, Rather Than Any Other Part Of The Network. Figure 07: It describes about the internal architecture in the Demilitarized Zone (DMZ). Figure 07
  11. 11. IT14237300 10 A server farm [SF] A server farm or server cluster is a collection of computer servers usually maintained by an organizations to accomplish server needs far beyond the capability of one machine. Server farms often consist of thousands of computers which require a large amount of power to run and keep cool. At the optimum performance level, a server farm has enormous costs associated with it, both financially and environmentally. Server farms often have backup servers, which can take over the function of primary servers in the event of a primary server failure. Figure 08: It describes about the internal architecture in the Server Farm (SF). Figure 08
  12. 12. IT14237300 11 SERVER FARM IN BRANCHES [SFB] In branches side we connecting the Proxy Server and the Mail Server to the perimeter Fire wall for that we contract a layer called Server Farm in Branch’s. Figure 09: In this diagram it describes about the how the Server Farm in the Branch’s working. Figure 09
  13. 13. IT14237300 12 PSTN Figure 10: It describes about the how the PSTN’s working in the organization. Figure 10
  14. 14. IT14237300 13 PSTN IN THE ORGANIZATION Figure 11: It describes about how maybe the connection between the DC , DR and Branches through the PSTN. Figure 11
  15. 15. IT14237300 14 DEVICES ROUTER • Usage: Router is a network device. It forwards data packets between computer networks. Router send the data packets for correct destination it determine the routing table or routing policy. Figure 12: It Describes About What Kind of Router’s Are Using for Construct This Network. And Reason For Using That Specific Router. MODEL PLACE RESON cisco 1800 series integrated service routers In Branches It’s End of Life Is More Than Five Years. cisco ASR 1003 Series Aggregation Services Router In Data Center And Data Recovery It’s End of Life Is More Than Five Years. PERIMETER FIREWALL • Usage: Perimeter firewall basically used in DMZ (demilitarized network). Which is used to establish a barrier between a trusted, secure internal network and another network (e.g. - the Internet). Figure 13: It Describes About What Kind of Perimeter Firewall’s Are Using for Construct This Network. And Reason For Using That Specific Firewall. MODEL PLACE RESON Cisco ASA 5500-X Series Next-Generation Firewalls Data Center And Data Recovery Center It’s End of Life Is More Than Five Years. Figure 13 Figure 12
  16. 16. IT14237300 15 INTERNAL FIREWALL Usage: The Internal Firewall which establishes a barrier between a trusted, secure external network and internal network. Figure 14: It Describes About What Kind of Internal Firewall’s Are Using for Construct This Network. And Reason For Using That Specific Firewall. MODEL PLACE RESON Juniper SRX110 Data Center, Data Recovery Center and Branches. It’s End of Life Is More Than Five Years. Figure 14 The reason for using two different firewalls in the networking is: In this diagram it have permitted firewall and internal firewalls. Permitted firewall is Cisco and internal firewall is Juniper .The reason for two different fire wall is; the Cisco firewall is having a different architecture and Juniper firewall is having a different kind of architecture. So if hackers easily can’t access in our Systems. For that security purpose we are using different kind of firewalls. The reason for using only internal firewall in branches is: If we had the internal and permitted both firewalls our working speed may be low. That’s why we using the internal firewall only to the branches.
  17. 17. IT14237300 16 SWITCH Usage: The Switch is a computer networking device. That is used to connect devices together on a computer network. It using a form of packet switching to forward data to destination device. Figure 15: It Describes About What Kind of Switch’s Are Using for Construct This Network. And Reason For Using That Specific Switch. MODEL PLACE RESON Cisco Catalyst 3850 Series Switches In DR and DC’s Access Layers It’s End of Life Is More Than Five Years. And also it have 48 ports to connect the machines In DC and DR, so it useful for redundancy. Cisco Nexus 7000 4-Slot Switch In DMZ in DC and DR’s. It’s End of Life Is More Than Five Years. And also it have 4 ports to connect the servers, so it useful for redundancy. Cisco Nexus 7000 9-Slot Switch In Server farm in DC and DR’s It’s End of Life Is More Than Five Years. And also it have 9 ports to connect the servers, so it useful for redundancy. Cisco Nexus 7000 9-Slot Switch In DR and DC’s Distribution layer It’s End of Life Is More Than Five Years. And also it have 9 ports to connect the servers, so it useful for redundancy. Figure 15
  18. 18. IT14237300 17 SERVERS PROXY SERVER In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems Figure 16: It Describes About What Kind Proxy Servers are Using for Construct This Network. And Reason for Using That Specific Server. WEB SERVER The term web server, also written as Web server, can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. The most common use of web servers is to host websites, but there are other uses such as gaming, data storage, running enterprise applications, handling email, FTP, or other web uses. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. It’s End of Life Is More Than Five Years. Figure 16
  19. 19. IT14237300 18 Figure 16: It Describes About What Kind Web Servers are Using for Construct This Network. And Reason for Using That Specific Server. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. FILE SERVER In computing, a file server is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations that are attached to the same computer network. The term server highlights the role of the machine in the client–server scheme, where the clients are the workstations using the storage. A file server is not intended to perform computational tasks, and does not run programs on behalf of its clients. It is designed primarily to enable the storage and retrieval of data while the computation is carried out by the workstations. Figure 17: It Describes About What Kind Web Servers are Using for Construct This Network. And Reason for Using That Specific Server. Figure 17 MODEL PLACE RESON HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR {Front End Mail Server} It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR.{Back End Mail Server} It’s End of Life Is More Than Five Years. Figure 16 MAIL SERVER Figure 18: It Describes About What Kind Mail Servers are Using for Construct This Network. And Reason for Using That Specific Server. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. It’s End of Life Is More Than Five Years.
  20. 20. IT14237300 19 Figure 18 DATA BASE SERVER Figure 19: It Describes About What Kind of Data Base Server Servers are using for Construct This Network. And Reason for Using That Specific Server. Figure 19 HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. {Mail server} It’s End of Life Is More Than Five Years. MODEL PLACE RESON HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years.
  21. 21. IT14237300 20 INTERNET SERVICE PROVIDERS Figure 20: It describes about the internet service provider’s and PSTN provider’s in these countries. COUNTRY INTERNET PSTN SRILANKA DIALOG Airtel SLT Etisalat SWITZERLAND SWISSCOM-SSC Orange SUNRISE-SUN UPC Cablecom- UPC England BT Group-BT Vodafone-VOD Sky Broadband-SKY Hutchison 3 -HUTCH India BSNL TATA DOCOMO- TATA Airtel Reliance Communications- REL Japan ASAHI net SoftBank - SOFT SO-Net au Bangladesh AB Network Limited-AB Grameenphone-GRAM Aftab It Limited- AFTAB Airtel Australia AAR Net-AAR Vodafone-VF BIG Air-BIG Optus China MSN China-MSN China mobile- MOBILE China Telecom-Tel China Unicom-UNI
  22. 22. IT14237300 21 COUNTRY INTERNET PSTN United States of America (USA) Windstream-WIND Skyriver-S/RIVER Russia City line-CITY Beeline-BEE South Africa Afrihost-AFRI Telkom-T/KOM Canada Gemstelecom-GEM Shaw Figure 20
  23. 23. IT14237300 22

×